WorldWideScience

Sample records for possess key information

  1. Taxation of petroleum companies possessing private information

    International Nuclear Information System (INIS)

    Osmundsen, P.

    1995-01-01

    For countries having petroleum resources, a common objective of the Ministry of Energy is to maximise the net total government take from the petroleum industry. Most models of petroleum taxation, assuming symmetric information, recommended neutral taxation. A royalty is not optimal in this case as it gives disincentives for extraction, causing too much of the reservoir to remain unexploited. Through the operating activities, however, the companies obtain private information about the costs. A low cost company may conceal its information by imitating a high cost company, and must therefore be given an economic compensation (information rent) to be induced to reveal its true costs. An optimal regulatory response to asymmetric information may involve royalties, as these enable the government to capture a larger fraction of the economic rent. 17 refs., 2 figs

  2. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  3. Loss of possession: concussions, informed consent, and autonomy.

    Science.gov (United States)

    Robeson, Richard; King, Nancy M P

    2014-01-01

    The recent explosion of publicity about the dangers of concussion in contact sports - particularly in football - represents the unraveling of a disinformation campaign by the NFL amid growing public and professional concern about the game's long-term risks of harm. The persistence of controversy and denial reflects a cultural view of football players as serving the needs of the team, a resulting evidentiary skepticism, and resistance to rule changes as excessive or unenforceable. This article considers the cultural context of informed decision making by parents of youth football players and suggests that policy changes designed to lower (although they cannot eliminate) risks of brain injury have the potential to change both the culture of football and the way the benefits and harms of the game are regarded for its players, without loss of its essential excitement and appeal. © 2014 American Society of Law, Medicine & Ethics, Inc.

  4. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  5. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  6. Key diagnostic information for the oncologist

    International Nuclear Information System (INIS)

    Zlatareva, D.

    2012-01-01

    Full text: The radiologists use many modalities for imaging of oncologic patients. In order to get the most out of these imaging studies oncologist have to provide with precise information: what is the working diagnosis, what treatment the patients has had and what is the clinical question should be answered by imaging study. The main indications for imaging are confirmation of diagnosis, evaluation of the patient for surgery or assessment of response to the therapy. These will influence the choice of the test, the protocol and interpretation of the results. Imaging plays a vital role in the management of patients with cancer. It is important not only for diagnosis, indicating sites of abnormality, and guiding biopsies, but it is also crucial in assessing disease extent and thereby determining treatment. The stage of cancer at the time of diagnosis is a key factor to define prognosis and is important element in determining appropriate treatment. The most clinically used cancer staging system is tumor node metastasis (TNM). Stage is determined from information on the tumor, regional nodes, and metastases and by grouping cases with similar prognosis. The criteria for defining anatomic extent of disease are specific for tumors at different anatomic sites and of different histologic types. Therefore, the criteria for T, N and M are defined separately for each tumor and histologic type. For Hodgkin and other lymphomas, a different system for the extent of disease and prognosis is used. It is mandatory for the radiologist to learn TNM system to provide the oncologist with key diagnostic information. Learning objectives: To understand TNM staging system for the most common malignancies To review the changes from the sixth to the seven edition of the American Joint committee on cancer staging manual To describe diagnostic information provided by CT and MRI in preoperative planning and after therapy To discuss the role of PET/CT imaging in oncology

  7. Selected essential oils inhibit key physiological enzymes and possess intracellular and extracellular antimelanogenic properties in vitro

    Directory of Open Access Journals (Sweden)

    Zaahira Aumeeruddy-Elalfi

    2018-01-01

    Full Text Available Essential oils (EOs extracted from six medicinal herbs and food plants [Cinnamomum zeylanicum (CZ, Psiadia arguta (PA, Psiadia terebinthina (PT, Citrus grandis (CGp, Citrus hystrix (CH, and Citrus reticulata (CR] were studied for any inhibitory potential against key physiological enzymes involved in diabetes (α-glucosidase, skin aging (collagenase and elastase, and neurodegenerative disorders (acetylcholinesterase. Kinetic studies of the active EOs on the aforementioned enzymes were determined using Lineweaver–Burk plots. The intracellular and extracellular antimelanogenic potential of the EOs were evaluated on B16F10 mouse melanocytes. CH and CR were found to significantly inhibit (2.476 ± 0.13 μg/mL and 3.636 ± 0.10 μg/mL, respectively acetylcholinesterase, compared with galantamine (3.989 ± 0.16 μg/mL. CH inhibited collagenase (50% inhibitory concentration 28.71 ± 0.16 μg/mL compared with the control (24.45 ± 0.19 μg/mL. The percentage inhibition in the elastase assay of CH was 63.21% compared to the positive control (75.09%. In addition, CH, CR, CGp, CZ, and PT were found to significantly inhibit α-glucosidase (276.70 ± 0.73 μg/mL, 169.90 ± 0.58 μg/mL, 240.60 ± 6.50 μg/mL, 64.52 ± 0.69 μg/mL, and 313.0 ± 5.0 μg/mL, respectively, compared to acarbose (448.80 ± 0.81 μg/mL. Active EOs showed both uncompetitive and competitive types of inhibition. The EOs also inhibited intracellular (50% inhibitory concentration 15.92 ± 1.06 μg/mL, 23.75 ± 4.47 μg/mL, and 28.99 ± 5.70 μg/mL for CH, CR, and CGp, respectively and extracellular (< 15.625 μg/mL for CH, CR, CGp, and PT melanin production when tested against B16F10 mouse melanocytes. Results from the present study tend to show that EOs extracted from these medicinal plants can inhibit key enzymes and may be potential candidates for cosmetic and pharmaceutical industries.

  8. Aerosol typing - key information from aerosol studies

    Science.gov (United States)

    Mona, Lucia; Kahn, Ralph; Papagiannopoulos, Nikolaos; Holzer-Popp, Thomas; Pappalardo, Gelsomina

    2016-04-01

    Aerosol typing is a key source of aerosol information from ground-based and satellite-borne instruments. Depending on the specific measurement technique, aerosol typing can be used as input for retrievals or represents an output for other applications. Typically aerosol retrievals require some a priori or external aerosol type information. The accuracy of the derived aerosol products strongly depends on the reliability of these assumptions. Different sensors can make use of different aerosol type inputs. A critical review and harmonization of these procedures could significantly reduce related uncertainties. On the other hand, satellite measurements in recent years are providing valuable information about the global distribution of aerosol types, showing for example the main source regions and typical transport paths. Climatological studies of aerosol load at global and regional scales often rely on inferred aerosol type. There is still a high degree of inhomogeneity among satellite aerosol typing schemes, which makes the use different sensor datasets in a consistent way difficult. Knowledge of the 4d aerosol type distribution at these scales is essential for understanding the impact of different aerosol sources on climate, precipitation and air quality. All this information is needed for planning upcoming aerosol emissions policies. The exchange of expertise and the communication among satellite and ground-based measurement communities is fundamental for improving long-term dataset consistency, and for reducing aerosol type distribution uncertainties. Aerosol typing has been recognized as one of its high-priority activities of the AEROSAT (International Satellite Aerosol Science Network, http://aero-sat.org/) initiative. In the AEROSAT framework, a first critical review of aerosol typing procedures has been carried out. The review underlines the high heterogeneity in many aspects: approach, nomenclature, assumed number of components and parameters used for the

  9. Key Design Properties for Shipping Information Pipeline

    DEFF Research Database (Denmark)

    Jensen, Thomas; Tan, Yao-Hua

    2015-01-01

    on paper, e-mail, phone and text message, and far too costly. This paper explores the design properties for a shared information infrastructure to exchange information between all parties in the supply chain, commercial parties as well as authorities, which is called a Shipping Information Pipeline...

  10. INFORMATIONKEY FACTOR FOR CONSUMER SATISFACTION?

    Directory of Open Access Journals (Sweden)

    Maria-Lavinia POPESCU

    2010-12-01

    Full Text Available Starting with the XIX century, we assist at one growth of information importance as following of development of government forms more complexes, of concurrence intensification and of development of communications systems. This process has been increased in the lasts years by the development of telecommunications and of computers systems, by the globalization process and by the intensification of concurrence by educational market, by the exchange and circulation liberalization, by the growth of complexity education institutions. Jim Knight affirms that „the exchange is a present reality in the framework of this the educational institutions must to learn to operate or they assume the failure risk”21. The requests of higher education reform impose by the transition at Bologna system, impose at universities and faculties remarkable efforts by adaptation. With all the reform elements applied, the current educational marketing informational system used in Romania presents big deficiencies especial regarding the quality of information provide at managers and at of institution externs.

  11. Public information. Key issue paper no. 5

    International Nuclear Information System (INIS)

    Kyd, D.

    2000-01-01

    Nuclear power was welcomed from the outset because it promised highly economic and convenient energy, especially electricity. Even today, nuclear projects espoused by developing nations can stimulate enthusiasm and national pride. However, public unease concerning nuclear power safety was magnified by the accidents at Three Mile Island in 1979 and Chernobyl in 1986. The perceived problem of transport and long term storage of nuclear waste has added to public concerns, as has the risk of the possible proliferation of nuclear weapons. Public information strategies must recognize and seek to address these fears by pointing to the many cumulative years of trouble-free nuclear operations and by stressing the strict rules and oversight designed to protect workers and the public from accidents and radioactive releases. It is against this background that the following material has been compiled. It comes from a variety of sources and reflects the experience mainly of industrialized countries that have national nuclear programs. It is important to underline that it is descriptive rather than prescriptive in nature for two reasons: first, the IAEA is essentially a forum for pooling collective knowledge in this as in other fields; and secondly, the IAEA would not presume to offer a universal formula, since national circumstances vary according to specific political, demographic, social and other factors. Hence only certain parts of this paper may be of direct relevance to any given national situation. (author)

  12. Architectural Building A Public Key Infrastructure Integrated Information Space

    Directory of Open Access Journals (Sweden)

    Vadim Ivanovich Korolev

    2015-10-01

    Full Text Available The article keeps under consideration the mattersto apply the cryptographic system having a public key to provide information security and to implya digital signature. It performs the analysis of trust models at the formation of certificates and their use. The article describes the relationships between the trust model and the architecture public key infrastructure. It contains conclusions in respect of the options for building the public key infrastructure for integrated informationspace.

  13. Information Security Governanceas as Key Performance Indicator for Financial Institutions

    OpenAIRE

    Krjukovs, D; Strauss, R

    2009-01-01

    Due to their nature financial institutions and their performance are in constant focus of attention from different stakeholder groups. These groups according to their functions and interests are implementing different sets of key performance indicators for financial institution performance assessment. In the proposed paper authors present a hypothesis of information security governance being a financial institution key performance indicator. Authors provide high level overview of ...

  14. World Key Information Service System Designed For EPCOT Center

    Science.gov (United States)

    Kelsey, J. A.

    1984-03-01

    An advanced Bell Laboratories and Western Electric designed electronic information retrieval system utilizing the latest Information Age technologies, and a fiber optic transmission system is featured at the Walt Disney World Resort's newest theme park - The Experimental Prototype Community of Tomorrow (EPCOT Center). The project is an interactive audio, video and text information system that is deployed at key locations within the park. The touch sensitive terminals utilizing the ARIEL (Automatic Retrieval of Information Electronically) System is interconnected by a Western Electric designed and manufactured lightwave transmission system.

  15. Building Successful Information Systems – a Key for Successful Organization

    Directory of Open Access Journals (Sweden)

    Doina ROSCA

    2010-12-01

    Full Text Available Building Successful Information Systems – a Key for Successful OrganizationAbstract: An Information System (IS can have a major impact on corporate strategy and organizational success. The involvement of managers and decision makers in all aspects of information systems is a major factor for organizational success, including higher profits and lower costs. Some of the benefits business organization seek to achieve through information systems include: better safety, competitive advantage, fewer errors, greater accuracy, higher quality products, improved communications, increased efficiency and productivity, more efficient administration, superior financial and managerial decision making.

  16. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    Science.gov (United States)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  17. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    International Nuclear Information System (INIS)

    Kiktenko, Evgeniy O.

    2017-01-01

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.

  18. Information Systems Management: an Australian view of the key issues

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  19. Business intelligence key to success in the information age

    Directory of Open Access Journals (Sweden)

    Helmer Muñoz-Hernández

    2017-02-01

    Full Text Available This article aims to describe and classify in a more concrete way information systems, which are framed in what is properly called as "business intelligence". It begins analyzing each of the basic concepts and theoretical aspects and then detail in shaping transactional systems and the most important strategic systems including their benefits, their modes of use, and its disadvantages; It reflects on some cases actually exposed business globally, and the impact it has had the adoption of information systems in its corporate strategy as a key competitive advantages achieving considerable success. Finally, it concludes by describing the importance that has had the implementation of at least some of these information systems in strategic planning of organizations, especially in Colombia and Latin America.

  20. Predicting Key Events in the Popularity Evolution of Online Information.

    Science.gov (United States)

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  1. Predicting Key Events in the Popularity Evolution of Online Information.

    Directory of Open Access Journals (Sweden)

    Ying Hu

    Full Text Available The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  2. The core business web a guide to key information resources

    CERN Document Server

    White, Gary W

    2013-01-01

    The best Business Web sites at your fingertips—24/7! The Core Business Web: A Guide to Key Information Resources is an essential resource that saves you from spending hours searching through thousands of Web sites for the business information you need. A distinguished panel of authors, all active in business librarianship, explores Web sites in their subject areas, selecting the very best from 25 functional areas of business. Each site was chosen based on the timeliness, relevance and reliability of its content, the site's ease of navigation and use, and the authority of the site's author or publisher. The rapid growth of the Internet has resulted in an ever-increasing number of Web sites offering potentially useful business information. The Core Business Web identifies, evaluates, and summarizes the most significant sites, including gateways or portals, directories, and meta-sites, to organize online resources into easy-to-follow links that allow you to access information quickly. Sites are categorized and ...

  3. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    Science.gov (United States)

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  4. Information Systems Management: an Australasian view of key issues - 1996

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1997-11-01

    Full Text Available As part of a longitudinal study of key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by the IS executives as being important, problematic and critical over the next three to five years. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, communications, disaster recovery, strategic management issues (competitive advantage, IS planning, aligning the IS organisation, people management issues (organisational learning, educating senior management in IT, systems development and data management issues (effective use of the data resource, and end-user computing. This reflects the need for a balance of business, technical, and people skills in an IS executive. Non-critical issues were mostly related to systems development and the individual technologies which must be integrated and managed to ensure a responsive IT infrastructure. The study also reveals that some issues are much more important than problematic (disaster recovery, competitive advantage, information architecture, and IS alignment while others are much more problematic than important (end-user computing, IS role and contribution, and BPR. The former reflects a growing level of knowledge in handling these issues, while the latter reflects a continuing problem with them. The differences between this study and similar studies conducted in 1988 and 1992 show that there is a growing confidence in the IS executive's ability to manage the strategic issues, a continuing concern about providing a responsive IT infrastructure (especially communications, and a continuing concern with educating all 'customers' in the organisation in the effective use of IT, including senior management.

  5. The Efficacy of Key Performance Indicators in Ontario Universities as Perceived by Key Informants

    Science.gov (United States)

    Chan, Vivian

    2015-01-01

    The Ontario Ministry of Education and Training's Task Force on University Accountability first proposed key performance indicators (KPIs) for colleges and universities in Ontario in the early 1990s. The three main KPIs for Ontario universities are the rates of (1) graduation, (2) employment, and (3) Ontario Student Assistance Program loan default.…

  6. Key management schemes using routing information frames in secure wireless sensor networks

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  7. Network Information Management: The Key To Providing High WAN Availability.

    Science.gov (United States)

    Tysdal, Craig

    1996-01-01

    Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)

  8. Key drivers for informal project coordination among sub-contractors

    DEFF Research Database (Denmark)

    Aagaard, Annabeth; Eskerod, Pernille; Madsen, Erik Skov

    2015-01-01

    understandings. Still though, many sub-contractors choose not to coordinate informally. The purpose of this paper is to identify drivers that enhance or inhibits informal coordination in projects. A qualitative, explorative case study approach was applied. Fifteen SME sub-contractors within the offshore wind...... are massive. Six drivers which enhance informal coordination and three drivers which inhibit informal coordination among sub-contractors in projects were identified. The findings imply that management in project-oriented organizations can enhance informal coordination across project sub-contractors...... and by facilitating trust building, by emphasizing previous collaboration successes with the sub-contractors and the possibility of future common projects, by being explicit about expectations on informal coordination, and by developing sub-contractor contracts that are not as tight in economic terms, but instead...

  9. Information Secrecy And Public-Key Cryptography | Mekuria | Zede ...

    African Journals Online (AJOL)

    The subject and need of information secrecy with emphasis to the choice of fully using an already established public channel is to be discussed. Related histories and current achievements made in the area of information hiding, notable persons who changed the course of its progress from ancient times to this last ...

  10. Report: Improvements Needed in Key EPA Information System Security Practices

    Science.gov (United States)

    Report #10-P-0146, June 15, 2010. Williams Adley found that EPA program offices lacked evidence that they planned and executed tests of information system security controls as required by federal requirements.

  11. BRIDGING THE DIGITAL DIVIDE Information is key to success in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-10-25

    Oct 25, 2010 ... Information and communication technologies can increase productivity, ... role in bringing much-needed services such as education and health care to remote areas. ... Using technology to deliver quality education in Asia.

  12. Information Society and Knowledge Economy - Essence and Key Relationships

    Directory of Open Access Journals (Sweden)

    Rafał Żelazny

    2015-04-01

    Full Text Available This paper focuses on essence and relationships between information society (IS and knowledge economy (KE concepts. The aim of this article is twofold. The first objective is to denominate the conceptual framework and relationships between IS and KE conceptions. The second is to present dependencies between the indexes of IS and KE development level in selected countries. Firstly, based on the notional relations between information and knowledge, there are characterized the relationships between concepts of information society, knowledge economy and knowledge society (KS. Secondly, using popular composite indexes evaluating the degree of IS and KE development i.e. Networked Readiness Index (NRI, ICT Development Index (IDI, Knowledge Economy Index (KEI and Summary Innovation Index (SII, there were studied corelations between information society and knowledge economy in 34 selected countries in 2012. The paper concludes by stating limits and implications for further research. This work contributes to systematization and integration of knowledge about the mutually permeable conceptions of information society and knowledge economy

  13. Informing the educators: one of the keys to public acceptance

    International Nuclear Information System (INIS)

    Mattox, G.C.; Reynolds, A.B.; Brenizer, J.S.

    1986-01-01

    One of the most difficult barriers to overcome in the task of gaining greater public acceptance of nuclear power is the widespread lack of correct information about the true risks and benefits of nuclear energy. The news media are the most prevalent sources of information for the public but they are highly constrained by the limits of space, time, and reader/viewer interest span in being able to cover this complex subject with any degree of completeness, much less with any degree of accuracy. Another source of information for the general public is the educational system, and while it also has its limitations, they are somewhat different from those faced by the media, and the educational system is generally considered to be a more credible information source than the media. This paper report on three programs undertaken in 1985 and 1986 by the Virginia Section of the American Nuclear Society (ANS) in conjunction with the University of Virginia (UVA), the Virginia State Department of Education, and various nuclear industry participants. Each program had its unique features, successes, an failures. All-in-all, these programs have been reported as being quite successful in helping to reach the public through informing the educators

  14. Information on the Schacht Asse II. Key aspect concentration

    International Nuclear Information System (INIS)

    2016-01-01

    The information brochure on the Schacht Asse II covers the following issues: without the main mine fan the operation of Asse II would not be possible; the site selection for a final repository as a democratic challenge; the final radioactive waste disposal management in Germany, Asse, Morsleben and Konrad are rather close.

  15. The protection of possession

    Directory of Open Access Journals (Sweden)

    Popov Danica

    2011-01-01

    Full Text Available Protection in disputes for the protection of possession can be attained through the following actions a for dispossession (interdictum recuperande possessionis and b with an action for the disturbance of possession (interdictum retinendae possessionis. The general feature of these disputes is that there is only discussion on the facts and not a legal matters. Subject matter jurisdiction for the resolution of such disputes belongs to the court of general jurisdiction, while the dispute itself is a litigation. The special rule of proceedings of action for disturbance are: provisionality of the protection of possession; urgency in proceedings; initiation of the proceedings; limiting of objection; prescribing temporary measures; rendering a ruling in the form of order; appeals which may be filed within a short deadline and which does not have suspensive effect (do not delay the execution of the order; revision is not allowed etc.

  16. The Proteins API: accessing key integrated protein and genome information.

    Science.gov (United States)

    Nightingale, Andrew; Antunes, Ricardo; Alpi, Emanuele; Bursteinas, Borisas; Gonzales, Leonardo; Liu, Wudong; Luo, Jie; Qi, Guoying; Turner, Edd; Martin, Maria

    2017-07-03

    The Proteins API provides searching and programmatic access to protein and associated genomics data such as curated protein sequence positional annotations from UniProtKB, as well as mapped variation and proteomics data from large scale data sources (LSS). Using the coordinates service, researchers are able to retrieve the genomic sequence coordinates for proteins in UniProtKB. This, the LSS genomics and proteomics data for UniProt proteins is programmatically only available through this service. A Swagger UI has been implemented to provide documentation, an interface for users, with little or no programming experience, to 'talk' to the services to quickly and easily formulate queries with the services and obtain dynamically generated source code for popular programming languages, such as Java, Perl, Python and Ruby. Search results are returned as standard JSON, XML or GFF data objects. The Proteins API is a scalable, reliable, fast, easy to use RESTful services that provides a broad protein information resource for users to ask questions based upon their field of expertise and allowing them to gain an integrated overview of protein annotations available to aid their knowledge gain on proteins in biological processes. The Proteins API is available at (http://www.ebi.ac.uk/proteins/api/doc). © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  17. A Public-key based Information Management Model for Mobile Agents

    OpenAIRE

    Rodriguez, Diego; Sobrado, Igor

    2000-01-01

    Mobile code based computing requires development of protection schemes that allow digital signature and encryption of data collected by the agents in untrusted hosts. These algorithms could not rely on carrying encryption keys if these keys could be stolen or used to counterfeit data by hostile hosts and agents. As a consequence, both information and keys must be protected in a way that only authorized hosts, that is the host that provides information and the server that has sent the mobile a...

  18. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.

  19. Simple group password-based authenticated key agreements for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  20. Information security system based on virtual-optics imaging methodology and public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  1. E-Skill Information Acquisition Software: A Key to Poverty Alleviation ...

    African Journals Online (AJOL)

    E-Skill Information Acquisition Software: A Key to Poverty Alleviation Or Self Reliance. ... has not helped matters. This project is about developing an e-skill transfer using software. ... Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  2. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  3. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    Full Text Available Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  4. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    Science.gov (United States)

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  5. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  6. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  7. Virtual-optical information security system based on public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  8. Patron Banning in the Nightlife Entertainment Districts: A Key Informant Perspective.

    Science.gov (United States)

    Miller, Peter; Curtis, Ashlee; Palmer, Darren; Warren, Ian; McFarlane, Emma

    2016-07-01

    Alcohol-related harm in and around licensed venues is associated with substantial costs. Many interventions have been introduced in an effort to combat these harms, and one such intervention is known as patron banning. Patron banning involves prohibiting patrons who have been violent or disorderly in a licensed venue in an attempt to reduce alcohol-related harm. It can be implemented by the venue, by members of police, or by liquor accords. This study aimed to obtain key informant perspectives on the benefits of patron banning as well as on the effectiveness of patron banning in reducing alcohol-related harm. Thirty-six key informants provided perspectives on patron banning through in-depth interviews that were part of a larger study. Key informants were supportive of patron banning for reducing alcohol-related harm, noting that it had many benefits including increased venue safety, general risk management, and deterrence of antisocial behavior. Although processes for banning were not always consistent, identification scanners were generally recognized as a way to ensure that patron banning was enforced. Key informants viewed patron banning as an effective measure for increasing patron safety and reducing alcohol-related harms.

  9. Key concepts in MR spectroscopy and practical approaches to gaining biochemical information in children

    Energy Technology Data Exchange (ETDEWEB)

    Astrakas, Loukas G. [University of Ioannina, Medical Physics, Medical School, P.O. Box 1186, Ioannina (Greece); Argyropoulou, Maria I. [University of Ioannina, Radiology, Medical School, Ioannina (Greece)

    2016-06-15

    Magnetic resonance spectroscopy (MRS) provides independent biochemical information and has become an invaluable adjunct to MRI and other imaging modalities. This review introduces key concepts and presents basic methodological steps regarding the acquisition and the interpretation of proton MRS. We review major brain metabolites and discuss MRS dependence on age, location, echo time and field strength. (orig.)

  10. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  11. The construction of a public key infrastructure for healthcare information networks in Japan.

    Science.gov (United States)

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  12. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.

    Science.gov (United States)

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.

  13. Information analysis of iris biometrics for the needs of cryptology key extraction

    Directory of Open Access Journals (Sweden)

    Adamović Saša

    2013-01-01

    Full Text Available The paper presents a rigorous analysis of iris biometric information for the synthesis of an optimized system for the extraction of a high quality cryptology key. Estimations of local entropy and mutual information were identified as segments of the iris most suitable for this purpose. In order to optimize parameters, corresponding wavelets were transformed, in order to obtain the highest possible entropy and mutual information lower in the transformation domain, which set frameworks for the synthesis of systems for the extraction of truly random sequences of iris biometrics, without compromising authentication properties. [Projekat Ministarstva nauke Republike Srbije, br. TR32054 i br. III44006

  14. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    of Acronyms and Abbreviations AE authenticated encryption AWS Amazon Web Services CIO Chief Information Officer DISA Defense Information Systems Agency...the number of possible challenges, H be a cryptographic hash function, AE be an authenticated encryption scheme, f be a keyed pseudo-random function...key kenc R←− Kenc for symmetric encryption scheme Enc, and a random HMAC key kmac R←− Kmac. The secret key is sk = 〈kenc, kmac〉 and public key is pk

  15. Strategies for Supporting Physician-Scientists in Faculty Roles: A Narrative Review With Key Informant Consultations.

    Science.gov (United States)

    Lingard, Lorelei; Zhang, Peter; Strong, Michael; Steele, Margaret; Yoo, John; Lewis, James

    2017-10-01

    Physician-scientists are a population in decline globally. Solutions to reverse this decline often have focused on the training pipeline. Less attention has been paid to reducing attrition post training, when physician-scientists take up faculty roles. However, this period is a known time of vulnerability because of the pressures of clinical duties and the long timeline to securing independent research funding. This narrative review explored existing knowledge regarding how best to support physician-scientists for success in their faculty roles. The authors searched the Medline, Embase, ERIC, and Cochrane Library databases for articles published from 2000 to 2016 on this topic and interviewed key informants in 2015 to solicit their input on the review results. The authors reviewed 78 articles and interviewed 16 key informants. From the literature, they developed a framework of organizational (facilitate mentorship, foster community, value the physician-scientist role, minimize financial barriers) and individual (develop professional and research skills) strategies for supporting physician-scientists. They also outlined key knowledge gaps representing topics either rarely or never addressed in the reviewed articles (percent research time, structural hypocrisy, objective assessment, group metrics, professional identity). The key informants confirmed the identified strategies and discussed how the gaps were particularly important and impactful. This framework offers a basis for assessing an organization's existing support strategies, identifying outstanding needs, and developing targeted programming. The identified gaps require attention, as they threaten to undermine the benefits of existing support strategies.

  16. Graduate Curriculum for Biological Information Specialists: A Key to Integration of Scale in Biology

    Directory of Open Access Journals (Sweden)

    Carole L. Palmer

    2007-12-01

    Full Text Available Scientific data problems do not stand in isolation. They are part of a larger set of challenges associated with the escalation of scientific information and changes in scholarly communication in the digital environment. Biologists in particular are generating enormous sets of data at a high rate, and new discoveries in the biological sciences will increasingly depend on the integration of data across multiple scales. This work will require new kinds of information expertise in key areas. To build this professional capacity we have developed two complementary educational programs: a Biological Information Specialist (BIS masters degree and a concentration in Data Curation (DC. We believe that BISs will be central in the development of cyberinfrastructure and information services needed to facilitate interdisciplinary and multi-scale science. Here we present three sample cases from our current research projects to illustrate areas in which we expect information specialists to make important contributions to biological research practice.

  17. COST ACCOUNTING AS THE KEY INFORMATION CORE OF THE COMPANY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Radmila Jablan STEFANOVIĆ

    2010-12-01

    Full Text Available The management is expected to lead the company towards the achievement of set objectives which, in the contemporary settings of marked external and internal complexity, inevitably requires sophisticated expert knowledge and skills, as well as quality information support. Cost accounting generates cost and performance information with the goal of qualitatively meeting information needs of, above all, internal users. It represents the essential part of the company’s accounting information system as a whole and it is often stressed as the key information core and a reliable information support for the company’s management in performing their managerial activities. The contemporary business environment inevitably requires the restructuring of cost accounting and new approaches to costing and cost management, in the attempt to improve the quality of cost information that has always been the object of particular interest. Moreover, only a flexibly designed cost accounting information system can qualitatively respond to the increasingly numerous and various information requirements. In this paper we discuss the role cost accounting has in offering adequate information support to managers at all managerial levels. We emphasize some of the new tools, techniques, concepts and approaches to costing and cost management

  18. Characteristics of evolving models of care for arthritis: A key informant study

    Directory of Open Access Journals (Sweden)

    Veinot Paula

    2008-07-01

    Full Text Available Abstract Background The burden of arthritis is increasing in the face of diminishing health human resources to deliver care. In response, innovative models of care delivery are developing to facilitate access to quality care. Most models have developed in response to local needs with limited evaluation. The primary objective of this study is to a examine the range of models of care that deliver specialist services using a medical/surgical specialist and at least one other health care provider and b document the strengths and challenges of the identified models. A secondary objective is to identify key elements of best practice models of care for arthritis. Methods Semi-structured interviews were conducted with a sample of key informants with expertise in arthritis from jurisdictions with primarily publicly-funded health care systems. Qualitative data were analyzed using a constant comparative approach to identify common types of models of care, strengths and challenges of models, and key components of arthritis care. Results Seventy-four key informants were interviewed from six countries. Five main types of models of care emerged. 1 Specialized arthritis programs deliver comprehensive, multidisciplinary team care for arthritis. Two models were identified using health care providers (e.g. nurses or physiotherapists in expanded clinical roles: 2 triage of patients with musculoskeletal conditions to the appropriate services including specialists; and 3 ongoing management in collaboration with a specialist. Two models promoting rural access were 4 rural consultation support and 5 telemedicine. Key informants described important components of models of care including knowledgeable health professionals and patients. Conclusion A range of models of care for arthritis have been developed. This classification can be used as a framework for discussing care delivery. Areas for development include integration of care across the continuum, including primary

  19. AIS as key component in modern vessel traffic management and information systems

    Energy Technology Data Exchange (ETDEWEB)

    Lamers, W. [DaimlerChrysler Aerospace AG (DASA), Ulm (Germany)

    1999-07-01

    The objective of this paper is to provide information in respect to universal shipborne identification system (UAIS) as main sensor in various vessel traffic applications. The presented paper will give general information concerning AIS functionality and the standardisation process. Based on experience from recent projects and various IALA working group activities, a typical future VTMIS architectures is also presented being based on AIS as key sensor. The required key performance of AIS associated with the HW components will be described. The results from European technology study Indris are presented and discussed. Finally, a summary and conclusion from the presented material will complete the technical paper. The elaboration of this presentation has been carried out as a joint task between Mr. Andre van Berg, MDS Suedafrika und Mr. Walter Lamers, DASA Ulm. (orig.)

  20. Some Key Technologies of Geospatial Information System for China Water Census

    Directory of Open Access Journals (Sweden)

    CAI Yang

    2015-05-01

    Full Text Available We have pioneered research on geospatial information system for national water census and its application. Aiming to the main issues such as information obtaining, data management, quality control, and project organization, the overall thought is given. It is based on taking fundamental data as supporting and data model as precursor, and viewing intelligent tool as protective role, and combing the management theory with technical methods. The key techniques developed include the digital basin extraction, data modeling orienting to the object of water resources, data acquisition and processing within certain rules and the application of multidimensional theme.

  1. Stakeholder engagement: a key component of integrating genomic information into electronic health records.

    Science.gov (United States)

    Hartzler, Andrea; McCarty, Catherine A; Rasmussen, Luke V; Williams, Marc S; Brilliant, Murray; Bowton, Erica A; Clayton, Ellen Wright; Faucett, William A; Ferryman, Kadija; Field, Julie R; Fullerton, Stephanie M; Horowitz, Carol R; Koenig, Barbara A; McCormick, Jennifer B; Ralston, James D; Sanderson, Saskia C; Smith, Maureen E; Trinidad, Susan Brown

    2013-10-01

    Integrating genomic information into clinical care and the electronic health record can facilitate personalized medicine through genetically guided clinical decision support. Stakeholder involvement is critical to the success of these implementation efforts. Prior work on implementation of clinical information systems provides broad guidance to inform effective engagement strategies. We add to this evidence-based recommendations that are specific to issues at the intersection of genomics and the electronic health record. We describe stakeholder engagement strategies employed by the Electronic Medical Records and Genomics Network, a national consortium of US research institutions funded by the National Human Genome Research Institute to develop, disseminate, and apply approaches that combine genomic and electronic health record data. Through select examples drawn from sites of the Electronic Medical Records and Genomics Network, we illustrate a continuum of engagement strategies to inform genomic integration into commercial and homegrown electronic health records across a range of health-care settings. We frame engagement as activities to consult, involve, and partner with key stakeholder groups throughout specific phases of health information technology implementation. Our aim is to provide insights into engagement strategies to guide genomic integration based on our unique network experiences and lessons learned within the broader context of implementation research in biomedical informatics. On the basis of our collective experience, we describe key stakeholder practices, challenges, and considerations for successful genomic integration to support personalized medicine.

  2. ASSESSMENT OF THE VOLUNTEERED GEOGRAPHIC INFORMATION FEEDBACK SYSTEM FOR THE DUTCH TOPOGRAPHICAL KEY REGISTER

    Directory of Open Access Journals (Sweden)

    M. Grus

    2015-08-01

    Full Text Available Since Topographical Key Register has become an open data the amount of users increased enormously. The highest grow was in the private users group. The increasing number of users and their growing demand for high actuality of the topographic data sets motivates the Dutch Kadaster to innovate and improve the Topographical Key Register (BRT. One of the initiatives was to provide a voluntary geographical information project aiming at providing a user-friendly feedback system adjusted to all kinds of user groups. The feedback system is a compulsory element of the Topographical Key Register in the Netherlands. The Dutch Kadaster is obliged to deliver a feedback system and the key-users are obliged to use it. The aim of the feedback system is to improve the quality and stimulate the usage of the data. The results of the pilot shows that the user-friendly and open to everyone feedback system contributes enormously to improve the quality of the topographic dataset.

  3. Participation rate or informed choice? Rethinking the European key performance indicators for mammography screening.

    Science.gov (United States)

    Strech, Daniel

    2014-03-01

    Despite the intensive controversies about the likelihood of benefits and harms of mammography screening almost all experts conclude that the choice to screen or not to screen needs to be made by the individual patient who is adequately informed. However, the "European guideline for quality assurance in breast cancer screening and diagnosis" specifies a participation rate of 70% as the key performance indicator for mammography screening. This paper argues that neither the existing evidence on benefits and harms, nor survey research with women, nor compliance rates in clinical trials, nor cost-effectiveness ratios justify participation rates as a reasonable performance indicator for preference-sensitive condition such as mammography screening. In contrast, an informed choice rate would be more reasonable. Further research needs to address the practical challenges in assessing informed choice rates. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  4. High-level radioactive waste disposal: Key geochemical issues and information needs for site characterization

    International Nuclear Information System (INIS)

    Brooks, D.J.; Bembia, P.J.; Bradbury, J.W.; Jackson, K.C.; Kelly, W.R.; Kovach, L.A.; Mo, T.; Tesoriero, J.A.

    1986-01-01

    Geochemistry plays a key role in determining the potential of a high-level radioactive waste disposal site for long-term radionuclide containment and isolation. The Nuclear Regulatory Commission (NRC) has developed a set of issues and information needs important for characterizing geochemistry at the potential sites being investigated by the Department of Energy Basalt Waste Isolation Project, Nevada Nuclear Waste Storage Investigations project, and Salt Repository Project. The NRC site issues and information needs consider (1) the geochemical environment of the repository, (2) changes to the initial geochemical environment caused by construction and waste emplacement, and (3) interactions that affect the transport of waste radionuclides to the accessible environment. The development of these issues and information needs supports the ongoing effort of the NRC to identify and address areas of geochemical data uncertainty during prelicensing interactions

  5. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  6. Understanding Price Elasticities to Inform Public Health Research and Intervention Studies: Key Issues

    Science.gov (United States)

    Nghiem, Nhung; Genç, Murat; Blakely, Tony

    2013-01-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies. PMID:24028228

  7. Understanding price elasticities to inform public health research and intervention studies: key issues.

    Science.gov (United States)

    Nghiem, Nhung; Wilson, Nick; Genç, Murat; Blakely, Tony

    2013-11-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies.

  8. Possession divestment by sales in later life.

    Science.gov (United States)

    Ekerdt, David J; Addington, Aislinn

    2015-08-01

    Residential relocation in later life is almost always a downsizing, with many possessions to be divested in a short period of time. This article examines older movers' capacities for selling things, and ways that selling attenuates people's ties to those things, thus accomplishing the human dis-possession of the material convoy. In qualitative interviews in 79 households in the Midwestern United States, older adults reported their experience with possession sales associated with residential relocation. Among this group, three-quarters of the households downsized by selling some belongings. Informal sales seemed the least fraught of all strategies, estate sales had mixed reviews, and garage sales were recalled as laborious. Sellers' efforts were eased by social relations and social networks as helpers and buyers came forward. As selling proceeded, sentiment about possessions waned as their materiality and economic value came to the fore, easing their detachment from the household. Possession selling is challenging because older adults are limited in the knowledge, skills, and efforts that they can apply to the recommodification of their belongings. Selling can nonetheless be encouraged as a divestment strategy as long as the frustrations and drawbacks are transparent, and the goal of ridding is kept in view. Copyright © 2015 Elsevier Inc. All rights reserved.

  9. Information processing in bacteria: memory, computation, and statistical physics: a key issues review

    International Nuclear Information System (INIS)

    Lan, Ganhui; Tu, Yuhai

    2016-01-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  10. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  11. Information as a key-element for the development and dissemination of bioenergy in Austria

    International Nuclear Information System (INIS)

    Schmidt, J.

    1999-01-01

    As one of the renewable energy sources which have to be developed to replace of CO 2 -intensive energy technologies the utilization of bio-energy has a lot of advantages: it is CO 2 - neutral; it is not dependent on imports and improves security of supply; has enormous potential of job creation for rural areas, in small and medium size enterprises; has an enormous market potential; biomass is a by-product in many industrial processes and its using would solve also the waste problem; biomass is an infinite energy source. Predominant market of the biomass for Europe is that for low temperature heating. Being underestimated this market is not attractive for high tech development and research perhaps because of the difficulties for collecting statistical data. Technologies vary from low efficient logwood boilers to sophisticated district heating plants. The strategy of the European Commission, referring to the White Paper, proposes to install 1mill sophisticated biomass heating systems in Europe till 2003. The low temperature heating market will be the most important for future information programmes and projects. For launching of biomass technologies onto a market it is necessary to inform the customer about it and the way to get it. The distribution systems have to rely on multipurpose equipment i.g. for different kind of bio-fuel. The information has to target the advantages of bio-energy fuels compared to the competing carriers like natural gas and oil. These advantages define the market niche. The information strategies include establishing of national and international networks and collaboration with other renewable energy sources associations and with the agricultural sector. The information related projects of the Austrian Biomass Association include: issuing a magazine, information campaigns, conferences, issuing of teaching materials for schools, information brochures and training programmes for plumbers so to be key-agents in the dissemination of small

  12. Information processing in bacteria: memory, computation, and statistical physics: a key issues review

    Science.gov (United States)

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  13. Information processing in bacteria: memory, computation, and statistical physics: a key issues review.

    Science.gov (United States)

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  14. Childhood disability in Malawi: a population based assessment using the key informant method.

    Science.gov (United States)

    Tataryn, Myroslava; Polack, Sarah; Chokotho, Linda; Mulwafu, Wakisa; Kayange, Petros; Banks, Lena Morgon; Noe, Christiane; Lavy, Chris; Kuper, Hannah

    2017-11-28

    Epidemiological data on childhood disability are lacking in Low and Middle Income countries (LMICs) such as Malawi, hampering effective service planning and advocacy. The Key Informant Method (KIM) is an innovative, cost-effective method for generating population data on the prevalence and causes of impairment in children. The aim of this study was to use the Key Informant Method to estimate the prevalence of moderate/severe, hearing, vision and physical impairments, intellectual impairments and epilepsy in children in two districts in Malawi and to estimate the associated need for rehabilitation and other services. Five hundred key informants (KIs) were trained to identify children in their communities who may have the impairment types included in this study. Identified children were invited to attend a screening camp where they underwent assessment by medical professionals for moderate/severe hearing, vision and physical impairments, intellectual impairments and epilepsy. Approximately 15,000 children were identified by KIs as potentially having an impairment of whom 7220 (48%) attended a screening camp. The estimated prevalence of impairments/epilepsy was 17.3/1000 children (95% CI: 16.9-17.7). Physical impairment (39%) was the commonest impairment type followed by hearing impairment (27%), intellectual impairment (26%), epilepsy (22%) and vision impairment (4%). Approximately 2100 children per million population could benefit from physiotherapy and occupational therapy and 300 per million are in need of a wheelchair. An estimated 1800 children per million population have hearing impairment caused by conditions that could be prevented or treated through basic primary ear care. Corneal opacity was the leading cause of vision impairment. Only 50% of children with suspected epilepsy were receiving medication. The majority (73%) of children were attending school, but attendance varied by impairment type and was lowest among children with multiple impairments (38

  15. A CEO View of Key Issues in Australian Information Systems Management - 1997

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1998-05-01

    Full Text Available As part of a research programme on key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by their chief executive officers (CEOs as being important, problematic and critical over the next three to five years. The results reported are based on a relatively low response rate (though perhaps reasonable for the target group so should be regarded as only exploratory. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, disaster recovery, strategic management issues (BPR, competitive advantage, information architecture, people management issues (organisational learning, systems development and data management issues (effective use of the data resource, effectiveness/productivity of IS, effectiveness of software development, and their own support systems (EIS/DSS. This reflects their interest in a wide range of issues, but all with an organisation-wide focus. Non-critical issues were mostly related to the individual technologies and the place and role of IS in the organisation. While the CEOs showed some agreement with their chief information officers (CIOs on issues such as the IT infrastructure, competitive advantage, and organisational learning some distinct differences exist, particularly in relation to the quality and effectiveness of systems and processes and also how CEOs and CIOs perceive each other.

  16. Information-theoretic security proof for quantum-key-distribution protocols

    International Nuclear Information System (INIS)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-01-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel

  17. Key performance indicators to benchmark hospital information systems - a delphi study.

    Science.gov (United States)

    Hübner-Bloder, G; Ammenwerth, E

    2009-01-01

    To identify the key performance indicators for hospital information systems (HIS) that can be used for HIS benchmarking. A Delphi survey with one qualitative and two quantitative rounds. Forty-four HIS experts from health care IT practice and academia participated in all three rounds. Seventy-seven performance indicators were identified and organized into eight categories: technical quality, software quality, architecture and interface quality, IT vendor quality, IT support and IT department quality, workflow support quality, IT outcome quality, and IT costs. The highest ranked indicators are related to clinical workflow support and user satisfaction. Isolated technical indicators or cost indicators were not seen as useful. The experts favored an interdisciplinary group of all the stakeholders, led by hospital management, to conduct the HIS benchmarking. They proposed benchmarking activities both in regular (annual) intervals as well as at defined events (for example after IT introduction). Most of the experts stated that in their institutions no HIS benchmarking activities are being performed at the moment. In the context of IT governance, IT benchmarking is gaining importance in the healthcare area. The found indicators reflect the view of health care IT professionals and researchers. Research is needed to further validate and operationalize key performance indicators, to provide an IT benchmarking framework, and to provide open repositories for a comparison of the HIS benchmarks of different hospitals.

  18. An improved authenticated key agreement protocol for telecare medicine information system.

    Science.gov (United States)

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  19. ADDRESSING VIEWS OF KEY INFORMANTS WHO ARE WORKING FOR WOMEN RIGHTS REGARDING INTIMATE PARTNER VIOLENCE

    Directory of Open Access Journals (Sweden)

    Nan Kyi Pyar Si

    2017-10-01

    Full Text Available Some married women are experiencing different types of intimate partner violence by their current or former husband. However, the awareness and services for those women are still needed. This study explored the key informants’ perspectives to provide more comprehensive services to those women. Qualitative feminist method was used and five participants were purposefully selected to interview in depth. Key informants reflected upon intimate partner violence as causes of intimate partner violence, why intimate partner violence cases were underreported, why didn’t women leave their violent partner, what they actually felt for intimate partner violence, gaps with intervention for survivors and planning for better outcome. It was found that awareness among women who experiencing violence and the people around them needed to be raised. And services provided for them also needed to be more concise and updated. Therefore, it is essentially important to extend education session to all people regarding violence against women. Collaboration and cooperation of government and non-governmental organizations is also helpful to decrease various kinds of violence committed to women.

  20. Information-theoretic security proof for quantum-key-distribution protocols

    Science.gov (United States)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-07-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  1. Individual ball possession in soccer.

    Directory of Open Access Journals (Sweden)

    Daniel Link

    Full Text Available This paper describes models for detecting individual and team ball possession in soccer based on position data. The types of ball possession are classified as Individual Ball Possession (IBC, Individual Ball Action (IBA, Individual Ball Control (IBC, Team Ball Possession (TBP, Team Ball Control (TBC und Team Playmaking (TPM according to different starting points and endpoints and the type of ball control involved. The machine learning approach used is able to determine how long the ball spends in the sphere of influence of a player based on the distance between the players and the ball together with their direction of motion, speed and the acceleration of the ball. The degree of ball control exhibited during this phase is classified based on the spatio-temporal configuration of the player controlling the ball, the ball itself and opposing players using a Bayesian network. The evaluation and application of this approach uses data from 60 matches in the German Bundesliga season of 2013/14, including 69,667 IBA intervals. The identification rate was F = .88 for IBA and F = .83 for IBP, and the classification rate for IBC was κ = .67. Match analysis showed the following mean values per match: TBP 56:04 ± 5:12 min, TPM 50:01 ± 7:05 min and TBC 17:49 ± 8:13 min. There were 836 ± 424 IBC intervals per match and their number was significantly reduced by -5.1% from the 1st to 2nd half. The analysis of ball possession at the player level indicates shortest accumulated IBC times for the central forwards (0:49 ± 0:43 min and the longest for goalkeepers (1:38 ± 0:58 min, central defenders (1:38 ± 1:09 min and central midfielders (1:27 ± 1:08 min. The results could improve performance analysis in soccer, help to detect match events automatically, and allow discernment of higher value tactical structures, which is based on individual ball possession.

  2. A novel authentication scheme using self-certified public keys for telecare medical information systems.

    Science.gov (United States)

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-06-01

    Telecare medical information systems (TMIS), with the explosive growth of communication technology and physiological monitoring devices, are applied increasingly to enable and support healthcare delivery services. In order to safeguard patients' privacy and tackle the illegal access, authentication schemes for TMIS have been investigated and designed by many researchers. Many of them are promising for adoption in practice, nevertheless, they still have security flaws. In this paper, we propose a novel remote authentication scheme for TMIS using self-certified public keys, which is formally secure in the ID-mBJM model. Besides, the proposed scheme has better computational efficiency. Compared to the related schemes, our protocol is more practical for telemedicine system.

  3. Multiple Information Fusion Face Recognition Using Key Feature Points

    Directory of Open Access Journals (Sweden)

    LIN Kezheng

    2017-06-01

    Full Text Available After years of face recognition research,due to the effect of illumination,noise and other conditions have led to the recognition rate is relatively low,2 d face recognition technology has couldn’t keep up with the pace of The Times the forefront,Although 3 d face recognition technology is developing step by step,but it has a higher complexity. In order to solve this problem,based on the traditional depth information positioning method and local characteristic analysis methods LFA,puts forward an improved 3 d face key feature points localization algorithm, and on the basis of the trained sample which obtained by complete cluster,further put forward the global and local feature extraction algorithm of weighted fusion. Through FRGC and BU-3DFE experiment data comparison and analysis of the two face library,the method in terms of 3 d face recognition effect has a higher robustness.

  4. Possibilities and Expectations for mHealth in the Pacific Islands: Insights From Key Informants.

    Science.gov (United States)

    Umali, Elaine; McCool, Judith; Whittaker, Robyn

    2016-01-20

    The increase in mobile phone use across the globe is creating mounting interest for its application in addressing health system constraints. Although still limited, there is growing evidence of success in using mobile phones for health (mHealth) in low- and middle- income countries. The promise of mHealth to address key health system issues presents a huge potential for the Pacific Island countries where mobile use has radically increased. Current projections indicate an improved information and communications technology (ICT) environment to support greater access to mobile and digital devices in the Pacific region. The objective of the study was to explore key stakeholder perspectives on the potential for mHealth in the Pacific region. A series of in-depth interviews were conducted either face-to-face, via Skype or by email, with a series of key informants from the Pacific Rim region. Interviews were audio-recorded and later transcribed for detailed thematic analysis. We found widespread support for the potential to use mobile phones as a mechanism to facilitate improved health service delivery in the region. Essential elements for the successful development and implementation of mHealth were identified by these stakeholders. These included: developing an understanding of the local context and the problems that may be usefully addressed by the addition of mHealth to existing strategies and services; consideration of local infrastructure, capability, policy, mobile literacy and engagement; learning from others, particularly other low- and middle-income countries (LMICs); the importance of building supportive environments and of evaluation to provide evidence of impact and total cost. The rapid growth of mobile phone use in the region presents a unique juxtaposition of opportunity and promise. Though the region lags behind other LMICs in the adoption of mHealth technologies, this offers the convenience of learning from past mHealth interventions and applying these

  5. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    Science.gov (United States)

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  6. POSSESSION VERSUS POSITION: STRATEGIC EVALUATION IN AFL

    Directory of Open Access Journals (Sweden)

    Darren M. O'Shaughnessy

    2006-12-01

    Full Text Available In sports like Australian Rules football and soccer, teams must battle to achieve possession of the ball in sufficient space to make optimal use of it. Ultimately the teams need to score, and to do that the ball must be brought into the area in front of goal - the place where the defence usually concentrates on shutting down space and opportunity time. Coaches would like to quantify the trade-offs between contested play in good positions and uncontested play in less promising positions, in order to inform their decision-making about where to put their players, and when to gamble on sending the ball to a contest rather than simply maintain possession. To evaluate football strategies, Champion Data has collected the on-ground locations of all 350,000 possessions and stoppages in the past two seasons of AFL (2004, 2005. By following each chain of play through to the next score, we can now reliably estimate the scoreboard "equity" of possessing the ball at any location, and measure the effect of having sufficient time to dispose of it effectively. As expected, winning the ball under physical pressure (through a "hard ball get" is far more difficult to convert into a score than winning it via a mark. We also analyse some equity gradients to show how getting the ball 20 metres closer to goal is much more important in certain areas of the ground than in others. We conclude by looking at the choices faced by players in possession wanting to maximise their likelihood of success

  7. Extracting key information from historical data to quantify the transmission dynamics of smallpox

    Directory of Open Access Journals (Sweden)

    Brockmann Stefan O

    2008-08-01

    Full Text Available Abstract Background Quantification of the transmission dynamics of smallpox is crucial for optimizing intervention strategies in the event of a bioterrorist attack. This article reviews basic methods and findings in mathematical and statistical studies of smallpox which estimate key transmission parameters from historical data. Main findings First, critically important aspects in extracting key information from historical data are briefly summarized. We mention different sources of heterogeneity and potential pitfalls in utilizing historical records. Second, we discuss how smallpox spreads in the absence of interventions and how the optimal timing of quarantine and isolation measures can be determined. Case studies demonstrate the following. (1 The upper confidence limit of the 99th percentile of the incubation period is 22.2 days, suggesting that quarantine should last 23 days. (2 The highest frequency (61.8% of secondary transmissions occurs 3–5 days after onset of fever so that infected individuals should be isolated before the appearance of rash. (3 The U-shaped age-specific case fatality implies a vulnerability of infants and elderly among non-immune individuals. Estimates of the transmission potential are subsequently reviewed, followed by an assessment of vaccination effects and of the expected effectiveness of interventions. Conclusion Current debates on bio-terrorism preparedness indicate that public health decision making must account for the complex interplay and balance between vaccination strategies and other public health measures (e.g. case isolation and contact tracing taking into account the frequency of adverse events to vaccination. In this review, we summarize what has already been clarified and point out needs to analyze previous smallpox outbreaks systematically.

  8. [Application of laboratory information system in the management of the key indicators of quality inspection].

    Science.gov (United States)

    Guo, Ye; Chen, Qian; Wu, Wei; Cui, Wei

    2015-03-31

    To establish a system of monitoring the key indicator of quality for inspection (KIQI) on a laboratory information system (LIS), and to have a better management of KIQI. Clinical sample made in PUMCH were collected during the whole of 2014. Next, interactive input program were designed to accomplish data collecting of the disqualification rate of samples, the mistake rate of samples and the occasions of losing samples, etc. Then, a series moment of sample collection, laboratory sample arrived, sample test, sample check, response to critical value, namely, trajectory information left on LIS were recorded and the qualification rate of TAT, the notification rate of endangering result were calculated. Finally, the information about quality control were collected to build an internal quality control database and the KIQI, such as the out-of-control rate of quality control and the total error of test items were monitored. The inspection of the sample management shows the disqualification rates in 2014 were all below the target, but the rates in January and February were a little high and the rates of four wards were above 2%. The mistake rates of samples was 0.47 cases/10 000 cases, attaining the target (laboratory reports shows the qualification rates of TAT was within the acceptable range (> 95%), however the rates of blood routine in November (94.75%) was out of range. We have solved the problem by optimizing the processes. The notification rate of endangering result attained the target (≥ 98%), while the rate of timely notification is needed to improve. Quality inspection shows the CV of APTT in August (5.02%) was rising significantly, beyond the accepted CV (5.0%). We have solved the problem by changing the reagent. The CV of TT in 2014 were all below the allowable CV, thus the allowable CV of the next year lower to 10%. It is an objective and effective method to manage KIQI with the powerful management mode of database and information process capability on LIS.

  9. Phase II Practice-based Evidence in Nutrition (PEN) evaluation: interviews with key informants.

    Science.gov (United States)

    Bowden, Fran Martin; Lordly, Daphne; Thirsk, Jayne; Corby, Lynda

    2012-01-01

    Dietitians of Canada has collaborated with experts in knowledge translation and transfer, technology, and dietetic practice to develop and implement an innovative online decision-support system called Practice-based Evidence in Nutrition (PEN). A study was conducted to evaluate the perceived facilitators and barriers that enable dietitians to use or prevent them from using PEN. As part of the overall evaluation framework of PEN, a qualitative descriptive research design was used to address the research purpose. Individual, semi-structured telephone interviews with 17 key informants were completed, and the interview transcripts underwent qualitative content analysis. Respondents identified several facilitators of and barriers to PEN use. Facilitators included specificity to dietetics, rigorous/expert review, easy accessibility, current content, credible/secure material, well-organized/easy-to-use material, material that is valuable to practice, and good value for money. Barriers included perceived high cost, fee structuring/cost to students, certain organizational aspects, and a perceived lack of training for pathway contributors. This formative evaluation has indicated areas in which PEN could be improved and strategies to make PEN the standard for dietetic education and practice. Ensuring that PEN is meeting users' knowledge needs is of the utmost importance if dietitians are to remain on the cutting edge of scientific inquiry.

  10. Roles and responsibilities of pharmacists with respect to natural health products: key informant interviews.

    Science.gov (United States)

    Olatunde, Shade; Boon, Heather; Hirschkorn, Kristine; Welsh, Sandy; Bajcar, Jana

    2010-03-01

    Although many pharmacies sell natural health products (NHPs), there is no clear definition as to the roles and responsibilities (if any) of pharmacists with respect to these products. The purpose of this study was to explore pharmacy and stakeholder leaders' perceptions of pharmacists' professional NHP roles and responsibilities. Semi-structured key informant interviews were conducted with pharmacy leaders (n=17) and stakeholder (n=18) leaders representing consumers, complementary and alternative medicine practitioners, conventional health care practitioners, and industry across Canada. All participants believed a main NHP responsibility for pharmacists was in safety monitoring, although a one challenge identified in the interviews was pharmacists' general lack of NHP knowledge; however, stakeholder leaders did not expect pharmacists to be experts, but should have a basic level of knowledge about NHPs. Participants described pharmacists' professional roles and responsibilities for NHPs as similar to those for over-the-counter drugs; more awareness of existing NHP-related pharmacy policies is needed, and pharmacy owners/managers should provide additional training to ensure front-line pharmacists have appropriate knowledge of NHPs sold in the pharmacy. Copyright 2010 Elsevier Inc. All rights reserved.

  11. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates

    DEFF Research Database (Denmark)

    Dellson, P; Nilbert, M; Bendahl, P-O

    2011-01-01

    for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about......Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used...... the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials....

  12. Access to Opportunities for Bilingualism for Individuals with Developmental Disabilities: Key Informant Interviews.

    Science.gov (United States)

    de Valenzuela, Julia Scherba; Bird, Elizabeth Kay-Raining; Parkington, Karisa; Mirenda, Pat; Cain, Kate; MacLeod, Andrea A N; Segers, Eliane

    The purpose of this article is to describe the results of a thematic analysis of 79 semi-structured interviews collected at six research sites in four countries in relation to the inclusion and exclusion of students with developmental disabilities (DD) in and from special education and bilingual opportunities. The participants were individuals with expertise either in special needs and/or language education to support bilingualism (e.g., second language (L2) instruction), who served as key informants about service delivery and/or policy in these areas. Six themes emerged as salient during the analysis: we include all kids, special needs drives it, time/scheduling conflicts, IEP/IPP/statement drives it, it's up to the parents, and service availability. The results suggested that access to language programs and services is limited for children with DD, even though participants at all sites reported adherence to a philosophy of inclusion. A priority on special education services over language services was identified, as well as barriers to providing children with DD access to programs and services to support bilingual development. Some of these barriers included time and scheduling conflicts and limited service availability. Additionally, the role of parents in decision making was affirmed, although, in contrast to special education services, decision-making about participation or exemption from language programs was typically left up to the parents. Overall, the results suggest a need for greater attention to providing supports for both first (L1) and L2 language development for bilingual children with DD and greater access to available language programs. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. Measuring Sexual Behavior Stigma to Inform Effective HIV Prevention and Treatment Programs for Key Populations

    Science.gov (United States)

    Hargreaves, James R; Sprague, Laurel; Stangl, Anne L; Baral, Stefan D

    2017-01-01

    Background The levels of coverage of human immunodeficiency virus (HIV) treatment and prevention services needed to change the trajectory of the HIV epidemic among key populations, including gay men and other men who have sex with men (MSM) and sex workers, have consistently been shown to be limited by stigma. Objective The aim of this study was to propose an agenda for the goals and approaches of a sexual behavior stigma surveillance effort for key populations, with a focus on collecting surveillance data from 4 groups: (1) members of key population groups themselves (regardless of HIV status), (2) people living with HIV (PLHIV) who are also members of key populations, (3) members of nonkey populations, and (4) health workers. Methods We discuss strengths and weaknesses of measuring multiple different types of stigma including perceived, anticipated, experienced, perpetrated, internalized, and intersecting stigma as measured among key populations themselves, as well as attitudes or beliefs about key populations as measured among other groups. Results With the increasing recognition of the importance of stigma, consistent and validated stigma metrics for key populations are needed to monitor trends and guide immediate action. Evidence-based stigma interventions may ultimately be the key to overcoming the barriers to coverage and retention in life-saving antiretroviral-based HIV prevention and treatment programs for key populations. Conclusions Moving forward necessitates the integration of validated stigma scales in routine HIV surveillance efforts, as well as HIV epidemiologic and intervention studies focused on key populations, as a means of tracking progress toward a more efficient and impactful HIV response. PMID:28446420

  14. The qualified possession turn into ownership

    Directory of Open Access Journals (Sweden)

    Popov Danica

    2011-01-01

    Full Text Available Possession is prima facie evidence of ownership. Possession is ninetents of the law, means that possession is good against all other, except the true owner. The possession ripens into ownership if it is qualified and by effluxion of time. In Serbian law there are two kinds of adverse possession ripens into ownership. The first one is named ordinary and second one extraordinary adverse possession. Ordinary possession need to be legal, conscientious and genuine. Extraordinary possession is only conscientious, but in a wide sense. Adverse possession destroys the title of the owner and vests it in possessor. An occupation of land inconsistent with the right of the true owner: the possession of those against whom a right action has accured to the true owner. It is actual possession in the absence of possession by the rightful owner and without lawful title. If the adverse possession continues, the effect at the expiration of the prescribed period is that not only the remedy but the title of former owner is extinguished. The person in adverse possession gains a new possessory title which cannot, normally exceed in extent of duration the interest of the former owner.

  15. Perspectives on impacts of water quality on agriculture and community well-being-a key informant study from Sri Lanka.

    Science.gov (United States)

    Thoradeniya, Bhadranie; Pinto, Uthpala; Maheshwari, Basant

    2017-11-04

    Integrated management of water quality is critical for sustaining food production and achieving overall well-being of a community. Further, understanding people's perceptions and engagement can play an important role in achieving water and food security. The main aim of this study was to investigate the perspectives of community and other stakeholders as to how water quality impacts on agriculture, livelihood and community well-being within rural farming communities of two dry zone districts of Sri Lanka. The study adopted 'key informant interviews' as the methodology to investigate community and other stakeholder perspectives to collect primary data over a period of four months. The interview contents were then examined using a frequency matrix and graphed using an Excel graphing tool. The raw text was also analysed to understand the broader patterns in the text. A fuzzy logic cognitive map (FCM) was developed using the relationships between various concepts and linkages provided by the key informants. All key informants were concerned with the quality of drinking water they consume and the water used for their food preparation. Key informants representing the farming community indicated that the use of poor quality groundwater with higher levels of hardness has made growing crops difficult in the region. The key informants also identified extensive and ongoing use of agro-chemicals and fertilisers as a major source of pollution in water bodies in both spatio-temporal scale. Based on key informant interviews, possible initiatives that can help improve surface water and groundwater qualities for both drinking and agricultural use in the dry zone of Sri Lanka can be categorised into four broader themes, viz., provision of filtering/treatment systems, reduction in the use of agro-chemical and fertilisers, education of community stakeholders and support of alternative options for portable water supplies. The study indicates that in the key informants' view of

  16. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  17. Lean Information Management: Criteria For Selecting Key Performance Indicators At Shop Floor

    Science.gov (United States)

    Iuga, Maria Virginia; Kifor, Claudiu Vasile; Rosca, Liviu-Ion

    2015-07-01

    Most successful organizations worldwide use key performance indicators as an important part of their corporate strategy in order to forecast, measure and plan their businesses. Performance metrics vary in their purpose, definition and content. Therefore, the way organizations select what they think are the optimal indicators for their businesses varies from company to company, sometimes even from department to department. This study aims to answer the question of what is the most suitable way to define and select key performance indicators. More than that, it identifies the right criteria to select key performance indicators at shop floor level. This paper contributes to prior research by analysing and comparing previously researched selection criteria and proposes an original six-criteria-model, which caters towards choosing the most adequate KPIs. Furthermore, the authors take the research a step further by further steps to closed research gaps within this field of study.

  18. Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters.

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B; Balog, Robert S; Enjeti, Prasad

    2013-01-01

    We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions.

  19. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan

    2015-08-01

    Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

  20. Key Informant Perspectives on Federal Research Agency Policy and Systems and Scientific Workforce Diversity Development: A Companion Study

    Science.gov (United States)

    Moore, Corey L.; Wang, Ningning; Davis, Dytisha; Aref, Fariborz; Manyibe, Edward O.; Washington, Andre L.; Johnson, Jean; Eugene-Cross, Kenyotta; Muhammad, Atashia; Jennings-Jones, Desiree

    2017-01-01

    Purpose: In the previous analysis of key informant perspectives on minority research leaders' career development factors, we identified individual and sociocultural, institutional, and federal research agency (i.e., National Institute on Disability, Independent Living, and Rehabilitation Research; National Institutes of Health; Agency for…

  1. Key Technologies and Applications of Satellite and Sensor Web-coupled Real-time Dynamic Web Geographic Information System

    Directory of Open Access Journals (Sweden)

    CHEN Nengcheng

    2017-10-01

    Full Text Available The geo-spatial information service has failed to reflect the live status of spot and meet the needs of integrated monitoring and real-time information for a long time. To tackle the problems in observation sharing and integrated management of space-borne, air-borne, and ground-based platforms and efficient service of spatio-temporal information, an observation sharing model was proposed. The key technologies in real-time dynamic geographical information system (GIS including maximum spatio-temporal coverage-based optimal layout of earth-observation sensor Web, task-driven and feedback-based control, real-time access of streaming observations, dynamic simulation, warning and decision support were detailed. An real-time dynamic Web geographical information system (WebGIS named GeoSensor and its applications in sensing and management of spatio-temporal information of Yangtze River basin including navigation, flood prevention, and power generation were also introduced.

  2. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates.

    Science.gov (United States)

    Dellson, P; Nilbert, M; Bendahl, P-O; Malmström, P; Carlsson, C

    2011-07-01

    Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials. © 2010 Blackwell Publishing Ltd.

  3. INFORMATION, KEY ELEMENT OF ACCOUNTING AND AUDIT IN THE KNOWLEDGE SOCIETY

    Directory of Open Access Journals (Sweden)

    NELUTA MITEA

    2011-04-01

    Full Text Available In a knowledge society, the advantage of nations will not result from their natural resources, nor to the cheap labor, but from their ability to valorize the intellectual potential and to use efficiently the information. The knowledge based economy represents a new step in the development of human civilization that promises us a better future. The knowledge transfer between people and generations in order to facilitate human society’s evolution is the basic function of information science. This paper aims to examine how, in Romania, accounting and audit use and create information in current conditions of economic development. The purpose of this study consists in offering perspectives of improving the information quality. An information is high quality when, by its form and content, it corresponds integrally to all the needs, the exigencies and expectations of its user, without sacrificing the reality. A number of errors made by the accounting profession have been identified along this paper. These errors led to the decrease of information’s credibility. But the study proposes some changes in order to restore the image of this profession: the changes are sustained by the advantages of Knowledge Economy and Information Society. The research method consists in studying a rich background material, including reference items, such as works of applied and fundamental research. The originality of this work is given by the identification of knowledge society’s challenge which could be used as a lever of revival for accounting and audit in Romania.

  4. Sealed Radioactive Sources. Information, Resources, and Advice for Key Groups about Preventing the Loss of Control over Sealed Radioactive Sources

    International Nuclear Information System (INIS)

    2013-10-01

    Among its many activities to improve the safety and security of sealed sources, the IAEA has been investigating the root causes of major accidents and incidents since the 1980's and publishes findings so that others can learn from them. There are growing concerns today about the possibility that an improperly stored source could be stolen and used for malicious purposes. To improve both safety and security, information needs to be in the hands of those whose actions and decisions can prevent a source from being lost or stolen in the first place. The IAEA developed this booklet to help improve communication with key groups about hazards that may result from the loss of control over sealed radioactive sources and measures that should be implemented to prevent such loss of control. Many people may benefit from the information contained in this booklet, particularly those working with sources and those likely to be involved if control over a source is lost; especially: officials in government agencies, first responders, medical users, industrial users and the metal recycling industry. The general public may also benefit from an understanding of the fundamentals of radiation safety. This booklet is comprised of several stand-alone chapters intended to communicate with these key groups. Various accidents that are described and information that is provided are relevant to more than one key group and therefore, some information is repeated throughout the booklet. This booklet seeks to raise awareness of the importance of the safety and security of sealed radioactive sources. However, it is not intended to be a comprehensive 'how to' guide for implementing safety and security measures for sealed radioactive sources. For more information on these measures, readers are encouraged to consult the key IAEA safety and security-related publications identified in this booklet

  5. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  6. Key Techniques for Dynamic Updating of National Fundamental Geographic Information Database

    Directory of Open Access Journals (Sweden)

    WANG Donghua

    2015-07-01

    Full Text Available One of the most important missions of fundamental surveying and mapping work is to keep the fundamental geographic information fresh. In this respect, National Administration of Surveying, Mapping and Geoinformation has launched the project of dynamic updating of national fundamental geographic information database since 2012, which aims to update 1:50 000, 1:250 000 and 1:1 000 000 national fundamental geographic information database continuously and quickly, by updating and publishing once a year. This paper introduces the general technical thinking of dynamic updating, states main technical methods, such as dynamic updating of fundamental database, linkage updating of derived databases, and multi-tense database management and service and so on, and finally introduces main technical characteristics and engineering applications.

  7. Development of the information model for consumer assessment of key quality indicators by goods labelling

    Science.gov (United States)

    Koshkina, S.; Ostrinskaya, L.

    2018-04-01

    An information model for “key” quality indicators of goods has been developed. This model is based on the assessment of f standardization existing state and the product labeling quality. According to the authors’ opinion, the proposed “key” indicators are the most significant for purchasing decision making. Customers will be able to use this model through their mobile technical devices. The developed model allows to decompose existing processes in data flows and to reveal the levels of possible architectural solutions. In-depth analysis of the presented information model decomposition levels will allow determining the stages of its improvement and to reveal additional indicators of the goods quality that are of interest to customers in the further research. Examining the architectural solutions for the customer’s information environment functioning when integrating existing databases will allow us to determine the boundaries of the model flexibility and customizability.

  8. [Information, knowledge and healthcare practice: professionals participation as the key element of the gear].

    Science.gov (United States)

    Adam, Paula; Permanyer-Miralda, Gaietà; Solà-Morales, Oriol; Canela-Soler, Jaume

    2010-02-01

    This article analyzes the role of ICT within the complicated gear between information, knowledge and healthcare practices, which particular focus on two specific cases: the digitalization process of the healthcare system and the application of knowledge into the healthcare practices. In both cases, international and local experiences suggest, and sometimes demonstrate the importance of the participation, capacity-building and empowerment of healthcare practitioners for the generation, transfer and use of information and knowledge empowered by the digital tools which should bring into the system better performance, more efficacy, efficiency, equity, equality, security, quality. 2010 Elsevier España S.L. All rights reserved.

  9. Key attributes of the SAPHIRE risk and reliability analysis software for risk-informed probabilistic applications

    International Nuclear Information System (INIS)

    Smith, Curtis; Knudsen, James; Kvarfordt, Kellie; Wood, Ted

    2008-01-01

    The Idaho National Laboratory is a primary developer of probabilistic risk and reliability analysis (PRRA) tools, dating back over 35 years. Evolving from mainframe-based software, the current state-of-the-practice has led to the creation of the SAPHIRE software. Currently, agencies such as the Nuclear Regulatory Commission, the National Aeronautics and Aerospace Agency, the Department of Energy, and the Department of Defense use version 7 of the SAPHIRE software for many of their risk-informed activities. In order to better understand and appreciate the power of software as part of risk-informed applications, we need to recall that our current analysis methods and solution methods have built upon pioneering work done 30-40 years ago. We contrast this work with the current capabilities in the SAPHIRE analysis package. As part of this discussion, we provide information for both the typical features and special analysis capabilities, which are available. We also present the application and results typically found with state-of-the-practice PRRA models. By providing both a high-level and detailed look at the SAPHIRE software, we give a snapshot in time for the current use of software tools in a risk-informed decision arena

  10. Key Informant Views of a Free Delivery and Caesarean Policy in ...

    African Journals Online (AJOL)

    Erah

    The policy was introduced in 2005 in five more deprived regions ... informants who had technical and administrative or political responsibility for the policy at .... the first year of leadership from the ..... rhetoric of free services and the reality of .... augmented to include the materials to ..... mothers and children in Bolivia.

  11. A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems.

    Science.gov (United States)

    Xiong, Hu; Tao, Junyi; Chen, Yanan

    2016-11-01

    Nowadays people can get many services including health-care services from distributed information systems remotely via public network. By considering that these systems are built on public network, they are vulnerable to many malicious attacks. Hence it is necessary to introduce an effective mechanism to protect both users and severs. Recently many two-factor authentication schemes have been proposed to achieve this goal. In 2016, Li et al. demonstrated that Lee et al.'s scheme was not satisfactory to be deployed in practice because of its security weaknesses and then proposed a security enhanced scheme to overcome these drawbacks. In this paper, we analyze Li et al.'s scheme is still not satisfactory to be applied in telecare medicine information systems (TMIS) because it fails to withstand off-line dictionary attack and known session-specific temporary information attack. Moreover, their scheme cannot provide card revocation services for lost smart card. In order to solve these security problems, we propose an improved scheme. Then we analyze our scheme by using BAN-logic model and compare the improved scheme with related schemes to prove that our scheme is advantageous to be applied in practice.

  12. Application of modern information technologies for monitoring of 600 RP key component performance and lifetime assessment

    International Nuclear Information System (INIS)

    Karpenko, S.N.; Korotkih, Yu.G.; Levin, A.A.; Sankov, E.I.; Pobedonostzev, A.B.; Shashkin, S.L.

    1997-01-01

    Safety and reliability of NPP operation in the first turn depend on reliability and quality of the main technological equipment. Diagnostics systems are envisaged for the equipment state inspection to determine its serviceability in NPP designs. An assessment of the equipment residual lifetime at operating plants is calculated as a difference between specified (according to the operation model accepted in the design phase) lifetime and actual time in operation. Real influence of operating modes on the main equipment lifetime, in this case, is not taken into account. Within a design of NPP with VPBER-600 passive safety RP a system for lifetime assessment of RP key component is provided as a part of a process control system. Specialists from OKBM and Scientific Research Institute of Mechanics participate in development of this system. Now the first stage of the work on creation of this system is completed. This paper describes the purpose, the basic configuration principles of the system, its position among other NPP systems, organization of user-system interaction. (author). 5 refs, 1 figs

  13. Application of modern information technologies for monitoring of 600 RP key component performance and lifetime assessment

    Energy Technology Data Exchange (ETDEWEB)

    Karpenko, S N; Korotkih, Yu G; Levin, A A; Sankov, E I [Research Inst. of Mechanics of Lobachevski State Univ., Nizhny Novgorod (Russian Federation); Pobedonostzev, A B; Shashkin, S L [OKB Mechanical Engineering, Nizhny Novgorod (Russian Federation)

    1997-07-01

    Safety and reliability of NPP operation in the first turn depend on reliability and quality of the main technological equipment. Diagnostics systems are envisaged for the equipment state inspection to determine its serviceability in NPP designs. An assessment of the equipment residual lifetime at operating plants is calculated as a difference between specified (according to the operation model accepted in the design phase) lifetime and actual time in operation. Real influence of operating modes on the main equipment lifetime, in this case, is not taken into account. Within a design of NPP with VPBER-600 passive safety RP a system for lifetime assessment of RP key component is provided as a part of a process control system. Specialists from OKBM and Scientific Research Institute of Mechanics participate in development of this system. Now the first stage of the work on creation of this system is completed. This paper describes the purpose, the basic configuration principles of the system, its position among other NPP systems, organization of user-system interaction. (author). 5 refs, 1 figs.

  14. Viral Hepatitis Strategic Information to Achieve Elimination by 2030: Key Elements for HIV Program Managers.

    Science.gov (United States)

    Hutin, Yvan; Low-Beer, Daniel; Bergeri, Isabel; Hess, Sarah; Garcia-Calleja, Jesus Maria; Hayashi, Chika; Mozalevskis, Antons; Rinder Stengaard, Annemarie; Sabin, Keith; Harmanci, Hande; Bulterys, Marc

    2017-12-15

    Evidence documenting the global burden of disease from viral hepatitis was essential for the World Health Assembly to endorse the first Global Health Sector Strategy (GHSS) on viral hepatitis in May 2016. The GHSS on viral hepatitis proposes to eliminate viral hepatitis as a public health threat by 2030. The GHSS on viral hepatitis is in line with targets for HIV infection and tuberculosis as part of the Sustainable Development Goals. As coordination between hepatitis and HIV programs aims to optimize the use of resources, guidance is also needed to align the strategic information components of the 2 programs. The World Health Organization monitoring and evaluation framework for viral hepatitis B and C follows an approach similar to the one of HIV, including components on the following: (1) context (prevalence of infection), (2) input, (3) output and outcome, including the cascade of prevention and treatment, and (4) impact (incidence and mortality). Data systems that are needed to inform this framework include (1) surveillance for acute hepatitis, chronic infections, and sequelae and (2) program data documenting prevention and treatment, which for the latter includes a database of patients. Overall, the commonalities between HIV and hepatitis at the strategic, policy, technical, and implementation levels justify coordination, strategic linkage, or integration, depending on the type of HIV and viral hepatitis epidemics. Strategic information is a critical area of this alignment under the principle of what gets measured gets done. It is facilitated because the monitoring and evaluation frameworks for HIV and viral hepatitis were constructed using a similar approach. However, for areas where elimination of viral hepatitis requires data that cannot be collected through the HIV program, collaborations are needed with immunization, communicable disease control, tuberculosis, and hepatology centers to ensure collection of information for the remaining indicators.

  15. Implementation of eMental Health care: viewpoints from key informants from organizations and agencies with eHealth mandates.

    Science.gov (United States)

    Wozney, Lori; Newton, Amanda S; Gehring, Nicole D; Bennett, Kathryn; Huguet, Anna; Hartling, Lisa; Dyson, Michele P; McGrath, Patrick

    2017-06-02

    The use of technology such as computers, tablets, and smartphones to improve access to and the delivery of mental health care (eMental Health care) is growing worldwide. However, despite the rapidly expanding evidence base demonstrating the efficacy of eMental Health care, its implementation in clinical practice and health care systems remains fragmented. To date, no peer-reviewed, key-informant studies have reported on the perspectives of decision-makers concerned with whether and how to implement eMental Health care. From September to November 2015, we conducted 31 interviews with key informants responsible for leadership, policy, research, and/ or information technology in organizations influential in the adoption of technology for eMental Health care. Deductive and inductive thematic analyses of transcripts were conducted using the Behavior Change Wheel as an organizing framework. Frequency and intensity effect sizes were calculated for emerging themes to further explore patterns within the data. Key informant responses (n = 31) representing 6 developed countries and multiple organizations showed consensus on common factors impacting implementation: individual and organizational capacities (e.g., computer literacy skills [patients and providers], knowledge gaps about cyber security, limited knowledge of available services); motivational drivers of technology-based care (e.g., extending care, data analytics); and opportunities for health systems to advance eMental Health care implementation (e.g., intersectoral research, rapid testing cycles, sustainable funding). Frequency effect sizes showed strong associations between implementation and credibility, knowledge, workflow, patient empowerment, electronic medical record (EMR) integration, sustained funding and intersectoral networks. Intensity effect sizes showed the highest concentration of statements (>10% of all comments) related to funding, credibility, knowledge gaps, and patient empowerment. This study

  16. Key influences in the design and implementation of mental health information systems in Ghana and South Africa.

    Science.gov (United States)

    Ahuja, S; Mirzoev, T; Lund, C; Ofori-Atta, A; Skeen, S; Kufuor, A

    2016-01-01

    Strengthening of mental health information systems (MHIS) is essential to monitor and evaluate mental health services in low and middle-income countries. While research exists assessing wider health management information systems, there is limited published evidence exploring the design and implementation of MHIS in these settings. This paper aims to identify and assess the key factors affecting the design and implementation of MHIS, as perceived by the key stakeholders in Ghana and South Africa. We report findings from the Mental Health and Poverty Project, a 5-year research programme implemented within four African countries. The MHIS strengthening in South Africa and Ghana included two related components: intervention and research. The intervention component aimed to strengthen MHIS in the two countries, and the research component aimed to document interventions in each country, including the key influences. Data were collected using semi structured interviews with key stakeholders and reviews of key documents and secondary data from the improved MHIS. We analyzed the qualitative data using a framework approach. Key components of the MHIS intervention involved the introduction of a redesigned patient registration form, entry into computers for analysis every 2 months by clinical managerial staff, and utilization of data in hospital management meetings in three psychiatric hospitals in Ghana; and the introduction of a new set of mental health indicators and related forms and tally sheets at primary care clinics and district hospitals in five districts in the KwaZulu-Natal and Northern Cape provinces in South Africa. Overall, the key stakeholders perceived the MHIS strengthening as an effective intervention in both countries with an enhanced set of indicators in South Africa and introduction of a computerized system in Ghana. Influences on the design and implementation of MHIS interventions in Ghana and South Africa relate to resources, working approaches

  17. 50 CFR 648.164 - Possession restrictions.

    Science.gov (United States)

    2010-10-01

    ... Atlantic Bluefish Fishery § 648.164 Possession restrictions. (a) No person shall possess more than 15 bluefish in, or harvested from, the EEZ unless that person is the owner or operator of a fishing vessel issued a bluefish commercial permit or is issued a bluefish dealer permit. Persons aboard a vessel that...

  18. An exploratory study of information sources and key findings on UK cocaine-related deaths.

    Science.gov (United States)

    Corkery, John M; Claridge, Hugh; Goodair, Christine; Schifano, Fabrizio

    2017-08-01

    Cocaine-related deaths have increased since the early 1990s in Europe, including the UK. Being multi-factorial, they are difficult to define, detect and record. The European Monitoring Centre for Drugs and Drug Addiction commissioned research to: describe trends reported to Special Mortality Registries and General Mortality Registers; provide demographic and drug-use characteristic information of cases; and establish how deaths are identified and classified. A questionnaire was developed and piloted amongst all European Monitoring Centre for Drugs and Drug Addiction Focal Point experts/Special Mortality Registries: 19 (63%) responded; nine countries provided aggregated data. UK General Mortality Registers use cause of death and toxicology to identify cocaine-related deaths. Categorisation is based on International Classification of Diseases codes. Special Mortality Registries use toxicology, autopsy, evidence and cause of death. The cocaine metabolites commonly screened for are: benzoylecgonine, ecgonine methyl ester, cocaethylene and ecgonine. The 2000s saw a generally accelerating upward trend in cases, followed by a decline in 2009. The UK recorded 2700-2900 deaths during 1998-2012. UK Special Mortality Registry data (2005-2009) indicate: 25-44 year-olds account for 74% of deaths; mean age=34 (range 15-81) years; 84% male. Cocaine overdoses account for two-thirds of cases; cocaine alone being mentioned/implicated in 23% in the UK. Opioids are involved in most (58%) cocaine overdose cases.

  19. Quantum measurement information as a key to energy extraction from local vacuums

    International Nuclear Information System (INIS)

    Hotta, Masahiro

    2008-01-01

    In this paper, a protocol is proposed in which energy extraction from local vacuum states is possible by using quantum measurement information for the vacuum state of quantum fields. In the protocol, Alice, who stays at a spatial point, excites the ground state of the fields by a local measurement. Consequently, wave packets generated by Alice's measurement propagate the vacuum to spatial infinity. Let us assume that Bob stays away from Alice and fails to catch the excitation energy when the wave packets pass in front of him. Next Alice announces her local measurement result to Bob by classical communication. Bob performs a local unitary operation depending on the measurement result. In this process, positive energy is released from the fields to Bob's apparatus of the unitary operation. In the field systems, wave packets are generated with negative energy around Bob's location. Soon afterwards, the negative-energy wave packets begin to chase after the positive-energy wave packets generated by Alice and form loosely bound states.

  20. Based on Weibull Information Fusion Analysis Semiconductors Quality the Key Technology of Manufacturing Execution Systems Reliability

    Science.gov (United States)

    Huang, Zhi-Hui; Tang, Ying-Chun; Dai, Kai

    2016-05-01

    Semiconductor materials and Product qualified rate are directly related to the manufacturing costs and survival of the enterprise. Application a dynamic reliability growth analysis method studies manufacturing execution system reliability growth to improve product quality. Refer to classical Duane model assumptions and tracking growth forecasts the TGP programming model, through the failure data, established the Weibull distribution model. Combining with the median rank of average rank method, through linear regression and least squares estimation method, match respectively weibull information fusion reliability growth curve. This assumption model overcome Duane model a weakness which is MTBF point estimation accuracy is not high, through the analysis of the failure data show that the method is an instance of the test and evaluation modeling process are basically identical. Median rank in the statistics is used to determine the method of random variable distribution function, which is a good way to solve the problem of complex systems such as the limited sample size. Therefore this method has great engineering application value.

  1. Facing the Maze: Young Cancer Survivors' Return to Education and Work-A Professional Expert Key Informant Study.

    Science.gov (United States)

    Pedersen, Kaspar Jessen; Boisen, Kirsten Arntz; Midtgaard, Julie; Elsbernd, Abbey; Larsen, Hanne Baekgaard

    2018-03-13

    An insufficient transition to normal life after cancer treatment in adolescent and young adults (AYAs) may lead to decreased occupational and educational opportunities throughout a survivor's lifespan. Key informant interviews were used to access unique knowledge of the healthcare, educational, and social systems. We used key informant interviews with professionals representing disciplines from healthcare, educational, and social systems (n = 15). Informants were recruited through purposive sampling and snowball sampling. Interviews were analyzed thematically using Malterud's Systematic Text Condensation and verified by member checking. We found four major themes: the impact of late effects, navigating the system, social reintegration, and the drive of youth. Although legal frameworks are often in place to assist AYA cancer survivors, navigating the public, educational, and social systems is a complex task and many AYAs do not have the required skill set or energy. Furthermore, AYA survivors often feel different from their peers and misunderstood by their surroundings, which may hinder reintegration into normal social life. In Scandinavia, healthcare and education are free of charge with equal access for all, primarily funded by government taxes. Therefore, insurance status and tuition fees should not constitute barriers for returning to education and work. However, this study finds that the public and educational systems are complex to navigate, and that AYAs face trouble mobilizing the energy to receive needed support.

  2. What competencies should directors possess? Malaysia perspective

    Directory of Open Access Journals (Sweden)

    Wan Fauziah Wan Yusoff

    2011-07-01

    Full Text Available Directors’ competencies are seeing to be of importance to corporate governance. As this issue has not yet being studied extensively in Malaysia, this study determines the key competencies of Malaysian company’s directors using qualitative approach involving two stages of Delphi Technique. In the first stage all information pertaining to directors’ competences in the literature had been reviewed. In the second stage, the key competencies identified in stage one were the criteria for developing a semi structured questionnaire. Participants were asked to rank the competencies in term of their importance for directors’ performance. Based on personel interviews with 41 participants eight types of competencies were found to be essential for Malaysian companies’ directors. Financial competencies received the highest responses, followed by corporate planning, business forecasting, legal, risk management, marketing, human resource and international business. This paper provides important evidence to support the conclusions drawn from the study about the importance of relevant directors’ competencies for board and corporate effectiveness.

  3. The Secret Prover : Proving Possession of Arbitrary Files While not Giving Them Away

    NARCIS (Netherlands)

    Teepe, Wouter

    2005-01-01

    The Secret Prover is a Java application which allows a user (A) to prove to another user (B), that A possesses a file. If B also possesses this file B will get convinced, and if B does not possess this file B will gain no information on (the contents of) this file. This is the first implementation

  4. POSSESSION, REVIEW FROM CULTURAL AND PSYCHIATRY

    Directory of Open Access Journals (Sweden)

    Ni Ketut Sri Diniari

    2013-03-01

    Full Text Available Possession is a culture related syndrome, commonly found in Indonesia including Bali. We can see this event in religion and cultural ceremony and at other times at school, home, and in society. This syndrome consist of temporary loss of self identification and environment awareness; in several events a person acts as if he/she was controlled by other being, magic force, spirit or ‘other forces’. There are still several different opinions about trance-possession, whether it is related to certain culture or is a part of mental disorder. DSM-IV-TR and PPDGJ-III defined trance-possession as mental disorder (dissociative for involuntary possession, if it is not a common activity, and if it is not a part of religion or cultural event. (MEDICINA 2012;43:37-40.

  5. Subself theory and reincarnation/possession.

    Science.gov (United States)

    Lester, David

    2004-12-01

    A subself model of the mind is used to account for multiple personality, possession, the spirit controls of mediums, reincarnation, and the auditory hallucinations of schizophrenics, with suggestions for empirical research.

  6. The Impact of Banning Juvenile Gun Possession.

    OpenAIRE

    Marvell, Thomas B

    2001-01-01

    A 1994 federal law bans possession of handguns by persons under 18 years of age. Also in 1994, 11 states passed their own juvenile gun possession bans. Eighteen states had previously passed bans, 15 of them between 1975 and 1993. These laws were intended to reduce homicides, but arguments can be made that they have no effect on or that they even increase the homicide rate. This paper estimates the laws' impacts on various crime measures, primarily juvenile gun homicide victimizations and suic...

  7. The Use of Key Informant Method for Identifying Children with Blindness and Severe Visual Impairment in Developing Countries.

    Science.gov (United States)

    du Toit, Rènée; Courtright, Paul; Lewallen, Susan

    2017-06-01

    An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.

  8. The goalkeeper influence on ball possession effectiveness in futsal

    Directory of Open Access Journals (Sweden)

    Vicente-Vila Pedro

    2016-06-01

    Full Text Available The aim of this study was to identify which variables were the best predictors of success in futsal ball possession when controlling for space and task related indicators, situational variables and the participation of the goalkeeper as a regular field player or not (5 vs. 4 or 4 vs. 4. The sample consisted of 326 situations of ball possession corresponding to 31 matches played by a team from the Spanish Futsal League during the 2010–2011, 2011–2012 and 2012–2013 seasons. Multidimensional qualitative data obtained from 10 ordered categorical variables were used. Data were analysed using chi-square analysis and multiple logistic regression analysis. Overall, the highest ball possession effectiveness was achieved when the goalkeeper participated as a regular field player (p<0.01, the duration of the ball possession was less than 10 s (p<0.01, the ball possession ended in the penalty area (p<0.01 and the defensive pressure was low (p<0.01. The information obtained on the relative effectiveness of offensive playing tactics can be used to improve team’s goal-scoring and goal preventing abilities.

  9. The politics of agenda setting at the global level: key informant interviews regarding the International Labour Organization Decent Work Agenda.

    Science.gov (United States)

    Di Ruggiero, Erica; Cohen, Joanna E; Cole, Donald C

    2014-07-01

    Global labour markets continue to undergo significant transformations resulting from socio-political instability combined with rises in structural inequality, employment insecurity, and poor working conditions. Confronted by these challenges, global institutions are providing policy guidance to protect and promote the health and well-being of workers. This article provides an account of how the International Labour Organization's Decent Work Agenda contributes to the work policy agendas of the World Health Organization and the World Bank. This qualitative study involved semi-structured interviews with representatives from three global institutions--the International Labour Organization (ILO), the World Health Organization and the World Bank. Of the 25 key informants invited to participate, 16 took part in the study. Analysis for key themes was followed by interpretation using selected agenda setting theories. Interviews indicated that through the Decent Work Agenda, the International Labour Organization is shaping the global policy narrative about work among UN agencies, and that the pursuit of decent work and the Agenda were perceived as important goals with the potential to promote just policies. The Agenda was closely linked to the World Health Organization's conception of health as a human right. However, decent work was consistently identified by World Bank informants as ILO terminology in contrast to terms such as job creation and job access. The limited evidence base and its conceptual nature were offered as partial explanations for why the Agenda has yet to fully influence other global institutions. Catalytic events such as the economic crisis were identified as creating the enabling conditions to influence global work policy agendas. Our evidence aids our understanding of how an issue like decent work enters and stays on the policy agendas of global institutions, using the Decent Work Agenda as an illustrative example. Catalytic events and policy

  10. The politics of agenda setting at the global level: key informant interviews regarding the International Labour Organization Decent Work Agenda

    Science.gov (United States)

    2014-01-01

    Background Global labour markets continue to undergo significant transformations resulting from socio-political instability combined with rises in structural inequality, employment insecurity, and poor working conditions. Confronted by these challenges, global institutions are providing policy guidance to protect and promote the health and well-being of workers. This article provides an account of how the International Labour Organization’s Decent Work Agenda contributes to the work policy agendas of the World Health Organization and the World Bank. Methods This qualitative study involved semi-structured interviews with representatives from three global institutions – the International Labour Organization (ILO), the World Health Organization and the World Bank. Of the 25 key informants invited to participate, 16 took part in the study. Analysis for key themes was followed by interpretation using selected agenda setting theories. Results Interviews indicated that through the Decent Work Agenda, the International Labour Organization is shaping the global policy narrative about work among UN agencies, and that the pursuit of decent work and the Agenda were perceived as important goals with the potential to promote just policies. The Agenda was closely linked to the World Health Organization’s conception of health as a human right. However, decent work was consistently identified by World Bank informants as ILO terminology in contrast to terms such as job creation and job access. The limited evidence base and its conceptual nature were offered as partial explanations for why the Agenda has yet to fully influence other global institutions. Catalytic events such as the economic crisis were identified as creating the enabling conditions to influence global work policy agendas. Conclusions Our evidence aids our understanding of how an issue like decent work enters and stays on the policy agendas of global institutions, using the Decent Work Agenda as an illustrative

  11. Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Rasoolzadegan, Abbas

    2016-11-01

    Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.

  12. Illicit Drug Users in the Tanzanian Hinterland: Population Size Estimation Through Key Informant-Driven Hot Spot Mapping.

    Science.gov (United States)

    Ndayongeje, Joel; Msami, Amani; Laurent, Yovin Ivo; Mwankemwa, Syangu; Makumbuli, Moza; Ngonyani, Alois M; Tiberio, Jenny; Welty, Susie; Said, Christen; Morris, Meghan D; McFarland, Willi

    2018-02-12

    We mapped hot spots and estimated the numbers of people who use drugs (PWUD) and who inject drugs (PWID) in 12 regions of Tanzania. Primary (ie, current and past PWUD) and secondary (eg, police, service providers) key informants identified potential hot spots, which we visited to verify and count the number of PWUD and PWID present. Adjustments to counts and extrapolation to regional estimates were done by local experts through iterative rounds of discussion. Drug use, specifically cocaine and heroin, occurred in all regions. Tanga had the largest numbers of PWUD and PWID (5190 and 540, respectively), followed by Mwanza (3300 and 300, respectively). Findings highlight the need to strengthen awareness of drug use and develop prevention and harm reduction programs with broader reach in Tanzania. This exercise provides a foundation for understanding the extent and locations of drug use, a baseline for future size estimations, and a sampling frame for future research.

  13. Using Key Informant Method to Determine the Prevalence and Causes of Childhood Blindness in South-Eastern Nigeria.

    Science.gov (United States)

    Aghaji, Ada E; Ezegwui, Ifeoma R; Shiweobi, Jude O; Mamah, Cyril C; Okoloagu, Mary N; Onwasigwe, Ernest N

    2017-12-01

    To determine the prevalence and causes of childhood blindness in an underserved community in south-eastern Nigeria using the key informant method. This was a descriptive cross-sectional study. Key informants (KI) appointed by their respective communities received 1-day training on identification of blind children in their communities. Two weeks later, the research team visited the agreed sites within the community and examined the identified children. The World Health Organization eye examination record for blind children was used for data collection. Data entry and analysis were done with the Statistical Package for Social Sciences (SPSS) version 17.0. Fifteen blind or severely visually impaired children (age range 3 months to 15 years) were identified in this community; nine of these were brought by the KIs. The prevalence of childhood blindness/severe visual impairment (BL/SVI) was 0.12 per 1000 children. By anatomical classification, operable cataract in 6 (40.0%) was the leading cause of BL/SVI in the series; followed by optic nerve lesions (atrophy/hypoplasia) in 3 (20.0%). The etiology of BL/SVI is unknown for the majority of the children (66.7%). It was presumed hereditary in four children (26.7%). Sixty percent of the blindness was judged avoidable. Only three children (20.0%) were enrolled in the Special Education Centre for the Blind. The prevalence of childhood BL/SVI in our study population is low but over half of the blindness is avoidable. There may be a significant backlog of operable childhood cataract in south-eastern Nigeria. The KI method is a practical method for case finding of blind children in rural communities.

  14. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security

  15. The Failed Image and the Possessed

    DEFF Research Database (Denmark)

    Suhr, Christian

    2015-01-01

    This article asks if the recurrent queries regarding the value of images in visual anthropology could find new answers by exploring responses to visual media in neo-orthodox Islam. It proposes that the visual display of the photographic image shares a curious resemblance to the bodies of people...... possessed by invisible spirits called jinn. The image as a failed example or model of reality works like the possessed body as an amplifier of invisibility pointing towards that which cannot be seen, depicted visually, or represented in writing. This suggests a negative epistemology in which images obtain...

  16. Antibiotic distribution channels in Thailand: results of key-informant interviews, reviews of drug regulations and database searches.

    Science.gov (United States)

    Sommanustweechai, Angkana; Chanvatik, Sunicha; Sermsinsiri, Varavoot; Sivilaikul, Somsajee; Patcharanarumol, Walaiporn; Yeung, Shunmay; Tangcharoensathien, Viroj

    2018-02-01

    To analyse how antibiotics are imported, manufactured, distributed and regulated in Thailand. We gathered information, on antibiotic distribution in Thailand, in in-depth interviews - with 43 key informants from farms, health facilities, pharmaceutical and animal feed industries, private pharmacies and regulators- and in database and literature searches. In 2016-2017, licensed antibiotic distribution in Thailand involves over 700 importers and about 24 000 distributors - e.g. retail pharmacies and wholesalers. Thailand imports antibiotics and active pharmaceutical ingredients. There is no system for monitoring the distribution of active ingredients, some of which are used directly on farms, without being processed. Most antibiotics can be bought from pharmacies, for home or farm use, without a prescription. Although the 1987 Drug Act classified most antibiotics as "dangerous drugs", it only classified a few of them as prescription-only medicines and placed no restrictions on the quantities of antibiotics that could be sold to any individual. Pharmacists working in pharmacies are covered by some of the Act's regulations, but the quality of their dispensing and prescribing appears to be largely reliant on their competences. In Thailand, most antibiotics are easily and widely available from retail pharmacies, without a prescription. If the inappropriate use of active pharmaceutical ingredients and antibiotics is to be reduced, we need to reclassify and restrict access to certain antibiotics and to develop systems to audit the dispensing of antibiotics in the retail sector and track the movements of active ingredients.

  17. GIS environmental information analysis of the Darro River basin as the key for the management and hydrological forest restoration.

    Science.gov (United States)

    Fernandez, Paz; Delgado, Expectación; Lopez-Alonso, Mónica; Poyatos, José Manuel

    2018-02-01

    This article presents analyses of soil and environmental information for the Darro River basin (Granada-Spain) preliminary to its hydrological and forestry restoration. These analyses were carried out using a geographical information system (GIS) and employing a new procedure that adapts hydrological forest-restoration methods. The complete analysis encompasses morphological conditions, soil and climate characteristics as well as vegetation and land use. The study investigates soil erosion in the basin by using Universal Soil Loss Equation (USLE) and by mapping erosion fragility units. The results are presented in a set of maps and their analysis, providing the starting point for river basin management and the hydrological and forestry-restoration project that was approved at the end of 2015. The presence of soft substrates (e.g. gravel and sand) indicates that the area is susceptible to erosion, particularly the areas that are dominated by human activity and have little soil protection. Finally, land use and vegetation cover were identified as key factors in the soil erosion in the basin. According to the results, river authorities have included several measures in the restoration project aimed at reducing the erosion and helping to recover the environmental value of this river basin and to include it in recreation possibilities for the community of Granada. The presented analytical approach, designed by the authors, would be useful as a tool for environmental restoration in other small Mediterranean river basins. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. RAISING INFORMATION AND COMMUNICATION TECHNOLOGIES COMPETENCE OF SCIENTIFIC AND PEDAGOGICAL EMPLOYEES - A KEY REQUIREMENT OF THE QUALITY OF EDUCATIONAL PROCESS

    Directory of Open Access Journals (Sweden)

    Nataliia V. Morze

    2017-06-01

    Full Text Available In the article it was analyzed one of the basic conditions of providing the quality of higher education according to the system of internal quality assurance standards ESG (European quality assurance standards and guidelines to increase the ICT competence of scientific-pedagogical staff of the University. It was described the modular system of training for scientific and pedagogical staff of the Borys Grinchenko Kyiv University. Special attention is paid to the description of the system of raising the level of formation the ICT competence as one of the key competences of the modern teacher. The system of professional development, which is based on creating mixed studying and technology of "flipped classroom", formative assessment, innovative educational and ICT technologies according to the specially designed informative module "Informational and communication technologies", which allows scientific-pedagogical staff to use modern ICT and educational technologies effectively for their further applying in the provision of educational services and the development of quality of open educational content and open educational e-environment available to the student at any convenient time, which will significantly improve the quality of the educational process.

  19. Digital possessions after a romantic break up

    NARCIS (Netherlands)

    Herron, Daniel; Moncur, Wendy; van den Hoven, Elise

    2016-01-01

    With technology becoming more pervasive in everyday life, it is common for individuals to use digital media to support the enactment and maintenance of romantic relationships. Partners in a relationship may create digital possessions frequently. However, after a relationship ends, individuals

  20. Exploring dementia management attitudes in primary care: a key informant survey to primary care physicians in 25 European countries.

    Science.gov (United States)

    Petrazzuoli, Ferdinando; Vinker, Shlomo; Koskela, Tuomas H; Frese, Thomas; Buono, Nicola; Soler, Jean Karl; Ahrensberg, Jette; Asenova, Radost; Foguet Boreu, Quintí; Ceyhun Peker, Gülsen; Collins, Claire; Hanževački, Miro; Hoffmann, Kathryn; Iftode, Claudia; Kurpas, Donata; Le Reste, Jean Yves; Lichtwarck, Bjørn; Petek, Davorina; Pinto, Daniel; Schrans, Diego; Streit, Sven; Tang, Eugene Yee Hing; Tatsioni, Athina; Torzsa, Péter; Unalan, Pemra C; van Marwijk, Harm; Thulesius, Hans

    2017-09-01

    Strategies for the involvement of primary care in the management of patients with presumed or diagnosed dementia are heterogeneous across Europe. We wanted to explore attitudes of primary care physicians (PCPs) when managing dementia: (i) the most popular cognitive tests, (ii) who had the right to initiate or continue cholinesterase inhibitor or memantine treatment, and (iii) the relationship between the permissiveness of these rules/guidelines and PCP's approach in the dementia investigations and assessment. Key informant survey. Primary care practices across 25 European countries. Four hundred forty-five PCPs responded to a self-administered questionnaire. Two-step cluster analysis was performed using characteristics of the informants and the responses to the survey. Two by two contingency tables with odds ratios and 95% confidence intervals were used to assess the association between categorical variables. A multinomial logistic regression model was used to assess the association of multiple variables (age class, gender, and perceived prescription rules) with the PCPs' attitude of "trying to establish a diagnosis of dementia on their own." Discrepancies between rules/guidelines and attitudes to dementia management was found in many countries. There was a strong association between the authorization to prescribe dementia drugs and pursuing dementia diagnostic work-up (odds ratio, 3.45; 95% CI 2.28-5.23). Differing regulations about who does what in dementia management seemed to affect PCP's engagement in dementia investigations and assessment. PCPs who were allowed to prescribe dementia drugs also claimed higher engagement in dementia work-up than PCPs who were not allowed to prescribe.

  1. Taking Possession: Rituals, Space and Authority

    Directory of Open Access Journals (Sweden)

    Jennifer Mara DeSilva

    2016-12-01

    Full Text Available In early modern Europe authority over communities, both people and spaces, was visualized through ritual gestures and processions. Communities gathered to witness ceremonial entries that drew on accepted forms of gestures and speech identifying individuals and articulating their place in the urban power relationship. Ceremonial entries by rulers, ambassadors, bishops, and other office-holders drew on ritual acts projecting messages of possession in order to establish reputations of prestige and authority. This introductory essay draws on cultural anthropology and recent historiography to build a framework for understanding rituals of possession that went beyond the tradition triumphal entry to incorporate substitutes, new modes of prestigious display, and attend to conflicts. By “taking possession” of communities, offices, and spaces using accepted ritual forms, early moderns initiated conversations about authority and power that were far more flexible in their scope, practice, and participants than expected.

  2. From distress to disease: a critique of the medicalisation of possession in DSM-5.

    Science.gov (United States)

    Padmanabhan, Divya

    2017-12-01

    This paper critiques the category of possession-form dissociative identity disorder as defined in the Diagnostic and Statistical Manual of Mental Disorders 5 (DSM-5) published in 2013 by the American Psychiatric Association (APA). The DSM as an index of psychiatry pathologises possession by categorising it as a form of dissociative identity disorder. Drawing upon ethnographic fieldwork, this paper argues that such a pathologisation medicalises possession, which is understood as a non-pathological condition in other contexts such as by those individuals who manifest possession at a temple in Kerala, South India. Through medicalising and further by creating distinctions between acceptable and pathological possession, the DSM converts a form of distress into a disease. This has both conceptual and pragmatic implications. The temple therefore becomes reduced to a culturally acceptable site for the manifestation of a mental illness in a form that is culturally available and possession is explained solely through a biomedical framework, denying alternative conceptualisations and theories which inform possession. By focussing on the DSM-5 classification of possession and the limitations of such a classification, this paper seeks to posit an alternative conceptualisation of possession by engaging with three primary areas which are significant in the DSM categorisation of possession: the DSM's conceptualisation of self in the singular, the distinction between pathological and non-pathological forms of possession, and the limitations of the DSM's equation of the condition of possession with the manifestation of possession. Finally, the paper briefly highlights alternative conceptualisations of possession, which emerged from the perspective of those seeking to heal possession at the Chottanikkara temple.

  3. Scientific information and the Tongass land management plan: key findings derived from the scientific literature, species assessments, resource analyses, workshops, and risk assessment panels.

    Science.gov (United States)

    Douglas N. Swanston; Charles G. Shaw; Winston P. Smith; Kent R. Julin; Guy A. Cellier; Fred H. Everest

    1996-01-01

    This document highlights key items of information obtained from the published literature and from specific assessments, workshops, resource analyses, and various risk assessment panels conducted as part of the Tongass land management planning process. None of this information dictates any particular decision; however, it is important to consider during decisionmaking...

  4. FOSS4G AS A KEY BUILDING BLOCK FOR CASE-BASED LEARNING IN GEOGRAPHIC INFORMATION EDUCATION

    Directory of Open Access Journals (Sweden)

    M. Minghini

    2017-07-01

    Full Text Available In the sector of Geographic Information (GI there is a gap between the education and training currently being offered by European universities and the knowledge and skills required by enterprises and public authorities. New forms of collaboration based on innovative methods are needed to cope with the challenges derived from the fast technological developments in the geospatial and ICT field. This paper presents the approach and the first findings of the EU Erasmus+ project giCASES – Creating a University-Enterprise Alliance for a Spatially Enabled Society (2016–2018 which addresses this challenge by introducing new methods for case-based and collaborative learning, and for the co-creation, management and sharing of knowledge between universities and enterprises. The aim of the project is to develop new training material and create innovative, multi-disciplinary learning processes based on real-world case studies (case-based learning. The paper focuses on the methodological approach developed during the first half of the project, and presents the 6 case studies where this approach will be tested during the second half. Despite the diversity of application domains (indoor mapping, environmental hazards, e-Government, utility networks, energy saving policies, and forestry, the case studies are all relevant to open source software and FOSS4G technologies will play a key role in their implementation, thus demonstrating their matureness and flexibility not only as GI teaching tools at the universities, but also as powerful means to develop innovative new services at the companies.

  5. What is eHealth (6)? Development of a Conceptual Model for eHealth: Qualitative Study with Key Informants.

    Science.gov (United States)

    Shaw, Tim; McGregor, Deborah; Brunner, Melissa; Keep, Melanie; Janssen, Anna; Barnet, Stewart

    2017-10-24

    Despite rapid growth in eHealth research, there remains a lack of consistency in defining and using terms related to eHealth. More widely cited definitions provide broad understanding of eHealth but lack sufficient conceptual clarity to operationalize eHealth and enable its implementation in health care practice, research, education, and policy. Definitions that are more detailed are often context or discipline specific, limiting ease of translation of these definitions across the breadth of eHealth perspectives and situations. A conceptual model of eHealth that adequately captures its complexity and potential overlaps is required. This model must also be sufficiently detailed to enable eHealth operationalization and hypothesis testing. This study aimed to develop a conceptual practice-based model of eHealth to support health professionals in applying eHealth to their particular professional or discipline contexts. We conducted semistructured interviews with key informants (N=25) from organizations involved in health care delivery, research, education, practice, governance, and policy to explore their perspectives on and experiences with eHealth. We used purposeful sampling for maximum diversity. Interviews were coded and thematically analyzed for emergent domains. Thematic analyses revealed 3 prominent but overlapping domains of eHealth: (1) health in our hands (using eHealth technologies to monitor, track, and inform health), (2) interacting for health (using digital technologies to enable health communication among practitioners and between health professionals and clients or patients), and (3) data enabling health (collecting, managing, and using health data). These domains formed a model of eHealth that addresses the need for clear definitions and a taxonomy of eHealth while acknowledging the fluidity of this area and the strengths of initiatives that span multiple eHealth domains. This model extends current understanding of eHealth by providing clearly

  6. Economic considerations and health in all policies initiatives: evidence from interviews with key informants in Sweden, Quebec and South Australia.

    Science.gov (United States)

    Pinto, Andrew D; Molnar, Agnes; Shankardass, Ketan; O'Campo, Patricia J; Bayoumi, Ahmed M

    2015-02-18

    Health in All Policies (HiAP) is a form of intersectoral action that aims to include the promotion of health in government initiatives across sectors. To date, there has been little study of economic considerations within the implementation of HiAP. As part of an ongoing program of research on the implementation of HiAP around the world, we examined how economic considerations influence the implementation of HiAP. By economic considerations we mean the cost and financial gain (or loss) of implementing a HiAP process or structure within government, or the cost and financial gain (or loss) of the policies that emerge from such a HiAP process or structure. We examined three jurisdictions: Sweden, Quebec and South Australia. Semi-structured telephone interviews were conducted with 12 to 14 key informants in each jurisdiction. Two investigators separately coded transcripts to identify relevant statements. Initial readings of transcripts led to the development of a coding framework for statements related to economic considerations. First, economic evaluations of HiAP are viewed as important for prompting HiAP and many forms of economic evaluation were considered. However, economic evaluations were often absent, informal, or incomplete. Second, funding for HiAP initiatives is important, but is less important than a high-level commitment to intersectoral collaboration. Furthermore, having multiple sources of funding of HiAP can be beneficial, if it increases participation across government, but can also be disadvantageous, if it exposes underlying tensions. Third, HiAP can also highlight the challenge of achieving both economic and social objectives. Our results are useful for elaborating propositions for use in realist multiple explanatory case studies. First, we propose that economic considerations are currently used primarily as a method by health sectors to promote and legitimize HiAP to non-health sectors with the goal of securing resources for HiAP. Second

  7. Six key topics informal carers of patients with breathlessness in advanced disease want to learn about and why: MRC phase I study to inform an educational intervention.

    Directory of Open Access Journals (Sweden)

    Morag Farquhar

    Full Text Available Breathlessness is a common symptom of advanced disease placing a huge burden on patients, health systems and informal carers (families and friends providing daily help and support. It causes distress and isolation. Carers provide complex personal, practical and emotional support yet often feel ill-prepared to care. They lack knowledge and confidence in their caring role. The need to educate carers and families about breathlessness is established, yet we lack robustly developed carer-targeted educational interventions to meet their needs.We conducted a qualitative interview study with twenty five purposively-sampled patient-carer dyads living with breathlessness in advanced disease (half living with advanced cancer and half with advanced chronic obstructive pulmonary disease (COPD. We sought to identify carers' educational needs (including what they wanted to learn about and explore differences by diagnostic group in order to inform an educational intervention for carers of patients with breathlessness in advanced disease.There was a strong desire among carers for an educational intervention on breathlessness. Six key topics emerged as salient for them: 1 understanding breathlessness, 2 managing anxiety, panic and breathlessness, 3 managing infections, 4 keeping active, 5 living positively and 6 knowing what to expect in the future. A cross-cutting theme was relationship management: there were tensions within dyads resulting from mismatched expectations related to most topics. Carers felt that knowledge-gains would not only help them to support the patient better, but also help them to manage their own frustrations, anxieties, and quality of life. Different drivers for education need were identified by diagnostic group, possibly related to differences in caring role duration and resulting impacts.Meeting the educational needs of carers requires robustly developed and evaluated interventions. This study provides the evidence-base for the content

  8. Information Technology: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    Science.gov (United States)

    2007-05-01

    International Organization for Standardization/International Electrotechnical Commission ( ISO /IEC) 27000 Series, Information technology—Security...the International Organization for Standardization ( ISO )), the IT SSP bases the terms and definitions on those in the NIPP because the SSP is an annex...techniques—Information security management systems • ISO /IEC 13335, Information technology—Security tech- niques—Management of information and

  9. Male homosexuality and spirit possession in Brazil.

    Science.gov (United States)

    Fry, P

    1985-01-01

    This paper examines the relationship between male homosexuality and the Afro-Brazilian possession cults in Belém do Parà. After a discussion of the literature follows a description of the cults' beliefs, rites and social organization. Male sex roles are then discussed and the two categories, bicha and man, analyzed. It is noted that there is no term which is equivalent to the western category of "homosexual" in this taxonomic system. After putting forward folk explanations for the presence of many bichas in the cults, an analysis is put forward of the social rewards available to bichas within these cults, and the structural relationship between homosexuality and these regions in terms of their congruent marginality vis-à-vis "normal society."

  10. Teaching Information Privacy in Marketing Courses: Key Educational Issues for Principles of Marketing and Elective Marketing Courses

    Science.gov (United States)

    Peltier, James W.; Milne, George R.; Phelps, Joseph E.; Barrett, Jennifer T.

    2010-01-01

    An "information privacy gap" exists in marketing education, with little research addressing the state of information privacy and how appropriate privacy strategies and tactics should be communicated to students. The primary purpose of this article is to provide educators an understanding of information privacy and how they can incorporate this…

  11. Predicative possession in Medieval Slavic Bible translations Predicative Possession in Early Biblical Slavic

    Directory of Open Access Journals (Sweden)

    Julia McAnallen

    2011-08-01

    Full Text Available Late Proto-Slavic (LPS had an inventory of three constructions for expressing predicative possession. Using the earliest Slavic Bible translations from Old Church Slavic (OCS, and to a lesser degree Old Czech, a number of conclusions can be drawn about the status of predicative possession for LPS. The verb iměti ‘have’ was the most frequent and least syntactically and semantically restricted predicative possessive construction (PPC. Existential PPCs with a dative possessor appear primarily with kinship relations, abstract possessums, and in a number of other fixed construction types; existential PPCs with the possessor in an u + genitive prepositional phrase primarily appear with concrete and countable possessums. Both existential PPCs call for an animate, most often pronominal, possessor. The u + genitive was the rarest type of PPC in LPS, though it had undoubtedly grammaticalized as a PPC.

  12. 50 CFR 20.38 - Possession of live birds.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Possession of live birds. 20.38 Section 20... WILDLIFE AND PLANTS (CONTINUED) MIGRATORY BIRD HUNTING Possession § 20.38 Possession of live birds. Every migratory game bird wounded by hunting and reduced to possession by the hunter shall be immediately killed...

  13. Environmental Influences on Physical Activity among Rural Adults in Montana, United States: Views from Built Environment Audits, Resident Focus Groups, and Key Informant Interviews

    Directory of Open Access Journals (Sweden)

    Brian K. Lo

    2017-10-01

    Full Text Available Rural populations in the United States have lower physical activity levels and are at a higher risk of being overweight and suffering from obesity than their urban counterparts. This paper aimed to understand the environmental factors that influence physical activity among rural adults in Montana. Eight built environment audits, 15 resident focus groups, and 24 key informant interviews were conducted between August and December 2014. Themes were triangulated and summarized into five categories of environmental factors: built, social, organizational, policy, and natural environments. Although the existence of active living features was documented by environmental audits, residents and key informants agreed that additional indoor recreation facilities and more well-maintained and conveniently located options were needed. Residents and key informants also agreed on the importance of age-specific, well-promoted, and structured physical activity programs, offered in socially supportive environments, as facilitators to physical activity. Key informants, however, noted that funding constraints and limited political will were barriers to developing these opportunities. Since building new recreational facilities and structures to support active transportation pose resource challenges, especially for rural communities, our results suggest that enhancing existing features, making small improvements, and involving stakeholders in the city planning process would be more fruitful to build momentum towards larger changes.

  14. Environmental Influences on Physical Activity among Rural Adults in Montana, United States: Views from Built Environment Audits, Resident Focus Groups, and Key Informant Interviews.

    Science.gov (United States)

    Lo, Brian K; Morgan, Emily H; Folta, Sara C; Graham, Meredith L; Paul, Lynn C; Nelson, Miriam E; Jew, Nicolette V; Moffat, Laurel F; Seguin, Rebecca A

    2017-10-04

    Rural populations in the United States have lower physical activity levels and are at a higher risk of being overweight and suffering from obesity than their urban counterparts. This paper aimed to understand the environmental factors that influence physical activity among rural adults in Montana. Eight built environment audits, 15 resident focus groups, and 24 key informant interviews were conducted between August and December 2014. Themes were triangulated and summarized into five categories of environmental factors: built, social, organizational, policy, and natural environments. Although the existence of active living features was documented by environmental audits, residents and key informants agreed that additional indoor recreation facilities and more well-maintained and conveniently located options were needed. Residents and key informants also agreed on the importance of age-specific, well-promoted, and structured physical activity programs, offered in socially supportive environments, as facilitators to physical activity. Key informants, however, noted that funding constraints and limited political will were barriers to developing these opportunities. Since building new recreational facilities and structures to support active transportation pose resource challenges, especially for rural communities, our results suggest that enhancing existing features, making small improvements, and involving stakeholders in the city planning process would be more fruitful to build momentum towards larger changes.

  15. Information searching trends through digital media channels and the impact of key words on customer’s response

    OpenAIRE

    Vidmar, Emanuel

    2014-01-01

    In the modern world digital media channels, especially ones accessible via browsers, have an extreme influence on consumer decision process. This diploma thesis analyses the trends of information searching as well as the influence of search marketing on search engine performance. Search engines are the basic tools for finding and collecting information, both of which are crucial in consumer decision processes. The thesis continues with an overview of a modern consumer’s information searching ...

  16. 22 CFR 72.14 - Nominal possession; property not normally taken into physical possession.

    Science.gov (United States)

    2010-04-01

    ... possession. (a) When a consular officer take articles of a decedent's personal property from a foreign... Department discharging the consular officer of any responsibility for the articles transferred. (b) A... effects; (2) Motor vehicles, airplanes or watercraft; (3) Toiletries, such as toothpaste or razors; (4...

  17. Information dissemination and training: two key issues for consolidating and strengthening the results of health telematic projects.

    Science.gov (United States)

    Arcarese, T; Boi, S; Gagliardi, R

    2000-01-01

    The concepts expressed in this paper concerns the activities to be developed within HEALTHLINE, a European project under the Telematics Application programme. HEALTHLINE is an umbrella project which takes initiatives and provides links to other international projects on health telematics. The projects involved are NIVEMES and RISE; they represent the starting point from which a common approach will be developed. The experience gained from these projects has highlighted two emerging requirements: information dissemination and training. To fulfil the needs of information, an Internet corner will be set up; it will allow citizens and health professionals to find and exchange information as well as to discuss themes concerning health care. Due to the most advanced technologies recently introduced, the Health care sector has had to modify its traditional ways of working to aid professionals in exploiting new training techniques and Health Care provision methods. HEALTHLINE will focus on training and on the development of the use of new tools and services. Furthermore, the project will exploit the training methodologies based on multimedia technology for developing training-on-the-job modules. The entire system, in its final stage, will consist of a network for co-operating training and information dissemination; European sites in the project will share information, training material and provide education and information on tele-health, medical and health-care issues to health care providers, beneficiaries and the general public.

  18. Understanding Barriers and Facilitators to Breast and Cervical Cancer Screening among Muslim Women in New York City: Perspectives from Key Informants.

    Science.gov (United States)

    Islam, Nadia; Patel, Shilpa; Brooks-Griffin, Quanza; Kemp, Patrice; Raveis, Victoria; Riley, Lindsey; Gummi, Sindhura; Nur, Potrirankamanis Queano; Ravenell, Joseph; Cole, Helen; Kwon, Simona

    2017-01-01

    Muslims are one of the fastest growing religious groups in the US. However, little is known about their health disparities, and how their unique cultural, religious, and social beliefs and practices affect health behaviors and outcomes. Studies demonstrate Muslim women may have lower rates of breast and cervical cancer screening compared to the overall population. The purpose of this study was to: 1) conduct key-informant interviews with Muslim community leaders in New York City (NYC), to understand contextual factors that impact Muslim women's beliefs and practices regarding breast and cervical cancer screening; and 2) inform the development and implementation of a research study on breast and cervical cancer screening among Muslims. Twelve key-informant interviews were conducted. The sample included imams, female religious leaders, physicians, community-based organization leaders, and social service representatives. The interview guide assessed: 1) unique healthcare barriers faced by Muslim women; 2) cultural and social considerations in conducting research; 3) potential strategies for increasing screening in this population; and 4) content and venues for culturally tailored programming and messaging. Key informants noted structure and culture as barriers and religion as a facilitator to breast and cervical cancer screening. Themes regarding the development of targeted health campaigns to increase screening included the importance of educational and in-language materials and messaging, and engaging mosques and religious leaders for dissemination. Although Muslim women face a number of barriers to screening, religious beliefs and support structures can be leveraged to facilitate screening and enhance the dissemination and promotion of screening.

  19. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  20. Information on the Schacht Asse II. Key aspect concentration; Informationen ueber die Schachtanlage Asse II. Schwerpukt Konzentration

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2016-11-15

    The information brochure on the Schacht Asse II covers the following issues: without the main mine fan the operation of Asse II would not be possible; the site selection for a final repository as a democratic challenge; the final radioactive waste disposal management in Germany, Asse, Morsleben and Konrad are rather close.

  1. Dissemination of public health information: key tools utilised by the NECOBELAC network in Europe and Latin America.

    Science.gov (United States)

    De Castro, Paola; Marsili, Daniela; Poltronieri, Elisabetta; Calderón, Carlos Agudelo

    2012-06-01

     Open Access (OA) to scientific information is an important step forward in communication patterns, yet we still need to reinforce OA principles to promote a cultural change of traditional publishing practices. The advantages of free access to scientific information are even more evident in public health where knowledge is directly associated with human wellbeing.  An OA 'consolidation' initiative in public health is presented to show how the involvement of people and institutions is fundamental to create awareness on OA and promote a cultural change. This initiative is developed within the project NEtwork of COllaboration Between Europe and Latin American Caribbean countries (NECOBELAC), financed by the European Commission.  Three actions are envisaged: Capacity building through a flexible and sustainable training programme on scientific writing and OA publishing; creation of training tools based on semantic web technologies; development of a network of supporting institutions.  In 2010-2011, 23 training initiatives were performed involving 856 participants from 15 countries; topic maps on scientific publication and OA were produced; 195 institutions are included in the network.  Cultural change in scientific dissemination practices is a long process requiring a flexible approach and strong commitment by all stakeholders. © 2012 The authors. Health Information and Libraries Journal © 2012 Health Libraries Group Health Information and Libraries Journal.

  2. Feasibility of Key Star Wars Technology at Center of Debate over Information a Cal. Laboratory Gave Government.

    Science.gov (United States)

    McDonald, Kim

    1988-01-01

    The question of whether a university is responsible for the technical accuracy of information released by senior administrators of a laboratory it is charged with overseeing is examined in the case involving a dispute at the Lawrence Livermore National Laboratory that is overseen by the University of California. (MLW)

  3. Key Factors for the Development of a Culturally Appropriate Interactive Multimedia Informative Program for Aboriginal Health Workers

    Science.gov (United States)

    El Sayed, Faeka; Soar, Jeffrey; Wang, Zoe

    2012-01-01

    This research aims to create and evaluate a model for a culturally appropriate, interactive, multimedia and informative health program for Aboriginal and Torres Strait Islander health workers that aims to improve the capacity to independently control their learning within an attractive learning environment. The research also aims to provide…

  4. Key Factors that Influence the Diffusion and Infusion of Information and Communication Technologies in Kenyan Higher Education

    Science.gov (United States)

    Macharia, Jimmy K. N.; Pelser, Theunis G.

    2014-01-01

    Previous studies have shown that in the higher education sector, information and communication technology (ICT) provides the impetus for change from the traditional concepts of teaching and learning, as well as prime motivation behind the change in scholarly and professional activities. This underscores the importance of ICT in higher education in…

  5. The expected value of possession in professional rugby league match-play.

    Science.gov (United States)

    Kempton, Thomas; Kennedy, Nicholas; Coutts, Aaron J

    2016-01-01

    This study estimated the expected point value for starting possessions in different field locations during rugby league match-play and calculated the mean expected points for each subsequent play during the possession. It also examined the origin of tries scored according to the method of gaining possession. Play-by-play data were taken from all 768 regular-season National Rugby League (NRL) matches during 2010-2013. A probabilistic model estimated the expected point outcome based on the net difference in points scored by a team in possession in a given situation. An iterative method was used to approximate the value of each situation based on actual scoring outcomes. Possessions commencing close to the opposition's goal-line had the highest expected point equity, which decreased as the location of the possession moved towards the team's own goal-line. Possessions following an opposition error, penalty or goal-line dropout had the highest likelihood of a try being scored on the set subsequent to their occurrence. In contrast, possessions that follow an opposition completed set or a restart were least likely to result in a try. The expected point values framework from our model has applications for informing playing strategy and assessing individual and team performance in professional rugby league.

  6. Possession States: Approaches to Clinical Evaluation and Classification

    Directory of Open Access Journals (Sweden)

    S. McCormick

    1992-01-01

    Full Text Available The fields of anthropology and sociology have produced a large quantity of literature on possession states, physicians however rarely report on such phenomena. As a result clinical description of possession states has suffered, even though these states may be more common and less deviant than supposed. Both ICD-10 and DSM-IV may include specific criteria for possession disorders. The authors briefly review Western notions about possession and kindred states and present guidelines for evaluation and classification.

  7. A reliable user authentication and key agreement scheme for Web-based Hospital-acquired Infection Surveillance Information System.

    Science.gov (United States)

    Wu, Zhen-Yu; Tseng, Yi-Ju; Chung, Yufang; Chen, Yee-Chun; Lai, Feipei

    2012-08-01

    With the rapid development of the Internet, both digitization and electronic orientation are required on various applications in the daily life. For hospital-acquired infection control, a Web-based Hospital-acquired Infection Surveillance System was implemented. Clinical data from different hospitals and systems were collected and analyzed. The hospital-acquired infection screening rules in this system utilized this information to detect different patterns of defined hospital-acquired infection. Moreover, these data were integrated into the user interface of a signal entry point to assist physicians and healthcare providers in making decisions. Based on Service-Oriented Architecture, web-service techniques which were suitable for integrating heterogeneous platforms, protocols, and applications, were used. In summary, this system simplifies the workflow of hospital infection control and improves the healthcare quality. However, it is probable for attackers to intercept the process of data transmission or access to the user interface. To tackle the illegal access and to prevent the information from being stolen during transmission over the insecure Internet, a password-based user authentication scheme is proposed for information integrity.

  8. Prevalence and causes of severe visual impairment and blindness among children in the lorestan province of iran, using the key informant method.

    Science.gov (United States)

    Razavi, Hessom; Kuper, Hannah; Rezvan, Farhad; Amelie, Khatere; Mahboobi-Pur, Hassan; Oladi, Mohammad Reza; Muhit, Mohammad; Hashemi, Hassan

    2010-03-01

    To estimate the prevalence and causes of severe visual impairment and blindness among children in Lorestan province of Iran, and to assess the feasibility of the Key Informant Method in this setting. Potential cases were identified using the Key Informant Method, in 3 counties of Lorestan province during June through August 2008, and referred for examination. Causes of severe visual impairment/blindness were determined and categorized using standard World Health Organization methods. Of 123 children referred for examination, 27 children were confirmed to have severe visual impairment/blindness or blindness. The median age was11 years (interquartile range 6-13), and 59% were girls. After adjusting for non-attenders, the estimated prevalence of severe visual impairment/blindness was 0.04% (0.03-0.05). The main site of abnormality was retina (44%), followed by disorders of the whole eye (33%). The majority of causes had a hereditary etiology (70%), which was associated with a family history of blindness (P = 0.002). Potentially avoidable causes of severe visual impairment/blindness were found in 14 children (52%). Almost all children with severe visual impairment/blindness had a history of parental consanguinity (93%). Our findings suggest a moderate prevalence of childhood blindness in the Lorestan province of Iran, a high proportion of which may be avoidable, given improved access to ophthalmic and genetic counselling services in rural areas. The Key Informant Method is feasible in Iran; future research is discussed.

  9. Information technology as a key enabler in preparing for competition: ComEd's Kincaid Generating Station, a work in progress

    International Nuclear Information System (INIS)

    Borth, F.C. III; Thompson, J.W.; Mishaga, J.M.

    1996-01-01

    Through ComEd Fossil (Generating) Division's Competitive Action Plan (CAP) evaluation changes have been identified which are necessary to improve generating station performance. These changes are intended to improve both station reliability and financial margins, and are essential for stations to be successful in a competitive marketplace. Plant upgrades, advanced equipment stewardship, and personnel reductions have been identified as necessary steps in achieving industry leadership and competitive advantage. To deal effectively with plant systems and contend in the competitive marketplace Information Technology (IT) solutions to business problems are being developed. Data acquisition, storage, and retrieval are being automated through use of state-of-the-art Data Historians. Total plant, high resolution, long term process information will be accessed through Local/Wide Area Networks (LAN/WAN) connections from desktop PC's. Generating unit Thermal Performance Monitors accessing the Data Historian will analyze plant and system performance enabling reductions in operating costs, and improvements in process control. As inputs to proactive maintenance toolsets this data allows anticipation of equipment service needs, advanced service scheduling, and cost/benefit analysis. The ultimate goal is to optimize repair needs with revenue generation. Advanced applications building upon these foundations will bring knowledge of the costs associated with all the products a generating station offers its customer(s). An overall design philosophy along with preliminary results is presented; these results include shortfalls, lessons learned, and future options

  10. Factors associated with patient recall of key information in ambulatory specialty care visits: Results of an innovative methodology.

    Science.gov (United States)

    Laws, M Barton; Lee, Yoojin; Taubin, Tatiana; Rogers, William H; Wilson, Ira B

    2018-01-01

    While some studies have assessed patient recall of important information from ambulatory care visits, none has done so recently. Furthermore, little is known about features of clinical interactions which are associated with patient understanding and recall, without which shared decision making, a widely shared ideal for patient care, cannot occur. Our objective was to evaluate characteristics of patients and outpatient encounters associated with patient recall of information after one week, along with observation of elements of shared decision making. This was an observational study based on coded transcripts of 189 outpatient encounters, and post-visit interviews with patients 1 week later. Coding used three previously validated systems, adopted for this study. Forty-nine percent of decisions and recommendations were recalled accurately without prompting; 36% recalled with a prompt; 15% recalled erroneously or not at all. Provider behaviors hypothesized to be associated with patient recall, such as open-questioning and "teach back," were rare. Patients with less than high school education recalled 38% of items freely and accurately, while patients with a college degree recalled 65% (p total number of items to be recalled per visit, and percentage of utterances in decision-making processes by the provider ("verbal dominance"), were significant predictors of poorer recall. The item count was associated with poorer recall for lower, but not higher, educated patients.

  11. Key outcomes from stakeholder workshops at a symposium to inform the development of an Australian national plan for rare diseases

    Directory of Open Access Journals (Sweden)

    Molster Caron

    2012-08-01

    Full Text Available Abstract Background Calls have been made for governments to adopt a cohesive approach to rare diseases through the development of national plans. At present, Australia does not have a national plan for rare diseases. To progress such a plan an inaugural Australian Rare Diseases Symposium was held in Western Australia in April 2011. This paper describes the key issues identified by symposium attendees for the development of a national plan, compares these to the content of EUROPLAN and national plans elsewhere and discusses how the outcomes might be integrated for national planning. Methods The symposium was comprised of a series of plenary sessions followed by workshops. The topics covered were; 1 Development of national plans for rare diseases; 2 Patient empowerment; 3 Patient care, support and management; 4 Research and translation; 5 Networks, partnerships and collaboration. All stakeholders within the rare diseases community were invited to participate, including: people affected by rare diseases such as patients, carers, and families; clinicians and allied health practitioners; social and disability services; researchers; patient support groups; industry (e.g. pharmaceutical, biotechnology and medical device companies; regulators and policy-makers. Results All of these stakeholder groups were represented at the symposium. Workshop participants indicated the need for a national plan, a national peak body, a standard definition of ‘rare diseases’, education campaigns, lobbying of government, research infrastructure, streamlined whole-of-lifetime service provision, case co-ordination, early diagnosis, support for health professionals and dedicated funding. Conclusions These findings are consistent with frameworks and initiatives being undertaken internationally (such as EUROPLAN, and with national plans in other countries. This implies that the development of an Australian national plan could plausibly draw on frameworks for plan

  12. Key outcomes from stakeholder workshops at a symposium to inform the development of an Australian national plan for rare diseases.

    Science.gov (United States)

    Molster, Caron; Youngs, Leanne; Hammond, Emma; Dawkins, Hugh

    2012-08-10

    Calls have been made for governments to adopt a cohesive approach to rare diseases through the development of national plans. At present, Australia does not have a national plan for rare diseases. To progress such a plan an inaugural Australian Rare Diseases Symposium was held in Western Australia in April 2011. This paper describes the key issues identified by symposium attendees for the development of a national plan, compares these to the content of EUROPLAN and national plans elsewhere and discusses how the outcomes might be integrated for national planning. The symposium was comprised of a series of plenary sessions followed by workshops. The topics covered were; 1) Development of national plans for rare diseases; 2) Patient empowerment; 3) Patient care, support and management; 4) Research and translation; 5) Networks, partnerships and collaboration. All stakeholders within the rare diseases community were invited to participate, including: people affected by rare diseases such as patients, carers, and families; clinicians and allied health practitioners; social and disability services; researchers; patient support groups; industry (e.g. pharmaceutical, biotechnology and medical device companies); regulators and policy-makers. All of these stakeholder groups were represented at the symposium. Workshop participants indicated the need for a national plan, a national peak body, a standard definition of 'rare diseases', education campaigns, lobbying of government, research infrastructure, streamlined whole-of-lifetime service provision, case co-ordination, early diagnosis, support for health professionals and dedicated funding. These findings are consistent with frameworks and initiatives being undertaken internationally (such as EUROPLAN), and with national plans in other countries. This implies that the development of an Australian national plan could plausibly draw on frameworks for plan development that have been proposed for use in other jurisdictions. The

  13. Health-care users, key community informants and primary health care workers' views on health, health promotion, health assets and deficits: qualitative study in seven Spanish regions.

    Science.gov (United States)

    Pons-Vigués, Mariona; Berenguera, Anna; Coma-Auli, Núria; Pombo-Ramos, Haizea; March, Sebastià; Asensio-Martínez, Angela; Moreno-Peral, Patricia; Mora-Simón, Sara; Martínez-Andrés, Maria; Pujol-Ribera, Enriqueta

    2017-06-13

    Although some articles have analysed the definitions of health and health promotion from the perspective of health-care users and health care professionals, no published studies include the simultaneous participation of health-care users, primary health care professionals and key community informants. Understanding the perception of health and health promotion amongst these different stakeholders is crucial for the design and implementation of successful, equitable and sustainable measures that improve the health and wellbeing of populations. Furthermore, the identification of different health assets and deficits by the different informants will generate new evidence to promote healthy behaviours, improve community health and wellbeing and reduce preventable inequalities. The objective of this study is to explore the concept of health and health promotion and to compare health assets and deficits as identified by health-care users, key community informants and primary health care workers with the ultimate purpose to collect the necessary data for the design and implementation of a successful health promotion intervention. A descriptive-interpretive qualitative research was conducted with 276 participants from 14 primary care centres of 7 Spanish regions. Theoretical sampling was used for selection. We organized 11 discussion groups and 2 triangular groups with health-care users; 30 semi-structured interviews with key community informants; and 14 discussion groups with primary health care workers. A thematic content analysis was carried out. Health-care users and key community informants agree that health is a complex, broad, multifactorial concept that encompasses several interrelated dimensions (physical, psychological-emotional, social, occupational, intellectual, spiritual and environmental). The three participants' profiles consider health promotion indispensable despite defining it as complex and vague. In fact, most health-care users admit to having

  14. Information and Communication Technologies (ICT) as keys to the enhancement of public awareness about potential earth impacts

    Science.gov (United States)

    Usikov, Denis A.

    2013-09-01

    The 2007 Planetary Defense Conference recommends "to provide or enhance Internet sites to show how threats evolve and to illustrate possible action scenarios". Thereby, establishment of informational and communicational AsteroidAware web-site with the exact, authentic data about the past and the present of Earth's impact events will assist in achievement of positive results and progress in different directions on political, international, social and scientific levels. Expanded ICT's capabilities for popularization of planetary defense can help in resolving the problem of low public interest. The project's primary intent lies in popularizing the concept of planetary defenses and attracting attention to the potential dangers that threaten the Earth from outer space. The result of the efforts falling into the boundaries of this project would be an increased amount of social participation in the process of developing solutions for and increasing awareness of potential collisions between various astral bodies and the Earth. The project is also aimed at creating a foundation for the interaction between scientists and executives from around the world to facilitate international efforts of searching for fitting measures towards lowering threat levels and developing strategies revolving around united actions against potential threats.

  15. Phase information of time-frequency transforms as a key feature for classification of atrial fibrillation episodes

    International Nuclear Information System (INIS)

    Ortigosa, Nuria; Fernández, Carmen; Galbis, Antonio; Cano, Óscar

    2015-01-01

    Patients suffering from atrial fibrillation can be classified into different subtypes, according to the temporal pattern of the arrhythmia and its recurrence. Nowadays, clinicians cannot differentiate a priori between the different subtypes, and patient classification is done afterwards, when its clinical course is available. In this paper we present a comparison of classification performances when differentiating paroxysmal and persistent atrial fibrillation episodes by means of support vector machines. We analyze short surface electrocardiogram recordings by extracting modulus and phase features from several time-frequency transforms: short-time Fourier transform, Wigner–Ville, Choi–Williams, Stockwell transform, and general Fourier-family transform. Overall, accuracy higher than 81% is obtained when classifying phase information features of real test ECGs from a heterogeneous cohort of patients (in terms of progression of the arrhythmia and antiarrhythmic treatment) recorded in a tertiary center. Therefore, phase features can facilitate the clinicians’ choice of the most appropriate treatment for each patient by means of a non-invasive technique (the surface ECG). (paper)

  16. Economic and Physical Linkages of the Information and Communication Technology (ICT) Service Industry to Key Industries of the Economy: An Ad Hoc Report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, David M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hoffman, Michael G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Niemeyer, Jackie M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Samuel, Todd J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-01-04

    This report examines the information and communications technology (ICT) services industry in response to an inquiry by the Department of Energy’s (DOE’s) Office of Energy Policy and Systems Analysis. The report answers several key questions: •How has the reliance on ICT services evolved in recent years for key infrastructure services such as air travel, freight transport, electricity and natural gas distribution, financial services, and critical health care, and for the household sector? •What ICT industry trends explain continued strong linkage to and reliance upon ICT? •What is the ICT industry’s reliance on grid-supplied power, uninterruptible power supplies, emergency generators and back-up energy storage technologies? •What are the observed direct effects of ICT disruptions induced by electrical system failures in recent history and how resilient are the components of the ICT industry?

  17. The effect of touch-key size on the usability of In-Vehicle Information Systems and driving safety during simulated driving.

    Science.gov (United States)

    Kim, Heejin; Kwon, Sunghyuk; Heo, Jiyoon; Lee, Hojin; Chung, Min K

    2014-05-01

    Investigating the effect of touch-key size on usability of In-Vehicle Information Systems (IVISs) is one of the most important research issues since it is closely related to safety issues besides its usability. This study investigated the effects of the touch-key size of IVISs with respect to safety issues (the standard deviation of lane position, the speed variation, the total glance time, the mean glance time, the mean time between glances, and the mean number of glances) and the usability of IVISs (the task completion time, error rate, subjective preference, and NASA-TLX) through a driving simulation. A total of 30 drivers participated in the task of entering 5-digit numbers with various touch-key sizes while performing simulated driving. The size of the touch-key was 7.5 mm, 12.5 mm, 17.5 mm, 22.5 mm and 27.5 mm, and the speed of driving was set to 0 km/h (stationary state), 50 km/h and 100 km/h. As a result, both the driving safety and the usability of the IVISs increased as the touch-key size increased up to a certain size (17.5 mm in this study), at which they reached asymptotes. We performed Fitts' law analysis of our data, and this revealed that the data from the dual task experiment did not follow Fitts' law. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  18. A mental health needs assessment of children and adolescents in post-conflict Liberia: results from a quantitative key-informant survey

    Science.gov (United States)

    Borba, Christina P.C.; Ng, Lauren C.; Stevenson, Anne; Vesga-Lopez, Oriana; Harris, Benjamin L.; Parnarouskis, Lindsey; Gray, Deborah A.; Carney, Julia R.; Domínguez, Silvia; Wang, Edward K.S.; Boxill, Ryan; Song, Suzan J.; Henderson, David C.

    2016-01-01

    Between 1989 and 2004, Liberia experienced a devastating civil war that resulted in widespread trauma with almost no mental health infrastructure to help citizens cope. In 2009, the Liberian Ministry of Health and Social Welfare collaborated with researchers from Massachusetts General Hospital to conduct a rapid needs assessment survey in Liberia with local key informants (n = 171) to examine the impact of war and post-war events on emotional and behavioral problems of, functional limitations of, and appropriate treatment settings for Liberian youth aged 5–22. War exposure and post-conflict sexual violence, poverty, infectious disease and parental death negatively impacted youth mental health. Key informants perceived that youth displayed internalizing and externalizing symptoms and mental health-related functional impairment at home, school, work and in relationships. Medical clinics were identified as the most appropriate setting for mental health services. Youth in Liberia continue to endure the harsh social, economic and material conditions of everyday life in a protracted post-conflict state, and have significant mental health needs. Their observed functional impairment due to mental health issues further limited their access to protective factors such as education, employment and positive social relationships. Results from this study informed Liberia's first post-conflict mental health policy. PMID:26807147

  19. A Symmetric Key Cryptographic Technique Through Swapping Bits in Binary Field Using p-Box Matrix

    OpenAIRE

    Subhranil Som; Soumasree Banerjee

    2014-01-01

    In this paper a symmetric key cryptographic algorithm named as “A Symmetric Key Cryptographic Technique Through Swapping Bits in Binary Field Using p-box Matrix“ is proposed. Secret sharing is a technique by which any information can be break down into small pieces. The secret can be reconstructed only when a sufficient number of pieces of shares are combined together; individual shares are of no use on their own. Traditional secret sharing scheme possesses high computational ...

  20. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  1. Possession experiences in dissociative identity disorder: a preliminary study.

    Science.gov (United States)

    Ross, Colin A

    2011-01-01

    Dissociative trance disorder, which includes possession experiences, was introduced as a provisional diagnosis requiring further study in the Diagnostic and Statistical Manual of Mental Disorders (4th ed.). Consideration is now being given to including possession experiences within dissociative identity disorder (DID) in the Diagnostic and Statistical Manual of Mental Disorders (5th ed.), which is due to be published in 2013. In order to provide empirical data relevant to the relationship between DID and possession states, I analyzed data on the prevalence of trance, possession states, sleepwalking, and paranormal experiences in 3 large samples: patients with DID from North America; psychiatric outpatients from Shanghai, China; and a general population sample from Winnipeg, Canada. Trance, sleepwalking, paranormal, and possession experiences were much more common in the DID patients than in the 2 comparison samples. The study is preliminary and exploratory in nature because the samples were not matched in any way.

  2. Supporting parents following childhood traumatic brain injury: a qualitative study to examine information and emotional support needs across key care transitions.

    Science.gov (United States)

    Kirk, S; Fallon, D; Fraser, C; Robinson, G; Vassallo, G

    2015-03-01

    Traumatic brain injury (TBI) is the leading cause of death and acquired disability in childhood. Research has demonstrated that TBI can lead to long-term physical, cognitive, emotional and behavioural difficulties for children and parental stress. Less is known about how parents experience a childhood brain injury and their information and support needs. This study aimed to examine parents' experiences and support needs following a childhood TBI from the time of the accident to their child's discharge home. Qualitative semi-structured interviews were conducted with 29 parents/carers of children who had experienced a severe TBI. Participants were recruited from one children's tertiary centre in the UK. Data were analysed using the Framework approach. Parents had unmet information and emotional support needs across the care trajectory from the time of the accident to their child's return home. Information needs related to the impact of the TBI on their child; current and future treatment/rehabilitation plans; helping their child and managing their behaviour; accessing services/support. They lacked information and support for care transitions. In different settings parents faced particular barriers to having their information needs met. Parents' felt they needed emotional support in coming to terms with witnessing the accident and the loss of their former child. Lack of community support related not only to service availability but to a general lack of understanding of the impact of TBI on children, particularly when this was invisible. Overall parents felt unsupported in coping with children's behavioural and psychological difficulties. Taking a holistic approach to examining parents' experiences and support needs has enabled their changing needs to be highlighted across key care transitions within hospital and community settings and the service implications identified. Improvements in care co-ordination across care transitions are needed to ensure continuity of care

  3. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2014-09-01

    Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.

  4. Improving comprehension and recall of information for an HIV vaccine trial among women at risk for HIV: reading level simplification and inclusion of pictures to illustrate key concepts.

    Science.gov (United States)

    Murphy, D A; O'Keefe, Z H; Kaufman, A H

    1999-10-01

    A simplified version of the prototype HIV vaccine material was developed through (a) reducing reading grade level, (b) restructuring of the organization and categorization of the material, (c) adding pictures designed to emphasize key concepts, and (d) obtaining feedback on the simplified version through focus groups with the target population. Low-income women at risk for HIV (N = 141) recruited from a primary care clinic were randomly assigned to be presented the standard or the simplified version. There were no significant differences between the groups in terms of education or Vocabulary, Block Design, and Passage Comprehension scores. Women who received the simplified version had significantly higher comprehension scores immediately following presentation of the material than did women who received the standard version and were also significantly more likely to recall study benefits and risks. These findings were maintained at 3-month follow-up. Implications for informed consent are discussed.

  5. Key stakeholder perceptions about consent to participate in acute illness research: a rapid, systematic review to inform epi/pandemic research preparedness.

    Science.gov (United States)

    Gobat, Nina H; Gal, Micaela; Francis, Nick A; Hood, Kerenza; Watkins, Angela; Turner, Jill; Moore, Ronald; Webb, Steve A R; Butler, Christopher C; Nichol, Alistair

    2015-12-29

    A rigorous research response is required to inform clinical and public health decision-making during an epi/pandemic. However, the ethical conduct of such research, which often involves critically ill patients, may be complicated by the diminished capacity to consent and an imperative to initiate trial therapies within short time frames. Alternative approaches to taking prospective informed consent may therefore be used. We aimed to rapidly review evidence on key stakeholder (patients, their proxy decision-makers, clinicians and regulators) views concerning the acceptability of various approaches for obtaining consent relevant to pandemic-related acute illness research. We conducted a rapid evidence review, using the Internet, database and hand-searching for English language empirical publications from 1996 to 2014 on stakeholder opinions of consent models (prospective informed, third-party, deferred, or waived) used in acute illness research. We excluded research on consent to treatment, screening, or other such procedures, non-emergency research and secondary studies. Papers were categorised, and data summarised using narrative synthesis. We screened 689 citations, reviewed 104 full-text articles and included 52. Just one paper related specifically to pandemic research. In other emergency research contexts potential research participants, clinicians and research staff found third-party, deferred, and waived consent to be acceptable as a means to feasibly conduct such research. Acceptability to potential participants was motivated by altruism, trust in the medical community, and perceived value in medical research and decreased as the perceived risks associated with participation increased. Discrepancies were observed in the acceptability of the concept and application or experience of alternative consent models. Patients accepted clinicians acting as proxy-decision makers, with preference for two decision makers as invasiveness of interventions increased

  6. 20 CFR 404.1093 - Possession of the United States.

    Science.gov (United States)

    2010-04-01

    ... DISABILITY INSURANCE (1950- ) Employment, Wages, Self-Employment, and Self-Employment Income Self-Employment... figuring your net earnings from self-employment, the term possession of the United States shall be deemed...

  7. Mental illness complicated by the santeria belief in spirit possession.

    Science.gov (United States)

    Alonso, L; Jeffrey, W D

    1988-11-01

    Santeria, a religious system that blends African and Catholic beliefs, is practiced by many Cuban Americans. One aspect of this system is the belief in spirit possession. Basic santeria beliefs and rituals, including the fiesta santera (a gathering at which some participants may become possessed), are briefly described, and four cases in which the patients' belief in possession played a role in their mental illness are presented. The belief in possession can complicate the diagnosis and treatment of mental illness, but it should not be considered a culture-bound syndrome. Rather, it may be a nonspecific symptom of a variety of mental illnesses and should be evaluated in the context of the patient's overall belief system and ability to carry out usual activities.

  8. Constitutional Law: Right of Privacy--Possession of Marijuana

    Science.gov (United States)

    Rohrer, David E.

    1976-01-01

    The Alaska Supreme Court in Ravin v. State accepted the defendant's contention that the prohibition of possession of marihuana infringed on his constitutional right to privacy. The significance of the case is discussed. (LBH)

  9. The epistemological significance of possession entering the DSM.

    Science.gov (United States)

    Stephenson, Craig

    2015-09-01

    The discourse of the American Psychiatric Association's DSM reflects the inherently dialogic or contradictory nature of its stated mandate to demonstrate both 'nosological completeness' and cultural 'inclusiveness'. Psychiatry employs the dialogic discourse of the DSM in a one-sided, positivistic manner by identifying what it considers universal mental disease entities stripped of their cultural context. In 1992 the editors of the Diagnostic and Statistical Manual of Mental Disorders proposed to introduce possession into their revisions. A survey of the discussions about introducing 'possession' as a dissociative disorder to be listed in the DSM-IV indicates a missed epistemological break. Subsequently the editors of the DSM-5 politically 'recuperated' possession into its official discourse, without acknowledging the anarchic challenges that possession presents to psychiatry as a cultural practice. © The Author(s) 2015.

  10. Criminalization of 'Possession of Unexplained Property' and the ...

    African Journals Online (AJOL)

    Worku_Y

    government operating costs, increases government spending for wages and ... revenues by plundering revenue generating agencies such as tax collection, ..... a) the assets under the ownership or possession of himself and his family; and.

  11. Condiciones de trabajo y salud en inmigrantes (Proyecto ITSAL: entrevistas a informantes clave Occupational health of immigrant workers in Spain [ITSAL Project]: key informants survey

    Directory of Open Access Journals (Sweden)

    Ana M. García

    2009-04-01

    health situation of immigrant workers in Spain through key informants. Method: We performed a qualitative, exploratory and descriptive study using indepth interviews carried out in 2006. Organizations and associations working with immigrant collectives in Alicante, Barcelona, Huelva, Madrid and Valencia were identified and the most representative and accessible entities in each location were selected. Fortythree interviews were performed with key informants from 34 different organisms. A narrative content analysis was performed. Results: Informants described difficulties in having health problems recognized as workrelated, due to irregular and precarious employment, employers' and insurance companies' reluctance, and immigrants' lack of knowledge. Informants coincided in reporting that the occupational risks for immigrant workers did not differ from those affecting Spanish workers in the same occupations and circumstances. However, exposure to occupational risks was exacerbated in immigrants because of their greater presence in unqualified jobs and their economic need to prolong working hours. Immigrants had little knowledge of their occupational health and safetyrelated rights, although some informants detected an increase in empowerment in this area, mostly through greater participation in trade unions. Conclusions: This first step allowed us to identify some of the general factors influencing the health and safety of immigrant workers in Spain. This information will be used in a longterm, ongoing research project [Project Immigration, Work and Health (Proyecto Inmigración, Trabajo y Salud [ITSAL], which aims to evaluate occupational health problems in inmigrants working in Spain through both qualitative and quantitative methods.

  12. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  13. Investigating the Impact of Possession-Way of a Smartphone on Action Recognition

    Directory of Open Access Journals (Sweden)

    Zae Myung Kim

    2016-06-01

    Full Text Available For the past few decades, action recognition has been attracting many researchers due to its wide use in a variety of applications. Especially with the increasing number of smartphone users, many studies have been conducted using sensors within a smartphone. However, a lot of these studies assume that the users carry the device in specific ways such as by hand, in a pocket, in a bag, etc. This paper investigates the impact of providing an action recognition system with the information of the possession-way of a smartphone, and vice versa. The experimental dataset consists of five possession-ways (hand, backpack, upper-pocket, lower-pocket, and shoulder-bag and two actions (walking and running gathered by seven users separately. Various machine learning models including recurrent neural network architectures are employed to explore the relationship between the action recognition and the possession-way recognition. The experimental results show that the assumption of possession-ways of smartphones do affect the performance of action recognition, and vice versa. The results also reveal that a good performance is achieved when both actions and possession-ways are recognized simultaneously.

  14. Possessive Pronouns in European Portuguese and Old French

    Directory of Open Access Journals (Sweden)

    Matilde Miguel

    2002-12-01

    Full Text Available The aim of this paper is to bring European Portuguese (EP data into light, showing that, in spite of the lack of morphological evidence, the syntactic behaviour of possessives, across EP dialects, shows evidences for a tripartite possessive system (Cardinaletti, 1998; Cardinaletti & Starke, 1999. It will be argued that the syntactic position of possessives parallels the positions assumed for EP sentential subjects in non interrogative contexts: [Spec, AgrsP], [Spec, TP] and [Spec, VP]. As a matter of fact, depending on their syntactic properties and assuming, as null hypothesis, that the nominal head moves to Numb'º', possessives may occur in [Spec, AgrsNP], [Spec, NumbP] and [Spec, NP]. Furthermore, would it be so, this dialectal variation would be useful in order to understand the changes that have occurred in other romance languages in previous stages. It might be the case that the loss of weak possessive forms (“mien” in French parallels, among other things, the lack of sentential subjects in [Spec, TP].

  15. Critical Issues and Key Points from the Survey to the Creation of the Historical Building Information Model: the Case of Santo Stefano Basilica

    Science.gov (United States)

    Castagnetti, C.; Dubbini, M.; Ricci, P. C.; Rivola, R.; Giannini, M.; Capra, A.

    2017-05-01

    The new era of designing in architecture and civil engineering applications lies in the Building Information Modeling (BIM) approach, based on a 3D geometric model including a 3D database. This is easier for new constructions whereas, when dealing with existing buildings, the creation of the BIM is based on the accurate knowledge of the as-built construction. Such a condition is allowed by a 3D survey, often carried out with laser scanning technology or modern photogrammetry, which are able to guarantee an adequate points cloud in terms of resolution and completeness by balancing both time consuming and costs with respect to the request of final accuracy. The BIM approach for existing buildings and even more for historical buildings is not yet a well known and deeply discussed process. There are still several choices to be addressed in the process from the survey to the model and critical issues to be discussed in the modeling step, particularly when dealing with unconventional elements such as deformed geometries or historical elements. The paper describes a comprehensive workflow that goes through the survey and the modeling, allowing to focus on critical issues and key points to obtain a reliable BIM of an existing monument. The case study employed to illustrate the workflow is the Basilica of St. Stefano in Bologna (Italy), a large monumental complex with great religious, historical and architectural assets.

  16. The role of the general practitioner in the Australian approach to HIV care: interviews with 'key informants' from government, non-government and professional organisations.

    Science.gov (United States)

    Newman, Christy E; de Wit, John B F; Kippax, Susan C; Reynolds, Robert H; Canavan, Peter G; Kidd, Michael R

    2012-03-01

    HIV care is provided in a range of settings in Australia, but advances in HIV treatment and demographic and geographic changes in the affected population and general practitioner (GP) workforce are testing the sustainability of the special role for GPs. This paper explores how a group of 'key informants' described the role of the GP in the Australian approach to HIV care, and conceptualised the challenges currently inspiring debate around future models of care. A thematic analysis was conducted of semistructured interviews carried out in 2010 with 24 professionals holding senior roles in government, non-government and professional organisations that influence Australian HIV care policy. The strengths of the role of the GP were described as their community setting, collaborative partnership with other medical and health professions, and focus on patient needs. A number of associated challenges were also identified including the different needs of GPs with high and low HIV caseloads, the changing expectations of professional roles in general practice, and barriers to service accessibility for people living with HIV. While there are many advantages to delivering HIV services in primary care, GPs need flexible models of training and accreditation, support in strengthening relationships with other health and medical professionals, and assistance in achieving service accessibility. Consideration of how to support the GP workforce so that care can be made available in the broadest range of geographical and service settings is also critical if systems of HIV care delivery are to be realistic and cost-effective and meet consumer needs.

  17. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    Science.gov (United States)

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  18. Using Qualitative Comparative Analysis of Key Informant Interviews in Health Services Research: Enhancing a Study of Adjuvant Therapy Use in Breast Cancer Care.

    Science.gov (United States)

    McAlearney, Ann Scheck; Walker, Daniel; Moss, Alexandra D; Bickell, Nina A

    2016-04-01

    Qualitative comparative analysis (QCA) is a methodology created to address causal complexity in social sciences research by preserving the objectivity of quantitative data analysis without losing detail inherent in qualitative research. However, its use in health services research (HSR) is limited, and questions remain about its application in this context. To explore the strengths and weaknesses of using QCA for HSR. Using data from semistructured interviews conducted as part of a multiple case study about adjuvant treatment underuse among underserved breast cancer patients, findings were compared using qualitative approaches with and without QCA to identify strengths, challenges, and opportunities presented by QCA. Ninety administrative and clinical key informants interviewed across 10 NYC area safety net hospitals. Transcribed interviews were coded by 3 investigators using an iterative and interactive approach. Codes were calibrated for QCA, as well as examined using qualitative analysis without QCA. Relative to traditional qualitative analysis, QCA strengths include: (1) addressing causal complexity, (2) results presentation as pathways as opposed to a list, (3) identification of necessary conditions, (4) the option of fuzzy-set calibrations, and (5) QCA-specific parameters of fit that allow researchers to compare outcome pathways. Weaknesses include: (1) few guidelines and examples exist for calibrating interview data, (2) not designed to create predictive models, and (3) unidirectionality. Through its presentation of results as pathways, QCA can highlight factors most important for production of an outcome. This strength can yield unique benefits for HSR not available through other methods.

  19. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  20. A discussion of key values to inform the design and delivery of services for HIV-affected women and couples attempting pregnancy in resource-constrained settings.

    Science.gov (United States)

    Heffron, Renee; Davies, Natasha; Cooke, Ian; Kaida, Angela; Mergler, Reid; van der Poel, Sheryl; Cohen, Craig R; Mmeje, Okeoma

    2015-01-01

    HIV-affected women and couples often desire children and many accept HIV risk in order to attempt pregnancy and satisfy goals for a family. Risk reduction strategies to mitigate sexual and perinatal HIV transmission include biomedical and behavioural approaches. Current efforts to integrate HIV and reproductive health services offer prime opportunities to incorporate strategies for HIV risk reduction during pregnancy attempts. Key client and provider values about services to optimize pregnancy in the context of HIV risk provide insights for the design and implementation of large-scale "safer conception" programmes. Through our collective experience and discussions at a multi-disciplinary international World Health Organization-convened workshop to initiate the development of guidelines and an algorithm of care to support the delivery of services for HIV-affected women and couples attempting pregnancy, we identified four values that are key to the implementation of these programmes: (1) understanding fertility care and an ability to identify potential fertility problems; (2) providing equity of access to resources enabling informed decision-making about reproductive choices; (3) creating enabling environments that reduce stigma associated with HIV and infertility; and (4) creating enabling environments that encourage disclosure of HIV status and fertility status to partners. Based on these values, recommendations for programmes serving HIV-affected women and couples attempting pregnancy include the following: incorporation of comprehensive reproductive health counselling; training to support the transfer and exchange of knowledge between providers and clients; care environments that reduce the stigma of childbearing among HIV-affected women and couples; support for safe and voluntary disclosure of HIV and fertility status; and increased efforts to engage men in reproductive decision-making at times that align with women's desires. Programmes, policies and guidelines

  1. Vector correlation analysis for inelastic and reactive collisions between partners possessing spin and orbital angular momentum.

    Science.gov (United States)

    Balint-Kurti, Gabriel G; Vasyutinskii, Oleg S

    2009-12-31

    A general reactive collision of the type A + B --> C + D is considered where both the collision partners (A and B) or the products (C and D) may possess internal, i.e., spin, orbital or rotational, angular momenta. Compact expressions are derived using a rigorous quantum mechanical analysis for the angular momentum anisotropy of either of the products (C or D) arising from an initially polarized distribution of the reactant angular momentum. The angular momentum distribution of the product is expressed in terms of canonical spherical tensors multiplied by anisotropy-transforming coefficients c(K(i)q(k))(K)(K(r),L). These coefficients act as transformation coefficients between the angular momentum anisotropy of the reactants and that of the product. They are independent of scattering angle but depend on the details of the scattering dynamics. The relationship between the coefficients c(K(i)q(k))(K)(K(r),L) and the body-fixed scattering S matrix is given and the methodology for the quantum mechanical calculation of the anisotropy-transforming coefficients is clearly laid out. The anisotropy-transforming coefficients are amenable to direct experimental measurement in a similar manner to vector correlation and alignment parameters in photodissociation processes. A key aspect of the theory is the use of projections of both reactant and product angular momenta onto the product recoil vector direction. An important new conservation rule is revealed through the analysis, namely that if the state multipole for reactant angular momentum distribution has a projection q(k) onto the product recoil vector the state multipoles for the product angular momentum distribution all have this same projection. Expressions are also presented for the distribution of the product angular momentum when its components are evaluated relative to the space-fixed Z-axis. Notes with detailed derivations of all the formulas are available as Supporting Information.

  2. Themes in Spirit Possession in Ugandan Christianity | James ...

    African Journals Online (AJOL)

    . This paper discerns a number of common themes that run through many of these experiences. In particular, sex as a motif for deviance and evil is noted as a common feature of many of the possession stories and all contact with spirits is seen ...

  3. Gun Possession among Massachusetts Batterer Intervention Program Enrollees

    Science.gov (United States)

    Rothman, Emily F.; Johnson, Renee M.; Hemenway, David

    2006-01-01

    Batterers with access to firearms present a serious lethal threat to their partners. The purpose of this exploratory study is to estimate the prevalence of and risk markers for gun possession among Massachusetts men enrolled in batterer intervention programs. The authors found that 1.8% of the men reported having a gun in or around their home.…

  4. Licenses for possessing and applying radioactive sources, materials, etc

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    Commercial and governmental institutions have been licensed by Dutch authorities to possess and apply radioactive sources, materials, etc. A summary is given and the list is subdivided into a number of sections such as radioactive sources, radioactive materials, X-ray equipment and technetium-generators

  5. 46 CFR 308.504 - Definition of territories and possessions.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Definition of territories and possessions. 308.504 Section 308.504 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance I-Introduction § 308.504 Definition of territories and...

  6. Dynamics of the spirit possession phenomenon in Eastern Tanzania

    Directory of Open Access Journals (Sweden)

    Marja-Liisa Swantz

    1976-01-01

    Full Text Available The discussion on the spirit possession phenomenon is related in this study to the more general question of the role of religious institutions as part in the development process of a people living in a limited geographical area of a wider national society. It is assumed that religion, like culture in general, has its specific institutional forms as result of the historical development of a society, but at the same time religion is a force shaping that history. People's cultural resources influence their social and economic development and form a potential creative element in it'. Some of the questions to be asked are: "How are specific religious practices related to the dynamics of change in the societies in question? What is the social and religious context in which the spirit possession phenomenon occurs in them? What social and economic relations get their expression in them? To what extent is spirit possession in this case a means of exerting values and creatively overcoming a crisis or conflict which the changing social and economic relations impose on the people? The established spirit possession cults are here seen as the institutional forms of religious experience. At the same time it becomes evident that there is institutionalization in process as well as deinstitutionalization of spirit possession where it occurs outside established institutional forms. Institution is taken as a socially shared form of behaviour the significance of which is commonly recognized by those who share it. By the term spirit possession cult is meant a ritual form of spirit possession of a group which is loosely organized and without strict membership. The context of the study is four ethnic groups in Eastern Tanzania, near the coast of the Indian Ocean. The general theme of the project is The Role of Culture in the Restructuring of Tanzanian Rural Areas. The restructuring refers to a villagisation programme carried out in the whole country. People are being

  7. Workplace wellness programming in low-and middle-income countries: a qualitative study of corporate key informants in Mexico and India.

    Science.gov (United States)

    Wipfli, Heather; Zacharias, Kristin Dessie; Nivvy Hundal, Nuvjote; Shigematsu, Luz Myriam Reynales; Bahl, Deepika; Arora, Monika; Bassi, Shalini; Kumar, Shubha

    2018-05-09

    A qualitative study of key informant semi-structured interviews were conducted between March and July 2016 in Mexico and India to achieve the following aims: to explore corporations' and stakeholders' views, attitudes and expectations in relation to health, wellness and cancer prevention in two middle-income countries, and to determine options for health professions to advance their approach to workplace wellness programming globally, including identifying return-on-investment incentives for corporations to implement wellness programming. There is an unmet demand for workplace wellness resources that can be used by corporations in an international context. Corporations in India and Mexico are already implementing a range of health-related wellness programs, most often focused on disease prevention and management. A number of companies indicated interest is collecting return on investment data but lacked the knowledge and tools to carry out return-on-investment analyses. There was widespread interest in partnership with international non-governmental organizations (public health organizations) and a strong desire for follow-up among corporations interviewed, particularly in Mexico. As low-and middle-income countries continue to undergo economic transitions, the workforce and disease burden continue to evolve as well. Evidence suggests a there is a growing need for workplace wellness initiatives in low-and middle-income countries. Results from this study suggest that while corporations in India and Mexico are implementing wellness programming in some capacity, there are three areas where corporations could greatly benefit from assistance in improving wellness programming in the workplace: 1) innovative toolkits for workplace wellness initiatives and technical support for adaptation, 2) assistance with building partnerships to help implement wellness initiatives and build capacity, and 3) tools and training to collect data for surveillance as well as monitoring and

  8. Using Qualitative Comparative Analysis (QCA) of Key Informant Interviews in Health Services Research: Enhancing a Study of Adjuvant Therapy Use in Breast Cancer Care

    Science.gov (United States)

    McAlearney, Ann Scheck; Walker, Daniel; Moss, Alexandra DeNardis; Bickell, Nina A.

    2015-01-01

    Background Qualitative Comparative Analysis (QCA) is a methodology created to address causal complexity in social sciences research by preserving the objectivity of quantitative data analysis without losing detail inherent in qualitative research. However, its use in health services research (HSR) is limited, and questions remain about its application in this context. Objective To explore the strengths and weaknesses of using QCA for HSR. Research Design Using data from semi-structured interviews conducted as part of a multiple case study about adjuvant treatment underuse among underserved breast cancer patients, findings were compared using qualitative approaches with and without QCA to identify strengths, challenges, and opportunities presented by QCA. Subjects Ninety administrative and clinical key informants interviewed across ten NYC area safety net hospitals. Measures Transcribed interviews were coded by three investigators using an iterative and interactive approach. Codes were calibrated for QCA, as well as examined using qualitative analysis without QCA. Results Relative to traditional qualitative analysis, QCA strengths include: (1) addressing causal complexity, (2) results presentation as pathways as opposed to a list, (3) identification of necessary conditions, (4) the option of fuzzy-set calibrations, and (5) QCA-specific parameters of fit that allow researchers to compare outcome pathways. Weaknesses include: (1) few guidelines and examples exist for calibrating interview data, (2) not designed to create predictive models, and (3) unidirectionality. Conclusions Through its presentation of results as pathways, QCA can highlight factors most important for production of an outcome. This strength can yield unique benefits for HSR not available through other methods. PMID:26908085

  9. Key Issue

    Directory of Open Access Journals (Sweden)

    Oya Y Rieger

    2012-03-01

    Full Text Available A few months ago, while I was participating in a conference about open access infrastructures, a delegate from a governmental agency asked, “Why does each library need to maintain a repository for their own scientists?” He was rightfully wondering if a broad collaboration in building a network of archives will provide a durable and extensible technology and service framework for ever-increasing digital scholarly content. The ensuing discussion did not offer a plausible response but accentuated that we do not have in place a plan for building an expandable infrastructure to facilitate communication and exchange of information among rapidly proliferating distinct instances of institutional and subject repositories.

  10. The investigation of crimes refering to forgery of documents and possession of forged documents

    OpenAIRE

    Kotovienė, Danutė

    2011-01-01

    THE INVESTIGATION OF CRIMES REFERING TO FORGERY OF DOCUMENTS AND POSSESSION OF FORGED DOCUMENTS Constantly improving informational technologies more and more get into our daily routine: nowadays it is widely spread internet payments, purchases, signing on-line agreements using electronic signatures. However, paper documents or other made of appropriate materials, which have material evidence, still have a very significant impact on our life. Its convey different aspects of states’ public work...

  11. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  12. Descending with Angels: Jinn Possession, Islamic Exorcism, and Psychiatry

    DEFF Research Database (Denmark)

    Suhr, Christian

    What is it like to be a Muslim possessed by a jinn spirit? How do you find refuge from madness and evil in a place like Denmark? In this book I explore some of the ways in which Muslims in the West have sought to protect themselves. Over several years I followed Muslim patients being treated.......” In the book I analyze how these broader social and political issues are paralleled in the invisible dynamics of jinn possession and psychosis, proposing new theoretical perspectives on religious and psychiatric healing as ritual practices for dealing with the invisible in human life....... hypervisible in public discourse through intensive state monitoring, surveillance, and media coverage. Yet their religion of Islam remains poorly understood and is frequently identified by politicians, commentators, and even healthcare specialists as the underlying invisible cause of “integration problems...

  13. The Regulation of the Possession of Weapons at Gatherings

    Directory of Open Access Journals (Sweden)

    Pieter du Toit

    2013-12-01

    Full Text Available The Dangerous Weapons Act 15 of 2013 provides for certain prohibitions and restrictions in respect of the possession of a dangerous weapon and it repeals the Dangerous Weapons Act 71 of 1968 as well as the different Dangerous Weapons Acts in operation in the erstwhile TBVC States. The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. The Dangerous Weapons Act provides for a uniform system of law governing the use of dangerous weapons for the whole of South Africa and it furthermore no longer places the onus on the individual charged with the offence of the possession of a dangerous weapon to show that he or she did not have any intention of using the firearm for an unlawful purpose. The Act also defines the meaning of a dangerous weapon. According to our court’s interpretation of the Dangerous Weapons Act 71 of 1968 a dangerous weapon was regarded as an object used or intended to be used as a weapon even if it had not been designed for use as a weapon. The Act, however, requires the object to be capable of causing death or inflicting serious bodily harm if it were used for an unlawful purpose. The possession of a dangerous weapon, in circumstances which may raise a reasonable suspicion that the person intends to use it for an unlawful purpose, attracts criminal liability. The Act also provides a useful set of guidelines to assist courts to determine if a person charged with the offence of the possession of a dangerous weapon had indeed intended to use the weapon for an unlawful purpose. It seems, however, that the Act prohibits the possession of a dangerous weapon at gatherings, even if the person carrying the weapon does not intend to use it for an unlawful purpose. The state will, however, have to prove that the accused had the necessary control over the object and the intention to exercise such control, as well as that the object is capable of

  14. Emotional regulation, attachment to possessions and hoarding symptoms.

    Science.gov (United States)

    Phung, Philip J; Moulding, Richard; Taylor, Jasmine K; Nedeljkovic, Maja

    2015-10-01

    This study aimed to test which particular facets of emotion regulation (ER) are most linked to symptoms of hoarding disorder, and whether beliefs about emotional attachment to possessions (EA) mediate this relationship. A non-clinical sample of 150 participants (108 females) completed questionnaires of emotional tolerance (distress tolerance, anxiety sensitivity, negative urgency - impulsivity when experiencing negative emotions), depressed mood, hoarding, and beliefs about emotional attachment to possessions. While all emotional tolerance measures related to hoarding, when considered together and controlling for depression and age, anxiety sensitivity and urgency were the significant predictors. Anxiety sensitivity was fully mediated, and urgency partially mediated, via beliefs regarding emotional attachment to possessions. These findings provide further support for (1) the importance of anxiety sensitivity and negative urgency for hoarding symptoms, and (2) the view that individuals with HD symptoms may rely on items for emotion regulation, leading to stronger beliefs that items are integral to emotional wellbeing. © 2015 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  15. CHRISTIAN SYMBOLISM IN FYODOR DOSTOEVSKY'S NOVEL "THE POSSESSED" ("DEMONS"

    Directory of Open Access Journals (Sweden)

    Sergei Leonidovich Sharakov

    2013-11-01

    Full Text Available The article raises a question of Christian symbolism in Fyodor Dostoevsky’s novel The Possessed (Demons. The introductory part identifies the purpose of a symbol in Christian poetics through the parallel with ancient symbolism. The author makes a conclusion that the functional role of a symbol in the ancient world and Christian tradition is different. Therefore, the ancient symbol involves a number of interrelated categories, such as fate, intuition or conjecture, inspiration, and predictions. Christian symbolism is based on the idea of redemption and moral innocence. Methodologically, the article is based on a cultural and historical approach, as well as on the comparative academic tradition. The overview of Dostoyevsky’s pre-materials for The Possessed (Demons enables us to suggest the use of Christian symbolism in this novel. Hence, the objective of the study is to investigate a composition of images and symbols in this piece of writing, with a special focus on the image of a chronicler since the storyline of the novel is developed through his perception. We make a supposition that there are several levels of Gospel perception in the artistic vision or consciousness of the chronicler, that form the basis of the symbolical composition of the novel. The article sequentially examines the examples of Christian symbolism, including the connection of ideas, characters and storylines of the novel with the Gospel. Then it gives evidence and reasons for the thesis that the Gospel gives the characters of the novel the grounds for shaping their destiny.

  16. What¿s the deal with the web/blogs/the next big technology: a key role for information science in e-social science research?

    NARCIS (Netherlands)

    Thelwall, M.; Wouters, P.

    2005-01-01

    Since many nations have provided substantial funding for new e-social science and humanities investigations, there is now an opportunity for information scientists to adopt an enabling role for this new kind of research. Logically, a more information-centred environment should be more conducive to

  17. Legume Information System (LegumeInfo.org): a key component of a set of federated data resources for the legume family

    Science.gov (United States)

    The Legume Information System (LIS), at http://legumeinfo.org, is a genomic data portal (GDP) for the legume family. LIS provides access to genetic and genomic information for major crop and model legumes. With more than two-dozen domesticated legume species, there are numerous specialists working o...

  18. Adducin family proteins possess different nuclear export potentials.

    Science.gov (United States)

    Liu, Chia-Mei; Hsu, Wen-Hsin; Lin, Wan-Yi; Chen, Hong-Chen

    2017-05-10

    The adducin (ADD) family proteins, namely ADD1, ADD2, and ADD3, are actin-binding proteins that play important roles in the stabilization of membrane cytoskeleton and cell-cell junctions. All the ADD proteins contain a highly conserved bipartite nuclear localization signal (NLS) at the carboxyl termini, but only ADD1 can localize to the nucleus. The reason for this discrepancy is not clear. To avoid the potential effect of cell-cell junctions on the distribution of ADD proteins, HA epitope-tagged ADD proteins and mutants were transiently expressed in NIH3T3 fibroblasts and their distribution in the cytoplasm and nucleus was examined by immunofluorescence staining. Several nuclear proteins were identified to interact with ADD1 by mass spectrometry, which were further verified by co-immunoprecipitation. In this study, we found that ADD1 was detectable both in the cytoplasm and nucleus, whereas ADD2 and ADD3 were detected only in the cytoplasm. However, ADD2 and ADD3 were partially (~40%) sequestered in the nucleus by leptomycin B, a CRM1/exportin1 inhibitor. Upon the removal of leptomycin B, ADD2 and ADD3 re-distributed to the cytoplasm. These results indicate that ADD2 and ADD3 possess functional NLS and are quickly transported to the cytoplasm upon entering the nucleus. Indeed, we found that ADD2 and ADD3 possess much higher potential to counteract the activity of the NLS derived from Simian virus 40 large T-antigen than ADD1. All the ADD proteins appear to contain multiple nuclear export signals mainly in their head and neck domains. However, except for the leucine-rich motif ( 377 FEALMRMLDWLGYRT 391 ) in the neck domain of ADD1, no other classic nuclear export signal was identified in the ADD proteins. In addition, the nuclear retention of ADD1 facilitates its interaction with RNA polymerase II and zinc-finger protein 331. Our results suggest that ADD2 and ADD3 possess functional NLS and shuttle between the cytoplasm and nucleus. The discrepancy in the

  19. Immobilized cells of Candida rugosa possessing fumarase activity

    Energy Technology Data Exchange (ETDEWEB)

    Yang, L.; Zhone, L.

    1980-01-01

    Immobilized cells of C. rugosa that possessed fumarase activity were prepared by different methods; the most active immobilized cells were entrapped in polyacrylamide gels. The effects of pH temperature, and divalent cations on the fumarase activity of both immobilized and native cells were the same. Mn/sup 2 +/, Mg/sup 2 +/, Ca/sup 2 +/, and Fe/sup 2 +/ did not protect the immobilized enzyme against thermal inactivation. The activity of immobilized fumarase remained constant during 91 days of storage of 4-6 degrees. The immobilized cell column was used for the continuous production of L-malic acid from 1M fumarate at 30 degrees and pH 8.5. The immobilized column operated steadily for 2 months. Half life of the immobilized fumarase at 30 degrees was 95 days.

  20. Social forces for team coordination in ball possession game

    Science.gov (United States)

    Yokoyama, Keiko; Shima, Hiroyuki; Fujii, Keisuke; Tabuchi, Noriyuki; Yamamoto, Yuji

    2018-02-01

    Team coordination is a basic human behavioral trait observed in many real-life communities. To promote teamwork, it is important to cultivate social skills that elicit team coordination. In the present work, we consider which social skills are indispensable for individuals performing a ball possession game in soccer. We develop a simple social force model that describes the synchronized motion of offensive players. Comparing the simulation results with experimental observations, we uncovered that the cooperative social force, a measure of perception skill, has the most important role in reproducing the harmonized collective motion of experienced players in the task. We further developed an experimental tool that facilitates real players' perceptions of interpersonal distance, revealing that the tool improves novice players' motions as if the cooperative social force were imposed.

  1. The importance of parameter variances, correlations lengths, and cross-correlations in reactive transport models: key considerations for assessing the need for microscale information

    Energy Technology Data Exchange (ETDEWEB)

    Reimus, Paul W [Los Alamos National Laboratory

    2010-12-08

    A process-oriented modeling approach is implemented to examine the importance of parameter variances, correlation lengths, and especially cross-correlations in contaminant transport predictions over large scales. It is shown that the most important consideration is the correlation between flow rates and retardation processes (e.g., sorption, matrix diffusion) in the system. lf flow rates are negatively correlated with retardation factors in systems containing multiple flow pathways, then characterizing these negative correlation(s) may have more impact on reactive transport modeling than microscale information. Such negative correlations are expected in porous-media systems where permeability is negatively correlated with clay content and rock alteration (which are usually associated with increased sorption). Likewise, negative correlations are expected in fractured rocks where permeability is positively correlated with fracture apertures, which in turn are negatively correlated with sorption and matrix diffusion. Parameter variances and correlation lengths are also shown to have important effects on reactive transport predictions, but they are less important than parameter cross-correlations. Microscale information pertaining to contaminant transport has become more readily available as characterization methods and spectroscopic instrumentation have achieved lower detection limits, greater resolution, and better precision. Obtaining detailed mechanistic insights into contaminant-rock-water interactions is becoming a routine practice in characterizing reactive transport processes in groundwater systems (almost necessary for high-profile publications). Unfortunately, a quantitative link between microscale information and flow and transport parameter distributions or cross-correlations has not yet been established. One reason for this is that quantitative microscale information is difficult to obtain in complex, heterogeneous systems. So simple systems that lack the

  2. Effective international information exchange as a key element of modern tax systems: promises and pitfalls of the OECD’s common reporting standard

    Directory of Open Access Journals (Sweden)

    Stjepan Gadzo

    2017-06-01

    Full Text Available Today’s global economic environment is characterized by the high mobility of capital and labour across national borders. Against the backdrop of a legal framework governing taxation of cross-border income, this may lead to double taxation on the one hand, as well as provide opportunities for tax evasion and tax avoidance on the other. It is well-established that a prerequisite for effective taxation of foreign-sourced income earned by “domestic taxpayers” (i.e. tax residents is the system of administrative co-operation across national boundaries, mainly in the form of exchange of tax-relevant information between tax authorities. Since the lack of information-exchange mechanisms is linked with tax havens and the proliferation of “harmful tax practices”, the OECD put the issue high on the global political agenda as early as 1998. Further developments strengthened the importance of the exchange of information, leading to the so-called “big bang” of 2009, i.e. to a significant increase in the number of concluded tax information exchange agreements, caused by the growing concern about international tax evasion and avoidance in the post-crisis period.Nowadays the so-called automatic exchange of information (AEOI between tax authorities has emerged as a new global standard. This is mostly due to the development of specific national and international models, aimed at enhancing intergovernmental cooperation in fighting offshore tax evasion. In this regard special attention should be drawn to the 2014 release of the OECD’s Common Reporting Standard (CRS, which is based on the idea that banks and other financial institutions should play a crucial role in providing information on taxpayer’s income and assets to tax authorities around the globe.The aim of this paper is to explore some of the most important implications of the adoption of the CRS as a global AEOI model. While there are marked advantages of the new standard - mainly related

  3. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  4. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  5. Creating Compact Comparative Health Care Information: What Are the Key Quality Attributes to Present for Cataract and Total Hip or Knee Replacement Surgery?

    NARCIS (Netherlands)

    Damman, O.C.; Spreeuwenberg, P.; Rademakers, J.; Hendriks, M.

    2012-01-01

    Background. The recent emphasis on providing comparative health care data to the public has resulted in a large amount of online information. To focus on the most essential attributes, insight is needed into which attributes are actually considered by consumers. Objective. To assess which attributes

  6. Creating compact comparative health care information: what are the key quality attributes to present for cataract and total hip or knee replacement surgery?

    NARCIS (Netherlands)

    Damman, O.C.; Spreeuwenberg, P.; Rademakers, J.; Hendriks, M.

    2012-01-01

    Background. The recent emphasis on providing comparative health care data to the public has resulted in a large amount of online information. To focus on the most essential attributes, insight is needed into which attributes are actually considered by consumers. Objective. To assess which attributes

  7. Information on the Schacht Asse II. Expensive home country. What costs the Asse facility? What is the value of region? Key aspect money

    International Nuclear Information System (INIS)

    2015-01-01

    The information brochure on Asse II includes the following contributions: The picture of the blind shaft 3 and what does it mean? What costs the Asse facility? Expensive home country. The history of Asse II shows that safety has to stand before economic interests. The Asse legislation of 203 opens new paths for the waste retrieval.

  8. Bodies that Matter: Performing White Possession on the Beach

    Science.gov (United States)

    Moreton-Robinson, Aileen

    2011-01-01

    Beaches remain important places within indigenous coastal peoples' territories, although the silence about our ownership is deafening. Many authors have argued that within Australian popular culture the beach is a key site where racialized and gendered transgressions, fantasies, and desires are played out, but none have elucidated how these…

  9. Using fear appeals in warning labels to promote responsible gambling among VLT players: the key role of depth of information processing.

    Science.gov (United States)

    Munoz, Yaromir; Chebat, Jean-Charles; Suissa, Jacob Amnon

    2010-12-01

    Video lottery terminals (VLT) are a highly lucrative gambling format, but at the same time they are among the most hazardous. Previous research has shown that threatening warnings may be an appropriate approach for promoting protective behavior. The present study explores the potential benefits of threatening warnings in the fight against compulsive gambling. A 4 × 2 factorial design experiment was used to test our model based on both Elaboration Likelihood Model and Protection Motivation Theory. 258 VLT adult players (58% males, 42% females) with various degrees of problem gambling were exposed to three threat levels (plus a control condition) from two different sources (i.e., either a medical source or a source related to the provider of VLT's). Our results show that both higher threat warnings and the medical source of warnings enhance Depth of Information Processing. It was also found that Depth of Information Processing affects positively attitude change and compliance intentions. The theoretical and managerial implications are discussed.

  10. Examining Key Stakeholder and Community Residents' Understanding of Environmental Influences to Inform Place-Based Interventions to Reduce Obesity in Rural Communities, Kentucky 2015.

    Science.gov (United States)

    Gustafson, Alison; McGladrey, Margaret; Liu, Emily; Peritore, Nicole; Webber, Kelly; Butterworth, Brooke; Vail, Ann

    2017-07-07

    Rural residents report high rates of obesity, physical inactivity, and poor eating habits. The objectives of this study were to (1) use the collective impact model to guide efforts to elicit community members' perceptions of county-specific factors influencing high obesity rates; (2) determine the association between utilization of food retail venues and concern about obesity and healthy eating; and (3) determine community members' utilization of physical activity infrastructure and concern about physical inactivity. The study was conducted in 6 rural counties in Kentucky with adult obesity prevalence rates >40%. Community stakeholders met to assess counties' needs and assets in implementing interventions to reduce obesity in their communities. A random-digit dial survey (n = 756) also was conducted to examine awareness and availability of community resources for healthy eating and physical activity. Stakeholders identified lack of access to fruits and vegetables and poor physical activity infrastructure as contributors to obesity. Reporting moderate and serious concern about obesity and healthy eating was associated with higher odds of shopping at a supercenter compared with those expressing little concern. Reported access to information about physical activity opportunities was associated with higher odds of reporting the availability of safe places for physical activity, sidewalks, and trails compared with those who reported that information was difficult to obtain. This study elicits community-identified barriers to healthy behaviors and provides foundational data to inform future place-based obesity reduction interventions. © 2017 National Rural Health Association.

  11. Perceived Threat and Corroboration: Key Factors That Improve a Predictive Model of Trust in Internet-based Health Information and Advice

    Science.gov (United States)

    Harris, Peter R; Briggs, Pam

    2011-01-01

    Background How do people decide which sites to use when seeking health advice online? We can assume, from related work in e-commerce, that general design factors known to affect trust in the site are important, but in this paper we also address the impact of factors specific to the health domain. Objective The current study aimed to (1) assess the factorial structure of a general measure of Web trust, (2) model how the resultant factors predicted trust in, and readiness to act on, the advice found on health-related websites, and (3) test whether adding variables from social cognition models to capture elements of the response to threatening, online health-risk information enhanced the prediction of these outcomes. Methods Participants were asked to recall a site they had used to search for health-related information and to think of that site when answering an online questionnaire. The questionnaire consisted of a general Web trust questionnaire plus items assessing appraisals of the site, including threat appraisals, information checking, and corroboration. It was promoted on the hungersite.com website. The URL was distributed via Yahoo and local print media. We assessed the factorial structure of the measures using principal components analysis and modeled how well they predicted the outcome measures using structural equation modeling (SEM) with EQS software. Results We report an analysis of the responses of participants who searched for health advice for themselves (N = 561). Analysis of the general Web trust questionnaire revealed 4 factors: information quality, personalization, impartiality, and credible design. In the final SEM model, information quality and impartiality were direct predictors of trust. However, variables specific to eHealth (perceived threat, coping, and corroboration) added substantially to the ability of the model to predict variance in trust and readiness to act on advice on the site. The final model achieved a satisfactory fit: χ2 5 = 10

  12. Enhanced Optoelectronic Performance of a Passivated Nanowire-Based Device: Key Information from Real-Space Imaging Using 4D Electron Microscopy

    KAUST Repository

    Khan, Jafar Iqbal

    2016-03-03

    Managing trap states and understanding their role in ultrafast charge-carrier dynamics, particularly at surface and interfaces, remains a major bottleneck preventing further advancements and commercial exploitation of nanowire (NW)-based devices. A key challenge is to selectively map such ultrafast dynamical processes on the surfaces of NWs, a capability so far out of reach of time-resolved laser techniques. Selective mapping of surface dynamics in real space and time can only be achieved by applying four-dimensional scanning ultrafast electron microscopy (4D S-UEM). Charge carrier dynamics are spatially and temporally visualized on the surface of InGaN NW arrays before and after surface passivation with octadecylthiol (ODT). The time-resolved secondary electron images clearly demonstrate that carrier recombination on the NW surface is significantly slowed down after ODT treatment. This observation is fully supported by enhancement of the performance of the light emitting device. Direct observation of surface dynamics provides a profound understanding of the photophysical mechanisms on materials\\' surfaces and enables the formulation of effective surface trap state management strategies for the next generation of high-performance NW-based optoelectronic devices. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. Impact of metal ions in porphyrin-based applied materials for visible-light photocatalysis: Key information from ultrafast electronic spectroscopy

    KAUST Repository

    Kar, Prasenjit; Sardar, Samim; Alarousu, Erkki; Sun, Jingya; Seddigi, Zaki Shakir Abdullah; Ahmed, Saleh Abdel Mgeed; Danish, Ekram Yousif; Mohammed, Omar F.; Pal, Samir Kumar

    2014-01-01

    ProtoporphyrinIX-zinc oxide (PP-ZnO) nanohybrids have been synthesized for applications in photocatalytic devices. High-resolution transmission electron microscopy (HRTEM), X-ray diffraction (XRD), and steady-state infrared, absorption, and emission spectroscopies have been used to analyze the structural details and optical properties of these nanohybrids. Time-resolved fluorescence and transient absorption techniques have been applied to study the ultrafast dynamic events that are key to photocatalytic activities. The photocatalytic efficiency under visible-light irradiation in the presence of naturally abundant iron(III) and copper(II) ions has been found to be significantly retarded in the former case, but enhanced in the latter case. More importantly, femtosecond (fs) transient absorption data have clearly demonstrated that the residence of photoexcited electrons from the sensitizer PP in the centrally located iron moiety hinders ground-state bleach recovery of the sensitizer, affecting the overall photocatalytic rate of the nanohybrid. The presence of copper(II) ions, on the other hand, offers additional stability against photobleaching and eventually enhances the efficiency of photocatalysis. In addition, we have also explored the role of UV light in the efficiency of photocatalysis and have rationalized our observations from femtosecond- to picosecond-resolved studies. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Impact of metal ions in porphyrin-based applied materials for visible-light photocatalysis: Key information from ultrafast electronic spectroscopy

    KAUST Repository

    Kar, Prasenjit

    2014-07-10

    ProtoporphyrinIX-zinc oxide (PP-ZnO) nanohybrids have been synthesized for applications in photocatalytic devices. High-resolution transmission electron microscopy (HRTEM), X-ray diffraction (XRD), and steady-state infrared, absorption, and emission spectroscopies have been used to analyze the structural details and optical properties of these nanohybrids. Time-resolved fluorescence and transient absorption techniques have been applied to study the ultrafast dynamic events that are key to photocatalytic activities. The photocatalytic efficiency under visible-light irradiation in the presence of naturally abundant iron(III) and copper(II) ions has been found to be significantly retarded in the former case, but enhanced in the latter case. More importantly, femtosecond (fs) transient absorption data have clearly demonstrated that the residence of photoexcited electrons from the sensitizer PP in the centrally located iron moiety hinders ground-state bleach recovery of the sensitizer, affecting the overall photocatalytic rate of the nanohybrid. The presence of copper(II) ions, on the other hand, offers additional stability against photobleaching and eventually enhances the efficiency of photocatalysis. In addition, we have also explored the role of UV light in the efficiency of photocatalysis and have rationalized our observations from femtosecond- to picosecond-resolved studies. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. Radiation protective agents possessing anti-oxidative properties

    Energy Technology Data Exchange (ETDEWEB)

    Anzai, Kazunori; Ueno, Emi; Yoshida, Akira; Furuse, Masako; Ikota, Nobuo [National Inst. of Radiological Sciences, Research Center for Radiation Safety, Chiba, Chiba (Japan)

    2005-11-15

    The purpose of studies is to see mechanisms of radiation protection of agents possessing anti-oxidative properties because the initial step resulting in radiation hazard is the formation of radicals by water radiolysis. Agents were commercially available or synthesized proxyl derivatives (spin prove agents), commercially available spin-trapping agents, edaravone and TMG (a tocopherol glycoside). Mice and cultured cells were X-irradiated by Shimadzu Pantak HF-320 or 320S. Survivals of cells were determined by colony assay and of mice, to which the agents were given intraperitoneally before or after X-irradiation, within 30 days post irradiation. Plasma and marrow concentrations of proxyls were estimated by electron spin resonance (ESR) spectrometry. Mechanisms of their radiation protective effects were shown different from agent to agent. TMG was found effective even post irradiation, which suggests a possibility for a new drug development. Some (spin trapping agents and TMG), virtually ineffective at the cell level, were found effective in the whole body, suggesting the necessity of studies on their disposition and metabolism. (S.I.)

  16. Radiation protective agents possessing anti-oxidative properties

    International Nuclear Information System (INIS)

    Anzai, Kazunori; Ueno, Emi; Yoshida, Akira; Furuse, Masako; Ikota, Nobuo

    2005-01-01

    The purpose of studies is to see mechanisms of radiation protection of agents possessing anti-oxidative properties because the initial step resulting in radiation hazard is the formation of radicals by water radiolysis. Agents were commercially available or synthesized proxyl derivatives (spin prove agents), commercially available spin-trapping agents, edaravone and TMG (a tocopherol glycoside). Mice and cultured cells were X-irradiated by Shimadzu Pantak HF-320 or 320S. Survivals of cells were determined by colony assay and of mice, to which the agents were given intraperitoneally before or after X-irradiation, within 30 days post irradiation. Plasma and marrow concentrations of proxyls were estimated by electron spin resonance (ESR) spectrometry. Mechanisms of their radiation protective effects were shown different from agent to agent. TMG was found effective even post irradiation, which suggests a possibility for a new drug development. Some (spin trapping agents and TMG), virtually ineffective at the cell level, were found effective in the whole body, suggesting the necessity of studies on their disposition and metabolism. (S.I.)

  17. The possession law suit, caused by forbidden immissions

    Directory of Open Access Journals (Sweden)

    Popov Danica D.

    2015-01-01

    Full Text Available In the Serbian Law and in most of jurisdictions, there are limits on exercising the right of property. The real estate owner must refrain from activities by which the use of other real estate is being impoded through the immission of execive gasses, vapors, smoke, heat noise, tremors etc. The property ownership whose is affected by immission exceeding the set limits, has the right to request a stop of immisions which exceeded the allowed volume of immissions. In article author describes various kinds of immissions. The general feature of this law suit is that there is only discussion on the facts and not for a legal matters. Subject matter jurisdiction for the resolution of such disputes belongs to the court of general jurisdiction, while the disputes itself is a litigation. The special rule of proceedings of action of disturbance are: provisionality of the protection of possession; urgency in proceedings; initiation of proceedings; limiting of objection; prescribing temporary measures; rendering a ruling in the form of order; appeals which may be filed within a short deadline and which does not have suspensive effect (do not delay the execution of the order; revision is not allowed etc.

  18. Novel β-amyloid aggregation inhibitors possessing a turn mimic.

    Science.gov (United States)

    Hamada, Yoshio; Miyamoto, Naoko; Kiso, Yoshiaki

    2015-04-01

    Amyloid β peptide, the main component of senile plaques found in the brain of Alzheimer disease (AD) patients, is a molecular target for AD therapeutic intervention. A number of potential AD therapeutics have been reported, including inhibitors of β-secretase, γ-secretase, and Aβ aggregation, and anti-amyloid agents, such as neprilysin, insulin degrading enzyme (IDE), and Aβ antibodies. Recently, we reported potent small-sized β-secretase (BACE1) inhibitors, which could serve as anti-AD drugs. However AD is a progressive disorder, where dementia symptoms gradually worsen over several decades, and therefore may require many years to get cured. One possible way to achieve a greater therapeutic effect is through simultaneous administration of multiple drugs, similar to those used in Highly Active Anti-Retroviral Therapy (HAART) used to treat AIDS. In order to overcome AD, we took a drug discovery approach to evaluate, novel β-amyloid aggregation inhibitors. Previously, we reported that a tong-type compound possessing a turn mimic as the inhibitor of HIV-1 protease dimerization. Oligomerized amyloid β peptides contain a turn structure within the molecule. Here, we designed and synthesized novel β-amyloid aggregation inhibitors with a turn-mimic template, based on the turn conformer of the oligomerized amyloid β peptides. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Legume information system (LegumeInfo.org): a key component of a set of federated data resources for the legume family.

    Science.gov (United States)

    Dash, Sudhansu; Campbell, Jacqueline D; Cannon, Ethalinda K S; Cleary, Alan M; Huang, Wei; Kalberer, Scott R; Karingula, Vijay; Rice, Alex G; Singh, Jugpreet; Umale, Pooja E; Weeks, Nathan T; Wilkey, Andrew P; Farmer, Andrew D; Cannon, Steven B

    2016-01-04

    Legume Information System (LIS), at http://legumeinfo.org, is a genomic data portal (GDP) for the legume family. LIS provides access to genetic and genomic information for major crop and model legumes. With more than two-dozen domesticated legume species, there are numerous specialists working on particular species, and also numerous GDPs for these species. LIS has been redesigned in the last three years both to better integrate data sets across the crop and model legumes, and to better accommodate specialized GDPs that serve particular legume species. To integrate data sets, LIS provides genome and map viewers, holds synteny mappings among all sequenced legume species and provides a set of gene families to allow traversal among orthologous and paralogous sequences across the legumes. To better accommodate other specialized GDPs, LIS uses open-source GMOD components where possible, and advocates use of common data templates, formats, schemas and interfaces so that data collected by one legume research community are accessible across all legume GDPs, through similar interfaces and using common APIs. This federated model for the legumes is managed as part of the 'Legume Federation' project (accessible via http://legumefederation.org), which can be thought of as an umbrella project encompassing LIS and other legume GDPs. Published by Oxford University Press on behalf of Nucleic Acids Research 2015. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  20. Medication possession ratio predicts antiretroviral regimens persistence in Peru.

    Science.gov (United States)

    Salinas, Jorge L; Alave, Jorge L; Westfall, Andrew O; Paz, Jorge; Moran, Fiorella; Carbajal-Gonzalez, Danny; Callacondo, David; Avalos, Odalie; Rodriguez, Martin; Gotuzzo, Eduardo; Echevarria, Juan; Willig, James H

    2013-01-01

    In developing nations, the use of operational parameters (OPs) in the prediction of clinical care represents a missed opportunity to enhance the care process. We modeled the impact of multiple measurements of antiretroviral treatment (ART) adherence on antiretroviral treatment outcomes in Peru. Retrospective cohort study including ART naïve, non-pregnant, adults initiating therapy at Hospital Nacional Cayetano Heredia, Lima-Peru (2006-2010). Three OPs were defined: 1) Medication possession ratio (MPR): days with antiretrovirals dispensed/days on first-line therapy; 2) Laboratory monitory constancy (LMC): proportion of 6 months intervals with ≥1 viral load or CD4 reported; 3) Clinic visit constancy (CVC): proportion of 6 months intervals with ≥1 clinic visit. Three multi-variable Cox proportional hazard (PH) models (one per OP) were fit for (1) time of first-line ART persistence and (2) time to second-line virologic failure. All models were adjusted for socio-demographic, clinical and laboratory variables. 856 patients were included in first-line persistence analyses, median age was 35.6 years [29.4-42.9] and most were male (624; 73%). In multivariable PH models, MPR (per 10% increase HR=0.66; 95%CI=0.61-0.71) and LMC (per 10% increase 0.83; 0.71-0.96) were associated with prolonged time on first-line therapies. Among 79 individuals included in time to second-line virologic failure analyses, MPR was the only OP independently associated with prolonged time to second-line virologic failure (per 10% increase 0.88; 0.77-0.99). The capture and utilization of program level parameters such as MPR can provide valuable insight into patient-level treatment outcomes.

  1. Management of Adult Syphilis: Key Questions to Inform the 2015 Centers for Disease Control and Prevention Sexually Transmitted Diseases Treatment Guidelines.

    Science.gov (United States)

    Ghanem, Khalil G

    2015-12-15

    A panel of experts generated 8 "key questions" in the management of adult syphilis. A systematic literature review was conducted and tables of evidence were constructed to answer these important questions. Penicillin is the drug of choice to treat syphilis. Doxycycline to treat early and late latent syphilis is an acceptable alternate option if penicillin cannot be used. There is no added benefit to enhanced antimicrobial therapy when treating human immunodeficiency virus-infected persons with syphilis. If a patient misses a dose of penicillin in a course of weekly therapy for late syphilis, clinical experience suggests that an interval of 10-14 days between doses might be acceptable before restarting the sequence of injections. Pharmacologic considerations suggest that an interval of 7-9 days between doses, if feasible, may be more optimal. Missed doses are not acceptable for pregnant women. A cerebrospinal fluid examination to diagnose neurosyphilis is recommended in persons diagnosed with tertiary syphilis (eg, cardiovascular syphilis or late benign syphilis), persons with neurological signs or symptoms consistent with neurosyphilis, and asymptomatic persons whose serological titers do not decline appropriately following recommended therapy and in whom reinfection is ruled out. Infection and reinfection rates, particularly among men who have sex with men, are high. Frequent serological screening of this population appears to be the most cost-efficient intervention. The Centers for Disease Control and Prevention continues to recommend the use of the traditional rapid plasma reagin-based screening algorithm. The positive predictive value for syphilis associated with an isolated unconfirmed reactive treponemal chemiluminescence assay or enzyme immunoassay is low if the epidemiological risk and clinical probability for syphilis are low. Among pregnant women with serodiscordant serologies (positive treponemal tests and a negative nontreponemal test), the risk of

  2. Key drivers of the e-waste recycling system: Assessing and modelling e-waste processing in the informal sector in Delhi

    International Nuclear Information System (INIS)

    Streicher-Porte, Martin; Widmer, Rolf; Jain, Amit; Bader, Hans-Peter; Scheidegger, Ruth; Kytzia, Susanne

    2005-01-01

    The management and recycling of waste electrical and electronic equipment WEEE was assessed in the city of Delhi, India. In order to do this, the personal computer was defined as the tracer for which a model was designed. The model depicts the entire life cycle of the tracer, from production through sale and consumption-including reuse and refurbishment-to the material recovery in the mainly informal recycling industry. The field work included interviews with the relevant stakeholders, transect walks and literature study, which was followed by a software-supported material flow analysis (MFA) of the whole life cycle chain of the tracer item. In addition to the MFA, several economic aspects of the recycling system were investigated. The study revealed that the life span of a personal computer has considerable influence upon the system, most notably in the following two aspects: (i) a prolonged life span creates value by means of refurbishing and upgrading activities, and (ii) it slows down the flow rate of the whole system. This is one of the simplest ways of preventing an uncontrolled increase in environmentally hazardous emissions by the recycling sector. The material recovery of the system is mainly driven by the precious metal content of personal computers. A first estimate showed that precious metal recovery contributes to over 80% of the personal computer materials' market value, despite the small quantity of them found in computers

  3. Fine particles in homes of predominantly low-income families with children and smokers: Key physical and behavioral determinants to inform indoor-air-quality interventions.

    Science.gov (United States)

    Klepeis, Neil E; Bellettiere, John; Hughes, Suzanne C; Nguyen, Benjamin; Berardi, Vincent; Liles, Sandy; Obayashi, Saori; Hofstetter, C Richard; Blumberg, Elaine; Hovell, Melbourne F

    2017-01-01

    Children are at risk for adverse health outcomes from occupant-controllable indoor airborne contaminants in their homes. Data are needed to design residential interventions for reducing low-income children's pollutant exposure. Using customized air quality monitors, we continuously measured fine particle counts (0.5 to 2.5 microns) over a week in living areas of predominantly low-income households in San Diego, California, with at least one child (under age 14) and at least one cigarette smoker. We performed retrospective interviews on home characteristics, and particle source and ventilation activities occurring during the week of monitoring. We explored the relationship between weekly mean particle counts and interview responses using graphical visualization and multivariable linear regression (base sample n = 262; complete cases n = 193). We found associations of higher weekly mean particle counts with reports of indoor smoking of cigarettes or marijuana, as well as with frying food, using candles or incense, and house cleaning. Lower particle levels were associated with larger homes. We did not observe an association between lower mean particle counts and reports of opening windows, using kitchen exhaust fans, or other ventilation activities. Our findings about sources of fine airborne particles and their mitigation can inform future studies that investigate more effective feedback on residential indoor-air-quality and better strategies for reducing occupant exposures.

  4. Fine particles in homes of predominantly low-income families with children and smokers: Key physical and behavioral determinants to inform indoor-air-quality interventions.

    Directory of Open Access Journals (Sweden)

    Neil E Klepeis

    Full Text Available Children are at risk for adverse health outcomes from occupant-controllable indoor airborne contaminants in their homes. Data are needed to design residential interventions for reducing low-income children's pollutant exposure. Using customized air quality monitors, we continuously measured fine particle counts (0.5 to 2.5 microns over a week in living areas of predominantly low-income households in San Diego, California, with at least one child (under age 14 and at least one cigarette smoker. We performed retrospective interviews on home characteristics, and particle source and ventilation activities occurring during the week of monitoring. We explored the relationship between weekly mean particle counts and interview responses using graphical visualization and multivariable linear regression (base sample n = 262; complete cases n = 193. We found associations of higher weekly mean particle counts with reports of indoor smoking of cigarettes or marijuana, as well as with frying food, using candles or incense, and house cleaning. Lower particle levels were associated with larger homes. We did not observe an association between lower mean particle counts and reports of opening windows, using kitchen exhaust fans, or other ventilation activities. Our findings about sources of fine airborne particles and their mitigation can inform future studies that investigate more effective feedback on residential indoor-air-quality and better strategies for reducing occupant exposures.

  5. Information

    International Nuclear Information System (INIS)

    Boyard, Pierre.

    1981-01-01

    The fear for nuclear energy and more particularly for radioactive wastes is analyzed in the sociological context. Everybody agree on the information need, information is available but there is a problem for their diffusion. Reactions of the public are analyzed and journalists, scientists and teachers have a role to play [fr

  6. An upper and lower bound of the Medication Possession Ratio

    Directory of Open Access Journals (Sweden)

    Sperber CM

    2017-08-01

    Full Text Available Christian M Sperber, Suren R Samarasinghe, Grace P Lomax Patient Connect Limited, Guildford, UK Background: The Medication Possession Ratio (MPR is a ubiquitous and central measurement for adherence in the health care industry. However, attempts to standardize its calculation have failed, possibly due to the opacity of a single, static MPR, incapability of directly lending itself to a variety of studies, and challenges of comparing the value across studies. This work shows that the MPR strictly depends on the length of the time interval over which it is measured as well as on the dominant dispense quantity for short time intervals. Furthermore, removing a proportion of the patient cohort based on the number of acquisitions may also have a severe impact on the MPR. Therefore, it is suggested that the MPR is represented as a trend over a range of time intervals. To this end, an upper and lower bound of the MPR trend is developed with an upper bound acknowledging patients who change their treatment and the lower bound acknowledging patients who discontinue their treatment.Purpose: Introducing a representation of the MPR value as a trend rather than a static number by developing a quantitative description of an upper and lower bound of the MPR trend, while shedding light on the impacts on prefiltering the patient cohort.Patients and methods: Anonymized patient-level data was utilized as an example for a suggested calculation of an upper and lower bound of the MPR.Results: Representation of the MPR for a predefined time interval precludes a reliable MPR assessment. A quantitative approach is suggested to generate an upper and lower trend of the MPR while emphasizing the impact on removing patients with a limited number of acquisitions.Conclusion: An upper and lower trend makes the MPR more transparent and allows a better comparison across different studies. Removing patients with a limited number of acquisitions should be avoided. Keywords: MPR

  7. Are symptoms of spirit possessed patients covered by the DSM-IV or DSM-5 criteria for possession trance disorder? A mixed-method explorative study in Uganda

    NARCIS (Netherlands)

    van Duijl, M.; Kleyn, W.; de Jong, J.

    2013-01-01

    Introduction and aims As in many cultures, spirit possession is a common idiom of distress in Uganda. The DSM-IV contains experimental research criteria for dissociative and possession trance disorder (DTD and PTD), which are under review for the DSM-5. In the current proposed categories of the

  8. Resolution No. 96/03 About possession of ionic smoke detectors

    International Nuclear Information System (INIS)

    2004-01-01

    The resolution states that: first: all the entities of the country having Ionic smoke detectors in use are to be communicated to the National Center for Nuclear safety in correspondence with the format that is shown in the annex to the present. This formation must be updated every three years. Second: Entities possessing Ionic smoke detectors in use, must be corresponding management as radioactive waste of such detectors in the term of one year from the entry into force of this resolution with the center of protection and of radiation hygiene purposes ensure safe and proper management as radioactive material into disuse. Third: Importing entities, distributors, and that made the Assembly of ionic smoke detectors, continue to be governed by the provisions of the resolution No.. 25/98 of this Ministry, R ules for the authorization of practices associated the employment of las radiation ionizing . Fourth: Entities in which ionic smoke detectors are installed must complete information according to the annex to the present format and send it to the National Center for Nuclear safety within a period of 30 days from the installation of such detectors. Fifth: Entities that possess Ionic smoke detectors and decide to continue using them should not be the evacuation of the same with the center of protection and hygiene of radiation, for the purpose of ensuring a safe and proper management as radioactive material in disuse, notifying this Act to the National Center for Nuclear safety.

  9. An Empirical Method to Derive Hourly Temperature Frequencies for Locations Possessing Only Summarized Climate Information

    National Research Council Canada - National Science Library

    Krause, Paul

    1997-01-01

    ... thresholds are equaled or exceeded. Prior research focused on both estimating temperature frequencies at any point along the cumulative temperature frequency curve, and on estimation at fixed frequency points within the tails of the distribution...

  10. Multi-party quantum key agreement with five-qubit brown states

    Science.gov (United States)

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  11. LEGAL SIGNIFICANCE AND PROTECTION OF POSSESSION IN THE REPUBLIC OF MACEDONIA

    Directory of Open Access Journals (Sweden)

    Vojo Belovski

    2015-04-01

    Full Text Available In this paper it will be discussed the legal significance and protection of possession in the Republic of Macedonia. Below it will be listed the kinds of possession, and finally the rules for possession termination will be explained. The possession is an indicator that the person who rules one item is also a right holder of that item. The possession itself occurs in two types specially authorized by a law and pure factual power behind which stands no right. The possession enjoys legal protection. Below in the paper it is processed the judicial protection of the possession which is given based on complaint for disturbance of possession and action to recover the possession. The important thing at the judicial protection is that the rulers’ protection is given to the last actual possession of the item, but it is not disputed the right of possession. Further in this paper it is included the protection of indirect possession where a complaint can be made by the indirect holder of the item, the judicial protection of possessory, possession protection of the heirs and permitted self – help for unauthorized harassment and revoking of the possession. With respect to the termination of the actual power of the item, listed and processed are the ways when the item failed, when the item was lost, when it is obvious that it won’t be returned, when the ruler had freely left it and when the item is not taken from him and the ruler hasn’t realized the right to possession.

  12. Informe

    Directory of Open Access Journals (Sweden)

    Egon Lichetenberger

    1950-10-01

    Full Text Available Informe del doctor Egon Lichetenberger ante el Consejo Directivo de la Facultad, sobre el  curso de especialización en Anatomía Patológica patrocinado por la Kellogg Foundation (Departamento de Patología

  13. The Mirrored Hand Illusion: I Control, So I Possess?

    Science.gov (United States)

    Zhou, Aibao; Zhang, Yanchi; Yin, Yulong; Yang, Yang

    2015-01-01

    Certain situations may not only cause people to misjudge external information but also distort people's perception of themselves. The present study is the first to report the mirrored hand illusion which could be generated when the experimenter imitated the fist-clenching movements of the subject synchronously. The subjects formed the illusion that the experimenter's hand was "something I can control" when being imitated synchronously. In addition, a sense of ownership over the alien hand was established by integrating multisensory signals and comparing these signals with preexisting body presentations. This method might represent a new avenue for research on the formation of self-consciousness. © The Author(s) 2015.

  14. Effect of playing tactics on achieving score-box possessions in a random series of team possessions from Norwegian professional soccer matches.

    Science.gov (United States)

    Tenga, Albin; Holme, Ingar; Ronglan, Lars Tore; Bahr, Roald

    2010-02-01

    Methods of analysis that include an assessment of opponent interactions are thought to provide a more valid means of team match performance. The purpose of this study was to examine the effect of playing tactics on achieving score-box possession by assessing opponent interactions in Norwegian elite soccer matches. We analysed a random series of 1703 team possessions from 163 of 182 (90%) matches played in the professional men's league during the 2004 season. Multidimensional qualitative data obtained from ten ordered categorical variables were used. Offensive tactics were more effective in producing score-box possessions when playing against an imbalanced defence (28.5%) than against a balanced defence (6.5%) (P tactics on producing score-box possessions, and improves the validity of team match-performance analysis in soccer.

  15. Traumatic Experience and Somatoform Dissociation Among Spirit Possession Practitioners in the Dominican Republic.

    Science.gov (United States)

    Schaffler, Yvonne; Cardeña, Etzel; Reijman, Sophie; Haluza, Daniela

    2016-03-01

    Recent studies in African contexts have revealed a strong association between spirit possession and severe trauma, with inclusion into a possession cult serving at times a therapeutic function. Research on spirit possession in the Dominican Republic has so far not included quantitative studies of trauma and dissociation. This study evaluated demographic variables, somatoform dissociative symptoms, and potentially traumatizing events in the Dominican Republic with a group of Vodou practitioners that either do or do not experience spirit possession. Inter-group comparisons revealed that in contrast to non-possessed participants (n = 38), those experiencing spirit possession (n = 47) reported greater somatoform dissociation, more problems with sleep, and previous exposure to mortal danger such as assaults, accidents, or diseases. The two groups did not differ significantly in other types of trauma. The best predictor variable for group classification was somatoform dissociation, although those items could also reflect the experience of followers during a possession episode. A factor analysis across variables resulted in three factors: having to take responsibility early on in life and taking on a professional spiritual role; traumatic events and pain; and distress/dissociation. In comparison with the non-possessed individuals, the possessed ones did not seem to overall have a remarkably more severe story of trauma and seemed to derive economic gains from possession practice.

  16. Cooperative Secret Sharing Using QR Codes and Symmetric Keys

    Directory of Open Access Journals (Sweden)

    Yang-Wai Chow

    2018-04-01

    Full Text Available Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.

  17. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  18. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  19. Possession attachment predicts cell phone use while driving.

    Science.gov (United States)

    Weller, Joshua A; Shackleford, Crystal; Dieckmann, Nathan; Slovic, Paul

    2013-04-01

    Distracted driving has become an important public health concern. However, little is known about the predictors of this health-risking behavior. One overlooked risk factor for distracted driving is the perceived attachment that one feels toward his or her phone. Prior research has suggested that individuals develop bonds toward objects, and qualitative research suggests that the bond between young drivers and their phones can be strong. It follows that individuals who perceive a strong attachment to their phone would be more likely to use it, even when driving. In a nationally representative sample of young drivers (17-28 years), participants (n = 1,006) completed a survey about driving behaviors and phone use. Risk perception surrounding cell phone use while driving and perceived attachment to one's phone were assessed by administering factor-analytically derived scales that were created as part of a larger project. Attachment toward one's phone predicted the proportion of trips in which a participant reported using their cell phone while driving, beyond that accounted for by risk perception and overall phone use. Further, attachment predicted self-reported distracted driving behaviors, such as the use of social media while driving. Attachment to one's phone may be an important but overlooked risk factor for the engagement of potentially health-risking driving behaviors. Understanding that phone attachment may adversely affect driving behaviors has the potential to inform prevention and intervention efforts designed to reduce distracted driving behaviors, especially in young drivers. 2013 APA, all rights reserved

  20. Competencies that managers should possess - a case study at IPEN

    International Nuclear Information System (INIS)

    Gimenes, Celso Huerta; Barroso, Antonio Carlos de Oliveira; Imakuma, Kengo

    2009-01-01

    To guide human resources selection and development, organizations usually have a list of the competencies they consider crucial for the various segments of their endeavor. At IPEN, a R and D institute with graduate teaching (within USP framework) and some production facilities, the elaboration of a list of the highly appraised competencies for IPEN's managers become a research theme in itself. This work has produced: a methodology to generate, validate and recycle periodically the list and descriptions of managers' competencies; and the first version of the list. Delphi questionnaires were applied via web using 'Lime Survey', a freeware that enables import and export the data as csv files and has a simple and workable language for database access. The consistency of the numerical results, as well as the consensus preferences manifested by the sample is discussed in the paper. Also a segmentation and multivariate statistical analysis to reveal differences and similarities among the various subgroups of the sample is presented providing a lot of insightful information. The merit of structuring the pertinence of the competencies according to seven BNQA's criteria is discussed. Combining the manifested preference of the sample with a factor analysis to check the most significant loads in each construct a reduced set of competencies is proposed. This reduced set can be the base for IPEN's directors to select the crucial set of managers' competence. The methodology here explained can be used each two years to co-validate and update this reduced set. (author)

  1. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  2. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  3. Preservation of Records, Knowledge and Memory across Generations (RK and M). Loss of Information, Records, Knowledge and Memory - Key Factors in the History of Conventional Waste Disposal. Final Report March 2014

    International Nuclear Information System (INIS)

    Buser, Marcos; Tunbrant, Sofie; Wisbey, Simon

    2014-01-01

    The RK and M project was launched in 2010, and is seeking, among other things, to gain insights into the factors influencing the loss and recovery of knowledge and memory preservation in areas other than nuclear wastes. One area with similar characteristics, and therefore well-suited for comparisons, is that of landfills and old industrial or disposal sites for hazardous wastes. This report presents the results of an analysis of selected case studies of landfills and contaminated sites in Europe and other industrialized nations. Based on a two-part methodology (chapter 2), the study identifies common key factors relating to the loss of information, records, knowledge and memory (chapter 3) and defines criteria for the selection of cases to be examined in depth (chapter 4), as the number of landfills and disposal sites created during the last 100 years is high. Using these criteria, 21 cases of conventional, non-nuclear waste disposal from Switzerland, Germany and the United States have been selected. They are analysed in the final chapter of the study. The 21 examples were drawn from a very large number of known disposal sites. It is considered that although only a small number of examples was analysed, the range of wastes and waste management practice was sufficiently broad to indicate trends and allow firm conclusions to be drawn. A key conclusion from this study is that it is rare to lose all information about waste disposal, but t h a t the details tend to be lost first. It is also clear that many records are made with insufficient data to inform remediation actions, and that once lost, records are very difficult to re-construct. The study was based on identifying the key factors that are considered important with respect to the loss of knowledge. A number of sub-factors were identified under each of these headings, resulting in a total of 18 specific reasons for memory loss. Each of the 21 examples was analysed against these 18 reasons, and many of them showed

  4. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  5. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  6. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  7. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  8. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  9. New families of conservative systems on $S^2$ possessing an integral of fourth degree in momenta

    OpenAIRE

    Selivanova, Elena N.

    1997-01-01

    There is a well-known example of integrable conservative system on $S^2$, the case of Kovalevskaya in the dynamics of a rigid body, possessing an integral of fourth degree in momenta. Goryachev proposed a one-parameter family of examples of conservative systems on $S^2$ possessing an integral of fourth degree in momenta which includes the case of Kovalevskaya. In this paper we proposed new examples of conservative systems on $S^2$ possessing an integral of fourth degree in momenta.

  10. THE GENESIS OF THE IMPLEMENTATION OF THE INFORMATION AND COMMUNICATION TECHNOLOGIES IN PHYSICS EDUCATION: FROM IT-SUPPORT OF STUDYING TO THE FORMATION OF THE KEY AND THE SUBJECT COMPETENCES

    Directory of Open Access Journals (Sweden)

    Mykola V. Holovko

    2015-02-01

    Full Text Available In the article, the peculiarities of the process of the implementation of the information and communication technologies in teaching Physics, the development of the computer didactic provision are specified on the basis of the historical and methodological analysis. The development of the scientific fundamentals and the tools of their implementation in the homeland theory and methodology of teaching Physics, the impact of the formation of the computer-oriented environment as well as the qualitative change in the academic process subjects’ role are demonstrated. The necessity of the further didactic researches on the abovementioned issue because of the priority of the computer-oriented technologies in the formation of the key and the subject competences of the comprehensive and high school pupils in the process of Physics teaching are actualized.

  11. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  12. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  13. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  14. Information and Informality

    DEFF Research Database (Denmark)

    Larsson, Magnus; Segerstéen, Solveig; Svensson, Cathrin

    2011-01-01

    leaders on the basis of their possession of reliable knowledge in technical as well as organizational domains. The informal leaders engaged in interpretation and brokering of information and knowledge, as well as in mediating strategic values and priorities on both formal and informal arenas. Informal...... leaders were thus seen to function on the level of the organization as a whole, and in cooperation with formal leaders. Drawing on existing theory of leadership in creative and professional contexts, this cooperation can be specified to concern task structuring. The informal leaders in our study...... contributed to task structuring through sensemaking activities, while formal leaders focused on aspects such as clarifying output expectations, providing feedback, project structure, and diversity....

  15. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  16. Possession Zone as a Performance Indicator in Football. The Game of the Best Teams

    Directory of Open Access Journals (Sweden)

    Claudio A. Casal

    2017-07-01

    Full Text Available Possession time in football has been widely discussed in research but few studies have analyzed the importance of the field area in which possession occurs. The objective of this study was to identify the existence of significant differences in the field zone of ball possession between successful and unsuccessful teams and to acknowledge if the match status modulates the possession model. To this end, 2,284 attacks were analyzed corresponding to the matches in the final phase of the UEFA Euro 2016 France, recording possession time and field zone in which possession occurred. Video recordings of matches were analyzed and coded post-event using notational analysis. We have found that successful offensive game patterns are different from unsuccessful ones. Specifically, field zone in which major possession occurs changes significantly between successful and unsuccessful teams (x2 = 15.72, p < 0.05 and through Welch’s T significant differences were detected in possession time between successful and unsuccessful teams (H = 24.289, p < 0.001. The former are characterized by longer possession times, preferably in the middle offensive zone, on the other hand, unsuccessful teams have shorter possession times and preferably on the middle defensive zone. Logistic regression also allowed us to identify that greater possession in the middle offensive zone is a good indicator of success in the offensive game, allowing us to predict a greater chance of victory in the match. Specifically, every time the teams achieve possession in the middle offensive zone, the chance of winning the match will increase 1.72 times and, the probability of winning the match making longer possessions in the middle offensive zone is 44.25%. Applying the Kruskal–Wallis test we have also been able to verify how match status modulates the teams possession time, specifically, when teams are winning they have longer possessions x2 = 92.628, p = 0.011. Results obtained are expected to

  17. 19 CFR 7.2 - Insular possessions of the United States other than Puerto Rico.

    Science.gov (United States)

    2010-04-01

    ... than Puerto Rico. 7.2 Section 7.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF... NAVAL STATION § 7.2 Insular possessions of the United States other than Puerto Rico. (a) Insular possessions of the United States other than Puerto Rico are also American territory but, because those insular...

  18. 50 CFR 92.6 - Use and possession of migratory birds.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Use and possession of migratory birds. 92... INTERIOR (CONTINUED) MISCELLANEOUS PROVISIONS MIGRATORY BIRD SUBSISTENCE HARVEST IN ALASKA General Provisions § 92.6 Use and possession of migratory birds. You may not sell, offer for sale, purchase, or offer...

  19. 50 CFR 600.1204 - Shark finning; possession at sea and landing of shark fins.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Shark finning; possession at sea and landing of shark fins. 600.1204 Section 600.1204 Wildlife and Fisheries FISHERY CONSERVATION AND... PROVISIONS Shark Finning § 600.1204 Shark finning; possession at sea and landing of shark fins. (a)(1) No...

  20. 10 CFR 70.20a - General license to possess special nuclear material for transport.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false General license to possess special nuclear material for transport. 70.20a Section 70.20a Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DOMESTIC LICENSING OF... transport. (a) A general license is issued to any person to possess formula quantities of strategic special...

  1. Stability properties of solutions to nonlinear models possessing a sign-undefined metric

    International Nuclear Information System (INIS)

    Barashenkov, I.V.

    1983-01-01

    Multicomponent field systems possessing a sign-undefined internal space metric, in particular models with a noncompact global invariance group are investigated. It is shown that the energy cannot have even a conditional relative minimum. It is demonstrated, nevertheless, that the corresponding nonlinear equations of motion are permitted to possess stable particle-like solutions

  2. Stability properties of solutions to nonlinear models possessing a sign-undefined metric

    International Nuclear Information System (INIS)

    Barashenkov, I.V.

    1983-01-01

    Multicomponent field systems possessing a sign-undefined internal space metric, in particular models with a noncompact global invariance group, are investigated. It is shown that the energy cannot have even a conditional relative minimum. It is demonstrated, nevertheless, that the corresponding nonlinear equations of motion are permitted to possess stable particle-like solutions. (Auth.)

  3. The Regulation of the Possession of Weapons at Gatherings | du Toit

    African Journals Online (AJOL)

    The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. ... (b) possession of dangerous weapons during the participation in any religious or cultural activities or lawful sport, recreation or entertainment or (c) legitimate collection, ...

  4. Are symptoms of spirit possessed patients covered by the DSM-IV or DSM-5 criteria for possession trance disorder? A mixed-method explorative study in Uganda.

    Science.gov (United States)

    van Duijl, Marjolein; Kleijn, Wim; de Jong, Joop

    2013-09-01

    As in many cultures, spirit possession is a common idiom of distress in Uganda. The DSM-IV contains experimental research criteria for dissociative and possession trance disorder (DTD and PTD), which are under review for the DSM-5. In the current proposed categories of the DSM-5, PTD is subsumed under dissociative identity disorder (DID) and DTD under dissociative disorders not elsewhere classified. Evaluation of these criteria is currently urgently required. This study explores the match between local symptoms of spirit possession in Uganda and experimental research criteria for PTD in the DSM-IV and proposed criteria for DID in the DSM-5. A mixed-method approach was used combining qualitative and quantitative research methods. Local symptoms were explored of 119 spirit possessed patients, using illness narratives and a cultural dissociative symptoms' checklist. Possible meaningful clusters of symptoms were inventoried through multiple correspondence analysis. Finally, local symptoms were compared with experimental criteria for PTD in the DSM-IV and proposed criteria for DID in the DSM-5. Illness narratives revealed different phases of spirit possession, with passive-influence experiences preceding the actual possession states. Multiple correspondence analysis of symptoms revealed two dimensions: 'passive' and 'active' symptoms. Local symptoms, such as changes in consciousness, shaking movements, and talking in a voice attributed to spirits, match with DSM-IV-PTD and DSM-5-DID criteria. Passive-influence experiences, such as feeling influenced or held by powers from outside, strange dreams, and hearing voices, deserve to be more explicitly described in the proposed criteria for DID in the DSM-5. The suggested incorporation of PTD in DID in the DSM-5 and the envisioned separation of DTD and PTD in two distinctive categories have disputable aspects.

  5. "Satan has afflicted me!" Jinn-possession and mental illness in the Qur'an.

    Science.gov (United States)

    Islam, F; Campbell, R A

    2014-02-01

    Mental health stigma in Muslim communities may be partly due to a commonly held belief among some Muslims about the supernatural causes of mental illness (i.e. jinn-possession brought on by one's sinful life). A thematic analysis was carried out on four English translations and the Arabic text of the Qur'an to explore whether the connection between jinn-possession and insanity exists within the Muslim holy book. No connection between spirit-possession and madness or mental illness was found. Pagans taunted and labelled people as jinn-possessed only to ostracize and scapegoat. Linking the labelling of people as jinn-possession to a pagan practice may be used to educate Muslims, so they can reassess their community's stigma towards the mentally ill.

  6. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  7. Information management

    Science.gov (United States)

    Ricks, Wendell; Corker, Kevin

    1990-01-01

    Primary Flight Display (PFD) information management and cockpit display of information management research is presented in viewgraph form. The information management problem in the cockpit, information management burdens, the key characteristics of an information manager, the interface management system handling the flow of information and the dialogs between the system and the pilot, and overall system architecture are covered.

  8. Exosomes carring gag/env of ALV-J possess negative effect on immunocytes.

    Science.gov (United States)

    Wang, Guihua; Wang, Zhenzhen; Zhuang, Pingping; Zhao, Xiaomin; Cheng, Ziqiang

    2017-11-01

    J subgroup avian leukosis virus (ALV-J) is an exogenous retrovirus of avian. A key feature of ALV-J infection is leading to severe immunosuppressive characteristic of diseases. Viral components of retrovirus were reported closely associated with immunosuppression, and several similarities between exosomes and retrovirus preparations have lead to the hypotheses of retrovirus hijacker exosomes pathway. In this study, we purified exosomes from DF-1 cells infected and uninfected by ALV-J. Electron microscopy and mass spectrometry (MS) analysis showed that ALV-J not only increased the production of exosomes from ALV-J infected DF-1 cells (Exo-J) but also stimulated some proteins expression, especially ALV-J components secreted in exosomes. Immunosuppressive domain peptide (ISD) of envelope subunit transmembrane (TM) and gag of ALV-J were secreted in Exo-J. It has been reported that HIV gag was budded from endosome-like domains of the T cell plasma membrane. But env protein was first detected in exosomes from retrovirus infected cells. We found that Exo-J caused negative effects on splenocytes in a dose-dependant manner by flow cytometric analysis. And low dose of Exo-J activated immune activity of splenocytes, while high dose possessed immunosuppressive properties. Interestingly, Exo-J has no significant effects on the immunosuppression induced by ALV-J, and the immunosuppressive effects induced by Exo-J lower than that by ALV-J. Taken together, our data indicated that Exo-J supplied a microenvironment for the replication and transformation of ALV-J. Copyright © 2017. Published by Elsevier Ltd.

  9. Cytotoxic protein from the mushroom Coprinus comatus possesses a unique mode for glycan binding and specificity

    Science.gov (United States)

    Zhang, Peilan; Yang, Guang; Xia, Changqing; Polston, Jane E.; Li, Gengnan; Li, Shiwu; Lin, Zhao; Yang, Li-jun; Bruner, Steven D.

    2017-01-01

    Glycans possess significant chemical diversity; glycan binding proteins (GBPs) recognize specific glycans to translate their structures to functions in various physiological and pathological processes. Therefore, the discovery and characterization of novel GBPs and characterization of glycan–GBP interactions are significant to provide potential targets for therapeutic intervention of many diseases. Here, we report the biochemical, functional, and structural characterization of a 130-amino-acid protein, Y3, from the mushroom Coprinus comatus. Biochemical studies of recombinant Y3 from a yeast expression system demonstrated the protein is a unique GBP. Additionally, we show that Y3 exhibits selective and potent cytotoxicity toward human T-cell leukemia Jurkat cells compared with a panel of cancer cell lines via inducing caspase-dependent apoptosis. Screening of a glycan array demonstrated GalNAcβ1–4(Fucα1–3)GlcNAc (LDNF) as a specific Y3-binding ligand. To provide a structural basis for function, the crystal structure was solved to a resolution of 1.2 Å, revealing a single-domain αβα-sandwich motif. Two monomers were dimerized to form a large 10-stranded, antiparallel β-sheet flanked by α-helices on each side, representing a unique oligomerization mode among GBPs. A large glycan binding pocket extends into the dimeric interface, and docking of LDNF identified key residues for glycan interactions. Disruption of residues predicted to be involved in LDNF/Y3 interactions resulted in the significant loss of binding to Jurkat T-cells and severely impaired their cytotoxicity. Collectively, these results demonstrate Y3 to be a GBP with selective cytotoxicity toward human T-cell leukemia cells and indicate its potential use in cancer diagnosis and treatment. PMID:28784797

  10. Cytotoxic protein from the mushroom Coprinus comatus possesses a unique mode for glycan binding and specificity.

    Science.gov (United States)

    Zhang, Peilan; Li, Kunhua; Yang, Guang; Xia, Changqing; Polston, Jane E; Li, Gengnan; Li, Shiwu; Lin, Zhao; Yang, Li-Jun; Bruner, Steven D; Ding, Yousong

    2017-08-22

    Glycans possess significant chemical diversity; glycan binding proteins (GBPs) recognize specific glycans to translate their structures to functions in various physiological and pathological processes. Therefore, the discovery and characterization of novel GBPs and characterization of glycan-GBP interactions are significant to provide potential targets for therapeutic intervention of many diseases. Here, we report the biochemical, functional, and structural characterization of a 130-amino-acid protein, Y3, from the mushroom Coprinus comatus Biochemical studies of recombinant Y3 from a yeast expression system demonstrated the protein is a unique GBP. Additionally, we show that Y3 exhibits selective and potent cytotoxicity toward human T-cell leukemia Jurkat cells compared with a panel of cancer cell lines via inducing caspase-dependent apoptosis. Screening of a glycan array demonstrated GalNAcβ1-4(Fucα1-3)GlcNAc (LDNF) as a specific Y3-binding ligand. To provide a structural basis for function, the crystal structure was solved to a resolution of 1.2 Å, revealing a single-domain αβα-sandwich motif. Two monomers were dimerized to form a large 10-stranded, antiparallel β-sheet flanked by α-helices on each side, representing a unique oligomerization mode among GBPs. A large glycan binding pocket extends into the dimeric interface, and docking of LDNF identified key residues for glycan interactions. Disruption of residues predicted to be involved in LDNF/Y3 interactions resulted in the significant loss of binding to Jurkat T-cells and severely impaired their cytotoxicity. Collectively, these results demonstrate Y3 to be a GBP with selective cytotoxicity toward human T-cell leukemia cells and indicate its potential use in cancer diagnosis and treatment.

  11. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  12. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  13. Skeletal muscle myoblasts possess a stretch-responsive local angiotensin signalling system.

    Science.gov (United States)

    Johnston, Adam P W; Baker, Jeff; De Lisio, Michael; Parise, Gianni

    2011-06-01

    A paucity of information exists regarding the presence of local renin-angiotensin systems (RASs) in skeletal muscle and associated muscle stem cells. Skeletal muscle and muscle stem cells were isolated from C57BL/6 mice and examined for the presence of a local RAS using quantitative reverse transcriptase polymerase chain reaction (qRT-PCR), immunohistochemistry (IHC), Western blotting and liquid chromatography-mass spectrometry (LC-MS). Furthermore, the effect of mechanical stimulation on RAS member gene expression was analysed. Whole skeletal muscle, primary myoblasts and C2C12 derived myoblasts and myotubes differentially expressed members of the RAS including angiotensinogen, angiotensin-converting enzyme (ACE), angiotensin II (Ang II) type 1 (AT(1)) and type 2 (AT(2)). Renin transcripts were never detected, however, mRNA for the 'renin-like' enzyme cathepsin D was observed and Ang I and Ang II were identified in cell culture supernatants from proliferating myoblasts. AT(1) appeared to co-localise with polymerised actin filaments in proliferating myoblasts and was primarily found in the nucleus of terminally differentiated myotubes. Furthermore, mechanical stretch of proliferating and differentiating C2C12 cells differentially induced mRNA expression of angiotensinogen, AT(1) and AT(2). Proliferating and differentiated muscle stem cells possess a local stress-responsive RAS in vitro. The precise function of a local RAS in myoblasts remains unknown. However, evidence presented here suggests that Ang II may be a regulator of skeletal muscle myoblasts.

  14. Stereotypes possess heterogeneous directionality: a theoretical and empirical exploration of stereotype structure and content.

    Science.gov (United States)

    Cox, William T L; Devine, Patricia G

    2015-01-01

    We advance a theory-driven approach to stereotype structure, informed by connectionist theories of cognition. Whereas traditional models define or tacitly assume that stereotypes possess inherently Group → Attribute activation directionality (e.g., Black activates criminal), our model predicts heterogeneous stereotype directionality. Alongside the classically studied Group → Attribute stereotypes, some stereotypes should be bidirectional (i.e., Group ⇄ Attribute) and others should have Attribute → Group unidirectionality (e.g., fashionable activates gay). We tested this prediction in several large-scale studies with human participants (NCombined = 4,817), assessing stereotypic inferences among various groups and attributes. Supporting predictions, we found heterogeneous directionality both among the stereotype links related to a given social group and also between the links of different social groups. These efforts yield rich datasets that map the networks of stereotype links related to several social groups. We make these datasets publicly available, enabling other researchers to explore a number of questions related to stereotypes and stereotyping. Stereotype directionality is an understudied feature of stereotypes and stereotyping with widespread implications for the development, measurement, maintenance, expression, and change of stereotypes, stereotyping, prejudice, and discrimination.

  15. Pathological spirit possession as a cultural interpretation of trauma-related symptoms.

    Science.gov (United States)

    Hecker, Tobias; Barnewitz, Eva; Stenmark, Hakon; Iversen, Valentina

    2016-07-01

    Spirit possession is a phenomenon frequently occurring in war-torn countries. It has been shown to be an idiom of distress entailing dissociative symptoms. However, its association with trauma exposure and trauma-related disorders remains unclear. This study aimed to explore subjective disease models and the relationship between pathological spirit possession and trauma-related disorders in the Eastern Democratic Republic of the Congo. Seventy-three (formerly) possessed persons (74% female, mean age = 34 years), referred by traditional and spiritual healers, were interviewed about their experiences of pathological spirit possession, trauma exposure, posttraumatic stress disorder (PTSD) symptoms, depressive symptoms, shame and guilt, psychotic symptoms, somatic complaints, and the impairment of psychosocial functioning. The most common disease model for pathological spirit possession was another person having sent the spirit, mostly a family member or a neighbor, out of jealousy or conflict over resources. Significant correlations were found between spirit possession over lifetime and PTSD symptom severity, feelings of shame and guilt, depressive symptoms, somatic complaints, and psychotic symptoms. Spirit possession during the preceding 4 weeks was associated with PTSD symptom severity, impairment of psychosocial functioning, and psychotic symptom severity. The results of this study indicate that pathological spirit possession is a broad explanatory framework for various subjectively unexplainable mental and physical health problems, including but not limited to trauma-related disorders. Understanding pathological spirit possession as a subjective disease model for various mental and physical health problems may help researchers and clinicians to develop culturally sensitive treatment approaches for affected individuals. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  16. Key Topics in Sports Medicine

    OpenAIRE

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  17. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  18. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  19. 48 CFR 52.236-11 - Use and Possession Prior to Completion.

    Science.gov (United States)

    2010-10-01

    ... possession or use shall not be deemed an acceptance of any work under the contract. (b) While the Government... adjustment shall be made in the contract price or the time of completion, and the contract shall be modified...

  20. Schizophrenia-The spirit possessed 23 year old male from rural ...

    African Journals Online (AJOL)

    A case of a twenty-three year old rural Ghanaian male suffering from schizophrenia and presenting as “possessed by spirits” is reported. Treatment, and outcome by physical means with chlorpromazine; and implications for further research are discussed.

  1. 32 CFR 552.122 - Personnel not authorized to possess or retain personal weapons.

    Science.gov (United States)

    2010-07-01

    ... THE ARMY MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS... person who has been convicted in any court of the possession, use, or sale of marijuana, dangerous or...

  2. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  3. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  4. Feature interpretability and the positions of 2nd person possessives in Brazilian Portuguese

    Directory of Open Access Journals (Sweden)

    Bruna Karla Pereira

    2016-12-01

    Full Text Available Interpretability and valuation of φ-features (Chomsky, 2001; Pesetsky and Torrego, 2007 have played a central role in the investigation of language universals. With regard to that, in standard Brazilian Portuguese (BP, as well as in other Romance languages, possessives have uninterpretable number features, which are valued via nominal agreement. However, dialects of BP, especially the one spoken in Minas Gerais, have shown that 2nd person possessives, in postnominal position, do not have number agreement with the noun. In order to account for these facts, I will argue that, in this grammar, number features on 2nd person possessives are reanalyzed as being: (i associated with the person (rather than the noun and (ii interpretable. From the first postulation, ‘seu’ is expected to be the possessive for 2nd person singular, and ‘seus’ for 2nd person plural. From the second postulation, no number concord is expected to be triggered on the possessive. In addition, based on Danon (2011 and Norris (2014, I will argue that cardinals divide BP DPs into two domains in that phrases located above NumP are marked with the plural morpheme, while phrases below it are unmarked. In this sense, because prenominal possessives precede cardinals (NumP, they must be marked with the plural morpheme for nominal agreement; whereas postnominal possessives, which follow NumP, must be unmarked. Free from the plural marking associated with nominal agreement, postnominal 2nd person possessives favor the reanalysis of the morpheme ‘-s’ as indicating the number associated with person features.

  5. O olhar dos psiquiatras brasileiros sobre os fenômenos de transe e possessão Brazilian psychiatrists’ approaches on trance and possession phenomena

    Directory of Open Access Journals (Sweden)

    Angélica A. Silva de Almeida

    2007-01-01

    Full Text Available CONTEXTO: Os fenômenos de transe e possessão despertaram o interesse da comunidade psiquiátrica brasileira, gerando posturas diversificadas. OBJETIVOS: Descrever e analisar como os fenômenos de transe e possessão foram tratados pelos psiquiatras brasileiros: seu impacto na teoria, na pesquisa e na prática clínica entre 1900 e 1950. MÉTODO: Análise de artigos científicos e leigos, teses e livros sobre transes e possessões produzidos pelos psiquiatras brasileiros entre 1900 e 1950. RESULTADOS: Identificam-se duas correntes de pensamento entre os psiquiatras. A primeira, vinculada às Faculdades de Medicina do Rio de Janeiro e São Paulo, sob forte influência de autores franceses, deteve-se mais na periculosidade do espiritismo para a saúde mental. Defendia a adoção de medidas repressivas com o poder público. O segundo grupo de psiquiatras, ligado às Faculdades de Medicina da Bahia e Pernambuco, embora não desconsiderasse o caráter patológico ou "primitivo" dos fenômenos de transe e possessão, apresentou uma visão mais antropológica e culturalista. Considerando tais fenômenos como manifestações étnicas ou culturais, alguns defenderam o controle médico e a educação do povo para o abandono dessas práticas "primitivas". Outros não consideravam os fenômenos mediúnicos como desencadeadores da loucura, mas manifestações não-patológicas de um universo cultural, além de não vinculá-los ao atraso cultural da população. CONCLUSÕES: As religiões mediúnicas foram objeto de estudo por longo período, resultando hipóteses e práticas diferenciadas por parte da comunidade psiquiátrica brasileira, constituindo-se oportunidade privilegiada para o estudo do impacto dos fatores socioculturais na atividade psiquiátrica.BACKGROUND: Trance and possession experiences have raised interest among Brazilian psychiatrists resulting in a variety of approaches. OBJECTIVES: To describe and analyze how Brazilian psychiatrists

  6. Co-possession of phosphodiesterase type-5 inhibitors (PDE5-I) with nitrates.

    Science.gov (United States)

    Chang, Li-Ling; Ma, Mark; Allmen, Heather von; Henderson, Scott C; Harper, Kristine; Hornbuckle, Kenneth

    2010-06-01

    Estimate the proportion of phosphodiesterase type-5 inhibitor (PDE5-I) patients who co-possess nitrates and compare the proportion of tadalafil patients dispensed nitrates to a matched control group. Secondarily, examine the percentage of co-possession of PDE5-Is and nitrates where the products were dispensed on the same day or written by the same prescriber. Male patients aged 18+ years filling PDE5-I prescriptions between December 2003 and March 2006 were identified using a U.S. longitudinal prescription database (IMS Health LRx). Similar patients not dispensed a PDE5-I during this period were matched to the tadalafil-dispensed cohort using a propensity score approach. Co-possession, as a proxy for concurrent use, was defined as an overlap in time on therapy for a PDE5-I and nitrate and was compared for the three PDE5-Is and for tadalafil to the matched control group. Among 601,063 tadalafil patients, 3.31% were dispensed a nitrate during the study period, compared to 6.18% in control patients (n = 601,063). When co-possessed prescriptions were defined by overlapping exposure periods, the proportion of PDE5-I patients with co-possessed nitrates ranged from 1.44% (tadalafil) to 1.72% (vardenafil) and 2.13% (sildenafil). Co-possession percentages of PDE5-I prescriptions were 0.83% for tadalafil and 1.07% for sildenafil and vardenafil. The majority (54.29%) of co-possessed PDE5-I and nitrate prescriptions had the nitrate dispensed prior to the PDE5-I prescription identified in the study cohort. Keeping in mind the limitations of observational studies, these results suggest that co-dispensing of nitrates and PDE5-Is is low. Compared to control patients, the proportion of nitrate co-possession was lowest for patients filling tadalafil. Tadalafil patients also had the lowest co-possessed proportion among the three PDE5-I cohorts. While the majority of co-possessed drug pairs were prescribed by different providers, the highest percentage of co-prescribing from the same

  7. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  8. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  9. Gun possession among American youth: a discovery-based approach to understand gun violence.

    Science.gov (United States)

    Ruggles, Kelly V; Rajan, Sonali

    2014-01-01

    To apply discovery-based computational methods to nationally representative data from the Centers for Disease Control and Preventions' Youth Risk Behavior Surveillance System to better understand and visualize the behavioral factors associated with gun possession among adolescent youth. Our study uncovered the multidimensional nature of gun possession across nearly five million unique data points over a ten year period (2001-2011). Specifically, we automated odds ratio calculations for 55 risk behaviors to assemble a comprehensive table of associations for every behavior combination. Downstream analyses included the hierarchical clustering of risk behaviors based on their association "fingerprint" to 1) visualize and assess which behaviors frequently co-occur and 2) evaluate which risk behaviors are consistently found to be associated with gun possession. From these analyses, we identified more than 40 behavioral factors, including heroin use, using snuff on school property, having been injured in a fight, and having been a victim of sexual violence, that have and continue to be strongly associated with gun possession. Additionally, we identified six behavioral clusters based on association similarities: 1) physical activity and nutrition; 2) disordered eating, suicide and sexual violence; 3) weapon carrying and physical safety; 4) alcohol, marijuana and cigarette use; 5) drug use on school property and 6) overall drug use. Use of computational methodologies identified multiple risk behaviors, beyond more commonly discussed indicators of poor mental health, that are associated with gun possession among youth. Implications for prevention efforts and future interdisciplinary work applying computational methods to behavioral science data are described.

  10. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  11. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  12. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  13. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  14. Demonic possessions and mental illness: discussion of selected cases in late medieval hagiographical literature.

    Science.gov (United States)

    Espí Forcén, Carlos; Espí Forcén, Fernando

    2014-01-01

    During the Middle Ages, demonic possession constituted an explanation for an erratic behavior in society. Exorcism was the treatment generally applied to demoniacs and seems to have caused some alleviation in the suffering of mentally distressed people. We have selected and analyzed some cases of demonic possession from thirteenth-century hagiographical literature. In the description of demoniacs we have been able to find traits of psychotic, mood, neurotic, personality disorders and epilepsy. The exorcisms analyzed in our article are the result of literary invention more than the description of a contemporary event. Nevertheless, the writers were witnesses of their time, transferred their knowledge about exorcism and possession in their narrative and presumably incorporated their actual experience with demoniacs.

  15. Prepositions in Use: Prepositions of Standard, Prepositions of Possession and Prepositions of Accompaniment

    Directory of Open Access Journals (Sweden)

    Naji Masned AlQbailat

    2016-08-01

    Full Text Available The current research paper attempted at investigating the use of prepositions of standard, prepositions of possession and prepositions of accompaniment by some Jordanian learners of English. A total of 53 Jordanian English Majors participated in the study from the department of English language at Princess Alia University College. In collecting the needed data for the purpose of the study, the researchers employed fifteen items of a multiple choice test. The results of the study showed that Jordanian learners of English encountered moderate difficulty in learning the three aforesaid usages of prepositions. This difficulty is ascribed mainly to first language interference more than intralingual interference. It was also found that prepositions of standard are the most difficult to learn by the participants, followed by prepositions of accompaniment and prepositions of possession respectively.       Keywords: First language Interference, Intralingual Interference, Prepositions of Standard, Prepositions of Accompaniment, Prepositions of Possession

  16. Does possession of assets increase women's participation in reproductive decision-making? Perceptions of Nigerian women.

    Science.gov (United States)

    Omeje, Joachim C; Oshi, Sarah N; Oshi, Daniel C

    2011-01-01

    This study is based on a population-based, descriptive questionnaire survey, the objective of which was to elicit the perceptions of women in south-eastern Nigeria on whether possession of economic/household assets by women enhanced their capacity to negotiate reproductive issues with their husbands. The findings show that the respondents believed that possession of economic/household assets by women in their communities might not necessarily increase their negotiation power in their reproductive decision-making. Other factors tend to attenuate the effects of women's possession of economic/household assets on their reproductive bargaining power. Notable among these may be social norms that implicitly arrogate control of the assets owned by the conjugal couple to the man, even when they are bought by the women. Planners of reproductive health intervention projects, policy-makers and researchers need to be aware of such sociocultural specific phenomena, which do not fit with widely held international beliefs.

  17. The Chew Bahir Drilling Project (HSPDP). Deciphering climate information from the Chew Bahir sediment cores: Towards a continuous half-million year climate record near the Omo - Turkana key palaeonanthropological Site

    Science.gov (United States)

    Foerster, Verena E.; Asrat, Asfawossen; Chapot, Melissa S.; Cohen, Andrew S.; Dean, Jonathan R.; Deino, Alan; Günter, Christina; Junginger, Annett; Lamb, Henry F.; Leng, Melanie J.; Roberts, Helen M.; Schaebitz, Frank; Trauth, Martin H.

    2017-04-01

    As a contribution towards an enhanced understanding of human-climate interactions, the Hominin Sites and Paleolakes Drilling Project (HSPDP) has successfully completed coring five dominantly lacustrine archives of climate change during the last 3.5 Ma in East Africa. All five sites in Ethiopia and Kenya are adjacent to key paleoanthropological research areas encompassing diverse milestones in human evolution, dispersal episodes, and technological innovation. The 280 m-long Chew Bahir sediment records, recovered from a tectonically-bound basin in the southern Ethiopian rift in late 2014, cover the past 550 ka of environmental history, a time period that includes the transition to the Middle Stone Age, and the origin and dispersal of modern Homo sapiens. Deciphering climate information from lake sediments is challenging, due to the complex relationship between climate parameters and sediment composition. We will present the first results in our efforts to develop a reliable climate-proxy tool box for Chew Bahir by deconvolving the relationship between sedimentological and geochemical sediment composition and strongly climate-controlled processes in the basin, such as incongruent weathering, transportation and authigenic mineral alteration. Combining our first results from the long cores with those from a pilot study of short cores taken in 2009/10 along a NW-SE transect of the basin, we have developed a hypothesis linking climate forcing and paleoenvironmental signal-formation processes in the basin. X-ray diffraction analysis of the first sample sets from the long Chew Bahir record reveals similar processes that have been recognized for the uppermost 20 m during the pilot-study of the project: the diagenetic illitization of smectites during episodes of higher alkalinity and salinity in the closed-basin lake induced by a drier climate. The precise time resolution, largely continuous record and (eventually) a detailed understanding of site specific proxy formation

  18. Rulings in Argentinean and Colombian courts decriminalize possession of small amounts of narcotics.

    Science.gov (United States)

    Cozac, David

    2009-12-01

    Two recent court decisions in South America have reflected a growing backlash in the region against the so-called, U.S.-led "war on drugs". In Argentina, the Supreme Court of Justice ruled unanimously on 25 August 2009 that the second paragraph of Article 14 of the country's drug control legislation, which punishes the possession of drugs for personal consumption, was unconstitutional. In Colombia, the Supreme Court of Justice ruled on 8 July 2009 that the possession of illegal drugs for personal use was not a criminal offence.

  19. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  20. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  1. Chocolate Key Cryptography

    Science.gov (United States)

    Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H.

    2010-01-01

    Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…

  2. Circulating Endothelial Microparticles: A Key Hallmark of Atherosclerosis Progression

    Directory of Open Access Journals (Sweden)

    Keshav Raj Paudel

    2016-01-01

    Full Text Available The levels of circulating microparticles (MPs are raised in various cardiovascular diseases. Their increased level in plasma is regarded as a biomarker of alteration in vascular function. The prominent MPs present in blood are endothelial microparticles (EMPs described as complex submicron (0.1 to 1.0 μm vesicles like structure, released in response to endothelium cell activation or apoptosis. EMPs possess both physiological and pathological effects and may promote oxidative stress and vascular inflammation. EMPs release is triggered by inducer like angiotensin II, lipopolysaccharide, and hydrogen peroxide leading to the progression of atherosclerosis. However, there are multiple physiological pathways for EMPs generation like NADPH oxidase derived endothelial ROS formation, Rho kinase pathway, and mitogen-activated protein kinases. Endothelial dysfunction is a key initiating event in atherosclerotic plaque formation. Atheroemboli, resulting from ruptured carotid plaques, is a major cause of stroke. Increasing evidence suggests that EMPs play an important role in the pathogenesis of cardiovascular disease, acting as a marker of damage, either exacerbating disease progression or triggering a repair response. In this regard, it has been suggested that EMPs have the potential to act as biomarkers of disease status. This review aims to provide updated information of EMPs in relation to atherosclerosis pathogenesis.

  3. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  4. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  5. Effects of Offense, Defense, and Ball Possession on Mobility Performance in Wheelchair Basketball

    NARCIS (Netherlands)

    de Witte, Annemarie M. H.; Berger, Monique A. M.; Hoozemans, Marco J. M.; Veeger, Dirkjan H. E. J.; van der Woude, Lucas H. V.

    2017-01-01

    The aim of this study was to determine to what extent mobility performance is influenced by offensive or defensive situations and ball possession and to what extent these actions are different for the field positions. From video analysis, the relative duration of the various wheelchair movements

  6. What does it mean to be possessed by a spirit or demon? Some ...

    African Journals Online (AJOL)

    2015-07-08

    Jul 8, 2015 ... Commons Attribution. License. .... Klass (2003:3) I therefore want to ask the question: 'What is actually .... help to categorise possession in terms of possible causal ... control of life. .... a social structure, the complex formed by all his [her] social ... a way to cope with stressful experiences and, together with.

  7. Competences possessed and required by European graduates. REFLEX Report to HEFCE No 4

    OpenAIRE

    Little, Brenda; Braun, Edith; Tang, Win-Yee

    2008-01-01

    The report is based on the results of a major international study of graduate employment some five years after graduation. It presents an analysis of graduates' perceptions of what competences they need to do their current jobs and whether they possess these competences.

  8. 31 CFR 601.5 - Penalty for unauthorized control or possession.

    Science.gov (United States)

    2010-07-01

    ... CURRENCY AND OTHER SECURITIES § 601.5 Penalty for unauthorized control or possession. The Secretary of the... heretofore adopted for the printing of paper currency or other obligations or securities of the United States, is and will be subject to the provisions of 18 U.S.C. 474A which provides, in part, that it is...

  9. 7 CFR 330.300 - Soil from foreign countries or Territories or possessions. 1

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Soil from foreign countries or Territories or possessions. 1 330.300 Section 330.300 Agriculture Regulations of the Department of Agriculture (Continued) ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE FEDERAL PLANT PEST REGULATIONS; GENERAL; PLANT PESTS; SOIL, STONE, AND QUARRY...

  10. What does it mean to be possessed by a spirit or demon? Some ...

    African Journals Online (AJOL)

    The visible growth in possession and exorcism in Southern Africa can, amongst others, be attributed to the general impression in Christianity that, since Jesus was a successful exorcist, his followers should follow his example. Historical Jesus research generally endorses a view of Jesus as exorcist, which probably also ...

  11. 50 CFR 648.322 - Skate allocation, possession, and landing provisions.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Skate allocation, possession, and landing provisions. 648.322 Section 648.322 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE FISHERIES OF THE NORTHEASTERN UNITED STATES Management Measures for the NE Skate...

  12. 27 CFR 479.105 - Transfer and possession of machine guns.

    Science.gov (United States)

    2010-04-01

    ... a department, agency, or political subdivision thereof; or any lawful transfer or lawful possession... distribution to any department or agency of the United States or any State or political subdivision thereof, or... entities expressing a need for a particular model or interest in seeing a demonstration of a particular...

  13. Logarithmic residues of analytic Banach algebra valued functions possessing a simply meromorphic inverse

    NARCIS (Netherlands)

    H. Bart (Harm); T. Ehrhardt; B. Silbermann

    2001-01-01

    textabstractA logarithmic residue is a contour integral of a logarithmic derivative (left or right) of an analytic Banach algebra valued function. For functions possessing a meromorphic inverse with simple poles only, the logarithmic residues are identified as the sums of idempotents. With the help

  14. Possession, Transportation, and Use of Firearms by Older Youth in 4-H Shooting Sports Programs

    Science.gov (United States)

    White, David J.; Williver, S. Todd

    2014-01-01

    Thirty years ago we would think nothing of driving to school with a jackknife in our pocket or rifle in the gun rack. Since then, the practices of possessing, transporting, and using firearms have been limited by laws, rules, and public perception. Despite restrictions on youth, the Youth Handgun Safety Act does afford 4-H shooting sports members…

  15. THE RELATIONSHIP BETWEEN RESEARCH AND TEACHING: THE CHART OF POSSESSIVE PRONOUNS IN PORTUGUESE

    Directory of Open Access Journals (Sweden)

    Leonardo Lennertz Marcotulio

    2016-01-01

    Full Text Available The aim of this article is to investigate the relationship between research and teaching, concerning the rearrangements operated in the chart of possessive pronouns,  observing in which way sociolinguistic studies have been applied to the teaching of Portuguese through the didactic material prepared for High School and the courses of Portuguese as a Foreign Language.

  16. Effects of offense, defense, and ball possession on mobility performance in wheelchair basketball

    NARCIS (Netherlands)

    De Witte, Annemarie M.H.; Berger, Monique A.M.; Hoozemans, Marco J.M.; Veeger, H.E.J.; van der Woude, Lucas H.V.

    2017-01-01

    The aim of this study was to determine to what extent mobility performance is influenced by offensive or defensive situations and ball possession and to what extent these actions are different for the field positions. From video analysis, the relative duration of the various wheelchair movements

  17. How Risky Is Marijuana Possession? Considering the Role of Age, Race, and Gender

    Science.gov (United States)

    Nguyen, Holly; Reuter, Peter

    2012-01-01

    Arrest rates per capita for possession of marijuana have increased threefold over the last 20 years and now constitute the largest single arrest offense category. Despite the increase in arrest numbers, rates of use have remained stable during much of the same period. This article presents the first estimates of the arrest probabilities for…

  18. 27 CFR 478.40 - Manufacture, transfer, and possession of semiautomatic assault weapons.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Manufacture, transfer, and... COMMERCE IN FIREARMS AND AMMUNITION Administrative and Miscellaneous Provisions § 478.40 Manufacture, transfer, and possession of semiautomatic assault weapons. (a) Prohibition. No person shall manufacture...

  19. Whose name is it anyway? Varying patterns of possessive usage in eponymous neurodegenerative diseases

    Directory of Open Access Journals (Sweden)

    Michael R. MacAskill

    2013-04-01

    Full Text Available There has been long-standing debate over whether use of the possessive form of the names of eponymous neurological disorders should be abandoned. Which view has actually predominated in practice? We empirically assessed current and historical usage in the scientific literature. The PubMed database was queried for the percentage of titles published each year from 1960–2012 which contained the possessive form of Parkinson’s (PD, Alzheimer’s (AD, Huntington’s (HD, Wilson’s (WD, and Gaucher’s (GD diseases (e.g. Huntington’s disease or chorea vs Huntington disease or chorea. Down syndrome (DS, well known for its changes in terminology, was used as a reference. The possessive form was nearly universal in all conditions from 1960 until the early 1970s. In both DS and GD it then declined at an approximately constant rate of 2 percentage points per year to drop below 15%. The possessive forms of both PD and AD began to decline at the same time but stabilised and have since remained above 80%, with a similar but more volatile pattern in HD. WD, meanwhile, is intermediate between the DS/GD and PD/AD/HD patterns, with a slower decline to its current value of approximately 60%. Declining possessive form usage in GD and DS papers has been remarkably uniform over time and has nearly reached completion. PD and AD appear stable in remaining predominantly possessive. The larger volume of papers published in those fields and their possibly greater public recognition and involvement may make that unlikely to change in the short-term. In a secondary analysis restricted to PD, we found that practices have switched dramatically several times in each of three US-published general neurology journals. Meanwhile, in two UK-published journals, and in the specialist title “Movement Disorders”, the possessive form has been maintained consistently. The use of eponyms in neurology shows systematic variation across time, disorders, and journals.

  20. Key Ingredients-Target Groups, Methods and Messages, and Evaluation-of Local-Level, Public Interventions to Counter Stigma and Discrimination: A Lived Experience Informed Selective Narrative Literature Review.

    Science.gov (United States)

    Ashton, Laura J; Gordon, Sarah E; Reeves, Racheal A

    2018-04-01

    A proliferation of recent literature provides substantial direction as to the key ingredients-target groups, messages and methods, and evaluation-of local-level, public interventions to counter stigma and discrimination. This paper provides a selective narrative review of that literature from the perspective or standpoint of anti-stigma experts with lived experience of mental distress, the key findings of which have been synthesised and presented in diagrammatic overviews (infographics). These are intended to guide providers in planning, delivering and evaluating lived experience-directed local-level, public interventions to counter stigma and discrimination in accord with current best practice.

  1. Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2011-01-01

    In this paper we investigate a new category of public key encryption schemes which supports equality test between ciphertexts. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform equality test between their

  2. Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2011-01-01

    In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform plaintext

  3. Relationship between length of A-bomb survivor's health handbook possession and mortality risk

    International Nuclear Information System (INIS)

    Otani, Keiko; Ohtaki, Megu; Satoh, Kenichi; Tonda, Tetsuji

    2012-01-01

    The title handbook was first issued to support the health of A-bomb survivors by Japan MHLW in 1957, and about 220 thousands possess it in 2010. Its major supports contain free medicare, 2 periodic and 2 optional medical examinations/year and other various benefits. This study was performed to elucidate the relationship in the title for evaluation of its life prolonging effect on Hiroshima survivors. The length of handbook possession was defined the period from acquiring it to death. The cohort was 17,335 (7,607 men) registered survivors who had had the handbook for 1 year or more, and before Nov. 1965 or later, until Dec. 2010. Causes of death event were classified to be the cerebrovascular, cardiac and cancerous disease, and others were censored. The objective variable was mortality risk, and predictors were the exposed dose, age at the exposure, chronological age and length of handbook possession. Risk of cerebrovascular or cardiac death was estimated by the model of exponential function, and of cancer death, of power function based on multi-stage theory of carcinogenesis. Results revealed that the cerebrovascular mortality of women and men was 8.1 and 7.2%, respectively; cardiac, 8.7 and 7.2%; and cancerous, 10.1 and 14.9%. Significant reduction of relative risk of cerebrovascular death, about 4% per 1 year handbook possession, was observed in men alone; negative correlations of period effect were seen in cerebrovascular and cardiac death of women; and positive correlation between cancer death and exposed dose was observed. The prophylaxis and continuous treatment of cerebrovascular disease due to the handbook possession were thought effective in men. (T.T.)

  4. Gun possession among American youth: a discovery-based approach to understand gun violence.

    Directory of Open Access Journals (Sweden)

    Kelly V Ruggles

    Full Text Available OBJECTIVE: To apply discovery-based computational methods to nationally representative data from the Centers for Disease Control and Preventions' Youth Risk Behavior Surveillance System to better understand and visualize the behavioral factors associated with gun possession among adolescent youth. RESULTS: Our study uncovered the multidimensional nature of gun possession across nearly five million unique data points over a ten year period (2001-2011. Specifically, we automated odds ratio calculations for 55 risk behaviors to assemble a comprehensive table of associations for every behavior combination. Downstream analyses included the hierarchical clustering of risk behaviors based on their association "fingerprint" to 1 visualize and assess which behaviors frequently co-occur and 2 evaluate which risk behaviors are consistently found to be associated with gun possession. From these analyses, we identified more than 40 behavioral factors, including heroin use, using snuff on school property, having been injured in a fight, and having been a victim of sexual violence, that have and continue to be strongly associated with gun possession. Additionally, we identified six behavioral clusters based on association similarities: 1 physical activity and nutrition; 2 disordered eating, suicide and sexual violence; 3 weapon carrying and physical safety; 4 alcohol, marijuana and cigarette use; 5 drug use on school property and 6 overall drug use. CONCLUSIONS: Use of computational methodologies identified multiple risk behaviors, beyond more commonly discussed indicators of poor mental health, that are associated with gun possession among youth. Implications for prevention efforts and future interdisciplinary work applying computational methods to behavioral science data are described.

  5. The effect of playing tactics and situational variables on achieving score-box possessions in a professional soccer team.

    Science.gov (United States)

    Lago-Ballesteros, Joaquin; Lago-Peñas, Carlos; Rey, Ezequiel

    2012-01-01

    The aim of this study was to analyse the influence of playing tactics, opponent interaction and situational variables on achieving score-box possessions in professional soccer. The sample was constituted by 908 possessions obtained by a team from the Spanish soccer league in 12 matches played during the 2009-2010 season. Multidimensional qualitative data obtained from 12 ordered categorical variables were used. Sampled matches were registered by the AMISCO PRO system. Data were analysed using chi-square analysis and multiple logistic regression analysis. Of 908 possessions, 303 (33.4%) produced score-box possessions, 477 (52.5%) achieved progression and 128 (14.1%) failed to reach any sort of progression. Multiple logistic regression showed that, for the main variable "team possession type", direct attacks and counterattacks were three times more effective than elaborate attacks for producing a score-box possession (P tactics on producing score-box possessions.

  6. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  7. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  8. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  9. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  10. Key figures. Year 2006

    International Nuclear Information System (INIS)

    2006-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  11. Key figures. Year 2005

    International Nuclear Information System (INIS)

    2005-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  12. [A nosology for supernatural phenomena and the construction of the 'possessed' brain in the nineteenth century].

    Science.gov (United States)

    Goncalves, Valeria Portugal; Ortega, Francisco

    2013-06-01

    At the end of the twentieth century, supernatural phenomena such as so called trances and possession by spirits received a scientific classification, which includes the numerous diagnoses of the dominant psychiatry. At the end of the nineteenth century we can observe a process of scientific categorization of phenomena considered to have originated in superstition or popular imagination. In this work we show how trances and spiritual possession were studied by Franz Anton Mesmer and his followers when developing the concept of magnetism; by James Braid during the creation of his theory of hypnosis; and by Jean Martin Charcot, which marked the entry of hysteria into nosological classification. Despite the differences between these schools, we identify the use of the brain and cerebral metaphors as the foundation of theories of the mind.

  13. Tourette's syndrome: from demonic possession and psychoanalysis to the discovery of gene

    Directory of Open Access Journals (Sweden)

    Francisco M.B. Germiniani

    2012-07-01

    Full Text Available In this paper we make a brief historical review of the hypothesis concerning the etiology of Tourette's syndrome (TS, focusing on varying trends over time: at first, its presumed relation to witchcraft and demonic possessions, followed by the psychoanalytical theory, which attributed TS to a masturbatory equivalent. Then, progressing to modern time, to the immunological theory and finally the advent of genetics and their role in the etiology of TS.

  14. Logarithmic residues of analytic Banach algebra valued functions possessing a simply meromorphic inverse

    OpenAIRE

    Bart, Harm; Ehrhardt, T.; Silbermann, B.

    2001-01-01

    textabstractA logarithmic residue is a contour integral of a logarithmic derivative (left or right) of an analytic Banach algebra valued function. For functions possessing a meromorphic inverse with simple poles only, the logarithmic residues are identified as the sums of idempotents. With the help of this observation, the issue of left versus right logarithmic residues is investigated, both for connected and nonconnected underlying Cauchy domains. Examples are given to elucidate the subject ...

  15. A mosaic adenovirus possessing serotype Ad5 and serotype Ad3 knobs exhibits expanded tropism

    International Nuclear Information System (INIS)

    Takayama, Koichi; Reynolds, Paul N.; Short, Joshua J.; Kawakami, Yosuke; Adachi, Yasuo; Glasgow, Joel N.; Rots, Marianne G.; Krasnykh, Victor; Douglas, Joanne T.; Curiel, David T.

    2003-01-01

    The efficiency of cancer gene therapy with recombinant adenoviruses based on serotype 5 (Ad5) has been limited partly because of variable, and often low, expression by human primary cancer cells of the primary cellular-receptor which recognizes the knob domain of the fiber protein, the coxsackie and adenovirus receptor (CAR). As a means of circumventing CAR deficiency, Ad vectors have been retargeted by utilizing chimeric fibers possessing knob domains of alternate Ad serotypes. We have reported that ovarian cancer cells possess a primary receptor for Ad3 to which the Ad3 knob binds independently of the CAR-Ad5 knob interaction. Furthermore, an Ad5-based chimeric vector, designated Ad5/3, containing a chimeric fiber proteins possessing the Ad3 knob, demonstrates CAR-independent tropism by virtue of targeting the Ad3 receptor. Based on these findings, we hypothesized that a mosaic virus possessing both the Ad5 knob and the Ad3 knob on the same virion could utilize either primary receptor, resulting in expanded tropism. In this study, we generated a dual-knob mosaic virus by coinfection of 293 cells with Ad5-based and Ad5/3-based vectors. Characterization of the resultant virions confirmed the incorporation of both Ad5 and Ad3 knobs in the same particle. Furthermore, this mosaic virus was able to utilize either receptor, CAR and the Ad3 receptor, for virus attachment to cells. Enhanced Ad infectivity with the mosaic virus was shown in a panel of cell lines, with receptor profiles ranging from CAR-dominant to Ad3 receptor-dominant. Thus, this mosaic virus strategy may offer the potential to improve Ad-based gene therapy approaches by infectivity enhancement and tropism expansion

  16. Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing

    OpenAIRE

    Jian Yang; Haihang Wang; Jian Wang; Chengxiang Tan; Dingguo Yu

    2011-01-01

    Benefited from cloud storage services, users can save their cost of buying expensive storage and application servers, as well as deploying and maintaining applications. Meanwhile they lost the physical control of their data. So effective methods are needed to verify the correctness of the data stored at cloud servers, which are the research issues the Provable Data Possession (PDP) faced. The most important features in PDP are: 1) supporting for public, unlimited numbers of times of verificat...

  17. Prepositions in Use: Prepositions of Standard, Prepositions of Possession and Prepositions of Accompaniment

    OpenAIRE

    Naji Masned AlQbailat; Islam M. Al-Momani; Yazan Shaker Almahameed

    2016-01-01

    The current research paper attempted at investigating the use of prepositions of standard, prepositions of possession and prepositions of accompaniment by some Jordanian learners of English. A total of 53 Jordanian English Majors participated in the study from the department of English language at Princess Alia University College. In collecting the needed data for the purpose of the study, the researchers employed fifteen items of a multiple choice test. The results of the study showed that J...

  18. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    finite number of input signals, without making any approximations. As an application, we investigate the so-called ''Tomographic Protocol'', which is based on the Six-State Protocol and where Alice and Bob can obtain the additional information which quantum state they share after the distribution step of the protocol. We calculate the obtainable secret key rate under the assumption that the eavesdropper only conducts collective attacks and give a detailed analysis of the dependence of the key rate on various parameters: The number of input signals (the block size), the error rate in the sifted key (the QBER), and the security parameter. Furthermore, we study the influence of multi-photon events which naturally occur in a realistic implementation (orig.)

  19. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  20. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  1. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  2. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  3. Zār Spirit Possession in Iran and African Countries: Group Distress, Culture-Bound Syndrome or Cultural Concept of Distress?

    Directory of Open Access Journals (Sweden)

    Fahimeh Mianji

    2015-12-01

    Full Text Available Zār is the term used to describe a form of spirit possession common in northern African, eastern African, and some Middle-Eastern societies. Although these regions share some cultural similarities arising from their history of slavery, in these places, zār varies in prevalence, clinical characteristics, and social context. Based on a selective review of the literature, this paper looks at the place of zār spirit possession in both DSM-IV and DSM-V; it also examines how zār is manifested in Iran and in African countries including Sudan, Ethiopia, and Egypt; and it aims to provide practical information to mental health clinicians so that they can better understand how this cultural concept is practiced by Iranians and Middle Eastern and African immigrants living near the Persian Gulf coast.

  4. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  5. Establishment of the National Nuclear Regulatory Portal (NNRP) as the key element of the Global Nuclear Safety and Security Network and Regulatory Network (GNSSN/RegNet) for sharing of nuclear safety information and knowledge among the Global Expert Community

    International Nuclear Information System (INIS)

    Kuvshinnikov, A.V.

    2011-01-01

    The Global Nuclear Safety and Security Network (GNSSN) implements the concept of the Global Nuclear Safety and Security Framework (GNSSF) as outlined in INSAG 21. This is the framework of instruments and resources for achieving and maintaining worldwide a high level of safety and security at nuclear facilities and activities as stated in SF-1 and supporting safety standards or recommendations such as INSAG-12. National efforts are and should be augmented by the activities of a variety of international enterprises that facilitate safety and security. The IAEA standard GS-R-3 requires that information and knowledge is managed as a resource. Further strengthening of GNSSN in particular regulatory networking as intended by GNSSN/RegNet has to be based on current national priorities, on existing regional and thematic networks and on the established mechanisms of international co-operation as presented for example on the websites of the IAEA or the OECD-NEA. Current design and operation of RegNet are flexible enough to accommodate differences in national and international approaches and practices and to facilitate exchange and cooperation on regulatory matters. The main role of GNSSN/RegNet is sharing knowledge and bringing people together to enhance and promote nuclear safety and security. The objectives of GNSSN/RegNet: enhancing safety and security by international cooperation, sharing information and best practices, enabling adequate access to relevant safety and security information and promoting the dissemination of this information, implementing active collaboration in the relevant areas related to safety and security, such as joint projects, peer reviews, enabling synergies among existing networks and initiatives, informing the public on the relevant safety and security areas and the related international collaboration. In the RegNet part of the GNSSN exist the National Nuclear Regulatory Portal (NNRP) which is on one hand a part of the global RegNet and on the

  6. The Humanitarian Bailment of Foreign Possessed Territories: A Proactive Method of Legal Analysis

    Science.gov (United States)

    1996-04-01

    entrusts an employee with the employer’s lawn mower to mow the employer’s lawn .220 This is analogous to the permissive entry situation where a host...accompanying text. 82 If an employee feloniously takes the lawn mower from the employer’s place of business to the employee’s house the servant has...committed larceny because the employee never had 230possession of the mower, only custody. If the employee picked up the lawn mower from the repair

  7. Optimal Scheduling of Railway Track Possessions in Large-Scale Projects with Multiple Construction Works

    DEFF Research Database (Denmark)

    Li, Rui; Roberti, Roberto

    2017-01-01

    satisfying different operational constraints and minimizing the total construction cost. To find an optimal solution of the RTPSP, this paper proposes an approach that, first, transfers the nominal market prices into track-possession-based real prices, and then generates a schedule of the construction works...... by solving a mixed-integer linear-programming model for the given track blocking proposal. The proposed approach is tested on a real-life case study from the Danish railway infrastructure manager. The results show that, in 2 h of computing time, the approach is able to provide solutions that are within 0...

  8. Power, slavery, and spirit possession in East Africa: A few reflections

    Directory of Open Access Journals (Sweden)

    Beatrice Nicolini

    2014-02-01

    Full Text Available Spirit possession and its relationship with power aims to offer here a better understanding not only of East African societies, but, most of all, of their historical role in numerous political and military conflicts and also within peace-building processes that represent a continuation of a topic of longstanding concern in East African history. The relationships between religions, local cultures and institutional powers throughout contemporary East African history will be re-read through regional and transnational, as well as international dynamics.

  9. The Lived Space: Possession, Ownership, and Land Sales on the Chilean Frontier (Valdivia, 1790-1830

    Directory of Open Access Journals (Sweden)

    Manuel Bastias Saavedra

    2018-01-01

    Full Text Available By looking into sales of indigenous land in the territory of Valdivia between 1790 and 1830, this article discusses how legal interactions were tied to the local spaces of rural habitation. Since ownership was linked with possession and use in Spanish colonial law, local social relations and shared local knowledge were crucial for determining legal ownership and ensuring the validity of land transfers. This article provides insights into how law operated in newly integrated colonial spaces, and reveals that land transfers did not yet constitute purely contractual relations but were instead socially negotiated transactions involving different levels of authority and dependency.

  10. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  11. Assessment of Management Competencies Possessed by Postgraduate University Business Education Students to Handle Entrepreneurship Business Challenges in Nigeria

    Science.gov (United States)

    Okoro, James

    2015-01-01

    University Business Education graduates, by the nature of their programme, ought to possess relevant management competencies for successful entrepreneurship but casual observation and empirical reports indicate that they are not doing well in this aspect. Therefore, this study assessed the management competencies possessed by the university…

  12. 75 FR 58993 - Migratory Bird Hunting; Late Seasons and Bag and Possession Limits for Certain Migratory Game Birds

    Science.gov (United States)

    2010-09-24

    ... Part V Department of the Interior Fish and Wildlife Service 50 CFR Part 20 Migratory Bird Hunting; Late Seasons and Bag and Possession Limits for Certain Migratory Game Birds; Final Rule #0;#0;Federal...-1231-9BPP-L2] RIN 1018-AX06 Migratory Bird Hunting; Late Seasons and Bag and Possession Limits for...

  13. 26 CFR 1.937-3 - Income effectively connected with the conduct of a trade or business in a possession.

    Science.gov (United States)

    2010-04-01

    ... operates an active financing business from offices in, Possession I. Interests in G are owned by D, a bona... of a trade or business in a possession. 1.937-3 Section 1.937-3 Internal Revenue INTERNAL REVENUE... United States § 1.937-3 Income effectively connected with the conduct of a trade or business in a...

  14. Assessment of Accounting Competencies Possessed by Postgraduate University Business Education Students to Handle Entrepreneurship Business Challenges in Nigeria

    Science.gov (United States)

    Okoro, James

    2014-01-01

    University Business Education graduates, by the nature of their programme, ought to possess relevant accounting competencies for successful entrepreneurship but casual observation and empirical reports indicate that they are not doing well in this aspect. Therefore, this study assessed the accounting competencies possessed by university…

  15. Hierarchical remote data possession checking method based on massive cloud files

    Directory of Open Access Journals (Sweden)

    Ma Haifeng

    2017-06-01

    Full Text Available Cloud storage service enables users to migrate their data and applications to the cloud, which saves the local data maintenance and brings great convenience to the users. But in cloud storage, the storage servers may not be fully trustworthy. How to verify the integrity of cloud data with lower overhead for users has become an increasingly concerned problem. Many remote data integrity protection methods have been proposed, but these methods authenticated cloud files one by one when verifying multiple files. Therefore, the computation and communication overhead are still high. Aiming at this problem, a hierarchical remote data possession checking (hierarchical-remote data possession checking (H-RDPC method is proposed, which can provide efficient and secure remote data integrity protection and can support dynamic data operations. This paper gives the algorithm descriptions, security, and false negative rate analysis of H-RDPC. The security analysis and experimental performance evaluation results show that the proposed H-RDPC is efficient and reliable in verifying massive cloud files, and it has 32–81% improvement in performance compared with RDPC.

  16. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  17. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  18. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  19. Photonic crystals possessing multiple Weyl points and the experimental observation of robust surface states

    Science.gov (United States)

    Chen, Wen-Jie; Xiao, Meng; Chan, C. T.

    2016-01-01

    Weyl points, as monopoles of Berry curvature in momentum space, have captured much attention recently in various branches of physics. Realizing topological materials that exhibit such nodal points is challenging and indeed, Weyl points have been found experimentally in transition metal arsenide and phosphide and gyroid photonic crystal whose structure is complex. If realizing even the simplest type of single Weyl nodes with a topological charge of 1 is difficult, then making a real crystal carrying higher topological charges may seem more challenging. Here we design, and fabricate using planar fabrication technology, a photonic crystal possessing single Weyl points (including type-II nodes) and multiple Weyl points with topological charges of 2 and 3. We characterize this photonic crystal and find nontrivial 2D bulk band gaps for a fixed kz and the associated surface modes. The robustness of these surface states against kz-preserving scattering is experimentally observed for the first time. PMID:27703140

  20. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  1. Novel Imidazopyridine Derivatives Possess Anti-Tumor Effect on Human Castration-Resistant Prostate Cancer Cells.

    Directory of Open Access Journals (Sweden)

    Matthew A Ingersoll

    Full Text Available Prostate cancer (PCa is the second leading cause of cancer-related death afflicting United States males. Most treatments to-date for metastatic PCa include androgen-deprivation therapy and second-generation anti-androgens such as abiraterone acetate and enzalutamide. However, a majority of patients eventually develop resistance to these therapies and relapse into the lethal, castration-resistant form of PCa to which no adequate treatment option remains. Hence, there is an immediate need to develop effective therapeutic agents toward this patient population. Imidazopyridines have recently been shown to possess Akt kinase inhibitory activity; thus in this study, we investigated the inhibitory effect of novel imidazopyridine derivatives HIMP, M-MeI, OMP, and EtOP on different human castration-resistant PCa cells. Among these compounds, HIMP and M-MeI were found to possess selective dose- and time-dependent growth inhibition: they reduced castration-resistant PCa cell proliferation and spared benign prostate epithelial cells. Using LNCaP C-81 cells as the model system, these compounds also reduced colony formation as well as cell adhesion and migration, and M-MeI was the most potent in all studies. Further investigation revealed that while HIMP primarily inhibits PCa cell growth via suppression of PI3K/Akt signaling pathway, M-MeI can inhibit both PI3K/Akt and androgen receptor pathways and arrest cell growth in the G2 phase. Thus, our results indicate the novel compound M-MeI to be a promising candidate for castration-resistant PCa therapy, and future studies investigating the mechanism of imidazopyridine inhibition may aid to the development of effective anti-PCa agents.

  2. Novel Imidazopyridine Derivatives Possess Anti-Tumor Effect on Human Castration-Resistant Prostate Cancer Cells.

    Science.gov (United States)

    Ingersoll, Matthew A; Lyons, Anastesia S; Muniyan, Sakthivel; D'Cunha, Napoleon; Robinson, Tashika; Hoelting, Kyle; Dwyer, Jennifer G; Bu, Xiu R; Batra, Surinder K; Lin, Ming-Fong

    2015-01-01

    Prostate cancer (PCa) is the second leading cause of cancer-related death afflicting United States males. Most treatments to-date for metastatic PCa include androgen-deprivation therapy and second-generation anti-androgens such as abiraterone acetate and enzalutamide. However, a majority of patients eventually develop resistance to these therapies and relapse into the lethal, castration-resistant form of PCa to which no adequate treatment option remains. Hence, there is an immediate need to develop effective therapeutic agents toward this patient population. Imidazopyridines have recently been shown to possess Akt kinase inhibitory activity; thus in this study, we investigated the inhibitory effect of novel imidazopyridine derivatives HIMP, M-MeI, OMP, and EtOP on different human castration-resistant PCa cells. Among these compounds, HIMP and M-MeI were found to possess selective dose- and time-dependent growth inhibition: they reduced castration-resistant PCa cell proliferation and spared benign prostate epithelial cells. Using LNCaP C-81 cells as the model system, these compounds also reduced colony formation as well as cell adhesion and migration, and M-MeI was the most potent in all studies. Further investigation revealed that while HIMP primarily inhibits PCa cell growth via suppression of PI3K/Akt signaling pathway, M-MeI can inhibit both PI3K/Akt and androgen receptor pathways and arrest cell growth in the G2 phase. Thus, our results indicate the novel compound M-MeI to be a promising candidate for castration-resistant PCa therapy, and future studies investigating the mechanism of imidazopyridine inhibition may aid to the development of effective anti-PCa agents.

  3. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  4. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  5. Association between socio-economic status and childhood undernutrition in Bangladesh; a comparison of possession score and poverty index.

    Science.gov (United States)

    Mohsena, Masuda; Mascie-Taylor, C G Nicholas; Goto, Rie

    2010-10-01

    To determine how much of the variation in nutritional status of Bangladeshi children under 5 years old can be attributed to the socio-economic status of the family. Nutritional status used reference Z-scores of weight-for-age (WAZ), height-for-age (HAZ) and weight-for-height (WHZ). A 'possession score' was generated based on ownership of a radio, television, bicycle, motorcycle and telephone, and the availability of electricity, with categories of 0 to 4+ possessions. A five-point (quintile) 'poverty index' was created using principal component analysis. The Bangladesh Demographic and Health Survey 2004 was the source of data. A sample of 4891 children aged <5 years was obtained. Some 57.8 % of the sample was either stunted, wasted or underweight (7.7 % were stunted, wasted and underweight). Of those stunted (48.4 %), 25.7 % were also underweight. Underweight and wasting prevalences were 40.7 % and 14.3 %, respectively. Mean WAZ, HAZ and WHZ did not differ by sex. Children of mothers with no education or no possessions were, on average, about 1 sd more underweight and stunted than those with higher educated mothers or with 4+ possessions. The possession score provided much greater discrimination of undernutrition than the poverty index. Nearly 50 % of children from households with no possessions were stunted, wasted or underweight (only 27 % in the poorest quintile), compared with only 3-6 % of children from households with 4+ possessions (over 13 % in the richest quintile). Maternal education and possession score were the main predictors of a child's nutritional status. Possession score was a much better indicator of undernutrition than the poverty index.

  6. Review: Lisa Mackenrodt, Swahili Spirit Possession and Islamic Healing in Contemporary Tanzania: The Jinn Fly on Friday (2011 Buchbesprechung: Lisa Mackenrodt, Swahili Spirit Possession and Islamic Healing in Contemporary Tanzania: The Jinn Fly on Friday (2011

    Directory of Open Access Journals (Sweden)

    Jigal Beez

    2013-01-01

    Full Text Available Review of the monograph:Lisa Mackenrodt, Swahili Spirit Possession and Islamic Healing in Contemporary Tanzania: The Jinn Fly on Friday, Hamburg: Verlag Dr. Kovač, 2011, ISBN 978-3-8300-5806-9, 216 pagesBesprechung der Monographie:Lisa Mackenrodt, Swahili Spirit Possession and Islamic Healing in Contemporary Tanzania: The Jinn Fly on Friday, Hamburg: Verlag Dr. Kovač, 2011, ISBN 978-3-8300-5806-9, 216 Seiten

  7. INFORMATION TECHNOLOGY, INTERNET, AND MARKETING

    OpenAIRE

    Mihane Berisha-Namani

    2013-01-01

    Information technology developed very fast, and today's marketing activities are not possible without the help of information technology. Furthermore, it is difficult to think of a policy domain not affected by usage of information technology. Information technology is making possible and creating connections between businesses and organizations. The implications of information technology usage in marketing activities are profound too. Using information technology, companies possess the poten...

  8. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    the obtainable key rate for any finite number of input signals, without making any approximations. As an application, we investigate the so-called ''Tomographic Protocol'', which is based on the Six-State Protocol and where Alice and Bob can obtain the additional information which quantum state they share after the distribution step of the protocol. We calculate the obtainable secret key rate under the assumption that the eavesdropper only conducts collective attacks and give a detailed analysis of the dependence of the key rate on various parameters: The number of input signals (the block size), the error rate in the sifted key (the QBER), and the security parameter. Furthermore, we study the influence of multi-photon events which naturally occur in a realistic implementation (orig.)

  9. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  10. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  11. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  12. Dissociative trance disorder: clinical and Rorschach findings in ten persons reporting demon possession and treated by exorcism.

    Science.gov (United States)

    Ferracuti, S; Sacco, R; Lazzari, R

    1996-06-01

    Although dissociative trance disorders, especially possession disorder, are probably more common than is usually though, precise clinical data are lacking. Ten persons undergoing exorcisms for devil trance possession state were studied with the Dissociative Disorders Diagnostic Schedule and the Rorschach test. These persons had many traits in common with dissociative identity disorder patients. They were overwhelmed by paranormal experiences. Despite claiming possession by a demon, most of them managed to maintain normal social functioning. Rorschach findings showed that these persons had a complex personality organization: Some of them displayed a tendency to oversimplify stimulus perception whereas others seemed more committed to psychological complexity. Most had severe impairment of reality testing, and 6 of the participants had an extratensive coping stile. In this group of persons reporting demon possession, dissociative trance disorder seems to be a distinct clinical manifestation of a dissociative continuum, sharing some features with dissociative identity disorder.

  13. Global mental health and trauma exposure: the current evidence for the relationship between traumatic experiences and spirit possession.

    Science.gov (United States)

    Hecker, Tobias; Braitmayer, Lars; van Duijl, Marjolein

    2015-01-01

    We present a literature review on trauma exposure and spirit possession in low- and middle-income countries (LMICs). Despite the World Health Organization's objective of culturally appropriate mental health care in the Mental Health Action Plan 2013-2020, and the recommendations of the Inter-Agency Standing Committee to consider local idioms of distress and to collaborate with local resources, this topic still receives very little attention. Pathological spirit possession is commonly defined as involuntary, uncontrollable, and occurring outside of ritual settings. It is often associated with stigmatization, suffering, and dysfunctional behavior. While spirit possession has been discussed as an idiom of distress in anthropological literature, recent quantitative studies have presented support for a strong relationship between traumatic experiences and pathological possession states. The aim of this review was to investigate this relationship systematically in LMICs, in view of the debate on how to address the mental health gap in LMICs. Twenty-one articles, published in peer-reviewed English-language journals between 1994 and 2013, were identified and analyzed with regard to prevalence of possessive trance disorders, patients' sociodemographic characteristics, and its relation to traumatic experiences. The review and analysis of 917 patients with symptoms of possessive trance disorders from 14 LMICs indicated that it is a phenomenon occurring worldwide and with global relevance. This literature review suggests a strong relationship between trauma exposure and spirit possession with high prevalence rates found especially in postwar areas in African countries. More attention for possessive trance disorders in mental health and psychosocial intervention programs in humanitarian emergency settings as well as in societies in transition in LMICs is needed and justified by the results of this systematic literature review.

  14. Global mental health and trauma exposure: the current evidence for the relationship between traumatic experiences and spirit possession

    Science.gov (United States)

    Hecker, Tobias; Braitmayer, Lars; van Duijl, Marjolein

    2015-01-01

    Background We present a literature review on trauma exposure and spirit possession in low- and middle-income countries (LMICs). Despite the World Health Organization's objective of culturally appropriate mental health care in the Mental Health Action Plan 2013–2020, and the recommendations of the Inter-Agency Standing Committee to consider local idioms of distress and to collaborate with local resources, this topic still receives very little attention. Pathological spirit possession is commonly defined as involuntary, uncontrollable, and occurring outside of ritual settings. It is often associated with stigmatization, suffering, and dysfunctional behavior. While spirit possession has been discussed as an idiom of distress in anthropological literature, recent quantitative studies have presented support for a strong relationship between traumatic experiences and pathological possession states. Objective The aim of this review was to investigate this relationship systematically in LMICs, in view of the debate on how to address the mental health gap in LMICs. Methods Twenty-one articles, published in peer-reviewed English-language journals between 1994 and 2013, were identified and analyzed with regard to prevalence of possessive trance disorders, patients’ sociodemographic characteristics, and its relation to traumatic experiences. Results The review and analysis of 917 patients with symptoms of possessive trance disorders from 14 LMICs indicated that it is a phenomenon occurring worldwide and with global relevance. This literature review suggests a strong relationship between trauma exposure and spirit possession with high prevalence rates found especially in postwar areas in African countries. Conclusions More attention for possessive trance disorders in mental health and psychosocial intervention programs in humanitarian emergency settings as well as in societies in transition in LMICs is needed and justified by the results of this systematic literature review

  15. Global mental health and trauma exposure: the current evidence for the relationship between traumatic experiences and spirit possession

    Directory of Open Access Journals (Sweden)

    Tobias Hecker

    2015-11-01

    Full Text Available Background: We present a literature review on trauma exposure and spirit possession in low- and middle-income countries (LMICs. Despite the World Health Organization's objective of culturally appropriate mental health care in the Mental Health Action Plan 2013–2020, and the recommendations of the Inter-Agency Standing Committee to consider local idioms of distress and to collaborate with local resources, this topic still receives very little attention. Pathological spirit possession is commonly defined as involuntary, uncontrollable, and occurring outside of ritual settings. It is often associated with stigmatization, suffering, and dysfunctional behavior. While spirit possession has been discussed as an idiom of distress in anthropological literature, recent quantitative studies have presented support for a strong relationship between traumatic experiences and pathological possession states. Objective: The aim of this review was to investigate this relationship systematically in LMICs, in view of the debate on how to address the mental health gap in LMICs. Methods: Twenty-one articles, published in peer-reviewed English-language journals between 1994 and 2013, were identified and analyzed with regard to prevalence of possessive trance disorders, patients’ sociodemographic characteristics, and its relation to traumatic experiences. Results: The review and analysis of 917 patients with symptoms of possessive trance disorders from 14 LMICs indicated that it is a phenomenon occurring worldwide and with global relevance. This literature review suggests a strong relationship between trauma exposure and spirit possession with high prevalence rates found especially in postwar areas in African countries. Conclusions: More attention for possessive trance disorders in mental health and psychosocial intervention programs in humanitarian emergency settings as well as in societies in transition in LMICs is needed and justified by the results of this

  16. George's secret key to the universe

    CERN Document Server

    Hawking, Lucy; Galfard, Christophe; Parsons, Gary

    2007-01-01

    In their bestselling book for young readers, noted physicist Stephen Hawking and his daughter, Lucy, provide a grand and funny adventure that explains fascinating information about our universe, including Dr. Hawking's latest ideas about black holes. It's the story of George, who's taken through the vastness of space by a scientist, his daughter, and their super-computer named Cosmos. George's Secret Key to the Universe was a New York Times bestseller and a selection of Al's Book Club on the Today show.

  17. Online Programs and Geographic Proximity are Key Determinants of Information Professionals’ Interest in Pursuing Post-Master’s Education at the Doctoral Level. A Review of: Powell, Ronald R. and Susan E. Boling. “Post-Master’s Educational Needs of Information Professionals.” Journal of Access Services 3.4 (2005: 29-43.

    Directory of Open Access Journals (Sweden)

    Martha Ingrid Preddie

    2009-03-01

    administration. A question inviting any other comments on the issue of post-master’s education yielded a predominant desire for “non traditional instruction,” particularly online courses as well as classes held in convenient locations. In terms of relationships between geographic location and factors that influenced interest in enrolling in a doctoral program, the desire “to become a more effective manager,” and “other” were statistically significant. The analysis also revealed a strong positive relationship between willingness to pursue an LIS-only doctoral program and the availability of such a program in geographic proximity. Similarly, there was a strong relationship between willingness to pursue an LIS program in close vicinity and the importance that was given to further LIS education.Conclusion – Online instruction and geographic proximity are key determinants of information professionals’ interest in pursuing post-master’s education at the doctoral level. Continuing education activities, non-degree coursework, and certificate programs are preferred over doctoral LIS programs, despite the finding that the major reason for enrolling in doctoral LIS programs is to fulfill the desire for knowledge acquisition. Schools offering Library and Information Science studies need to explore options for providing distance-education doctoral LIS programs as a means of reversing the current shortage of LIS faculty.

  18. Silver Nanoparticles Complexed with Bovine Submaxillary Mucin Possess Strong Antibacterial Activity and Protect against Seedling Infection.

    Science.gov (United States)

    Makarovsky, Daria; Fadeev, Ludmila; Salam, Bolaji Babajide; Zelinger, Einat; Matan, Ofra; Inbar, Jacob; Jurkevitch, Edouard; Gozin, Michael; Burdman, Saul

    2018-02-15

    A simple method for the synthesis of nanoparticles (NPs) of silver (Ag) in a matrix of bovine submaxillary mucin (BSM) was reported previously by some of the authors of this study. Based on mucin characteristics such as long-lasting stability, water solubility, and surfactant and adhesive characteristics, we hypothesized that these compounds, named BSM-Ag NPs, may possess favorable properties as potent antimicrobial agents. The goal of this study was to assess whether BSM-Ag NPs possess antibacterial activity, focusing on important plant-pathogenic bacterial strains representing both Gram-negative ( Acidovorax and Xanthomonas ) and Gram-positive ( Clavibacter ) genera. Growth inhibition and bactericidal assays, as well as electron microscopic observations, demonstrate that BSM-Ag NPs, at relatively low concentrations of silver, exert strong antimicrobial effects. Moreover, we show that treatment of melon seeds with BSM-Ag NPs effectively prevents seed-to-seedling transmission of Acidovorax citrulli , one of the most threatening pathogens of cucurbit production worldwide. Overall, our findings demonstrate strong antimicrobial activity of BSM-Ag NPs and their potential application for reducing the spread and establishment of devastating bacterial plant diseases in agriculture. IMPORTANCE Bacterial plant diseases challenge agricultural production, and the means available to manage them are limited. Importantly, many plant-pathogenic bacteria have the ability to colonize seeds, and seed-to-seedling transmission is a critical route by which bacterial plant diseases spread to new regions and countries. The significance of our study resides in the following aspects: (i) the simplicity of the method of BSM-Ag NP synthesis, (ii) the advantageous chemical properties of BSM-Ag NPs, (iii) the strong antibacterial activity of BSM-Ag NPs at relatively low concentrations of silver, and (iv) the fact that, in contrast to most studies on the effects of metal NPs on plant pathogens

  19. Information Literacy for Health Professionals: Teaching Essential Information Skills with the Big6 Information Literacy Model

    Science.gov (United States)

    Santana Arroyo, Sonia

    2013-01-01

    Health professionals frequently do not possess the necessary information-seeking abilities to conduct an effective search in databases and Internet sources. Reference librarians may teach health professionals these information and technology skills through the Big6 information literacy model (Big6). This article aims to address this issue. It also…

  20. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  1. The possession game? A comparative analysis of ball retention and team success in European and international football, 2007-2010.

    Science.gov (United States)

    Collet, Christian

    2013-01-01

    Possession is thought of as central to success in modern football, but questions remain about its impact on positive team outcomes (Bate, 1988; Hughes & Franks, 2005; Pollard & Reep, 1997; Stanhope, 2001). Recent studies (e.g. Bloomfield, Polman, & O'Donoghue, 2005; Carling, Williams, & Reilly, 2005; James, Mellallieu, & Holley, 2002; Jones, James, & Mellalieu, 2004; Lago, 2009; Lago & Martin, 2007; Lago-Peñas & Dellal, 2010; Lago-Peñas, Lago-Ballesteros, Dellal, & Gómez, 2010; Taylor, Mellalieu, & James, 2005; Tucker, Mellalieu, James, & Taylor, 2005) that have examined these questions have often been constrained by an exclusive focus on English or Spanish domestic play. Using data from five European leagues, UEFA and FIFA tournaments, the study found that while possession time and passing predicted aggregated team success in domestic league play, both variables were poor predictors at the individual match level once team quality and home advantage were accounted for. In league play, the effect of greater possession was consistently negative; in the Champions League, it had virtually no impact. In national team tournaments, possession failed to reach significance when offensive factors were accounted for. Much of the success behind the 'possession game' was thus a function of elite teams confined in geographic and competitive space. That ball hegemony was not consistently tied to success suggests that a nuanced approach to possession is needed to account for variant strategic environments (e.g. James et al., 2002) and compels match analysts to re-examine the metric's overall value.

  2. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  3. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  4. Does the copolymer poly(vinylidene cyanide-tricyanoethylene) possess piezoelectricity?

    Science.gov (United States)

    Wang, Zhi-Yin; Su, Ke-He; Xu, Qiong

    2012-10-01

    The geometry, energy, internal rotation barrier, dipole moment, and molecular polarizability of the α- and β-chain models of poly(vinylidene cyanide-tricyanoethylene) [P(VDCN-TrCN)] were studied with density functional theory at the B3PW91/6-31G(d) level. The effects of the chain length and the TrCN content on the copolymer chain stability, the chain conformation, and the electrical properties of P(VDCN-TrCN) were examined and compared with those of poly(vinylidene fluoride-trifluoroethylene) and PVDCN to gauge whether P(VDCN-TrCN) would be expected to possess substantial piezoelectricity. The results of this study showed that the stability of the β conformation increases and the energy difference per monomer unit between the β- and α-chains decreases with increasing TrCN. However, introducing TrCN into VDCN will not significantly enhance the radius of curvature of the P(VDCN-TrCN) chains. The average dipole moment per monomer unit in the β-chain is affected by the chain curvature and the TrCN content. The amount of piezoelectricity present in P(VDCN-TrCN) is slightly smaller than that in PVDCN, and is less than that in poly(vinylidene fluoride-trifluoroethylene).

  5. Steady nanofluid flow with variable fluid possessions over a linearly extending surface: A Lie group exploration

    Directory of Open Access Journals (Sweden)

    Kalidas Das

    2018-03-01

    Full Text Available The temperament of stream characteristic, heat and mass transfer of MHD forced convective flow over a linearly expanding porous medium has been scrutinized in the progress exploration. The germane possessions of the liquid like viscosity along with thermal conductivity are believed to be variable in nature, directly influenced by the temperature of flow. As soon as gaining the system of leading equations of the stream, Lie symmetric group transformations have been employed to come across the fitting parallel conversions to alter the central PDEs into a suit of ODEs. The renovated system of ODE with appropriate boundary conditions is numerically solved with the assistance of illustrative software MAPLE 17. The consequences of the relevant factors of the system have been exemplified through charts and graphs. An analogous qualified survey has been prepared among present inquiry and subsisting reads and achieved an admirable accord between them. The variable viscosity parameter has more significant effect on nanofluid velocity than regular fluid and temporal profile as well as nanoparticle concentration is also influenced with variable viscosity. Keywords: Nanofluid, Stretching sheet, Variable viscosity, Variable thermal conductivity, Lie symmetry group

  6. Facile approach to the fabrication of a micropattern possessing nanoscale substructure.

    Science.gov (United States)

    Ji, Qiang; Jiang, Xuesong; Yin, Jie

    2007-12-04

    On the basis of the combined technologies of photolithography and reaction-induced phase separation (RIPS), a facile approach has been successfully developed for the fabrication of a micropattern possessing nanoscale substructure on the thin film surface. This approach involves three steps. In the first step, a thin film was prepared by spin coating from a solution of a commercial random copolymer, polystyrene-r-poly(methyl methacrylate) (PS-r-PMMA) and a commercial crosslinker, trimethylolpropane triacrylate (TMPTA). In the second step, photolithograph was performed with the thin film using a 250 W high-pressure mercury lamp to produce the micropattern. Finally, the resulting micropattern was annealed at 200 degrees C for a certain time, and reaction-induced phase separation occurred. After soaking in chloroform for 4 h, nanoscale substructure was obtained. The whole processes were traced by atomic force microscopy (AFM), X-ray photoelectron spectrometry (XPS), and Fourier transform infrared (FTIR) spectroscopy, and the results supported the proposed structure.

  7. Highly tilted liquid crystalline materials possessing a direct phase transition from antiferroelectric to isotropic phase

    Energy Technology Data Exchange (ETDEWEB)

    Milewska, K.; Drzewiński, W. [Institute of Chemistry, Military University of Technology, 00-908 Warsaw (Poland); Czerwiński, M., E-mail: mczerwinski@wat.edu.pl [Institute of Chemistry, Military University of Technology, 00-908 Warsaw (Poland); Dąbrowski, R. [Institute of Chemistry, Military University of Technology, 00-908 Warsaw (Poland); Piecek, W. [Institute of Applied Physics, Military University of Technology, 00-908 Warsaw (Poland)

    2016-03-01

    Pure compounds and multicomponent mixtures with a broad temperature range of high tilted liquid crystalline antiferroelectric phase and a direct phase transition from antiferroelectric to isotropic phase, were obtained. X-ray diffraction analysis confirms these kinds of materials form a high tilted anticlinic phase, with a fixed layer spacing and very weak dependency upon temperature, after the transition from the isotropic phase. Due to this, not only pure orthoconic antiferroelectric liquid crystals but also those with a moderate tilt should generate a good dark state. Furthermore, due to the increased potential for forming anticlinic forces, such materials could minimize a commonly observed asymmetry of a rise and fall switching times at a surface stabilized geometry. - Highlights: • The new class of liquid crystalline materials with the direct SmC{sub A}*. • Iso phase transition were obtained. • Materials possess the layer spacing fixed and very weak dependent upon temperature. • Smectic layers without shrinkage are observed. • A good dark state can be generate in SSAFLC.

  8. Criminal history and future offending of juveniles convicted of the possession of child pornography.

    Science.gov (United States)

    Aebi, Marcel; Plattner, Belinda; Ernest, Melanie; Kaszynski, Katie; Bessler, Cornelia

    2014-08-01

    Most child pornography is distributed online. It is estimated that 3% to 15% of child pornography consumers are juveniles. The present study analyzed a consecutive sample of 54 male juveniles convicted of the possession of child pornography. Demographic characteristics, criminal history, and subsequent offending were assessed from criminal files and official reports. Juvenile possessors of child pornography were compared to three different groups of juveniles: Juvenile possessors of other illegal pornography (n = 42), juveniles who committed a sexual contact offense against a child (n = 64), and juveniles who committed a sexual contact offense against a peer or adult (n = 104). Juvenile possessors of child pornography were found to have downloaded the illegal material more frequently and over a longer time period than juvenile possessors of other illegal pornography. Furthermore, juvenile possessors of child pornography differed from juveniles who had committed a sexual contact offense in terms of demographics and showed fewer previous and subsequent offending than juveniles who sexually offended against a peer or adult. We conclude that juvenile possessors of child pornography need a specific target intervention focusing on dysfunctional Internet use and sexually deviant arousal. © The Author(s) 2013.

  9. Tribological and corrosion behaviour of electroless Ni-B coating possessing a blackberry like structure

    Science.gov (United States)

    Bülbül, Ferhat; Altun, Hikmet; Küçük, Özkan; Ezirmik, Vefa

    2012-08-01

    This study aims to evaluate the tribological and corrosion properties of the electroless Ni-B coating deposited on AISI 304 stainless steels. The microstructure of the coating was characterized using x-ray diffraction (XRD) and scanning electron microscopy-energy dispersive spectrometry (SEM-EDS). XRD analysis revealed that the prepared coating possessed an amorphous character. SEM-EDS investigation also indicated that a non-stoichiometric Ni-B coating was deposited with a columnar growth mechanism on the stainless steel substrate and the morphology of the growth surface was blackberry-like. The hardness and tribological properties were characterized by microhardness and a pin-on-disc wear test. The electroless Ni-B coated sample had a higher degree of hardness, a lower friction coefficient and a lower wear rate than the uncoated substrate. The electrochemical potentiodynamic polarization method was used to evaluate the corrosion resistance of the coating. The electroless Ni-B coating offered cathodic protection on the substrate by acting as a sacrificial anode although it was electrochemically more reactive than the stainless steel substrate.

  10. A novel dioxygenation product of arachidonic acid possesses potent chemotactic activity for human polymorphonuclear leukocytes.

    Science.gov (United States)

    Shak, S; Perez, H D; Goldstein, I M

    1983-12-25

    We have found that a novel dioxygenation product of arachidonic acid, 8(S),15(S)-dihydroxy-5,11-cis-9,13-trans-eicosatetraenoic acid (8,15-diHETE), possesses chemotactic activity for human polymorphonuclear leukocytes comparable to that of leukotriene B4. Authentic 8,15-diHETE, identified by gas chromatography-mass spectrometry, was prepared by treating arachidonic acid with soybean lipoxygenase and was purified by reverse-phase high performance liquid chromatography. Using a "leading front" assay, 8,15-diHETE exhibited significant chemotactic activity at a concentration of 5.0 ng/ml. Maximum chemotactic activity was observed at a concentration of 30 ng/ml. The 8,15-diHETE generated by mixed human leukocytes after stimulation with arachidonic acid and the calcium ionophore, A23187, exhibited quantitatively similar chemotactic activity. Two synthetic all-trans conjugated isomers of 8,15-diHETE, however, were not chemotactic at concentrations up to 500 ng/ml. In contrast to its potent chemotactic activity, 8,15-diHETE (at concentrations up to 10 micrograms/ml) was relatively inactive with respect to its ability to provoke either degranulation or generation of superoxide anion radicals by cytochalasin B-treated leukocytes. Both leukotriene B4 and 8,15-diHETE may be important mediators of inflammation.

  11. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  12. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  13. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  14. Experiences of possession and paranormal phenomena among women in the general population: are they related to traumatic stress and dissociation?

    Science.gov (United States)

    Sar, Vedat; Alioğlu, Firdevs; Akyüz, Gamze

    2014-01-01

    This study sought to determine the prevalence of experiences of possession and paranormal phenomena (PNP) in the general population and their possible relations to each other and to traumatic stress and dissociation. The study was conducted on a representative female sample recruited from a town in central eastern Turkey. The Dissociative Disorders Interview Schedule, the posttraumatic stress disorder (PTSD) and borderline personality disorder sections of the Structured Clinical Interviews for DSM-IV Axis-I and Personality Disorders, and the Childhood Abuse and Neglect Questionnaire were administered to 628 women. Of these, 127 (20.2%) women reported at least 1 type of PNP and 13 (2.1%) women reported possession. Women with a dissociative disorder reported all types of possession and PNP (except telepathy) more frequently than those without. Whereas women with a trauma history in childhood and adulthood or PTSD reported possession more frequently than those without, PNP were associated with childhood trauma only. Factor analysis yielded 4 dimensions: possession by and/or contact with nonhuman entities, extrasensory communications, possession by a human entity, and precognition. These factors correlated with number of secondary features of dissociative identity disorder and Schneiderian symptoms. Latent class analysis identified 3 groups. The most traumatized group, with predominantly dissociative and trauma-related disorders, had the highest scores on all factors. Notwithstanding their presence in healthy individuals, possession and PNP were associated with trauma and dissociation in a subgroup of affected participants. Both types of experience seem to be normal human capacities of experiencing that may be involved in response to traumatic stress. Given the small numbers, this study should be considered preliminary.

  15. Characterizing the Effective Bandwidth of Nonlinear Vibratory Energy Harvesters Possessing Multiple Stable Equilibria

    Science.gov (United States)

    Panyam Mohan Ram, Meghashyam

    In the last few years, advances in micro-fabrication technologies have lead to the development of low-power electronic devices spanning critical fields related to sensing, data transmission, and medical implants. Unfortunately, effective utilization of these devices is currently hindered by their reliance on batteries. In many of these applications, batteries may not be a viable choice as they have a fixed storage capacity and need to be constantly replaced or recharged. In light of such challenges, several novel concepts for micro-power generation have been recently introduced to harness, otherwise, wasted ambient energy from the environment and maintain these low-power devices. Vibratory energy harvesting is one such concept which has received significant attention in recent years. While linear vibratory energy harvesters have been well studied in the literature and their performance metrics have been established, recent research has focused on deliberate introduction of stiffness nonlinearities into the design of these devices. It has been shown that, nonlinear energy harvesters have a wider steady-state frequency bandwidth as compared to their linear counterparts, leading to the premise that they can used to improve performance, and decrease sensitivity to variations in the design and excitation parameters. This dissertation aims to investigate this premise by developing an analytical framework to study the influence of stiffness nonlinearities on the performance and effective bandwidth of nonlinear vibratory energy harvesters. To achieve this goal, the dissertation is divided into three parts. The first part investigates the performance of bi-stable energy harvesters possessing a symmetric quartic potential energy function under harmonic excitations and carries out a detailed analysis to define their effective frequency bandwidth. The second part investigates the relative performance of mono- and bi-stable energy harvesters under optimal electric loading

  16. Workplace wellness programs in Canada: an exploration of key issues.

    Science.gov (United States)

    Morrison, Erin; MacKinnon, Neil J

    2008-01-01

    Faced with the reality of rising health costs, Canadian employers are thinking beyond traditional notions of responsibility for employee health and have begun to embrace Workplace Wellness Programs (WWPs). This article investigates the critical issues of WWPs in the Canadian context from the perspective of key stakeholders. Using a combination of literature and key informant interviews, seven key themes are presented along with recommendations for wider implementation of WWPs in Canada.

  17. Novel rod-shaped viruses isolated from garlic, Allium sativum, possessing a unique genome organization.

    Science.gov (United States)

    Sumi, S; Tsuneyoshi, T; Furutani, H

    1993-09-01

    Rod-shaped flexuous viruses were partially purified from garlic plants (Allium sativum) showing typical mosaic symptoms. The genome was shown to be composed of RNA with a poly(A) tail of an estimated size of 10 kb as shown by denaturing agarose gel electrophoresis. We constructed cDNA libraries and screened four independent clones, which were designated GV-A, GV-B, GV-C and GV-D, using Northern and Southern blot hybridization. Nucleotide sequence determination of the cDNAs, two of which correspond to nearly one-third of the virus genomic RNA, shows that all of these viruses possess an identical genomic structure and that also at least four proteins are encoded in the viral cDNA, their M(r)s being estimated to be 15K, 27K, 40K and 11K. The 15K open reading frame (ORF) encodes the core-like sequence of a zinc finger protein preceded by a cluster of basic amino acid residues. The 27K ORF probably encodes the viral coat protein (CP), based on both the existence of some conserved sequences observed in many other rod-shaped or flexuous virus CPs and an overall amino acid sequence similarity to potexvirus and carlavirus CPs. The 11K ORF shows significant amino acid sequence similarities to the corresponding 12K proteins of the potexviruses and carlaviruses. On the other hand, the 40K ORF product does not resemble any other plant virus gene products reported so far. The genomic organization in the 3' region of the garlic viruses resembles, but clearly differs from, that of carlaviruses. Phylogenetic analysis based upon the amino acid sequence of the viral capsid protein also indicates that the garlic viruses have a unique and distinct domain different from those of the potexvirus and carlavirus groups. The results suggest that the garlic viruses described here belong to an unclassified and new virus group closely related to the carlaviruses.

  18. To have and to hold: possessing the sacred in the late renaissance

    Directory of Open Access Journals (Sweden)

    Erin E. Benay

    2015-02-01

    Full Text Available Private devotional art of the early 17th century often found its place in the galleries of noblemen and women whose diverse collections were symbols not only of stylistic taste, but of their owners’ exhaustive curiosity. In these domestic settings, boundaries between sacred and secular were permeable, as the unprecedented physical intimacy portrayed in popular religious subjects such as St Matthew and the Angel, the Stigmatisation of St Francis, or Christ’s Agony in the Garden reveal. Representations of the latter reminded viewers of Christ’s human, corporal suffering and suggested a model of resolve strengthened by prayer. The Agony in the Garden appears on the interior of Jacopo Ligozzi’s virtuosic Portable Altar with Carrying Case (1608, likely a Medici gift presented to the Austrian court in anticipation of the marriage of archduchess Maria Maddalena to soon-to-be grand duke Cosimo II. Adorned with lavish botanical motifs on its exterior, the Altar’s potency as a sacred possession was redoubled by the owner’s tactile revelation of the portrayal of Christ supported by an Angel contained inside the case. Comprised of wood, oil on copper, and pietre dure inlay, it is an object intended to be held, opened, and experienced. This paper suggests that Ligozzi’s selective combination of sumptuous materials and choice of subject matter – botanical illustration and Christological iconography – allowed the object to appeal to the full sensorium, and therefore to function as efficaciously as a devotional aid as it did as a curiosity among other rare collectibles.

  19. Bacillus sp.CDB3 isolated from cattle dip-sites possesses two ars gene clusters

    Institute of Scientific and Technical Information of China (English)

    Somanath Bhat; Xi Luo; Zhiqiang Xu; Lixia Liu; Ren Zhang

    2011-01-01

    Contamination of soil and water by arsenic is a global problem.In Australia, the dipping of cattle in arsenic-containing solution to control cattle ticks in last centenary has left many sites heavily contaminated with arsenic and other toxicants.We had previously isolated five soil bacterial strains (CDB1-5) highly resistant to arsenic.To understand the resistance mechanism, molecular studies have been carried out.Two chromosome-encoded arsenic resistance (ars) gene clusters have been cloned from CDB3 (Bacillus sp.).They both function in Escherichia coli and cluster 1 exerts a much higher resistance to the toxic metalloid.Cluster 2 is smaller possessing four open reading frames (ORFs) arsRorf2BC, similar to that identified in Bacillus subtilis Skin element.Among the eight ORFs in cluster 1 five are analogs of common ars genes found in other bacteria, however, organized in a unique order arsRBCDA instead of arsRDABC.Three other putative genes are located directly downstream and designated as arsTIP based on the homologies of their theoretical translation sequences respectively to thioredoxin reductases, iron-sulphur cluster proteins and protein phosphatases.The latter two are novel of any known ars operons.The arsD gene from Bacillus species was cloned for the first time and the predict protein differs from the well studied E.coli ArsD by lacking two pairs of C-terrninal cysteine residues.Its functional involvement in arsenic resistance has been confirmed by a deletion experiment.There exists also an inverted repeat in the intergenic region between arsC and arsD implying some unknown transcription regulation.

  20. Audio-visual interactions uniquely contribute to resolution of visual conflict in people possessing absolute pitch.

    Directory of Open Access Journals (Sweden)

    Sujin Kim

    Full Text Available Individuals possessing absolute pitch (AP are able to identify a given musical tone or to reproduce it without reference to another tone. The present study sought to learn whether this exceptional auditory ability impacts visual perception under stimulus conditions that provoke visual competition in the form of binocular rivalry. Nineteen adult participants with 3-19 years of musical training were divided into two groups according to their performance on a task involving identification of the specific note associated with hearing a given musical pitch. During test trials lasting just over half a minute, participants dichoptically viewed a scrolling musical score presented to one eye and a drifting sinusoidal grating presented to the other eye; throughout the trial they pressed buttons to track the alternations in visual awareness produced by these dissimilar monocular stimuli. On "pitch-congruent" trials, participants heard an auditory melody that was congruent in pitch with the visual score, on "pitch-incongruent" trials they heard a transposed auditory melody that was congruent with the score in melody but not in pitch, and on "melody-incongruent" trials they heard an auditory melody completely different from the visual score. For both groups, the visual musical scores predominated over the gratings when the auditory melody was congruent compared to when it was incongruent. Moreover, the AP participants experienced greater predominance of the visual score when it was accompanied by the pitch-congruent melody compared to the same melody transposed in pitch; for non-AP musicians, pitch-congruent and pitch-incongruent trials yielded equivalent predominance. Analysis of individual durations of dominance revealed differential effects on dominance and suppression durations for AP and non-AP participants. These results reveal that AP is accompanied by a robust form of bisensory interaction between tonal frequencies and musical notation that boosts

  1. Rheum turkestanicum rhizomes possess anti-hypertriglyceridemic, but not hypoglycemic or hepatoprotective effect in experimental diabetes

    Directory of Open Access Journals (Sweden)

    Mousa-Al-Reza Hadjzadeh

    2017-01-01

    Full Text Available Objective: Rheum turkestanicum (R. turkestanicum rhizomes have been used in Iranain traditional medicine as an anti-diabetic agent. The purpose of the present investigation was to evaluate the anti-diabetic and antioxidant activities of R. turkestanicum rhizome extract in streptozotocin-induced diabetic rats.Materials and Methods: Diabetes was induced by a single intraperitoneal injection of 55 mg/kg streptozotocin in male Wistar rats. Diabetic rats received the decoction extract of R. turkestanicum rhizomes at the doses of 200, 400 and 600 mg/kg daily by gavage for 3 weeks. Serum glucose and lipid levels were measured in all groups before diabetes induction and at the end of week 3. Oxidative stress was evaluated in the liver by measurement of malondialdehyde levels and total thiol concentration at the end of the experiment.Results: A significant increase in serum glucose and triglyceride levels was observed in diabetic rats, which was accompanied by increased malondialdehyde levels and decreased total thiol concentration in the liver after 3 weeks. Treatment of diabetic rats with R. turkestanicum rhizome extract at the doses of 200, 400 and 600 mg/kg over a 3-week period did not change serum glucose, hepatic malondialdehyde and total thiol levels in diabetic rats. However, treatment with R. turkestanicum extract significantly decreased serum triglyceride levels in a dose-dependent manner at the end of the experiment.Conclusion: R. turkestanicum rhizome extract possess anti-hypertriglyceridemic, but not hypoglycemic or hepatoprotective effect in diabetic rats. Therefore, R. turkestanicum rhizome should be consumed with more caution by diabetic patients.

  2. Deoxyarbutin Possesses a Potent Skin-Lightening Capacity with No Discernible Cytotoxicity against Melanosomes.

    Directory of Open Access Journals (Sweden)

    Fang Miao

    Full Text Available Safe and effective ingredients capable of removing undesired hyperpigmentation from facial skin are urgently needed for both pharmaceutical and cosmetic purposes. Deoxyarbutin (4-[(tetrahydro-2H-pyran-2-yl oxy] phenol, D-Arb is a glucoside derivative of hydroquinone. Here, we investigated the toxicity and efficacy of D-Arb at the sub-cellular level (directly on melanosomes and skin pigmentation using in vivo and in vitro models to compare with its parent compound hydroquinone (1,4-benzenediol, HQ. At first, we examined the ultrastructural changes of melanosomes in hyperpigmented guinea pig skin induced by 308-nm monochromatic excimer lightand/or treated with HQ and D-Arb using transmission electron microscopy. The results showed that prominent changes in the melanosomal membrane, such as bulb-like structure and even complete rupture of the outer membranes, were found in the skin after topical application of 5% HQ for 10 days. These changes were barely observed in the skin treated with D-Arb. To further clarify whether membrane toxicity of HQ was a direct result of the compound treatment, we also examinedultrastructural changes of individual melanosomes purified from MNT1 human melanoma cells. Similar observations were obtained from the naked melanosome model in vitro. Finally, we determined the effects of melanosomal fractions exposed to HQ or D-Arb on hydroxyl radical generation in the Fenton reaction utilizing an electron spin resonance assay. D-Arb-treated melanosomesexhibit a moderate hydroxyl radical-scavenging activity, whereas HQ-treated melanosomessignificantly generate more hydroxyl free radicals. This study suggests that D-Arb possesses a potent ability in skin lightening and antioxidation with less melanosome cytotoxicity.

  3. Deoxyarbutin Possesses a Potent Skin-Lightening Capacity with No Discernible Cytotoxicity against Melanosomes.

    Science.gov (United States)

    Miao, Fang; Shi, Ying; Fan, Zhi-Feng; Jiang, Shan; Xu, Shi-Zheng; Lei, Tie-Chi

    2016-01-01

    Safe and effective ingredients capable of removing undesired hyperpigmentation from facial skin are urgently needed for both pharmaceutical and cosmetic purposes. Deoxyarbutin (4-[(tetrahydro-2H-pyran-2-yl) oxy] phenol, D-Arb) is a glucoside derivative of hydroquinone. Here, we investigated the toxicity and efficacy of D-Arb at the sub-cellular level (directly on melanosomes) and skin pigmentation using in vivo and in vitro models to compare with its parent compound hydroquinone (1,4-benzenediol, HQ). At first, we examined the ultrastructural changes of melanosomes in hyperpigmented guinea pig skin induced by 308-nm monochromatic excimer lightand/or treated with HQ and D-Arb using transmission electron microscopy. The results showed that prominent changes in the melanosomal membrane, such as bulb-like structure and even complete rupture of the outer membranes, were found in the skin after topical application of 5% HQ for 10 days. These changes were barely observed in the skin treated with D-Arb. To further clarify whether membrane toxicity of HQ was a direct result of the compound treatment, we also examinedultrastructural changes of individual melanosomes purified from MNT1 human melanoma cells. Similar observations were obtained from the naked melanosome model in vitro. Finally, we determined the effects of melanosomal fractions exposed to HQ or D-Arb on hydroxyl radical generation in the Fenton reaction utilizing an electron spin resonance assay. D-Arb-treated melanosomesexhibit a moderate hydroxyl radical-scavenging activity, whereas HQ-treated melanosomessignificantly generate more hydroxyl free radicals. This study suggests that D-Arb possesses a potent ability in skin lightening and antioxidation with less melanosome cytotoxicity.

  4. Mycobacterium avium Possesses Extracellular DNA that Contributes to Biofilm Formation, Structural Integrity, and Tolerance to Antibiotics.

    Directory of Open Access Journals (Sweden)

    Sasha J Rose

    Full Text Available Mycobacterium avium subsp. hominissuis is an opportunistic pathogen that is associated with biofilm-related infections of the respiratory tract and is difficult to treat. In recent years, extracellular DNA (eDNA has been found to be a major component of bacterial biofilms, including many pathogens involved in biofilm-associated infections. To date, eDNA has not been described as a component of mycobacterial biofilms. In this study, we identified and characterized eDNA in a high biofilm-producing strain of Mycobacterium avium subsp. hominissuis (MAH. In addition, we surveyed for presence of eDNA in various MAH strains and other nontuberculous mycobacteria. Biofilms of MAH A5 (high biofilm-producing strain and MAH 104 (reference strain were established at 22°C and 37°C on abiotic surfaces. Acellular biofilm matrix and supernatant from MAH A5 7 day-old biofilms both possess abundant eDNA, however very little eDNA was found in MAH 104 biofilms. A survey of MAH clinical isolates and other clinically relevant nontuberculous mycobacterial species revealed many species and strains that also produce eDNA. RAPD analysis demonstrated that eDNA resembles genomic DNA. Treatment with DNase I reduced the biomass of MAH A5 biofilms when added upon biofilm formation or to an already established biofilm both on abiotic surfaces and on top of human pharyngeal epithelial cells. Furthermore, co-treatment of an established biofilm with DNase 1 and either moxifloxacin or clarithromycin significantly increased the susceptibility of the bacteria within the biofilm to these clinically used antimicrobials. Collectively, our results describe an additional matrix component of mycobacterial biofilms and a potential new target to help treat biofilm-associated nontuberculous mycobacterial infections.

  5. E2-EPF UCP Possesses E3 Ubiquitin Ligase Activity via Its Cysteine 118 Residue.

    Science.gov (United States)

    Lim, Jung Hwa; Shin, Hee Won; Chung, Kyung-Sook; Kim, Nam-Soon; Kim, Ju Hee; Jung, Hong-Ryul; Im, Dong-Soo; Jung, Cho-Rok

    Here, we show that E2-EPF ubiquitin carrier protein (UCP) elongated E3-independent polyubiquitin chains on the lysine residues of von Hippel-Lindau protein (pVHL) and its own lysine residues both in vitro and in vivo. The initiation of the ubiquitin reaction depended on not only Lys11 linkage but also the Lys6, Lys48 and Lys63 residues of ubiquitin, which were involved in polyubiquitin chain formation on UCP itself. UCP self-association occurred through the UBC domain, which also contributed to the interaction with pVHL. The polyubiquitin chains appeared on the N-terminus of UCP in vivo, which indicated that the N-terminus of UCP contains target lysines for polyubiquitination. The Lys76 residue of UCP was the most critical site for auto-ubiquitination, whereas the polyubiquitin chain formation on pVHL occurred on all three of its lysines (Lys159, Lys171 and Lys196). A UCP mutant in which Cys118 was changed to alanine (UCPC118A) did not form a polyubiquitin chain but did strongly accumulate mono- and di-ubiquitin via auto-ubiquitination. Polyubiquitin chain formation required the coordination of Cys95 and Cys118 between two interacting molecules. The mechanism of the polyubiquitin chain reaction of UCP may involve the transfer of ubiquitin from Cys95 to Cys118 by trans-thiolation, with polyubiquitin chains forming at Cys118 by reversible thioester bonding. The polyubiquitin chains are then moved to the lysine residues of the substrate by irreversible isopeptide bonding. During the elongation of the ubiquitin chain, an active Cys118 residue is required in both parts of UCP, namely, the catalytic enzyme and the substrate. In conclusion, UCP possesses not only E2 ubiquitin conjugating enzyme activity but also E3 ubiquitin ligase activity, and Cys118 is critical for polyubiquitin chain formation.

  6. E2-EPF UCP Possesses E3 Ubiquitin Ligase Activity via Its Cysteine 118 Residue.

    Directory of Open Access Journals (Sweden)

    Jung Hwa Lim

    Full Text Available Here, we show that E2-EPF ubiquitin carrier protein (UCP elongated E3-independent polyubiquitin chains on the lysine residues of von Hippel-Lindau protein (pVHL and its own lysine residues both in vitro and in vivo. The initiation of the ubiquitin reaction depended on not only Lys11 linkage but also the Lys6, Lys48 and Lys63 residues of ubiquitin, which were involved in polyubiquitin chain formation on UCP itself. UCP self-association occurred through the UBC domain, which also contributed to the interaction with pVHL. The polyubiquitin chains appeared on the N-terminus of UCP in vivo, which indicated that the N-terminus of UCP contains target lysines for polyubiquitination. The Lys76 residue of UCP was the most critical site for auto-ubiquitination, whereas the polyubiquitin chain formation on pVHL occurred on all three of its lysines (Lys159, Lys171 and Lys196. A UCP mutant in which Cys118 was changed to alanine (UCPC118A did not form a polyubiquitin chain but did strongly accumulate mono- and di-ubiquitin via auto-ubiquitination. Polyubiquitin chain formation required the coordination of Cys95 and Cys118 between two interacting molecules. The mechanism of the polyubiquitin chain reaction of UCP may involve the transfer of ubiquitin from Cys95 to Cys118 by trans-thiolation, with polyubiquitin chains forming at Cys118 by reversible thioester bonding. The polyubiquitin chains are then moved to the lysine residues of the substrate by irreversible isopeptide bonding. During the elongation of the ubiquitin chain, an active Cys118 residue is required in both parts of UCP, namely, the catalytic enzyme and the substrate. In conclusion, UCP possesses not only E2 ubiquitin conjugating enzyme activity but also E3 ubiquitin ligase activity, and Cys118 is critical for polyubiquitin chain formation.

  7. Crystal structure of a plant albumin from Cicer arietinum (chickpea) possessing hemopexin fold and hemagglutination activity.

    Science.gov (United States)

    Sharma, Urvashi; Katre, Uma V; Suresh, C G

    2015-05-01

    Crystal structure of a reported PA2 albumin from Cicer arietinum shows that it belongs to hemopexin fold family, has four beta-propeller motifs and possesses hemagglutination activity, making it different from known legume lectins. A plant albumin (PA2) from Cicer arietinum, presumably a lectin (CAL) owing to its hemagglutination activity which is inhibited by complex sugars as well as glycoproteins such as fetuin, desialylated fetuin and fibrinogen. The three-dimensional structure of this homodimeric protein has been determined using X-ray crystallography at 2.2 Å in two crystal forms: orthorhombic (P21212) and trigonal (P3). The structure determined using molecular replacement method and refined in orthorhombic crystal form reached R-factors R free 22.6 % and R work 18.2 % and in trigonal form had 22.3 and 17.9 % in the resolution range of 20.0-2.2 and 35.3-2.2 Å, respectively. Interestingly, unlike the known legume lectin fold, the structure of this homodimeric hemagglutinin belonged to hemopexin fold that consisted of four-bladed β-propeller architecture. Each subunit has a central cavity forming a channel, inside of which is lined with hydrophobic residues. The channel also bears binding sites for ligands such as calcium, sodium and chloride ions, iodine atom in the case of iodine derivative and water molecules. However, none of these ligands seem important for the sugar recognition. No monosaccharide sugar specificity could be detected using hemagglutination inhibition. Chemical modification studies identified a potential sugar-binding site per subunit molecule. Comparison of C-alpha atom positions in subunit structures showed that the deviations between the two crystal forms were more with respect to blades I and IV. Differences also existed between subunits in two forms in terms of type and site of ligand binding.

  8. Informed policies

    International Development Research Centre (IDRC) Digital Library (Canada)

    INTERNATIONAL DEVELOPMENT RESEARCH CENTRE. Informed ... more evidence-based policy on social ... Community involvement is key to the success of CBMS in reducing poverty. IDRC ... nationwide network of “telecentres” that ... and holidays for young people to use for ... National Conference on Youth led to the.

  9. Key Informant Perceptions of Vision Loss in Children and ...

    African Journals Online (AJOL)

    tulyasys

    understand how vision can practically be assessed and how poor vision can affect a child, whether by limiting the ability to do activities of daily living or by limiting social interactions. In this group, there were some misconceptions regarding the use of color vision and the assessment of reading as a tool for vision assessment ...

  10. Key informant perceptions of vision loss in children and implications ...

    African Journals Online (AJOL)

    Materials and Methods: A population-based study on the prevalence and causes of childhood blindness and severe visual impairment was conducted using the KI method. KIs were selected by their communities and trained in advocacy, identifi cation and referral of children with visual impairment. Prior to the KI training, ...

  11. 1 Title: Enhancing Barza with key resources and information for ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    nbassily

    2014-04-30

    Apr 30, 2014 ... Activity 3: Adapt e-Learning courses and materials to Barza to build skills for effective ... Provide these broadcasters with easy and reliable access to essential, ... In order to produce good agricultural programming, broadcasters need ..... Barza is a unique service, which is both exciting and challenging.

  12. Prototypes Are Key Heuristic Information in Insight Problem Solving

    Science.gov (United States)

    Yang, Wenjing; Dietrich, Arne; Liu, Peiduo; Ming, Dan; Jin, Yule; Nusbaum, Howard C.; Qiu, Jiang; Zhang, Qinglin

    2016-01-01

    Evidence from a range of fields indicates that inventions are often inspired by drawing a parallel to solutions found in nature. However, the cognitive mechanism of this process is not well understood. The cognitive mechanism of heuristic prototype in scientific innovation was tested with 3 experiments. First, 84 historical accounts of important…

  13. Simplified Key Management for Digital Access Control of Information Objects

    Science.gov (United States)

    2016-07-02

    0001, Task BC-5-2283, “Architecture, Design of Services for Air Force Wide Distributed Systems,” for USAF HQ USAF SAF/CIO A6. The views, opinions...Challenges for Cloud Computing,” Lecture Notes in Engineering and Computer Science: Proceedings World Congress on Engineering and Computer Science 2011...P. Konieczny USAF HQ USAF SAF/CIO A6 11. SPONSOR’S / MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public

  14. Managing climatic risks for enhanced food security: Key information capabilities

    NARCIS (Netherlands)

    Balaghi, R.; Badjeck, M.C.; Bakari, D.; Pauw, de E.D.; Wit, de A.J.W.; Defourny, P.; Donato, S.; Gommes, R.; Jlibene, M.; Ravelo, A.C.; Sivakumar, M.V.K.; Telahigue, N.; Tychon, B.

    2010-01-01

    Food security is expected to face increasing challenges from climatic risks that are more and more exacerbated by climate change, especially in the developing world. This document lists some of the main capabilities that have been recently developed, especially in the area of operational

  15. The Crypto Controversy : A Key Conflict in the Information Society

    NARCIS (Netherlands)

    Koops, E.J.

    1999-01-01

    The aim of the book is twofold: to provide an overall, in-depth, and impartial analysis of the issues at stake, and to bridge the gap between technology and law, between governments and privacy activists, between cryptographers and law-enforcement agencies.

  16. The Crypto Controversy: A Key Conflict in the Information Society

    OpenAIRE

    Koops, E.J.

    1999-01-01

    The aim of the book is twofold: to provide an overall, in-depth, and impartial analysis of the issues at stake, and to bridge the gap between technology and law, between governments and privacy activists, between cryptographers and law-enforcement agencies.

  17. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  18. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  19. Inspection report of unauthorized possession and use of unsealed americium-241 and subsequent confiscation, J.C. Haynes Company, Newark, Ohio

    International Nuclear Information System (INIS)

    1985-11-01

    This US Nuclear Regulatory Commission report documents the circumstances surrounding the March 26, 1985, confiscation and subsequent decontamination activities related to the use of unauthorized quantities of americium-241 at the John C. Haynes Company (licensee) of Newark, Ohio. It focuses on the period from early February to July 26, 1985. The incident started when NRC Region III recieved information that John C. Haynes possessed unauthorized quantities of americium-241 and was conducting unauthorized activities (diamond irradiation). By July 26, 1985, the decontamination activities at the licensee's laboratory were concluded. The licensee's actions with diamond irradiation resulted in contamination in restricted and unrestricted areas of the facility. The confiscation and decontamination activities required the combined efforts of NRC, Federal Bureau of Investigation, US Department of Energy, Oak Ridge Associated Universities, the State of Ohio, and the US Environmental Protection Agency. The report describes the factual information and significant findings associated with the confiscation and decontamination activities

  20. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  1. Key Elasticities in Job Search Theory : International Evidence

    OpenAIRE

    Addison, John T.; Centeno, Mário; Portugal, Pedro

    2004-01-01

    This paper exploits the informational value of search theory, after Lancaster and Chesher (1983), in conjunction with survey data on the unemployed to calculate key reservation wage and duration elasticities for most EU-15 nations.

  2. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  3. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  4. On the co-variation between form and function of adnominal possessive modifiers in Dutch and English

    DEFF Research Database (Denmark)

    Rijkhoff, Jan

    2009-01-01

    in the noun phrase (section 3); a tentative explanation is given in section 4. The more general point this paper wants to make is that functional modifier categories like CLASSIFYING MODIFIER or QUALIFYING MODIFIER can be characterized in grammatical terms and, furthermore, that important grammatical...... that the remarkable variation in the grammatical properties of this possessive construction directly correlates with the kind of modifier function it has in the noun phrase. It is first shown that lexical possessive modifiers with van ‘of’ (“adnominal possessives” for short) are used to express most of the modifier...... functions recognized in a semantic, five-layered model of the noun phrase (section 2). I will then argue that the values for certain grammatical parameters (here subsumed under the labels MODIFICATION, PREDICATION, REFERENCE) correlate with the kind of modifier function the adnominal possessive has...

  5. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  6. SfDredd, a Novel Initiator Caspase Possessing Activity on Effector Caspase Substrates in Spodoptera frugiperda.

    Science.gov (United States)

    Yang, Zhouning; Zhou, Ke; Liu, Hao; Wu, Andong; Mei, Long; Liu, Qingzhen

    2016-01-01

    Sf9, a cell line derived from Spodoptera frugiperda, is an ideal model organism for studying insect apoptosis. The first notable study that attempted to identify the apoptotic pathway in Sf9 was performed in 1997 and included the discovery of Sf-caspase-1, an effector caspase of Sf9. However, it was not until 2013 that the first initiator caspase in Sf9, SfDronc, was discovered, and the apoptotic pathway in Sf9 became clearer. In this study, we report another caspase of Sf9, SfDredd. SfDredd is highly similar to insect initiator caspase Dredd homologs. Experimentally, recombinant SfDredd underwent autocleavage and exhibited different efficiencies in cleavage of synthetic caspase substrates. This was attributed to its caspase activity for the predicted active site mutation blocked the above autocleavage and synthetic caspase substrates cleavage activity. SfDredd was capable of not only cleaving Sf-caspase-1 in vitro but also cleaving Sf-caspase-1 and inducing apoptosis when it was co-expressed with Sf-caspase-1 in Sf9 cells. The protein level of SfDredd was increased when Sf9 cells were treated by Actinomycin D, whereas silencing of SfDredd reduced apoptosis and Sf-caspase-1 cleavage induced by Actinomycin D treatment. These results clearly indicate that SfDredd functioned as an apoptotic initiator caspase. Apoptosis induced in Sf9 cells by overexpression of SfDredd alone was not as obvious as that induced by SfDronc alone, and the cleavage sites of Sf-caspase-1 for SfDredd and SfDronc are different. In addition, despite sharing a sequence homology with initiator caspases and possessing weak activity on initiator caspase substrates, SfDredd showed strong activity on effector caspase substrates, making it the only insect caspase reported so far functioning similar to human caspase-2 in this aspect. We believe that the discovery of SfDredd, and its different properties from SfDronc, will improve the understanding of apoptosis pathway in Sf9 cells.

  7. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  8. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  9. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  10. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  11. The impact of possession on legality of mortgage registered on a building under construction: With case law

    Directory of Open Access Journals (Sweden)

    Vicković Tanja

    2016-01-01

    Full Text Available The expansion of the subject of a mortgage to buildings under construction is a considerable step forward in regulating mortgages. It is not possible to register ownership rights on buildings under construction. A person acquiring ownership does not have the possibility to protect his rights. Acquiring ownership rights to a building under construction is tied to possession. This is detrimental to the principle of publicity which in turn erodes the principle of reliance. Validity of the mortgage is tied to the possession over the mortgaged real estate at the time of its registration. Such position of the courts challenges the very essence of mortgage.

  12. A Recommended Set of Key Arctic Indicators

    Science.gov (United States)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  13. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that dif...... that different structural problems can be reproduced successfully....

  14. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  15. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  16. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  17. Water dynamics clue to key residues in protein folding

    International Nuclear Information System (INIS)

    Gao, Meng; Zhu, Huaiqiu; Yao, Xin-Qiu; She, Zhen-Su

    2010-01-01

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  18. LBTool: A stochastic toolkit for leave-based key updates

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    Quantitative techniques have been successfully employed in verification of information and communication systems. However, the use of such techniques are still rare in the area of security. In this paper, we present a toolkit that implements transient analysis on a key update method for wireless...... sensor networks. The analysis aims to find out the probability of a network key being compromised at a specific time point, which result in fluctuations over time for a specific key update method called Leave-based key update. For such a problem, the use of current tools is limited in many ways...

  19. 78 FR 60919 - In the Matter of Certain Licensees Authorized To Possess and Transfer Items Containing...

    Science.gov (United States)

    2013-10-02

    ... cases to mail copies on electronic storage media. Participants may not submit paper copies of their... requested not to include personal privacy information, such as social security numbers, home addresses, or... periods of active source usage), licensees should, to the extent practicable, consider two modes of source...

  20. 76 FR 61205 - Possession, Use, and Transfer of Select Agents and Toxins; Biennial Review

    Science.gov (United States)

    2011-10-03

    ..., establishment of suitability standards for those having access to Tier 1 select agents and toxins, and establishment of physical security and information security standards for Tier 1 select agents and toxins. The...; adding definitions; and clarifying language concerning security, training, biosafety, and incident...

  1. 77 FR 52107 - Air Traffic Data in the Possession of Government Contractors

    Science.gov (United States)

    2012-08-28

    ... of certain information regarding the investigation. Among other things, the PBR requires the FAA to... Traffic Data From Government Contractors Shortly, the FAA's Internet Web page ( www.faa.gov ) will have a.... Such things about the aircraft operation as the local time of day, the heading of the aircraft, and its...

  2. Public key cryptography from weaker assumptions

    DEFF Research Database (Denmark)

    Zottarel, Angela

    This dissertation is focused on the construction of public key cryptographic primitives and on the relative security analysis in a meaningful theoretic model. This work takes two orthogonal directions. In the first part, we study cryptographic constructions preserving their security properties also...... in the case the adversary is granted access to partial information about the secret state of the primitive. To do so, we work in an extension of the standard black-box model, a new framework where possible leakage from the secret state is taken into account. In particular, we give the first construction...

  3. Fiscal 1997 achievement report on international standard creation type research and development. Key technology for color image management (Research and development project on standard data for diversification of international information interchange); 1997 nendo color gazo management kiban gijutsu seika hokokusho. Kokusaiteki joho kokan no tayoka ni muketa hyojun data no kenkyu kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    Activities were conducted for (1) proposing that some items in software comply with a standard format to be commonly used by plural personal computer programs in the field of the key technology of color image management and for (2) placing before ISO (International Organization for Standardization) a standardization proposal and a standard format proposal involving characters and character baselines in the field of research and development of standard data for diversification of international information interchange. Under Item (1), submission of a proposal was adjourned because the standard of color expression in Asian countries was insufficient and involved many problems requiring careful attention. The problems were whether the color names were suitable for the users, that the color names other than those specified by JIS (Japanese Industrial Standard) Z8102 were equivocal and needed proper notations, and whether color names to use with displays or the like were to be defined independently from JIS. Under Item (2), the problem of metric information standardization surfaced because it was supposed that mixing JIS fonts with other countries' fonts would give rise to problems. As for the character size, it is 10 points, more or less, in all the countries and therefore it does not make difficult the exchange of information under the Web environments. The results will be reported and explained to the departments concerned and to the Asian countries. (NEDO)

  4. Fiscal 1997 achievement report on international standard creation type research and development. Key technology for color image management (Research and development project on standard data for diversification of international information interchange); 1997 nendo color gazo management kiban gijutsu seika hokokusho. Kokusaiteki joho kokan no tayoka ni muketa hyojun data no kenkyu kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    Activities were conducted for (1) proposing that some items in software comply with a standard format to be commonly used by plural personal computer programs in the field of the key technology of color image management and for (2) placing before ISO (International Organization for Standardization) a standardization proposal and a standard format proposal involving characters and character baselines in the field of research and development of standard data for diversification of international information interchange. Under Item (1), submission of a proposal was adjourned because the standard of color expression in Asian countries was insufficient and involved many problems requiring careful attention. The problems were whether the color names were suitable for the users, that the color names other than those specified by JIS (Japanese Industrial Standard) Z8102 were equivocal and needed proper notations, and whether color names to use with displays or the like were to be defined independently from JIS. Under Item (2), the problem of metric information standardization surfaced because it was supposed that mixing JIS fonts with other countries' fonts would give rise to problems. As for the character size, it is 10 points, more or less, in all the countries and therefore it does not make difficult the exchange of information under the Web environments. The results will be reported and explained to the departments concerned and to the Asian countries. (NEDO)

  5. Origanum vulgare mediated green synthesis of biocompatible gold nanoparticles simultaneously possessing plasmonic, antioxidant and antimicrobial properties

    Directory of Open Access Journals (Sweden)

    Benedec D

    2018-02-01

    Full Text Available Daniela Benedec,1,* Ilioara Oniga,1,* Flavia Cuibus,1 Bogdan Sevastre,2 Gabriela Stiufiuc,3 Mihaela Duma,4 Daniela Hanganu,1 Cristian Iacovita,1 Rares Stiufiuc,1,5 Constantin Mihai Lucaciu1 1Faculty of Pharmacy, “Iuliu Haţieganu” University of Medicine and Pharmacy, 2Faculty of Veterinary Medicine, University of Agricultural Sciences and Veterinary Medicine, 3Faculty of Physics, “Babeş Bolyai” University, 4State Veterinary Laboratory for Animal Health and Safety, 5Department of Bionanoscopy, MedFuture Research Center for Advance Medicine, “Iuliu Haţieganu” University of Medicine and Pharmacy, Cluj-Napoca, Romania *These authors contributed equally to this work Purpose: The leaves and flowering stem of Origanum vulgare contain essential oils, flavonoids, phenolic acids and anthocyanins. We propose a new, simple, one-pot, O. vulgare extract (OVE mediated green synthesis method of biocompatible gold nanoparticles (AuNPs possessing improved antioxidant, antimicrobial and plasmonic properties.Materials and methods: Different concentrations of OVEs were used to reduce gold ions and to synthetize biocompatible spherical AuNPs. Their morphology and physical properties have been investigated by means of transmission electron microscopy, ultraviolet–visible absorption spectroscopy, photon correlation spectroscopy and Fourier transform infrared spectroscopy, whereas their plasmonic properties have been tested using surface-enhanced Raman spectroscopy (SERS. The antioxidant properties of nanoparticles (NPs have been evaluated by 2,2-diphenyl-1-picrylhydrazyl radical scavenging assay, and the antimicrobial tests were performed using the disk diffusion assay. Their cytotoxicity has been assessed by means of 3-(4,5-dimethylthiazol-2-yl-2,5-diphenyltetrazolium bromide assay.Results: The experimental results confirmed the successful synthesis of biocompatible, spherical, plasmonic NPs having a mean diameter of ~40 nm and an outstanding aqueous

  6. Utilizing Information Technology to Facilitate Rapid Acquisition

    Science.gov (United States)

    2006-06-01

    PAGES 109 14. SUBJECT TERMS Rapid Acquisition, eCommerce , eProcurement, Information Technology, Contracting, Global Information Network...Agency. 5 eCommerce and eProcurement, and possess an adequate knowledge of information technology. D. RESEARCH QUESTIONS 1. Primary Research... eCommerce , Information Technology, and eProcurement knowledge, and government and private industry reports utilizing numerous library and Internet

  7. Isovanillin derived N-(un)substituted hydroxylamines possessing an ortho-allylic group: valuable precursors to bioactive N-heterocycles.

    Science.gov (United States)

    Dulla, Balakrishna; Tangellamudi, Neelima D; Balasubramanian, Sridhar; Yellanki, Swapna; Medishetti, Raghavender; Kumar Banote, Rakesh; Hari Chaudhari, Girish; Kulkarni, Pushkar; Iqbal, Javed; Reiser, Oliver; Pal, Manojit

    2014-04-28

    The intramolecular 1,3-dipolar cycloaddition of isovanillin derived N-aryl hydroxylamines possessing ortho-allylic dipolarophiles affords novel benzo analogues of tricyclic isoxazolidines that can be readily transformed into functionalized lactams, γ-aminoalcohols and oxazepines. The corresponding N-unsubstituted hydroxylamines give rise to tetrahydroisoquinolines. Anxiogenic properties of these compounds are tested in zebra fish.

  8. Love and Art Strike Back: A.S. Byatt’s Possession: A Romance

    DEFF Research Database (Denmark)

    Mogensen, Tine Engel

    2004-01-01

    Possession can be seen as an enactment of the conflicts between a number of powerful - and quite classic - extremes (anatomy-romance, intellectual experience-sensuous experience, theory-art, reason-love, irony-pathos), which, in the aesthetic experience of the reader, it overcomes and transcends....

  9. Children enacting idioms of witchcraft and spirit possession as a response to trauma: therapeutically beneficial, and for whom?

    NARCIS (Netherlands)

    Reis, R.

    2013-01-01

    This article examines children’s enactment of spirit possession idioms and witchcraft in Africa including the meanings such idioms provide and the local healing resources they mobilize. Idioms of haunting spirits in Northern Uganda and witch-children elsewhere in Africa can be interpreted as

  10. Draft Genome Sequence of Methyloferula stellata AR4, an Obligate Methanotroph Possessing Only a Soluble Methane Monooxygenase.

    Science.gov (United States)

    Dedysh, Svetlana N; Naumoff, Daniil G; Vorobev, Alexey V; Kyrpides, Nikos; Woyke, Tanja; Shapiro, Nicole; Crombie, Andrew T; Murrell, J Colin; Kalyuzhnaya, Marina G; Smirnova, Angela V; Dunfield, Peter F

    2015-03-05

    Methyloferula stellata AR4 is an aerobic acidophilic methanotroph, which, in contrast to most known methanotrophs but similar to Methylocella spp., possesses only a soluble methane monooxygenase. However, it differs from Methylocella spp. by its inability to grow on multicarbon substrates. Here, we report the draft genome sequence of this bacterium. Copyright © 2015 Dedysh et al.

  11. Draft Genome Sequence of Methyloferula stellata AR4, an Obligate Methanotroph Possessing Only a Soluble Methane Monooxygenase

    OpenAIRE

    Dedysh, Svetlana N.; Naumoff, Daniil G.; Vorobev, Alexey V.; Kyrpides, Nikos; Woyke, Tanja; Shapiro, Nicole; Crombie, Andrew T.; Murrell, J. Colin; Kalyuzhnaya, Marina G.; Smirnova, Angela V.; Dunfield, Peter F.

    2015-01-01

    Methyloferula stellata AR4 is an aerobic acidophilic methanotroph, which, in contrast to most known methanotrophs but similar to Methylocella spp., possesses only a soluble methane monooxygenase. However, it differs from Methylocella spp. by its inability to grow on multicarbon substrates. Here, we report the draft genome sequence of this bacterium.

  12. Reactive, anxious and possessive forms of jealousy and their relation to relationship quality among heterosexuals and homosexuals

    NARCIS (Netherlands)

    Barelds, Dick P. H.; Dijkstra, Pieternel

    2006-01-01

    The present study examined the relationship between relational quality and three different types of jealousy-reactive, anxious and possessive jealousy. The sample consisted of 76 gay men, 79 lesbians, 70 heterosexual women and 70 heterosexual men. Findings show that different types of jealousy

  13. Assessing the Degree of Possessing Study Skills by the Students of Tafila Technical University from Their Perspectives

    Science.gov (United States)

    Al-Roud, Atallah A.; Thawabiah, Ahmad

    2016-01-01

    The study aimed to identify the degree of possessing study skills (SS) by the students of Tafila Technical (TTU) University from their perspectives. The population of the study consisted of 5015 students in TTU for the second semester of the academic year 2015/2016. The sample of the study was chosen randomly from the population of the study with…

  14. 76 FR 59271 - Migratory Bird Hunting; Late Seasons and Bag and Possession Limits for Certain Migratory Game Birds

    Science.gov (United States)

    2011-09-26

    ...-0014; 91200-1231-9BPP-L2] RIN 1018-AX34 Migratory Bird Hunting; Late Seasons and Bag and Possession Limits for Certain Migratory Game Birds AGENCY: Fish and Wildlife Service, Interior. ACTION: Final rule... of migratory birds is prohibited unless specifically provided for by annual regulations. This rule...

  15. The attributive possessive in Moroccan Arabic spoken by young bilinguals in the Netherlands and their peers in Morocco

    NARCIS (Netherlands)

    Boumans, L.P.C.

    2006-01-01

    Quantitative evidence shows that the use of the SG in MA depends on the lexical item that heads the possessive, while it is more frequent with pronominal dependents. The AG is used more in Tangier than in Casablanca, Rabat or Oujda, and this is true for both pronominal and NP dependents. Immigrants'

  16. 76 FR 54657 - Migratory Bird Hunting; Early Seasons and Bag and Possession Limits for Certain Migratory Game...

    Science.gov (United States)

    2011-09-01

    ... Migratory Game Birds in the Contiguous United States, Alaska, Hawaii, Puerto Rico, and the Virgin Islands... Bag and Possession Limits for Certain Migratory Game Birds in the Contiguous United States, Alaska...; migratory game birds in Alaska, Hawaii, Puerto Rico, and the Virgin Islands; and some extended falconry...

  17. 78 FR 53199 - Migratory Bird Hunting; Early Seasons and Bag and Possession Limits for Certain Migratory Game...

    Science.gov (United States)

    2013-08-28

    ... Migratory Game Birds in the Contiguous United States, Alaska, Hawaii, Puerto Rico, and the Virgin Islands... Seasons and Bag and Possession Limits for Certain Migratory Game Birds in the Contiguous United States... seasons; migratory game birds in Alaska, Hawaii, Puerto Rico, and the Virgin Islands; youth waterfowl day...

  18. 77 FR 53751 - Migratory Bird Hunting; Early Seasons and Bag and Possession Limits for Certain Migratory Game...

    Science.gov (United States)

    2012-08-31

    ... Migratory Game Birds in the Contiguous United States, Alaska, Hawaii, Puerto Rico, and the Virgin Islands... Seasons and Bag and Possession Limits for Certain Migratory Game Birds in the Contiguous United States... seasons; migratory game birds in Alaska, Hawaii, Puerto Rico, and the Virgin Islands; youth waterfowl day...

  19. Mycobacterium tuberculosis UvrB Is a Robust DNA-Stimulated ATPase That Also Possesses Structure-Specific ATP-Dependent DNA Helicase Activity.

    Science.gov (United States)

    Thakur, Manoj; Kumar, Mohan B J; Muniyappa, K

    2016-10-18

    Much is known about the Escherichia coli nucleotide excision repair (NER) pathway; however, very little is understood about the proteins involved and the molecular mechanism of NER in mycobacteria. In this study, we show that Mycobacterium tuberculosis UvrB (MtUvrB), which exists in solution as a monomer, binds to DNA in a structure-dependent manner. A systematic examination of MtUvrB substrate specificity reveals that it associates preferentially with single-stranded DNA, duplexes with 3' or 5' overhangs, and linear duplex DNA with splayed arms. Whereas E. coli UvrB (EcUvrB) binds weakly to undamaged DNA and has no ATPase activity, MtUvrB possesses intrinsic ATPase activity that is greatly stimulated by both single- and double-stranded DNA. Strikingly, we found that MtUvrB, but not EcUvrB, possesses the DNA unwinding activity characteristic of an ATP-dependent DNA helicase. The helicase activity of MtUvrB proceeds in the 3' to 5' direction and is strongly modulated by a nontranslocating 5' single-stranded tail, indicating that in addition to the translocating strand it also interacts with the 5' end of the substrate. The fraction of DNA unwound by MtUvrB decreases significantly as the length of the duplex increases: it fails to unwind duplexes longer than 70 bp. These results, on one hand, reveal significant mechanistic differences between MtUvrB and EcUvrB and, on the other, support an alternative role for UvrB in the processing of key DNA replication intermediates. Altogether, our findings provide insights into the catalytic functions of UvrB and lay the foundation for further understanding of the NER pathway in M. tuberculosis.

  20. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  1. Key papers in prostate cancer.

    Science.gov (United States)

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit

    2014-11-01

    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  2. Key Value Considerations for Consultant Pharmacists.

    Science.gov (United States)

    Meyer, Lee; Perry, Ronald G; Rhodus, Susan M; Stearns, Wendy

    2016-07-01

    Managing the efficiency and costs of residents' drug regimens outside the acute-care hospital and through transitions of care requires a toolbox filled with cost-control tools and careful collaboration among the pharmacy provider(s), facility staff, and the consultant/senior care pharmacist. This article will provide the reader with key long-term care business strategies that affect the profitability of the pharmacy provider in various care settings while, at the same time, ensuring optimal therapy for residents as they transition across levels of care. Readers can take away ideas on how to access critical information, what they can do with this information, and how they can improve the overall care process. Four experts in various aspects of pharmacy management share their insights on pharmacy practice issues including formulary management, performance metrics, short-cycle dispensing challenges/solutions, cost-control measures, facility surveys, billing practices, medication reconciliation, prospective medication reviews, and transitions of care.

  3. Key issues for passive safety

    International Nuclear Information System (INIS)

    Hayns, M.R.

    1996-01-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ''review paper'' as such and only record the highlights. (author)

  4. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  5. Key issues for passive safety

    Energy Technology Data Exchange (ETDEWEB)

    Hayns, M R [AEA Technology, Harwell, Didcot (United Kingdom). European Institutions; Hicken, E F [Forschungszentrum Juelich GmbH (Germany)

    1996-12-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ``review paper`` as such and only record the highlights. (author).

  6. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  7. Detector decoy quantum key distribution

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2009-01-01

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  8. Key Working for Families with Young Disabled Children

    Directory of Open Access Journals (Sweden)

    Bernie Carter

    2011-01-01

    Full Text Available For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop. Data were collected from 43 participants (parents, key workers, and other stakeholders. All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals

  9. MAGIC OF «PLASTIC»: HOW RUSSIANS TAKE POSSESSION OF THE BANK CARDS

    Directory of Open Access Journals (Sweden)

    Lyubimova D. S.

    2014-03-01

    Full Text Available The article presents results of a sociological research devoted to studying process of formation and development of the Russian market of electronic money. The aim of this work is to identify factors that form specific practices of use bank cards. On the one hand the relevance of the subject is determined by the rapid growth of cashless forms of payment in Russia, and on the other hand, the unwillingness to refuse to «real» money in everyday life of the Russian citizens. Therefore it is important to upgrade card usage experience of the «ordinary» customers of the banks. A series of semi-structured interviews allowed us to bring out the incentives and motivation of the individuals in the transition to a non-cash financial transactions; identify features of learning processes of using cards; elicit barriers to transition to electronic forms of payment, as well as factors contributing to the expansion of the circle of used operations. There is classification of the main groups of card holders with their key socio-demographic characteristics. This article will be useful for sociologists and marketers.

  10. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Agricultural informational flow in informal communication networks of farmers in Ghana. ... should identify such farmers who can serve as intermediaries between actors to help disseminate information in rural communities. Keywords: key communicators, farmers, rural communities, social networks, extension agents ...

  11. Novel Wolbachia-transinfected Aedes aegypti mosquitoes possess diverse fitness and vector competence phenotypes.

    Directory of Open Access Journals (Sweden)

    Johanna E Fraser

    2017-12-01

    Full Text Available Wolbachia pipientis from Drosophila melanogaster (wMel is an endosymbiotic bacterium that restricts transmission of human pathogenic flaviviruses and alphaviruses, including dengue, Zika, and chikungunya viruses, when introduced into the mosquito vector Aedes aegypti. To date, wMel-infected Ae. aegypti have been released in field trials in 5 countries to evaluate the effectiveness of this strategy for disease control. Despite the success in establishing wMel-infected mosquitoes in wild populations, and the well-characterized antiviral capabilities of wMel, transinfecting different or additional Wolbachia strains into Ae. aegypti may improve disease impact, and perhaps more importantly, could provide a strategy to account for the possible evolution of resistant arboviruses. Here, we report the successful transinfection of Ae. aegypti with the Wolbachia strains wMelCS (D. melanogaster, wRi (D. simulans and wPip (Culex quinquefasciatus and assess the effects on Ae. aegypti fitness, cytoplasmic incompatibility, tissue tropism and pathogen blocking in a laboratory setting. The results demonstrate that wMelCS provides a similar degree of protection against dengue virus as wMel following an infectious blood meal, and significantly reduces viral RNA levels beyond that of wMel following a direct challenge with infectious virus in mosquitoes, with no additional fitness cost to the host. The protection provided by wRi is markedly weaker than that of wMelCS, consistent with previous characterisations of these lines in Drosophila, while wPip was found to substantially reduce the fitness of Ae. aegypti. Thus, we determine wMelCS as a key candidate for further testing in field-relevant fitness tests and viremic blood feeding challenges in a clinical setting to determine if it may represent an alternative Wolbachia strain with more desirable attributes than wMel for future field testing.

  12. Novel Wolbachia-transinfected Aedes aegypti mosquitoes possess diverse fitness and vector competence phenotypes.

    Science.gov (United States)

    Fraser, Johanna E; De Bruyne, Jyotika Taneja; Iturbe-Ormaetxe, Iñaki; Stepnell, Justin; Burns, Rhiannon L; Flores, Heather A; O'Neill, Scott L

    2017-12-01

    Wolbachia pipientis from Drosophila melanogaster (wMel) is an endosymbiotic bacterium that restricts transmission of human pathogenic flaviviruses and alphaviruses, including dengue, Zika, and chikungunya viruses, when introduced into the mosquito vector Aedes aegypti. To date, wMel-infected Ae. aegypti have been released in field trials in 5 countries to evaluate the effectiveness of this strategy for disease control. Despite the success in establishing wMel-infected mosquitoes in wild populations, and the well-characterized antiviral capabilities of wMel, transinfecting different or additional Wolbachia strains into Ae. aegypti may improve disease impact, and perhaps more importantly, could provide a strategy to account for the possible evolution of resistant arboviruses. Here, we report the successful transinfection of Ae. aegypti with the Wolbachia strains wMelCS (D. melanogaster), wRi (D. simulans) and wPip (Culex quinquefasciatus) and assess the effects on Ae. aegypti fitness, cytoplasmic incompatibility, tissue tropism and pathogen blocking in a laboratory setting. The results demonstrate that wMelCS provides a similar degree of protection against dengue virus as wMel following an infectious blood meal, and significantly reduces viral RNA levels beyond that of wMel following a direct challenge with infectious virus in mosquitoes, with no additional fitness cost to the host. The protection provided by wRi is markedly weaker than that of wMelCS, consistent with previous characterisations of these lines in Drosophila, while wPip was found to substantially reduce the fitness of Ae. aegypti. Thus, we determine wMelCS as a key candidate for further testing in field-relevant fitness tests and viremic blood feeding challenges in a clinical setting to determine if it may represent an alternative Wolbachia strain with more desirable attributes than wMel for future field testing.

  13. Understanding mobile information needs

    OpenAIRE

    Church, Karen; Smyth, Barry

    2008-01-01

    In this paper we describe the results of a four-week diary study of mobile information needs, focusing on the intent behind mobile needs and the importance on context on such needs. We identified three key intents among diary entries: informational, geographical and personal information management (PIM). Furthermore, we found many of these information needs have high temporal and location dependencies.

  14. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    Science.gov (United States)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  15. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  16. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  17. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory...... contributed by Scientific Officer Edgar Thielmann, DG TREN, Head of Department Hans Larsen, RisøNational Laboratory, Senior Asset Manager Aksel Hauge Pedersen, DONG VE, Consultant Timon Wehnert, IZT-Berlin, and Senior Scientist Martine Uyterlinde, ECN...

  18. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken......“Now I can actually play soccer with the young people without fearing that my colleagues think I am escaping the paper work.” These were the words from a participant in a social pedagogy training course in England a few years ago. This understanding emerged through in-depth discussions...

  19. Public/private key certification authority and key distribution. Draft

    Energy Technology Data Exchange (ETDEWEB)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  20. Key energy technologies for Europe

    International Nuclear Information System (INIS)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO 2 capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)