WorldWideScience

Sample records for proprietary information

  1. 47 CFR 76.938 - Proprietary information.

    Science.gov (United States)

    2010-10-01

    ... CABLE TELEVISION SERVICE Cable Rate Regulation § 76.938 Proprietary information. A franchising authority... Form 393 (and/or FCC Forms 1200/1205) filing or a cost-of-service showing. The franchising authority... specifically relates. Upon request to the franchising authority, the parties to a rate proceeding shall have...

  2. 19 CFR 357.111 - Public and proprietary information.

    Science.gov (United States)

    2010-04-01

    ... conspicuously mark in the upper right corner of both versions, the words “proprietary document” or “public... 19 Customs Duties 3 2010-04-01 2010-04-01 false Public and proprietary information. 357.111 Section 357.111 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE SHORT SUPPLY...

  3. 48 CFR 1509.505-4 - Obtaining access to proprietary information.

    Science.gov (United States)

    2010-10-01

    ... proprietary information. 1509.505-4 Section 1509.505-4 Federal Acquisition Regulations System ENVIRONMENTAL....505-4 Obtaining access to proprietary information. Contractors gaining access to confidential business... business information. ...

  4. 47 CFR 64.2011 - Notification of customer proprietary network information security breaches.

    Science.gov (United States)

    2010-10-01

    ... information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... criminal investigation or national security, such agency may direct the carrier not to so disclose or...

  5. Information governance and security protecting and managing your company's proprietary information

    CERN Document Server

    Iannarelli, John G

    2014-01-01

    Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and this book establishes the enterprise-level systems and disciplines necessary for managing all the information generated by an organization. In addition, the book encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined in Information Governance and Security, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Provides a step-by-step outline for developing an information governance policy that is appropriate for your organization Includes real-world examples and cases to help illustrate key ...

  6. 47 CFR 64.2007 - Approval required for use of customer proprietary network information.

    Science.gov (United States)

    2010-10-01

    ... of marketing communications-related services to that customer. A telecommunications carrier may..., for the purpose of marketing communications-related services to that customer, to its agents and its... proprietary network information. 64.2007 Section 64.2007 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...

  7. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Science.gov (United States)

    2010-01-01

    ... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security information. You should not submit sensitive security information to the rulemaking docket, unless you are...

  8. A Reading Preference and Risk Taxonomy for Printed Proprietary Information Compromise in the Aerospace and Defense Industry

    Science.gov (United States)

    Stalker, Joshua Dylan

    2012-01-01

    The protection of proprietary information that users print from their information systems is a significant and relevant concern in the field of information security to both researchers and practitioners. Information security researchers have repeatedly indicated that human behaviors and perception are important factors influencing the information…

  9. 19 CFR 356.10 - Procedures for obtaining access to proprietary information.

    Science.gov (United States)

    2010-04-01

    ... secretary if such person: (i) Is not involved in competitive decision-making for a participant in the panel review or for any person that would gain competitive advantage through knowledge of the proprietary... and each copy as the first page of the document. (4) Service of applications—(i) Persons described in...

  10. 34 CFR 5.71 - Protection of personal privacy and proprietary information.

    Science.gov (United States)

    2010-07-01

    ... other information of a private and personal nature. (b) Information having a commercial or financial... individuals who have access to such information, (3) the type and degree of risk of financial injury to be... use of nondiscloseable records or information from such records for authorized program purposes...

  11. 19 CFR 207.7 - Limited disclosure of certain business proprietary information under administrative protective...

    Science.gov (United States)

    2010-04-01

    ... corresponding information about a competitor (pricing, product design, etc.). (4) Forms and determinations. (i... information pursuant to this paragraph, the authorized applicant need not file a new application in the final...

  12. Social support in the practices of informal providers: The case of patent and proprietary medicine vendors in Nigeria.

    Science.gov (United States)

    Sieverding, Maia; Liu, Jenny; Beyeler, Naomi

    2015-10-01

    The social and institutional environments in which informal healthcare providers operate shape their health and business practices, particularly in contexts where regulatory enforcement is weak. In this study, we adopt a social capital perspective to understanding the social networks on which proprietary and patent medicine vendors (PPMVs) in Nigeria rely for support in the operation of their shops. Data are drawn from 70 in-depth interviews with PPMVs in three states, including interviews with local leaders of the PPMV professional association. We find that PPMVs primarily relied on more senior colleagues and formal healthcare professionals for informational support, including information about new medicines and advice on how to treat specific cases of illness. For instrumental support, including finance, start-up assistance, and intervention with regulatory agencies, PPMVs relied on extended family, the PPMVs with whom they apprenticed, and the leaders of their professional association. PPMVs' networks also provided continual reinforcement of what constitutes good PPMV practice through admonishments to follow scope of practice limitations. These informal reminders, as well as monitoring activities conducted by the professional association, served to reinforce PPMVs' concern with avoiding negative customer health outcomes, which were perceived to be detrimental to their business reputations. That PPMVs' networks both encouraged practices to reduce the likelihood of poor health outcomes, and provided advice regarding customers' health conditions, highlights the potential impact of informal providers' access to different forms of social capital on their delivery of health services, as well as their success as microenterprises. Copyright © 2015 Elsevier Ltd. All rights reserved.

  13. 19 CFR 351.304 - Establishing business proprietary treatment of information.

    Science.gov (United States)

    2010-04-01

    ... in terms of indices or figures within 10 percent of the actual figure. If an individual portion of... person. (2) If a submitting party discovers that it has failed to bracket information correctly, the...

  14. 48 CFR 9.505-4 - Obtaining access to proprietary information.

    Science.gov (United States)

    2010-10-01

    ... REGULATION ACQUISITION PLANNING CONTRACTOR QUALIFICATIONS Organizational and Consultant Conflicts of Interest... source selection information by acquiring the services of marketing consultants which, if used in... make inquiries of marketing consultants to ensure that the marketing consultant has provided no unfair...

  15. Proprietary policy and production

    Czech Academy of Sciences Publication Activity Database

    Jeong, Byeongju

    -, č. 287 (2006), s. 1-14 ISSN 1211-3298 Institutional research plan: CEZ:MSM0021620846 Keywords : proprietary regime * direct production * model Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp287.pdf

  16. Contrasting Proprietary and Free/Open Source Game Development

    Directory of Open Access Journals (Sweden)

    Marco Zamarian

    2008-10-01

    Full Text Available Free/Libre Open Source Software (F/LOSS development practices are gaining momentum in the computer game industry. This traditionally proprietary industry is becoming more interested in the F/LOSS paradigm for developing complex software projects. Software practitioners, both managers and developers, need to understand the potential in order to benefit properly from incorporating F/LOSS practices into their proprietary production cycle. Comparisons between proprietary and F/LOSS software development processes are usually characterized in terms of the relationship between property rights, revenue distribution and power within a network of actors. By contrast, coordination and control practices, mediating artifacts and development tools, and the interactions between the different actors involved in the development are often neglected. Proprietary and F/LOSS development differ in terms of the knowledge exchanges between the relevant actors and the different strategies employed to overcome information asymmetries. Recognizing this difference is an essential step for evaluating how proprietary, closed-source software houses can benefit by integrating various F/LOSS practices into their development agenda.

  17. 27 CFR 6.27 - Proprietary interest.

    Science.gov (United States)

    2010-04-01

    ... OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Interest in Retail License § 6.27 Proprietary interest. (a) Complete ownership. Outright ownership of a retail business by an industry member is.... Less than complete ownership of a retail business by an industry member constitutes an interest in a...

  18. 27 CFR 6.33 - Proprietary interest.

    Science.gov (United States)

    2010-04-01

    ... OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Interest in Retail Property § 6.33 Proprietary interest. (a) Complete ownership. Outright ownership of a retail business by an industry member is.... Less than complete ownership of a retail business by an industry member constitutes an interest in...

  19. When to make proprietary software open source

    NARCIS (Netherlands)

    Caulkins, J.P.; Feichtinger, G.; Grass, D.; Hartl, R.F.; Kort, P.M.; Seidl, A.

    Software can be distributed closed source (proprietary) or open source (developed collaboratively). While a firm cannot sell open source software, and so loses potential sales revenue, the open source software development process can have a substantial positive impact on the quality of a software,

  20. 15 CFR 1160.6 - Proprietary data.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Proprietary data. 1160.6 Section 1160.6 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) TECHNOLOGY ADMINISTRATION, DEPARTMENT OF COMMERCE PRODUCTIVITY, TECHNOLOGY AND INNOVATION Promotion of...

  1. RIS modality interfaces. From proprietary solutions to DICOM worklist management

    International Nuclear Information System (INIS)

    Jaeger, D.; Kotter, E.; Langer, M.

    1999-01-01

    Radiologic information systems (RIS) and picture archiving and communication systems (PACS) are becoming increasingly widespread. This leads to new demands on the integration of the individual, formerly independent information systems (RIS, modalities, PACS). Possible ways of integrating individual systems are introduced. Besides the detailed description of different realizations of system communication, its role in the PACS at the university hospital in Freiburg is explained. The integration of different information systems still requires the use of proprietary interfaces. An appropriate integration generally has been realized in Freiburg. In the near future DICOM basic worklist management will standardize system integration and render an interdepartmental workflow concept possible. Even though an available communication standard exists, not all problems in the RIS-modality interface are solved. Different data models in the various RI systems and modalities demand certain degrees of freedom in the standard. Thus a satisfactory workflow cannot be guaranteed even when all involved systems conform with the standard. (orig.) [de

  2. Proprietary, standard, and government-supported nuclear data bases

    International Nuclear Information System (INIS)

    Poncelet, C.G.; Ozer, O.; Harris, D.R.

    1975-07-01

    This study presents an assessment of the complex situation surrounding nuclear data bases for nuclear power technology. Requirements for nuclear data bases are identified as regards engineering functions and system applications for the many and various user groups that rely on nuclear data bases. Current practices in the development and generation of nuclear data sets are described, and the competitive aspect of design nuclear data set development is noted. The past and current role of the federal government in nuclear data base development is reviewed, and the relative merits of continued government involvement are explored. National policies of the United States and other industrial countries regarding the availability of nationally supported nuclear data information are reviewed. Current proprietary policies of reactor vendors regarding design library data sets are discussed along with the basis for such proprietary policies. The legal aspects of protective policies are explored as are their impacts on the nuclear power industry as a whole. The effect of the regulatory process on the availability and documentation of nuclear data bases is examined. Current nuclear data standard developments are reviewed, including a discussion of the standard preparation process. Standards currently proposed or in preparation that directly relate to nuclear data bases are discussed in some detail. (auth)

  3. The influence of proprietary disclosure costs on the decision to go public

    NARCIS (Netherlands)

    Marra, T.A.

    2001-01-01

    This thesis studies the influence of proprietary disclosure costs related to informing product market competitors on management communication with investors. In doing so it focuses on the firm's decision to go public. A firm that goes public not only experiences a change in its financial and

  4. Disclosure Regulation in Duopoly Markets: Proprietary Costs and Social Welfare

    NARCIS (Netherlands)

    Suijs, J.P.M.; Wielhouwer, J.L.

    2014-01-01

    The argument of proprietary costs is commonly used by firms to object against proposed disclosure regulations. The goal of this paper is to improve our understanding of the welfare consequences of disclosure in duopoly markets and to identify market settings where proprietary costs are a viable

  5. Disclosure regulation in duopoly markets : Proprietary costs and social welfare

    NARCIS (Netherlands)

    Suijs, J.P.M.; Wielhouwer, J.L.

    2014-01-01

    The argument of proprietary costs is commonly used by firms to object against proposed disclosure regulations. The goal of this paper is to improve our understanding of the welfare consequences of disclosure in duopoly markets and to identify market settings where proprietary costs are a viable

  6. 15 CFR 971.1006 - Proprietary enforcement information.

    Science.gov (United States)

    2010-01-01

    ... REGULATIONS OF THE ENVIRONMENTAL DATA SERVICE DEEP SEABED MINING REGULATIONS FOR COMMERCIAL RECOVERY PERMITS... or maintained under Title III of the Act concerning a person or vessel engaged in commercial recovery... Administrator will, consistent with due process, move to have records sealed, under 15 CFR part 904 subpart C...

  7. Regulation of proprietary traditional Chinese medicines in Australia.

    Science.gov (United States)

    Graham, David T

    2017-01-01

    This review article describes the regulation of proprietary Chinese medicines for the Australian market, which may permit many medicines used in Traditional Chinese Medicine to have a simplified process of market access provided that certain criteria for acceptable public safety are met. Copyright © 2017 China Pharmaceutical University. Published by Elsevier B.V. All rights reserved.

  8. Open Source and Proprietary Project Management Tools for SMEs.

    Directory of Open Access Journals (Sweden)

    Veronika Abramova

    2017-05-01

    Full Text Available The dimensional growth and increasing difficulty in project management promoted the development of different tools that serve to facilitate project management and track project schedule, resources and overall progress. These tools offer a variety of features, from task and time management, up to integrated CRM (Customer Relationship Management and ERP (Enterprise Resource Planning modules. Currently, a large number of project management software is available, to assist project team during the entire project lifecycle. We present the main differences between open source and proprietary project management tools and how those could be important for SMEs, describing the key features and how those can assist the project manager and the development team. In this paper, we analyse four open-source project management tools: OpenProject, ProjectLibre, Redmine, LibrePlan and four proprietary tools: Bitrix24, JIRA, Microsoft Project and Asana.

  9. 75 FR 61758 - Public Input for the Study Regarding the Implementation of the Prohibitions on Proprietary...

    Science.gov (United States)

    2010-10-06

    ... banking entities from engaging in proprietary trading and from maintaining certain relationships with... the Prohibitions on Proprietary Trading and Certain Relationships With Hedge Funds and Private Equity...-Frank Act, banking entities \\2\\ are prohibited from engaging in proprietary trading and from maintaining...

  10. 27 CFR 20.113 - Proprietary solvents general-use formula.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Proprietary solvents... Formulas and Statements of Process General-Use Formulas § 20.113 Proprietary solvents general-use formula. (a) A proprietary solvent is any article made with any other ingredients combined with the...

  11. How to establish precise proprietary Chinese medicine in post-marketing reappraisal?

    Directory of Open Access Journals (Sweden)

    Ran Tian

    2017-10-01

    Full Text Available The clinical efficacy and safety of proprietary Chinese medicine has become a more prevailing public health concern. The China Food and Drug Administration has pushed drug companies to conduct post-marketing reappraisal for proprietary Chinese medicine to provide additional evidence supporting the efficacy and safety of these medicine. In this paper, we propose a reappraisal protocol called “precise proprietary Chinese medicine” to precisely i define the therapeutic aim; ii design the protocol; iii control the quality of proprietary Chinese medicine; iv implement the protocol in the trial; v study the mechanism-of-action of the proprietary Chinese medicine and vi describe the indications of the proprietary Chinese medicine. We hope that these steps facilitate the post-marketing reappraisal of proprietary Chinese medicine.

  12. The Drug Discovery and Development Industry in India-Two Decades of Proprietary Small-Molecule R&D.

    Science.gov (United States)

    Differding, Edmond

    2017-06-07

    This review provides a comprehensive survey of proprietary drug discovery and development efforts performed by Indian companies between 1994 and mid-2016. It is based on the identification and detailed analysis of pharmaceutical, biotechnology, and contract research companies active in proprietary new chemical entity (NCE) research and development (R&D) in India. Information on preclinical and clinical development compounds was collected by company, therapeutic indication, mode of action, target class, and development status. The analysis focuses on the overall pipeline and its evolution over two decades, contributions by type of company, therapeutic focus, attrition rates, and contribution to Western pharmaceutical pipelines through licensing agreements. This comprehensive analysis is the first of its kind, and, in our view, represents a significant contribution to the understanding of the current state of the drug discovery and development industry in India. © 2017 The Author. Published by Wiley-VCH Verlag GmbH & Co. KGaA.

  13. Cyclic Fatigue Resistance of 3 Proprietary Rotary File Brands and their Analogous EdgeEndo Counterparts.

    Science.gov (United States)

    2018-04-26

    Resistance of 3 Proprietary Rotary File Brands and their Analogous EdgeEndo Counterparts. 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd...Endodontics 14. ABSTRACT Cyclic Fatigue Resistance of 3 Proprietary Rotary File Brands and their Analogous EdgeEndo Counterparts. David J. Weyh DDS...Resistance of 3 Proprietary Rotary File Brands and their Analogous EdgeEndo Counterparts. David J. Weyh DDS Jarom J. Ray DDS Introduction: The aim of this

  14. A Perceptual Measure of the Degree of Development of Proprietary Equipment.

    Science.gov (United States)

    Cua, Kristy O.; Junttila, Mikko A.; Schroeder, Roger G.

    2002-01-01

    Evaluated the psychometric properties of a perceptual measure of the extent to which manufacturing organizations develop proprietary equipment, the Proprietary Equipment Scale (developed by the World Class Manufacturing study). Analysis of data from 164 manufacturing plants in 5 countries indicates that although method effects are present, the…

  15. Regulatory control of Chinese Proprietary Medicines in Singapore.

    Science.gov (United States)

    Yee, Shen-Kuan; Chu, Swee-Seng; Xu, Yi-Min; Choo, Peck-Lin

    2005-02-01

    In Singapore, there has been a growing public interest in traditional Chinese medicine (TCM), which plays an important role in the healthcare system. With effect from 1 September 1999, the control on Chinese Proprietary Medicines (CPM) was implemented in three phases over a span of 3 years. Under the CPM regulatory framework, CPM importers, wholesalers, manufacturers and re-packers must be licensed and CPM products assessed and listed by the health authority before they are allowed for sale. Product assessment is based on the criteria of safety and quality which include limits of toxic heavy metals and microbial contents. During the 3-year CPM listing exercise, irregularities were detected, including intrinsic toxicity, adulteration, substitution, contamination, misidentification, non-traditional and/or inappropriate usage, incorrect preparation, inappropriate labelling, exaggerated claims and/or advertising. The full implementation of CPM control by September 2001 saw the listing of 7943 CPM products and brought about an improvement in the quality and safety of CPM in Singapore as well as the removal of sub-standard, fake/imitation and adulterated products. The standards of practices by local CPM dealers have also been raised. These improvements have, in turn, increased the level of public confidence in CPM products in Singapore.

  16. State of the Art of Proprietary Financial Reporting in the Department of the Navy

    National Research Council Canada - National Science Library

    Manning, Jeffrey

    1996-01-01

    .... To address this issue, a review of the laws, policies and agencies which affect proprietary reporting was conducted, along with a comparison between Federal government and private sector financial reporting...

  17. Change Strategies Used by a Proprietary School: The Dale Carnegie Organization.

    Science.gov (United States)

    Mackey, Paul J.

    1983-01-01

    Discusses recent developments regarding proprietary schools: recognition by accrediting associations, increased federal aid, and increased need for the specific training offered by these schools. Uses the Dale Carnegie organization as an example. (JOW)

  18. Continued development of a non-proprietary, high-tension, cable end terminal system.

    Science.gov (United States)

    2016-04-29

    A non-proprietary, cable guardrail system is currently under development for the Midwest States Pooled Fund Program. : A cable guardrail end terminal was necessary to accompany the cable guardrail system. The objective of this research : project was ...

  19. Chinese proprietary medicine in Singapore: regulatory control of toxic heavy metals and undeclared drugs.

    Science.gov (United States)

    Koh, H L; Woo, S O

    2000-11-01

    Traditional Chinese medicine (TCM) is gaining popularity as a form of complementary and alternative medicine. Reports of efficacy of TCM are increasing in numbers. TCM includes both crude Chinese medicinal materials (plants, animal parts and minerals) and Chinese proprietary medicine (CPM) [final dosage forms]. Despite the belief that CPM and herbal remedies are of natural origin, unlike Western medicine, and are hence safe and without many adverse effects, there have been numerous reports of adverse effects associated with herbal remedies. Factors affecting the safety of herbal medicines include intrinsic toxicity, adulteration, substitution, contamination, misidentification, lack of standardisation, incorrect preparation and/or dosage and inappropriate labelling and/or advertising. Hence, new regulations on the control of CPM were enforced in Singapore with effect from 1 September 1999. These include licensing and labelling requirements, as well as control of microbial contamination. This article also reviews reports of excessive toxic heavy metals and undeclared drugs in CPM in Singapore between 1990 and 1997. The names, uses, toxic heavy metal or drug detected and the year of detection are tabulated. Information on the brand or manufacturer's name are provided whenever available. The public and healthcare professionals should be better informed of the basic concept of TCM and its usefulness, as well as the potential adverse effects associated with its use. Greater control over the safety and quality of CPM could be achieved through good manufacturing practice, regulatory control, research, education, reporting usage of Chinese medicine (as in drug history) as well as reporting of adverse events.

  20. Assessing the potential impact of non-proprietary drug copies on quality of medicine and treatment in patients with relapsing multiple sclerosis: the experience with fingolimod

    Directory of Open Access Journals (Sweden)

    Correale J

    2014-06-01

    Full Text Available Jorge Correale,1 Erwin Chiquete,2 Snezana Milojevic,3 Nadina Frider,3 Imre Bajusz31Raúl Carrea Institute for Neurological Research, Foundation for the Fight against Infant Neurological Illnesses, Buenos Aires, Argentina; 2Department of Neurology and Psychiatry, Salvador Zubirán National Institute of Medical Science and Nutrition, Mexico City, Mexico; 3Novartis Pharma AG, Basel, SwitzerlandBackground: Fingolimod is a once-daily oral treatment for relapsing multiple sclerosis, the proprietary production processes of which are tightly controlled, owing to its susceptibility to contamination by impurities, including genotoxic impurities. Many markets produce nonproprietary medicines; assessing their efficacy and safety is difficult as regulators may approve nonproprietary drugs without bioequivalence data, genotoxic evaluation, or risk management plans (RMPs. This assessment is especially important for fingolimod given its solubility/bioavailability profile, genotoxicity risk, and low-dose final product (0.5 mg. This paper presents an evaluation of the quality of proprietary and nonproprietary fingolimod variants.Methods: Proprietary fingolimod was used as a reference substance against which eleven nonproprietary fingolimod copies were assessed. The microparticle size distribution of each compound was assessed by laser light diffraction, and inorganic impurity content by sulfated ash testing. Heavy metals content was quantified using inductively coupled plasma optical emission spectrometry, and levels of unspecified impurities by high-performance liquid chromatography. Solubility was assessed in a range of solvents at different pH values. Key information from the fingolimod RMP is also presented.Results: Nonproprietary fingolimod variants exhibited properties out of proprietary or internationally accepted specifications, including differences in particle size distribution and levels of impurities such as heavy metals. For microparticle size and

  1. Protection of proprietary rights of DIN standards in connection with statutory and administrative provisions

    International Nuclear Information System (INIS)

    Katzenberger, P.

    1985-01-01

    On the basis of contracts entered with the German Institute of Standardization (DIN), the state bodies and authorities tend to refer to Din standards in many ways when issuing statutory or administrative provisions. Some Din standards are also printed in official publications- with or without Din's prior consent. Such common practice leads to the question whether the Din standards which on pinciple meet the general requirements made on the protection of proprietary rights are losing this protection by the fact that official publications are exempt from the protection of proprietary rights (Art.5 UrhG). The author points out that the thorough analysis of the legal position in terms of interests, proprietary rights and constitution indicated that this is not, in principle, the case. (orig.) [de

  2. Oral Chinese proprietary medicine for angina pectoris: an overview of systematic reviews/meta-analyses.

    Science.gov (United States)

    Luo, Jing; Xu, Hao; Yang, Guoyan; Qiu, Yu; Liu, Jianping; Chen, Keji

    2014-08-01

    Oral Chinese proprietary medicine (CPM) is commonly used to treat angina pectoris, and many relevant systematic reviews/meta-analyses are available. However, these reviews have not been systematically summarized and evaluated. We conducted an overview of these reviews, and explored their methodological and reporting quality to inform both practice and further research. We included systematic reviews/meta-analyses on oral CPM in treating angina until March 2013 by searching PubMed, Embase, the Cochrane Library and four Chinese databases. We extracted data according to a pre-designed form, and assessed the methodological and reporting characteristics of the reviews in terms of AMSTAR and PRISMA respectively. Most of the data analyses were descriptive. 36 systematic reviews/meta-analyses involving over 82,105 participants with angina reviewing 13 kinds of oral CPM were included. The main outcomes assessed in the reviews were surrogate outcomes (34/36, 94.4%), adverse events (31/36, 86.1%), and symptoms (30/36, 83.3%). Six reviews (6/36, 16.7%) drew definitely positive conclusions, while the others suggested potential benefits in the symptoms, electrocardiogram, and adverse events. The overall methodological and reporting quality of the reviews was limited, with many serious flaws such as the lack of review protocol and incomprehensive literature searches. Though many systematic reviews/meta-analyses on oral CPM for angina suggested potential benefits or definitely positive effects, stakeholders should interpret the findings of these reviews with caution, considering the overall limited methodological and reporting quality. We recommend further studies should be appropriately conducted and systematic reviews reported according to PRISMA standard. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Leadership Style, Employee Satisfaction, and Productivity in the Enrollment Department of a Proprietary University

    Science.gov (United States)

    Chitwood, James

    2010-01-01

    The success of an enrollment department is critical to the success of an educational institution. The quantitative research study used a correlational design to measure the relationship between perceived leadership style, employee satisfaction, and departmental productivity. A sample of 41 admissions personnel from a Midwest proprietary university…

  4. 34 CFR Appendix A to Subpart L of... - Ratio Methodology for Proprietary Institutions

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Ratio Methodology for Proprietary Institutions A Appendix A to Subpart L of Part 668 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF POSTSECONDARY EDUCATION, DEPARTMENT OF EDUCATION STUDENT ASSISTANCE GENERAL PROVISIONS...

  5. 77 FR 23 - Prohibitions and Restrictions on Proprietary Trading and Certain Interests in, and Relationships...

    Science.gov (United States)

    2012-01-03

    ... Relationships With, Hedge Funds and Private Equity Funds AGENCIES: Office of the Comptroller of the Currency... relationships with, a hedge fund or private equity fund (``proposed rule''). Due to the complexity of the issues... in proprietary trading and have certain interests in, or relationships with, a hedge fund or private...

  6. Through BHA (Bottom Hole Assembly) cementing with proprietary cementing technology

    Energy Technology Data Exchange (ETDEWEB)

    Fanguy, Charles ' Joey' ; Mueller, Dan T. [BJ Services Company, Houston, TX (United States); Garrett, J.C. [Palm Energy Partners, LLC, Metairie, LA (United States)

    2004-07-01

    There are many problems that can arise when drilling into sub-normally pressured or naturally fractured zones. Lost circulation is one problem that is commonly encountered while drilling oil and gas wells. Lost circulation can lead to increased costs associated with drilling due to rig time, spreadsheet costs, and expensive mud system losses. Cement is one of the most effective treatment options, although it is not normally considered the first option because most operators are forced to trip out of the wellbore and utilize a squeeze packer. This is not always a viable option because of potential well control issues associated with the hydrostatic pressure reduction due to the losses of the whole mud. One treatment option that is commonly overlooked is pumping cement slurries through the bottom hole assembly and drill bit. This is generally not attempted for a variety of reasons. These reasons include: I Concern about 'squeezing off' of the cement in the bit II Lack of potential quality control associated with mixing 'on the fly' III Lack of the ability to test the actual mixed slurry samples The use of a pre-mixed, storable cement slurry has eliminated the concerns associated with pumping cement slurries through mud motors, MWD tools, BHA's, and drill bits. This advanced cement technology has been successfully utilized while reducing the risks associated with these lost circulation treatments. In addition, this technology has eliminated the costs associated with using a squeeze packer and the rig time required for several trips out of the wellbore. The paper will describe the premixed slurry properties and QA/QC procedures that are required for successful through the bit operations. This paper will also provide case histories of successful through the bit operation, as well as background information leading to the treatments. The case histories include successful through the bit remediation of severe lost circulation zones and as well the

  7. 75 FR 68675 - Controlled Unclassified Information

    Science.gov (United States)

    2010-11-09

    ... information, such as information that involves privacy, security, proprietary business interests, and law... National Intelligence (Director), with respect to the Intelligence Community and after consultation with... necessary to implement this order with respect to intelligence and intelligence-related information...

  8. Using virtualization to protect the proprietary material science applications in volunteer computing

    Directory of Open Access Journals (Sweden)

    Khrapov Nikolay P.

    2018-04-01

    Full Text Available USPEX is a world-leading software for computational material design. In essence, USPEX splits simulation into a large number of workunits that can be processed independently. This scheme ideally fits the desktop grid architecture. Workunit processing is done by a simulation package aimed at energy minimization. Many of such packages are proprietary and should be protected from unauthorized access when running on a volunteer PC. In this paper we present an original approach based on virtualization. In a nutshell, the proprietary code and input files are stored in an encrypted folder and run inside a virtual machine image that is also password protected. The paper describes this approach in detail and discusses its application in USPEX@home volunteer project.

  9. Using virtualization to protect the proprietary material science applications in volunteer computing

    Science.gov (United States)

    Khrapov, Nikolay P.; Rozen, Valery V.; Samtsevich, Artem I.; Posypkin, Mikhail A.; Sukhomlin, Vladimir A.; Oganov, Artem R.

    2018-04-01

    USPEX is a world-leading software for computational material design. In essence, USPEX splits simulation into a large number of workunits that can be processed independently. This scheme ideally fits the desktop grid architecture. Workunit processing is done by a simulation package aimed at energy minimization. Many of such packages are proprietary and should be protected from unauthorized access when running on a volunteer PC. In this paper we present an original approach based on virtualization. In a nutshell, the proprietary code and input files are stored in an encrypted folder and run inside a virtual machine image that is also password protected. The paper describes this approach in detail and discusses its application in USPEX@home volunteer project.

  10. A Systematic Approach for Evaluating BPM Systems: Case Studies on Open Source and Proprietary Tools

    OpenAIRE

    Delgado , Andrea; Calegari , Daniel; Milanese , Pablo; Falcon , Renatta; García , Esteban

    2015-01-01

    Part 3: Examples and Case Studies; International audience; Business Process Management Systems (BPMS) provide support for modeling, developing, deploying, executing and evaluating business processes in an organization. Selecting a BPMS is not a trivial task, not only due to the many existing alternatives, both in the open source and proprietary realms, but also because it requires a thorough evaluation of its capabilities, contextualizing them in the organizational environment in which they w...

  11. Proprietary and voluntary home care agency evolution: the emergence of a new entity.

    Science.gov (United States)

    Balinsky, W; Shames, J N

    1985-01-01

    The objective of this paper is to document that the delivery of home care services and the corresponding ways in which they are marketed are evolving in both proprietary and voluntary providers. This evolution is producing the emergency of a new entity. In order to examine the present state, it is necessary to review the general history of the development of both voluntary (not-for-profit) and proprietary home health services. Then, an analysis of present conditions will show that these two forms of ownership are changing in ways that are making them more alike than different. This situation is leading to more intense competition for an expanding and diverse mix of home services. Program content and corresponding marketing techniques have crossed the industry's traditional lines blending into a wide array of services being offered by both voluntary and proprietary organizations. Despite their many shared goals and objectives, home care agencies still differ in their underlying philosophy which is based at least in part on their past.

  12. 47 CFR 64.2005 - Use of customer proprietary network information without customer approval.

    Science.gov (United States)

    2010-10-01

    ... service competitors. (c) A telecommunications carrier may use, disclose, or permit access to CPNI, without... not limited to, speed dialing, computer-provided directory assistance, call monitoring, call tracing...

  13. 19 CFR 207.93 - Protection of proprietary information during panel and committee proceedings.

    Science.gov (United States)

    2010-04-01

    ... Government of Mexico who the Canadian Minister of Trade or the Mexican Secretary of Economia, as the case may... Economia, as the case may be, has notified the Commission Secretary that such person requires access. (4...

  14. 47 CFR 64.2010 - Safeguards on the disclosure of customer proprietary network information.

    Science.gov (United States)

    2010-10-01

    ... customer online access to CPNI related to a telecommunications service account. Once authenticated, the customer may only obtain online access to CPNI related to a telecommunications service account through a... (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) MISCELLANEOUS RULES RELATING TO COMMON CARRIERS Customer...

  15. 47 CFR 64.2009 - Safeguards required for use of customer proprietary network information.

    Science.gov (United States)

    2010-10-01

    ... other manner, of their own and their affiliates' sales and marketing campaigns that use their customers... outbound marketing request for customer approval. (e) A telecommunications carrier must have an officer, as... 47 Telecommunication 3 2010-10-01 2010-10-01 false Safeguards required for use of customer...

  16. Effects of a proprietary Bacillus coagulans preparation on symptoms of diarrhea-predominant irritable bowel syndrome.

    Science.gov (United States)

    Dolin, B J

    2009-12-01

    Symptoms of irritable bowel syndrome (IBS) have a profound impact on quality of life for many patients and current treatments are sometimes unsatisfactory. This controlled pilot study was conducted to evaluate effects of the proprietary GanedenBC(30) (Bacillus coagulans GBI-30, 6086) probiotic on IBS symptoms, in a randomized, double-blind, placebo-controlled clinical trial including patients with diarrhea-predominant IBS (IBS-D). Patients were randomized to receive either B. coagulans GBI-30, 6086 or placebo once a day for 8 weeks. Patients filled out a quality-of-life questionnaire, and self-assessment diaries were provided to record stool count and consistency, symptom severity, and medication consumption. Of the 61 patients enrolled, six did not meet the inclusion criteria and three were lost to follow-up. Of the remaining 52 patients with IBS-D, the average number of bowel movements per day was significantly reduced for patients treated with B. coagulans GBI-30, 6086 when compared to placebo (P = 0.042). Large variability in baseline scores prevented the assessment of severity scores and quality of life. This small pilot study provides evidence that the proprietary B. coagulans GBI-30, 6086 probiotic is safe and effective for reducing daily bowel movements in patients with IBS-D. Copyright 2009 Prous Science, S.A.U. or its licensors. All rights reserved.

  17. Blocking carbohydrate absorption and weight loss: a clinical trial using a proprietary fractionated white bean extract.

    Science.gov (United States)

    Udani, Jay; Singh, Betsy B

    2007-01-01

    A proprietary fractionated white bean extract of Phaseolus vulgaris has been shown in vitro to inhibit the digestive enzyme alpha-amylase. This may prevent or delay the digestion of complex carbohydrates, potentially resulting in weight loss. A 4-week randomized, double-blind, placebo-controlled study of 25 healthy subjects consuming 1000 mg of a proprietary fractioned white bean extract or an identical placebo twice a day before meals in conjunction with a multi-component weight-loss program, including diet, exercise, and behavioral intervention, was conducted. Both groups reduced their weight and waist size significantly from baseline. The active group lost 6.0 lbs (P=.0002) and 2.2 in (P=.0050), and the placebo group lost 4.7 lbs (P=.0016) and 2.1 in (P=.0001). The differences between groups were not significant (weight P=.4235, waist size P=.8654). Through subsequent exploratory analysis to investigate group findings further, subjects were stratified by total dietary carbohydrate intake. This probative analysis revealed that the tertile of subjects who had consumed the most carbohydrates demonstrated significant reductions in both weight (8.7 lbs vs 1.7 lbs, P=.0412) and waist size (3.3 in vs 1.3 in P=.0100) compared with placebo subjects in the same tertile of carbohydrate intake. Subjects who adhere to a program including dietary modification, exercise, and behavioral intervention can significantly reduce their weight and waist size in a short period of time. In an exploratory analysis of data, the tertile of subjects who ate the most carbohydrates experienced a significant reduction in both weight and waist size with the addition of the white bean extract compared to the placebo group of the same tertile of carbohydrate consumption. Longer studies with a larger pool of subjects are required to validate these findings.

  18. A systematic review of the role of proprietary and patent medicine vendors in healthcare provision in Nigeria.

    Directory of Open Access Journals (Sweden)

    Naomi Beyeler

    Full Text Available Interventions to reduce the burden of disease and mortality in sub-Saharan Africa increasingly recognize the important role that drug retailers play in delivering basic healthcare services. In Nigeria, owner-operated drug retail outlets, known as patent and proprietary medicine vendors (PPMVs, are a main source of medicines for acute conditions, but their practices are not well understood. Greater understanding of the role of PPMVs and the quality of care they provide is needed in order to inform ongoing national health initiatives that aim to incorporate PPMVs as a delivery mechanism.This paper reviews and synthesizes the existing published and grey literature on the characteristics, knowledge and practices of PPMVs in Nigeria. We searched published and grey literature using a number of electronic databases, supplemented with website searches of relevant international agencies. We included all studies providing outcome data on PPMVs in Nigeria, including non-experimental studies, and assessed the rigor of each study using the WHO-Johns Hopkins Rigor scale. We used narrative synthesis to evaluate the findings.We identified 50 articles for inclusion. These studies provided data on a wide range of PPMV outcomes: training; health knowledge; health practices, including drug stocking and dispensing, client interaction, and referral; compliance with regulatory guidelines; and the effects of interventions targeting PPMVs. In general, PPMVs have low health knowledge and poor health treatment practices. However, the literature focuses largely on services for adult malaria, and little is known about other health areas or services for children.This review highlights several concerns with the quality of the private drug retail sector in Nigeria, as well as gaps in the existing evidence base. Future research should adopt a more holistic view of the services provided by PPMV shops, and evaluate intervention strategies that may improve the services provided in

  19. The influence of temporary differences between accounting and tax revenues, proprietary costs and liquidity on profit growth

    Directory of Open Access Journals (Sweden)

    NURAMALIA HASANAH

    2017-07-01

    Full Text Available This study aimed to examine the influence of temporary differences between accounting profit and tax, proprietary costs, and Liquidity toward earnings growth of the companies listed in Indonesia Stock Exchange (IDX 2011-2012. The factors examined in this study are temporary differences between accounting profit and tax, proprietary costs, and liquidity as an independent variable, while earnings growth has the dependent variable. This study used a descriptive quantitative method using secondary data and the number of samples collected was thirty- eight (38 that have met the criteria the researchers used purposive sampling. From the data that has been collected and then processed and analyzed using multiple regression analysis with a significance level of 0.05. This research proves temporary differences between accounting profit and tax has no significant influence on earnings growth, proprietary cost has no significant influence on earnings growth, and liquidity has negatively significant influence earnings growth. Temporary differences between accounting profit and tax, proprietary costs, and liquidity together or simultaneously significant influence toward the earnings growth.

  20. Cable-to-post attachments for use in non-proprietary high-tension cable median barrier - phase II.

    Science.gov (United States)

    2016-03-24

    The objective of this study was to reevaluate and improve the existing cable-to-post attachment hardware that is utilized : in the non-proprietary cable barrier being developed at MwRSF. The study focused on redesigning the bolted, tabbed : bracket (...

  1. 15 CFR 400.53 - Information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Information. 400.53 Section 400.53..., Record and Information § 400.53 Information. (a) Request for information. The Board may request submission of any information, including business proprietary information, and written argument necessary or...

  2. Attitudes of physicians and pharmacists towards International Non-proprietary Name prescribing in Belgium.

    Science.gov (United States)

    Van Bever, Elien; Elseviers, Monique; Plovie, Marijke; Vandeputte, Lieselot; Van Bortel, Luc; Vander Stichele, Robert

    2015-03-01

    International Non-proprietary Name (INN) prescribing is the use of the name of the active ingredient(s) instead of the brand name for prescribing. In Belgium, INN prescribing began in 2005 and a major policy change occurred in 2012. The aim was to explore the opinions of Dutch-speaking general practitioners (GPs) and pharmacists. An electronic questionnaire with 39 five-point Likert scale statements and one open question was administered in 2013. Multivariate analysis was performed with multiple linear regression on a sum score for benefit statements and for drawback statements. Answers to the open question were qualitatively analysed. We received 745 valid responses with a representable sample for both subgroups. Participants perceived the motives to introduce INN prescribing as purely economic (to reduce pharmaceutical expenditures for the government and the patient). Participants accepted the concept of INN prescribing, but 88% stressed the importance of guaranteed treatment continuity, especially in older, chronic patients, to prevent patient confusion, medication non-adherence and erroneous drug use. In conclusion, the current way in which INN prescribing is applied in Belgium leads to many concerns among primary health professionals about patient confusion and medication adherence. Slightly adapting the current concept of INN prescribing to these concerns can turn INN prescribing into one of the major policies in Belgium to reduce pharmaceutical expenditures and to stimulate rational drug prescribing. © 2014 Nordic Association for the Publication of BCPT (former Nordic Pharmacological Society).

  3. Isolation and identification of phytoestrogens and flavonoids in an Ayurvedic proprietary medicine using chromatographic and Mass Spectroscopic analysis

    Institute of Scientific and Technical Information of China (English)

    Sulaiman CT; Arun A; Anandan EM; Sandhya CR; Indira Balachandran

    2015-01-01

    Objective: To develop analytical methods for the isolation and structural identification of poly phenols including phytoestrogens in Mensokot tablet, a herbal proprietary medicine. Methods:Isolation consisted of an ultrasound-assisted extraction, followed by acid hydrolysis and a final liquid-liquid extraction step in diethyl ether. Identification and structural characterisation was done by liquid chromatography coupled with Q-TOF-ESI-MS/MS analysis. Results:Phytoestrogens such as Coumestrol, Genistein and Glycitein have been identified in Mensokot tablet along with several other flavonoids. Conclusion: In the present research, a rapid HPLC-MS/MS method has been developed for the identification of phytoestrogens and other flavonoids from an Ayurvedic proprietary medicine. Phytoestrogens are considered to play an important role in the prevention of cancers, heart disease, menopausal symptoms and osteoporosis.

  4. Speman®, A Proprietary Ayurvedic Formulation, Reverses Cyclophosphamide-Induced Oligospermia In Rats.

    Directory of Open Access Journals (Sweden)

    Mohd. Azeemuddin Mukram

    2013-04-01

    Full Text Available Background: This investigation was aimed to evaluate the effect of Speman®, a well known ayurvedic proprietary preparation, in an experimental model of cyclophosphamide-(CP induced oligospermia in rats.Materials and Methods: Thirty male rats were randomized in to five, equally-sized groups. Rats in group 1 served as a normal control; group 2 served as an untreated positive control; groups 3, 4, 5 received  Speman® granules  at doses of 300, 600, and 900mg/kg body weight p.o. respectively, once daily for 13 days. On day four, one hour after the respective treatment, oligospermia was induced by administering a single dose of CP (100mg/kg body weight p.o.  to all the groups except group1. At the end of the study period the rats were euthanised and accessory reproductive organs were weighed and subjected to histopathological examination. The semen samples were subject to enumeration of sperms.  Weight of the reproductive organs, histopathological examination of the tissues, and sperm count were the parameters studied to understand the effect of Speman® on rats with CP-induced oligospermia.Results: Changes that occurred due to the administration of CP at a dose of 100 mg/kg body weight were dose dependently reversed with Speman® at a dose of 300, 600, and 900 mg/kg body weight. There was a statistically significant increase in sperm count and the weight of the seminal vesicle, epididymis, and prostate.Conclusion: Findings of this investigation indicate that Speman® dose dependently reversed the CP-induced derangement of various parameters pertaining to the reproductive system.  This could explain the total beneficial actions of Speman® reported in several other clinical trials.

  5. Reversal of visceral hypersensitivity in rat by Menthacarin , a proprietary combination of essential oils from peppermint and caraway, coincides with mycobiome modulation

    NARCIS (Netherlands)

    Botschuijver, S.; Welting, O.; Levin, E.; Maria-Ferreira, D.; Koch, E.; Montijn, R. C.; Seppen, J.; Hakvoort, T. B. M.; Schuren, F. H. J.; de Jonge, W. J.; van den Wijngaard, R. M.

    2018-01-01

    Irritable bowel syndrome (IBS) is a common gastrointestinal disorder associated with altered gastrointestinal microflora and increased nociception to colonic distension. This visceral hypersensitivity can be reversed in our rat maternal separation model by fungicides. Menthacarin is a proprietary

  6. 17 CFR 240.3a44-1 - Proprietary government securities transactions incidental to the futures-related business of a...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Proprietary government securities transactions incidental to the futures-related business of a CFTC-regulated person. 240.3a44-1 Section 240.3a44-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...

  7. Proprietary Schools. Millions Spent To Train Students for Oversupplied Occupations. Report to the Chairman, Subcommittee on Human Resources, Committee on Government Reform and Oversight, House of Representatives.

    Science.gov (United States)

    General Accounting Office, Washington, DC. Health, Education, and Human Services Div.

    The General Accounting Office (GAO) examined the extent to which the financial aid provided under Title IV of the Higher Education Act to students enrolled in proprietary schools is being spent to train individuals for demand occupations. Job opening projections in 12 states were used to estimate job demand, the National Center for Education…

  8. Learning Management Systems and Comparison of Open Source Learning Management Systems and Proprietary Learning Management Systems

    Directory of Open Access Journals (Sweden)

    Yücel Yılmaz

    2016-04-01

    Full Text Available The concept of learning has been increasingly gaining importance for individuals, businesses and communities in the age of information. On the other hand, developments in information and communication technologies take effect in the field of learning activities. With these technologies, barriers of time and space against the learning activities largely disappear and these technologies make it easier to carry out these activities more effectively. There remain a lot of questions regarding selection of learning management system (LMS to be used for the management of e-learning processes by all organizations conducing educational practices including universities, companies, non-profit organizations, etc. The main questions are as follows: Shall we choose open source LMS or commercial LMS? Can the selected LMS meet existing needs and future potential needs for the organization? What are the possibilities of technical support in the management of LMS? What kind of problems may be experienced in the use of LMS and how can these problems be solved? How much effective can officials in the organization be in the management of LMS? In this study, primarily e-learning and the concept of LMS will be discussed, and in the next section, as for answers to these questions, open source LMSs and centrally developed LMSs will be examined and their advantages and disadvantages relative to each other will be discussed.

  9. Information

    International Nuclear Information System (INIS)

    Boyard, Pierre.

    1981-01-01

    The fear for nuclear energy and more particularly for radioactive wastes is analyzed in the sociological context. Everybody agree on the information need, information is available but there is a problem for their diffusion. Reactions of the public are analyzed and journalists, scientists and teachers have a role to play [fr

  10. Preclinical and Clinical Studies Demonstrate That the Proprietary Herbal Extract DA-5512 Effectively Stimulates Hair Growth and Promotes Hair Health

    Directory of Open Access Journals (Sweden)

    Jae Young Yu

    2017-01-01

    Full Text Available The proprietary DA-5512 formulation comprises six herbal extracts from traditional oriental plants historically associated with therapeutic and other applications related to hair. Here, we investigated the effects of DA-5512 on the proliferation of human dermal papilla cells (hDPCs in vitro and on hair growth in C57BL/6 mice and conducted a clinical study to evaluate the efficacy and safety of DA-5512. DA-5512 significantly enhanced the viability of hDPCs in a dose-dependent manner (p<0.05, and 100 ppm of DA-5512 and 1 μM minoxidil (MXD significantly increased the number of Ki-67-positive cells, compared with the control group (p<0.05. MXD (3% and DA-5512 (1%, 5% significantly stimulated hair growth and increased the number and length of hair follicles (HFs versus the controls (each p<0.05. The groups treated with DA-5512 exhibited hair growth comparable to that induced by MXD. In clinical study, we detected a statistically significant increase in the efficacy of DA-5512 after 16 weeks compared with the groups treated with placebo or 3% MXD (p<0.05. In conclusion, DA-5512 might promote hair growth and enhance hair health and can therefore be considered an effective option for treating hair loss.

  11. Information from Relationship Lending : Evidence from China

    NARCIS (Netherlands)

    Chang, C.; Liao, G.; Yu, X.; Ni, Z.

    2009-01-01

    We study the economic role of banks’ soft information, which evolved from repeated lending relationships, in the context of loan default. Using a proprietary database from one of the largest state-owned commercial banks in China, we find that the bank’s internal credit rating scores play a

  12. Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip N.; Granderson, Jessica; Sohn, Michael; Addy, Nathan; Jump, David

    2013-09-01

    The overarching goal of this work is to advance the capabilities of technology evaluators in evaluating the building-level baseline modeling capabilities of Energy Management and Information System (EMIS) software. Through their customer engagement platforms and products, EMIS software products have the potential to produce whole-building energy savings through multiple strategies: building system operation improvements, equipment efficiency upgrades and replacements, and inducement of behavioral change among the occupants and operations personnel. Some offerings may also automate the quantification of whole-building energy savings, relative to a baseline period, using empirical models that relate energy consumption to key influencing parameters, such as ambient weather conditions and building operation schedule. These automated baseline models can be used to streamline the whole-building measurement and verification (M&V) process, and therefore are of critical importance in the context of multi-measure whole-building focused utility efficiency programs. This report documents the findings of a study that was conducted to begin answering critical questions regarding quantification of savings at the whole-building level, and the use of automated and commercial software tools. To evaluate the modeling capabilities of EMIS software particular to the use case of whole-building savings estimation, four research questions were addressed: 1. What is a general methodology that can be used to evaluate baseline model performance, both in terms of a) overall robustness, and b) relative to other models? 2. How can that general methodology be applied to evaluate proprietary models that are embedded in commercial EMIS tools? How might one handle practical issues associated with data security, intellectual property, appropriate testing ‘blinds’, and large data sets? 3. How can buildings be pre-screened to identify those that are the most model-predictable, and therefore those

  13. Informe

    Directory of Open Access Journals (Sweden)

    Egon Lichetenberger

    1950-10-01

    Full Text Available Informe del doctor Egon Lichetenberger ante el Consejo Directivo de la Facultad, sobre el  curso de especialización en Anatomía Patológica patrocinado por la Kellogg Foundation (Departamento de Patología

  14. Adulteration of proprietary Chinese medicines and health products with undeclared drugs: experience of a tertiary toxicology laboratory in Hong Kong.

    Science.gov (United States)

    Ching, Chor Kwan; Chen, Sammy Pak Lam; Lee, Hencher Han Chih; Lam, Ying Hoo; Ng, Sau Wah; Chen, Mo Lung; Tang, Magdalene Huen Yin; Chan, Suzanne Suk San; Ng, Candy Wai Yan; Cheung, Jana Wing Lan; Chan, Tina Yee Ching; Lau, Nike Kwai Cheung; Chong, Yeow Kuan; Mak, Tony Wing Lai

    2018-01-01

    Proprietary Chinese medicines (pCMs) and health products, generally believed to be natural and safe, are gaining popularity worldwide. However, the safety of pCMs and health products has been severely compromised by the practice of adulteration. The current study aimed to examine the problem of adulteration of pCMs and health products in Hong Kong. The present study was conducted in a tertiary referral clinical toxicology laboratory in Hong Kong. All cases involving the use of pCMs or health products, which were subsequently confirmed to contain undeclared adulterants, from 2005 to 2015 were reviewed retrospectively. A total of 404 cases involving the use of 487 adulterated pCMs or health products with a total of 1234 adulterants were identified. The adulterants consisted of approved drugs, banned drugs, drug analogues and animal thyroid tissue. The six most common categories of adulterants detected were nonsteroidal anti-inflammatory drugs (17.7%), anorectics (15.3%), corticosteroids (13.8%), diuretics and laxatives (11.4%), oral antidiabetic agents (10.0%) and erectile dysfunction drugs (6.0%). Sibutramine was the most common adulterant (n = 155). The reported sources of these illicit products included over-the-counter drug stores, the internet and Chinese medicine practitioners. A significant proportion of patients (65.1%) had adverse effects attributable to these illicit products, including 14 severe and two fatal cases. Psychosis, iatrogenic Cushing syndrome and hypoglycaemia were the three most frequently encountered adverse effects. Adulteration of pCMs and health products with undeclared drugs poses severe health hazards. Public education and effective regulatory measures are essential to address the problem. © 2017 The British Pharmacological Society.

  15. 14 CFR 1214.112 - Patent, data and information matters.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Patent, data and information matters. 1214... Customers § 1214.112 Patent, data and information matters. (a) Patent and data rights. NASA will not acquire rights to inventions, patents or proprietary data which may be used in, or arise from, activities for...

  16. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-06-01

    Full Text Available Substantial changes have occurred in the Information Technology (IT sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  17. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  18. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  19. Field evaluation of the efficacy of proprietary repellent formulations with IR3535 and picaridin against Aedes aegypti.

    Science.gov (United States)

    Naucke, T J; Kröpke, R; Benner, G; Schulz, J; Wittern, K P; Rose, A; Kröckel, U; Grünewald, H W

    2007-06-01

    Seven proprietary repellent formulations (3 hydro-alcoholic spray solutions and 4 skin lotions) with active ingredient IR3,535 (ethyl butylacetylaminopropionate, EBAAP) or Picaridin (hydroxyethyl isobutyl piperidine carboxylate, KBR 3,023, Bayrepel) were tested in a field study on 10 test persons over a period of 10 h for their efficacy at preventing bites. The tests were conducted in Belo Horizonte, Brazil on field populations of the yellow fever mosquito Aedes aegypti. The concentration of the active substances ranged from 10% to 20%. All the tested samples provided lasting protection (time to first bite) over several hours: ranging from 5 h 20 min to 6 h 50 min with a mean of approximately 6 h. The longest protection until the second bite (=first confirmation bite) was approximately 7 h 40 min, whereas the shortest protection was 6 h 50 min. The longest protection until the third bite (=second confirmation bite) was 8 h 35 min, whereas the shortest protection was 7 h 40 min. In the control tests in which none of the samples were applied, the mean times until the first, second and third bites were 26, 46 and 59 min, respectively. The basis for this field study was provided by two American guidelines, which have the greatest international acceptance. The first is a draft guideline from the Environmental Protection Agency (EPA (United States Environmental Protection Agency), Product performance test guidelines. OPPTS 810.3700. Insect repellents for human skin and outdoor premises. Public Draft, 1999) and the second is a standard from the American Society for Testing and Materials (ASTM (American Society for Testing and Materials International), E 939-94 (reapproved 2,000): standard test method of field testing topical applications of compounds as repellents for medically important and pest arthropods (including insects, ticks, and mites): I. Mosquitoes, 2,000). Both guidelines recommend measuring the duration of protection until the first and second bites and also

  20. Supplementation with a proprietary blend of ancient peat and apple extract may improve body composition without affecting hematology in resistance-trained men.

    Science.gov (United States)

    Joy, Jordan M; Falcone, Paul H; Vogel, Roxanne M; Mosman, Matt M; Kim, Michael P; Moon, Jordan R

    2015-11-01

    Adenosine-5'-triphosphate (ATP) is primarily known as a cellular source of energy. Increased ATP levels may have the potential to enhance body composition. A novel, proprietary blend of ancient peat and apple extracts has been reported to increase ATP levels, potentially by enhancing mitochondrial ATP production. Therefore, the purpose of this investigation was to determine the supplement's effects on body composition when consumed during 12 weeks of resistance training. Twenty-five healthy, resistance-trained, male subjects (age, 27.7 ± 4.8 years; height, 176.0 ± 6.5 cm; body mass, 83.2 ± 12.1 kg) completed this study. Subjects supplemented once daily with either 1 serving (150 mg) of a proprietary blend of ancient peat and apple extracts (TRT) or placebo (PLA). Supervised resistance training consisted of 8 weeks of daily undulating periodized training followed by a 2-week overreach and a 2-week taper phase. Body composition was assessed using dual-energy X-ray absorptiometry and ultrasound at weeks 0, 4, 8, 10, and 12. Vital signs and blood markers were assessed at weeks 0, 8, and 12. Significant group × time (p < 0.05) interactions were present for ultrasound-determined cross-sectional area, which increased in TRT (+0.91 cm(2)) versus PLA (-0.08 cm(2)), as well as muscle thickness (TRT: +0.46; PLA: +0.04 cm). A significant group × time (p < 0.05) interaction existed for creatinine (TRT: +0.06; PLA: +0.15 mg/dL), triglycerides (TRT: +24.1; PLA: -20.2 mg/dL), and very-low-density lipoprotein (TRT: +4.9; PLA: -3.9 mg/dL), which remained within clinical ranges. Supplementation with a proprietary blend of ancient peat and apple extracts may enhance resistance training-induced skeletal muscle hypertrophy without affecting fat mass or blood chemistry in healthy males.

  1. The Business Information Services: Old-Line Online Moves to the Web.

    Science.gov (United States)

    O'Leary, Mick

    1997-01-01

    Although the availability of free information on the World Wide Web has placed traditional, fee-based proprietary online services on the defensive, most major online business services are now on the Web. Highlights several business information providers: Profound, NewsNet and ProQuest Direct, Dow Jones and Wall Street Journal Interactive Edition,…

  2. 76 FR 44354 - Agency Information Collection Activities: Comment Request for National Spatial Data...

    Science.gov (United States)

    2011-07-25

    ..., organizations, and people necessary to promote cost-effective production, and the ready availability and greater... leverage of geospatial resources. We will protect information considered proprietary under the Freedom of...: Notice of an extension of a currently approved information collection. Affected Public: Private Sector...

  3. 48 CFR 1552.235-70 - Screening business information for claims of confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Screening business... Texts of Provisions and Clauses 1552.235-70 Screening business information for claims of confidentiality... proprietary or confidential by the business that has the right to the information. The following clause...

  4. A safeguards case study of the Nuclear Materials and equipment corporation uranium processing plant Apollo, Pennsylvania. Appendix B with proprietary information removed. Staff technical report

    International Nuclear Information System (INIS)

    Altman, W.; Hockert, J.; Quinn, E.

    1980-04-01

    The report characterizes the Atomic Energy Commission safeguards requirements and the safeguards systems and procedures in place at the Nuclear Materials and Equipment (NUMEC) uranium processing plant in Apollo, Pennsylvania during the spring of 1964. Based upon this characterization, a list of safeguards weaknesses which would be considered deficiencies under 1979 requirements is developed. Appendixes A and B to the report provide a detailed characterization of AEC safeguards requirements as well as a side by side comparison of NUMEC's safeguards program in 1964 with the safeguards program currently required of a comparable licensed facility

  5. MASH TEST NO. 3-10 OF A NON-PROPRIETARY, HIGH-TENSION CABLE MEDIAN BARRIER FOR USE IN 6H:1V V-DITCH (TEST NO. MWP-8)

    Science.gov (United States)

    2017-05-10

    The Midwest States Pooled Fund Program has been developing a prototype design for a non-proprietary, high-tension cable median barrier for use in a 6H:1V V-ditch. This system incorporates four evenly spaced cables, Midwest Weak Posts (MWP) spaced at ...

  6. Proprietary arabinogalactan extract increases antibody response to the pneumonia vaccine: a randomized, double-blind, placebo-controlled, pilot study in healthy volunteers

    Directory of Open Access Journals (Sweden)

    Udani Jay K

    2010-08-01

    Full Text Available Abstract Background Arabinogalactan from Larch tree (Larix spp. bark has previously demonstrated immunostimulatory activity. The purpose of this study was to test the hypothesis that ingestion of a proprietary arabinogalactan extract, ResistAid™, would selectively enhance the antibody response to the pneumococcal (pneumonia vaccine in healthy adults. Methods This randomized, double-blind, placebo-controlled, parallel group pilot study included 45 healthy adults who had not previously been vaccinated against Streptococcus pneumoniae. The volunteers began taking the study product or placebo (daily dosage 4.5 g at the screening visit (V1-Day 0 and continued over the entire 72 day study period. After 30 days the subjects received the 23-valent pneumococcal vaccine (V2. They were monitored the following day (V3-Day 31, as well as 21 days (V4-Day 51 and 42 days (V5-Day 72 after vaccination. Responses by the adaptive immune system (antigen specific were measured via pneumococcal IgG antibodies (subtypes 4, 6B, 9V, 14, 18C, 19F, and 23F and salivary IgA levels. Responses by the innate immune system (non-specific were measured via white blood cell counts, inflammatory cytokines and the complement system. Results Vaccination significantly increased pneumococcal IgG levels as expected. The arabinogalactan group demonstrated a statistically significant greater IgG antibody response than the placebo group in two antibodies subtypes (18C and 23F at both Day 51 (p = 0.006 and p = 0.002 and at Day 72 (p = 0.008 and p = 0.041. These same subtypes (18C and 23F also demonstrated change scores from baseline which were significant, in favor of the arabinogalactan group, at Day 51 (p = 0.033 and 0.001 and at Day 72 (p = 0.012 and p = 0.003. Change scores from baseline and mean values were greater in the arabinogalactan group than placebo for most time points in antibody subtypes 4, 6B, 9V, and 19F, but these differences did not reach statistical significance. There

  7. Proprietary arabinogalactan extract increases antibody response to the pneumonia vaccine: a randomized, double-blind, placebo-controlled, pilot study in healthy volunteers.

    Science.gov (United States)

    Udani, Jay K; Singh, Betsy B; Barrett, Marilyn L; Singh, Vijay J

    2010-08-26

    Arabinogalactan from Larch tree (Larix spp.) bark has previously demonstrated immunostimulatory activity. The purpose of this study was to test the hypothesis that ingestion of a proprietary arabinogalactan extract, ResistAid™, would selectively enhance the antibody response to the pneumococcal (pneumonia) vaccine in healthy adults. This randomized, double-blind, placebo-controlled, parallel group pilot study included 45 healthy adults who had not previously been vaccinated against Streptococcus pneumoniae. The volunteers began taking the study product or placebo (daily dosage 4.5 g) at the screening visit (V1-Day 0) and continued over the entire 72 day study period. After 30 days the subjects received the 23-valent pneumococcal vaccine (V2). They were monitored the following day (V3-Day 31), as well as 21 days (V4-Day 51) and 42 days (V5-Day 72) after vaccination. Responses by the adaptive immune system (antigen specific) were measured via pneumococcal IgG antibodies (subtypes 4, 6B, 9V, 14, 18C, 19F, and 23F) and salivary IgA levels. Responses by the innate immune system (non-specific) were measured via white blood cell counts, inflammatory cytokines and the complement system. Vaccination significantly increased pneumococcal IgG levels as expected. The arabinogalactan group demonstrated a statistically significant greater IgG antibody response than the placebo group in two antibodies subtypes (18C and 23F) at both Day 51 (p = 0.006 and p = 0.002) and at Day 72 (p = 0.008 and p = 0.041). These same subtypes (18C and 23F) also demonstrated change scores from baseline which were significant, in favor of the arabinogalactan group, at Day 51 (p = 0.033 and 0.001) and at Day 72 (p = 0.012 and p = 0.003). Change scores from baseline and mean values were greater in the arabinogalactan group than placebo for most time points in antibody subtypes 4, 6B, 9V, and 19F, but these differences did not reach statistical significance. There was no effect from the vaccine or

  8. Point-and-Click Pedagogy: Is It Effective for Teaching Information Technology?

    Science.gov (United States)

    Angolia, Mark G.; Pagliari, Leslie R.

    2016-01-01

    This paper assesses the effectiveness of the adoption of curriculum content developed and supported by a global academic university-industry alliance sponsored by one of the world's largest information technology software providers. Academic alliances promote practical and future-oriented education while providing access to proprietary software…

  9. 76 FR 71998 - Agency Information Collection Activities: Submitted for Office of Management and Budget (OMB...

    Science.gov (United States)

    2011-11-21

    ..., organizations, and people necessary to promote cost-effective production, and the ready availability and greater... considered proprietary under the Freedom of Information Act (5 U.S.C. 552) and its implementing regulations... projects only. Frequency of Collection: Annually. Affected Public: Private Sector; State, Local, and Tribal...

  10. Graphene oxide adsorbent based dispersive solid phase extraction coupled with multi-pretreatment clean-up for analysis of trace aflatoxins in traditional proprietary Chinese medicines.

    Science.gov (United States)

    Ran, Congcong; Chen, Dan; Ma, Haiyan; Jiang, Ye

    2017-02-15

    Graphene oxide (GO)-based dispersive solid phase extraction (D-SPE) method combined with multi-step preparation has been proposed for the evaluation of trace aflatoxins in proprietary Chinese medicines (PCM). After being extracted by methanol, the sample was purified based on multi-step preparation, including dehydration with MgSO 4 /NaCl and cleanup with neutral alumina. Then GO was used as an adsorbent in D-SPE method for further preconcentration of aflatoxins prior to high performance liquid chromatography-fluorescence detection. The selected conditions were investigated. The Box-Behnken design (BBD) was used to optimize factors affecting adsorption procedure. Under the optimized conditions, good linear relationships had been achieved with the correlation coefficient (R 2 ) varying from 0.9904 to 0.9990. The LODs and LOQs were ranging from 0.020 to 0.041ng/mL and 0.061 to 0.125ng/mL, respectively. The results of the recoveries were 74.0-102.7% for the four aflatoxins, while the precisions from 1.8% to 7.2% were obtained, which indicated that the method was suitable for the analysis of aflatoxins in PCM. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Systematic Review and Meta-Analysis of a Proprietary Alpha-Amylase Inhibitor from White Bean (Phaseolus vulgaris L.) on Weight and Fat Loss in Humans.

    Science.gov (United States)

    Udani, Jay; Tan, Ollie; Molina, Jhanna

    2018-04-20

    The aim of this meta-analysis was to examine the evidence for the effectiveness of a proprietary alpha-amylase inhibitor from white bean ( Phaseolus vulgaris L.) supplementation interventions in humans on modification of body weight and fat mass. A systematic literature search was performed using three databases: PubMed, the Cochrane collaboration, and Google Scholar. In addition, the manufacturer was contacted for internal unpublished data, and finally, the reference section of relevant original research and review papers were mined for additional studies. Eleven studies were selected for the meta-analysis of weight loss (a total of 573 subjects), and three studies for the meta-analysis of body fat reduction (a total of 110 subjects), as they fulfilled the inclusion criteria. Phaseolus vulgaris supplementation showed an average effect on weight loss difference of −1.08 kg (95% CI (confidence interval), −0.42 kg to −1.16 kg, p < 0.00001), and the average effect on body fat reduction was 3.26 kg (95% CI, −2.35 kg to −4.163 kg, p = 0.02). This meta-analysis found statistically significant effects of Phaseolus vulgaris supplementation on body weight and body fat.

  12. Systematic Review and Meta-Analysis of a Proprietary Alpha-Amylase Inhibitor from White Bean (Phaseolus vulgaris L. on Weight and Fat Loss in Humans

    Directory of Open Access Journals (Sweden)

    Jay Udani

    2018-04-01

    Full Text Available The aim of this meta-analysis was to examine the evidence for the effectiveness of a proprietary alpha-amylase inhibitor from white bean (Phaseolus vulgaris L. supplementation interventions in humans on modification of body weight and fat mass. A systematic literature search was performed using three databases: PubMed, the Cochrane collaboration, and Google Scholar. In addition, the manufacturer was contacted for internal unpublished data, and finally, the reference section of relevant original research and review papers were mined for additional studies. Eleven studies were selected for the meta-analysis of weight loss (a total of 573 subjects, and three studies for the meta-analysis of body fat reduction (a total of 110 subjects, as they fulfilled the inclusion criteria. Phaseolus vulgaris supplementation showed an average effect on weight loss difference of −1.08 kg (95% CI (confidence interval, −0.42 kg to −1.16 kg, p < 0.00001, and the average effect on body fat reduction was 3.26 kg (95% CI, −2.35 kg to −4.163 kg, p = 0.02. This meta-analysis found statistically significant effects of Phaseolus vulgaris supplementation on body weight and body fat.

  13. Proprietary hospitals in cost containment.

    Science.gov (United States)

    Jones, D A

    1985-08-23

    Any effort to control the rise in health care costs must start with analyzing the causes, which are really quite simple. Most cost control efforts fail because they do not address the causes. The causes are large subsidies in several forms that send a false message that health care is free and should be used abundantly, and expansive reimbursement programs that reward inefficient providers with higher payments. This combination of demand stimulation and cost-plus reimbursement produced the world's most expensive health care delivery system and strident calls for reform. A long overdue change in public policy took effect October 1, 1983, when Medicare payments moved from cost-plus reimbursement to fixed, prospectively determined prices. Because it addressed one of the causes of medical inflation, this change has been effective in slowing the rise in Medicare expenditures. Sponsorship of a hospital is not a determinant of its cost-effectiveness. There are examples of efficient and inefficient hospitals in both the voluntary and the investor-owned or taxpaying hospitals. The determining factor is the will of management to keep costs under control.

  14. Chemical and radiation stability of a proprietary cesium ion exchange material manufactured from WWL membrane and SuperLig reg-sign 644

    International Nuclear Information System (INIS)

    Brown, G.N.; Carson, K.J.; DesChane, J.R.; Elovich, R.J.; Berry, P.K.

    1996-09-01

    Pretreatment of nuclear process wastes for ion exchange removal of Cs and other radionuclides is one way to minimize amount of high-level radioactive waste at Hanford. This study evaluated Cs-selective SuperLig reg-sign 644 (IBC Advanced Technologies, American Fork UT) entrapped in a proprietary WWL web membrane (3M) for chemical/radiation stability in simulated caustic neutralized current acid waste (NCAW), 0.5M HNO 3 , water, and air. After exposure up to 2.0E+09 rad, the material was evaluated for Cs uptake in 5M sodium NCAW simulants with varying Cs contents. Radiolytic stability appears to be sufficient for ion exchange pretreatment of radioactive Cs: essentially no decrease in Cs selectivity or loading (Kd) was observed during 60 Cs gamma irradiation in water or 0.5M HNO 3 up to 1.0E+09 rad. Cs Kd decreased by a factor of 2 after 2.0E+09 rad exposure. Cs Kd did not change during irradiation in 5M NCAW or ambient air up to 1.0E+08 rad, but decreased by more than an order of magnitude between 1.0E+08 and 2.0E+09 rad (not typical of process conditions). Chemical stability under caustic conditions is lower than in air or under neutral/acidic conditions. Results indicate that this material is less stable in caustic solution irrespective of radiation exposure. Samples of the membrane retained their physical form throughout the entire experiment and were only slightly brittle after exposure to 2.0E+09 rad. (The material evaluated was a finely ground (400 mesh) particulate engineered to form a polymeric fiber (WWL), not the macroscopic form of SuperLig reg-sign 644 resin (20 to 50 mesh).)

  15. A proprietary alpha-amylase inhibitor from white bean (Phaseolus vulgaris): a review of clinical studies on weight loss and glycemic control.

    Science.gov (United States)

    Barrett, Marilyn L; Udani, Jay K

    2011-03-17

    Obesity, and resultant health hazards which include diabetes, cardiovascular disease and metabolic syndrome, are worldwide medical problems. Control of diet and exercise are cornerstones of the management of excess weight. Foods with a low glycemic index may reduce the risk of diabetes and heart disease as well as their complications. As an alternative to a low glycemic index diet, there is a growing body of research into products that slow the absorption of carbohydrates through the inhibition of enzymes responsible for their digestion. These products include alpha-amylase and glucosidase inhibitors. The common white bean (Phaseolus vulgaris) produces an alpha-amylase inhibitor, which has been characterized and tested in numerous clinical studies. A specific and proprietary product named Phase 2® Carb Controller (Pharmachem Laboratories, Kearny, NJ) has demonstrated the ability to cause weight loss with doses of 500 to 3000 mg per day, in either a single dose or in divided doses. Clinical studies also show that Phase 2 has the ability to reduce the post-prandial spike in blood glucose levels. Experiments conducted incorporating Phase 2 into food and beverage products have found that it can be integrated into various products without losing activity or altering the appearance, texture or taste of the food. There have been no serious side effects reported following consumption of Phase 2. Gastro-intestinal side effects are rare and diminish upon extended use of the product. In summary, Phase 2 has the potential to induce weight loss and reduce spikes in blood sugar caused by carbohydrates through its alpha-amylase inhibiting activity.

  16. A proprietary alpha-amylase inhibitor from white bean (Phaseolus vulgaris: A review of clinical studies on weight loss and glycemic control

    Directory of Open Access Journals (Sweden)

    Barrett Marilyn L

    2011-03-01

    Full Text Available Abstract Obesity, and resultant health hazards which include diabetes, cardiovascular disease and metabolic syndrome, are worldwide medical problems. Control of diet and exercise are cornerstones of the management of excess weight. Foods with a low glycemic index may reduce the risk of diabetes and heart disease as well as their complications. As an alternative to a low glycemic index diet, there is a growing body of research into products that slow the absorption of carbohydrates through the inhibition of enzymes responsible for their digestion. These products include alpha-amylase and glucosidase inhibitors. The common white bean (Phaseolus vulgaris produces an alpha-amylase inhibitor, which has been characterized and tested in numerous clinical studies. A specific and proprietary product named Phase 2® Carb Controller (Pharmachem Laboratories, Kearny, NJ has demonstrated the ability to cause weight loss with doses of 500 to 3000 mg per day, in either a single dose or in divided doses. Clinical studies also show that Phase 2 has the ability to reduce the post-prandial spike in blood glucose levels. Experiments conducted incorporating Phase 2 into food and beverage products have found that it can be integrated into various products without losing activity or altering the appearance, texture or taste of the food. There have been no serious side effects reported following consumption of Phase 2. Gastro-intestinal side effects are rare and diminish upon extended use of the product. In summary, Phase 2 has the potential to induce weight loss and reduce spikes in blood sugar caused by carbohydrates through its alpha-amylase inhibiting activity.

  17. The efficacy and safety of a proprietary onion-pumpkin extract (OPtain120 on blood pressure: an open-label study

    Directory of Open Access Journals (Sweden)

    Orie Yoshinari

    2015-06-01

    Full Text Available Background: Nutraceuticals and functional foods are increasingly being used to help manage hypertension. Treatment with either pumpkin or onion can significantly lower systolic and diastolic blood pressure in animal studies. Traditionally, pumpkin has been used to support healthy blood pressure, glucose tolerance and lipid levels. Onion contains high levels of flavonoids, including quercetin, which decreases blood pressure and promotes restoration of healthy endothelial function. However, human trials on these food sources are limited, and the combined effects of pumpkin and onion have not been examined yet. Objective: We performed an open-label clinical study to evaluate the effects of a proprietary onion-pumpkin extract (OPtain120 on systolic and diastolic blood pressure. Methods: Healthy adults with systolic blood pressure (SBP and diastolic blood pressure (DBP in the elevated range of 140-159 and 80-90 mmHg, respectively, were enrolled in this study. Subjects consumed one capsule of onion-pumpkin extract twice daily for 12 weeks. Daily Home Blood Pressure Measurement (HBPM was taken upon waking and before bed. Office Blood Pressure Measurement (OBPM was taken in-clinic at Week 0, 6, and 12. Results: 52 subjects were screened and 12 were enrolled in the study, with a total of 10 subjects completing the study. Systolic HBPM taken before bed demonstrated a statistically significant reduction from baseline (147.23 mmHg to Week 12 (138.14 mmHg, representing a reduction of 9.09 mmHg (6.17%, p=0.021. Diastolic HBPM taken before bed demonstrated a decrease of 4.06 mmHg (4.46%, p=0.085, a significant reduction from baseline (91.07 mmHg at Week 12 (87.02 mmHg. Non-statistically significant reductions were seen in the early morning Systolic (3.14% and Diastolic (2.57% HBPM and in the Systolic (1.36% OBPM. Conclusion: OPtain120 was safely consumed over a 12-week period. OPtain120 appears to be effective in lowering Systolic Blood Pressure at bedtime in

  18. Data mining : open systems drill through layers of legacy data to manage the flow of information

    International Nuclear Information System (INIS)

    Polczer, S.

    1999-01-01

    Information management challenges facing the petroleum and natural gas industry are discussed in conjunction with the increasing difficulty of accessing information because of the sheer volume of it, plus the fact that most data systems are proprietary 'closed' systems. In this context, reference is made to a newly developed software system named PetroDesk, developed by Merak Petroleum. PetroDesk is a geographical information browser used for integration and analysis of public, proprietary and personal data under a common interface. The software can be used to plot land position, chart productivity of wells, and produce graphs of decline rates, reserves and production. The software, which was originally designed for engineering data, also has been found useful in determining costs, revenue projections and other information needed to obtain a real-time net present worth of a company, and also in identifying business opportunities. 2 figs

  19. An exploratory study of relative and incremental information content of two non-financial performance measures: Field study evidence on absence frequency and on-time delivery

    NARCIS (Netherlands)

    Wiersma, E.

    2008-01-01

    In this exploratory field study, I test the relative and incremental information content of two non-financial performance measures compared to financial performance measures for future financial performance. The proprietary database used is from the contracts of the managers of 27 responsibility

  20. Harvesting Information from Heterogeneous Sources

    DEFF Research Database (Denmark)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    The abundance of information regarding any topic makes the Internet a very good resource. Even though searching the Internet is very easy, what remains difficult is to automate the process of information extraction from the available online information due to the lack of structure and the diversi...... with performance of our tool with respect to each format. Finally, the different potential applications of the proposed tool are discussed with special emphasis on open source intelligence....... in the sharing methods. Most of the times, information is stored in different proprietary formats, complying with different standards and protocols which makes tasks like data mining and information harvesting very difficult. In this paper, an information harvesting tool (heteroHarvest) is presented...... with objectives to address these problems by filtering the useful information and then normalizing the information in a singular non hypertext format. We also discuss state of the art tools along with the shortcomings and present the results of an analysis carried out over different heterogeneous formats along...

  1. Effects of a Proprietary Freeze-Dried Water Extract of Eurycoma longifolia (Physta) and Polygonum minus on Sexual Performance and Well-Being in Men: A Randomized, Double-Blind, Placebo-Controlled Study.

    Science.gov (United States)

    Udani, Jay K; George, Annie A; Musthapa, Mufiza; Pakdaman, Michael N; Abas, Azreena

    2014-01-01

    Background. Physta is a proprietary product containing a freeze-dried water extract of Eurycoma longifolia (tongkat ali), which is traditionally used as an energy enhancer and aphrodisiac. We aim to evaluate a 300 mg combination of Physta and Polygonum minus, an antioxidant, with regard to sexual performance and well-being in men. Methods. Men that aged 40-65 years were screened for this 12-week randomized, double-blind, placebo-controlled, parallel-group study. Outcome measures included validated questionnaires that aimed to evaluate erectile function, satisfaction with intervention, sexual intercourse performance, erectile hardness, mood, and overall quality of life. Results. 12 subjects in the active group and 14 in the placebo group completed the study. Significant improvements were noted in scores for the Sexual Intercourse Attempt diary, Erection Hardness Scale, Sexual Health Inventory of Men, and Aging Male Symptom scale (P < 0.05 for all). Three adverse events were reported in the active group and four in the placebo group, none of which were attributed to study product. Laboratory evaluations, including liver and kidney function testing, showed no clinically significant abnormality. Conclusion. Supplementation for twelve weeks with Polygonum minus and the proprietary Eurycoma longifolia extract, Physta, was well tolerated and more effective than placebo in enhancing sexual performance in healthy volunteers.

  2. Effects of a Proprietary Freeze-Dried Water Extract of Eurycoma longifolia (Physta and Polygonum minus on Sexual Performance and Well-Being in Men: A Randomized, Double-Blind, Placebo-Controlled Study

    Directory of Open Access Journals (Sweden)

    Jay K. Udani

    2014-01-01

    Full Text Available Background. Physta is a proprietary product containing a freeze-dried water extract of Eurycoma longifolia (tongkat ali, which is traditionally used as an energy enhancer and aphrodisiac. We aim to evaluate a 300 mg combination of Physta and Polygonum minus, an antioxidant, with regard to sexual performance and well-being in men. Methods. Men that aged 40–65 years were screened for this 12-week randomized, double-blind, placebo-controlled, parallel-group study. Outcome measures included validated questionnaires that aimed to evaluate erectile function, satisfaction with intervention, sexual intercourse performance, erectile hardness, mood, and overall quality of life. Results. 12 subjects in the active group and 14 in the placebo group completed the study. Significant improvements were noted in scores for the Sexual Intercourse Attempt diary, Erection Hardness Scale, Sexual Health Inventory of Men, and Aging Male Symptom scale (P<0.05 for all. Three adverse events were reported in the active group and four in the placebo group, none of which were attributed to study product. Laboratory evaluations, including liver and kidney function testing, showed no clinically significant abnormality. Conclusion. Supplementation for twelve weeks with Polygonum minus and the proprietary Eurycoma longifolia extract, Physta, was well tolerated and more effective than placebo in enhancing sexual performance in healthy volunteers.

  3. Helping the Hacker? Library Information, Security, and Social Engineering

    Directory of Open Access Journals (Sweden)

    Samuel T. C. Thompson

    2006-12-01

    Full Text Available Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.

  4. Open-Source web-based geographical information system for health exposure assessment

    Directory of Open Access Journals (Sweden)

    Evans Barry

    2012-01-01

    Full Text Available Abstract This paper presents the design and development of an open source web-based Geographical Information System allowing users to visualise, customise and interact with spatial data within their web browser. The developed application shows that by using solely Open Source software it was possible to develop a customisable web based GIS application that provides functions necessary to convey health and environmental data to experts and non-experts alike without the requirement of proprietary software.

  5. Open-Source web-based geographical information system for health exposure assessment

    DEFF Research Database (Denmark)

    Evans, Barry; Sabel, Clive E

    2012-01-01

    This paper presents the design and development of an open source web-based Geographical Information System allowing users to visualise, customise and interact with spatial data within their web browser. The developed application shows that by using solely Open Source software it was possible to d...... to develop a customisable web based GIS application that provides functions necessary to convey health and environmental data to experts and non-experts alike without the requirement of proprietary software....

  6. Adoption of Free Open Source Geographic Information System Solution for Health Sector in Zanzibar Tanzania

    OpenAIRE

    BAKAR, Abubakar D.; KIMARO, Honest C.; SULTAN, Abu Bakar MD; HAMIAR, S.

    2014-01-01

    The study aims at developing in-depth understanding on how Open Source Geographic Information System technology is used to provide solutions for data visualization in the health sector of Zanzibar, Tanzania. The study focuses on implementing the health visualization solutions for the purpose of bridging the gap during the transition period from proprietary software to the Free Open-Source Software using Key Indicator Data System. The developed tool facilitates data integration between the two...

  7. heteroHarvest: Harvesting Information from Heterogeneous Sources

    DEFF Research Database (Denmark)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    The abundance of information regarding any topic makes the Internet a very good resource. Even though searching the Internet is very easy, what remains difficult is to automate the process of information extraction from the available online information due to the lack of structure and the diversity...... in the sharing methods. Most of the times, information is stored in different proprietary formats, complying with different standards and protocols which makes tasks like data mining and information harvesting very difficult. In this paper, an information harvesting tool (heteroHarvest) is presented...... with objectives to address these problems by filtering the useful information and then normalizing the information in a singular non hypertext format. Finally we describe the results of experimental evaluation. The results are found promising with an overall error rate equal to 6.5% across heterogeneous formats....

  8. Cosmetic applications of glucitol-core containing gallotannins from a proprietary phenolic-enriched red maple (Acer rubrum) leaves extract: inhibition of melanogenesis via down-regulation of tyrosinase and melanogenic gene expression in B16F10 melanoma cells.

    Science.gov (United States)

    Ma, Hang; Xu, Jialin; DaSilva, Nicholas A; Wang, Ling; Wei, Zhengxi; Guo, Liangran; Johnson, Shelby L; Lu, Wei; Xu, Jun; Gu, Qiong; Seeram, Navindra P

    2017-05-01

    The red maple (Acer rubrum) is a rich source of phenolic compounds which possess galloyl groups attached to different positions of a 1,5-anhydro-D-glucitol core. While these glucitol-core containing gallotannins (GCGs) have reported anti-oxidant and anti-glycative effects, they have not yet been evaluated for their cosmetic applications. Herein, the anti-tyrosinase and anti-melanogenic effects of a proprietary phenolic-enriched red maple leaves extract [Maplifa ™ ; contains ca. 45% ginnalin A (GA) along with other GCGs] were investigated using enzyme and cellular assays. The GCGs showed anti-tyrosinase activity with IC 50 values ranging from 101.4 to 1047.3 μM and their mechanism of tyrosinase inhibition (using GA as a representative GCG) was evaluated by chelating and computational/modeling studies. GA reduced melanin content in murine melanoma B16F10 cells by 79.1 and 56.7% (at non-toxic concentrations of 25 and 50 μM, respectively), and its mechanisms of anti-melanogenic effects were evaluated by using methods including fluorescent probe (DCF-DA), real-time PCR, and western blot experiments. These data indicated that GA was able to: (1) reduce the levels of reactive oxygen species, (2) down-regulate the expression of MITF, TYR, TRP-1, and TRP-2 gene levels in a time-dependent manner, and (3) significantly reduce protein expression of the TRP-2 gene. Therefore, the anti-melanogenic effects of red maple GCGs warrant further investigation of this proprietary natural product extract for potential cosmetic applications.

  9. Inform@ed space

    DEFF Research Database (Denmark)

    Bjerrum, Peter; Olsen, Kasper Nefer

    2001-01-01

    Inform@ed space Sensorial Perception And Computer Enchancement - bidrag til Nordisk Arkitekturforskningsforenings IT-konference, AAA april 2001.......Inform@ed space Sensorial Perception And Computer Enchancement - bidrag til Nordisk Arkitekturforskningsforenings IT-konference, AAA april 2001....

  10. National coal resource assessment non-proprietary data: Location, stratigraphy, and coal quality for selected tertiary coal in the Northern Rocky Mountains and Great Plains region

    Science.gov (United States)

    Flores, Romeo M.; Ochs, A.M.; Stricker, G.D.; Ellis, M.S.; Roberts, S.B.; Keighin, C.W.; Murphy, E.C.; Cavaroc, V.V.; Johnson, R.C.; Wilde, E.M.

    1999-01-01

    One of the objectives of the National Coal Resource Assessment in the Northern Rocky Mountains and Great Plains region was to compile stratigraphic and coal quality-trace-element data on selected and potentially minable coal beds and zones of the Fort Union Formation (Paleocene) and equivalent formations. In order to implement this objective, drill-hole information was compiled from hard-copy and digital files of the: (1) U.S. Bureau of Land Management (BLM) offices in Casper, Rawlins, and Rock Springs, Wyoming, and in Billings, Montana, (2) State geological surveys of Montana, North Dakota, and Wyoming, (3) Wyoming Department of Environmental Quality in Cheyenne, (4) U.S. Office of Surface Mining in Denver, Colorado, (5) U.S. Geological Survey, National Coal Resource Data System (NCRDS) in Reston, Virginia, (6) U.S. Geological Survey coal publications, (7) university theses, and (8) mining companies.

  11. Enterprise Information Management with Plone Portals

    Directory of Open Access Journals (Sweden)

    Marcello Peixoto Bax

    2009-05-01

    Full Text Available The article shows that it is possible to implement a corporate portal using open source software, in an integrated manner with the proprietary MS Windows environment. As it is the real scenario in the vast majority of businesses and organizations today, a portal that meets these specific requirements is highly representative, mainly because MS Windows integration in the client environment (not in the server is not trivial for an open source portal. The paper shows that, by deploying a portal in this context the company considerably moves forward regarding information management. To show this, the article focuses on the key positive aspects arising from the deployment of a intranet / extranet portal in that context, i.e., MS Windows integration; editing with MS Office or other similar applications; shared editing control (with check-in and check-out; universal web access; and the use of metadata and workflow.

  12. Meal replacements and fibre supplement as a strategy for weight loss. Proprietary PGX® meal replacement and PGX® fibre supplement in addition to a calorie-restricted diet to achieve weight loss in a clinical setting.

    Science.gov (United States)

    Reichert, Ronald G; Reimer, Raylene A; Kacinik, Veronica; Pal, Sebely; Gahler, Roland J; Wood, Simon

    2013-01-01

    Meal replacements and viscous soluble fibre represent safe and sustainable aids for weight loss. Our purpose was to determine if PGX® meal replacements and PGX(®) fibre complex in combination with a calorie-restricted diet would aid in weight loss in a clinical setting. Fifty-two overweight and obese participants (49 women, 3 men; average age 47.1 years) with a mean body mass index (BMI) of 33.8 ± 6.4 kg/m(2) consumed 57 g of proprietary PGX® meal replacement product at breakfast and another 57 g at lunch for 12 weeks. In addition to the meal replacements, they were also asked to consume 5 g/day of PGX® fibre in the form of granules, powder or capsules together with 250 mlwater. A registered dietician recommended low-fat, low-glycaemic-index foods for snacks and the dinner menus such that each volunteer was consuming a total of 1200 kcal/day. All participants (n = 52) lost a significant amount of weight from baseline (-4.69 ± 3.73 kg), which was further reflected in the reductions in their waist (-7.11 ± 6.35 cm) and hip circumference (-5.59 ± 3.58 cm) over the 12-week study (p meal replacements and PGX(®) fibre along with a controlled dietary caloric intake is of benefit for short-term weight loss.

  13. Role of a proprietary propolis-based product on the wait-and-see approach in acute otitis media and in preventing evolution to tracheitis, bronchitis, or rhinosinusitis from nonstreptococcal pharyngitis

    Directory of Open Access Journals (Sweden)

    Di Pierro F

    2016-11-01

    Full Text Available Francesco Di Pierro,1 Alberto Zanvit,2 Maria Colombo3 1Scientific Department, Velleja Research, 2Biological Dentistry Department, Italian Stomatology Institute, 3ATS, District 5, Milan, Italy Abstract: Antipyretics and/or anti-inflammatory drugs along with a wait-and-see approach are the only treatments recommended in early acute otitis media (AOM or viral pharyngitis. Propolis has been widely investigated for its antibacterial, antiviral, and anti-inflammatory properties and could perhaps be administered as an add-on therapy during watchful waiting in AOM or for better control of symptoms in nonstreptococcal pharyngitis. However, propolis has well-known problems of poor solubility and low oral bioavailability. We therefore analyzed a proprietary propolis-based product (Propolisina® developed to overcome these limitations, in a retrospective, open-label, controlled study of Streptococcus pyogenes-negative children with a diagnosis of AOM or pharyngitis. Our results show that the use of propolis supplement for 72 hours lessens the severity of AOM and viral pharyngitis, reduces the use of antipyretics and anti-inflammatory drugs, and decreases the rate of evolution to tracheitis, bronchitis, and rhinosinusitis. Our study shows that propolis could be used as a safe add-on therapy in case of AOM and/or viral pharyngitis. Keywords: pediatric infections, cogrinding, bioavailability, propolis

  14. Molecular Recognition of Human Papilloma Virus (HPV Using Proprietary PCR Method Based on L1 Gene and the Evaluation of its Frequency in Tissue Samples from Patients with Cervical Cancer

    Directory of Open Access Journals (Sweden)

    Roohollah Dorostkar

    2015-06-01

    Full Text Available Abstract Background: In 1970, human papillomavirus (HPV was introduced as the main etiologic factor of cervical carcinoma. Since there is no possibility of detecting the virus and its subtypes using serological methods and cell culture, the molecular methods such as PCR have particular importance in accurate, early and definite diagnosis of the virus. So, in this research, our goal is to use a proprietary PCR assay based on L1 gene of human papillomavirus for molecular recognition of HPV and to evaluate its prevalence in patient samples. Materials and Methods: In this experimental study, after collecting of samples from malignant cervical lesions, the viral DNA was extracted from paraffin blocks of 50 clinical samples and PCR was done by specific primers for L1 gene of human papillomavirus in all samples. After the analysis of PCR products by 2% agarose gel electrophoresis, sensitivity and specificity of the test were also evaluated. Results: Among 50 patient samples, 33 cases were confirmed to be positive for HPV infection and 17 cases were negative, showing high frequency of HPV in this patient population (about 66%. The results of specificity assay were positive for papilloma samples and sensitivity of the assay was 20 copies of recombinant construct containing L1 per reaction. Conclusion: This study showed that PCR by specific primers for L1 gene of human papilloma virus is a proper and accurate method for detection of this virus and the results confirm the previous reports of correlation between HPV and cervical carcinoma.

  15. 7 CFR 983.27 - Proprietary capacity.

    Science.gov (United States)

    2010-01-01

    ... the interest in that capacity as an individual, a shareholder, member of a cooperative, partner... or interest of a producer or handler that, either directly or through one or more intermediaries, is...

  16. Spreading characteristics of proprietary rectal steroid preparations

    International Nuclear Information System (INIS)

    Hay, D.J.

    1982-01-01

    Three types of rectal steroid preparation were labelled with Technetium 99 or Indium 111, and the extent of spread of each within the bowel was followed, immediately after administration and at 2hrs, using a gamma camera. Patients with ulcerative colitis were compared with controls. Results indicate that 'Colifoam' enema and 'Predsol' suppository act mainly in the rectum, but 'Predsol retention' enema spreads further into the colon, making it more useful for patients with extensive ulcerative colitis. (U.K.)

  17. The Proprietary Foundations of Corporate Law

    OpenAIRE

    John Armour; Michael J Whincop

    2005-01-01

    Recent work in both the theory of the firm and of corporate law has called into question the appropriateness of analysing corporate law as ‘merely’ a set of standard form contracts. This article develops these ideas by focusing on property law’s role in underpinning corporate enterprise. Rights to control assets are a significant mechanism of governance in the firm. Practical circumstances dictate that such rights must be shared. Property law protects the rights of co-owners against each othe...

  18. Information and Informality

    DEFF Research Database (Denmark)

    Larsson, Magnus; Segerstéen, Solveig; Svensson, Cathrin

    2011-01-01

    leaders on the basis of their possession of reliable knowledge in technical as well as organizational domains. The informal leaders engaged in interpretation and brokering of information and knowledge, as well as in mediating strategic values and priorities on both formal and informal arenas. Informal...... leaders were thus seen to function on the level of the organization as a whole, and in cooperation with formal leaders. Drawing on existing theory of leadership in creative and professional contexts, this cooperation can be specified to concern task structuring. The informal leaders in our study...... contributed to task structuring through sensemaking activities, while formal leaders focused on aspects such as clarifying output expectations, providing feedback, project structure, and diversity....

  19. 75 FR 53664 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2010-09-01

    ... Review). Filing Information As a courtesy, we are making information related to Sunset Review proceedings... submission of proprietary information and eligibility to receive access to business proprietary information...

  20. 75 FR 5042 - Initiation of Five-year (“Sunset”) Review

    Science.gov (United States)

    2010-02-01

    ...-0182 Filing Information As a courtesy, we are making information related to Sunset proceedings... submission of proprietary information and eligibility to receive access to business proprietary information...

  1. Information Space, Information Field, Information Environment

    Directory of Open Access Journals (Sweden)

    Victor Ya. Tsvetkov

    2014-08-01

    Full Text Available The article analyzes information space, information field and information environment; shows that information space can be natural and artificial; information field is substantive and processual object and articulates the space property; information environment is concerned with some object and acts as the surrounding in relation to it and is considered with regard to it. It enables to define information environment as a subset of information space. It defines its passive description. Information environment can also be defined as a subset of information field. It corresponds to its active description.

  2. DESIGN INFORMATION VERIFICATION FOR NUCLEAR SAFEGUARDS

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Bean; Richard R. M. Metcalf; Phillip C. Durst

    2009-07-01

    A critical aspect of international safeguards activities performed by the International Atomic Energy Agency (IAEA) is the verification that facility design and construction (including upgrades and modifications) do not create opportunities for nuclear proliferation. These Design Information Verification activities require that IAEA inspectors compare current and past information about the facility to verify the operator’s declaration of proper use. The actual practice of DIV presents challenges to the inspectors due to the large amount of data generated, concerns about sensitive or proprietary data, the overall complexity of the facility, and the effort required to extract just the safeguards relevant information. Planned and anticipated facilities will (especially in the case of reprocessing plants) be ever larger and increasingly complex, thus exacerbating the challenges. This paper reports the results of a workshop held at the Idaho National Laboratory in March 2009, which considered technologies and methods to address these challenges. The use of 3D Laser Range Finding, Outdoor Visualization System, Gamma-LIDAR, and virtual facility modeling, as well as methods to handle the facility data issues (quantity, sensitivity, and accessibility and portability for the inspector) were presented. The workshop attendees drew conclusions about the use of these techniques with respect to successfully employing them in an operating environment, using a Fuel Conditioning Facility walk-through as a baseline for discussion.

  3. Modernizing Corporate MIS: from Information System Modelling to Implementation

    CERN Document Server

    Dheur, E; Martens, R; Petrilli, A; Smale, B

    1992-01-01

    This paper presents CERN's Advanced Informatics Support (AIS) project which aims at an innovative modernization of all aspects of informatics applied to the administrative processes of the Laboratory. The project began in August 1990 and is based on a proprietary operating system, relational data base system and scalable multi-processor server hardware. An analysis of the existing applications environment and its weaknesses is given in the introduction. The objectives of the project are then described. A justification of the strategic choices is given in the CERN context. The Information System Study, leading to a global data and function model for the Laboratory and the detailed area analysis of the top priority three areas are then described. An analysis is made of the benefits and disadvantages of the use of Oracle CASE in such a study and the compromises required when commercial applications packages were chosen.

  4. Information management

    Science.gov (United States)

    Ricks, Wendell; Corker, Kevin

    1990-01-01

    Primary Flight Display (PFD) information management and cockpit display of information management research is presented in viewgraph form. The information management problem in the cockpit, information management burdens, the key characteristics of an information manager, the interface management system handling the flow of information and the dialogs between the system and the pilot, and overall system architecture are covered.

  5. A Consumer Health Information System to Assist Patients Select Quality Home Health Services

    Directory of Open Access Journals (Sweden)

    Dimitrios Zikos

    2017-11-01

    Full Text Available Patients evaluate the quality of home health agencies (HHAs using the Health Consumer Assessment of Healthcare Providers and Systems (HCAHPS survey. This paper describes a prototype community health information system to help patients select appropriate and quality HHAs, according to the location, proprietary status, type of service, and year of HHA establishment. Five HCAHPS indicators were selected: “summary rating”, “quality of care”, “professional care”, “communication”, and “recommend agency”. Independent t-test analysis showed that agencies offering Speech Pathology, Medical-Social, or Home Health Aide services, receive significantly worse HCAHPS ratings, while mean ratings vary significantly across different US states. Multiple comparisons with post hoc ANOVA revealed differences between and within HHAs of different proprietary status (p < 0.001: governmental HHAs receiving higher ratings than private HHAs. Finally, there was observed a relationship between all five quality rating variables and the HHA year of establishment (Pearson, p < 0.001. The older the agency is, the better the HCAPS summary ratings. Findings provided the knowledge to design of a consumer health information system, to provide rankings filtered according to user criteria, comparing the quality rankings of eligible HHAs. Users can also see how a specific agency is ranked against eligible HHAs. Ultimately, the system aims to support the patient community with contextually realistic comparisons in an effort to choose optimal HH service.

  6. MoZis: mobile zoo information system: a case study for the city of Osnabrueck

    Science.gov (United States)

    Michel, Ulrich

    2007-10-01

    This paper describes a new project of the Institute for Geoinformatics and Remote Sensing, funded by the German Federal Foundation for the Environment (DBU, Deutsche Bundesstiftung Umwelt www.dbu.de). The goal of this project is to develop a mobile zoo information system for Pocket PCs and Smart phones. Visitors of the zoo will be able to use their own mobile devices or use Pocket PCs, which could be borrowed from the zoo to navigate around the zoo's facilities. The system will also provide additional multimedia based information such as audio-based material, animal video clips, and maps of their natural habitat. People could have access to the project at the zoo via wireless local area network or by downloading the necessary files using a home internet connection. Our software environment consists of proprietary and non-proprietary software solutions in order to make it as flexible as possible. Our first prototype was developed with Visual Studio 2003 and Visual Basic.Net.

  7. Information Crisis

    CERN Document Server

    Losavio, Michael

    2012-01-01

    Information Crisis discusses the scope and types of information available online and teaches readers how to critically assess it and analyze potentially dangerous information, especially when teachers, editors, or other information gatekeepers are not available to assess the information for them. Chapters and topics include:. The Internet as an information tool. Critical analysis. Legal issues, traps, and tricks. Protecting personal safety and identity. Types of online information.

  8. Control of information as an element of nuclear safeguards

    International Nuclear Information System (INIS)

    Green, J.N.

    1982-03-01

    Control of information as an element of physical protection has a long history in the field of national security. The nuclear industry is familiar with the constraints on proprietary information; and, with an effective date of October 1, 1980 for Parts 25 and 95 in Title 10 of the code of Federal Regulations, certain activities had to cope with rules for safeguarding of classified information. In applying the rules it is important to understand the differences between national security information and restricted data, and how guidance is promulgated both by the Nuclear Regulatory Commission (NRC) and by the Department of Energy. More recently, with a fully effective date of January 20, 1982, the NRC published rules for the protection of unclassified safeguards information. The scope is much broader than for the classified information. For example, the rules are applicable to power reactors. In this paper the directives which provide the details for compliance with all these rules are identified, and their application is discussed. NRC inspectors will be checking for compliance with the rules. Once problems of compliance are resolved, the more difficult question of evaluating the impact of information control procedures on the effectiveness of a physical protection system can be addressed

  9. 77 FR 53867 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2012-09-04

    ... a courtesy, we are making information related to Sunset proceedings, including copies of the... regulations on submission of proprietary information and eligibility to receive access to business proprietary...

  10. A randomized study of multimedia informational aids for research on medical practices: implications for informed consent

    Science.gov (United States)

    Kraft, Stephanie A; Constantine, Melissa; Magnus, David; Porter, Kathryn M.; Lee, Sandra Soo-Jin; Green, Michael; Kass, Nancy E; Wilfond, Benjamin S.; Cho, Mildred K

    2016-01-01

    Background/aims Participant understanding is a key element of informed consent for enrollment in research. However, participants often do not understand the nature, risks, benefits, or design of the studies in which they take part. Research on medical practices, which studies standard interventions rather than new treatments, has the potential to be especially confusing to participants because it is embedded within usual clinical care. Our objective in this randomized study was to compare the ability of a range of multimedia informational aids to improve participant understanding in the context of research on medical practices. Methods We administered a Web-based survey to members of a proprietary online panel sample selected to match national U.S. demographics. Respondents were randomized to one of five arms: four content-equivalent informational aids (animated videos, slideshows with voiceover, comics, and text), and one no-intervention control. We measured knowledge of research on medical practices using a summary knowledge score from 10 questions based on the content of the informational aids. We used ANOVA and paired t-tests to compare knowledge scores between arms. Results There were 1500 completed surveys (300 in each arm). Mean knowledge scores were highest for the slideshows with voiceover (65.7%), followed by the animated videos (62.7%), comics (60.7%), text (57.2%), and control (50.3%). Differences between arms were statistically significant except between the slideshows with voiceover and animated videos and between the animated videos and comics. Informational aids that included an audio component (animated videos and slideshows with voiceover) had higher knowledge scores than those without an audio component (64.2% versus 59.0%, peffectively than text alone. However, the relatively low knowledge scores suggest that targeted informational aids may be needed to teach some particularly challenging concepts. Nonetheless, our results demonstrate the

  11. Information Literacy in the Changing Landscape of Distance Learning: The Collaborative Design of a Flexible, Digital, Asynchronous Course

    Directory of Open Access Journals (Sweden)

    Betsy Reichart

    2015-11-01

    Full Text Available This paper offers a case study of the collaborative development of an information literacy course for students enrolled in an online, proprietary college. This credit-bearing course was created in accordance with ACRL’s Information Literacy Competency Standards for Higher Education as well as the newly adopted Framework for Information Literacy for Higher Education. The course treats information literacy as a meta-competency that encourages students to explore a variety of research tools, from social media to scholarly journals, and to develop critical thinking and research skills. In order to incorporate current best practices in information literacy pedagogy into the course itself, institutional factors needed to be addressed; these factors are reviewed here. This paper also explores implications for the future of the course, including assessment, the need to constantly adapt to the changing needs of students, and the ever-changing digital environment.

  12. Social information

    Directory of Open Access Journals (Sweden)

    Luiz Fernando de Barros Campos

    Full Text Available Based on Erving Goffman's work, the article aims to discuss a definition of information centered on the type conveyed by individuals in a multimodal way, encompassing language and body in situations of co-presence, where face-to-face interaction occurs, and influencing inter-subjective formation of the self. Six types of information are highlighted: material information, expressive information, ritualized information, meta-information, strategic information, and information displays. It is argued that the construction of this empirical object tends to dissolve the tension among material, cognitive and pragmatic aspects, constituting an example of the necessary integration among them. Some vulnerable characteristics of the theory are critically mentioned and it is suggested that the concept of information displays could provide a platform to approach the question of the interaction order in its relations with the institutional and social orders, and consequently, to reassess the scope of the notion of social information analyzed.

  13. Information Concepts

    CERN Document Server

    Marchionini, Gary

    2010-01-01

    Information is essential to all human activity, and information in electronic form both amplifies and augments human information interactions. This lecture surveys some of the different classical meanings of information, focuses on the ways that electronic technologies are affecting how we think about these senses of information, and introduces an emerging sense of information that has implications for how we work, play, and interact with others. The evolutions of computers and electronic networks and people's uses and adaptations of these tools manifesting a dynamic space called cyberspace. O

  14. Information Myopia

    Directory of Open Access Journals (Sweden)

    Nadi Helena Presser

    2016-04-01

    Full Text Available This article reflects on the ways of appropriation in organizations. The notion of Information Myopia is characterized by the lack of knowledge about the available informational capabilities in organizations, revealing a narrow view of the information environment. This analysis has focused on the process for renewing the software licenses contracts of a large multinational group, in order to manage its organizational assets in information technology. The collected, explained and justified information allowed to elaborate an action proposal, which enabled the creation of new organizational knowledge. In its theoretical dimension, the value of information was materialized by its use, in a collective process of organizational learning.

  15. Information cultures

    DEFF Research Database (Denmark)

    Skouvig, Laura

    2017-01-01

    The purpose of this article is to suggest a genealogy of the concept of information beyond the 20th century. The article discusses how the concept of information culture might provide a way of formulating such a genealogic strategy. The article approaches this purpose by providing a general...... narrative of premodern information cultures, examining works on early-modern scholars and 18th century savants and discussion of what seems to be a Foucauldian rupture in the conceptualization of information in 19th century England. The findings of the article are situated in the thinking that a genealogy...... of information would reveal that information had specific purposes in specific settings....

  16. INFORMATION MANAGERx

    African Journals Online (AJOL)

    USER

    Use of Online Information Sources in Federal University Medical Libraries in North West Geo-Political Zone of Nigeria. By ... on the quality of information services provided to clients. .... North West Zone need to identify the importance of.

  17. Informational Urbanism

    Directory of Open Access Journals (Sweden)

    Wolfgang G. Stock

    2015-10-01

    Full Text Available Contemporary and future cities are often labeled as "smart cities," "ubiquitous cities," "knowledge cities" and "creative cities." Informational urbanism includes all aspects of information and knowledge with regard to urban regions. "Informational city" is an umbrella term uniting the divergent trends of information-related city research. Informational urbanism is an interdisciplinary endeavor incorporating on the one side computer science and information science and on the other side urbanism, architecture, (city economics, and (city sociology. In our research project on informational cities, we visited more than 40 metropolises and smaller towns all over the world. In this paper, we sketch the theoretical background on a journey from Max Weber to the Internet of Things, introduce our research methods, and describe main results on characteristics of informational cities as prototypical cities of the emerging knowledge society.

  18. Copyright Information

    Science.gov (United States)

    ... Here: Home → Copyright Information URL of this page: https://medlineplus.gov/copyright.html Copyright Information To use ... the Magazine and NIH MedlinePlus Salud The FAQs ( https://medlineplus.gov/faq/faq.html ) The same content ...

  19. Information Literacy

    African Journals Online (AJOL)

    ian

    The paper also discusses some challenges faced in the teaching ... groups, language and cultural barriers and time and lack of computers. The paper ... administrative staff, researchers and librarians work with information. ...... The role of Information and Communication Technologies in Harnessing Information for women in.

  20. Informal Taxation.

    Science.gov (United States)

    Olken, Benjamin A; Singhal, Monica

    2011-10-01

    Informal payments are a frequently overlooked source of local public finance in developing countries. We use microdata from ten countries to establish stylized facts on the magnitude, form, and distributional implications of this "informal taxation." Informal taxation is widespread, particularly in rural areas, with substantial in-kind labor payments. The wealthy pay more, but pay less in percentage terms, and informal taxes are more regressive than formal taxes. Failing to include informal taxation underestimates household tax burdens and revenue decentralization in developing countries. We discuss various explanations for and implications of these observed stylized facts.

  1. Informal Taxation*

    Science.gov (United States)

    Olken, Benjamin A.; Singhal, Monica

    2011-01-01

    Informal payments are a frequently overlooked source of local public finance in developing countries. We use microdata from ten countries to establish stylized facts on the magnitude, form, and distributional implications of this “informal taxation.” Informal taxation is widespread, particularly in rural areas, with substantial in-kind labor payments. The wealthy pay more, but pay less in percentage terms, and informal taxes are more regressive than formal taxes. Failing to include informal taxation underestimates household tax burdens and revenue decentralization in developing countries. We discuss various explanations for and implications of these observed stylized facts. PMID:22199993

  2. Inter-Firm Information Sharing in Enterprise Resource Planning Systems: a call for timely but limited access to customer information

    Directory of Open Access Journals (Sweden)

    Michael Busing

    2001-11-01

    Full Text Available Current trends in Enterprise Resource Planning (ERP suggest that supply chain management and tight control over scheduling jobs within the supply chain are key tactical planning issues. Modern ERP software packages, in conjunction with the World Wide Web, allow for automated exchange of information within a company and also between two or more companies (i.e., conveyance of customer information to suppliers of parts and components for the purposes of effective planning and control. While ease of information exchange between a customer and supplier is increasingly critical to the success of modern-day planning and control efforts, the issue of information security is also a very real concern. Suppliers can benefit from gaining access to a customer's dispatch list and material requirements plan (MRP in order to determine real-time priority of jobs in queue at various work centers within their own organization. Other customer information, however, should remain secure and unavailable to supplier firms for competitive reasons such as threat of forward integration. This paper presents a previously tested priority-sequencing rule that explicitly considers downstream shop conditions in determining which job to run next The rule proves to perform well on mean flow time and lateness as well as on variability of these measures. The rule is extended here to incorporate the case where a downstream work center is outside official corporate boundaries. With the call for free exchange of information comes the threat of other, perhaps proprietary, information being accessed by vendors or others outside the official corporate boundaries. The paper will propose information that should be freely exchanged between customers and suppliers and information that should remain secure. Finally, practical measures to manage access to web-enabled ERP information will be proposed.

  3. Information Trust

    OpenAIRE

    Atele-Williams , Tosan; Marsh , Stephen

    2017-01-01

    Part 7: IFIPTM 2017 Graduate Symposium; International audience; Information has been an essential element in the development of collaborative and cooperative models, from decision making to the attainmentof varying goals, people are adept at making judgment on the trustworthiness of information, based on knowledge and understanding of a normative model of information. Contemporary narrative especially in high-impact contexts like politics, health, business, government and technology, is erodi...

  4. Effect of a multimedia-assisted informed consent procedure on the information gain, satisfaction, and anxiety of cataract surgery patients.

    Science.gov (United States)

    Tipotsch-Maca, Saskia M; Varsits, Ralph M; Ginzel, Christian; Vecsei-Marlovits, Pia V

    2016-01-01

    To assess whether a multimedia-assisted preoperative informed consent procedure has an effect on patients' knowledge concerning cataract surgery, satisfaction with the informed consent process, and reduction in anxiety levels. Hietzing Hospital, Vienna, Austria. Prospective randomized controlled clinical trial. Patients participated in an informed consent procedure for age-related cataract surgery that included the standard approach only (reading the information brochure and having a standardized face-to-face discussion) or supplemented with a computer-animated video. The main outcome was information retention assessed by a questionnaire. Further outcome measures used were the State-Trait Anxiety Inventory, the Visual Function-14 score, and an assessment of satisfaction. The study included 123 patients (64 in standard-only group; 59 in computer-animated video group). Both groups scored well on the questionnaire; however, patients who watched the video performed better (82% retention versus 72%) (P = .002). Scores tended to decrease with increasing age (r = -0.25, P = .005); however, this decrease was smaller in the group that watched the video. Both groups had elevated anxiety levels (means in video group: anxiety concerning the current situation [S-anxiety] = 63.8 ± 9.6 [SD], general tendency toward anxiety [T-anxiety] = 65.5 ± 7.9; means in control group: S-anxiety = 61.9 ± 10.3, T-anxiety = 66.2 ± 7.8). A high level of information retention was achieved using an informed consent procedure consisting of an information brochure and a standardized face-to-face discussion. A further increase in information retention was achieved, even with increasing patient age, by adding a multimedia presentation. No author has a financial or proprietary interest in any material or method mentioned. Copyright © 2016 ASCRS and ESCRS. Published by Elsevier Inc. All rights reserved.

  5. Information circulars

    International Nuclear Information System (INIS)

    1997-02-01

    The document summarizes the Information Circulars published by the IAEA for the purpose of bringing matters of general interest to the attention of all Member States. This revision contains INFCIRCs published up to February 1997, grouped by field of activity. A complete list of information circulars in numerical order is given in an annex

  6. Information circulars

    International Nuclear Information System (INIS)

    2002-05-01

    Information circulars are published from time to time under the symbol INFCIRC/... for the purpose of bringing matters of general interest to the attention of all Members of the Agency. The present revision contains INFCIRCs published up to the end of April 2002. A complete numerical list of information circulars is reproduced with their titles in the Annex

  7. Information circulars

    International Nuclear Information System (INIS)

    1999-06-01

    The document summarizes the Information Circulars published by the IAEA for the purpose of bringing matters of general interest to the attention of all Member States. This revision contains INFCIRCs published up to the end of May 1999, grouped by field of activity. A complete list of information circulars in numerical order is given in an annex

  8. Information circulars

    International Nuclear Information System (INIS)

    1994-08-01

    Information circulars are published from time to time under the symbol INFCIRC/... for the purpose of bringing matters of general interest to the attention of all Members of the Agency. The present revision contains INFCIRCs published up to mid-August 1994. A complete numerical list of information circulars is reproduced with their titles in the Annex

  9. Information circulars

    International Nuclear Information System (INIS)

    1992-08-01

    The document summarizes the Information Circulars published by the IAEA for the purpose of bringing matters of general interest to the attention of all Members of the Agency. This revision contains INFCIRCs published up to mid-August 1992. A complete numerical lift of Information Circulars with their titles is reproduced in an Annex

  10. INFORMATION MANAGERx

    African Journals Online (AJOL)

    USER

    This study investigated the effectiveness and impact of library instruction (GST 111 – the use of ... information literacy of the students for lifelong .... competency of freshman business students of a ... strategies, information sources, proper use of library ..... P. Remark. Library skill. Secondary school attended. 47.5846. 01.3600.

  11. Implementation of an Anesthesia Information Management System (AIMS).

    Science.gov (United States)

    Douglas, James R; Ritter, Melody J

    2011-01-01

    During the administration of anesthesia, the anesthesia provider has historically created a paper record, charted manually, that included extensive patient care-related data (vital signs, other parameters, etc) and commentaries. DocuSys, a proprietary anesthesia information management system (AIMS), creates an electronic version of the anesthesia record and provides additional information. It electronically captures data from clinical monitors and other sources, including scheduling applications and laboratory computers. The AIMS facilitates chart entries such as drug doses and case narratives. Benefits of an AIMS include improved legibility of the anesthesia record and greater efficiency in documentation efforts. Use of the AIMS assists the practitioner with decision support logic, such as the timing of antibiotic administration and the inclusion of legally required documentation. Upon case completion, the AIMS data are immediately available to other information systems, such as billing and medical records. Data can be made available from a single case or, more important, from thousands of cases to analyze variables such as efficiency of services, adherence to best practices, patient outcomes, and clinical research. The AIMS was deployed at the main campus of the Ochsner Health System on March 26, 2009. In this article, we discuss the issues involved in the AIMS implementation process: the successes, surprises, and continued challenges.

  12. Information on the Advanced Plant Experiment (APEX) Test Facility

    International Nuclear Information System (INIS)

    Smith, Curtis Lee

    2015-01-01

    The purpose of this report provides information related to the design of the Oregon State University Advanced Plant Experiment (APEX) test facility. Information provided in this report have been pulled from the following information sources: Reference 1: R. Nourgaliev and et.al, 'Summary Report on NGSAC (Next-Generation Safety Analysis Code) Development and Testing,' Idaho National Laboratory, 2011. Note that this is report has not been released as an external report. Reference 2: O. Stevens, Characterization of the Advanced Plant Experiment (APEX) Passive Residual Heat Removal System Heat Exchanger, Master Thesis, June 1996. Reference 3: J. Reyes, Jr., Q. Wu, and J. King, Jr., Scaling Assessment for the Design of the OSU APEX-1000 Test Facility, OSU-APEX-03001 (Rev. 0), May 2003. Reference 4: J. Reyes et al, Final Report of the NRC AP600 Research Conducted at Oregon State University, NUREG/CR-6641, July 1999. Reference 5: K. Welter et al, APEX-1000 Confirmatory Testing to Support AP1000 Design Certification (non-proprietary), NUREG-1826, August 2005.

  13. Intellectual property and information controversy(I)

    Science.gov (United States)

    Aoyama, Hirokazu

    This paper deals with intellectual property as the results of various intellectual activities such as R & D, and intellectual proprietary rights which protect it. New technology, designs, literary works, computer programs, semiconductor chips, new plant breeding, brands, trading secrets, CI and others, and legislations which protect them are described. Then, the background of the fact that intellectual proprietary rights are emphasized as analyzed. The author points out items as follows; movement toward much larger size of R & D, generation of the areas to be newly protected, trend in enforcement of intellectual property protection, commercialization of intellectual property, trend in software evolution, movement in technological protectionism, and the present status on each item.

  14. Spacetime information

    International Nuclear Information System (INIS)

    Hartle, J.B.

    1995-01-01

    In usual quantum theory, the information available about a quantum system is defined in terms of the density matrix describing it on a spacelike surface. This definition must be generalized for extensions of quantum theory which neither require, nor always permit, a notion of state on a spacelike surface. In particular, it must be generalized for the generalized quantum theories appropriate when spacetime geometry fluctuates quantum mechanically or when geometry is fixed but not foliable by spacelike surfaces. This paper introduces a four-dimensional notion of the information available about a quantum system's boundary conditions in the various sets of decohering, coarse-grained histories it may display. This spacetime notion of information coincides with the familiar one when quantum theory is formulable in terms of states on spacelike surfaces but generalizes this notion when it cannot be so formulated. The idea of spacetime information is applied in several contexts: When spacetime geometry is fixed the information available through alternatives restricted to a fixed spacetime region is defined. The information available through histories of alternatives of general operators is compared to that obtained from the more limited coarse grainings of sum-over-histories quantum mechanics that refer only to coordinates. The definition of information is considered in generalized quantum theories. We consider as specific examples time-neutral quantum mechanics with initial and final conditions, quantum theories with nonunitary evolution, and the generalized quantum frameworks appropriate for quantum spacetime. In such theories complete information about a quantum system is not necessarily available on any spacelike surface but must be searched for throughout spacetime. The information loss commonly associated with the ''evolution of pure states into mixed states'' in black hole evaporation is thus not in conflict with the principles of generalized quantum mechanics

  15. Exchanging information

    International Nuclear Information System (INIS)

    1971-01-01

    The Agency has a statutory mandate to foster 'the exchange of scientific and technical information on the peaceful uses of atomic energy'. The prime responsibility for this work within the Agency lies with the Division of Scientific and Technical Information, a part of the Department of Technical Operations. The Division accomplishes its task by holding conferences and symposia (Scientific Conferences Section), through the Agency Library, by publishing scientific journals, and through the International Nuclear Information System (INIS). The Computer Section of the Division, which offers services to the Agency as a whole, provides resources for the automation of data storage and retrieval. (author)

  16. Information evaluation

    CERN Document Server

    Capet, Philippe

    2014-01-01

    During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, we bestow upon this piece of information, spontaneously or after reflection, a certain amount of confidence. Too much confidence shows a degree of naivety, whereas an absolute lack of it condemns us as being paranoid. These two attitudes are symmetrically detrimental, not only to the proper perception of this information but also to its use. Beyond these two extremes, each person generally adopts an intermediate position when faced with the recep

  17. How Informed Are Informal Educators?

    Science.gov (United States)

    Lederman, Norman G.; Niess, Margaret L.

    1998-01-01

    Explores current reforms in both mathematics and science education that emphasize the importance of learning in informal settings. Suggests that informal education must include planned and purposeful attempts to facilitate students' understanding of mathematics and science in community settings other than the local school. (Author/CCM)

  18. Informed consent: information or knowledge?

    Science.gov (United States)

    Berger, Ken

    2003-01-01

    A fiduciary relationship should be nurtured between patient and physician. This requires effective communication throughout all aspects of care - especially pertaining to treatment decisions. In the context of illness as experienced by the patient a unique set of circumstances is presented. However, communication in an illness context is fraught with problems. The patient is vulnerable and the situation may be overwhelming. Voluminous amounts of information are available to patients from a host of health care providers, family members, support groups, advocacy centers, books, journals, and the internet. Often conflicting and confusion, frequently complex, this information may be of greater burden than benefit. Some information is of high validity and reliability while other information is of dubious reliability. The emotional freight of bad news may further inhibit understanding. An overload of information may pose an obstacle in decision-making. To facilitate the transformation of information into knowledge, the health care provider must act on some occasions as a filter, on other occasions as a conduit, and on still other occasions simply as a reservoir. The evolution of patient rights to receive or refuse treatment, the right to know or not to know calls for a change in processing of overwhelming information in our modem era. In this paper we will discuss the difference between information and knowledge. How can health care providers ensure they have given their patients all necessary and sufficient information to make an autonomous decision? How can they facilitate the transformation of information into knowledge? The effect of knowledge to consent allows a more focused, relevant and modern approach to choice in health care.

  19. Information Managerx

    African Journals Online (AJOL)

    USER

    1996-10-01

    Oct 1, 1996 ... locate and access information from current awareness sources such as newspapers and radio. Legislators (35%) ... law-making and supervision for a viable democracy .... from a parliamentary library is a major concern for.

  20. Position Information

    Data.gov (United States)

    Social Security Administration — The Position Information Data Asset provides the ability to search for active SSA position descriptions using various search criteria. An individual may search by PD...

  1. INFORMATION MANAGERx

    African Journals Online (AJOL)

    USER

    information but also quickly access and retrieve large volume of ... created their management becomes a challenge for most institutions .... continuous upgrade of operating system, .... Tammro, A.M (2006) the Digital Library Users: Case.

  2. Supporting Information

    Data.gov (United States)

    U.S. Environmental Protection Agency — This is the supporting information for the journal article. This dataset is associated with the following publication: Rankin, K., S. Mabury, T. Jenkins, and J....

  3. Supplemental information

    Data.gov (United States)

    U.S. Environmental Protection Agency — Supplemental information showing results of inter-comparison between C-PORT, AERMOD and R-LINE dispersion algorithms. This dataset is associated with the following...

  4. Information Literacy

    African Journals Online (AJOL)

    ian

    Institutions are consequently introducing information literacy programmes in their curricula in a bid to ..... Brazil, Chile and Mexico (Lau 2007:31). Lau (2007) reported that these initiatives rarely involve IL inclusion in curricula and are scattered ...

  5. Information Managerx

    African Journals Online (AJOL)

    USER

    Communication technologies (ICTs) to Library Operations and Routines in Selected Nigerian Federal University ... should use Open-source library information management software and DSpace content management ..... Marketing of library.

  6. UBS INFORMATION

    CERN Document Server

    UBS

    2002-01-01

    As a supplement to the information published on 27.05.2002, we inform you that the works foreseen in the building 504 will begin July 1st. The alterations become necessary force us to suspend the contomat service for a duration of one month. From July 1st the services of counter will be offered in the building 500. We ask you to excuse us for this interruption and thank you for your understanding. Your UBS

  7. Information circulars

    International Nuclear Information System (INIS)

    1987-06-01

    The document summarizes the information circulars published by the IAEA for the purpose of bringing matters of general interest to the attention of all Members of the Agency. In the main body of the document only those documents which are regarded as likely to be of current interest are listed. A complete numerical list of information circulars with their titles is reproduced in the Annex

  8. Information engineering

    Energy Technology Data Exchange (ETDEWEB)

    Hunt, D.N.

    1997-02-01

    The Information Engineering thrust area develops information technology to support the programmatic needs of Lawrence Livermore National Laboratory`s Engineering Directorate. Progress in five programmatic areas are described in separate reports contained herein. These are entitled Three-dimensional Object Creation, Manipulation, and Transport, Zephyr:A Secure Internet-Based Process to Streamline Engineering Procurements, Subcarrier Multiplexing: Optical Network Demonstrations, Parallel Optical Interconnect Technology Demonstration, and Intelligent Automation Architecture.

  9. Quantum information

    International Nuclear Information System (INIS)

    Kilin, Sergei Ya

    1999-01-01

    A new research direction known as quantum information is a multidisciplinary subject which involves quantum mechanics, optics, information theory, programming, discrete mathematics, laser physics and spectroscopy, and depends heavily on contributions from such areas as quantum computing, quantum teleportation and quantum cryptography, decoherence studies, and single-molecule and impurity spectroscopy. Some new results achieved in this rapidly growing field are discussed. (reviews of topical problems)

  10. Quantum information

    Energy Technology Data Exchange (ETDEWEB)

    Kilin, Sergei Ya [B.I. Stepanov Institute of Physics, National Academy of Sciences of Belarus, Minsk (Belarus)

    1999-05-31

    A new research direction known as quantum information is a multidisciplinary subject which involves quantum mechanics, optics, information theory, programming, discrete mathematics, laser physics and spectroscopy, and depends heavily on contributions from such areas as quantum computing, quantum teleportation and quantum cryptography, decoherence studies, and single-molecule and impurity spectroscopy. Some new results achieved in this rapidly growing field are discussed. (reviews of topical problems)

  11. Information Literacy

    OpenAIRE

    Basili, Carla

    2015-01-01

    Information literacy is a concept which is well established in theory while in practice it is only slowly breaking ground in accordance with the understanding of its significance and the possibilities of its realisation. Based on fundamental works, the characteristics of information literacy, its cognitive foundations and significance for individuals as well as for society, are argumented in the article. The analyzed content of this concept is connected with the content of a librarian’s knowl...

  12. Information Presentation

    Science.gov (United States)

    Holden, K.L.; Boyer, J.L.; Sandor, A.; Thompson, S.G.; McCann, R.S.; Begault, D.R.; Adelstein, B.D.; Beutter, B.R.; Stone, L.S.

    2009-01-01

    The goal of the Information Presentation Directed Research Project (DRP) is to address design questions related to the presentation of information to the crew. The major areas of work, or subtasks, within this DRP are: 1) Displays, 2) Controls, 3) Electronic Procedures and Fault Management, and 4) Human Performance Modeling. This DRP is a collaborative effort between researchers at Johnson Space Center and Ames Research Center.

  13. Informal Innovation

    DEFF Research Database (Denmark)

    Hartmann, Mia Rosa Koss; Hartmann, Rasmus Koss

    Informal innovation, defined as the development and putting-into-use of novel solutions by non-R&D employees without prior formal approval from or subsequent revealing to superiors, has been recurrently observed in organizational research. But even as it is increasingly recognized that R&D is not......Informal innovation, defined as the development and putting-into-use of novel solutions by non-R&D employees without prior formal approval from or subsequent revealing to superiors, has been recurrently observed in organizational research. But even as it is increasingly recognized that R......&D is not the only plausible source of innovation inside organizations, informal innovation has yet to be systematically explored or theorized. We propose a theory of informal innovation based on analyses of prior literature and mixed-method, multi-site studies of innovation at the working level of two extreme......-case organizations. We propose that informal innovation occurs as 1) employees personally experience problems that they believe are not recognized or prioritized by superiors; 2) some employees are able to develop solutions, essentially at no cost; 3) innovators face no benefits from revealing to superiors, but can...

  14. When Information Improves Information Security

    Science.gov (United States)

    Grossklags, Jens; Johnson, Benjamin; Christin, Nicolas

    This paper presents a formal, quantitative evaluation of the impact of bounded-rational security decision-making subject to limited information and externalities. We investigate a mixed economy of an individual rational expert and several naïve near-sighted agents. We further model three canonical types of negative externalities (weakest-link, best shot and total effort), and study the impact of two information regimes on the threat level agents are facing.

  15. Information barriers

    International Nuclear Information System (INIS)

    Fuller, J.L.; Wolford, J.

    2001-01-01

    Full text: An information barrier (IB) consists of procedures and technology that prevent the release of sensitive information during a joint inspection of a sensitive nuclear item, and provides confidence that the measurement system into which it has been integrated functions exactly as designed and constructed. Work in the U.S. on radiation detection system information barriers dates back at least to 1990, even though the terminology is more recent. In January 1999 the Joint DoD-DOE Information Barrier Working Group was formed in the United States to help coordinate technical efforts related to information barrier R and D. This paper presents an overview of the efforts of this group, by its Chairs, as well as recommendations for further information barrier R and D. Progress on the demonstration of monitoring systems containing IBs is also provided. From the U.S. perspective, the basic, top-level functional requirements for the information barrier portion of an integrated radiation signature-information barrier inspection system are twofold: The host must be assured that his classified information is protected from disclosure to the inspecting party; and The inspecting party must be confident that the integrated inspection system measures, processes, and presents the radiation-signature-based measurement conclusion in an accurate and reproducible manner. It is the position of the United States that in the absence of any agreement to share classified nuclear weapons design information in the conduct of an inspection regime, the requirement to protect host country classified warhead design information is paramount and admits no tradeoff versus the confidence provided to the inspecting party in the accuracy and reproducibility of the measurements. The U.S. has reached an internal consensus on several critical design elements that define a general standard for radiation signature information barrier design. These criteria have stood the test of time under intense

  16. A randomized study of multimedia informational aids for research on medical practices: Implications for informed consent.

    Science.gov (United States)

    Kraft, Stephanie A; Constantine, Melissa; Magnus, David; Porter, Kathryn M; Lee, Sandra Soo-Jin; Green, Michael; Kass, Nancy E; Wilfond, Benjamin S; Cho, Mildred K

    2017-02-01

    Participant understanding is a key element of informed consent for enrollment in research. However, participants often do not understand the nature, risks, benefits, or design of the studies in which they take part. Research on medical practices, which studies standard interventions rather than new treatments, has the potential to be especially confusing to participants because it is embedded within usual clinical care. Our objective in this randomized study was to compare the ability of a range of multimedia informational aids to improve participant understanding in the context of research on medical practices. We administered a web-based survey to members of a proprietary online panel sample selected to match national US demographics. Respondents were randomized to one of five arms: four content-equivalent informational aids (animated videos, slideshows with voice-over, comics, and text) and one no-intervention control. We measured knowledge of research on medical practices using a summary knowledge score from 10 questions based on the content of the informational aids. We used analysis of variance and paired t-tests to compare knowledge scores between arms. There were 1500 completed surveys (300 in each arm). Mean knowledge scores were highest for the slideshows with voice-over (65.7%), followed by the animated videos (62.7%), comics (60.7%), text (57.2%), and control (50.3%). Differences between arms were statistically significant except between the slideshows with voice-over and animated videos and between the animated videos and comics. Informational aids that included an audio component (animated videos and slideshows with voice-over) had higher knowledge scores than those without an audio component (64.2% vs 59.0%, p informational aids with a character-driven story component (animated videos and comics) and those without. Our results show that simple multimedia aids that use a dual-channel approach, such as voice-over with visual reinforcement, can

  17. Information Service.

    Science.gov (United States)

    Scofield, James

    Newspaper librarians discussed the public use of their newspapers' libraries. Policies run the gamut from well-staffed public information services, within or outside the newspaper library, to no service at all to those outside the staff of the paper. Problems of dealing with tax and law enforcement agencies were covered, as well as cooperative…

  18. Informed policies

    International Development Research Centre (IDRC) Digital Library (Canada)

    INTERNATIONAL DEVELOPMENT RESEARCH CENTRE. Informed ... more evidence-based policy on social ... Community involvement is key to the success of CBMS in reducing poverty. IDRC ... nationwide network of “telecentres” that ... and holidays for young people to use for ... National Conference on Youth led to the.

  19. Informational precaution

    NARCIS (Netherlands)

    Pieters, Wolter; Mainzer, K.

    2010-01-01

    In environmental ethics, the precautionary principle states that parties should refrain from actions in the face of scientific uncertainties about serious or irreversible harm to public health or the environment. A similar principle is lacking when judging effects of information technology. Such a

  20. Information Parallax

    NARCIS (Netherlands)

    Grootjen, F.A.; Weide, Th.P. van der; Sugumaran, V.

    2007-01-01

    To effectively use and exchange information among AI systems, a formal specification of the representation of their domain of discourse - called an ontology - is indispensable. In this chapter we introduce a special kind of knowledge representation based on a dual view on the universe of discourse

  1. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  2. INFORMATION MANAGERx

    African Journals Online (AJOL)

    USER

    Four research questions were posed in order to assess the Mac Arthur ... The research adopted survey method using questionnaire as instrument for data ... serial resources in these university libraries were inadequate before the ... and societal development has made the demand for ..... Information Management in Nigeria.

  3. Information circulars

    International Nuclear Information System (INIS)

    1989-04-01

    The document summarizes the Information Circulars published by the IAEA under the symbol INFCIRC/ for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A complete list of INFCIRCs in numerical order with their titles is given in the Annex

  4. Information Circulars

    International Nuclear Information System (INIS)

    1966-01-01

    Information circulars are published from time to time under the symbol INFCIRC/. . . . for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A list of the circulars that were current or on the press on 15 May 1966 is given, followed by an index to their subject matter.

  5. Information Circulars

    International Nuclear Information System (INIS)

    1965-01-01

    Information circulars are published from time to time under the symbol INFCIRC/. for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A list of the circulars that were current on 31 December 1964 is given, followed by an index to their subject matter.

  6. Supplementary information

    Indian Academy of Sciences (India)

    Supplementary information. Flexible synthesis of isomeric pyranoindolones and evaluation of cytotoxicity towards HeLa cells. J C JEYAVEERANa, CHANDRASEKAR PRAVEEN*,b, Y ARUNc, A A M PRINCEa and P. T PERUMALc. aDepartment of Chemistry, Ramakrishna Mission Vivekananda College, Mylapore, Chennai.

  7. Information week...

    CERN Multimedia

    Staff Association

    2007-01-01

    Here we are at the end of a series of public information meetings held in the Departments. We thank all those who came to find out about the subjects presented and to exchange ideas and opinions. All the positive feedback we have received shows how much you appreciate these meetings. And well, so do we!

  8. Information Circulars

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1966-06-10

    Information circulars are published from time to time under the symbol INFCIRC/. . . . for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A list of the circulars that were current or on the press on 15 May 1966 is given, followed by an index to their subject matter.

  9. Information Circulars

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1965-01-18

    Information circulars are published from time to time under the symbol INFCIRC/. for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A list of the circulars that were current on 31 December 1964 is given, followed by an index to their subject matter.

  10. Information Ecology

    DEFF Research Database (Denmark)

    Christiansen, Ellen Tove

    2006-01-01

    in the 1960ties, and chosen here because it integrates cultural and psychological trajectories in a theory of living settings. The pedagogical-didactical paradigm comprises three distinct information ecologies, named after their intended outcome: the problem-setting, the exploration-setting, and the fit...

  11. Tank Information System (tis): a Case Study in Migrating Web Mapping Application from Flex to Dojo for Arcgis Server and then to Open Source

    Science.gov (United States)

    Pulsani, B. R.

    2017-11-01

    Tank Information System is a web application which provides comprehensive information about minor irrigation tanks of Telangana State. As part of the program, a web mapping application using Flex and ArcGIS server was developed to make the data available to the public. In course of time as Flex be-came outdated, a migration of the client interface to the latest JavaScript based technologies was carried out. Initially, the Flex based application was migrated to ArcGIS JavaScript API using Dojo Toolkit. Both the client applications used published services from ArcGIS server. To check the migration pattern from proprietary to open source, the JavaScript based ArcGIS application was later migrated to OpenLayers and Dojo Toolkit which used published service from GeoServer. The migration pattern noticed in the study especially emphasizes upon the use of Dojo Toolkit and PostgreSQL database for ArcGIS server so that migration to open source could be performed effortlessly. The current ap-plication provides a case in study which could assist organizations in migrating their proprietary based ArcGIS web applications to open source. Furthermore, the study reveals cost benefits of adopting open source against commercial software's.

  12. TANK INFORMATION SYSTEM (TIS: A CASE STUDY IN MIGRATING WEB MAPPING APPLICATION FROM FLEX TO DOJO FOR ARCGIS SERVER AND THEN TO OPEN SOURCE

    Directory of Open Access Journals (Sweden)

    B. R. Pulsani

    2017-11-01

    Full Text Available Tank Information System is a web application which provides comprehensive information about minor irrigation tanks of Telangana State. As part of the program, a web mapping application using Flex and ArcGIS server was developed to make the data available to the public. In course of time as Flex be-came outdated, a migration of the client interface to the latest JavaScript based technologies was carried out. Initially, the Flex based application was migrated to ArcGIS JavaScript API using Dojo Toolkit. Both the client applications used published services from ArcGIS server. To check the migration pattern from proprietary to open source, the JavaScript based ArcGIS application was later migrated to OpenLayers and Dojo Toolkit which used published service from GeoServer. The migration pattern noticed in the study especially emphasizes upon the use of Dojo Toolkit and PostgreSQL database for ArcGIS server so that migration to open source could be performed effortlessly. The current ap-plication provides a case in study which could assist organizations in migrating their proprietary based ArcGIS web applications to open source. Furthermore, the study reveals cost benefits of adopting open source against commercial software's.

  13. Integrating Information Literacy and Evidence-Based Medicine Content within a New School of Medicine Curriculum: Process and Outcome.

    Science.gov (United States)

    Muellenbach, Joanne M; Houk, Kathryn M; E Thimons, Dana; Rodriguez, Bredny

    2018-01-01

    This column describes a process for integrating information literacy (IL) and evidence-based medicine (EBM) content within a new school of medicine curriculum. The project was a collaborative effort among health sciences librarians, curriculum deans, directors, and faculty. The health sciences librarians became members of the curriculum committees, developed a successful proposal for IL and EBM content within the curriculum, and were invited to become course instructors for Analytics in Medicine. As course instructors, the librarians worked with the other faculty instructors to design and deliver active learning class sessions based on a flipped classroom approach using a proprietary Information Mastery curriculum. Results of this collaboration may add to the knowledge base of attitudes and skills needed to practice as full faculty partners in curricular design and instruction.

  14. Reflections on the role of open source in health information system interoperability.

    Science.gov (United States)

    Sfakianakis, S; Chronaki, C E; Chiarugi, F; Conforti, F; Katehakis, D G

    2007-01-01

    This paper reflects on the role of open source in health information system interoperability. Open source is a driving force in computer science research and the development of information systems. It facilitates the sharing of information and ideas, enables evolutionary development and open collaborative testing of code, and broadens the adoption of interoperability standards. In health care, information systems have been developed largely ad hoc following proprietary specifications and customized design. However, the wide deployment of integrated services such as Electronic Health Records (EHRs) over regional health information networks (RHINs) relies on interoperability of the underlying information systems and medical devices. This reflection is built on the experiences of the PICNIC project that developed shared software infrastructure components in open source for RHINs and the OpenECG network that offers open source components to lower the implementation cost of interoperability standards such as SCP-ECG, in electrocardiography. Open source components implementing standards and a community providing feedback from real-world use are key enablers of health care information system interoperability. Investing in open source is investing in interoperability and a vital aspect of a long term strategy towards comprehensive health services and clinical research.

  15. Information geometry

    CERN Document Server

    Ay, Nihat; Lê, Hông Vân; Schwachhöfer, Lorenz

    2017-01-01

    The book provides a comprehensive introduction and a novel mathematical foundation of the field of information geometry with complete proofs and detailed background material on measure theory, Riemannian geometry and Banach space theory. Parametrised measure models are defined as fundamental geometric objects, which can be both finite or infinite dimensional. Based on these models, canonical tensor fields are introduced and further studied, including the Fisher metric and the Amari-Chentsov tensor, and embeddings of statistical manifolds are investigated. This novel foundation then leads to application highlights, such as generalizations and extensions of the classical uniqueness result of Chentsov or the Cramér-Rao inequality. Additionally, several new application fields of information geometry are highlighted, for instance hierarchical and graphical models, complexity theory, population genetics, or Markov Chain Monte Carlo. The book will be of interest to mathematicians who are interested in geometry, inf...

  16. Informed consent

    International Nuclear Information System (INIS)

    Bundy, A.L.

    1988-01-01

    Numerous articles on informed consent have appeared in medical and legal journals over the past few years. Many of these have been in the radiological literature. This chapter presents an overview of the legal principles behind this controversial topic. Recent articles are reviewed and specific suggestions are made where applicable. The doctrine of informed consent is both a product of and the basis for the physician-patient relationship. Their communications to each other establish the relationship, but once established, heightened degrees of expectations on the patient's part have dictated the need for a more sophisticated level of communication. Since patients and physicians often expect different things of each other, it is imperative that the relationship leads to effective and respectful conversation

  17. Information Circulars

    International Nuclear Information System (INIS)

    1969-01-01

    Information circulars are published from time to time under the symbol INFCIRC/. . . . for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A list of the circulars which were of current interest on 15 January 1969 is given below, followed by an index to their subject matter. Other circulars can be traced by reference to earlier issues of the present document.

  18. Information Engineering.

    Science.gov (United States)

    1982-01-01

    34 continuously over time " through a division of labor and responsibility " integrated by INFORMATION-BASED decision process * in an environment of stress...responsibilities for learning in a particular field. This division of labor is especially true for staff members who must develop expertise in particular...likely founa a commano clima e with: - Multiple layering - Sub optimization Policy of no surprises - Lip service to feedback - Over centralization and non

  19. Information Circulars

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1969-01-24

    Information circulars are published from time to time under the symbol INFCIRC/. . . . for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A list of the circulars which were of current interest on 15 January 1969 is given below, followed by an index to their subject matter. Other circulars can be traced by reference to earlier issues of the present document.

  20. Medizinbibliotheken: Information

    Directory of Open Access Journals (Sweden)

    Bauer, Bruno

    2014-12-01

    Full Text Available [english] The focus of the current issue 3/2014 of GMS Medizin – Bibliothek – Information is the annual conference 2014 of the German Medical Libraries Association in Mannheim. The motto of the conference was “Medical libraries: Information”. The authors in this issue are Michaele Adam (Bibliometrics 2.0 – Altmetrics in Medicine, Bruno Bauer (Open access cooperation in Austria: Open Access Network Austria and Austria – recent developments since 2012, Fabian Gail & Ulrich Korwitz (Market and strategy – results of the ZB MED market study, Sabine Gehrlein (Library goes Anatomy: Anatomical teaching media at Heidelberg University Library, Kaja Scheliga (Opening science: New publication forms in science, Ulrike Ostrzinski (The four types of social media user in the academic and research community. Results of a nationwide study, Sandra Pfob & Alena Ittner (First aid for library use on PC: webinars increase library visits, reach everyone, save costs, Simone Waldboth (Integration of e-learning in the lecture “Information Literacy” at the Provincial College for Health-Care Professions Claudiana, Maike Piegler (The pick up box of the library of the Hamburg medical association – a way to bring scientific information to medical specialists and Christoph Wehrmüller & Heidrun Janka (Medical : Information – Annual meeting 2014 of the German MLA, September 22 to 24 in Mannheim.Furthermore this focus issue features articles from Bruno Bauer (: transformation strategies for subscription-based journaleport on the 8 Open Access Days at Cologne, September 8–9 2014, Eike Hentschel (German MLA News; Pioneer projects in medical libraries 2014: Introduction of the winners; Pioneer projects in medical libraries 2015 – Announcement and Franz J. Kühnen (Klaus Gerber 1934–2014.

  1. Information Technology

    Science.gov (United States)

    2003-01-01

    2003. http://cse.org/informed/issues_template.php/1250.htm [60] World Bank. E- Government , www1.worldbank.org/publicsector/ egov /definition.htm [61...Office of Management and Budget, E-Gov Related Legislation Overview. www.whitehouse.gov/omb/ egov /about_leg.htm [62] E- Government Act, December 17...s, the IT industry contributed 30% to U.S. GDP growth. Additionally, ev military service transformation relies heavily on IT. An IT advantage is

  2. Information services and information processing

    Science.gov (United States)

    1975-01-01

    Attempts made to design and extend space system capabilities are reported. Special attention was given to establishing user needs for information or services which might be provided by space systems. Data given do not attempt to detail scientific, technical, or economic bases for the needs expressed by the users.

  3. Teaching Information Skills: Recording Information.

    Science.gov (United States)

    Pappas, Marjorie L.

    2002-01-01

    Discusses how to teach students in primary and intermediate grades to record and organize information. Highlights include developing a research question; collaborative planning between teachers and library media specialists; consistency of data entry; and an example of a unit on animal migration based on an appropriate Web site. (LRW)

  4. Informal learning.

    Science.gov (United States)

    Callanan, Maureen; Cervantes, Christi; Loomis, Molly

    2011-11-01

    We consider research and theory relevant to the notion of informal learning. Beginning with historical and definitional issues, we argue that learning happens not just in schools or in school-aged children. Many theorists have contrasted informal learning with formal learning. Moving beyond this dichotomy, and away from a focus on where learning occurs, we discuss five dimensions of informal learning that are drawn from the literature: (1) non-didactive, (2) highly socially collaborative, (3) embedded in meaningful activity, (4) initiated by learner's interest or choice, and (5) removed from external assessment. We consider these dimensions in the context of four sample domains: learning a first language, learning about the mind and emotions within families and communities, learning about science in family conversations and museum settings, and workplace learning. Finally, we conclude by considering convergences and divergences across the different literatures and suggesting areas for future research. WIREs Cogni Sci 2011 2 646-655 DOI: 10.1002/wcs.143 For further resources related to this article, please visit the WIREs website. Copyright © 2011 John Wiley & Sons, Ltd.

  5. Information resources

    Science.gov (United States)

    Friend, Milton; Franson, J. Christian; Friend, Milton; Gibbs, Samantha E.J.; Wild, Margaret A.

    2015-10-19

    During recent decades, natural resources agency personnel and others involved with the management and stewardship of wildlife have experienced an increasing need to access information and obtain technical assistance for addressing a diverse array of wildlife disease issues. This Chapter provides a broad overview of selected sources for obtaining supplemental information and technical assistance for addressing wildlife disease issues in North America. Specifically, examples of existing major wildlife disease programs focusing on free-ranging wildlife populations are highlighted; training opportunities for enhancing within-agency wildlife disease response are identified; a selected reading list of wildlife disease references is provided; and selected Web sites providing timely information on wildlife disease are highlighted. No attempt is made to detail all the North American programs and capabilities that address disease in free-ranging wildlife populations. Instead, this Chapter is focused on enhancing awareness of the types of capabilities that exist as potential sources for assistance and collaboration between wildlife conservation agency personnel and others in addressing wildlife disease issues.

  6. Adequacy of pharmacological information provided in pharmaceutical drug advertisements in African medical journals.

    Directory of Open Access Journals (Sweden)

    Oshikoya KA

    2009-06-01

    Full Text Available Pharmaceutical advertisement of drugs is a means of advocating drug use and their selling but not a substitute for drug formulary to guide physicians in safe prescribing. Objectives: To evaluate drug advertisements in Nigerian and other African medical journals for their adequacy of pharmacological information. Methods: Twenty four issues from each of West African Journal of Medicine (WAJM, East African Medical Journal (EAMJ, South African Medical Journal (SAMJ, Nigerian Medical Practitioner (NMP, Nigerian Quarterly Journal of Hospital Medicine (NQJHM and Nigerian Postgraduate Medical Journal (NPMJ were reviewed. While EAMJ, SAMJ and NMP are published monthly, the WAJM, NQJHM and NPMJ are published quarterly. The monthly journals were reviewed between January 2005 and December 2006, and the quarterly journals between January 2001 and December 2006. The drug information with regards to brand/non-proprietary name, pharmacological data, clinical information, pharmaceutical information and legal aspects was evaluated as per World Health Organisation (WHO criteria. Counts in all categories were collated for each advertiser.Results: Forty one pharmaceutical companies made 192 advertisements. 112 (58.3% of these advertisements were made in the African medical journals. Pfizer (20.3% and Swipha (12.5% topped the list of the advertising companies. Four (2.1% adverts mentioned generic names only, 157 (81.8% mentioned clinical indications. Adults and children dosage (39.6%, use in special situations such as pregnancy and renal or liver problems (36.5%, adverse effects (30.2%, average duration of treatment (26.0%, and potential for interaction with other drugs (18.7% were less discussed. Pharmaceutical information such as available dosage forms and product and package information {summary of the generic and proprietary names, the formulation strength, active ingredient, route of administration, batch number, manufactured and expiry dates, and the

  7. Effective Materials Property Information Management for the 21st Century

    Science.gov (United States)

    Ren, Weiju; Cebon, David; Arnold, Steve

    2009-01-01

    This paper discusses key principles for the development of materials property information management software systems. There are growing needs for automated materials information management in various organizations. In part these are fueled by the demands for higher efficiency in material testing, product design and engineering analysis. But equally important, organizations are being driven by the need for consistency, quality and traceability of data, as well as control of access to sensitive information such as proprietary data. Further, the use of increasingly sophisticated nonlinear, anisotropic and multi-scale engineering analyses requires both processing of large volumes of test data for development of constitutive models and complex materials data input for Computer-Aided Engineering (CAE) software. And finally, the globalization of economy often generates great needs for sharing a single "gold source" of materials information between members of global engineering teams in extended supply chains. Fortunately, material property management systems have kept pace with the growing user demands and evolved to versatile data management systems that can be customized to specific user needs. The more sophisticated of these provide facilities for: (i) data management functions such as access, version, and quality controls; (ii) a wide range of data import, export and analysis capabilities; (iii) data "pedigree" traceability mechanisms; (iv) data searching, reporting and viewing tools; and (v) access to the information via a wide range of interfaces. In this paper the important requirements for advanced material data management systems, future challenges and opportunities such as automated error checking, data quality characterization, identification of gaps in datasets, as well as functionalities and business models to fuel database growth and maintenance are discussed.

  8. Information Circulars

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1973-09-10

    Information circulars are published from time to time under the symbol INFCIRC/.. for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A subject index to the circulars is presented overleaf. It covers all those published in the last five years (that is, since the beginning of 1968 and ending with INFCIRC/192), as well as others which, for one reason or another, are still considered to be of current rather than merely historical interest. Such circulars can be traced by reference to the indexes that were included in earlier revisions of the present document.

  9. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  10. Information Circulars

    International Nuclear Information System (INIS)

    1973-01-01

    Information circulars are published from time to time under the symbol INFCIRC/.. for the purpose of bringing matters of general interest to the attention of all Members of the Agency. A subject index to the circulars is presented overleaf. It covers all those published in the last five years (that is, since the beginning of 1968 and ending with INFCIRC/192), as well as others which, for one reason or another, are still considered to be of current rather than merely historical interest. Such circulars can be traced by reference to the indexes that were included in earlier revisions of the present document.

  11. Quantum information

    International Nuclear Information System (INIS)

    Rodgers, P.

    1998-01-01

    There is more to information than a string of ones and zeroes the ability of ''quantum bits'' to be in two states at the same time could revolutionize information technology. In the mid-1930s two influential but seemingly unrelated papers were published. In 1935 Einstein, Podolsky and Rosen proposed the famous EPR paradox that has come to symbolize the mysteries of quantum mechanics. Two years later, Alan Turing introduced the universal Turing machine in an enigmatically titled paper, On computable numbers, and laid the foundations of the computer industry one of the biggest industries in the world today. Although quantum physics is essential to understand the operation of transistors and other solid-state devices in computers, computation itself has remained a resolutely classical process. Indeed it seems only natural that computation and quantum theory should be kept as far apart as possible surely the uncertainty associated with quantum theory is anathema to the reliability expected from computers? Wrong. In 1985 David Deutsch introduced the universal quantum computer and showed that quantum theory can actually allow computers to do more rather than less. The ability of particles to be in a superposition of more than one quantum state naturally introduces a form of parallelism that can, in principle, perform some traditional computing tasks faster than is possible with classical computers. Moreover, quantum computers are capable of other tasks that are not conceivable with their classical counterparts. Similar breakthroughs in cryptography and communication followed. (author)

  12. Quantum information

    Energy Technology Data Exchange (ETDEWEB)

    Rodgers, P

    1998-03-01

    There is more to information than a string of ones and zeroes the ability of ''quantum bits'' to be in two states at the same time could revolutionize information technology. In the mid-1930s two influential but seemingly unrelated papers were published. In 1935 Einstein, Podolsky and Rosen proposed the famous EPR paradox that has come to symbolize the mysteries of quantum mechanics. Two years later, Alan Turing introduced the universal Turing machine in an enigmatically titled paper, On computable numbers, and laid the foundations of the computer industry one of the biggest industries in the world today. Although quantum physics is essential to understand the operation of transistors and other solid-state devices in computers, computation itself has remained a resolutely classical process. Indeed it seems only natural that computation and quantum theory should be kept as far apart as possible surely the uncertainty associated with quantum theory is anathema to the reliability expected from computers? Wrong. In 1985 David Deutsch introduced the universal quantum computer and showed that quantum theory can actually allow computers to do more rather than less. The ability of particles to be in a superposition of more than one quantum state naturally introduces a form of parallelism that can, in principle, perform some traditional computing tasks faster than is possible with classical computers. Moreover, quantum computers are capable of other tasks that are not conceivable with their classical counterparts. Similar breakthroughs in cryptography and communication followed. (author)

  13. Quantum information

    Energy Technology Data Exchange (ETDEWEB)

    Rodgers, P

    1998-03-01

    There is more to information than a string of ones and zeroes the ability of ''quantum bits'' to be in two states at the same time could revolutionize information technology. In the mid-1930s two influential but seemingly unrelated papers were published. In 1935 Einstein, Podolsky and Rosen proposed the famous EPR paradox that has come to symbolize the mysteries of quantum mechanics. Two years later, Alan Turing introduced the universal Turing machine in an enigmatically titled paper, On computable numbers, and laid the foundations of the computer industry one of the biggest industries in the world today. Although quantum physics is essential to understand the operation of transistors and other solid-state devices in computers, computation itself has remained a resolutely classical process. Indeed it seems only natural that computation and quantum theory should be kept as far apart as possible surely the uncertainty associated with quantum theory is anathema to the reliability expected from computers? Wrong. In 1985 David Deutsch introduced the universal quantum computer and showed that quantum theory can actually allow computers to do more rather than less. The ability of particles to be in a superposition of more than one quantum state naturally introduces a form of parallelism that can, in principle, perform some traditional computing tasks faster than is possible with classical computers. Moreover, quantum computers are capable of other tasks that are not conceivable with their classical counterparts. Similar breakthroughs in cryptography and communication followed. (author)

  14. Information management - Assessing the demand for information

    Science.gov (United States)

    Rogers, William H.

    1991-01-01

    Information demand is defined in terms of both information content (what information) and form (when, how, and where it is needed). Providing the information richness required for flight crews to be informed without overwhelming their information processing capabilities will require a great deal of automated intelligence. It is seen that the essence of this intelligence is comprehending and capturing the demand for information.

  15. Information Security Audit in e-business applications

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available Electronic business (e-business are different than other business because it involves any commercial or business activity that takes place by means of electronic facilities (buy and selling online, including on the Internet, proprietary networks and home banking, instead of through direct physical exchange or contact. This system creates an environment that operates at a much greater speed than traditional methods and involves much less paper–based evidence of activities. These e-business related risks should not be considered in isolation but rather as part of the overall internal control framework of an entity. It is essential to identify and assess the risks associated with an e-business environment and management should develop an e-business strategy that identifies and addresses risks. The e-business Information Systems (IS audit is a critical component of the e-business plan. This paper tries to present a risk analysis for e-business applications in order to establish the IS audit particularities in this field.

  16. Teaching web application development: Microsoft proprietary or open systems?

    Directory of Open Access Journals (Sweden)

    Stephen Corich

    Full Text Available This paper revisits the debate concerning which development environment should be used to teach server-side Web Application Development courses to undergraduate students. In 2002, following an industry-based survey of Web developers, a decision was made to adopt an open source platform consisting of PHP and MySQL rather than a Microsoft platform utilising Access and Active Server Pages. Since that date there have been a number of significant changes within the computing industry that suggest that perhaps it is appropriate to revisit the original decision. This paper investigates expert opinion by reviewing current literature regarding web development environments, it looks at the results of a survey of web development companies and it examines the current employment trends in the web development area. The paper concludes by examining the impact of making a decision to change the development environment used to teach Web Application Development to a third year computing degree class and describes the impact on course delivery that the change has brought about.

  17. Iodometric determination of ampicillin in proprietary capsules | Ejele ...

    African Journals Online (AJOL)

    The concentration of ampicillin in ampicillin capsule preparations purchased in Owerri main market, Imo State of Nigeria, was determined using the iodometric titration method. The results showed that the ampicillin concentrations in the capsules contained between 250 and 260 mg/cap of ampicillin trihydrate. Statistical ...

  18. Proprietary software versus Open Source Software for Education

    OpenAIRE

    N. Pankaja

    2013-01-01

    The Internet has brought learning "online" and offers many advantages. It is convenient, available at any time of the day, and can be accessed nearly anywhere in the world. Recently, Cloud computing is all the rage. E-Learning offers tremendous potential to increase the availability and convenience of education. Today, online content is varied and can include: text on a website, digital audio, digital video, animated images, and virtual reality environments. This content can be created in a v...

  19. Open Source and Proprietary Project Management Tools for SMEs.

    OpenAIRE

    Veronika Abramova; Francisco Pires; Jorge Bernardino

    2017-01-01

    The dimensional growth and increasing difficulty in project management promoted the development of different tools that serve to facilitate project management and track project schedule, resources and overall progress. These tools offer a variety of features, from task and time management, up to integrated CRM (Customer Relationship Management) and ERP (Enterprise Resource Planning) modules. Currently, a large number of project management software is available, to assist project team during t...

  20. Mine-induced seismicity at East-Rand proprietary mines

    CSIR Research Space (South Africa)

    Milev, AM

    1995-09-01

    Full Text Available Mining results in seismic activity of varying intensity, from small micro seismic events to larger seismic events, often associated with significant seismic induced damages. This work deals with the understanding of the present seismicity...

  1. Assessment of microbial profile of selected proprietary broiler ...

    African Journals Online (AJOL)

    Bacterial and fungal isolates recovered include Escherichia coli, Staphylococcus albus, Bacillus subtilis, Micrococcus spp, Pseudomonas spp, Aspergillus fumigatus, A. flavus, A. niger, Fusarium spp, Mucor spp, and Penicillium notatum. Total microbial counts were significantly different (P<0.05) among the selected feed ...

  2. The proprietary hospital industry: a financial analysis 1972-1982.

    Science.gov (United States)

    Michel, A; Shaked, I; Daley, J

    1985-01-01

    This paper evaluates the performance of both specific firms within the American for-profit hospital industry and the industry as a whole. First, traditional financial analysis is used to evaluate individual publicly traded for-profit chains. Then, industry performance from 1973 to 1982 is evaluated using a set of measures based on Modern Portfolio Theory. The traditional financial analysis indicates that the industry seems increasingly profitable as well as increasingly healthy from the perspective of utilizing its assets and reducing its collection period. However, the industry's rapid growth rate has strained its ability to use additional debt funding and has created a potentially dangerous liquidity position. Measures based on Modern Portfolio Theory indicate that the average return of the industry has improved over the past 5 years. However, its risk has also increased. Nevertheless, the increase in risk is more than offset by the increased average return. In addition, recent legislation designed 'to reward the efficient' has introduced a significant degree of uncertainty into the industry's performance for the coming years. Thus, hospitals' ability to maintain the substantial profitability and rate of growth they have experienced over the past decade will depend on how well they will adapt to the changing environment.

  3. 34 CFR 600.5 - Proprietary institution of higher education.

    Science.gov (United States)

    2010-07-01

    ... of compulsory school attendance in the State in which the institution is physically located; (4) Is... temporarily closed due to a natural disaster that directly affected the institution or the institution's... program it provided during that 24-month period because of new technology or the requirements of other...

  4. Three-tiered integration of PACS and HIS toward next generation total hospital information system.

    Science.gov (United States)

    Kim, J H; Lee, D H; Choi, J W; Cho, H I; Kang, H S; Yeon, K M; Han, M C

    1998-01-01

    The Seoul National University Hospital (SNUH) started a project to innovate the hospital information facilities. This project includes installation of high speed hospital network, development of new HIS, OCS (order communication system), RIS and PACS. This project aims at the implementation of the first total hospital information system by seamlessly integrating these systems together. To achieve this goal, we took three-tiered systems integration approach: network level, database level, and workstation level integration. There are 3 loops of networks in SNUH: proprietary star network for host computer based HIS, Ethernet based hospital LAN for OCS and RIS, and ATM based network for PACS. They are linked together at the backbone level to allow high speed communication between these systems. We have developed special communication modules for each system that allow data interchange between different databases and computer platforms. We have also developed an integrated workstation in which both the OCS and PACS application programs run on a single computer in an integrated manner allowing the clinical users to access and display radiological images as well as textual clinical information within a single user environment. A study is in progress toward a total hospital information system in SNUH by seamlessly integrating the main hospital information resources such as HIS, OCS, and PACS. With the three-tiered systems integration approach, we could successfully integrate the systems from the network level to the user application level.

  5. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge Management: Advanced Search. Journal Home > Information Impact: Journal of Information and Knowledge Management: Advanced Search. Log in or Register to get access to full text downloads.

  6. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge Management: Site Map. Journal Home > About the Journal > Information Impact: Journal of Information and Knowledge Management: Site Map. Log in or Register to get access to full text downloads.

  7. Beyond information retrieval: information discovery and multimedia information retrieval

    OpenAIRE

    Roberto Raieli

    2017-01-01

    The paper compares the current methodologies for search and discovery of information and information resources: terminological search and term-based language, own of information retrieval (IR); semantic search and information discovery, being developed mainly through the language of linked data; semiotic search and content-based language, experienced by multimedia information retrieval (MIR).MIR semiotic methodology is, then, detailed.

  8. Information Need and Information Seeking Behaviour

    OpenAIRE

    Nazan Özenç Uçak

    1997-01-01

    Information need is one of the cognitive needs of humankind. Information need causes information seeking behaviour and these concepts complement each other. Information need and information seeking behaviour are effected by many factors. It is necessary to know these factors in establishing the effective information centers and services.

  9. Information Need and Information Seeking Behaviour

    Directory of Open Access Journals (Sweden)

    Nazan Özenç Uçak

    1997-12-01

    Full Text Available Information need is one of the cognitive needs of humankind. Information need causes information seeking behaviour and these concepts complement each other. Information need and information seeking behaviour are effected by many factors. It is necessary to know these factors in establishing the effective information centers and services.

  10. Information Management Workflow and Tools Enabling Multiscale Modeling Within ICME Paradigm

    Science.gov (United States)

    Arnold, Steven M.; Bednarcyk, Brett A.; Austin, Nic; Terentjev, Igor; Cebon, Dave; Marsden, Will

    2016-01-01

    With the increased emphasis on reducing the cost and time to market of new materials, the need for analytical tools that enable the virtual design and optimization of materials throughout their processing - internal structure - property - performance envelope, along with the capturing and storing of the associated material and model information across its lifecycle, has become critical. This need is also fueled by the demands for higher efficiency in material testing; consistency, quality and traceability of data; product design; engineering analysis; as well as control of access to proprietary or sensitive information. Fortunately, material information management systems and physics-based multiscale modeling methods have kept pace with the growing user demands. Herein, recent efforts to establish workflow for and demonstrate a unique set of web application tools for linking NASA GRC's Integrated Computational Materials Engineering (ICME) Granta MI database schema and NASA GRC's Integrated multiscale Micromechanics Analysis Code (ImMAC) software toolset are presented. The goal is to enable seamless coupling between both test data and simulation data, which is captured and tracked automatically within Granta MI®, with full model pedigree information. These tools, and this type of linkage, are foundational to realizing the full potential of ICME, in which materials processing, microstructure, properties, and performance are coupled to enable application-driven design and optimization of materials and structures.

  11. Information and information flow an introduction

    CERN Document Server

    Bremer, Manuel

    2004-01-01

    This book is conceived as an introductory text into the theory of syntactic and semantic information, and information flow. Syntactic information theory is concerned with the information contained in the very fact that some signal has a non-random structure. Semantic information theory is concerned with the meaning or information content of messages and the like. The theory of information flow is concerned with deriving some piece of information from another. The main part will take us to situation semantics as a foundation of modern approaches in information theory. We give a brief overview o

  12. Information Impact | Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Information Impact | Journal of Information and Knowledge Management

    Information Impact | Journal of Information and Knowledge Management. 77 ... Libraries all over the world are applying information and communication ..... Bank Branch Performance, The International Journal on Advances in ICT for Emerging.

  13. HL7 and DICOM based integration of radiology departments with healthcare enterprise information systems.

    Science.gov (United States)

    Blazona, Bojan; Koncar, Miroslav

    2007-12-01

    Integration based on open standards, in order to achieve communication and information interoperability, is one of the key aspects of modern health care information systems. However, this requirement represents one of the major challenges for the Information and Communication Technology (ICT) solutions, as systems today use diverse technologies, proprietary protocols and communication standards which are often not interoperable. One of the main producers of clinical information in healthcare settings represent Radiology Information Systems (RIS) that communicate using widely adopted DICOM (Digital Imaging and COmmunications in Medicine) standard, but in very few cases can efficiently integrate information of interest with other systems. In this context we identified HL7 standard as the world's leading medical ICT standard that is envisioned to provide the umbrella for medical data semantic interoperability, which amongst other things represents the cornerstone for the Croatia's National Integrated Healthcare Information System (IHCIS). The aim was to explore the ability to integrate and exchange RIS originated data with Hospital Information Systems based on HL7's CDA (Clinical Document Architecture) standard. We explored the ability of HL7 CDA specifications and methodology to address the need of RIS integration HL7 based healthcare information systems. We introduced the use of WADO service interconnection to IHCIS and finally CDA rendering in widely used Internet explorers. The outcome of our pilot work proves our original assumption of HL7 standard being able to adopt radiology data into the integrated healthcare systems. Uniform DICOM to CDA translation scripts and business processes within IHCIS is desired and cost effective regarding to use of supporting IHCIS services aligned to SOA.

  14. Point-and-Click Pedagogy: Is it Effective for Teaching Information Technology?

    Directory of Open Access Journals (Sweden)

    Mark Angolia

    2016-09-01

    Full Text Available This paper assesses the effectiveness of the adoption of curriculum content developed and supported by a global academic university-industry alliance sponsored by one of the world’s largest information technology software providers. Academic alliances promote practical and future-oriented education while providing access to proprietary software and technology. Specifically, this paper addresses a lack of quantitative analysis to substantiate the perceived benefits of using information technology “point-and-click” instructional pedagogy to teach fundamental business processes and concepts. The analysis of over 800 test questions from 229 students allowed inferences regarding the utilization of self-directed “point-and-click” driven case studies employed to teach software applications of business processes needed for supply chain management. Correlation studies and analysis of variance investigated data collected from 10 individual course sections over a two-and-one-half-year period in a four-year public university. The data showed statistically significant positive correlations between the pedagogy and conceptual learning. Further, the research provided evidence that the methodology is equally effective for teaching information technology applications using either face-to-face or distance education delivery methods.

  15. 75 FR 9160 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2010-03-01

    .......... Dana Mermelstein (202) 482-1391. Filing Information As a courtesy, we are making information related to... regulations on submission of proprietary information and eligibility to receive access to business proprietary...

  16. 76 FR 11202 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2011-03-01

    ... (202) 482-0162. Filing Information As a courtesy, we are making information related to Sunset... regulations on submission of proprietary information and eligibility to receive access to business proprietary...

  17. 76 FR 5563 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2011-02-01

    ... Goldberger, (202) 482-4136. Filing Information As a courtesy, we are making information related to Sunset... regulations on submission of proprietary information and eligibility to receive access to business proprietary...

  18. Ergonomics and information technique

    International Nuclear Information System (INIS)

    Krueger, H.

    1985-01-01

    Ergonomics are an essential safety factor in controlling automated processes. It has to be taken into account in three stages: information presentation, information perception and information treatment

  19. Information in organisations: directions for information management

    Directory of Open Access Journals (Sweden)

    Joyce Kirk

    1999-01-01

    Full Text Available The work of managers in small and medium-sized enterprises is very information-intensive and the environment in which it is done is very information rich. But are managers able to exploit the wealth of information which surrounds them? And how can information be managed in organisations so that its potential for improving business performance and enhancing the competitiveness of these enterprises can be realised? Answers to these questions lie in clarifying the context of the practice of information management by exploring aspects of organisations and managerial work and in exploring the nature of information at the level of the organisation and the individual manager. From these answers it is possible to suggest some guidelines for managing the integration of business strategy and information, the adoption of a broadly-based definition of information and the development of information capabilities.

  20. Network Centric Information Structure - Crisis Information Management

    National Research Council Canada - National Science Library

    Aarholt, Eldar; Berg, Olav

    2004-01-01

    This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...

  1. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    International Nuclear Information System (INIS)

    Luke, S.J.

    2011-01-01

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  2. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  3. Rethinking information handling: designing for information offload

    DEFF Research Database (Denmark)

    Hansen, Lone Koefoed; Pedersen, Peter Dalsgård; Eriksson, Eva

    2005-01-01

    This paper introduces information offload as a supplement way of responding to and designing for information. By presenting iFlush, a design concept aiming at providing the user with a possibility to offload information and then instantly dispose of it, the paper presents an approach towards desi...... designing for reflection and also serves as a critique towards information overload. Furthermore, the absence of reflection on the role played by HCI community in the constant augmenting of all spaces is addressed....

  4. A WEB API AND WEB APPLICATION DEVELOPMENT FOR DISSEMINATION OF AIR QUALITY INFORMATION

    Directory of Open Access Journals (Sweden)

    K. Şahin

    2017-11-01

    Full Text Available Various studies have been carried out since 2005 under the leadership of Ministry of Environment and Urbanism of Turkey, in order to observe the quality of air in Turkey, to develop new policies and to develop a sustainable air quality management strategy. For this reason, a national air quality monitoring network has been developed providing air quality indices. By this network, the quality of the air has been continuously monitored and an important information system has been constructed in order to take precautions for preventing a dangerous situation. The biggest handicap in the network is the data access problem for instant and time series data acquisition and processing because of its proprietary structure. Currently, there is no service offered by the current air quality monitoring system for exchanging information with third party applications. Within the context of this work, a web service has been developed to enable location based querying of the current/past air quality data in Turkey. This web service is equipped with up-todate and widely preferred technologies. In other words, an architecture is chosen in which applications can easily integrate. In the second phase of the study, a web-based application was developed to test the developed web service and this testing application can perform location based acquisition of air-quality data. This makes it possible to easily carry out operations such as screening and examination of the area in the given time-frame which cannot be done with the national monitoring network.

  5. a Web Api and Web Application Development for Dissemination of Air Quality Information

    Science.gov (United States)

    Şahin, K.; Işıkdağ, U.

    2017-11-01

    Various studies have been carried out since 2005 under the leadership of Ministry of Environment and Urbanism of Turkey, in order to observe the quality of air in Turkey, to develop new policies and to develop a sustainable air quality management strategy. For this reason, a national air quality monitoring network has been developed providing air quality indices. By this network, the quality of the air has been continuously monitored and an important information system has been constructed in order to take precautions for preventing a dangerous situation. The biggest handicap in the network is the data access problem for instant and time series data acquisition and processing because of its proprietary structure. Currently, there is no service offered by the current air quality monitoring system for exchanging information with third party applications. Within the context of this work, a web service has been developed to enable location based querying of the current/past air quality data in Turkey. This web service is equipped with up-todate and widely preferred technologies. In other words, an architecture is chosen in which applications can easily integrate. In the second phase of the study, a web-based application was developed to test the developed web service and this testing application can perform location based acquisition of air-quality data. This makes it possible to easily carry out operations such as screening and examination of the area in the given time-frame which cannot be done with the national monitoring network.

  6. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  7. Information Sensitive Consumers and Market Information.

    Science.gov (United States)

    Price, Linda L.; And Others

    1987-01-01

    Past research on consumer information has emphasized the effects of informed consumers of the provision of goods by sellers. This paper examines the effects of informed consumers on other consumers' product choices. These are demand-side effects. Directions for research are outlined. Author/CH)

  8. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge Management

    Information Impact: Journal of Information and Knowledge Management. 55. Adeola Esther Olutoki ... The main instruments used for data collection were research ... collections in the library and enhance academic performance. ... libraries; they contain the latest information on research findings which are of great importance.

  9. Information Skills for an Information Age?

    Science.gov (United States)

    Gawith, Gwen

    1986-01-01

    Although information skills are the most basic of skills, the tendency is to teach strategies related to educational projects, erroneously assuming that these "information skills" are applicable to everyday decision-making. Educated imaginations are needed for today's variety of lifelong creative information situations. (17 references)…

  10. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Agricultural informational flow in informal communication networks of farmers in Ghana. ... should identify such farmers who can serve as intermediaries between actors to help disseminate information in rural communities. Keywords: key communicators, farmers, rural communities, social networks, extension agents ...

  11. Organising and presenting information.

    Science.gov (United States)

    Kankanady, Raghavendra; Wells, Marilyn

    2013-01-01

    Information management can be a daunting process for clinicians, health care providers and policy makers within the health care industry. This chapter discusses the importance of information classification and information architecture in the information economy and specific challenges faced within the health care industry. The healthcare sector has industry specific requirements for information management, standards and specifications for information presentation. Classification of information based on information criticality and the value in the health care industry is discussed in this paper. Presentation of information with reference to eHealth standards and specifications for healthcare information systems and their key requirements are also discussed, as are information architecture for eHealth implementation in Australia. This chapter also touches on information management and clinical governance since the importance of information governance is discussed by various researchers and how this is becoming of value to healthcare information management.

  12. The U.S. national nuclear forensics library, nuclear materials information program, and data dictionary

    International Nuclear Information System (INIS)

    Lamont, Stephen Philip; Brisson, Marcia; Curry, Michael

    2011-01-01

    Nuclear forensics assessments to determine material process history requires careful comparison of sample data to both measured and modeled nuclear material characteristics. Developing centralized databases, or nuclear forensics libraries, to house this information is an important step to ensure all relevant data will be available for comparison during a nuclear forensics analysis and help expedite the assessment of material history. The approach most widely accepted by the international community at this time is the implementation of National Nuclear Forensics libraries, which would be developed and maintained by individual nations. This is an attractive alternative toan international database since it provides an understanding that each country has data on materials produced and stored within their borders, but eliminates the need to reveal any proprietary or sensitive information to other nations. To support the concept of National Nuclear Forensics libraries, the United States Department of Energy has developed a model library, based on a data dictionary, or set of parameters designed to capture all nuclear forensic relevant information about a nuclear material. Specifically, information includes material identification, collection background and current location, analytical laboratories where measurements were made, material packaging and container descriptions, physical characteristics including mass and dimensions, chemical and isotopic characteristics, particle morphology or metallurgical properties, process history including facilities, and measurement quality assurance information. While not necessarily required, it may also be valuable to store modeled data sets including reactor burn-up or enrichment cascade data for comparison. It is fully expected that only a subset of this information is available or relevant to many materials, and much of the data populating a National Nuclear Forensics library would be process analytical or material accountability

  13. Computing handbook information systems and information technology

    CERN Document Server

    Topi, Heikki

    2014-01-01

    Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber

  14. Kentucky Department for Natural Resources and Environmental Protection permit application for air contaminant source: SRC-I demonstration plant, Newman, Kentucky. Supplement I. [Additional information on 38 items requested by KY/DNREP

    Energy Technology Data Exchange (ETDEWEB)

    Pearson, Jr., John F.

    1981-02-13

    In response to a letter from KY/DNREP, January 19, 1981, ICRC and DOE have prepared the enclosed supplement to the Kentucky Department for Natural Resources and Environmental Protection Permit Application for Air Contaminant Source for the SRC-I Demonstration Plant. Each of the 38 comments contained in the letter has been addressed in accordance with the discussions held in Frankfort on January 28, 1981, among representatives of KY/DNREP, EPA Region IV, US DOE, and ICRC. The questions raised involve requests for detailed information on the performance and reliability of proprietary equipment, back-up methods, monitoring plans for various pollutants, composition of wastes to flares, emissions estimates from particular operations, origin of baseline information, mathematical models, storage tanks, dusts, etc. (LTN)

  15. 77 FR 24705 - Certain New Chemicals; Receipt and Status Information

    Science.gov (United States)

    2012-04-25

    ...-n,n-dimethyl- additive. N-[3-[[(13z)-1-oxo-13- docosen-1- yl]amino]propyl]-3- sulfo-, inner salt. P... tributyltetradecyl-, production of chloride. proprietary chemical for the electronics industry. P-12-0276......... 03... & industrial coatings. P-12-0297......... 04/06/2012 07/04/2012 Gelest, Inc...... (G) Synthesis of (G...

  16. A Model for Information

    Directory of Open Access Journals (Sweden)

    Paul Walton

    2014-09-01

    Full Text Available This paper uses an approach drawn from the ideas of computer systems modelling to produce a model for information itself. The model integrates evolutionary, static and dynamic views of information and highlights the relationship between symbolic content and the physical world. The model includes what information technology practitioners call “non-functional” attributes, which, for information, include information quality and information friction. The concepts developed in the model enable a richer understanding of Floridi’s questions “what is information?” and “the informational circle: how can information be assessed?” (which he numbers P1 and P12.

  17. 77 FR 45589 - Initiation of Five-Year (“Sunset”) Review and Correction

    Science.gov (United States)

    2012-08-01

    ... As a courtesy, we are making information related to Sunset proceedings, including copies of the... regulations on submission of proprietary information and eligibility to receive access to business proprietary...

  18. Dynamics of Information Systems

    CERN Document Server

    Hirsch, Michael J; Murphey, Robert

    2010-01-01

    Our understanding of information and information dynamics has outgrown classical information theory. This book presents the research explaining the importance of information in the evolution of a distributed or networked system. It presents techniques for measuring the value or significance of information within the context of a system

  19. Technology Information Center

    International Nuclear Information System (INIS)

    Emerson, E.L.; Shepherd, E.W.; Minor, E.E.

    1980-01-01

    A Transportation Technology Center (TTC) has been established at Sandia to address the transportation of nuclear waste and spent fuel. The Technology Information Center (TIC) acts as TTC's clearing house for nuclear material transportation information. TIC's activities are divided into three activities: public information, policy information, and technical information. Some of the uses of TIC's activities are briefly outlined

  20. Information as Wealth.

    Science.gov (United States)

    Deruchie, Douglas M.

    1992-01-01

    Discusses the value of information-based services in today's global economy. The combination of information technology with library and information services at an international accounting and auditing firm is described; the Global Information Network is explained; and the importance of the appropriate use of information is discussed. (LRW)

  1. Building an Information Infrastructure.

    Science.gov (United States)

    Breivik, Patricia Senn

    1992-01-01

    College governing boards can promote good campus information management by understanding available services, monitoring changes and their relationship to priorities, supporting policies enhancing access to information, encouraging resource allocation for networking, promoting regional economic development through information use, and supporting…

  2. Stem Cell Information: Glossary

    Science.gov (United States)

    ... Tips Info Center Research Topics Federal Policy Glossary Stem Cell Information General Information Clinical Trials Funding Information Current ... here Home » Glossary Back to top Glossary Adult stem cell Astrocyte Blastocoel Blastocyst Bone marrow stromal cells Bone ...

  3. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... RSS E-mail Inside CPSC Accessibility Privacy Policy Budget, Performances & Finance Open Government Freedom of Information (FOIA) ... Information Sitemap RSS E-mail Accessibility Privacy Policy Budget & Performance Open Government Freedom of Information (FOIA) USA. ...

  4. Animal Product Safety Information

    Science.gov (United States)

    ... Home Animal & Veterinary Safety & Health Product Safety Information Product Safety Information Share Tweet Linkedin Pin it More ... to report adverse experiences with veterinary drugs. Additional Product Information Questions and Answers: Evanger’s Dog and Cat ...

  5. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... Education Centers Carbon Monoxide Information Center Carbon Monoxide Information Center En Español The Invisible Killer Carbon monoxide, ... Install one and check its batteries regularly. View Information About CO Alarms Other CO Topics Safety Tips ...

  6. Personal anticipated information need

    Directory of Open Access Journals (Sweden)

    H. Bruce

    2005-01-01

    Full Text Available Background. The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in 'Bookmarks' and 'Favourites'. Argument. It is suggested that personal information collections are created in anticipation of some future need for that information-personal, anticipated information need, which also underlies the design of formal information systems. Elaboration. Examination of the literature of information needs and information seeking behaviour leads to the formulation of five propositions that elaborate the concept of personal, anticipated information need. These propositions draw upon concepts such as uncertainty, predictability, sensitivity and the valuation of information sources. Conclusion. An individual's understanding of personal, anticipated information need and how this understanding guides the acquisition and management of personal information will determine the effectiveness of that collection.

  7. Informed consent - Providing information about prenatal examinations

    DEFF Research Database (Denmark)

    Dahl, Katja; Kesmodel, Ulrik; Hvidman, Lone

    as well.The review is based on systematic search strategy in the electronic databases Medline and Science Citation. Additional studies were identified through reference lists of individual papers obtained. Improving knowledge scores and reducing decisional conflict can be obtained by group counselling...... pregnant women about prenatal examinations. Women's knowledge, decisional conflict, satisfaction and anxiety will be explored as compared with different ways and different groups of health professionals providing information. To what extent information empowers informed decision making will be explored...

  8. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  9. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  10. Information protection playbook

    CERN Document Server

    Kane, Greg

    2013-01-01

    The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to

  11. Personal anticipated information need

    OpenAIRE

    H. Bruce

    2005-01-01

    Background. The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in 'Bookmarks' and 'Favourites'. Argument. It is suggested that personal information collections are created in anticipation of some future need for that information-personal, anticipated information need, which also underlies the design of formal information systems. ...

  12. Energy information sheets

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-07-01

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the public. The Energy Information Sheets was developed to provide general information on various aspects of fuel production, prices, consumption, and capability. Additional information on related subject matter can be found in other Energy Information Administration (EIA) publications as referenced at the end of each sheet.

  13. Tools for Trade Analysis and Open Source Information Monitoring for Non-proliferation

    International Nuclear Information System (INIS)

    Cojazzi, G.G.M.; Versino, C.; Wolfart, E.; Renda, G.; Janssens, W.A.M.; )

    2015-01-01

    The new state level approach being proposed by IAEA envisions an objective based and information driven safeguards approach utilizing all relevant information to improve the effectiveness and efficiency of safeguards. To this goal the IAEA makes also use of open source information, here broadly defined as any information that is neither classified nor proprietary. It includes, but is not limited to: media sources, government and non-governmental reports and analyzes, commercial data, and scientific/technical literature, including trade data. Within the EC support programme to IAEA, JRC has surveyed and catalogued open sources on import-export customs trade data and developed tools for supporting the use of the related databases in safeguards. The JRC software The Big Table, (TBT), supports i.a.: a) the search through a collection of reference documents relevant to trade analysis (legal/regulatory documents, technical handbooks); b) the selection of items of interests to specific verifications and c) the mapping of these items to customs commodities searchable in trade databases. In the field of open source monitoring, JRC is developing and operating a ''Nuclear Security Media Monitor'' (NSMM), which is a web-based multilingual news aggregation system that automatically collects news articles from pre-defined web sites. NSMM is a domain specific version of the general JRC-Europe Media Monitor (EMM). NSMM has been established within the EC support programme with the aim, i.e., to streamline IAEA's process of open source information monitoring. In the first part, the paper will recall the trade data sources relevant for non-proliferation and will then illustrate the main features of TBT, recently coupled with the IAEA Physical Model, and new visualization techniques applied to trade data. In the second part it will present the main aspects of the NSMM also by illustrating some of uses done at JRC. (author)

  14. Collaborative information seeking

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2008-01-01

    Since common ground is pivotal to collaboration, this paper proposes to define collaborative information seeking as the combined activity of information seeking and collaborative grounding. While information-seeking activities are necessary for collaborating actors to acquire new information......, the activities involved in information seeking are often performed by varying subgroups of actors. Consequently, collaborative grounding is necessary to share information among collaborating actors and, thereby, establish and maintain the common ground necessary for their collaborative work. By focusing...... on the collaborative level, collaborative information seeking aims to avoid both individual reductionism and group reductionism, while at the same time recognizing that only some information and understanding need be shared....

  15. Aeronautical Information System Replacement -

    Data.gov (United States)

    Department of Transportation — Aeronautical Information System Replacement is a web-enabled, automation means for the collection and distribution of Service B messages, weather information, flight...

  16. Aeronautical Information System -

    Data.gov (United States)

    Department of Transportation — The Aeronautical Information System (AIS) is a leased weather automated system that provides a means of collecting and distributing aeronautical weather information...

  17. FFRRO Program Information

    Data.gov (United States)

    U.S. Environmental Protection Agency — This asset includes information related to Cleanups at Federal Facilities. Information is provided about contaminated federal facility sites in specific communities,...

  18. History of information science

    OpenAIRE

    Buckland, MK; Liu, Z

    1998-01-01

    This informative volume concentrates on the following areas: Historiography of Information Science; Paul Otlet and His Successors; Techniques, Tools, and Systems; People and Organizations; Theoretical Topics; and Literature.

  19. What is Quantum Information?

    Science.gov (United States)

    Lombardi, Olimpia; Fortin, Sebastian; Holik, Federico; López, Cristian

    2017-04-01

    Preface; Introduction; Part I. About the Concept of Information: 1. About the concept of information Sebastian Fortin and Olimpia Lombardi; 2. Representation, information, and theories of information Armond Duwell; 3. Information, communication, and manipulability Olimpia Lombardi and Cristian López; Part II. Information and quantum mechanics: 4. Quantum versus classical information Jeffrey Bub; 5. Quantum information and locality Dennis Dieks; 6. Pragmatic information in quantum mechanics Juan Roederer; 7. Interpretations of quantum theory: a map of madness Adán Cabello; Part III. Probability, Correlations, and Information: 8. On the tension between ontology and epistemology in quantum probabilities Amit Hagar; 9. Inferential versus dynamical conceptions of physics David Wallace; 10. Classical models for quantum information Federico Holik and Gustavo Martin Bosyk; 11. On the relative character of quantum correlations Guido Bellomo and Ángel Ricardo Plastino; Index.

  20. Information technology to support informal knowledge sharing

    NARCIS (Netherlands)

    Davison, R.M.; Ou, C.X.J.; Martinsons, M.G.

    2013-01-01

    The knowledge management (KM) literature largely focuses on the explicit and formal representation of knowledge in computer-based KM systems. Informal KM practices are widespread, but less is known about them. This paper aims to redress this imbalance by exploring the use of interactive information

  1. Information Impact | Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    USER

    Information Impact | Journal of Information and Knowledge Management ... Abstract. This study was designed to determine the impact of collaboration on research and teaching .... delivery of quality instruction. ... for doing Collaborative projects, and there ... reveals that co-construction of knowledge ..... Get relevant materials.

  2. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge Management. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 7, No 2 (2016) >. Log in or Register to get access to full text downloads.

  3. The Information "Revolution": Information, Communications and Culture.

    Science.gov (United States)

    Ostry, Bernard

    Today's communications systems and technology facilitate the erosion of cultural differences, threatening cultural sovereignty. In the fifteenth century, the first information revolution created the concept of the nation-state with its unique cultural identity. The technology of the second information revolution, which has advanced video…

  4. Floridi's Philosophy of Information and Information Ethics

    DEFF Research Database (Denmark)

    Ess, Charles

    2009-01-01

    In order to evaluate Floridi's philosophy of information (PI) and correlative information ethics (IE) as potential frameworks for a global information and computing ethics (ICE), I review a range of important criticisms, defenses, and extensions of PI and IE, along with Floridi's responses to these......, as gathered together in a recent special issue of Ethics and Information Technology. A revised and expanded version of PI and IE emerges here, one that brings to the foreground PI's status as a philosophical naturalism—one with both current application and important potential in the specific domains...... of privacy and information law. Further, the pluralism already articulated by Floridi in his PI is now more explicitly coupled with an ethical pluralism in IE that will be enhanced through IE's further incorporation of discourse ethics. In this form, PI and IE emerge as still more robust frameworks...

  5. INFORMATION CULTURE AND INFORMATION SAFETY OF SCHOOLCHILDREN

    Directory of Open Access Journals (Sweden)

    E. G. Belyakova

    2017-01-01

    Full Text Available Introduction. The article is devoted to the problem of interaction between schoolchildren and possible informational risks transmitted on the Internet. Considering the lack of external filters on the way of harmful information streams, it is actually necessary to develop information culture of schoolchildren, their abilities to sensibly and critically interpret the information on the Internet, and choice of adequate behaviour models surfing the Web. The aim of the present research is to analyze the state of informational safety of schoolchildren while using the Internet; gaining an understanding of the role of external restrictions and opportunities of intrapersonal filtration of the harmful Internet content depending on children age. Methodology and research methods. The methodology of the research is based on modern methods aimed to consider the problem of personal socialization in modern information society. Thus, the Internet Initiatives Development Fund (IIDF questionnaire let the authors define the level of awareness of recipients on the problem under consideration. Results and scientific novelty. The theoretical analysis helped the authors predict the correlation of basic methods in order to guarantee personal safety of schoolchildren taking into account the process of maturity as well as the decrease of external filters that may stop harmful content. Empirical part of the research has enabled to reveal decrease in external control of staying of a child in network in the process of growing up against the background of restrictive attitudes prevalence among teachers and parents. Therefore, the research supposed to improve information culture of schoolchildren from the earliest ages encouraging them to sensibly and correctly interpret the information on the Internet. Practical significance. The practical recommendations to parents and teachers in order to improve informational personal safety of schoolchildren are proposed. The relevancy

  6. The Information Highway.

    Science.gov (United States)

    Gore, Al

    1994-01-01

    The new information marketplace is based on a network of wide, two-way highways comprised of private owners and developers, makers of information appliances (televisions, telephones, computers, and combinations of all three), information providers (local broadcasters, digital libraries, information service providers, and entrepreneurs), and…

  7. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  8. Aquaculture Information Package

    Energy Technology Data Exchange (ETDEWEB)

    Boyd, T.; Rafferty, K. [editors

    1998-01-01

    This package of information is intended to provide background to developers of geothermal aquaculture projects. The material is divided into eight sections and includes information on market and price information for typical species, aquaculture water quality issues, typical species culture information, pond heat loss calculations, an aquaculture glossary, regional and university aquaculture offices and state aquaculture permit requirements.

  9. Understanding mobile information needs

    OpenAIRE

    Church, Karen; Smyth, Barry

    2008-01-01

    In this paper we describe the results of a four-week diary study of mobile information needs, focusing on the intent behind mobile needs and the importance on context on such needs. We identified three key intents among diary entries: informational, geographical and personal information management (PIM). Furthermore, we found many of these information needs have high temporal and location dependencies.

  10. Information science in transition

    CERN Document Server

    Gilchrist, Alan

    2013-01-01

    Are we at a turning point in digital information? The expansion of the internet is unprecedented. Will information science become part of computer science and does rise of the term informatics demonstrate convergence of information science and information technology - a convergence that must surely develop? This work reflects on such issues.

  11. Delaying information search

    Directory of Open Access Journals (Sweden)

    Yaniv Shani

    2012-11-01

    Full Text Available In three studies, we examined factors that may temporarily attenuate information search. People are generally curious and dislike uncertainty, which typically encourages them to look for relevant information. Despite these strong forces that promote information search, people sometimes deliberately delay obtaining valuable information. We find they may do so when they are concerned that the information might interfere with future pleasurable activities. Interestingly, the decision to search or to postpone searching for information is influenced not only by the value and importance of the information itself but also by well-being maintenance goals related to possible detrimental effects that negative knowledge may have on unrelated future plans.

  12. Handbook of information science

    CERN Document Server

    Stock, Wolfgang G

    2013-01-01

    Dealing with information is one of the vital skills in thetwenty-first century. It takes a fair degree of information savvy to create, represent and supply information as well as to search for and retrieve relevant knowledge. This Handbook is a basic work of information science, providing a comprehensive overview of the current state of information retrieval and knowledge representation. It addresses readers from all professions and scientific disciplines, but particularly scholars, practitioners and students of Information Science, Library Science, Computer Science, Information Management, an

  13. Modified Motivation System as the Information Source for Personal Controlling. Case of the Hotel

    Directory of Open Access Journals (Sweden)

    Małgorzata Sztorc

    2008-09-01

    Full Text Available The purpose of the article is to analysis of employee system incentive hotel there be source of information for personal controlling. New incentive system fitted look to suggest for notes entered by employee. It pay attention in article, that there is sole form of motivating of forceful employee proprietary form financial motivator. Proper system of motivation effects boost of efficiency of staff aiming at achievement in firm purposes indicated appointee. Besides, it shows revolt of working group about miscellaneous features, requirements, engagement, skilful management leads achievement of fairest effect of work which. We understand control result of taken personal decision through definition personal controlling, structures of employment, system of remuneration, motivation systems, utilization of active time of employee and cost of work. Among others, counteraction belongs to tasks in sphere of management in taking up of erroneous decision human resources controlling, high cost of employment have, helping with fitting human resources for real requirements of firms and through suitable utilization of potential work stimulation. There is in firm personal wanted controlling in order to it were of limited activity of professional employee for forward taking reward only.

  14. Aquaculture information package

    Energy Technology Data Exchange (ETDEWEB)

    Boyd, T.; Rafferty, K.

    1998-08-01

    This package of information is intended to provide background information to developers of geothermal aquaculture projects. The material is divided into eight sections and includes information on market and price information for typical species, aquaculture water quality issues, typical species culture information, pond heat loss calculations, an aquaculture glossary, regional and university aquaculture offices and state aquaculture permit requirements. A bibliography containing 68 references is also included.

  15. Information technology made simple

    CERN Document Server

    Carter, Roger

    1991-01-01

    Information Technology: Made Simple covers the full range of information technology topics, including more traditional subjects such as programming languages, data processing, and systems analysis. The book discusses information revolution, including topics about microchips, information processing operations, analog and digital systems, information processing system, and systems analysis. The text also describes computers, computer hardware, microprocessors, and microcomputers. The peripheral devices connected to the central processing unit; the main types of system software; application soft

  16. Information Aggregation in Organizations

    OpenAIRE

    Schulte, Elisabeth

    2006-01-01

    This dissertation contributes to the analysis of information aggregation procedures within organizations. Facing uncertainty about the consequences of a collective decision, information has to be aggregated before making a choice. Two main questions are addressed. Firstly, how well is an organization suited for the aggregation of decision-relevant information? Secondly, how should an organization be designed in order to aggregate information efficiently? The main part deals with information a...

  17. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  18. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  19. Digital Information and Value

    Directory of Open Access Journals (Sweden)

    Paul Walton

    2015-11-01

    Full Text Available Digital information changes the ways in which people and organisations interact. This paper examines the nature of this change in the context of the author’s Model for Information (MfI. It investigates the relationship between outcomes and value, selection processes and some attributes of information and explores how this relationship changes in the move from analogue to digital information. Selection processes shape the evolution of information ecosystems in which conventions are established for the ways in which information is used. The conventions determine norms for information friction and information quality as well as the sources of information and channels used. Digital information reduces information friction, often dramatically, and changes information quality. The increasing use of analytics in business increasingly delivers predictive or prescriptive digital information. These changes are happening faster than information ecosystem conventions can change. The relationships established in the paper enable an analysis of, and guide changes to, these conventions enabling a more effective use of digital information.

  20. MetaLIMS, a simple open-source laboratory information management system for small metagenomic labs.

    Science.gov (United States)

    Heinle, Cassie Elizabeth; Gaultier, Nicolas Paul Eugène; Miller, Dana; Purbojati, Rikky Wenang; Lauro, Federico M

    2017-06-01

    As the cost of sequencing continues to fall, smaller groups increasingly initiate and manage larger sequencing projects and take on the complexity of data storage for high volumes of samples. This has created a need for low-cost laboratory information management systems (LIMS) that contain flexible fields to accommodate the unique nature of individual labs. Many labs do not have a dedicated information technology position, so LIMS must also be easy to setup and maintain with minimal technical proficiency. MetaLIMS is a free and open-source web-based application available via GitHub. The focus of MetaLIMS is to store sample metadata prior to sequencing and analysis pipelines. Initially designed for environmental metagenomics labs, in addition to storing generic sample collection information and DNA/RNA processing information, the user can also add fields specific to the user's lab. MetaLIMS can also produce a basic sequencing submission form compatible with the proprietary Clarity LIMS system used by some sequencing facilities. To help ease the technical burden associated with web deployment, MetaLIMS options the use of commercial web hosting combined with MetaLIMS bash scripts for ease of setup. MetaLIMS overcomes key challenges common in LIMS by giving labs access to a low-cost and open-source tool that also has the flexibility to meet individual lab needs and an option for easy deployment. By making the web application open source and hosting it on GitHub, we hope to encourage the community to build upon MetaLIMS, making it more robust and tailored to the needs of more researchers. © The Authors 2017. Published by Oxford University Press.

  1. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    References must conform to the 6th edition of the Publication Manual of ... Book. Chapman, L.(2001). Managing acquisition in libraries and information services. ... For electronic resources, please see APA guidelines at www.apastyle.org ...

  2. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Meeting the information needs of remote library users: the case of University of Maiduguri Distance Learning Programme · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT. Adam Gambo Saleh, 1-16 ...

  3. Information technology acceptance in health information management.

    Science.gov (United States)

    Abdekhoda, M; Ahmadi, M; Dehnad, A; Hosseini, A F

    2014-01-01

    User acceptance of information technology has been a significant area of research for more than two decades in the field of information technology. This study assessed the acceptance of information technology in the context of Health Information Management (HIM) by utilizing Technology Acceptance Model (TAM) which was modified and applied to assess user acceptance of health information technology as well as viability of TAM as a research construct in the context of HIM. This was a descriptive- analytical study in which a sample of 187 personnel from a population of 363 personnel, working in medical records departments of hospitals affiliated to Tehran University of Medical Sciences, was selected. Users' perception of applying information technology was studied by a researcher-developed questionnaire. Collected data were analyzed by SPSS software (version16) using descriptive statistics and regression analysis. The results suggest that TAM is a useful construct to assess user acceptance of information technology in the context of HIM. The findings also evidenced the perceived ease of use (PEOU) and perceived usefulness (PE) were positively associated with favorable users' attitudes towards HIM. PU was relatively more associated (r= 0.22, p = 0.05) than PEOU (r = 0.014, p = 0.05) with favorable user attitudes towards HIM. Users' perception of usefulness and ease of use are important determinants providing the incentive for users to accept information technologies when the application of a successful HIM system is attempted. The findings of the present study suggest that user acceptance is a key element and should subsequently be the major concern of health organizations and health policy makers.

  4. The Informal Sector

    OpenAIRE

    Áureo de Paula; José A. Scheinkman

    2007-01-01

    This paper investigates the determinants of informal economic activity. We present two equilibrium models of informality and test their implications using a survey of 48,000+ small firms in Brazil. We define informality as tax avoidance; firms in the informal sector avoid tax payments but suffer other limitations. In the first model there is a single industry and informal firms face a higher cost of capital and a limitation on size. As a result informal firms are smaller and have a lower capi...

  5. Energy information sheets

    Energy Technology Data Exchange (ETDEWEB)

    1993-12-02

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. Written for the general public, the EIA publication Energy Information Sheets was developed to provide information on various aspects of fuel production, prices, consumption and capability. The information contained herein pertains to energy data as of December 1991. Additional information on related subject matter can be found in other EIA publications as referenced at the end of each sheet.

  6. Towards Information Lasers

    Directory of Open Access Journals (Sweden)

    Andrei Khrennikov

    2015-10-01

    Full Text Available Recently, the methods of quantum theory (QT, especially quantum information and probability, started to be widely applied outside of physics: in cognitive, social and political sciences, psychology, economics, finances, decision making, molecular biology and genetics. Such models can be called quantum-like, in contrast to real quantum physical cognitive and biological models. Quantum-like means that only the information and probability structures of QT are explored. This approach matches the information interpretation of QT well (e.g., Zeilinger and Brukner, Fuchs and Mermin, D’Ariano, as well as the informational viewpoint on physics in general (e.g., Wheeler’s “it from bit” paradigm. In this paper, we propose a quantum-like model of an information laser by precessing the assumptions on the structure of state spaces of information processors, “information atoms” (i-atoms and information fields. The basic assumption is the discrete structure of state spaces related to quantization of an information analog of energy. To analyze a possible structure of the state space of i-atoms leading to the possibility to create information lasers, we have to develop a purely information version of quantum thermodynamics. We did this by placing the main attention on the derivation of the conditions for the equilibrium of information exchange between i-atoms and a quantized information field.

  7. Sleep Apnea Information Page

    Science.gov (United States)

    ... Page You are here Home » Disorders » All Disorders Sleep Apnea Information Page Sleep Apnea Information Page What research is being done? ... Institutes of Health (NIH) conduct research related to sleep apnea in laboratories at the NIH, and also ...

  8. Information manager vol 10

    African Journals Online (AJOL)

    Library _info_Sc_ 1

    1989-05-11

    May 11, 1989 ... This study explored rural-based library and information services. The location was .... However, following the passage of Imo State Law on. Local Government ... What are the information sources used to satisfy these needs? 3.

  9. Informal Unemployment and Education

    DEFF Research Database (Denmark)

    Kolm, Anne-Sofie; Larsen, Birthe

    This paper develops a four sector equilibrium search and matching model with informal sector employment opportunities and educational choice. We show that underground activities reduce educational attainments if informal employment opportunities mainly are available to low educated workers. More ...

  10. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... Inside CPSC Accessibility Privacy Policy Budget, Performances & Finance Open Government Freedom of Information (FOIA) Inspector General No ... RSS E-mail Accessibility Privacy Policy Budget & Performance Open Government Freedom of Information (FOIA) USA.gov CPSC. ...

  11. Geographical information systems

    DEFF Research Database (Denmark)

    Möller, Bernd

    2004-01-01

    The chapter gives an introduction to Geographical Information Systems (GIS) with particular focus on their application within environmental management.......The chapter gives an introduction to Geographical Information Systems (GIS) with particular focus on their application within environmental management....

  12. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... Accessibility Privacy Policy Budget, Performances & Finance Open Government Freedom of Information (FOIA) Inspector General No Fear Act ... mail Accessibility Privacy Policy Budget & Performance Open Government Freedom of Information (FOIA) USA.gov CPSC.gov is ...

  13. Integrated inventory information system

    Digital Repository Service at National Institute of Oceanography (India)

    Sarupria, J.S.; Kunte, P.D.

    The nature of oceanographic data and the management of inventory level information are described in Integrated Inventory Information System (IIIS). It is shown how a ROSCOPO (report on observations/samples collected during oceanographic programme...

  14. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  15. Indiana Health Information Exchange

    Science.gov (United States)

    The Indiana Health Information Exchange is comprised of various Indiana health care institutions, established to help improve patient safety and is recognized as a best practice for health information exchange.

  16. International cooperative information systems

    International Nuclear Information System (INIS)

    1980-01-01

    Developing countries need mechanisms by which the information they generate themselves and development information from the rest of the world can be retrieved. The international cooperative information system is such a mechanism. Delegates to the Seminar on International Cooperative Information Systems were informed about various existing systems (INIS, AGRIS, INFOTERRA, TCDC/INRES, POPIN, DEVSIS, and INPADROC), some specialized information systems and services (CDS/ISIS and the Cassava Information Centre), and computer programs for information processing (INIS/AGRIS, CDS/ISIS, and MINISIS). The participants suggested some changes that should be made on both the national and the international levels to ensure that these systems meet the needs of developing countries more effectively. (LL)

  17. Informed Food Choice

    DEFF Research Database (Denmark)

    Coff, Christian

    2014-01-01

    of informed food choice. An informed food choice is an enlightened food choice made by the individual based on the information made available. Food choices are made when shopping for food or when eating/drinking, and information is believed to give clarity to the options by increasing market transparency......Food production and consumption influence health, the environment, social structures, etc. For this reason consumers are increasingly interested in information about these effects. Disclosure of information about the consequences of food production and consumption is essential for the idea......, supporting rationality (the best choice), consumers’ self-governance (autonomy) and life coherence (integrity). On a practical level, informed food choice remains an ideal to strive for, as information on food often is inadequate....

  18. Changing Information Retrieval Behaviours

    DEFF Research Database (Denmark)

    Constantiou, Ioanna D.; Lehrer, Christiane; Hess, Thomas

    2014-01-01

    on the continuance of LBS use and indicate changes in individuals' information retrieval behaviours in everyday life. In particular, the distinct value dimension of LBS in specific contexts of use changes individuals' behaviours towards accessing location-related information....

  19. PDQ® Cancer Information

    Science.gov (United States)

    An NCI database that contains the latest information about cancer treatment, screening, prevention, genetics, supportive care, and complementary and alternative medicine, plus drug information and a dictionary of cancer terms.

  20. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... Us Sitemap RSS E-mail Inside CPSC Accessibility Privacy Policy Budget, Performances & Finance Open Government Freedom of ... News and Information Sitemap RSS E-mail Accessibility Privacy Policy Budget & Performance Open Government Freedom of Information ( ...

  1. Newcomer information seeking

    DEFF Research Database (Denmark)

    Moring, Camilla Elisabeth

    2017-01-01

    Introduction: Research on socialization and learning processes among organizational newcomers is offering valuable insight into the role of information seeking in the workplace, and to why, and how newcomers seek information when entering a new organization. Analysis: The aim of the paper is to o...... and corporeal information sources newcomers learn about the organizational practice, and the knowledge needed in order to develop as a competent practitioner and become a full member of the organization.......Introduction: Research on socialization and learning processes among organizational newcomers is offering valuable insight into the role of information seeking in the workplace, and to why, and how newcomers seek information when entering a new organization. Analysis: The aim of the paper...... is to outline and discuss the significance of information seeking in newcomer socialization and learning, and analyse how different approaches influence our understanding of the role of information seeking in the workplace. Results: It is argued, that a development in research on newcomer information seeking...

  2. What is quantum information ?

    CERN Document Server

    Fortin, Sebastian; Holik, Federico; López, Cristian

    2017-01-01

    Combining physics and philosophy, this is a uniquely interdisciplinary examination of quantum information science which provides an up-to-date examination of developments in this field. The authors provide coherent definitions and theories of information, taking clearly defined approaches to considering information in connection with quantum mechanics, probability, and correlations. Concepts addressed include entanglement of quantum states, the relation of quantum correlations to quantum information, and the meaning of the informational approach for the foundations of quantum mechanics. Furthermore, the mathematical concept of information in the communicational context, and the notion of pragmatic information are considered. Suitable as both a discussion of the conceptual and philosophical problems of this field and a comprehensive stand-alone introduction, this book will benefit both experienced and new researchers in quantum information and the philosophy of physics.

  3. Senior Information Officials Standard

    Science.gov (United States)

    This document establishes the (SIOs) as the Environmental Protection Agency’s (EPA) primary points of accountability for the effective oversight, coordination, and management of information and information technology (IT)

  4. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... E-mail Inside CPSC Accessibility Privacy Policy Budget, Performances & Finance Open Government Freedom of Information (FOIA) Inspector ... Sitemap RSS E-mail Accessibility Privacy Policy Budget & Performance Open Government Freedom of Information (FOIA) USA.gov ...

  5. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... Education Safety Education Centers Carbon Monoxide Information Center Carbon Monoxide Information Center En Español The Invisible Killer Carbon monoxide, also known as CO, is called the " ...

  6. RCRA Facility Information

    Data.gov (United States)

    U.S. Environmental Protection Agency — This asset includes hazardous waste information, which is mostly contained in the Resource Conservation and Recovery Act Information (RCRAInfo) System, a national...

  7. Repositioning Information Science.

    OpenAIRE

    Ibekwe-Sanjuan , Fidelia; Buckland , Michael; Latham , Kiersten

    2010-01-01

    International audience; During the twentieth century there was a strong desire for information studies to become scientific, to move from librarianship, bibliography, and documentation to an information science. In 1968 the American Documentation Institute was renamed American Society for Information Science. By the twenty-first century, however, departments of (library and) information science had turned instead towards the social sciences, but have not been successful in providing a coheren...

  8. Designing information systems

    CERN Document Server

    Blethyn, Stanley G

    2014-01-01

    Designing Information Systems focuses on the processes, methodologies, and approaches involved in designing information systems. The book first describes systems, management and control, and how to design information systems. Discussions focus on documents produced from the functional construction function, users, operators, analysts, programmers and others, process management and control, levels of management, open systems, design of management information systems, and business system description, partitioning, and leveling. The text then takes a look at functional specification and functiona

  9. Dynamic Strategic Information Transmission

    OpenAIRE

    Mikhail Golosov; Vasiliki Skreta; Aleh Tsyvinski; Andrea Wilson

    2011-01-01

    This paper studies strategic information transmission in a dynamic environment where, each period, a privately informed expert sends a message and a decision maker takes an action. Our main result is that, in contrast to a static environment, full information revelation is possible. The gradual revelation of information and the eventual full revelation is supported by the dynamic rewards and punishments. The construction of a fully revealing equilibrium relies on two key features. The first f...

  10. Public informations guidelines

    International Nuclear Information System (INIS)

    1986-06-01

    The purpose of these Public Information Guidelines is to provide principles for the implementation of the NWPA mandate and the Mission Plan requirements for the provision of public information. These Guidelines set forth the public information policy to be followed by all Office of Civilian Radioactive Waste Management (OCRWM) performance components. The OCRWM offices should observe these Guidelines in shaping and conducting public information activities

  11. Public informations guidelines

    Energy Technology Data Exchange (ETDEWEB)

    None

    1986-06-01

    The purpose of these Public Information Guidelines is to provide principles for the implementation of the NWPA mandate and the Mission Plan requirements for the provision of public information. These Guidelines set forth the public information policy to be followed by all Office of Civilian Radioactive Waste Management (OCRWM) performance components. The OCRWM offices should observe these Guidelines in shaping and conducting public information activities.

  12. Computer information systems framework

    International Nuclear Information System (INIS)

    Shahabuddin, S.

    1989-01-01

    Management information systems (MIS) is a commonly used term in computer profession. The new information technology has caused management to expect more from computer. The process of supplying information follows a well defined procedure. MIS should be capable for providing usable information to the various areas and levels of organization. MIS is different from data processing. MIS and business hierarchy provides a good framework for many organization which are using computers. (A.B.)

  13. Natural Information Processing Systems

    OpenAIRE

    John Sweller; Susan Sweller

    2006-01-01

    Natural information processing systems such as biological evolution and human cognition organize information used to govern the activities of natural entities. When dealing with biologically secondary information, these systems can be specified by five common principles that we propose underlie natural information processing systems. The principles equate: (1) human long-term memory with a genome; (2) learning from other humans with biological reproduction; (3) problem solving through random ...

  14. Information Services Directory

    International Nuclear Information System (INIS)

    1986-08-01

    The Information Services Directory is intended to facilitate participation by states, affected Indian tribes and the public in the Civilian Radioactive Waste Management Program. The Directory is produced by the Information Services Division of the OCRWM's Office of Policy and Outreach and will be updated periodically. It is a reference document that identifies the sources of available program information

  15. Information Design Theories

    Science.gov (United States)

    Pettersson, Rune

    2014-01-01

    Information design has practical and theoretical components. As an academic discipline we may view information design as a combined discipline, a practical theory, or as a theoretical practice. So far information design has incorporated facts, influences, methods, practices, principles, processes, strategies, and tools from a large number of…

  16. Information Manager (The)

    African Journals Online (AJOL)

    The Information Manager is an Interdisciplinary Journal which provides a forum for the ... It serves as a forum for new research in information dissemination and communication processes in general, The basic focus of Information manager are: i. to ... Influence of Mac Arthur Journal Donation Project on Serial Resources of ...

  17. Informed Consent and Routinisation

    DEFF Research Database (Denmark)

    Ploug, Thomas; Holm, Søren

    2013-01-01

    provide evidence of the routinisation of informed consent in various types of interaction on the internet; among these, the routinisation of consent to the exchange of health related information. We also provide evidence that the extent of the routinisation of informed consent is dependent...

  18. Information Services Directory

    International Nuclear Information System (INIS)

    1985-11-01

    The Information Services directory is intended to facilitate participation by states, affected Indian tribes and the public in the Civilian Radioactive Waste Management program. The Directory is produced by the Information Services Division of the OCRWM's Office of Policy and Outreach and will be updated periodically. It is a reference document that identifies the sources of available program information

  19. Community Information Systems.

    Science.gov (United States)

    Freeman, Andrew

    Information is provided on technological and social trends as background for a workshop designed to heighten the consciousness of workers in community information systems. Initially, the basic terminology is considered in its implications for an integrated perspective of community information systems, with particular attention given to the meaning…

  20. Security classification of information

    Energy Technology Data Exchange (ETDEWEB)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  1. Connectionist Interaction Information Retrieval.

    Science.gov (United States)

    Dominich, Sandor

    2003-01-01

    Discussion of connectionist views for adaptive clustering in information retrieval focuses on a connectionist clustering technique and activation spreading-based information retrieval model using the interaction information retrieval method. Presents theoretical as well as simulation results as regards computational complexity and includes…

  2. Information Retrieval Models

    NARCIS (Netherlands)

    Hiemstra, Djoerd; Göker, Ayse; Davies, John

    2009-01-01

    Many applications that handle information on the internet would be completely inadequate without the support of information retrieval technology. How would we find information on the world wide web if there were no web search engines? How would we manage our email without spam filtering? Much of the

  3. Teaching Information Technology Law

    Science.gov (United States)

    Taylor, M. J.; Jones, R. P.; Haggerty, J.; Gresty, D.

    2009-01-01

    In this paper we discuss an approach to the teaching of information technology law to higher education computing students that attempts to prepare them for professional computing practice. As information technology has become ubiquitous its interactions with the law have become more numerous. Information technology practitioners, and in particular…

  4. Recommendation with Contextual Information

    Science.gov (United States)

    Huang, Jia

    2014-01-01

    Information retrieval (IR) systems have tremendously broaden users' access to information. However, users need to select their needs from trillions of information indexed daily. Due to the "semantic gap" between queries and indexed terms in IR system, whether users can satisfy their needs depends on whether they use the correct terms as…

  5. The Information Search

    Science.gov (United States)

    Doraiswamy, Uma

    2011-01-01

    This paper in the form of story discusses a college student's information search process. In this story we see Kuhlthau's information search process: initiation, selection, exploration, formulation, collection, and presentation. Katie is a student who goes in search of information for her class research paper. Katie's class readings, her interest…

  6. Geothermal Greenhouse Information Package

    Energy Technology Data Exchange (ETDEWEB)

    Rafferty, K. [P.E.; Boyd, T. [ed.

    1997-01-01

    This package of information is intended to provide a foundation of background information for developers of geothermal greenhouses. The material is divided into seven sections covering such issues as crop culture and prices, operating costs for greenhouses, heating system design, vendors and a list of other sources of information.

  7. Ethics of Information Supply.

    Science.gov (United States)

    Oppenheim, Charles

    This discussion of the ethics of the information process provides a brief review of the process of information supply and flow, primarily in science and technology; looks at various points in the flow of information; and highlights particular ethical concerns. Facets of the process discussed in more detail include ways in which some scientists…

  8. Museums, Environments, Information

    NARCIS (Netherlands)

    Koutamanis, A.

    2015-01-01

    Modern digital media already permeate the physical world. The portability of information devices and the ubiquity of networks allow us to access information practically anyplace, creating digital overlays on reality. This also allows us to bring information we routinely archive in museums and

  9. Evaluating Health Information

    Science.gov (United States)

    Millions of consumers get health information from magazines, TV or the Internet. Some of the information is reliable and up to date; some is not. How can ... the site have an editorial board? Is the information reviewed before it is posted? Be skeptical. Things ...

  10. Is Information Still Relevant?

    Science.gov (United States)

    Ma, Lia

    2013-01-01

    Introduction: The term "information" in information science does not share the characteristics of those of a nomenclature: it does not bear a generally accepted definition and it does not serve as the bases and assumptions for research studies. As the data deluge has arrived, is the concept of information still relevant for information…

  11. Information Architecture: Looking Ahead.

    Science.gov (United States)

    Rosenfeld, Louis

    2002-01-01

    Considers the future of the field of information architecture. Highlights include a comparison with the growth of the field of professional management; the design of information systems since the Web; more demanding users; the need for an interdisciplinary approach; and how to define information architecture. (LRW)

  12. Information network architectures

    Science.gov (United States)

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.

  13. Energy information directory 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-10-01

    The National Energy Information Center provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. This Energy Information Directory is used to assist the Center staff as well as other DOE staff in directing inquires to the proper offices.

  14. Information technology ethics

    DEFF Research Database (Denmark)

    Hongladarom, Soraj; Ess, Charles

    This book was the first publication to take a genuinely global approach to the diverse ethical issues evoked by Information and Communication Technologies and their possible resolutions. Readers will gain a greater appreciation for the problems and possibilities of genuinely global information...... ethics, which are urgently needed as information and communication technologies continue their exponential growth...

  15. Methods of information processing

    Energy Technology Data Exchange (ETDEWEB)

    Kosarev, Yu G; Gusev, V D

    1978-01-01

    Works are presented on automation systems for editing and publishing operations by methods of processing symbol information and information contained in training selection (ranking of objectives by promise, classification algorithm of tones and noise). The book will be of interest to specialists in the automation of processing textural information, programming, and pattern recognition.

  16. Information, Precedent, and Statute

    NARCIS (Netherlands)

    O. Yalnazov (Orlin)

    2017-01-01

    textabstractI compare precedent and statute in cost-effectiveness terms. To make laws, a lawmaker needs information. Information has a cost. That cost is sensitive to the choice of law production technology. The orthodoxy is that the courts acquire information more cheaply. Litigants volunteer it in

  17. Personal, Anticipated Information Need

    Science.gov (United States)

    Bruce, Harry

    2005-01-01

    Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…

  18. Mobile Student Information System

    Science.gov (United States)

    Asif, Muhammad; Krogstie, John

    2011-01-01

    Purpose: A mobile student information system (MSIS) based on mobile computing and context-aware application concepts can provide more user-centric information services to students. The purpose of this paper is to describe a system for providing relevant information to students on a mobile platform. Design/methodology/approach: The research…

  19. Lofar information system design

    NARCIS (Netherlands)

    Valentijn, E.; Belikov, A. N.

    2009-01-01

    The Lofar Information System is a solution for Lofar Long Term Archive that is capable to store and handle PBs of raw and processed data. The newly created information system is based on Astro-WISE - the information system for wide field astronomy. We review an adaptation of Astro-WISE for the new

  20. Information system metaphors

    NARCIS (Netherlands)

    Gazendam, H.W.M.

    1999-01-01

    Metaphors are useful because they are efficient: they transfer a complex of meaning in a few words. Information systems are social constructs. Therefore, metaphors seem to be especially useful for explaining the space of possible meaning complexes or designs of information systems. Three information

  1. Does Information Change Behavior?

    OpenAIRE

    Huffman, Wallace

    2009-01-01

    This paper reviews and synthesizes the theory of information economics and empirical evidence on how information changes the behavior of consumers, households and firms. I show that consumers respond to new information in food experiments but perhaps not in retirement account management. Some seeming perverse consumer/investor decision making may be a result of a complex decision with a low expected payoff.

  2. Information manager vol 10

    African Journals Online (AJOL)

    Library _info_Sc_ 1

    The Perception of Librarians As Sources Of Information On HIV/AIDS By ... the librarian is confined to the library. ... is to offer information services that can assist information users to meet their needs at the right time and in the right format. ... relationships (Sande and Volbering,1992). ..... Education for Students: A Proposal for.

  3. Dynamic statistical information theory

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In recent years we extended Shannon static statistical information theory to dynamic processes and established a Shannon dynamic statistical information theory, whose core is the evolution law of dynamic entropy and dynamic information. We also proposed a corresponding Boltzmman dynamic statistical information theory. Based on the fact that the state variable evolution equation of respective dynamic systems, i.e. Fokker-Planck equation and Liouville diffusion equation can be regarded as their information symbol evolution equation, we derived the nonlinear evolution equations of Shannon dynamic entropy density and dynamic information density and the nonlinear evolution equations of Boltzmann dynamic entropy density and dynamic information density, that describe respectively the evolution law of dynamic entropy and dynamic information. The evolution equations of these two kinds of dynamic entropies and dynamic informations show in unison that the time rate of change of dynamic entropy densities is caused by their drift, diffusion and production in state variable space inside the systems and coordinate space in the transmission processes; and that the time rate of change of dynamic information densities originates from their drift, diffusion and dissipation in state variable space inside the systems and coordinate space in the transmission processes. Entropy and information have been combined with the state and its law of motion of the systems. Furthermore we presented the formulas of two kinds of entropy production rates and information dissipation rates, the expressions of two kinds of drift information flows and diffusion information flows. We proved that two kinds of information dissipation rates (or the decrease rates of the total information) were equal to their corresponding entropy production rates (or the increase rates of the total entropy) in the same dynamic system. We obtained the formulas of two kinds of dynamic mutual informations and dynamic channel

  4. Information society studies

    CERN Document Server

    Duff, Alistair S

    2013-01-01

    We are often told that we are ""living in an information society"" or that we are ""information workers."" But what exactly do these claims mean, and how might they be verified? In this important methodological study, Alistair S. Duff cuts through the rhetoric to get to the bottom of the ""information society thesis."" Wide-ranging in coverage, this study will be of interest to scholars in information science, communication and media studies and social theory. It is a key text for the newly-unified specialism of information society studies, and an indispensable guide to the future of this disc

  5. Management of information organizations

    CERN Document Server

    Afzal, Waseem

    2012-01-01

    This book is a significant step towards developing a body of management knowledge pertinent to the context of Library Information Science (LIS) and provides a succinct but deep account of management and information organizations. Management of Information Organizations presents a broad view of the information organizations and the nature of management in these organizations, and how information professionals are affected by such management systems. The book equips the reader with the knowledge that will enable them to develop a strong intellectual foundation relating to management and its mani

  6. The Information Society

    Directory of Open Access Journals (Sweden)

    Hiranya Nath

    2017-03-01

    Full Text Available This article briefly discusses various definitions and concepts of the so-called information society. The term information society has been proposed to refer to the post-industrial society in which information plays a pivotal role. The definitions that have been proposed over the years highlight five underlying characterisations of an information society: technological, economic, sociological, spatial, and cultural. This article discusses those characteristics. While the emergence of an information society may be just a figment of one’s imagination, the concept could be a good organising principle to describe and analyse the changes of the past 50 years and of the future in the 21st century.

  7. Information behaviour and practice

    CERN Document Server

    Rafferty, Pauline; Baker, David

    2015-01-01

    This special issue explores information behaviour and practice in general, and specifically focuses on the implications for library and information services. Information seeking behaviour and information practice remain areas of importance in information science and librarianship, perhaps even more so in the digital age. This special issue is an opportunity to share ideas and scholarship and to explore models and methods. The papers chosen for inclusion cover a range of topics and approach them from a number of different epistemological and methodological positions demonstrating the liveliness

  8. Nuclear Information Democratization

    International Nuclear Information System (INIS)

    Savić, Dobrica

    2013-01-01

    Nuclear information (Nl) interests people for many reasons, with energy supply, safety, and security being at the top of the list. Democratizing nuclear information has its roots in the growth of a knowledge-based economy, the knowledge worker as a user of nuclear information, developments in information and communication technologies (ICT), and the impact of internet growth. Results of democratization are apparent in the process of information creation, in how nuclear information is distributed and accessed, and in the conditions for using the information found. The International Nuclear Information System (INIS) both reflects and contributes to these trends. Nuclear information falls under the overall umbrella of scientific and technical information (STI). It is highly specialized, but it follows general principles and trends of STI. The world of STI has its own culture and its own long-established rules of use and existence. These have brought us many inventions and improvements, introduced important technological changes, and made our lives and work much easier and more pleasurable. However, the world is constantly changing, and the traditional closed STI environment, including the world of nuclear information, is not keeping up with today’s changes. (author)

  9. Informed Consent in Dentistry.

    Science.gov (United States)

    Reid, Kevin I

    2017-03-01

    A review of literature regarding informed consent in dentistry reveals a paucity of information and minimal scholarship devoted to this subject. But this begs the question about informed consent somehow being different for dentistry than for medicine or other healthcare delivery. My account draws distinctions where appropriate but is rooted in the premise that informed consent is an ethical construct applicable to vulnerable people as patients independent of what type of treatment or body part being considered. This paper highlights the crucial importance of the process of informed consent and refusal in dentistry, underscoring its important place in oral healthcare. This paper will not address the unique circumstances involving consent in those without capacity or focus on informed consent in the research setting; our focus will be on those patients with full decisionmaking capacity in the clinical setting. I will emphasize the importance of disclosure of treatment options and highlight the benefits of shared-decision-making in the informed consent process.

  10. Shipping Information Pipeline

    DEFF Research Database (Denmark)

    Jensen, Thomas

    to creating a more efficient shipping industry, and a number of critical issues are identified. These include that shipments depend on shipping information, that shipments often are delayed due to issues with documentation, that EDI messages account for only a minor part of the needed information......This thesis applies theoretical perspectives from the Information Systems (IS) research field to propose how Information Technology (IT) can improve containerized shipping. This question is addressed by developing a set of design principles for an information infrastructure for sharing shipping...... information named the Shipping Information Pipeline (SIP). Review of the literature revealed that IS research prescribed a set of meta-design principles, including digitalization and digital collaboration by implementation of Inter-Organizational Systems based on Electronic Data Interchange (EDI) messages...

  11. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Analytical study on availability of information and communication technology facilities in selected Nigerian university libraries · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT. William O. Nkanu, Ebong N. Nkebem, Victoria A. Iyishu, Christopher E. Ogar ...

  12. Information Assurance and the Information Society

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    1998-01-01

    Society is on the verge of a new era: the information age. Economical changes, a new way of looking at services and new types of conflict are forecasted. Some glimpses of these changes were noticed during the Persian Gulf War. Government decision units, organisations, society and critical industries

  13. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge management

    Five (5) research questions guided the study and three hypotheses were tested at 0.05 level of ... key factor of knowledge management is knowledge sharing. ... difference has been recorded in terms of skills acquisition, information literacy, classroom ... However, little is known about knowledge-sharing strategies and their ...

  14. Application of information technology infrastructure in information ...

    African Journals Online (AJOL)

    The study investigated the application of infotech infrastructure in information processing for enhancing workplace safety in Rivers State. In view of this, the study was a research survey design. The population of the study comprised 600 oil company workers in Rivers State. A-30% basis was used to randomly select the ...

  15. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Contributions of agriculture and veterinary complex of Ahmadu Bello University, Zaria to the dissemination of agricultural information: a bibliometric analysis · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT. Gabriel M. Kasa, Ibrahim Umar, Maimuna Izah, 51-59 ...

  16. Information Impact | Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Information Impact | Journal of Information and Knowledge Management

    the students was not library and information science they all had their career prior their ... boils down to a career decision-making process”. That is .... choose secretarial option do so on the account of their failure to be registered in accounting.

  17. Information Assurance and the Information Society

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    1999-01-01

    Society is on the verge of a new era: the information age. Economical changes, a new way of looking at services and new types of conflict are forecasted. Some glimpses of these changes were noticed during the Persian Gulf War. Government decision units, organisations, society and critical industries

  18. Information Management: Enhancing Information Discovery and Information Availability

    International Nuclear Information System (INIS)

    Nimfuehr, W.

    2015-01-01

    IBM Security Intelligence with Analytics of massive data provides exceptional threat and risk detection, combining deep security expertise with analytical insights on a massive scale. For forward-leaning organizations seeking advanced insight into security risks, the IBM solution -- Security Intelligence Platform for massive data -- provides a comprehensive, integrated approach that combines real-time correlation for continuous insight, custom analytics across massive structured and unstructured data, and forensic capabilities for irrefutable evidence. The combination can help you address advanced persistent threats, fraud and insider threats. The IBM solution is designed to widening the scope and scale of investigation, enabling analyzes of any kind of data in any format, such as DNS transactions or full packet capture data to find malicious activity hidden deep in the masses of an organization's data. IBMWatson Explorer provides a unified view displaying all of security relevant information in a portal-like UI. The information analytics system is built around AQL (Annotated query language), a declarative rule language with a familiar SQL-like syntax. AQL supports the paradigm describing data for data with an optional data governance catalogue for massive volumes of data supporting individual views in addition to the pre-defined Document view that holds the textual and label content. An underlying Role-Based Access Control that data protection rules are strictly enforced within the whole architecture. Security at the document, sub-document and record level is built intoWatson Explorer. When Watson Explorer security is implemented, users cannot see information that they would be prohibited from seeing if they were directly logged into the target system. (author)

  19. Information Asymmetry in Federations

    Directory of Open Access Journals (Sweden)

    Alexander Mikhailovich Libman

    2014-12-01

    Full Text Available The paper investigates the problems of information transmission between levels of government in a federal state. The central government in a federation typically faces serious difficulties while collecting information on economic and political situation in the regions. There are two types of problems: lack of incentives for the regions to accurately collect information and strategic manipulation of information, which are discussed in the paper along with possible solutions. In particular, overcoming information asymmetry would require the development of national parties or informal coalitions of bureaucrats and politicians of the center and of the regions, creating incentives for regional politicians to back the successful functioning of the federal level. Furthermore, the paper discusses the issue of «informal decentralization», which emerges as a result of information asymmetry, and its consequences for the functioning of a federal state, including both advantages and disadvantages. We conclude that under information asymmetry the organization of the federation will inevitably turn into an issue of permanent negotiations and bargaining between the center and the regions, which functions as the information acquisition tool for optimal allocation of authorities in a federation

  20. 75 FR 28777 - Information Collection; Financial Information Security Request Form

    Science.gov (United States)

    2010-05-24

    ... Collection; Financial Information Security Request Form AGENCY: Forest Service, USDA. ACTION: Notice; Request... currently approved information collection; Financial Information Security Request Form. DATES: Comments must... Standard Time, Monday through Friday. SUPPLEMENTARY INFORMATION: Title: Financial Information Security...

  1. Information barriers and authentication

    International Nuclear Information System (INIS)

    MacArthur, D.W.; Wolford, J.K.

    2001-01-01

    Acceptance of nuclear materials into a monitoring regime is complicated if the materials are in classified shapes or have classified composition. An attribute measurement system with an information barrier can be emplo,yed to generate an unclassified display from classified measurements. This information barrier must meet two criteria: (1) classified information cannot be released to the monitoring party, and (2) the monitoring party must be convinced that the unclassified output accurately represents the classified input. Criterion 1 is critical to the host country to protect the classified information. Criterion 2 is critical to the monitoring party and is often termed the 'authentication problem.' Thus, the necessity for authentication of a measurement system with an information barrier stems directly from the description of a useful information barrier. Authentication issues must be continually addressed during the entire development lifecycle of the measurement system as opposed to being applied only after the system is built.

  2. COMPETITIVENESS THROUGH INFORMATION

    Directory of Open Access Journals (Sweden)

    Raluca Daniela RIZEA

    2013-10-01

    Full Text Available Intelligence competitiveness has already started to build its road in the company’s long term strategies. Nonetheless, business executives continue to look for ways to apply information technology strategically to their businesses. Using information managers manage to communicate, to convey their knowledge about markets, competitors, products, services and operations. Even if data and information are all over there are few amounts of managers that realize the importance of them to the success of the business. This article will review competitive forces and competitive information systems strategies for gaining competitive advantages, explain concepts of value chain, value co-opetition (competition and cooperation, and discuss innovation strategy. Co-opetition is a strategy whereby companies cooperate and compete at the same time with their competitors, complementors (i.e. hardware and software businesses, customers, suppliers. The article discuss an important dimension of information system, identifies competitive advantages and enhancing competitive strategies thought information systems.

  3. What constitutes information integrity?

    Directory of Open Access Journals (Sweden)

    S. Flowerday

    2008-01-01

    Full Text Available This research focused on what constitutes information integrity as this is a problem facing companies today. Moreover, information integrity is a pillar of information security and is required in order to have a sound security management programme. However, it is acknowledged that 100% information integrity is not currently achievable due to various limitations and therefore the auditing concept of reasonable assurance is adopted. This is in line with the concept that 100% information security is not achievable and the notion that adequate security is the goal, using appropriate countermeasures. The main contribution of this article is to illustrate the importance of and provide a macro view of what constitutes information integrity. The findings are in harmony with Samuel Johnson's words (1751: 'Integrity without knowledge is weak and useless, and knowledge without integrity is dangerous and dreadful.'

  4. What constitutes information integrity?

    Directory of Open Access Journals (Sweden)

    S. Flowerday

    2007-12-01

    Full Text Available This research focused on what constitutes information integrity as this is a problem facing companies today. Moreover, information integrity is a pillar of information security and is required in order to have a sound security management programme. However, it is acknowledged that 100% information integrity is not currently achievable due to various limitations and therefore the auditing concept of reasonable assurance is adopted. This is in line with the concept that 100% information security is not achievable and the notion that adequate security is the goal, using appropriate countermeasures. The main contribution of this article is to illustrate the importance of and provide a macro view of what constitutes information integrity. The findings are in harmony with Samuel Johnson's words (1751: 'Integrity without knowledge is weak and useless, and knowledge without integrity is dangerous and dreadful.'

  5. Metric adjusted skew information

    DEFF Research Database (Denmark)

    Hansen, Frank

    2008-01-01

    ) that vanishes for observables commuting with the state. We show that the skew information is a convex function on the manifold of states. It also satisfies other requirements, proposed by Wigner and Yanase, for an effective measure-of-information content of a state relative to a conserved observable. We...... establish a connection between the geometrical formulation of quantum statistics as proposed by Chentsov and Morozova and measures of quantum information as introduced by Wigner and Yanase and extended in this article. We show that the set of normalized Morozova-Chentsov functions describing the possible......We extend the concept of Wigner-Yanase-Dyson skew information to something we call "metric adjusted skew information" (of a state with respect to a conserved observable). This "skew information" is intended to be a non-negative quantity bounded by the variance (of an observable in a state...

  6. Information services directory

    International Nuclear Information System (INIS)

    1987-05-01

    This Directory will facilitate dissemination of information. It is a reference document that lists the sources of program information available to the states, Indian Tribes, and the public. Chapter 1 describes current program information sources produced by OCRWM and by DOE's Office of Scientific and Technical Information (OSTI). Chapter 2 provides a directory of OCRWM and DOE technical information, and includes descriptions of computerized data bases and other resources. Chapter 3 is an index of OCRWM Headquarters and Project Office contacts, as well as state and Indian Tribe contacts. Chapter 4 enumerates Congressional Committees and Subcommittees that have jurisdiction over various components of the Civilian Radioactive Waste Management Program, and Chapter 5 lists DOE reading rooms, as well as information offices and the public libraries in affected states that are on one or more of OCRWM's mailing lists

  7. Quantum biological information theory

    CERN Document Server

    Djordjevic, Ivan B

    2016-01-01

    This book is a self-contained, tutorial-based introduction to quantum information theory and quantum biology. It serves as a single-source reference to the topic for researchers in bioengineering, communications engineering, electrical engineering, applied mathematics, biology, computer science, and physics. The book provides all the essential principles of the quantum biological information theory required to describe the quantum information transfer from DNA to proteins, the sources of genetic noise and genetic errors as well as their effects. Integrates quantum information and quantum biology concepts; Assumes only knowledge of basic concepts of vector algebra at undergraduate level; Provides a thorough introduction to basic concepts of quantum information processing, quantum information theory, and quantum biology; Includes in-depth discussion of the quantum biological channel modelling, quantum biological channel capacity calculation, quantum models of aging, quantum models of evolution, quantum models o...

  8. Accident management information needs

    International Nuclear Information System (INIS)

    Hanson, D.J.; Ward, L.W.; Nelson, W.R.; Meyer, O.R.

    1990-04-01

    The tables contained in this Appendix A describe the information needs for a pressurized water reactor (PWR) with a large, dry containment. To identify these information needs, the branch points in the safety objective trees were examined to decide what information is necessary to (a) determine the status of the safety functions in the plant, i.e., whether the safety functions are being adequately maintained within predetermined limits, (b) identify plant behavior (mechanisms) or precursors to this behavior which indicate that a challenge to plant safety is occurring or is imminent, and (c) select strategies that will prevent or mitigate this plant behavior and monitor the implementation and effectiveness of these strategies. The information needs for the challenges to the safety functions are not examined since the summation of the information needs for all mechanisms associated with a challenge comprise the information needs for the challenge itself

  9. Accident management information needs

    Energy Technology Data Exchange (ETDEWEB)

    Hanson, D.J.; Ward, L.W.; Nelson, W.R.; Meyer, O.R. (EG and G Idaho, Inc., Idaho Falls, ID (USA))

    1990-04-01

    The tables contained in this Appendix A describe the information needs for a pressurized water reactor (PWR) with a large, dry containment. To identify these information needs, the branch points in the safety objective trees were examined to decide what information is necessary to (a) determine the status of the safety functions in the plant, i.e., whether the safety functions are being adequately maintained within predetermined limits, (b) identify plant behavior (mechanisms) or precursors to this behavior which indicate that a challenge to plant safety is occurring or is imminent, and (c) select strategies that will prevent or mitigate this plant behavior and monitor the implementation and effectiveness of these strategies. The information needs for the challenges to the safety functions are not examined since the summation of the information needs for all mechanisms associated with a challenge comprise the information needs for the challenge itself.

  10. We inform you, you inform us

    CERN Multimedia

    Association du personnel

    2008-01-01

    Our September information meetings have ended and we thank the many people who came. This will allow us to start an extremely useful dialogue that we will continue with the survey announced at these meetings, which is now available. We invite all CERN staff members to reply to this questionnaire to enable us to have an accurate picture of your expectations and wishes with respect to the evolution of social and employment policies.

  11. Information, Technology, and Information Worker Productivity

    OpenAIRE

    Aral, Sinan; Brynjolfsson, Erik; Van Alstyne, Marshall

    2009-01-01

    We econometrically evaluate information worker productivity at a midsize executive recruiting firm and assess whether the knowledge that workers accessed through their electronic communication networks enabled them to multitask more productively. We estimate dynamic panel data models of multitasking, knowledge networks, and productivity using several types of micro-level data: (a) direct observation of more than 125,000 email messages over a period of 10 months; (b) detailed accounting data o...

  12. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  13. Formalized Informal Learning

    DEFF Research Database (Denmark)

    Levinsen, Karin Tweddell; Sørensen, Birgitte Holm

    2013-01-01

    are examined and the relation between network society competences, learners’ informal learning strategies and ICT in formalized school settings over time is studied. The authors find that aspects of ICT like multimodality, intuitive interaction design and instant feedback invites an informal bricoleur approach....... When integrated into certain designs for teaching and learning, this allows for Formalized Informal Learning and support is found for network society competences building....

  14. Quality of Information

    OpenAIRE

    Christensen, Leif

    2016-01-01

    Accounting and auditing is closely related to the quality of data. Two important elements supporting the quality of information are internal controls and materiality. Inspired by Simons (1994), these elements can be considered “basic building blocks”. Internal controls are perhaps the most important element, as they ensure that information used for management purposes has the required quality (Kinney, 2000). This information can be used as a basis for preparing the external ...

  15. Design information verification

    International Nuclear Information System (INIS)

    Johnson, Shirley

    2001-01-01

    The paper provides the bases to complete a Design Information Questionnaire (DIQ) for a research reactor. The IAEA requirements for provision of design information for nuclear facility is described. The role of the provided information for the development of the safeguards approach and for planning of the IAEA's general inspection program for a specific facility is emphasized. Content and preparation of the IAEA DIQ by the State is presented

  16. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  17. Management Information Systems

    OpenAIRE

    Furduescu Bogdan-Alexandru

    2017-01-01

    Technology is the science that studies processes, methods and operations run or applied onto raw materials, matters or data, in order to obtain a certain product. Information is the material signal able to launch a material reaction of a dynamic auto-tuning system for which the system is conditioned and finalized. Information Technology is the technology needed for handling (procuring, processing, storing converting and transmitting) information, in particular, with the use of computers [Long...

  18. Management Information Systems Research.

    Science.gov (United States)

    Research on management information systems is illusive in many respects. Part of the basic research problem in MIS stems from the absence of standard...decision making. But the transition from these results to the realization of ’satisfactory’ management information systems remains difficult indeed. The...paper discusses several aspects of research on management information systems and reviews a selection of efforts that appear significant for future progress. (Author)

  19. 2001 Industry Studies: Information

    Science.gov (United States)

    2001-01-01

    increasingly demand communications, computers, and software for use in the Internet , intranets, and extranets. Information technology (IT) - enabled...As the number of Internet users increases, so does the demand for the rapid deployment of information and telecommunication technologies . The key...proliferation has become uncontrollable. Only then will the US maintain the lead in the IT market . 13 ESSAYS ON MAJOR ISSUES ISSUE: THE INFORMATION TECHNOLOGY

  20. Framing Information Literacy

    OpenAIRE

    Anneke Dirkx

    2016-01-01

    In 2000 the Association of College & Research Libraries (ACRL) published the Standards for Information Literacy. After 15 years these standards were in desperate need of revision. Instead of releasing a revised edition of the Standards, in 2015 ACRL presented a completely new vision on information literacy in higher education. In this keynote we will explore the new ACRL Framework for Information Literacy in all its glory. We will compare it to the old standards. Is this new American Fram...

  1. IAEA safeguards information system

    International Nuclear Information System (INIS)

    Nardi, J.

    1984-01-01

    The basic concepts, structure, and operation of the Agency Safeguards Information System is discussed with respect to its role in accomplishing the overall objectives of safeguards. The basis and purposes of the Agency's information system, the structure and flow of information within the Agency's system, the relationship of the components is the Agency system, the requirements of Member States in respect of their reporting to the Agency, and the relationship of accounting data vis-a-vis facility and inspection data are described

  2. Information Needs/Relevance

    OpenAIRE

    Wildemuth, Barbara M.

    2009-01-01

    A user's interaction with a DL is often initiated as the result of the user experiencing an information need of some kind. Aspects of that experience and how it might affect the user's interactions with the DL are discussed in this module. In addition, users continuously make decisions about and evaluations of the materials retrieved from a DL, relative to their information needs. Relevance judgments, and their relationship to the user's information needs, are discussed in this module. Draft

  3. HOPE information system review

    Science.gov (United States)

    Suzuki, Yoshiaki; Nishiyama, Kenji; Ono, Shuuji; Fukuda, Kouin

    1992-08-01

    An overview of the review conducted on H-2 Orbiting Plane (HOPE) is presented. A prototype model was constructed by inputting various technical information proposed by related laboratories. Especially operation flow which enables understanding of correlation between various analysis items, judgement criteria, technical data, and interfaces with others was constructed. Technical information data base and retrieval systems were studied. A Macintosh personal computer was selected for information shaping because of its excellent function, performance, operability, and software completeness.

  4. Geometric theory of information

    CERN Document Server

    2014-01-01

    This book brings together geometric tools and their applications for Information analysis. It collects current and many uses of in the interdisciplinary fields of Information Geometry Manifolds in Advanced Signal, Image & Video Processing, Complex Data Modeling and Analysis, Information Ranking and Retrieval, Coding, Cognitive Systems, Optimal Control, Statistics on Manifolds, Machine Learning, Speech/sound recognition, and natural language treatment which are also substantially relevant for the industry.

  5. Information Security Audit in e-business applications

    OpenAIRE

    Floarea NASTASE; Pavel NASTASE; Robert SOVA

    2007-01-01

    Electronic business (e-business) are different than other business because it involves any commercial or business activity that takes place by means of electronic facilities (buy and selling online), including on the Internet, proprietary networks and home banking, instead of through direct physical exchange or contact. This system creates an environment that operates at a much greater speed than traditional methods and involves much less paper–based evidence of activities. These e-business...

  6. Future of information architecture

    CERN Document Server

    Baofu, Peter

    2008-01-01

    The Future of Information Architecture examines issues surrounding why information is processed, stored and applied in the way that it has, since time immemorial. Contrary to the conventional wisdom held by many scholars in human history, the recurrent debate on the explanation of the most basic categories of information (eg space, time causation, quality, quantity) has been misconstrued, to the effect that there exists some deeper categories and principles behind these categories of information - with enormous implications for our understanding of reality in general. To understand this, the b

  7. Teaching information seeking

    Directory of Open Access Journals (Sweden)

    Louise Limberg

    2006-01-01

    Full Text Available Introduction. The article argues for a closer association between information seeking research and the practices of teaching information seeking. Findings are presented from a research project on information seeking, didactics and learning (IDOL investigating librarians' and teachers' experiences of teaching information seeking. Method. Thirteen teachers and five librarians, teaching 12-19 year-old students in three schools, participated. Forty-five interviews were conducted over a period of three years. Analysis. The IDOL project adopted a phenomenographic approach with the purpose of describing patterns of variation in experiences. The findings were also analysed by way of relating them to four competing approaches to the mediation of information literacy. Results. A gap was identified between experiences of teaching content that focused on sources and order, and experiences of assessment criteria applied to students' work that focused on the importance of correct facts and the analysis of information. These findings indicate a highly restricted range of teaching contents when compared with the four theoretical approaches to the mediation of information literacy. Conclusion. Teaching information seeking might be enhanced by a wider repertoire of contents reflecting more varied theoretical understanding developed in information seeking research, particularly as regards the importance of content and context related to user perspectives.

  8. Brownfields Site Information

    Data.gov (United States)

    U.S. Environmental Protection Agency — This asset contains all Brownfield facility data. It includes all information necessary to track Brownfields grant recipients' environmental progress at Brownfield...

  9. Credential Application Awaiting Information

    Data.gov (United States)

    Department of Homeland Security — When a Credential application or required documentation is incomplete, an Awaiting Information letter is issued. The application process cannot continue until all...

  10. Information management for clinicians.

    Science.gov (United States)

    Mehta, Neil B; Martin, Stephen A; Maypole, Jack; Andrews, Rebecca

    2016-08-01

    Clinicians are bombarded with information daily by social media, mainstream television news, e-mail, and print and online reports. They usually do not have much control over these information streams and thus are passive recipients, which means they get more noise than signal. Accessing, absorbing, organizing, storing, and retrieving useful medical information can improve patient care. The authors outline how to create a personalized stream of relevant information that can be scanned regularly and saved so that it is readily accessible. Copyright © 2016 Cleveland Clinic.

  11. Airports Geographic Information System -

    Data.gov (United States)

    Department of Transportation — The Airports Geographic Information System maintains the airport and aeronautical data required to meet the demands of the Next Generation National Airspace System....

  12. Quantification of informed opinion

    International Nuclear Information System (INIS)

    Rasmuson, D.M.

    1985-01-01

    The objective of this session, Quantification of Informed Opinion, is to provide the statistician with a better understanding of this important area. The NRC uses informed opinion, sometimes called engineering judgment or subjective judgment, in many areas. Sometimes informed opinion is the only source of information that exists, especially in phenomenological areas, such as steam explosions, where experiments are costly and phenomena are very difficult to measure. There are many degrees of informed opinion. These vary from the weatherman who makes predictions concerning relatively high probability events with a large data base to the phenomenological expert who must use his intuition tempered with basic knowledge and little or no measured data to predict the behavior of events with a low probability of occurrence. The first paper in this session provides the reader with an overview of the subject area. The second paper provides some aspects that must be considered in the collection of informed opinion to improve the quality of the information. The final paper contains an example of the use of informed opinion in the area of seismic hazard characterization. These papers should be useful to researchers and statisticians who need to collect and use informed opinion in their work

  13. Advanced information society (10)

    Science.gov (United States)

    Masuyama, Keiichi

    Informationalization in Japan has spread among various fields of industrial and social life in wide and depth by drastic advancement in technology and networking. Looking at the change in industrial structure as well as international trend in information the Japanese Government regards the role of information and communication technology as infrastructure to be important, and is under the way of constructing various measures with ministries and agencies concerned with them. This paper describes how administrative agencies involved in information and communication such as Ministry of Postal Services, Ministry of International Trade and Industry cope with informationalization, and mentions future direction in information policies.

  14. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... Regulations, Laws & Standards Research & Statistics Business & Manufacturing Small Business ... Performances & Finance Open Government Freedom of Information (FOIA) Inspector General ...

  15. Introduction to information science

    CERN Document Server

    Bawden, David

    2012-01-01

    This landmark textbook takes a whole subject approach to Information Science as a discipline. Introduced by leading international scholars and offering a global perspective on the discipline, this is designed to be the standard text for students worldwide. The authors' expert narrative guides you through each of the essential building blocks of information science offering a concise introduction and expertly chosen further reading and resources.Critical topics covered include:foundations: concepts, theories and historical perspectivesorganising and retrieving Information information behaviour,

  16. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  17. Health Information Systems.

    Science.gov (United States)

    Sirintrapun, S Joseph; Artz, David R

    2015-06-01

    This article provides surgical pathologists an overview of health information systems (HISs): what they are, what they do, and how such systems relate to the practice of surgical pathology. Much of this article is dedicated to the electronic medical record. Information, in how it is captured, transmitted, and conveyed, drives the effectiveness of such electronic medical record functionalities. So critical is information from pathology in integrated clinical care that surgical pathologists are becoming gatekeepers of not only tissue but also information. Better understanding of HISs can empower surgical pathologists to become stakeholders who have an impact on the future direction of quality integrated clinical care. Copyright © 2015 Elsevier Inc. All rights reserved.

  18. Quantum information processing

    National Research Council Canada - National Science Library

    Leuchs, Gerd; Beth, Thomas

    2003-01-01

    ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.5 SimulationofHamiltonians... References... 1 1 1 3 5 8 10 2 Quantum Information Processing and Error Correction with Jump Codes (G. Alber, M. Mussinger...

  19. EDIS Investigation Filing Information

    Data.gov (United States)

    US International Trade Commission — This dataset contains investigation, document and attachment metadata from the USITC's Electronic Document Information System (EDIS), as well as access to attached...

  20. Car monitoring information systems

    Directory of Open Access Journals (Sweden)

    Alica KALAŠOVÁ

    2008-01-01

    Full Text Available The objective of this contribution is to characterize alternatives of information systems used for managing, processing and evaluation of information related to company vehicles. Especially we focus on logging, transferring and processing of on-road vehicle movement information in inland and international transportation. This segment of company information system has to monitor the car movement – actively or passively – according to demand of the company and after the processing it has to evaluate and give the complex monitoring of a situation of all the company vehicles to the controller.

  1. Information, conservation and retrieval

    Energy Technology Data Exchange (ETDEWEB)

    Eng, T [Swedish Nuclear Fuel and Waste Management Co., Stockholm (Sweden); Norberg, E [National Swedish Archives, Stockholm (Sweden); Torbacke, J [Stockholm Univ. (Sweden). Dept. of History; Jensen, M [Swedish Radiation Protection Inst., Stockholm (Sweden)

    1996-12-01

    The seminar took place on the Swedish ship for transportation of radioactive wastes, M/S Sigyn, which at summer time is used for exhibitions. The seminar treated items related to general information needs in society and questions related to radioactive waste, i.e. how knowledge about a waste repository should be passed on to future generations. Three contributions are contained in the report from the seminar and are indexed separately: `Active preservation - otherwise no achieves`; `The conservation and dissemination of information - A democratic issue`; and, `Conservation and retrieval of information - Elements of a strategy to inform future societies about nuclear waste repositories`.

  2. Sustainability of scholarly information

    CERN Document Server

    Chowdhury, G G

    2015-01-01

    Professor Gobinda Chowdhury BSc Hons, MSc, PhD, FCLIP is Professor in Information Science at iSchool@northumbria, and Head of the Department of Mathematics and Information Sciences at Northumbria University. Before joining Northumbria University he was a Professor and Director of the Centre for Information and Knowledge Management at the University of Technology Sydney, Australia. For over 25 years he has worked as an academic and researcher in information science in different parts of the world including Asia, Africa, Europe and Australia. For the past few years he has been actively involved

  3. Integrated Information Management (IIM)

    National Research Council Canada - National Science Library

    McIlvain, Jason

    2007-01-01

    Information Technology is the core capability required to align our resources and increase our effectiveness on the battlefield by integrating and coordinating our preventative measures and responses...

  4. Information, conservation and retrieval

    International Nuclear Information System (INIS)

    Eng, T.; Norberg, E.; Torbacke, J.

    1996-12-01

    The seminar took place on the Swedish ship for transportation of radioactive wastes, M/S Sigyn, which at summer time is used for exhibitions. The seminar treated items related to general information needs in society and questions related to radioactive waste, i.e. how knowledge about a waste repository should be passed on to future generations. Three contributions are contained in the report from the seminar and are indexed separately: 'Active preservation - otherwise no achieves'; 'The conservation and dissemination of information - A democratic issue'; and, 'Conservation and retrieval of information - Elements of a strategy to inform future societies about nuclear waste repositories'

  5. International Atomic Energy Agency Annual Report 2010 [Spanish Version]; Informe Anual del OIEA para 2010

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    The Annual Report 2010 aims to summarize only the significant activities of the Agency during the year in question The main part of the report, starting on page 17, generally follows the programme structure as given in The Agency's Programme and Budget 2010-2011 (GC(53)/5). The introductory chapter, 'Overview', seeks to provide a thematic analysis of the Agency's activities within the context of notable developments during the year More detailed information can be found in the latest editions of the Agency's Nuclear Safety Review, Nuclear Technology Review, Technical Cooperation Report and the Safeguards Statement and Background to the Safeguards Statement and Summary. For the convenience of readers, these documents are available on the CD-ROM attached to the inside back cover of this report. Additional information covering various aspects of the Agency's programme is provided on the attached CD-ROM and is also available on the Agency's web site at http://www.iaea.org./Publications/ Reports/index.html. Except where indicated, all sums of money are expressed in United States dollars. The designations employed and the presentation of material in this report do not imply the expression of any opinion whatsoever on the part of the Secretariat concerning the legal status of any country or territory or of its authorities, or concerning the delimitation of its frontiers. The mention of names of specific companies or products (whether or not indicated as registered) does not imply any intention to infringe proprietary rights, nor should it be construed as an endorsement or recommendation on the part of the Agency. The term 'non-nuclear-weapon State' is used as in the Final Document of the 1968 Conference of Non-Nuclear-Weapon States (United Nations document A/7277) and in the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) The term 'nuclear weapon State' is as used in the NPT.

  6. Fundamentals of quantum information

    International Nuclear Information System (INIS)

    Zeilinger, A.

    1998-01-01

    The fact that information is physical means that the laws of quantum mechanics can be used to process and transmit it in ways that are not possible with existing systems. Ever since its invention in the 1920s, quantum physics has given rise to countless discussions about its meaning and about how to interpret the theory correctly. These discussions focus on issues like the Einstein-Podolsky-Rosen paradox, quantum non-locality and the role of measurement in quantum physics. In recent years, however, research into the very foundations of quantum mechanics has also led to a new field quantum information technology. The use of quantum physics could revolutionize the way we communicate and process information. The important new observation is that information is not independent of the physical laws used to store and processes it (see Landauer in further reading). Although modern computers rely on quantum mechanics to operate, the information itself is still encoded classically. A new approach is to treat information as a quantum concept and to ask what new insights can be gained by encoding this information in individual quantum systems. In other words, what happens when both the transmission and processing of information are governed by quantum laws? (UK)

  7. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... main content Languages 简体中文 English Bahasa Indonesia 한국어 Español ภาษาไทย Tiếng Việt Text Size: Decrease Font Increase ... Monoxide Information Center Carbon Monoxide Information Center En Español The Invisible Killer Carbon monoxide, also known as ...

  8. Science and information theory

    CERN Document Server

    Brillouin, Léon

    1962-01-01

    A classic source for exploring the connections between information theory and physics, this text is geared toward upper-level undergraduates and graduate students. The author, a giant of 20th-century mathematics, applies the principles of information theory to a variety of issues, including Maxwell's demon, thermodynamics, and measurement problems. 1962 edition.

  9. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... Information (FOIA) Inspector General No Fear Act Data USA.gov Report an Unsafe Product Contact Us: 800- ... Budget & Performance Open Government Freedom of Information (FOIA) USA.gov CPSC.gov is the U.S. government's official ...

  10. information manger-2012-editedx

    African Journals Online (AJOL)

    Library _info_Sc_ 1

    much as possible to exploit the benefits brought by information and communication technologies (ICTs) as an alternative to its services and for easy access, retrieval and dissemination of information to it users. Introduction. The Northern Nigerian area has been one of the earliest regions of West Africa with a literary tradition ...

  11. Archival Information Management System.

    Science.gov (United States)

    1995-02-01

    management system named Archival Information Management System (AIMS), designed to meet the audit trail requirement for studies completed under the...are to be archived to the extent that future reproducibility and interrogation of results will exist. This report presents a prototype information

  12. Anthropology and nuclear information

    International Nuclear Information System (INIS)

    Van Nuffelen, D.

    1994-01-01

    In this article is sketched a paradigm which permits to envisage nuclear information as an anthropologic problem. The author modelizes public information by a general theory of exchange. For him the most urgent problem is to refounding the circulation between the different components of social system. 3 figs,. 2 tabs,. 12 refs

  13. Credit Market Information Feedback

    OpenAIRE

    Balasubramanyan, Lakshmi; Craig, Ben R.; Thomson, James B.; Zaman, Saeed

    2015-01-01

    We examine how a combination of credit market and asset quality information can jointly be used in assessing bank franchise value. We find that expectations of future credit demand and future asset quality explain contemporaneous bank franchise value, indicative of the feedback in credit market information and its consequent impact on bank franchise value.

  14. Investigating Music Information Objects

    Science.gov (United States)

    Weissenberger, Lynnsey K.

    2016-01-01

    This dissertation, titled "Investigating Music Information Objects," is a study of the nature, description, representations, and ideas related to music information objects (MIOs). This research study investigates how music practitioners from various traditions describe and conceptualize MIOs, using a theoretical framework to classify…

  15. Evolution of information systems

    DEFF Research Database (Denmark)

    Kristensen, Jan

    2000-01-01

    This article offers a dynamic view of continuously changes in a specific informational system illustrated through a case study in a small network company. Central aspects of the evolutionary process will be identified and framed in relation to the informational system change. It will be argued th...

  16. Hybrid quantum information processing

    Energy Technology Data Exchange (ETDEWEB)

    Furusawa, Akira [Department of Applied Physics, School of Engineering, The University of Tokyo (Japan)

    2014-12-04

    I will briefly explain the definition and advantage of hybrid quantum information processing, which is hybridization of qubit and continuous-variable technologies. The final goal would be realization of universal gate sets both for qubit and continuous-variable quantum information processing with the hybrid technologies. For that purpose, qubit teleportation with a continuousvariable teleporter is one of the most important ingredients.

  17. Summary information report

    International Nuclear Information System (INIS)

    1982-07-01

    The Summary Information Report (SIR) provides summary data concerning NRC and its licensees for general use by the Chairman, other Commissioners and Commission staff offices, the Executive Director for Operations, and the Office Directors. SIR is published quarterly by the Management Information Branch (49-27834) of the Office of Resource Management

  18. Lean information management

    NARCIS (Netherlands)

    Hammer, D.K.

    1997-01-01

    The concept of a Lean Enterprise has proven to be extremely valuable for making companies fit for today's competitive business environment. Lean Information Management denotes the type of information management that is appropriate for such all organization. According to the paradigm of a Lean

  19. Makerspaces in Informal Settings

    Science.gov (United States)

    Brown, Ryan A.; Antink-Meyer, Allison

    2017-01-01

    The maker movement, with its focus on-hands on learning through creating with familiar materials, has seen growth in both formal and informal learning spaces. This article examines three informal learning spaces that have redesigned their space (or a portion of it) to accommodate several tenets of the maker movement and in various ways have become…

  20. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  1. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... United States government. Website Feedback Connect with Us: Facebook Instagram YouTube Twitter Blog SlideShare GooglePlus Flickr Report an Unsafe Product Subscribe to CPSC News and Information Sitemap RSS E-mail Accessibility Privacy Policy Budget & Performance Open Government Freedom of Information ( ...

  2. Information or communication

    DEFF Research Database (Denmark)

    Dahms, Mona-Lisa

    2004-01-01

    The paper describes the development in Tanzania, in terms of information and communication technologies and how these developments have influenced people's daily life.......The paper describes the development in Tanzania, in terms of information and communication technologies and how these developments have influenced people's daily life....

  3. Slavery and information

    NARCIS (Netherlands)

    Dari-Mattiacci, G.

    2013-01-01

    This article shows how asymmetric information shaped slavery by determining the likelihood of manumission. A theoretical model explains the need to offer positive incentives to slaves working in occupations characterized by a high degree of asymmetric information. As a result, masters freed (and,

  4. Hybrid wars’ information component

    Directory of Open Access Journals (Sweden)

    T. A. Nevskaya

    2015-01-01

    Full Text Available The war of the new generation - hybrid war, the information component which is directed not so much on the direct destruction of the enemy, how to achieve the goals without warfare. Fighting in the information field is no less important than immediate military action.

  5. Constructor theory of information

    Science.gov (United States)

    Deutsch, David; Marletto, Chiara

    2015-01-01

    We propose a theory of information expressed solely in terms of which transformations of physical systems are possible and which are impossible—i.e. in constructor-theoretic terms. It includes conjectured, exact laws of physics expressing the regularities that allow information to be physically instantiated. Although these laws are directly about information, independently of the details of particular physical instantiations, information is not regarded as an a priori mathematical or logical concept, but as something whose nature and properties are determined by the laws of physics alone. This theory solves a problem at the foundations of existing information theory, namely that information and distinguishability are each defined in terms of the other. It also explains the relationship between classical and quantum information, and reveals the single, constructor-theoretic property underlying the most distinctive phenomena associated with the latter, including the lack of in-principle distinguishability of some states, the impossibility of cloning, the existence of pairs of variables that cannot simultaneously have sharp values, the fact that measurement processes can be both deterministic and unpredictable, the irreducible perturbation caused by measurement, and locally inaccessible information (as in entangled systems). PMID:25663803

  6. Post-socialist Informalities

    DEFF Research Database (Denmark)

    to understand and explain informality, while also debating its relationship with the market and society. The authors seek to explain informality beyond a mere monetaristic/economistic approach, rediscovering its interconnection with social phenomena to propose a more holistic interpretation of the meaning...

  7. Information extraction system

    Science.gov (United States)

    Lemmond, Tracy D; Hanley, William G; Guensche, Joseph Wendell; Perry, Nathan C; Nitao, John J; Kidwell, Paul Brandon; Boakye, Kofi Agyeman; Glaser, Ron E; Prenger, Ryan James

    2014-05-13

    An information extraction system and methods of operating the system are provided. In particular, an information extraction system for performing meta-extraction of named entities of people, organizations, and locations as well as relationships and events from text documents are described herein.

  8. Marketing Information Literacy

    Science.gov (United States)

    Seale, Maura

    2013-01-01

    In 2012, more than a decade after the original Association of College and Research Libraries (ACRL) Information Literacy Competency Standards for Higher Education (hereafter the Standards) were institutionalized as the goal of academic library instruction, the Information Literacy Competency Standards Review Task Force convened by ACRL recommended…

  9. Institutionalizing Information Literacy

    Science.gov (United States)

    Weiner, Sharon A.

    2012-01-01

    There is increasing recognition that information literacy is essential for individual and community empowerment, workforce readiness, and global competitiveness. However, there is a history of difficulty in integrating information literacy with the postsecondary educational process. This paper posits that a greater understanding of the…

  10. Public information strategies

    International Nuclear Information System (INIS)

    Waldahl, R.

    1995-01-01

    The Chernobyl accident in 1986 uncovered serious information problems in many Western countries, and started a debate on crisis communication and information strategies in relation to radiation danger in society. The information problem focuses on four main perspectives. The first is related to information as a persuasion process in which an efficient strategy would influence both the public's knowledge of radiation danger, their attitude towards it and their behaviour. The second perspective calls attention to the importance of the different elements of the information process. How important are different characteristics of the information source; the message itself, and the receiver? The third perspective concentrates on different types of information. What is this issue all about, why is the situation as it is, and how should people behave to protect themselves? The fourth perspective points to the various phases of a crisis. The information needed is obviously not the same in the period before a crisis emerges when no one knows what is going to happen, in the warning period when one knows that something may happen, and during the crisis itself. (Author)

  11. The nature of information

    Science.gov (United States)

    Tpudlik

    2015-11-01

    In reply to Mark Buchanan's review of César Hidalgo's book How Information Grows (“The wealth of nations”, October pp40-41, http://ow.ly/SlqN3), in which Hidalgo argues that we need an “information-centric” view of economic growth.

  12. ISRIC - World Soil Information

    NARCIS (Netherlands)

    Dent, D.L.

    2006-01-01

    ISRICWorld Soil Information is an independent foundation, funded by the Netherlands Government with a mandate to increase knowledge of the land, its soils in particular, and to support the sustainable use of land resources; in short, to help people understand soils. Its aims are to -Inform and

  13. The Information Age?

    Science.gov (United States)

    MacVicar, Margaret L. A.

    1985-01-01

    The author examines the concept of information and how it relates to our future. She discusses the various waves of information about education: the decay of technology and the raid on educational institutions for brainpower made by business and industry, foreign competition, and the quality of education. (CT)

  14. Information Retrieval in Physics.

    Science.gov (United States)

    Herschman, Arthur

    Discussed in this paper are the information problems in physics and the current program of the American Institute of Physics (AIP) being conducted in an attempt to develop an information retrieval system. The seriousness of the need is described by means of graphs indicating the exponential rise in the number of physics publications in the last…

  15. INFORMATION AND COMMUNICATION

    African Journals Online (AJOL)

    USER

    legislators have to be ICT compliant so that they can utilize the services of their libraries and information centres to the fullest capacity. Introduction ... engagement in collaborative efforts with other libraries and information centres within ... economic, political and other civic activities that takes place in the country for which the.

  16. Information and Rural Development.

    Science.gov (United States)

    Storm, Bonnie L.

    1982-01-01

    Outlines approaches taken to development in lesser developed countries in the past, discusses the importance of appropriate technology and human development, and summarizes the information needs of the rural poor in developing nations. Information dissemination programs using video- and audiotape technology in Bangladesh, Guatemala, and Peru are…

  17. A Mine of Information.

    Science.gov (United States)

    Williams, Lisa B.

    1986-01-01

    Business researchers and marketers find certain databases useful for finding information on investments, competitors, products, and markets. Colleges can use these same databases to get background on corporate prospects. The largest data source available, DIALOG Information Services and some other databases are described. (MLW)

  18. Strengthening Health Information Services

    Science.gov (United States)

    Haro, A. S.

    1977-01-01

    Discusses the need to apply modern scientific management to health administration in order to effectively manage programs utilizing increased preventive and curative capabilities. The value of having maximum information in order to make decisions, and problems of determining information content are reviewed. For journal availability, see SO 506…

  19. Medical Information Management System

    Science.gov (United States)

    Alterescu, S.; Hipkins, K. R.; Friedman, C. A.

    1979-01-01

    On-line interactive information processing system easily and rapidly handles all aspects of data management related to patient care. General purpose system is flexible enough to be applied to other data management situations found in areas such as occupational safety data, judicial information, or personnel records.

  20. Personal Information Request Form

    International Development Research Centre (IDRC) Digital Library (Canada)

    PC Forms Inc. 834-4048

    To apply for information under the Privacy Act, complete this form or a written request mentioning the Act. Describe the information being sought and provide any relevant details necessary to help the. International Development Research Centre. (IDRC) find it. If you require assistance, refer to. Info Source (Sources of ...

  1. Information. Mapping the money.

    Science.gov (United States)

    Cowper, Andy

    2006-03-16

    Dr Foster Intelligence aims to improve the use and accessibility of information to offer people more control over their care. It will also provide management with the information required to make effective business decisions. The new service will be 'taking advantage of private-sector expertise for public-sector advantage.

  2. Air System Information Management

    Science.gov (United States)

    Filman, Robert E.

    2004-01-01

    I flew to Washington last week, a trip rich in distributed information management. Buying tickets, at the gate, in flight, landing and at the baggage claim, myriad messages about my reservation, the weather, our flight plans, gates, bags and so forth flew among a variety of travel agency, airline and Federal Aviation Administration (FAA) computers and personnel. By and large, each kind of information ran on a particular application, often specialized to own data formats and communications network. I went to Washington to attend an FAA meeting on System-Wide Information Management (SWIM) for the National Airspace System (NAS) (http://www.nasarchitecture.faa.gov/Tutorials/NAS101.cfm). NAS (and its information infrastructure, SWIM) is an attempt to bring greater regularity, efficiency and uniformity to the collection of stovepipe applications now used to manage air traffic. Current systems hold information about flight plans, flight trajectories, weather, air turbulence, current and forecast weather, radar summaries, hazardous condition warnings, airport and airspace capacity constraints, temporary flight restrictions, and so forth. Information moving among these stovepipe systems is usually mediated by people (for example, air traffic controllers) or single-purpose applications. People, whose intelligence is critical for difficult tasks and unusual circumstances, are not as efficient as computers for tasks that can be automated. Better information sharing can lead to higher system capacity, more efficient utilization and safer operations. Better information sharing through greater automation is possible though not necessarily easy.

  3. Intelligent medical information filtering.

    Science.gov (United States)

    Quintana, Y

    1998-01-01

    This paper describes an intelligent information filtering system to assist users to be notified of updates to new and relevant medical information. Among the major problems users face is the large volume of medical information that is generated each day, and the need to filter and retrieve relevant information. The Internet has dramatically increased the amount of electronically accessible medical information and reduced the cost and time needed to publish. The opportunity of the Internet for the medical profession and consumers is to have more information to make decisions and this could potentially lead to better medical decisions and outcomes. However, without the assistance from professional medical librarians, retrieving new and relevant information from databases and the Internet remains a challenge. Many physicians do not have access to the services of a medical librarian. Most physicians indicate on surveys that they do not prefer to retrieve the literature themselves, or visit libraries because of the lack of recent materials, poor organisation and indexing of materials, lack of appropriate and available material, and lack of time. The information filtering system described in this paper records the online web browsing behaviour of each user and creates a user profile of the index terms found on the web pages visited by the user. A relevance-ranking algorithm then matches the user profiles to the index terms of new health care web pages that are added each day. The system creates customised summaries of new information for each user. A user can then connect to the web site to read the new information. Relevance feedback buttons on each page ask the user to rate the usefulness of the page to their immediate information needs. Errors in relevance ranking are reduced in this system by having both the user profile and medical information represented in the same representation language using a controlled vocabulary. This system also updates the user profiles

  4. Canonical Information Analysis

    DEFF Research Database (Denmark)

    Vestergaard, Jacob Schack; Nielsen, Allan Aasbjerg

    2015-01-01

    is replaced by the information theoretical, entropy based measure mutual information, which is a much more general measure of association. We make canonical information analysis feasible for large sample problems, including for example multispectral images, due to the use of a fast kernel density estimator......Canonical correlation analysis is an established multivariate statistical method in which correlation between linear combinations of multivariate sets of variables is maximized. In canonical information analysis introduced here, linear correlation as a measure of association between variables...... for entropy estimation. Canonical information analysis is applied successfully to (1) simple simulated data to illustrate the basic idea and evaluate performance, (2) fusion of weather radar and optical geostationary satellite data in a situation with heavy precipitation, and (3) change detection in optical...

  5. Energy Information Directory 1991

    International Nuclear Information System (INIS)

    1992-01-01

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff as well as other Department of Energy (DOE) staff, in directing inquires to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory is a list of most Government offices and trade associations that are involved in energy matters. It does not include those DOE offices which do not deal with the public or public information

  6. Micro Information Systems

    DEFF Research Database (Denmark)

    Ulslev Pedersen, Rasmus; Kühn Pedersen, Mogens

    2014-01-01

    such as medical and manufacturing. These new sensor applications have implications for information systems (IS) and, the authors visualize this new class of information systems as fractals growing from an established class of systems; namely that of information systems (IS). The identified applications...... and implications are used as an empirical basis for creating a model for these small new information systems. Such sensor systems are called embedded systems in the technical sciences, and the authors want to couple it with general IS. They call the merger of these two important research areas (IS and embedded...... systems) for micro information systems (micro-IS). It is intended as a new research field within IS research. An initial framework model is established, which seeks to capture both the possibilities and constraints of this new paradigm, while looking simultaneously at the fundamental IS and ICT aspects...

  7. Training and information

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    The Training and Information Division provides centralized direction and coordination for the training and information activities of the Center for Energy and Environment Research (formerly Puerto Rico Nuclear Center). The Division Head serves as Educational Officer, Technical Information Officer, and Public Information Officer. Training responsibilities include registering students; maintaining centralized records on training activities; preparing reports for ERDA; scheduling the utilization of training facilities; providing audiovisual equipment; assisting in the preparation of courses, seminars, symposia, and meetings; administering fellowship programs; and providing personal assistance to students in matters such as housing and immigration. The Division Head represents the Director on the Admissions Committee. Information responsibilities include preparation of manuscripts for ERDA patent clearance and publication release, maintenance of central files on all manuscripts and publications, preparation of the Annual Report, providing editorial and translation assistance, operation of a Technical Reading Room, operation of an ERDA Film Library, operation of a Reproduction Shop, providing copying services, and assisting visitors

  8. Physics as Information Processing

    International Nuclear Information System (INIS)

    D'Ariano, Giacomo Mauro

    2011-01-01

    I review some recent advances in foundational research at Pavia QUIT group. The general idea is that there is only Quantum Theory without quantization rules, and the whole Physics - including space-time and relativity - is emergent from the quantum-information processing. And since Quantum Theory itself is axiomatized solely on informational principles, the whole Physics must be reformulated in information-theoretical terms: this is the It from bit of J. A. Wheeler.The review is divided into four parts: a) the informational axiomatization of Quantum Theory; b) how space-time and relativistic covariance emerge from quantum computation; c) what is the information-theoretical meaning of inertial mass and of (ℎ/2π), and how the quantum field emerges; d) an observational consequence of the new quantum field theory: a mass-dependent refraction index of vacuum. I will conclude with the research lines that will follow in the immediate future.

  9. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  10. Interactive Information Retrieval:

    DEFF Research Database (Denmark)

    Borlund, Pia

    IIR from the perspective of search dedication and task load in order to also include everyday life information seeking? With this presentation, the IIR community is invited to an exchange of ideas and is encouraged to engage in collaborations with the solving of these (and other) issues to our joint......This presentation addresses methodological issues of interactive information retrieval (IIR) evaluation in terms of what it entails to study users' use and interaction with IR systems, as well as their satisfaction with retrieved information. In particular, the presentation focuses on test design...... of the users to ensure a complete and realistic picture to enhance our understanding of IIR. The presentation also reflects on whether a re-thinking of the concept on an information need is necessary. One may ask whether it still makes sense to talk about types of information needs. Or should we rather study...

  11. Information Technology Resources Assessment

    Energy Technology Data Exchange (ETDEWEB)

    1993-04-01

    The Information Technology Resources Assessment (ITRA) is being published as a companion document to the Department of Energy (DOE) FY 1994--FY 1998 Information Resources Management Long-Range Plan. This document represents a collaborative effort between the Office of Information Resources Management and the Office of Energy Research that was undertaken to achieve, in part, the Technology Strategic Objective of IRM Vision 21. An integral part of this objective, technology forecasting provides an understanding of the information technology horizon and presents a perspective and focus on technologies of particular interest to DOE program activities. Specifically, this document provides site planners with an overview of the status and use of new information technology for their planning consideration.

  12. Quality of Information

    DEFF Research Database (Denmark)

    Christensen, Leif

    2016-01-01

    Accounting and auditing is closely related to the quality of data. Two important elements supporting the quality of information are internal controls and materiality. Inspired by Simons (1994), these elements can be considered “basic building blocks”. Internal controls are perhaps the most...... important element, as they ensure that information used for management purposes has the required quality (Kinney, 2000). This information can be used as a basis for preparing the external financial reporting (COSO, 2013) and as a prerequisite for establishing information-based management control systems...... (MCS) (Simons, 1994). When regarding management controls as a package, internal controls are part of the administrative controls and often formalised in policies and procedures (Malmi and Brown, 2008). The level of controls should be guided by the need for reliable information. These considerations...

  13. Information and Heterogeneous Beliefs

    DEFF Research Database (Denmark)

    Christensen, Peter Ove; Qin, Zhenjiang

    2014-01-01

    In an incomplete market with heterogeneous prior beliefs, we show public information can have a substantial impact on the ex ante cost of capital, trading volume, and investor welfare. The Pareto effcient public information system is the system enjoying the maximum ex ante cost of capital...... and the maximum expected abnormal trading volume. Imperfect public information increases the gains-to-trade based on heterogeneously updated posterior beliefs. In an exchange economy, this leads to higher growth in the investors' certainty equivalents and, thus, a higher equilibrium interest rate, whereas the ex...... ante risk premium is unaffected by the informativeness of the public information system. Similar results are obtained in a production economy, but the impact on the ex ante cost of capital is dampened compared to the exchange economy due to welfare improving reductions in real investments to smooth...

  14. Energy information directory 1994

    Energy Technology Data Exchange (ETDEWEB)

    1994-03-28

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory is a list of most Government offices and trade associations that are involved in energy matters. It does not include those DOE offices which do not deal with the public or public information.

  15. 77 FR 52026 - Application for Final Commitment for a Long-term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-08-28

    ... notice does not include confidential or proprietary business information; information which, if disclosed... supplying information that competitors could use to compete with companies in the United States. DATES...

  16. 77 FR 62236 - Application for Final Commitment for a Long-term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-10-12

    ... not include confidential or proprietary business information; information which, if disclosed, would... supplying information that competitors could use to compete with companies in the United States. DATES...

  17. 77 FR 52025 - Application for Final Commitment for a Long-term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-08-28

    ... notice does not include confidential or proprietary business information; information which, if disclosed... supplying information that competitors could use to compete with companies in the United States. DATES...

  18. 77 FR 74846 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-12-18

    ... notice does not include confidential or proprietary business information; information which, if disclosed... supplying information that competitors could use to compete with companies in the United States. DATES...

  19. Next generation information systems

    Energy Technology Data Exchange (ETDEWEB)

    Limback, Nathan P [Los Alamos National Laboratory; Medina, Melanie A [Los Alamos National Laboratory; Silva, Michelle E [Los Alamos National Laboratory

    2010-01-01

    The Information Systems Analysis and Development (ISAD) Team of the Safeguards Systems Group at Los Alamos National Laboratory (LANL) has been developing web based information and knowledge management systems for sixteen years. Our vision is to rapidly and cost effectively provide knowledge management solutions in the form of interactive information systems that help customers organize, archive, post and retrieve nonproliferation and safeguards knowledge and information vital to their success. The team has developed several comprehensive information systems that assist users in the betterment and growth of their organizations and programs. Through our information systems, users are able to streamline operations, increase productivity, and share and access information from diverse geographic locations. The ISAD team is also producing interactive visual models. Interactive visual models provide many benefits to customers beyond the scope of traditional full-scale modeling. We have the ability to simulate a vision that a customer may propose, without the time constraints of traditional engineering modeling tools. Our interactive visual models can be used to access specialized training areas, controlled areas, and highly radioactive areas, as well as review site-specific training for complex facilities, and asset management. Like the information systems that the ISAD team develops, these models can be shared and accessed from any location with access to the internet. The purpose of this paper is to elaborate on the capabilities of information systems and interactive visual models as well as consider the possibility of combining the two capabilities to provide the next generation of infonnation systems. The collection, processing, and integration of data in new ways can contribute to the security of the nation by providing indicators and information for timely action to decrease the traditional and new nuclear threats. Modeling and simulation tied to comprehensive

  20. Information als Prozess

    Directory of Open Access Journals (Sweden)

    Diether Elstner

    2010-10-01

    Full Text Available A unified definition of the phenomenon information is not possible at present, because of the enormous number of different views. The situation is increased by the 'Capurro‘s trilemma' which postulates the logical impossibility of a unified concept of information. There are two approaches in the literature, which aim to solve the trilemma. The first approach avoids collision with the trilemma through the introduction of a generalized parameter to form rules of language for information systems. The second approach is understood as a draft of a generalized understanding of information within a yet to be developed unified information science. This article presents the approach of understanding information as an instantaneous process, which effects changes in systems. These changes must be captured and reproduced by the organization of the system, otherwise they get lost by fluctuations. Information in this reductionist conception is possible in each system, under the assumption, that it has several stable states, which alternatively may be assumed by the system . The 'Capurro‘s trilemma' is negated.

  1. Acting to gain information

    Science.gov (United States)

    Rosenchein, Stanley J.; Burns, J. Brian; Chapman, David; Kaelbling, Leslie P.; Kahn, Philip; Nishihara, H. Keith; Turk, Matthew

    1993-01-01

    This report is concerned with agents that act to gain information. In previous work, we developed agent models combining qualitative modeling with real-time control. That work, however, focused primarily on actions that affect physical states of the environment. The current study extends that work by explicitly considering problems of active information-gathering and by exploring specialized aspects of information-gathering in computational perception, learning, and language. In our theoretical investigations, we analyzed agents into their perceptual and action components and identified these with elements of a state-machine model of control. The mathematical properties of each was developed in isolation and interactions were then studied. We considered the complexity dimension and the uncertainty dimension and related these to intelligent-agent design issues. We also explored active information gathering in visual processing. Working within the active vision paradigm, we developed a concept of 'minimal meaningful measurements' suitable for demand-driven vision. We then developed and tested an architecture for ongoing recognition and interpretation of visual information. In the area of information gathering through learning, we explored techniques for coping with combinatorial complexity. We also explored information gathering through explicit linguistic action by considering the nature of conversational rules, coordination, and situated communication behavior.

  2. Ignorance, information and autonomy.

    Science.gov (United States)

    Harris, J; Keywood, K

    2001-09-01

    People have a powerful interest in genetic privacy and its associated claim to ignorance, and some equally powerful desires to be shielded from disturbing information are often voiced. We argue, however, that there is no such thing as a right to remain in ignorance, where a fight is understood as an entitlement that trumps competing claims. This does not of course mean that information must always be forced upon unwilling recipients, only that there is no prima facie entitlement to be protected from true or honest information about oneself. Any claims to be shielded from information about the self must compete on equal terms with claims based in the rights and interests of others. In balancing the weight and importance of rival considerations about giving or withholding information, if rights claims have any place, rights are more likely to be defensible on the side of honest communication of information rather than in defence of ignorance. The right to free speech and the right to decline to accept responsibility to take decisions for others imposed by those others seem to us more plausible candidates for fully fledged rights in this field than any purported right to ignorance. Finally, and most importantly, if the right to autonomy is invoked, a proper understanding of the distinction between claims to liberty and claims to autonomy show that the principle of autonomy, as it is understood in contemporary social ethics and English law, supports the giving rather than the withholding of information in most circumstances.

  3. Accessibility and inclusion informational

    Directory of Open Access Journals (Sweden)

    Mônica Sena de Souza

    2013-06-01

    Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.

  4. Information disclosure on transport

    International Nuclear Information System (INIS)

    Kubo, M.

    1998-01-01

    In Japan, the transport of nuclear fuel materials strictly meets the above international convention and domestic regulations as well. Information on the transport of nuclear fuel materials within the country and between the country and foreign countries is treated carefully. Nuclear fuel materials are categorized for transport and are physically protected accordingly. Certain transportation information is treated with special precautions, including prior arrangements among sender, recipient and carrier, and prior agreement between entities subject to the jurisdiction and regulation of supplier and recipient countries. In the case of international transport, this information includes specifying time, place and procedures for transferring transport and responsibility. (O.M.)

  5. Reframing information architecture

    CERN Document Server

    Resmini, Andrea

    2014-01-01

    Information architecture has changed dramatically since the mid-1990s and earlier conceptions of the world and the internet being different and separate have given way to a much more complex scenario in the present day. In the post-digital world that we now inhabit the digital and the physical blend easily and our activities and usage of information takes place through multiple contexts and via multiple devices and unstable, emergent choreographies. Information architecture now is steadily growing into a channel- or medium-specific multi-disciplinary framework, with contributions coming from a

  6. Future Information Technology

    CERN Document Server

    Stojmenovic, Ivan; Choi, Min; Xhafa, Fatos; FutureTech 2013

    2014-01-01

    Future technology information technology stands for all of continuously evolving and converging information technologies, including digital convergence, multimedia convergence, intelligent applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, semantic web, user experience and HCI, security and trust computing and so on, for satisfying our ever-changing needs. In past twenty five years or so, Information Technology (IT) influenced and changed every aspect of our lives and our cultures. These proceedings foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization.

  7. Interviews with information receivers

    International Nuclear Information System (INIS)

    1997-11-01

    The Waste Policy Institute (WPI), through a cooperative agreement with the U.S. Department of Energy's (DOE) Office of Science and Technology (OST), conducted telephone interviews with people who requested OST publications to better understand why they wanted information from OST, how they used the information, and whether the information met their needs. Researchers selected 160 people who requested one of the two OST publications-either the Technology Summary Series (Rainbow Books) or the Initiatives newsletter. Of the 160 selected, interviewers spoke with 79 people nationwide representing six stakeholder audience categories

  8. Relying on the Information

    Directory of Open Access Journals (Sweden)

    TK YAYIN KURULU

    2013-11-01

    Full Text Available The editorial discusses internet filtering in the light of the optional internet packages for users, namely Family, Standard, Kids and Domestic, to be offered by the Information Technologies Board with the "Secure Internet Law" to take effect on August 22, 2011. Also sharing the hesitations about the objectivity of the application with the reader, editorial emphasizes an education system focused on breeding citizens who are not scared of relying on the information and who can, by themselves, decide whether information is harmful or not. References are made to the results of similar applications abroad while the press statement made by Turkish NGOs on the issue are included.

  9. PROLOGUE : Health Information System

    OpenAIRE

    Tomar, Shivanjali

    2013-01-01

    Prologue is a health information system developed for underserved communities in Bihar, India. It is aimed at helping people living in poverty and with low literacy to take the right steps to manage their and their family’s health. Bihar suffers from one of the worst healthcare records in the country. This is as much due to the lack of access to the right information as it is due to the economic condition of the region. The inaccessibility of information is aggravated by the complex social se...

  10. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  11. Advanced information society (11)

    Science.gov (United States)

    Nawa, Kotaro

    Late in the 1980's the information system of Japanese corporation has been operated strategically to strengthen its competitive position in markets rather than to make corporate management efficient. Therefore, information-oriented policy in the corporation is making remarkable progress. This policy expands the intelligence activity in the corporation and also leads to the extension of the market in an information industry. In this environment closed corporate system is transformed into open one. For this system network and database are important managerial resources.

  12. Quantum Information Processing

    CERN Document Server

    Leuchs, Gerd

    2005-01-01

    Quantum processing and communication is emerging as a challenging technique at the beginning of the new millennium. This is an up-to-date insight into the current research of quantum superposition, entanglement, and the quantum measurement process - the key ingredients of quantum information processing. The authors further address quantum protocols and algorithms. Complementary to similar programmes in other countries and at the European level, the German Research Foundation (DFG) started a focused research program on quantum information in 1999. The contributions - written by leading experts - bring together the latest results in quantum information as well as addressing all the relevant questions

  13. Accident information needs

    International Nuclear Information System (INIS)

    Hanson, D.J.; Arcieri, W.C.; Ward, L.W.

    1992-01-01

    A Five-step methodology has been developed to evaluate information needs for nuclear power plants under accident conditions and the availability of plant instrumentation during severe accidents. Step 1 examines the credible accidents and their relationships to plant safety functions. Step 2 determines the information personnel involved in accident management will need to understand plant behavior. Step 3 determines the capability of the instrumentation to function properly under severe accident conditions. Step 4 determines the conditions expected during the identified severe accidents. Step 5 compares the instrument capabilities and the severe accident conditions to evaluate the availability of the instrumentation to supply needed plant information

  14. Oxyfuels information needs

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-05-01

    Questions have been raised about the benefits and risks of oxygenated gasoline and reformulatd gasoline (`oxyfuels`). This document highlights areas of information that would improve scientific understanding of the impacts of these fuels on the environment and public health. It emphasizes the importance of obtaining data to support quantitative assessments of oxyfuels in comparison to conventional fuels. In addition to providing some background information and outlining a general framework for comparative risk assessments of fuels, the document briefly summarizes currently available information and then focuses on work that is now underway or planned and on data needs that remain to be filled.

  15. Accident information needs

    Energy Technology Data Exchange (ETDEWEB)

    Hanson, D.J.; Arcieri, W.C.; Ward, L.W.

    1992-12-31

    A Five-step methodology has been developed to evaluate information needs for nuclear power plants under accident conditions and the availability of plant instrumentation during severe accidents. Step 1 examines the credible accidents and their relationships to plant safety functions. Step 2 determines the information personnel involved in accident management will need to understand plant behavior. Step 3 determines the capability of the instrumentation to function properly under severe accident conditions. Step 4 determines the conditions expected during the identified severe accidents. Step 5 compares the instrument capabilities and the severe accident conditions to evaluate the availability of the instrumentation to supply needed plant information.

  16. Accident information needs

    Energy Technology Data Exchange (ETDEWEB)

    Hanson, D.J.; Arcieri, W.C.; Ward, L.W.

    1992-01-01

    A Five-step methodology has been developed to evaluate information needs for nuclear power plants under accident conditions and the availability of plant instrumentation during severe accidents. Step 1 examines the credible accidents and their relationships to plant safety functions. Step 2 determines the information personnel involved in accident management will need to understand plant behavior. Step 3 determines the capability of the instrumentation to function properly under severe accident conditions. Step 4 determines the conditions expected during the identified severe accidents. Step 5 compares the instrument capabilities and the severe accident conditions to evaluate the availability of the instrumentation to supply needed plant information.

  17. Information Technology Service

    International Nuclear Information System (INIS)

    Ageron, M.; Boninchi, V.; Chartoire, M.; Combroux, A.; Giraud, N.; Jacquet, G.; Lagrange, B.; Malleret, S.; Martin, C.; Mas, J.; Morgue, M.; Ollivier, T.

    1998-01-01

    The information technology service works out the choices concerning the information technology systems of general use in the laboratory: computers, network, peripherals, workstations, software. It intervenes at the same time in the definition of the procedures and equipment specific to the research groups. The entire data acquisition is centralized by the service. The personnel is sharing the following two large directions of activities: - management of information technology park (setup, configuration and maintenance of the materials and soft ensemble, training and assistance afforded to users); - participation in software projects either in elaboration of applications or in realization and maintenance of specific tools

  18. National Network for Immunization Information

    Science.gov (United States)

    ... American College of Obstetricians and Gynecologists . © Copyright National Network for Immunization Information. The information contained in the National Network for Immunization Information Web site should not be ...

  19. MAGIC: Model and Graphic Information Converter

    Science.gov (United States)

    Herbert, W. C.

    2009-01-01

    MAGIC is a software tool capable of converting highly detailed 3D models from an open, standard format, VRML 2.0/97, into the proprietary DTS file format used by the Torque Game Engine from GarageGames. MAGIC is used to convert 3D simulations from authoritative sources into the data needed to run the simulations in NASA's Distributed Observer Network. The Distributed Observer Network (DON) is a simulation presentation tool built by NASA to facilitate the simulation sharing requirements of the Data Presentation and Visualization effort within the Constellation Program. DON is built on top of the Torque Game Engine (TGE) and has chosen TGE's Dynamix Three Space (DTS) file format to represent 3D objects within simulations.

  20. From Information Management to Information Visualization

    Science.gov (United States)

    Karami, Mahtab

    2016-01-01

    Summary Objective The development and implementation of a dashboard of medical imaging department (MID) performance indicators. Method Several articles discussing performance measures of imaging departments were searched for this study. All the related measures were extracted. Then, a panel of imaging experts were asked to rate these measures with an open ended question to seek further potential indicators. A second round was performed to confirm the performance rating. The indicators and their ratings were then reviewed by an executive panel. Based on the final panel’s rating, a list of indicators to be used was developed. A team of information technology consultants were asked to determine a set of user interface requirements for the building of the dashboard. In the first round, based on the panel’s rating, a list of main features or requirements to be used was determined. Next, Qlikview was utilized to implement the dashboard to visualize a set of selected KPI metrics. Finally, an evaluation of the dashboard was performed. Results 92 MID indicators were identified. On top of this, 53 main user interface requirements to build of the prototype of dashboard were determined. Then, the project team successfully implemented a prototype of radiology management dashboards into study site. The visual display that was designed was rated highly by users. Conclusion To develop a dashboard, management of information is essential. It is recommended that a quality map be designed for the MID. It can be used to specify the sequence of activities, their related indicators and required data for calculating these indicators. To achieve both an effective dashboard and a comprehensive view of operations, it is necessary to design a data warehouse for gathering data from a variety of systems. Utilizing interoperability standards for exchanging data among different systems can be also effective in this regard. PMID:27437043