WorldWideScience

Sample records for proprietary information

  1. 48 CFR 1509.505-4 - Obtaining access to proprietary information.

    Science.gov (United States)

    2010-10-01

    ... proprietary information. 1509.505-4 Section 1509.505-4 Federal Acquisition Regulations System ENVIRONMENTAL....505-4 Obtaining access to proprietary information. Contractors gaining access to confidential business... business information. ...

  2. 19 CFR 357.111 - Public and proprietary information.

    Science.gov (United States)

    2010-04-01

    ... conspicuously mark in the upper right corner of both versions, the words “proprietary document” or “public... 19 Customs Duties 3 2010-04-01 2010-04-01 false Public and proprietary information. 357.111 Section 357.111 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE SHORT SUPPLY...

  3. Information governance and security protecting and managing your company's proprietary information

    CERN Document Server

    Iannarelli, John G

    2014-01-01

    Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and this book establishes the enterprise-level systems and disciplines necessary for managing all the information generated by an organization. In addition, the book encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined in Information Governance and Security, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Provides a step-by-step outline for developing an information governance policy that is appropriate for your organization Includes real-world examples and cases to help illustrate key ...

  4. 47 CFR 64.2011 - Notification of customer proprietary network information security breaches.

    Science.gov (United States)

    2010-10-01

    ... information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... criminal investigation or national security, such agency may direct the carrier not to so disclose or...

  5. 47 CFR 76.938 - Proprietary information.

    Science.gov (United States)

    2010-10-01

    ... CABLE TELEVISION SERVICE Cable Rate Regulation § 76.938 Proprietary information. A franchising authority... Form 393 (and/or FCC Forms 1200/1205) filing or a cost-of-service showing. The franchising authority... specifically relates. Upon request to the franchising authority, the parties to a rate proceeding shall have...

  6. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Science.gov (United States)

    2010-01-01

    ... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security information. You should not submit sensitive security information to the rulemaking docket, unless you are...

  7. 47 CFR 64.2007 - Approval required for use of customer proprietary network information.

    Science.gov (United States)

    2010-10-01

    ... of marketing communications-related services to that customer. A telecommunications carrier may..., for the purpose of marketing communications-related services to that customer, to its agents and its... proprietary network information. 64.2007 Section 64.2007 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...

  8. A Reading Preference and Risk Taxonomy for Printed Proprietary Information Compromise in the Aerospace and Defense Industry

    Science.gov (United States)

    Stalker, Joshua Dylan

    2012-01-01

    The protection of proprietary information that users print from their information systems is a significant and relevant concern in the field of information security to both researchers and practitioners. Information security researchers have repeatedly indicated that human behaviors and perception are important factors influencing the information…

  9. Contrasting Proprietary and Free/Open Source Game Development

    Directory of Open Access Journals (Sweden)

    Marco Zamarian

    2008-10-01

    Full Text Available Free/Libre Open Source Software (F/LOSS development practices are gaining momentum in the computer game industry. This traditionally proprietary industry is becoming more interested in the F/LOSS paradigm for developing complex software projects. Software practitioners, both managers and developers, need to understand the potential in order to benefit properly from incorporating F/LOSS practices into their proprietary production cycle. Comparisons between proprietary and F/LOSS software development processes are usually characterized in terms of the relationship between property rights, revenue distribution and power within a network of actors. By contrast, coordination and control practices, mediating artifacts and development tools, and the interactions between the different actors involved in the development are often neglected. Proprietary and F/LOSS development differ in terms of the knowledge exchanges between the relevant actors and the different strategies employed to overcome information asymmetries. Recognizing this difference is an essential step for evaluating how proprietary, closed-source software houses can benefit by integrating various F/LOSS practices into their development agenda.

  10. 19 CFR 356.10 - Procedures for obtaining access to proprietary information.

    Science.gov (United States)

    2010-04-01

    ... secretary if such person: (i) Is not involved in competitive decision-making for a participant in the panel review or for any person that would gain competitive advantage through knowledge of the proprietary... and each copy as the first page of the document. (4) Service of applications—(i) Persons described in...

  11. 27 CFR 20.113 - Proprietary solvents general-use formula.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Proprietary solvents... Formulas and Statements of Process General-Use Formulas § 20.113 Proprietary solvents general-use formula. (a) A proprietary solvent is any article made with any other ingredients combined with the...

  12. How to establish precise proprietary Chinese medicine in post-marketing reappraisal?

    Directory of Open Access Journals (Sweden)

    Ran Tian

    2017-10-01

    Full Text Available The clinical efficacy and safety of proprietary Chinese medicine has become a more prevailing public health concern. The China Food and Drug Administration has pushed drug companies to conduct post-marketing reappraisal for proprietary Chinese medicine to provide additional evidence supporting the efficacy and safety of these medicine. In this paper, we propose a reappraisal protocol called “precise proprietary Chinese medicine” to precisely i define the therapeutic aim; ii design the protocol; iii control the quality of proprietary Chinese medicine; iv implement the protocol in the trial; v study the mechanism-of-action of the proprietary Chinese medicine and vi describe the indications of the proprietary Chinese medicine. We hope that these steps facilitate the post-marketing reappraisal of proprietary Chinese medicine.

  13. Proprietary policy and production

    Czech Academy of Sciences Publication Activity Database

    Jeong, Byeongju

    -, č. 287 (2006), s. 1-14 ISSN 1211-3298 Institutional research plan: CEZ:MSM0021620846 Keywords : proprietary regime * direct production * model Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp287.pdf

  14. The influence of proprietary disclosure costs on the decision to go public

    NARCIS (Netherlands)

    Marra, T.A.

    2001-01-01

    This thesis studies the influence of proprietary disclosure costs related to informing product market competitors on management communication with investors. In doing so it focuses on the firm's decision to go public. A firm that goes public not only experiences a change in its financial and

  15. Proprietary, standard, and government-supported nuclear data bases

    International Nuclear Information System (INIS)

    Poncelet, C.G.; Ozer, O.; Harris, D.R.

    1975-07-01

    This study presents an assessment of the complex situation surrounding nuclear data bases for nuclear power technology. Requirements for nuclear data bases are identified as regards engineering functions and system applications for the many and various user groups that rely on nuclear data bases. Current practices in the development and generation of nuclear data sets are described, and the competitive aspect of design nuclear data set development is noted. The past and current role of the federal government in nuclear data base development is reviewed, and the relative merits of continued government involvement are explored. National policies of the United States and other industrial countries regarding the availability of nationally supported nuclear data information are reviewed. Current proprietary policies of reactor vendors regarding design library data sets are discussed along with the basis for such proprietary policies. The legal aspects of protective policies are explored as are their impacts on the nuclear power industry as a whole. The effect of the regulatory process on the availability and documentation of nuclear data bases is examined. Current nuclear data standard developments are reviewed, including a discussion of the standard preparation process. Standards currently proposed or in preparation that directly relate to nuclear data bases are discussed in some detail. (auth)

  16. Disclosure Regulation in Duopoly Markets: Proprietary Costs and Social Welfare

    NARCIS (Netherlands)

    Suijs, J.P.M.; Wielhouwer, J.L.

    2014-01-01

    The argument of proprietary costs is commonly used by firms to object against proposed disclosure regulations. The goal of this paper is to improve our understanding of the welfare consequences of disclosure in duopoly markets and to identify market settings where proprietary costs are a viable

  17. Disclosure regulation in duopoly markets : Proprietary costs and social welfare

    NARCIS (Netherlands)

    Suijs, J.P.M.; Wielhouwer, J.L.

    2014-01-01

    The argument of proprietary costs is commonly used by firms to object against proposed disclosure regulations. The goal of this paper is to improve our understanding of the welfare consequences of disclosure in duopoly markets and to identify market settings where proprietary costs are a viable

  18. 15 CFR 1160.6 - Proprietary data.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Proprietary data. 1160.6 Section 1160.6 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) TECHNOLOGY ADMINISTRATION, DEPARTMENT OF COMMERCE PRODUCTIVITY, TECHNOLOGY AND INNOVATION Promotion of...

  19. A Perceptual Measure of the Degree of Development of Proprietary Equipment.

    Science.gov (United States)

    Cua, Kristy O.; Junttila, Mikko A.; Schroeder, Roger G.

    2002-01-01

    Evaluated the psychometric properties of a perceptual measure of the extent to which manufacturing organizations develop proprietary equipment, the Proprietary Equipment Scale (developed by the World Class Manufacturing study). Analysis of data from 164 manufacturing plants in 5 countries indicates that although method effects are present, the…

  20. 27 CFR 6.27 - Proprietary interest.

    Science.gov (United States)

    2010-04-01

    ... OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Interest in Retail License § 6.27 Proprietary interest. (a) Complete ownership. Outright ownership of a retail business by an industry member is.... Less than complete ownership of a retail business by an industry member constitutes an interest in a...

  1. 27 CFR 6.33 - Proprietary interest.

    Science.gov (United States)

    2010-04-01

    ... OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Interest in Retail Property § 6.33 Proprietary interest. (a) Complete ownership. Outright ownership of a retail business by an industry member is.... Less than complete ownership of a retail business by an industry member constitutes an interest in...

  2. 75 FR 61758 - Public Input for the Study Regarding the Implementation of the Prohibitions on Proprietary...

    Science.gov (United States)

    2010-10-06

    ... banking entities from engaging in proprietary trading and from maintaining certain relationships with... the Prohibitions on Proprietary Trading and Certain Relationships With Hedge Funds and Private Equity...-Frank Act, banking entities \\2\\ are prohibited from engaging in proprietary trading and from maintaining...

  3. When to make proprietary software open source

    NARCIS (Netherlands)

    Caulkins, J.P.; Feichtinger, G.; Grass, D.; Hartl, R.F.; Kort, P.M.; Seidl, A.

    Software can be distributed closed source (proprietary) or open source (developed collaboratively). While a firm cannot sell open source software, and so loses potential sales revenue, the open source software development process can have a substantial positive impact on the quality of a software,

  4. Social support in the practices of informal providers: The case of patent and proprietary medicine vendors in Nigeria.

    Science.gov (United States)

    Sieverding, Maia; Liu, Jenny; Beyeler, Naomi

    2015-10-01

    The social and institutional environments in which informal healthcare providers operate shape their health and business practices, particularly in contexts where regulatory enforcement is weak. In this study, we adopt a social capital perspective to understanding the social networks on which proprietary and patent medicine vendors (PPMVs) in Nigeria rely for support in the operation of their shops. Data are drawn from 70 in-depth interviews with PPMVs in three states, including interviews with local leaders of the PPMV professional association. We find that PPMVs primarily relied on more senior colleagues and formal healthcare professionals for informational support, including information about new medicines and advice on how to treat specific cases of illness. For instrumental support, including finance, start-up assistance, and intervention with regulatory agencies, PPMVs relied on extended family, the PPMVs with whom they apprenticed, and the leaders of their professional association. PPMVs' networks also provided continual reinforcement of what constitutes good PPMV practice through admonishments to follow scope of practice limitations. These informal reminders, as well as monitoring activities conducted by the professional association, served to reinforce PPMVs' concern with avoiding negative customer health outcomes, which were perceived to be detrimental to their business reputations. That PPMVs' networks both encouraged practices to reduce the likelihood of poor health outcomes, and provided advice regarding customers' health conditions, highlights the potential impact of informal providers' access to different forms of social capital on their delivery of health services, as well as their success as microenterprises. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. Cyclic Fatigue Resistance of 3 Proprietary Rotary File Brands and their Analogous EdgeEndo Counterparts.

    Science.gov (United States)

    2018-04-26

    Resistance of 3 Proprietary Rotary File Brands and their Analogous EdgeEndo Counterparts. 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd...Endodontics 14. ABSTRACT Cyclic Fatigue Resistance of 3 Proprietary Rotary File Brands and their Analogous EdgeEndo Counterparts. David J. Weyh DDS...Resistance of 3 Proprietary Rotary File Brands and their Analogous EdgeEndo Counterparts. David J. Weyh DDS Jarom J. Ray DDS Introduction: The aim of this

  6. RIS modality interfaces. From proprietary solutions to DICOM worklist management

    International Nuclear Information System (INIS)

    Jaeger, D.; Kotter, E.; Langer, M.

    1999-01-01

    Radiologic information systems (RIS) and picture archiving and communication systems (PACS) are becoming increasingly widespread. This leads to new demands on the integration of the individual, formerly independent information systems (RIS, modalities, PACS). Possible ways of integrating individual systems are introduced. Besides the detailed description of different realizations of system communication, its role in the PACS at the university hospital in Freiburg is explained. The integration of different information systems still requires the use of proprietary interfaces. An appropriate integration generally has been realized in Freiburg. In the near future DICOM basic worklist management will standardize system integration and render an interdepartmental workflow concept possible. Even though an available communication standard exists, not all problems in the RIS-modality interface are solved. Different data models in the various RI systems and modalities demand certain degrees of freedom in the standard. Thus a satisfactory workflow cannot be guaranteed even when all involved systems conform with the standard. (orig.) [de

  7. The Drug Discovery and Development Industry in India-Two Decades of Proprietary Small-Molecule R&D.

    Science.gov (United States)

    Differding, Edmond

    2017-06-07

    This review provides a comprehensive survey of proprietary drug discovery and development efforts performed by Indian companies between 1994 and mid-2016. It is based on the identification and detailed analysis of pharmaceutical, biotechnology, and contract research companies active in proprietary new chemical entity (NCE) research and development (R&D) in India. Information on preclinical and clinical development compounds was collected by company, therapeutic indication, mode of action, target class, and development status. The analysis focuses on the overall pipeline and its evolution over two decades, contributions by type of company, therapeutic focus, attrition rates, and contribution to Western pharmaceutical pipelines through licensing agreements. This comprehensive analysis is the first of its kind, and, in our view, represents a significant contribution to the understanding of the current state of the drug discovery and development industry in India. © 2017 The Author. Published by Wiley-VCH Verlag GmbH & Co. KGaA.

  8. Open Source and Proprietary Project Management Tools for SMEs.

    Directory of Open Access Journals (Sweden)

    Veronika Abramova

    2017-05-01

    Full Text Available The dimensional growth and increasing difficulty in project management promoted the development of different tools that serve to facilitate project management and track project schedule, resources and overall progress. These tools offer a variety of features, from task and time management, up to integrated CRM (Customer Relationship Management and ERP (Enterprise Resource Planning modules. Currently, a large number of project management software is available, to assist project team during the entire project lifecycle. We present the main differences between open source and proprietary project management tools and how those could be important for SMEs, describing the key features and how those can assist the project manager and the development team. In this paper, we analyse four open-source project management tools: OpenProject, ProjectLibre, Redmine, LibrePlan and four proprietary tools: Bitrix24, JIRA, Microsoft Project and Asana.

  9. Protection of proprietary rights of DIN standards in connection with statutory and administrative provisions

    International Nuclear Information System (INIS)

    Katzenberger, P.

    1985-01-01

    On the basis of contracts entered with the German Institute of Standardization (DIN), the state bodies and authorities tend to refer to Din standards in many ways when issuing statutory or administrative provisions. Some Din standards are also printed in official publications- with or without Din's prior consent. Such common practice leads to the question whether the Din standards which on pinciple meet the general requirements made on the protection of proprietary rights are losing this protection by the fact that official publications are exempt from the protection of proprietary rights (Art.5 UrhG). The author points out that the thorough analysis of the legal position in terms of interests, proprietary rights and constitution indicated that this is not, in principle, the case. (orig.) [de

  10. Regulation of proprietary traditional Chinese medicines in Australia.

    Science.gov (United States)

    Graham, David T

    2017-01-01

    This review article describes the regulation of proprietary Chinese medicines for the Australian market, which may permit many medicines used in Traditional Chinese Medicine to have a simplified process of market access provided that certain criteria for acceptable public safety are met. Copyright © 2017 China Pharmaceutical University. Published by Elsevier B.V. All rights reserved.

  11. Proprietary and voluntary home care agency evolution: the emergence of a new entity.

    Science.gov (United States)

    Balinsky, W; Shames, J N

    1985-01-01

    The objective of this paper is to document that the delivery of home care services and the corresponding ways in which they are marketed are evolving in both proprietary and voluntary providers. This evolution is producing the emergency of a new entity. In order to examine the present state, it is necessary to review the general history of the development of both voluntary (not-for-profit) and proprietary home health services. Then, an analysis of present conditions will show that these two forms of ownership are changing in ways that are making them more alike than different. This situation is leading to more intense competition for an expanding and diverse mix of home services. Program content and corresponding marketing techniques have crossed the industry's traditional lines blending into a wide array of services being offered by both voluntary and proprietary organizations. Despite their many shared goals and objectives, home care agencies still differ in their underlying philosophy which is based at least in part on their past.

  12. Change Strategies Used by a Proprietary School: The Dale Carnegie Organization.

    Science.gov (United States)

    Mackey, Paul J.

    1983-01-01

    Discusses recent developments regarding proprietary schools: recognition by accrediting associations, increased federal aid, and increased need for the specific training offered by these schools. Uses the Dale Carnegie organization as an example. (JOW)

  13. Using virtualization to protect the proprietary material science applications in volunteer computing

    Science.gov (United States)

    Khrapov, Nikolay P.; Rozen, Valery V.; Samtsevich, Artem I.; Posypkin, Mikhail A.; Sukhomlin, Vladimir A.; Oganov, Artem R.

    2018-04-01

    USPEX is a world-leading software for computational material design. In essence, USPEX splits simulation into a large number of workunits that can be processed independently. This scheme ideally fits the desktop grid architecture. Workunit processing is done by a simulation package aimed at energy minimization. Many of such packages are proprietary and should be protected from unauthorized access when running on a volunteer PC. In this paper we present an original approach based on virtualization. In a nutshell, the proprietary code and input files are stored in an encrypted folder and run inside a virtual machine image that is also password protected. The paper describes this approach in detail and discusses its application in USPEX@home volunteer project.

  14. Using virtualization to protect the proprietary material science applications in volunteer computing

    Directory of Open Access Journals (Sweden)

    Khrapov Nikolay P.

    2018-04-01

    Full Text Available USPEX is a world-leading software for computational material design. In essence, USPEX splits simulation into a large number of workunits that can be processed independently. This scheme ideally fits the desktop grid architecture. Workunit processing is done by a simulation package aimed at energy minimization. Many of such packages are proprietary and should be protected from unauthorized access when running on a volunteer PC. In this paper we present an original approach based on virtualization. In a nutshell, the proprietary code and input files are stored in an encrypted folder and run inside a virtual machine image that is also password protected. The paper describes this approach in detail and discusses its application in USPEX@home volunteer project.

  15. The influence of temporary differences between accounting and tax revenues, proprietary costs and liquidity on profit growth

    Directory of Open Access Journals (Sweden)

    NURAMALIA HASANAH

    2017-07-01

    Full Text Available This study aimed to examine the influence of temporary differences between accounting profit and tax, proprietary costs, and Liquidity toward earnings growth of the companies listed in Indonesia Stock Exchange (IDX 2011-2012. The factors examined in this study are temporary differences between accounting profit and tax, proprietary costs, and liquidity as an independent variable, while earnings growth has the dependent variable. This study used a descriptive quantitative method using secondary data and the number of samples collected was thirty- eight (38 that have met the criteria the researchers used purposive sampling. From the data that has been collected and then processed and analyzed using multiple regression analysis with a significance level of 0.05. This research proves temporary differences between accounting profit and tax has no significant influence on earnings growth, proprietary cost has no significant influence on earnings growth, and liquidity has negatively significant influence earnings growth. Temporary differences between accounting profit and tax, proprietary costs, and liquidity together or simultaneously significant influence toward the earnings growth.

  16. Continued development of a non-proprietary, high-tension, cable end terminal system.

    Science.gov (United States)

    2016-04-29

    A non-proprietary, cable guardrail system is currently under development for the Midwest States Pooled Fund Program. : A cable guardrail end terminal was necessary to accompany the cable guardrail system. The objective of this research : project was ...

  17. Assessing the potential impact of non-proprietary drug copies on quality of medicine and treatment in patients with relapsing multiple sclerosis: the experience with fingolimod

    Directory of Open Access Journals (Sweden)

    Correale J

    2014-06-01

    Full Text Available Jorge Correale,1 Erwin Chiquete,2 Snezana Milojevic,3 Nadina Frider,3 Imre Bajusz31Raúl Carrea Institute for Neurological Research, Foundation for the Fight against Infant Neurological Illnesses, Buenos Aires, Argentina; 2Department of Neurology and Psychiatry, Salvador Zubirán National Institute of Medical Science and Nutrition, Mexico City, Mexico; 3Novartis Pharma AG, Basel, SwitzerlandBackground: Fingolimod is a once-daily oral treatment for relapsing multiple sclerosis, the proprietary production processes of which are tightly controlled, owing to its susceptibility to contamination by impurities, including genotoxic impurities. Many markets produce nonproprietary medicines; assessing their efficacy and safety is difficult as regulators may approve nonproprietary drugs without bioequivalence data, genotoxic evaluation, or risk management plans (RMPs. This assessment is especially important for fingolimod given its solubility/bioavailability profile, genotoxicity risk, and low-dose final product (0.5 mg. This paper presents an evaluation of the quality of proprietary and nonproprietary fingolimod variants.Methods: Proprietary fingolimod was used as a reference substance against which eleven nonproprietary fingolimod copies were assessed. The microparticle size distribution of each compound was assessed by laser light diffraction, and inorganic impurity content by sulfated ash testing. Heavy metals content was quantified using inductively coupled plasma optical emission spectrometry, and levels of unspecified impurities by high-performance liquid chromatography. Solubility was assessed in a range of solvents at different pH values. Key information from the fingolimod RMP is also presented.Results: Nonproprietary fingolimod variants exhibited properties out of proprietary or internationally accepted specifications, including differences in particle size distribution and levels of impurities such as heavy metals. For microparticle size and

  18. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-06-01

    Full Text Available Substantial changes have occurred in the Information Technology (IT sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  19. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  20. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  1. State of the Art of Proprietary Financial Reporting in the Department of the Navy

    National Research Council Canada - National Science Library

    Manning, Jeffrey

    1996-01-01

    .... To address this issue, a review of the laws, policies and agencies which affect proprietary reporting was conducted, along with a comparison between Federal government and private sector financial reporting...

  2. 15 CFR 400.53 - Information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Information. 400.53 Section 400.53..., Record and Information § 400.53 Information. (a) Request for information. The Board may request submission of any information, including business proprietary information, and written argument necessary or...

  3. 34 CFR Appendix A to Subpart L of... - Ratio Methodology for Proprietary Institutions

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Ratio Methodology for Proprietary Institutions A Appendix A to Subpart L of Part 668 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF POSTSECONDARY EDUCATION, DEPARTMENT OF EDUCATION STUDENT ASSISTANCE GENERAL PROVISIONS...

  4. 75 FR 68675 - Controlled Unclassified Information

    Science.gov (United States)

    2010-11-09

    ... information, such as information that involves privacy, security, proprietary business interests, and law... National Intelligence (Director), with respect to the Intelligence Community and after consultation with... necessary to implement this order with respect to intelligence and intelligence-related information...

  5. Leadership Style, Employee Satisfaction, and Productivity in the Enrollment Department of a Proprietary University

    Science.gov (United States)

    Chitwood, James

    2010-01-01

    The success of an enrollment department is critical to the success of an educational institution. The quantitative research study used a correlational design to measure the relationship between perceived leadership style, employee satisfaction, and departmental productivity. A sample of 41 admissions personnel from a Midwest proprietary university…

  6. 34 CFR 5.71 - Protection of personal privacy and proprietary information.

    Science.gov (United States)

    2010-07-01

    ... other information of a private and personal nature. (b) Information having a commercial or financial... individuals who have access to such information, (3) the type and degree of risk of financial injury to be... use of nondiscloseable records or information from such records for authorized program purposes...

  7. Cable-to-post attachments for use in non-proprietary high-tension cable median barrier - phase II.

    Science.gov (United States)

    2016-03-24

    The objective of this study was to reevaluate and improve the existing cable-to-post attachment hardware that is utilized : in the non-proprietary cable barrier being developed at MwRSF. The study focused on redesigning the bolted, tabbed : bracket (...

  8. 77 FR 23 - Prohibitions and Restrictions on Proprietary Trading and Certain Interests in, and Relationships...

    Science.gov (United States)

    2012-01-03

    ... Relationships With, Hedge Funds and Private Equity Funds AGENCIES: Office of the Comptroller of the Currency... relationships with, a hedge fund or private equity fund (``proposed rule''). Due to the complexity of the issues... in proprietary trading and have certain interests in, or relationships with, a hedge fund or private...

  9. Isolation and identification of phytoestrogens and flavonoids in an Ayurvedic proprietary medicine using chromatographic and Mass Spectroscopic analysis

    Institute of Scientific and Technical Information of China (English)

    Sulaiman CT; Arun A; Anandan EM; Sandhya CR; Indira Balachandran

    2015-01-01

    Objective: To develop analytical methods for the isolation and structural identification of poly phenols including phytoestrogens in Mensokot tablet, a herbal proprietary medicine. Methods:Isolation consisted of an ultrasound-assisted extraction, followed by acid hydrolysis and a final liquid-liquid extraction step in diethyl ether. Identification and structural characterisation was done by liquid chromatography coupled with Q-TOF-ESI-MS/MS analysis. Results:Phytoestrogens such as Coumestrol, Genistein and Glycitein have been identified in Mensokot tablet along with several other flavonoids. Conclusion: In the present research, a rapid HPLC-MS/MS method has been developed for the identification of phytoestrogens and other flavonoids from an Ayurvedic proprietary medicine. Phytoestrogens are considered to play an important role in the prevention of cancers, heart disease, menopausal symptoms and osteoporosis.

  10. 19 CFR 351.304 - Establishing business proprietary treatment of information.

    Science.gov (United States)

    2010-04-01

    ... in terms of indices or figures within 10 percent of the actual figure. If an individual portion of... person. (2) If a submitting party discovers that it has failed to bracket information correctly, the...

  11. 48 CFR 9.505-4 - Obtaining access to proprietary information.

    Science.gov (United States)

    2010-10-01

    ... REGULATION ACQUISITION PLANNING CONTRACTOR QUALIFICATIONS Organizational and Consultant Conflicts of Interest... source selection information by acquiring the services of marketing consultants which, if used in... make inquiries of marketing consultants to ensure that the marketing consultant has provided no unfair...

  12. A Systematic Approach for Evaluating BPM Systems: Case Studies on Open Source and Proprietary Tools

    OpenAIRE

    Delgado , Andrea; Calegari , Daniel; Milanese , Pablo; Falcon , Renatta; García , Esteban

    2015-01-01

    Part 3: Examples and Case Studies; International audience; Business Process Management Systems (BPMS) provide support for modeling, developing, deploying, executing and evaluating business processes in an organization. Selecting a BPMS is not a trivial task, not only due to the many existing alternatives, both in the open source and proprietary realms, but also because it requires a thorough evaluation of its capabilities, contextualizing them in the organizational environment in which they w...

  13. 14 CFR 1214.112 - Patent, data and information matters.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Patent, data and information matters. 1214... Customers § 1214.112 Patent, data and information matters. (a) Patent and data rights. NASA will not acquire rights to inventions, patents or proprietary data which may be used in, or arise from, activities for...

  14. Effects of a proprietary Bacillus coagulans preparation on symptoms of diarrhea-predominant irritable bowel syndrome.

    Science.gov (United States)

    Dolin, B J

    2009-12-01

    Symptoms of irritable bowel syndrome (IBS) have a profound impact on quality of life for many patients and current treatments are sometimes unsatisfactory. This controlled pilot study was conducted to evaluate effects of the proprietary GanedenBC(30) (Bacillus coagulans GBI-30, 6086) probiotic on IBS symptoms, in a randomized, double-blind, placebo-controlled clinical trial including patients with diarrhea-predominant IBS (IBS-D). Patients were randomized to receive either B. coagulans GBI-30, 6086 or placebo once a day for 8 weeks. Patients filled out a quality-of-life questionnaire, and self-assessment diaries were provided to record stool count and consistency, symptom severity, and medication consumption. Of the 61 patients enrolled, six did not meet the inclusion criteria and three were lost to follow-up. Of the remaining 52 patients with IBS-D, the average number of bowel movements per day was significantly reduced for patients treated with B. coagulans GBI-30, 6086 when compared to placebo (P = 0.042). Large variability in baseline scores prevented the assessment of severity scores and quality of life. This small pilot study provides evidence that the proprietary B. coagulans GBI-30, 6086 probiotic is safe and effective for reducing daily bowel movements in patients with IBS-D. Copyright 2009 Prous Science, S.A.U. or its licensors. All rights reserved.

  15. Information from Relationship Lending : Evidence from China

    NARCIS (Netherlands)

    Chang, C.; Liao, G.; Yu, X.; Ni, Z.

    2009-01-01

    We study the economic role of banks’ soft information, which evolved from repeated lending relationships, in the context of loan default. Using a proprietary database from one of the largest state-owned commercial banks in China, we find that the bank’s internal credit rating scores play a

  16. Chinese proprietary medicine in Singapore: regulatory control of toxic heavy metals and undeclared drugs.

    Science.gov (United States)

    Koh, H L; Woo, S O

    2000-11-01

    Traditional Chinese medicine (TCM) is gaining popularity as a form of complementary and alternative medicine. Reports of efficacy of TCM are increasing in numbers. TCM includes both crude Chinese medicinal materials (plants, animal parts and minerals) and Chinese proprietary medicine (CPM) [final dosage forms]. Despite the belief that CPM and herbal remedies are of natural origin, unlike Western medicine, and are hence safe and without many adverse effects, there have been numerous reports of adverse effects associated with herbal remedies. Factors affecting the safety of herbal medicines include intrinsic toxicity, adulteration, substitution, contamination, misidentification, lack of standardisation, incorrect preparation and/or dosage and inappropriate labelling and/or advertising. Hence, new regulations on the control of CPM were enforced in Singapore with effect from 1 September 1999. These include licensing and labelling requirements, as well as control of microbial contamination. This article also reviews reports of excessive toxic heavy metals and undeclared drugs in CPM in Singapore between 1990 and 1997. The names, uses, toxic heavy metal or drug detected and the year of detection are tabulated. Information on the brand or manufacturer's name are provided whenever available. The public and healthcare professionals should be better informed of the basic concept of TCM and its usefulness, as well as the potential adverse effects associated with its use. Greater control over the safety and quality of CPM could be achieved through good manufacturing practice, regulatory control, research, education, reporting usage of Chinese medicine (as in drug history) as well as reporting of adverse events.

  17. 76 FR 44354 - Agency Information Collection Activities: Comment Request for National Spatial Data...

    Science.gov (United States)

    2011-07-25

    ..., organizations, and people necessary to promote cost-effective production, and the ready availability and greater... leverage of geospatial resources. We will protect information considered proprietary under the Freedom of...: Notice of an extension of a currently approved information collection. Affected Public: Private Sector...

  18. 17 CFR 240.3a44-1 - Proprietary government securities transactions incidental to the futures-related business of a...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Proprietary government securities transactions incidental to the futures-related business of a CFTC-regulated person. 240.3a44-1 Section 240.3a44-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...

  19. 48 CFR 1552.235-70 - Screening business information for claims of confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Screening business... Texts of Provisions and Clauses 1552.235-70 Screening business information for claims of confidentiality... proprietary or confidential by the business that has the right to the information. The following clause...

  20. Regulatory control of Chinese Proprietary Medicines in Singapore.

    Science.gov (United States)

    Yee, Shen-Kuan; Chu, Swee-Seng; Xu, Yi-Min; Choo, Peck-Lin

    2005-02-01

    In Singapore, there has been a growing public interest in traditional Chinese medicine (TCM), which plays an important role in the healthcare system. With effect from 1 September 1999, the control on Chinese Proprietary Medicines (CPM) was implemented in three phases over a span of 3 years. Under the CPM regulatory framework, CPM importers, wholesalers, manufacturers and re-packers must be licensed and CPM products assessed and listed by the health authority before they are allowed for sale. Product assessment is based on the criteria of safety and quality which include limits of toxic heavy metals and microbial contents. During the 3-year CPM listing exercise, irregularities were detected, including intrinsic toxicity, adulteration, substitution, contamination, misidentification, non-traditional and/or inappropriate usage, incorrect preparation, inappropriate labelling, exaggerated claims and/or advertising. The full implementation of CPM control by September 2001 saw the listing of 7943 CPM products and brought about an improvement in the quality and safety of CPM in Singapore as well as the removal of sub-standard, fake/imitation and adulterated products. The standards of practices by local CPM dealers have also been raised. These improvements have, in turn, increased the level of public confidence in CPM products in Singapore.

  1. The Business Information Services: Old-Line Online Moves to the Web.

    Science.gov (United States)

    O'Leary, Mick

    1997-01-01

    Although the availability of free information on the World Wide Web has placed traditional, fee-based proprietary online services on the defensive, most major online business services are now on the Web. Highlights several business information providers: Profound, NewsNet and ProQuest Direct, Dow Jones and Wall Street Journal Interactive Edition,…

  2. Reversal of visceral hypersensitivity in rat by Menthacarin , a proprietary combination of essential oils from peppermint and caraway, coincides with mycobiome modulation

    NARCIS (Netherlands)

    Botschuijver, S.; Welting, O.; Levin, E.; Maria-Ferreira, D.; Koch, E.; Montijn, R. C.; Seppen, J.; Hakvoort, T. B. M.; Schuren, F. H. J.; de Jonge, W. J.; van den Wijngaard, R. M.

    2018-01-01

    Irritable bowel syndrome (IBS) is a common gastrointestinal disorder associated with altered gastrointestinal microflora and increased nociception to colonic distension. This visceral hypersensitivity can be reversed in our rat maternal separation model by fungicides. Menthacarin is a proprietary

  3. Data mining : open systems drill through layers of legacy data to manage the flow of information

    International Nuclear Information System (INIS)

    Polczer, S.

    1999-01-01

    Information management challenges facing the petroleum and natural gas industry are discussed in conjunction with the increasing difficulty of accessing information because of the sheer volume of it, plus the fact that most data systems are proprietary 'closed' systems. In this context, reference is made to a newly developed software system named PetroDesk, developed by Merak Petroleum. PetroDesk is a geographical information browser used for integration and analysis of public, proprietary and personal data under a common interface. The software can be used to plot land position, chart productivity of wells, and produce graphs of decline rates, reserves and production. The software, which was originally designed for engineering data, also has been found useful in determining costs, revenue projections and other information needed to obtain a real-time net present worth of a company, and also in identifying business opportunities. 2 figs

  4. 19 CFR 207.7 - Limited disclosure of certain business proprietary information under administrative protective...

    Science.gov (United States)

    2010-04-01

    ... corresponding information about a competitor (pricing, product design, etc.). (4) Forms and determinations. (i... information pursuant to this paragraph, the authorized applicant need not file a new application in the final...

  5. Point-and-Click Pedagogy: Is It Effective for Teaching Information Technology?

    Science.gov (United States)

    Angolia, Mark G.; Pagliari, Leslie R.

    2016-01-01

    This paper assesses the effectiveness of the adoption of curriculum content developed and supported by a global academic university-industry alliance sponsored by one of the world's largest information technology software providers. Academic alliances promote practical and future-oriented education while providing access to proprietary software…

  6. Supplementation with a proprietary blend of ancient peat and apple extract may improve body composition without affecting hematology in resistance-trained men.

    Science.gov (United States)

    Joy, Jordan M; Falcone, Paul H; Vogel, Roxanne M; Mosman, Matt M; Kim, Michael P; Moon, Jordan R

    2015-11-01

    Adenosine-5'-triphosphate (ATP) is primarily known as a cellular source of energy. Increased ATP levels may have the potential to enhance body composition. A novel, proprietary blend of ancient peat and apple extracts has been reported to increase ATP levels, potentially by enhancing mitochondrial ATP production. Therefore, the purpose of this investigation was to determine the supplement's effects on body composition when consumed during 12 weeks of resistance training. Twenty-five healthy, resistance-trained, male subjects (age, 27.7 ± 4.8 years; height, 176.0 ± 6.5 cm; body mass, 83.2 ± 12.1 kg) completed this study. Subjects supplemented once daily with either 1 serving (150 mg) of a proprietary blend of ancient peat and apple extracts (TRT) or placebo (PLA). Supervised resistance training consisted of 8 weeks of daily undulating periodized training followed by a 2-week overreach and a 2-week taper phase. Body composition was assessed using dual-energy X-ray absorptiometry and ultrasound at weeks 0, 4, 8, 10, and 12. Vital signs and blood markers were assessed at weeks 0, 8, and 12. Significant group × time (p < 0.05) interactions were present for ultrasound-determined cross-sectional area, which increased in TRT (+0.91 cm(2)) versus PLA (-0.08 cm(2)), as well as muscle thickness (TRT: +0.46; PLA: +0.04 cm). A significant group × time (p < 0.05) interaction existed for creatinine (TRT: +0.06; PLA: +0.15 mg/dL), triglycerides (TRT: +24.1; PLA: -20.2 mg/dL), and very-low-density lipoprotein (TRT: +4.9; PLA: -3.9 mg/dL), which remained within clinical ranges. Supplementation with a proprietary blend of ancient peat and apple extracts may enhance resistance training-induced skeletal muscle hypertrophy without affecting fat mass or blood chemistry in healthy males.

  7. Harvesting Information from Heterogeneous Sources

    DEFF Research Database (Denmark)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    The abundance of information regarding any topic makes the Internet a very good resource. Even though searching the Internet is very easy, what remains difficult is to automate the process of information extraction from the available online information due to the lack of structure and the diversi...... with performance of our tool with respect to each format. Finally, the different potential applications of the proposed tool are discussed with special emphasis on open source intelligence....... in the sharing methods. Most of the times, information is stored in different proprietary formats, complying with different standards and protocols which makes tasks like data mining and information harvesting very difficult. In this paper, an information harvesting tool (heteroHarvest) is presented...... with objectives to address these problems by filtering the useful information and then normalizing the information in a singular non hypertext format. We also discuss state of the art tools along with the shortcomings and present the results of an analysis carried out over different heterogeneous formats along...

  8. 15 CFR 971.1006 - Proprietary enforcement information.

    Science.gov (United States)

    2010-01-01

    ... REGULATIONS OF THE ENVIRONMENTAL DATA SERVICE DEEP SEABED MINING REGULATIONS FOR COMMERCIAL RECOVERY PERMITS... or maintained under Title III of the Act concerning a person or vessel engaged in commercial recovery... Administrator will, consistent with due process, move to have records sealed, under 15 CFR part 904 subpart C...

  9. MoZis: mobile zoo information system: a case study for the city of Osnabrueck

    Science.gov (United States)

    Michel, Ulrich

    2007-10-01

    This paper describes a new project of the Institute for Geoinformatics and Remote Sensing, funded by the German Federal Foundation for the Environment (DBU, Deutsche Bundesstiftung Umwelt www.dbu.de). The goal of this project is to develop a mobile zoo information system for Pocket PCs and Smart phones. Visitors of the zoo will be able to use their own mobile devices or use Pocket PCs, which could be borrowed from the zoo to navigate around the zoo's facilities. The system will also provide additional multimedia based information such as audio-based material, animal video clips, and maps of their natural habitat. People could have access to the project at the zoo via wireless local area network or by downloading the necessary files using a home internet connection. Our software environment consists of proprietary and non-proprietary software solutions in order to make it as flexible as possible. Our first prototype was developed with Visual Studio 2003 and Visual Basic.Net.

  10. Blocking carbohydrate absorption and weight loss: a clinical trial using a proprietary fractionated white bean extract.

    Science.gov (United States)

    Udani, Jay; Singh, Betsy B

    2007-01-01

    A proprietary fractionated white bean extract of Phaseolus vulgaris has been shown in vitro to inhibit the digestive enzyme alpha-amylase. This may prevent or delay the digestion of complex carbohydrates, potentially resulting in weight loss. A 4-week randomized, double-blind, placebo-controlled study of 25 healthy subjects consuming 1000 mg of a proprietary fractioned white bean extract or an identical placebo twice a day before meals in conjunction with a multi-component weight-loss program, including diet, exercise, and behavioral intervention, was conducted. Both groups reduced their weight and waist size significantly from baseline. The active group lost 6.0 lbs (P=.0002) and 2.2 in (P=.0050), and the placebo group lost 4.7 lbs (P=.0016) and 2.1 in (P=.0001). The differences between groups were not significant (weight P=.4235, waist size P=.8654). Through subsequent exploratory analysis to investigate group findings further, subjects were stratified by total dietary carbohydrate intake. This probative analysis revealed that the tertile of subjects who had consumed the most carbohydrates demonstrated significant reductions in both weight (8.7 lbs vs 1.7 lbs, P=.0412) and waist size (3.3 in vs 1.3 in P=.0100) compared with placebo subjects in the same tertile of carbohydrate intake. Subjects who adhere to a program including dietary modification, exercise, and behavioral intervention can significantly reduce their weight and waist size in a short period of time. In an exploratory analysis of data, the tertile of subjects who ate the most carbohydrates experienced a significant reduction in both weight and waist size with the addition of the white bean extract compared to the placebo group of the same tertile of carbohydrate consumption. Longer studies with a larger pool of subjects are required to validate these findings.

  11. heteroHarvest: Harvesting Information from Heterogeneous Sources

    DEFF Research Database (Denmark)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    The abundance of information regarding any topic makes the Internet a very good resource. Even though searching the Internet is very easy, what remains difficult is to automate the process of information extraction from the available online information due to the lack of structure and the diversity...... in the sharing methods. Most of the times, information is stored in different proprietary formats, complying with different standards and protocols which makes tasks like data mining and information harvesting very difficult. In this paper, an information harvesting tool (heteroHarvest) is presented...... with objectives to address these problems by filtering the useful information and then normalizing the information in a singular non hypertext format. Finally we describe the results of experimental evaluation. The results are found promising with an overall error rate equal to 6.5% across heterogeneous formats....

  12. Oral Chinese proprietary medicine for angina pectoris: an overview of systematic reviews/meta-analyses.

    Science.gov (United States)

    Luo, Jing; Xu, Hao; Yang, Guoyan; Qiu, Yu; Liu, Jianping; Chen, Keji

    2014-08-01

    Oral Chinese proprietary medicine (CPM) is commonly used to treat angina pectoris, and many relevant systematic reviews/meta-analyses are available. However, these reviews have not been systematically summarized and evaluated. We conducted an overview of these reviews, and explored their methodological and reporting quality to inform both practice and further research. We included systematic reviews/meta-analyses on oral CPM in treating angina until March 2013 by searching PubMed, Embase, the Cochrane Library and four Chinese databases. We extracted data according to a pre-designed form, and assessed the methodological and reporting characteristics of the reviews in terms of AMSTAR and PRISMA respectively. Most of the data analyses were descriptive. 36 systematic reviews/meta-analyses involving over 82,105 participants with angina reviewing 13 kinds of oral CPM were included. The main outcomes assessed in the reviews were surrogate outcomes (34/36, 94.4%), adverse events (31/36, 86.1%), and symptoms (30/36, 83.3%). Six reviews (6/36, 16.7%) drew definitely positive conclusions, while the others suggested potential benefits in the symptoms, electrocardiogram, and adverse events. The overall methodological and reporting quality of the reviews was limited, with many serious flaws such as the lack of review protocol and incomprehensive literature searches. Though many systematic reviews/meta-analyses on oral CPM for angina suggested potential benefits or definitely positive effects, stakeholders should interpret the findings of these reviews with caution, considering the overall limited methodological and reporting quality. We recommend further studies should be appropriately conducted and systematic reviews reported according to PRISMA standard. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. 76 FR 71998 - Agency Information Collection Activities: Submitted for Office of Management and Budget (OMB...

    Science.gov (United States)

    2011-11-21

    ..., organizations, and people necessary to promote cost-effective production, and the ready availability and greater... considered proprietary under the Freedom of Information Act (5 U.S.C. 552) and its implementing regulations... projects only. Frequency of Collection: Annually. Affected Public: Private Sector; State, Local, and Tribal...

  14. Helping the Hacker? Library Information, Security, and Social Engineering

    Directory of Open Access Journals (Sweden)

    Samuel T. C. Thompson

    2006-12-01

    Full Text Available Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.

  15. MASH TEST NO. 3-10 OF A NON-PROPRIETARY, HIGH-TENSION CABLE MEDIAN BARRIER FOR USE IN 6H:1V V-DITCH (TEST NO. MWP-8)

    Science.gov (United States)

    2017-05-10

    The Midwest States Pooled Fund Program has been developing a prototype design for a non-proprietary, high-tension cable median barrier for use in a 6H:1V V-ditch. This system incorporates four evenly spaced cables, Midwest Weak Posts (MWP) spaced at ...

  16. 75 FR 5042 - Initiation of Five-year (“Sunset”) Review

    Science.gov (United States)

    2010-02-01

    ...-0182 Filing Information As a courtesy, we are making information related to Sunset proceedings... submission of proprietary information and eligibility to receive access to business proprietary information...

  17. 75 FR 53664 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2010-09-01

    ... Review). Filing Information As a courtesy, we are making information related to Sunset Review proceedings... submission of proprietary information and eligibility to receive access to business proprietary information...

  18. 76 FR 11202 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2011-03-01

    ... (202) 482-0162. Filing Information As a courtesy, we are making information related to Sunset... regulations on submission of proprietary information and eligibility to receive access to business proprietary...

  19. Proprietary Schools. Millions Spent To Train Students for Oversupplied Occupations. Report to the Chairman, Subcommittee on Human Resources, Committee on Government Reform and Oversight, House of Representatives.

    Science.gov (United States)

    General Accounting Office, Washington, DC. Health, Education, and Human Services Div.

    The General Accounting Office (GAO) examined the extent to which the financial aid provided under Title IV of the Higher Education Act to students enrolled in proprietary schools is being spent to train individuals for demand occupations. Job opening projections in 12 states were used to estimate job demand, the National Center for Education…

  20. 75 FR 9160 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2010-03-01

    .......... Dana Mermelstein (202) 482-1391. Filing Information As a courtesy, we are making information related to... regulations on submission of proprietary information and eligibility to receive access to business proprietary...

  1. 76 FR 5563 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2011-02-01

    ... Goldberger, (202) 482-4136. Filing Information As a courtesy, we are making information related to Sunset... regulations on submission of proprietary information and eligibility to receive access to business proprietary...

  2. Open-Source web-based geographical information system for health exposure assessment

    Directory of Open Access Journals (Sweden)

    Evans Barry

    2012-01-01

    Full Text Available Abstract This paper presents the design and development of an open source web-based Geographical Information System allowing users to visualise, customise and interact with spatial data within their web browser. The developed application shows that by using solely Open Source software it was possible to develop a customisable web based GIS application that provides functions necessary to convey health and environmental data to experts and non-experts alike without the requirement of proprietary software.

  3. Open-Source web-based geographical information system for health exposure assessment

    DEFF Research Database (Denmark)

    Evans, Barry; Sabel, Clive E

    2012-01-01

    This paper presents the design and development of an open source web-based Geographical Information System allowing users to visualise, customise and interact with spatial data within their web browser. The developed application shows that by using solely Open Source software it was possible to d...... to develop a customisable web based GIS application that provides functions necessary to convey health and environmental data to experts and non-experts alike without the requirement of proprietary software....

  4. An exploratory study of relative and incremental information content of two non-financial performance measures: Field study evidence on absence frequency and on-time delivery

    NARCIS (Netherlands)

    Wiersma, E.

    2008-01-01

    In this exploratory field study, I test the relative and incremental information content of two non-financial performance measures compared to financial performance measures for future financial performance. The proprietary database used is from the contracts of the managers of 27 responsibility

  5. 77 FR 53867 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2012-09-04

    ... a courtesy, we are making information related to Sunset proceedings, including copies of the... regulations on submission of proprietary information and eligibility to receive access to business proprietary...

  6. 77 FR 45589 - Initiation of Five-Year (“Sunset”) Review and Correction

    Science.gov (United States)

    2012-08-01

    ... As a courtesy, we are making information related to Sunset proceedings, including copies of the... regulations on submission of proprietary information and eligibility to receive access to business proprietary...

  7. A systematic review of the role of proprietary and patent medicine vendors in healthcare provision in Nigeria.

    Directory of Open Access Journals (Sweden)

    Naomi Beyeler

    Full Text Available Interventions to reduce the burden of disease and mortality in sub-Saharan Africa increasingly recognize the important role that drug retailers play in delivering basic healthcare services. In Nigeria, owner-operated drug retail outlets, known as patent and proprietary medicine vendors (PPMVs, are a main source of medicines for acute conditions, but their practices are not well understood. Greater understanding of the role of PPMVs and the quality of care they provide is needed in order to inform ongoing national health initiatives that aim to incorporate PPMVs as a delivery mechanism.This paper reviews and synthesizes the existing published and grey literature on the characteristics, knowledge and practices of PPMVs in Nigeria. We searched published and grey literature using a number of electronic databases, supplemented with website searches of relevant international agencies. We included all studies providing outcome data on PPMVs in Nigeria, including non-experimental studies, and assessed the rigor of each study using the WHO-Johns Hopkins Rigor scale. We used narrative synthesis to evaluate the findings.We identified 50 articles for inclusion. These studies provided data on a wide range of PPMV outcomes: training; health knowledge; health practices, including drug stocking and dispensing, client interaction, and referral; compliance with regulatory guidelines; and the effects of interventions targeting PPMVs. In general, PPMVs have low health knowledge and poor health treatment practices. However, the literature focuses largely on services for adult malaria, and little is known about other health areas or services for children.This review highlights several concerns with the quality of the private drug retail sector in Nigeria, as well as gaps in the existing evidence base. Future research should adopt a more holistic view of the services provided by PPMV shops, and evaluate intervention strategies that may improve the services provided in

  8. A Consumer Health Information System to Assist Patients Select Quality Home Health Services

    Directory of Open Access Journals (Sweden)

    Dimitrios Zikos

    2017-11-01

    Full Text Available Patients evaluate the quality of home health agencies (HHAs using the Health Consumer Assessment of Healthcare Providers and Systems (HCAHPS survey. This paper describes a prototype community health information system to help patients select appropriate and quality HHAs, according to the location, proprietary status, type of service, and year of HHA establishment. Five HCAHPS indicators were selected: “summary rating”, “quality of care”, “professional care”, “communication”, and “recommend agency”. Independent t-test analysis showed that agencies offering Speech Pathology, Medical-Social, or Home Health Aide services, receive significantly worse HCAHPS ratings, while mean ratings vary significantly across different US states. Multiple comparisons with post hoc ANOVA revealed differences between and within HHAs of different proprietary status (p < 0.001: governmental HHAs receiving higher ratings than private HHAs. Finally, there was observed a relationship between all five quality rating variables and the HHA year of establishment (Pearson, p < 0.001. The older the agency is, the better the HCAPS summary ratings. Findings provided the knowledge to design of a consumer health information system, to provide rankings filtered according to user criteria, comparing the quality rankings of eligible HHAs. Users can also see how a specific agency is ranked against eligible HHAs. Ultimately, the system aims to support the patient community with contextually realistic comparisons in an effort to choose optimal HH service.

  9. Adoption of Free Open Source Geographic Information System Solution for Health Sector in Zanzibar Tanzania

    OpenAIRE

    BAKAR, Abubakar D.; KIMARO, Honest C.; SULTAN, Abu Bakar MD; HAMIAR, S.

    2014-01-01

    The study aims at developing in-depth understanding on how Open Source Geographic Information System technology is used to provide solutions for data visualization in the health sector of Zanzibar, Tanzania. The study focuses on implementing the health visualization solutions for the purpose of bridging the gap during the transition period from proprietary software to the Free Open-Source Software using Key Indicator Data System. The developed tool facilitates data integration between the two...

  10. Intellectual property and information controversy(I)

    Science.gov (United States)

    Aoyama, Hirokazu

    This paper deals with intellectual property as the results of various intellectual activities such as R & D, and intellectual proprietary rights which protect it. New technology, designs, literary works, computer programs, semiconductor chips, new plant breeding, brands, trading secrets, CI and others, and legislations which protect them are described. Then, the background of the fact that intellectual proprietary rights are emphasized as analyzed. The author points out items as follows; movement toward much larger size of R & D, generation of the areas to be newly protected, trend in enforcement of intellectual property protection, commercialization of intellectual property, trend in software evolution, movement in technological protectionism, and the present status on each item.

  11. Attitudes of physicians and pharmacists towards International Non-proprietary Name prescribing in Belgium.

    Science.gov (United States)

    Van Bever, Elien; Elseviers, Monique; Plovie, Marijke; Vandeputte, Lieselot; Van Bortel, Luc; Vander Stichele, Robert

    2015-03-01

    International Non-proprietary Name (INN) prescribing is the use of the name of the active ingredient(s) instead of the brand name for prescribing. In Belgium, INN prescribing began in 2005 and a major policy change occurred in 2012. The aim was to explore the opinions of Dutch-speaking general practitioners (GPs) and pharmacists. An electronic questionnaire with 39 five-point Likert scale statements and one open question was administered in 2013. Multivariate analysis was performed with multiple linear regression on a sum score for benefit statements and for drawback statements. Answers to the open question were qualitatively analysed. We received 745 valid responses with a representable sample for both subgroups. Participants perceived the motives to introduce INN prescribing as purely economic (to reduce pharmaceutical expenditures for the government and the patient). Participants accepted the concept of INN prescribing, but 88% stressed the importance of guaranteed treatment continuity, especially in older, chronic patients, to prevent patient confusion, medication non-adherence and erroneous drug use. In conclusion, the current way in which INN prescribing is applied in Belgium leads to many concerns among primary health professionals about patient confusion and medication adherence. Slightly adapting the current concept of INN prescribing to these concerns can turn INN prescribing into one of the major policies in Belgium to reduce pharmaceutical expenditures and to stimulate rational drug prescribing. © 2014 Nordic Association for the Publication of BCPT (former Nordic Pharmacological Society).

  12. Speman®, A Proprietary Ayurvedic Formulation, Reverses Cyclophosphamide-Induced Oligospermia In Rats.

    Directory of Open Access Journals (Sweden)

    Mohd. Azeemuddin Mukram

    2013-04-01

    Full Text Available Background: This investigation was aimed to evaluate the effect of Speman®, a well known ayurvedic proprietary preparation, in an experimental model of cyclophosphamide-(CP induced oligospermia in rats.Materials and Methods: Thirty male rats were randomized in to five, equally-sized groups. Rats in group 1 served as a normal control; group 2 served as an untreated positive control; groups 3, 4, 5 received  Speman® granules  at doses of 300, 600, and 900mg/kg body weight p.o. respectively, once daily for 13 days. On day four, one hour after the respective treatment, oligospermia was induced by administering a single dose of CP (100mg/kg body weight p.o.  to all the groups except group1. At the end of the study period the rats were euthanised and accessory reproductive organs were weighed and subjected to histopathological examination. The semen samples were subject to enumeration of sperms.  Weight of the reproductive organs, histopathological examination of the tissues, and sperm count were the parameters studied to understand the effect of Speman® on rats with CP-induced oligospermia.Results: Changes that occurred due to the administration of CP at a dose of 100 mg/kg body weight were dose dependently reversed with Speman® at a dose of 300, 600, and 900 mg/kg body weight. There was a statistically significant increase in sperm count and the weight of the seminal vesicle, epididymis, and prostate.Conclusion: Findings of this investigation indicate that Speman® dose dependently reversed the CP-induced derangement of various parameters pertaining to the reproductive system.  This could explain the total beneficial actions of Speman® reported in several other clinical trials.

  13. Effects of a Proprietary Freeze-Dried Water Extract of Eurycoma longifolia (Physta) and Polygonum minus on Sexual Performance and Well-Being in Men: A Randomized, Double-Blind, Placebo-Controlled Study.

    Science.gov (United States)

    Udani, Jay K; George, Annie A; Musthapa, Mufiza; Pakdaman, Michael N; Abas, Azreena

    2014-01-01

    Background. Physta is a proprietary product containing a freeze-dried water extract of Eurycoma longifolia (tongkat ali), which is traditionally used as an energy enhancer and aphrodisiac. We aim to evaluate a 300 mg combination of Physta and Polygonum minus, an antioxidant, with regard to sexual performance and well-being in men. Methods. Men that aged 40-65 years were screened for this 12-week randomized, double-blind, placebo-controlled, parallel-group study. Outcome measures included validated questionnaires that aimed to evaluate erectile function, satisfaction with intervention, sexual intercourse performance, erectile hardness, mood, and overall quality of life. Results. 12 subjects in the active group and 14 in the placebo group completed the study. Significant improvements were noted in scores for the Sexual Intercourse Attempt diary, Erection Hardness Scale, Sexual Health Inventory of Men, and Aging Male Symptom scale (P < 0.05 for all). Three adverse events were reported in the active group and four in the placebo group, none of which were attributed to study product. Laboratory evaluations, including liver and kidney function testing, showed no clinically significant abnormality. Conclusion. Supplementation for twelve weeks with Polygonum minus and the proprietary Eurycoma longifolia extract, Physta, was well tolerated and more effective than placebo in enhancing sexual performance in healthy volunteers.

  14. Effects of a Proprietary Freeze-Dried Water Extract of Eurycoma longifolia (Physta and Polygonum minus on Sexual Performance and Well-Being in Men: A Randomized, Double-Blind, Placebo-Controlled Study

    Directory of Open Access Journals (Sweden)

    Jay K. Udani

    2014-01-01

    Full Text Available Background. Physta is a proprietary product containing a freeze-dried water extract of Eurycoma longifolia (tongkat ali, which is traditionally used as an energy enhancer and aphrodisiac. We aim to evaluate a 300 mg combination of Physta and Polygonum minus, an antioxidant, with regard to sexual performance and well-being in men. Methods. Men that aged 40–65 years were screened for this 12-week randomized, double-blind, placebo-controlled, parallel-group study. Outcome measures included validated questionnaires that aimed to evaluate erectile function, satisfaction with intervention, sexual intercourse performance, erectile hardness, mood, and overall quality of life. Results. 12 subjects in the active group and 14 in the placebo group completed the study. Significant improvements were noted in scores for the Sexual Intercourse Attempt diary, Erection Hardness Scale, Sexual Health Inventory of Men, and Aging Male Symptom scale (P<0.05 for all. Three adverse events were reported in the active group and four in the placebo group, none of which were attributed to study product. Laboratory evaluations, including liver and kidney function testing, showed no clinically significant abnormality. Conclusion. Supplementation for twelve weeks with Polygonum minus and the proprietary Eurycoma longifolia extract, Physta, was well tolerated and more effective than placebo in enhancing sexual performance in healthy volunteers.

  15. Adequacy of pharmacological information provided in pharmaceutical drug advertisements in African medical journals.

    Directory of Open Access Journals (Sweden)

    Oshikoya KA

    2009-06-01

    Full Text Available Pharmaceutical advertisement of drugs is a means of advocating drug use and their selling but not a substitute for drug formulary to guide physicians in safe prescribing. Objectives: To evaluate drug advertisements in Nigerian and other African medical journals for their adequacy of pharmacological information. Methods: Twenty four issues from each of West African Journal of Medicine (WAJM, East African Medical Journal (EAMJ, South African Medical Journal (SAMJ, Nigerian Medical Practitioner (NMP, Nigerian Quarterly Journal of Hospital Medicine (NQJHM and Nigerian Postgraduate Medical Journal (NPMJ were reviewed. While EAMJ, SAMJ and NMP are published monthly, the WAJM, NQJHM and NPMJ are published quarterly. The monthly journals were reviewed between January 2005 and December 2006, and the quarterly journals between January 2001 and December 2006. The drug information with regards to brand/non-proprietary name, pharmacological data, clinical information, pharmaceutical information and legal aspects was evaluated as per World Health Organisation (WHO criteria. Counts in all categories were collated for each advertiser.Results: Forty one pharmaceutical companies made 192 advertisements. 112 (58.3% of these advertisements were made in the African medical journals. Pfizer (20.3% and Swipha (12.5% topped the list of the advertising companies. Four (2.1% adverts mentioned generic names only, 157 (81.8% mentioned clinical indications. Adults and children dosage (39.6%, use in special situations such as pregnancy and renal or liver problems (36.5%, adverse effects (30.2%, average duration of treatment (26.0%, and potential for interaction with other drugs (18.7% were less discussed. Pharmaceutical information such as available dosage forms and product and package information {summary of the generic and proprietary names, the formulation strength, active ingredient, route of administration, batch number, manufactured and expiry dates, and the

  16. Tank Information System (tis): a Case Study in Migrating Web Mapping Application from Flex to Dojo for Arcgis Server and then to Open Source

    Science.gov (United States)

    Pulsani, B. R.

    2017-11-01

    Tank Information System is a web application which provides comprehensive information about minor irrigation tanks of Telangana State. As part of the program, a web mapping application using Flex and ArcGIS server was developed to make the data available to the public. In course of time as Flex be-came outdated, a migration of the client interface to the latest JavaScript based technologies was carried out. Initially, the Flex based application was migrated to ArcGIS JavaScript API using Dojo Toolkit. Both the client applications used published services from ArcGIS server. To check the migration pattern from proprietary to open source, the JavaScript based ArcGIS application was later migrated to OpenLayers and Dojo Toolkit which used published service from GeoServer. The migration pattern noticed in the study especially emphasizes upon the use of Dojo Toolkit and PostgreSQL database for ArcGIS server so that migration to open source could be performed effortlessly. The current ap-plication provides a case in study which could assist organizations in migrating their proprietary based ArcGIS web applications to open source. Furthermore, the study reveals cost benefits of adopting open source against commercial software's.

  17. Control of information as an element of nuclear safeguards

    International Nuclear Information System (INIS)

    Green, J.N.

    1982-03-01

    Control of information as an element of physical protection has a long history in the field of national security. The nuclear industry is familiar with the constraints on proprietary information; and, with an effective date of October 1, 1980 for Parts 25 and 95 in Title 10 of the code of Federal Regulations, certain activities had to cope with rules for safeguarding of classified information. In applying the rules it is important to understand the differences between national security information and restricted data, and how guidance is promulgated both by the Nuclear Regulatory Commission (NRC) and by the Department of Energy. More recently, with a fully effective date of January 20, 1982, the NRC published rules for the protection of unclassified safeguards information. The scope is much broader than for the classified information. For example, the rules are applicable to power reactors. In this paper the directives which provide the details for compliance with all these rules are identified, and their application is discussed. NRC inspectors will be checking for compliance with the rules. Once problems of compliance are resolved, the more difficult question of evaluating the impact of information control procedures on the effectiveness of a physical protection system can be addressed

  18. Information on the Advanced Plant Experiment (APEX) Test Facility

    International Nuclear Information System (INIS)

    Smith, Curtis Lee

    2015-01-01

    The purpose of this report provides information related to the design of the Oregon State University Advanced Plant Experiment (APEX) test facility. Information provided in this report have been pulled from the following information sources: Reference 1: R. Nourgaliev and et.al, 'Summary Report on NGSAC (Next-Generation Safety Analysis Code) Development and Testing,' Idaho National Laboratory, 2011. Note that this is report has not been released as an external report. Reference 2: O. Stevens, Characterization of the Advanced Plant Experiment (APEX) Passive Residual Heat Removal System Heat Exchanger, Master Thesis, June 1996. Reference 3: J. Reyes, Jr., Q. Wu, and J. King, Jr., Scaling Assessment for the Design of the OSU APEX-1000 Test Facility, OSU-APEX-03001 (Rev. 0), May 2003. Reference 4: J. Reyes et al, Final Report of the NRC AP600 Research Conducted at Oregon State University, NUREG/CR-6641, July 1999. Reference 5: K. Welter et al, APEX-1000 Confirmatory Testing to Support AP1000 Design Certification (non-proprietary), NUREG-1826, August 2005.

  19. Reflections on the role of open source in health information system interoperability.

    Science.gov (United States)

    Sfakianakis, S; Chronaki, C E; Chiarugi, F; Conforti, F; Katehakis, D G

    2007-01-01

    This paper reflects on the role of open source in health information system interoperability. Open source is a driving force in computer science research and the development of information systems. It facilitates the sharing of information and ideas, enables evolutionary development and open collaborative testing of code, and broadens the adoption of interoperability standards. In health care, information systems have been developed largely ad hoc following proprietary specifications and customized design. However, the wide deployment of integrated services such as Electronic Health Records (EHRs) over regional health information networks (RHINs) relies on interoperability of the underlying information systems and medical devices. This reflection is built on the experiences of the PICNIC project that developed shared software infrastructure components in open source for RHINs and the OpenECG network that offers open source components to lower the implementation cost of interoperability standards such as SCP-ECG, in electrocardiography. Open source components implementing standards and a community providing feedback from real-world use are key enablers of health care information system interoperability. Investing in open source is investing in interoperability and a vital aspect of a long term strategy towards comprehensive health services and clinical research.

  20. TANK INFORMATION SYSTEM (TIS: A CASE STUDY IN MIGRATING WEB MAPPING APPLICATION FROM FLEX TO DOJO FOR ARCGIS SERVER AND THEN TO OPEN SOURCE

    Directory of Open Access Journals (Sweden)

    B. R. Pulsani

    2017-11-01

    Full Text Available Tank Information System is a web application which provides comprehensive information about minor irrigation tanks of Telangana State. As part of the program, a web mapping application using Flex and ArcGIS server was developed to make the data available to the public. In course of time as Flex be-came outdated, a migration of the client interface to the latest JavaScript based technologies was carried out. Initially, the Flex based application was migrated to ArcGIS JavaScript API using Dojo Toolkit. Both the client applications used published services from ArcGIS server. To check the migration pattern from proprietary to open source, the JavaScript based ArcGIS application was later migrated to OpenLayers and Dojo Toolkit which used published service from GeoServer. The migration pattern noticed in the study especially emphasizes upon the use of Dojo Toolkit and PostgreSQL database for ArcGIS server so that migration to open source could be performed effortlessly. The current ap-plication provides a case in study which could assist organizations in migrating their proprietary based ArcGIS web applications to open source. Furthermore, the study reveals cost benefits of adopting open source against commercial software's.

  1. Enterprise Information Management with Plone Portals

    Directory of Open Access Journals (Sweden)

    Marcello Peixoto Bax

    2009-05-01

    Full Text Available The article shows that it is possible to implement a corporate portal using open source software, in an integrated manner with the proprietary MS Windows environment. As it is the real scenario in the vast majority of businesses and organizations today, a portal that meets these specific requirements is highly representative, mainly because MS Windows integration in the client environment (not in the server is not trivial for an open source portal. The paper shows that, by deploying a portal in this context the company considerably moves forward regarding information management. To show this, the article focuses on the key positive aspects arising from the deployment of a intranet / extranet portal in that context, i.e., MS Windows integration; editing with MS Office or other similar applications; shared editing control (with check-in and check-out; universal web access; and the use of metadata and workflow.

  2. Information Literacy in the Changing Landscape of Distance Learning: The Collaborative Design of a Flexible, Digital, Asynchronous Course

    Directory of Open Access Journals (Sweden)

    Betsy Reichart

    2015-11-01

    Full Text Available This paper offers a case study of the collaborative development of an information literacy course for students enrolled in an online, proprietary college. This credit-bearing course was created in accordance with ACRL’s Information Literacy Competency Standards for Higher Education as well as the newly adopted Framework for Information Literacy for Higher Education. The course treats information literacy as a meta-competency that encourages students to explore a variety of research tools, from social media to scholarly journals, and to develop critical thinking and research skills. In order to incorporate current best practices in information literacy pedagogy into the course itself, institutional factors needed to be addressed; these factors are reviewed here. This paper also explores implications for the future of the course, including assessment, the need to constantly adapt to the changing needs of students, and the ever-changing digital environment.

  3. Proprietary arabinogalactan extract increases antibody response to the pneumonia vaccine: a randomized, double-blind, placebo-controlled, pilot study in healthy volunteers

    Directory of Open Access Journals (Sweden)

    Udani Jay K

    2010-08-01

    Full Text Available Abstract Background Arabinogalactan from Larch tree (Larix spp. bark has previously demonstrated immunostimulatory activity. The purpose of this study was to test the hypothesis that ingestion of a proprietary arabinogalactan extract, ResistAid™, would selectively enhance the antibody response to the pneumococcal (pneumonia vaccine in healthy adults. Methods This randomized, double-blind, placebo-controlled, parallel group pilot study included 45 healthy adults who had not previously been vaccinated against Streptococcus pneumoniae. The volunteers began taking the study product or placebo (daily dosage 4.5 g at the screening visit (V1-Day 0 and continued over the entire 72 day study period. After 30 days the subjects received the 23-valent pneumococcal vaccine (V2. They were monitored the following day (V3-Day 31, as well as 21 days (V4-Day 51 and 42 days (V5-Day 72 after vaccination. Responses by the adaptive immune system (antigen specific were measured via pneumococcal IgG antibodies (subtypes 4, 6B, 9V, 14, 18C, 19F, and 23F and salivary IgA levels. Responses by the innate immune system (non-specific were measured via white blood cell counts, inflammatory cytokines and the complement system. Results Vaccination significantly increased pneumococcal IgG levels as expected. The arabinogalactan group demonstrated a statistically significant greater IgG antibody response than the placebo group in two antibodies subtypes (18C and 23F at both Day 51 (p = 0.006 and p = 0.002 and at Day 72 (p = 0.008 and p = 0.041. These same subtypes (18C and 23F also demonstrated change scores from baseline which were significant, in favor of the arabinogalactan group, at Day 51 (p = 0.033 and 0.001 and at Day 72 (p = 0.012 and p = 0.003. Change scores from baseline and mean values were greater in the arabinogalactan group than placebo for most time points in antibody subtypes 4, 6B, 9V, and 19F, but these differences did not reach statistical significance. There

  4. Proprietary arabinogalactan extract increases antibody response to the pneumonia vaccine: a randomized, double-blind, placebo-controlled, pilot study in healthy volunteers.

    Science.gov (United States)

    Udani, Jay K; Singh, Betsy B; Barrett, Marilyn L; Singh, Vijay J

    2010-08-26

    Arabinogalactan from Larch tree (Larix spp.) bark has previously demonstrated immunostimulatory activity. The purpose of this study was to test the hypothesis that ingestion of a proprietary arabinogalactan extract, ResistAid™, would selectively enhance the antibody response to the pneumococcal (pneumonia) vaccine in healthy adults. This randomized, double-blind, placebo-controlled, parallel group pilot study included 45 healthy adults who had not previously been vaccinated against Streptococcus pneumoniae. The volunteers began taking the study product or placebo (daily dosage 4.5 g) at the screening visit (V1-Day 0) and continued over the entire 72 day study period. After 30 days the subjects received the 23-valent pneumococcal vaccine (V2). They were monitored the following day (V3-Day 31), as well as 21 days (V4-Day 51) and 42 days (V5-Day 72) after vaccination. Responses by the adaptive immune system (antigen specific) were measured via pneumococcal IgG antibodies (subtypes 4, 6B, 9V, 14, 18C, 19F, and 23F) and salivary IgA levels. Responses by the innate immune system (non-specific) were measured via white blood cell counts, inflammatory cytokines and the complement system. Vaccination significantly increased pneumococcal IgG levels as expected. The arabinogalactan group demonstrated a statistically significant greater IgG antibody response than the placebo group in two antibodies subtypes (18C and 23F) at both Day 51 (p = 0.006 and p = 0.002) and at Day 72 (p = 0.008 and p = 0.041). These same subtypes (18C and 23F) also demonstrated change scores from baseline which were significant, in favor of the arabinogalactan group, at Day 51 (p = 0.033 and 0.001) and at Day 72 (p = 0.012 and p = 0.003). Change scores from baseline and mean values were greater in the arabinogalactan group than placebo for most time points in antibody subtypes 4, 6B, 9V, and 19F, but these differences did not reach statistical significance. There was no effect from the vaccine or

  5. DESIGN INFORMATION VERIFICATION FOR NUCLEAR SAFEGUARDS

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Bean; Richard R. M. Metcalf; Phillip C. Durst

    2009-07-01

    A critical aspect of international safeguards activities performed by the International Atomic Energy Agency (IAEA) is the verification that facility design and construction (including upgrades and modifications) do not create opportunities for nuclear proliferation. These Design Information Verification activities require that IAEA inspectors compare current and past information about the facility to verify the operator’s declaration of proper use. The actual practice of DIV presents challenges to the inspectors due to the large amount of data generated, concerns about sensitive or proprietary data, the overall complexity of the facility, and the effort required to extract just the safeguards relevant information. Planned and anticipated facilities will (especially in the case of reprocessing plants) be ever larger and increasingly complex, thus exacerbating the challenges. This paper reports the results of a workshop held at the Idaho National Laboratory in March 2009, which considered technologies and methods to address these challenges. The use of 3D Laser Range Finding, Outdoor Visualization System, Gamma-LIDAR, and virtual facility modeling, as well as methods to handle the facility data issues (quantity, sensitivity, and accessibility and portability for the inspector) were presented. The workshop attendees drew conclusions about the use of these techniques with respect to successfully employing them in an operating environment, using a Fuel Conditioning Facility walk-through as a baseline for discussion.

  6. 75 FR 27782 - Federal Acquisition Regulation; Submission for OMB Review; Rights in Data and Copyrights

    Science.gov (United States)

    2010-05-18

    ... disclose proprietary data and to insure that data developed with public funds is available to the public... ``Submit a Comment'' screen. Please include your name, company name (if any), and ``Information Collection... offeror would identify any proprietary data it would use during contract performance in order that the...

  7. Implementation of an Anesthesia Information Management System (AIMS).

    Science.gov (United States)

    Douglas, James R; Ritter, Melody J

    2011-01-01

    During the administration of anesthesia, the anesthesia provider has historically created a paper record, charted manually, that included extensive patient care-related data (vital signs, other parameters, etc) and commentaries. DocuSys, a proprietary anesthesia information management system (AIMS), creates an electronic version of the anesthesia record and provides additional information. It electronically captures data from clinical monitors and other sources, including scheduling applications and laboratory computers. The AIMS facilitates chart entries such as drug doses and case narratives. Benefits of an AIMS include improved legibility of the anesthesia record and greater efficiency in documentation efforts. Use of the AIMS assists the practitioner with decision support logic, such as the timing of antibiotic administration and the inclusion of legally required documentation. Upon case completion, the AIMS data are immediately available to other information systems, such as billing and medical records. Data can be made available from a single case or, more important, from thousands of cases to analyze variables such as efficiency of services, adherence to best practices, patient outcomes, and clinical research. The AIMS was deployed at the main campus of the Ochsner Health System on March 26, 2009. In this article, we discuss the issues involved in the AIMS implementation process: the successes, surprises, and continued challenges.

  8. Inter-Firm Information Sharing in Enterprise Resource Planning Systems: a call for timely but limited access to customer information

    Directory of Open Access Journals (Sweden)

    Michael Busing

    2001-11-01

    Full Text Available Current trends in Enterprise Resource Planning (ERP suggest that supply chain management and tight control over scheduling jobs within the supply chain are key tactical planning issues. Modern ERP software packages, in conjunction with the World Wide Web, allow for automated exchange of information within a company and also between two or more companies (i.e., conveyance of customer information to suppliers of parts and components for the purposes of effective planning and control. While ease of information exchange between a customer and supplier is increasingly critical to the success of modern-day planning and control efforts, the issue of information security is also a very real concern. Suppliers can benefit from gaining access to a customer's dispatch list and material requirements plan (MRP in order to determine real-time priority of jobs in queue at various work centers within their own organization. Other customer information, however, should remain secure and unavailable to supplier firms for competitive reasons such as threat of forward integration. This paper presents a previously tested priority-sequencing rule that explicitly considers downstream shop conditions in determining which job to run next The rule proves to perform well on mean flow time and lateness as well as on variability of these measures. The rule is extended here to incorporate the case where a downstream work center is outside official corporate boundaries. With the call for free exchange of information comes the threat of other, perhaps proprietary, information being accessed by vendors or others outside the official corporate boundaries. The paper will propose information that should be freely exchanged between customers and suppliers and information that should remain secure. Finally, practical measures to manage access to web-enabled ERP information will be proposed.

  9. Information Security Audit in e-business applications

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available Electronic business (e-business are different than other business because it involves any commercial or business activity that takes place by means of electronic facilities (buy and selling online, including on the Internet, proprietary networks and home banking, instead of through direct physical exchange or contact. This system creates an environment that operates at a much greater speed than traditional methods and involves much less paper–based evidence of activities. These e-business related risks should not be considered in isolation but rather as part of the overall internal control framework of an entity. It is essential to identify and assess the risks associated with an e-business environment and management should develop an e-business strategy that identifies and addresses risks. The e-business Information Systems (IS audit is a critical component of the e-business plan. This paper tries to present a risk analysis for e-business applications in order to establish the IS audit particularities in this field.

  10. Effect of a multimedia-assisted informed consent procedure on the information gain, satisfaction, and anxiety of cataract surgery patients.

    Science.gov (United States)

    Tipotsch-Maca, Saskia M; Varsits, Ralph M; Ginzel, Christian; Vecsei-Marlovits, Pia V

    2016-01-01

    To assess whether a multimedia-assisted preoperative informed consent procedure has an effect on patients' knowledge concerning cataract surgery, satisfaction with the informed consent process, and reduction in anxiety levels. Hietzing Hospital, Vienna, Austria. Prospective randomized controlled clinical trial. Patients participated in an informed consent procedure for age-related cataract surgery that included the standard approach only (reading the information brochure and having a standardized face-to-face discussion) or supplemented with a computer-animated video. The main outcome was information retention assessed by a questionnaire. Further outcome measures used were the State-Trait Anxiety Inventory, the Visual Function-14 score, and an assessment of satisfaction. The study included 123 patients (64 in standard-only group; 59 in computer-animated video group). Both groups scored well on the questionnaire; however, patients who watched the video performed better (82% retention versus 72%) (P = .002). Scores tended to decrease with increasing age (r = -0.25, P = .005); however, this decrease was smaller in the group that watched the video. Both groups had elevated anxiety levels (means in video group: anxiety concerning the current situation [S-anxiety] = 63.8 ± 9.6 [SD], general tendency toward anxiety [T-anxiety] = 65.5 ± 7.9; means in control group: S-anxiety = 61.9 ± 10.3, T-anxiety = 66.2 ± 7.8). A high level of information retention was achieved using an informed consent procedure consisting of an information brochure and a standardized face-to-face discussion. A further increase in information retention was achieved, even with increasing patient age, by adding a multimedia presentation. No author has a financial or proprietary interest in any material or method mentioned. Copyright © 2016 ASCRS and ESCRS. Published by Elsevier Inc. All rights reserved.

  11. 78 FR 68838 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-11-15

    ... proprietary business information; information which, if disclosed, would violate the Trade Secrets Act; or information which would jeopardize jobs in the United States by supplying information that competitors could...

  12. Integrating Information Literacy and Evidence-Based Medicine Content within a New School of Medicine Curriculum: Process and Outcome.

    Science.gov (United States)

    Muellenbach, Joanne M; Houk, Kathryn M; E Thimons, Dana; Rodriguez, Bredny

    2018-01-01

    This column describes a process for integrating information literacy (IL) and evidence-based medicine (EBM) content within a new school of medicine curriculum. The project was a collaborative effort among health sciences librarians, curriculum deans, directors, and faculty. The health sciences librarians became members of the curriculum committees, developed a successful proposal for IL and EBM content within the curriculum, and were invited to become course instructors for Analytics in Medicine. As course instructors, the librarians worked with the other faculty instructors to design and deliver active learning class sessions based on a flipped classroom approach using a proprietary Information Mastery curriculum. Results of this collaboration may add to the knowledge base of attitudes and skills needed to practice as full faculty partners in curricular design and instruction.

  13. Point-and-Click Pedagogy: Is it Effective for Teaching Information Technology?

    Directory of Open Access Journals (Sweden)

    Mark Angolia

    2016-09-01

    Full Text Available This paper assesses the effectiveness of the adoption of curriculum content developed and supported by a global academic university-industry alliance sponsored by one of the world’s largest information technology software providers. Academic alliances promote practical and future-oriented education while providing access to proprietary software and technology. Specifically, this paper addresses a lack of quantitative analysis to substantiate the perceived benefits of using information technology “point-and-click” instructional pedagogy to teach fundamental business processes and concepts. The analysis of over 800 test questions from 229 students allowed inferences regarding the utilization of self-directed “point-and-click” driven case studies employed to teach software applications of business processes needed for supply chain management. Correlation studies and analysis of variance investigated data collected from 10 individual course sections over a two-and-one-half-year period in a four-year public university. The data showed statistically significant positive correlations between the pedagogy and conceptual learning. Further, the research provided evidence that the methodology is equally effective for teaching information technology applications using either face-to-face or distance education delivery methods.

  14. 77 FR 62236 - Application for Final Commitment for a Long-term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-10-12

    ... not include confidential or proprietary business information; information which, if disclosed, would... supplying information that competitors could use to compete with companies in the United States. DATES...

  15. 76 FR 74775 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2011-12-01

    ...). Filing Information As a courtesy, we are making information related to Sunset proceedings, including... business proprietary information under APO can be found at 19 CFR 351.304-306. Information Required From...

  16. 75 FR 103 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2010-01-04

    ... Filing Information As a courtesy, we are making information related to Sunset proceedings, including... information and eligibility to receive access to business proprietary information under APO can be found at 19...

  17. 78 FR 13862 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2013-03-01

    ...-5047. Filing Information As a courtesy, we are making information related to Sunset proceedings... information and eligibility to receive access to business proprietary information under APO can be found at 19...

  18. Modernizing Corporate MIS: from Information System Modelling to Implementation

    CERN Document Server

    Dheur, E; Martens, R; Petrilli, A; Smale, B

    1992-01-01

    This paper presents CERN's Advanced Informatics Support (AIS) project which aims at an innovative modernization of all aspects of informatics applied to the administrative processes of the Laboratory. The project began in August 1990 and is based on a proprietary operating system, relational data base system and scalable multi-processor server hardware. An analysis of the existing applications environment and its weaknesses is given in the introduction. The objectives of the project are then described. A justification of the strategic choices is given in the CERN context. The Information System Study, leading to a global data and function model for the Laboratory and the detailed area analysis of the top priority three areas are then described. An analysis is made of the benefits and disadvantages of the use of Oracle CASE in such a study and the compromises required when commercial applications packages were chosen.

  19. 77 FR 52026 - Application for Final Commitment for a Long-term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-08-28

    ... notice does not include confidential or proprietary business information; information which, if disclosed... supplying information that competitors could use to compete with companies in the United States. DATES...

  20. 77 FR 52025 - Application for Final Commitment for a Long-term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-08-28

    ... notice does not include confidential or proprietary business information; information which, if disclosed... supplying information that competitors could use to compete with companies in the United States. DATES...

  1. 77 FR 74846 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-12-18

    ... notice does not include confidential or proprietary business information; information which, if disclosed... supplying information that competitors could use to compete with companies in the United States. DATES...

  2. 77 FR 66616 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-11-06

    ... include confidential or proprietary business information; information which, if disclosed, would violate... information that competitors could use to compete with companies in the United States. DATES: Comments must be...

  3. 77 FR 59396 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-09-27

    ... include confidential or proprietary business information; information which, if disclosed, would violate... information that competitors could use to compete with companies in the United States. DATES: Comments must be...

  4. 77 FR 71683 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2012-12-03

    ... Gannon, (202) 482- Review). 0162. Filing Information As a courtesy, we are making information related to... information and eligibility to receive access to business proprietary information under APO can be found at 19...

  5. 77 FR 59897 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2012-10-01

    ..., Review). (202) 482-1391. Filing Information As a courtesy, we are making information related to Sunset... information and eligibility to receive access to business proprietary information under APO can be found at 19...

  6. Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip N.; Granderson, Jessica; Sohn, Michael; Addy, Nathan; Jump, David

    2013-09-01

    The overarching goal of this work is to advance the capabilities of technology evaluators in evaluating the building-level baseline modeling capabilities of Energy Management and Information System (EMIS) software. Through their customer engagement platforms and products, EMIS software products have the potential to produce whole-building energy savings through multiple strategies: building system operation improvements, equipment efficiency upgrades and replacements, and inducement of behavioral change among the occupants and operations personnel. Some offerings may also automate the quantification of whole-building energy savings, relative to a baseline period, using empirical models that relate energy consumption to key influencing parameters, such as ambient weather conditions and building operation schedule. These automated baseline models can be used to streamline the whole-building measurement and verification (M&V) process, and therefore are of critical importance in the context of multi-measure whole-building focused utility efficiency programs. This report documents the findings of a study that was conducted to begin answering critical questions regarding quantification of savings at the whole-building level, and the use of automated and commercial software tools. To evaluate the modeling capabilities of EMIS software particular to the use case of whole-building savings estimation, four research questions were addressed: 1. What is a general methodology that can be used to evaluate baseline model performance, both in terms of a) overall robustness, and b) relative to other models? 2. How can that general methodology be applied to evaluate proprietary models that are embedded in commercial EMIS tools? How might one handle practical issues associated with data security, intellectual property, appropriate testing ‘blinds’, and large data sets? 3. How can buildings be pre-screened to identify those that are the most model-predictable, and therefore those

  7. 77 FR 12562 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2012-03-01

    ..., (1st Review). (202) 482-5047. Filing Information As a courtesy, we are making information related to... information and eligibility to receive access to business proprietary information under APO can be found at 19...

  8. 78 FR 7400 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2013-02-01

    ... Hexametaphosphate (202) 482-5047. (1st Review). Filing Information As a courtesy, we are making information related... information and eligibility to receive access to business proprietary information under APO can be found at 19...

  9. A randomized study of multimedia informational aids for research on medical practices: implications for informed consent

    Science.gov (United States)

    Kraft, Stephanie A; Constantine, Melissa; Magnus, David; Porter, Kathryn M.; Lee, Sandra Soo-Jin; Green, Michael; Kass, Nancy E; Wilfond, Benjamin S.; Cho, Mildred K

    2016-01-01

    Background/aims Participant understanding is a key element of informed consent for enrollment in research. However, participants often do not understand the nature, risks, benefits, or design of the studies in which they take part. Research on medical practices, which studies standard interventions rather than new treatments, has the potential to be especially confusing to participants because it is embedded within usual clinical care. Our objective in this randomized study was to compare the ability of a range of multimedia informational aids to improve participant understanding in the context of research on medical practices. Methods We administered a Web-based survey to members of a proprietary online panel sample selected to match national U.S. demographics. Respondents were randomized to one of five arms: four content-equivalent informational aids (animated videos, slideshows with voiceover, comics, and text), and one no-intervention control. We measured knowledge of research on medical practices using a summary knowledge score from 10 questions based on the content of the informational aids. We used ANOVA and paired t-tests to compare knowledge scores between arms. Results There were 1500 completed surveys (300 in each arm). Mean knowledge scores were highest for the slideshows with voiceover (65.7%), followed by the animated videos (62.7%), comics (60.7%), text (57.2%), and control (50.3%). Differences between arms were statistically significant except between the slideshows with voiceover and animated videos and between the animated videos and comics. Informational aids that included an audio component (animated videos and slideshows with voiceover) had higher knowledge scores than those without an audio component (64.2% versus 59.0%, peffectively than text alone. However, the relatively low knowledge scores suggest that targeted informational aids may be needed to teach some particularly challenging concepts. Nonetheless, our results demonstrate the

  10. 78 FR 16675 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-03-18

    ...(s): Mubadala Development Company PJSC, Dubai Aluminium Company PJSC. Description of Items Being... note that this notice does not include confidential or proprietary business information; information...

  11. 76 FR 18163 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2011-04-01

    .... Filing Information As a courtesy, we are making information related to Sunset Review proceedings... eligibility to receive access to business proprietary information under APO can be found at 19 CFR 351.304-306...

  12. 78 FR 72061 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2013-12-02

    ...). 4136. Filing Information As a courtesy, we are making information related to sunset proceedings... eligibility to receive access to business proprietary information under APO can be found at 19 CFR 351.304-306...

  13. Information Management Workflow and Tools Enabling Multiscale Modeling Within ICME Paradigm

    Science.gov (United States)

    Arnold, Steven M.; Bednarcyk, Brett A.; Austin, Nic; Terentjev, Igor; Cebon, Dave; Marsden, Will

    2016-01-01

    With the increased emphasis on reducing the cost and time to market of new materials, the need for analytical tools that enable the virtual design and optimization of materials throughout their processing - internal structure - property - performance envelope, along with the capturing and storing of the associated material and model information across its lifecycle, has become critical. This need is also fueled by the demands for higher efficiency in material testing; consistency, quality and traceability of data; product design; engineering analysis; as well as control of access to proprietary or sensitive information. Fortunately, material information management systems and physics-based multiscale modeling methods have kept pace with the growing user demands. Herein, recent efforts to establish workflow for and demonstrate a unique set of web application tools for linking NASA GRC's Integrated Computational Materials Engineering (ICME) Granta MI database schema and NASA GRC's Integrated multiscale Micromechanics Analysis Code (ImMAC) software toolset are presented. The goal is to enable seamless coupling between both test data and simulation data, which is captured and tracked automatically within Granta MI®, with full model pedigree information. These tools, and this type of linkage, are foundational to realizing the full potential of ICME, in which materials processing, microstructure, properties, and performance are coupled to enable application-driven design and optimization of materials and structures.

  14. 77 FR 23260 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Science.gov (United States)

    2012-04-18

    .... 6. Scientific soundness of the measure: Explanation of methods to determine the scientific soundness..., 2015. Method of Collection To achieve the goals of this project, AHRQ intends to solicit submission of... proprietary rights (e.g., patent or data rights), any confidentiality or trade secret protections, National...

  15. Preclinical and Clinical Studies Demonstrate That the Proprietary Herbal Extract DA-5512 Effectively Stimulates Hair Growth and Promotes Hair Health

    Directory of Open Access Journals (Sweden)

    Jae Young Yu

    2017-01-01

    Full Text Available The proprietary DA-5512 formulation comprises six herbal extracts from traditional oriental plants historically associated with therapeutic and other applications related to hair. Here, we investigated the effects of DA-5512 on the proliferation of human dermal papilla cells (hDPCs in vitro and on hair growth in C57BL/6 mice and conducted a clinical study to evaluate the efficacy and safety of DA-5512. DA-5512 significantly enhanced the viability of hDPCs in a dose-dependent manner (p<0.05, and 100 ppm of DA-5512 and 1 μM minoxidil (MXD significantly increased the number of Ki-67-positive cells, compared with the control group (p<0.05. MXD (3% and DA-5512 (1%, 5% significantly stimulated hair growth and increased the number and length of hair follicles (HFs versus the controls (each p<0.05. The groups treated with DA-5512 exhibited hair growth comparable to that induced by MXD. In clinical study, we detected a statistically significant increase in the efficacy of DA-5512 after 16 weeks compared with the groups treated with placebo or 3% MXD (p<0.05. In conclusion, DA-5512 might promote hair growth and enhance hair health and can therefore be considered an effective option for treating hair loss.

  16. 77 FR 24705 - Certain New Chemicals; Receipt and Status Information

    Science.gov (United States)

    2012-04-25

    ...-n,n-dimethyl- additive. N-[3-[[(13z)-1-oxo-13- docosen-1- yl]amino]propyl]-3- sulfo-, inner salt. P... tributyltetradecyl-, production of chloride. proprietary chemical for the electronics industry. P-12-0276......... 03... & industrial coatings. P-12-0297......... 04/06/2012 07/04/2012 Gelest, Inc...... (G) Synthesis of (G...

  17. 77 FR 51023 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-08-23

    ...: Please note that this notice does not include confidential or proprietary business information... jobs in the United States by supplying information that competitors could use to compete with companies...

  18. 78 FR 5439 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-01-25

    ...: Please note that this notice does not include confidential or proprietary business information... jobs in the United States by supplying information that competitors could use to compete with companies...

  19. 78 FR 42777 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-07-17

    .../ . Confidential Information: Please note that this notice does not include confidential or proprietary business... jeopardize jobs in the United States by supplying information that competitors could use to compete with...

  20. 77 FR 67362 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-11-09

    ... . Confidential Information: Please note that this notice does not include confidential or proprietary business... jeopardize jobs in the United States by supplying information that competitors could use to compete with...

  1. An XML based middleware for ECG format conversion.

    Science.gov (United States)

    Li, Xuchen; Vojisavljevic, Vuk; Fang, Qiang

    2009-01-01

    With the rapid development of information and communication technologies, various e-health solutions have been proposed. The digitized medical images as well as the mono-dimension medical signals are two major forms of medical information that are stored and manipulated within an electronic medical environment. Though a variety of industrial and international standards such as DICOM and HL7 have been proposed, many proprietary formats are still pervasively used by many Hospital Information System (HIS) and Picture Archiving and Communication System (PACS) vendors. Those proprietary formats are the big hurdle to form a nationwide or even worldwide e-health network. Thus there is an imperative need to solve the medical data integration problem. Moreover, many small clinics, many hospitals in developing countries and some regional hospitals in developed countries, which have limited budget, have been shunned from embracing the latest medical information technologies due to their high costs. In this paper, we propose an XML based middleware which acts as a translation engine to seamlessly integrate clinical ECG data from a variety of proprietary data formats. Furthermore, this ECG translation engine is designed in a way that it can be integrated into an existing PACS to provide a low cost medical information integration and storage solution.

  2. 77 FR 19643 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2012-04-02

    ...) Pressure Pipe 482-1391 (3rd Review). Filing Information As a courtesy, we are making information related to... eligibility to receive access to business proprietary information under APO can be found at 19 CFR 351.304-306...

  3. A randomized study of multimedia informational aids for research on medical practices: Implications for informed consent.

    Science.gov (United States)

    Kraft, Stephanie A; Constantine, Melissa; Magnus, David; Porter, Kathryn M; Lee, Sandra Soo-Jin; Green, Michael; Kass, Nancy E; Wilfond, Benjamin S; Cho, Mildred K

    2017-02-01

    Participant understanding is a key element of informed consent for enrollment in research. However, participants often do not understand the nature, risks, benefits, or design of the studies in which they take part. Research on medical practices, which studies standard interventions rather than new treatments, has the potential to be especially confusing to participants because it is embedded within usual clinical care. Our objective in this randomized study was to compare the ability of a range of multimedia informational aids to improve participant understanding in the context of research on medical practices. We administered a web-based survey to members of a proprietary online panel sample selected to match national US demographics. Respondents were randomized to one of five arms: four content-equivalent informational aids (animated videos, slideshows with voice-over, comics, and text) and one no-intervention control. We measured knowledge of research on medical practices using a summary knowledge score from 10 questions based on the content of the informational aids. We used analysis of variance and paired t-tests to compare knowledge scores between arms. There were 1500 completed surveys (300 in each arm). Mean knowledge scores were highest for the slideshows with voice-over (65.7%), followed by the animated videos (62.7%), comics (60.7%), text (57.2%), and control (50.3%). Differences between arms were statistically significant except between the slideshows with voice-over and animated videos and between the animated videos and comics. Informational aids that included an audio component (animated videos and slideshows with voice-over) had higher knowledge scores than those without an audio component (64.2% vs 59.0%, p informational aids with a character-driven story component (animated videos and comics) and those without. Our results show that simple multimedia aids that use a dual-channel approach, such as voice-over with visual reinforcement, can

  4. 78 FR 44562 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-07-24

    ... confidential or proprietary business information; information which, if disclosed, would violate the Trade... competitors could use to compete with companies in the United States. DATES: Comments must be received on or...

  5. 78 FR 50414 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-08-19

    ... confidential or proprietary business information; information which, if disclosed, would violate the Trade... competitors could use to compete with companies in the United States. DATES: Comments must be received on or...

  6. NASA World Wind, Open Source 4D Geospatial Visualization Platform: *.NET & Java*

    Science.gov (United States)

    Hogan, P.; Coughlan, J.

    2006-12-01

    NASA World Wind has only one goal, to provide the maximum opportunity for geospatial information to be experienced, be it education, science, research, business, or government. The benefits to understanding for information delivered in the context of its 4D virtual reality are extraordinary. The NASA World Wind visualization platform is open source and therefore lends itself well to being extended to service *any* requirements, be they proprietary and commercial or simply available. Data accessibility is highly optimized using standard formats including internationally certified open standards (W*S). Although proprietary applications can be built based on World Wind, and proprietary data delivered that leverage World Wind, there is nothing proprietary about the visualization platform itself or the multiple planetary data sets readily available, including global animations of live weather. NASA World Wind is being used by NASA research teams as well as being a formal part of high school and university curriculum. The National Guard uses World Wind for emergency response activities and State governments have incorporated high resolution imagery for GIS management as well as for their cross-agency emergency response activities. The U.S. federal government uses NASA World Wind for a myriad of GIS and security-related issues (NSA, NGA, DOE, FAA, etc.).

  7. NASA World Wind, Open Source 4D Geospatial Visualization Platform: *.NET & Java* for EDUCATION

    Science.gov (United States)

    Hogan, P.; Kuehnel, F.

    2006-12-01

    NASA World Wind has only one goal, to provide the maximum opportunity for geospatial information to be experienced, be it education, science, research, business, or government. The benefits to understanding for information delivered in the context of its 4D virtual reality are extraordinary. The NASA World Wind visualization platform is open source and therefore lends itself well to being extended to service *any* requirements, be they proprietary and commercial or simply available. Data accessibility is highly optimized using standard formats including internationally certified open standards (W*S). Although proprietary applications can be built based on World Wind, and proprietary data delivered that leverage World Wind, there is nothing proprietary about the visualization platform itself or the multiple planetary data sets readily available, including global animations of live weather. NASA World Wind is being used by NASA research teams as well as being a formal part of high school and university curriculum. The National Guard uses World Wind for emergency response activities and State governments have incorporated high resolution imagery for GIS management as well as for their cross-agency emergency response activities. The U.S. federal government uses NASA World Wind for a myriad of GIS and security-related issues (NSA, NGA, DOE, FAA, etc.).

  8. Cosmetic applications of glucitol-core containing gallotannins from a proprietary phenolic-enriched red maple (Acer rubrum) leaves extract: inhibition of melanogenesis via down-regulation of tyrosinase and melanogenic gene expression in B16F10 melanoma cells.

    Science.gov (United States)

    Ma, Hang; Xu, Jialin; DaSilva, Nicholas A; Wang, Ling; Wei, Zhengxi; Guo, Liangran; Johnson, Shelby L; Lu, Wei; Xu, Jun; Gu, Qiong; Seeram, Navindra P

    2017-05-01

    The red maple (Acer rubrum) is a rich source of phenolic compounds which possess galloyl groups attached to different positions of a 1,5-anhydro-D-glucitol core. While these glucitol-core containing gallotannins (GCGs) have reported anti-oxidant and anti-glycative effects, they have not yet been evaluated for their cosmetic applications. Herein, the anti-tyrosinase and anti-melanogenic effects of a proprietary phenolic-enriched red maple leaves extract [Maplifa ™ ; contains ca. 45% ginnalin A (GA) along with other GCGs] were investigated using enzyme and cellular assays. The GCGs showed anti-tyrosinase activity with IC 50 values ranging from 101.4 to 1047.3 μM and their mechanism of tyrosinase inhibition (using GA as a representative GCG) was evaluated by chelating and computational/modeling studies. GA reduced melanin content in murine melanoma B16F10 cells by 79.1 and 56.7% (at non-toxic concentrations of 25 and 50 μM, respectively), and its mechanisms of anti-melanogenic effects were evaluated by using methods including fluorescent probe (DCF-DA), real-time PCR, and western blot experiments. These data indicated that GA was able to: (1) reduce the levels of reactive oxygen species, (2) down-regulate the expression of MITF, TYR, TRP-1, and TRP-2 gene levels in a time-dependent manner, and (3) significantly reduce protein expression of the TRP-2 gene. Therefore, the anti-melanogenic effects of red maple GCGs warrant further investigation of this proprietary natural product extract for potential cosmetic applications.

  9. Information Security Audit in e-business applications

    OpenAIRE

    Floarea NASTASE; Pavel NASTASE; Robert SOVA

    2007-01-01

    Electronic business (e-business) are different than other business because it involves any commercial or business activity that takes place by means of electronic facilities (buy and selling online), including on the Internet, proprietary networks and home banking, instead of through direct physical exchange or contact. This system creates an environment that operates at a much greater speed than traditional methods and involves much less paper–based evidence of activities. These e-business...

  10. 78 FR 64260 - Overseas Security Advisory Council (OSAC) Meeting Notice

    Science.gov (United States)

    2013-10-28

    ... corporate security policies and procedures and will involve extensive discussion of trade secrets and proprietary commercial information that is privileged and confidential, and will discuss law enforcement... protection of U.S. business information overseas. For more information, contact Marsha Thurman, Overseas...

  11. Graphene oxide adsorbent based dispersive solid phase extraction coupled with multi-pretreatment clean-up for analysis of trace aflatoxins in traditional proprietary Chinese medicines.

    Science.gov (United States)

    Ran, Congcong; Chen, Dan; Ma, Haiyan; Jiang, Ye

    2017-02-15

    Graphene oxide (GO)-based dispersive solid phase extraction (D-SPE) method combined with multi-step preparation has been proposed for the evaluation of trace aflatoxins in proprietary Chinese medicines (PCM). After being extracted by methanol, the sample was purified based on multi-step preparation, including dehydration with MgSO 4 /NaCl and cleanup with neutral alumina. Then GO was used as an adsorbent in D-SPE method for further preconcentration of aflatoxins prior to high performance liquid chromatography-fluorescence detection. The selected conditions were investigated. The Box-Behnken design (BBD) was used to optimize factors affecting adsorption procedure. Under the optimized conditions, good linear relationships had been achieved with the correlation coefficient (R 2 ) varying from 0.9904 to 0.9990. The LODs and LOQs were ranging from 0.020 to 0.041ng/mL and 0.061 to 0.125ng/mL, respectively. The results of the recoveries were 74.0-102.7% for the four aflatoxins, while the precisions from 1.8% to 7.2% were obtained, which indicated that the method was suitable for the analysis of aflatoxins in PCM. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Systematic Review and Meta-Analysis of a Proprietary Alpha-Amylase Inhibitor from White Bean (Phaseolus vulgaris L.) on Weight and Fat Loss in Humans.

    Science.gov (United States)

    Udani, Jay; Tan, Ollie; Molina, Jhanna

    2018-04-20

    The aim of this meta-analysis was to examine the evidence for the effectiveness of a proprietary alpha-amylase inhibitor from white bean ( Phaseolus vulgaris L.) supplementation interventions in humans on modification of body weight and fat mass. A systematic literature search was performed using three databases: PubMed, the Cochrane collaboration, and Google Scholar. In addition, the manufacturer was contacted for internal unpublished data, and finally, the reference section of relevant original research and review papers were mined for additional studies. Eleven studies were selected for the meta-analysis of weight loss (a total of 573 subjects), and three studies for the meta-analysis of body fat reduction (a total of 110 subjects), as they fulfilled the inclusion criteria. Phaseolus vulgaris supplementation showed an average effect on weight loss difference of −1.08 kg (95% CI (confidence interval), −0.42 kg to −1.16 kg, p < 0.00001), and the average effect on body fat reduction was 3.26 kg (95% CI, −2.35 kg to −4.163 kg, p = 0.02). This meta-analysis found statistically significant effects of Phaseolus vulgaris supplementation on body weight and body fat.

  13. Systematic Review and Meta-Analysis of a Proprietary Alpha-Amylase Inhibitor from White Bean (Phaseolus vulgaris L. on Weight and Fat Loss in Humans

    Directory of Open Access Journals (Sweden)

    Jay Udani

    2018-04-01

    Full Text Available The aim of this meta-analysis was to examine the evidence for the effectiveness of a proprietary alpha-amylase inhibitor from white bean (Phaseolus vulgaris L. supplementation interventions in humans on modification of body weight and fat mass. A systematic literature search was performed using three databases: PubMed, the Cochrane collaboration, and Google Scholar. In addition, the manufacturer was contacted for internal unpublished data, and finally, the reference section of relevant original research and review papers were mined for additional studies. Eleven studies were selected for the meta-analysis of weight loss (a total of 573 subjects, and three studies for the meta-analysis of body fat reduction (a total of 110 subjects, as they fulfilled the inclusion criteria. Phaseolus vulgaris supplementation showed an average effect on weight loss difference of −1.08 kg (95% CI (confidence interval, −0.42 kg to −1.16 kg, p < 0.00001, and the average effect on body fat reduction was 3.26 kg (95% CI, −2.35 kg to −4.163 kg, p = 0.02. This meta-analysis found statistically significant effects of Phaseolus vulgaris supplementation on body weight and body fat.

  14. Safety and Mission Assurance (SMA) Automated Task Order Management System (ATOMS) Operation Manual

    Science.gov (United States)

    Wallace, Shawn; Fikes, Lou A.

    2016-01-01

    This document describes operational aspects of the ATOMS system. The information provided is limited to the functionality provided by ATOMS and does not include information provided in the contractor's proprietary financial and task management system.

  15. 76 FR 89 - Initiation of Five-Year (“Sunset”) Review

    Science.gov (United States)

    2011-01-03

    ... Chilled David Goldberger (202) Atlantic Salmon (3rd 482-4136. Review). Filing Information As a courtesy... eligibility to receive access to business proprietary information under APO can be found at 19 CFR 351.304-306...

  16. 77 FR 61750 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-10-11

    ... Suppliers: Boeing Space and Intelligence Systems, Space Exploration Technologies Corp., Aon plc. Obligor... Information: Please note that this notice does not include confidential or proprietary business information... jobs in the United States by supplying information that competitors could use to compete with companies...

  17. 19 CFR 207.93 - Protection of proprietary information during panel and committee proceedings.

    Science.gov (United States)

    2010-04-01

    ... Government of Mexico who the Canadian Minister of Trade or the Mexican Secretary of Economia, as the case may... Economia, as the case may be, has notified the Commission Secretary that such person requires access. (4...

  18. 47 CFR 64.2005 - Use of customer proprietary network information without customer approval.

    Science.gov (United States)

    2010-10-01

    ... service competitors. (c) A telecommunications carrier may use, disclose, or permit access to CPNI, without... not limited to, speed dialing, computer-provided directory assistance, call monitoring, call tracing...

  19. 47 CFR 64.2010 - Safeguards on the disclosure of customer proprietary network information.

    Science.gov (United States)

    2010-10-01

    ... customer online access to CPNI related to a telecommunications service account. Once authenticated, the customer may only obtain online access to CPNI related to a telecommunications service account through a... (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) MISCELLANEOUS RULES RELATING TO COMMON CARRIERS Customer...

  20. 47 CFR 64.2009 - Safeguards required for use of customer proprietary network information.

    Science.gov (United States)

    2010-10-01

    ... other manner, of their own and their affiliates' sales and marketing campaigns that use their customers... outbound marketing request for customer approval. (e) A telecommunications carrier must have an officer, as... 47 Telecommunication 3 2010-10-01 2010-10-01 false Safeguards required for use of customer...

  1. Effective Materials Property Information Management for the 21st Century

    Science.gov (United States)

    Ren, Weiju; Cebon, David; Arnold, Steve

    2009-01-01

    This paper discusses key principles for the development of materials property information management software systems. There are growing needs for automated materials information management in various organizations. In part these are fueled by the demands for higher efficiency in material testing, product design and engineering analysis. But equally important, organizations are being driven by the need for consistency, quality and traceability of data, as well as control of access to sensitive information such as proprietary data. Further, the use of increasingly sophisticated nonlinear, anisotropic and multi-scale engineering analyses requires both processing of large volumes of test data for development of constitutive models and complex materials data input for Computer-Aided Engineering (CAE) software. And finally, the globalization of economy often generates great needs for sharing a single "gold source" of materials information between members of global engineering teams in extended supply chains. Fortunately, material property management systems have kept pace with the growing user demands and evolved to versatile data management systems that can be customized to specific user needs. The more sophisticated of these provide facilities for: (i) data management functions such as access, version, and quality controls; (ii) a wide range of data import, export and analysis capabilities; (iii) data "pedigree" traceability mechanisms; (iv) data searching, reporting and viewing tools; and (v) access to the information via a wide range of interfaces. In this paper the important requirements for advanced material data management systems, future challenges and opportunities such as automated error checking, data quality characterization, identification of gaps in datasets, as well as functionalities and business models to fuel database growth and maintenance are discussed.

  2. 2002 Industry Studies: Strategic Supply

    Science.gov (United States)

    2002-01-01

    Dell Computers . By displaying all of their product information over the Internet , customers are able to identify all options available for a personal...with such IA challenges as: protecting proprietary information while applying the latest innovative technology and real-time availability of information ...training, quality, information technology , and 25

  3. Kentucky Department for Natural Resources and Environmental Protection permit application for air contaminant source: SRC-I demonstration plant, Newman, Kentucky. Supplement I. [Additional information on 38 items requested by KY/DNREP

    Energy Technology Data Exchange (ETDEWEB)

    Pearson, Jr., John F.

    1981-02-13

    In response to a letter from KY/DNREP, January 19, 1981, ICRC and DOE have prepared the enclosed supplement to the Kentucky Department for Natural Resources and Environmental Protection Permit Application for Air Contaminant Source for the SRC-I Demonstration Plant. Each of the 38 comments contained in the letter has been addressed in accordance with the discussions held in Frankfort on January 28, 1981, among representatives of KY/DNREP, EPA Region IV, US DOE, and ICRC. The questions raised involve requests for detailed information on the performance and reliability of proprietary equipment, back-up methods, monitoring plans for various pollutants, composition of wastes to flares, emissions estimates from particular operations, origin of baseline information, mathematical models, storage tanks, dusts, etc. (LTN)

  4. 78 FR 6399 - Overseas Security Advisory Council (OSAC) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2013-01-30

    ... that the meeting will be closed to the public. The meeting will focus on an examination of corporate... proprietary commercial information that is privileged and confidential, and will discuss law enforcement... protection of U.S. business information overseas. For more information, contact Marsha Thurman, Overseas...

  5. An integrated biomedical knowledge extraction and analysis platform: using federated search and document clustering technology.

    Science.gov (United States)

    Taylor, Donald P

    2007-01-01

    High content screening (HCS) requires time-consuming and often complex iterative information retrieval and assessment approaches to optimally conduct drug discovery programs and biomedical research. Pre- and post-HCS experimentation both require the retrieval of information from public as well as proprietary literature in addition to structured information assets such as compound libraries and projects databases. Unfortunately, this information is typically scattered across a plethora of proprietary bioinformatics tools and databases and public domain sources. Consequently, single search requests must be presented to each information repository, forcing the results to be manually integrated for a meaningful result set. Furthermore, these bioinformatics tools and data repositories are becoming increasingly complex to use; typically they fail to allow for more natural query interfaces. Vivisimo has developed an enterprise software platform to bridge disparate silos of information. The platform automatically categorizes search results into descriptive folders without the use of taxonomies to drive the categorization. A new approach to information retrieval for HCS experimentation is proposed.

  6. Three-tiered integration of PACS and HIS toward next generation total hospital information system.

    Science.gov (United States)

    Kim, J H; Lee, D H; Choi, J W; Cho, H I; Kang, H S; Yeon, K M; Han, M C

    1998-01-01

    The Seoul National University Hospital (SNUH) started a project to innovate the hospital information facilities. This project includes installation of high speed hospital network, development of new HIS, OCS (order communication system), RIS and PACS. This project aims at the implementation of the first total hospital information system by seamlessly integrating these systems together. To achieve this goal, we took three-tiered systems integration approach: network level, database level, and workstation level integration. There are 3 loops of networks in SNUH: proprietary star network for host computer based HIS, Ethernet based hospital LAN for OCS and RIS, and ATM based network for PACS. They are linked together at the backbone level to allow high speed communication between these systems. We have developed special communication modules for each system that allow data interchange between different databases and computer platforms. We have also developed an integrated workstation in which both the OCS and PACS application programs run on a single computer in an integrated manner allowing the clinical users to access and display radiological images as well as textual clinical information within a single user environment. A study is in progress toward a total hospital information system in SNUH by seamlessly integrating the main hospital information resources such as HIS, OCS, and PACS. With the three-tiered systems integration approach, we could successfully integrate the systems from the network level to the user application level.

  7. HL7 and DICOM based integration of radiology departments with healthcare enterprise information systems.

    Science.gov (United States)

    Blazona, Bojan; Koncar, Miroslav

    2007-12-01

    Integration based on open standards, in order to achieve communication and information interoperability, is one of the key aspects of modern health care information systems. However, this requirement represents one of the major challenges for the Information and Communication Technology (ICT) solutions, as systems today use diverse technologies, proprietary protocols and communication standards which are often not interoperable. One of the main producers of clinical information in healthcare settings represent Radiology Information Systems (RIS) that communicate using widely adopted DICOM (Digital Imaging and COmmunications in Medicine) standard, but in very few cases can efficiently integrate information of interest with other systems. In this context we identified HL7 standard as the world's leading medical ICT standard that is envisioned to provide the umbrella for medical data semantic interoperability, which amongst other things represents the cornerstone for the Croatia's National Integrated Healthcare Information System (IHCIS). The aim was to explore the ability to integrate and exchange RIS originated data with Hospital Information Systems based on HL7's CDA (Clinical Document Architecture) standard. We explored the ability of HL7 CDA specifications and methodology to address the need of RIS integration HL7 based healthcare information systems. We introduced the use of WADO service interconnection to IHCIS and finally CDA rendering in widely used Internet explorers. The outcome of our pilot work proves our original assumption of HL7 standard being able to adopt radiology data into the integrated healthcare systems. Uniform DICOM to CDA translation scripts and business processes within IHCIS is desired and cost effective regarding to use of supporting IHCIS services aligned to SOA.

  8. 78 FR 28803 - Steel Wire Garment Hangers From the People's Republic of China: Final Results of Antidumping Duty...

    Science.gov (United States)

    2013-05-16

    ... Co., Ltd. (``Shangyu Baoxiang''); Zhejiang Lucky Cloud Hanger Co., Ltd. (``Lucky Hanger''); Shaoxing... to govern business proprietary information in this segment of the proceeding. Timely written...

  9. Attachment A – General Terms and Conditions of the Contract

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    patent, copyright, trade secret, and proprietary information, techniques, sketches, drawings, models, inventions ..... Quality of Work ... visual material, software, documents, books, pamphlets, memoranda or reports, including translations).

  10. 48 CFR 1535.007-70 - Contract clauses.

    Science.gov (United States)

    2010-10-01

    ... clause at 1552.235-70, Screening Business Information for Claims of Confidentiality, in contracts when... proprietary or confidential by the business that has the right to the information. (b) The Contracting Officer shall insert the clause at 48 CFR 1552.235-71, Treatment of Confidential Business Information, in...

  11. Adulteration of proprietary Chinese medicines and health products with undeclared drugs: experience of a tertiary toxicology laboratory in Hong Kong.

    Science.gov (United States)

    Ching, Chor Kwan; Chen, Sammy Pak Lam; Lee, Hencher Han Chih; Lam, Ying Hoo; Ng, Sau Wah; Chen, Mo Lung; Tang, Magdalene Huen Yin; Chan, Suzanne Suk San; Ng, Candy Wai Yan; Cheung, Jana Wing Lan; Chan, Tina Yee Ching; Lau, Nike Kwai Cheung; Chong, Yeow Kuan; Mak, Tony Wing Lai

    2018-01-01

    Proprietary Chinese medicines (pCMs) and health products, generally believed to be natural and safe, are gaining popularity worldwide. However, the safety of pCMs and health products has been severely compromised by the practice of adulteration. The current study aimed to examine the problem of adulteration of pCMs and health products in Hong Kong. The present study was conducted in a tertiary referral clinical toxicology laboratory in Hong Kong. All cases involving the use of pCMs or health products, which were subsequently confirmed to contain undeclared adulterants, from 2005 to 2015 were reviewed retrospectively. A total of 404 cases involving the use of 487 adulterated pCMs or health products with a total of 1234 adulterants were identified. The adulterants consisted of approved drugs, banned drugs, drug analogues and animal thyroid tissue. The six most common categories of adulterants detected were nonsteroidal anti-inflammatory drugs (17.7%), anorectics (15.3%), corticosteroids (13.8%), diuretics and laxatives (11.4%), oral antidiabetic agents (10.0%) and erectile dysfunction drugs (6.0%). Sibutramine was the most common adulterant (n = 155). The reported sources of these illicit products included over-the-counter drug stores, the internet and Chinese medicine practitioners. A significant proportion of patients (65.1%) had adverse effects attributable to these illicit products, including 14 severe and two fatal cases. Psychosis, iatrogenic Cushing syndrome and hypoglycaemia were the three most frequently encountered adverse effects. Adulteration of pCMs and health products with undeclared drugs poses severe health hazards. Public education and effective regulatory measures are essential to address the problem. © 2017 The British Pharmacological Society.

  12. A proprietary alpha-amylase inhibitor from white bean (Phaseolus vulgaris): a review of clinical studies on weight loss and glycemic control.

    Science.gov (United States)

    Barrett, Marilyn L; Udani, Jay K

    2011-03-17

    Obesity, and resultant health hazards which include diabetes, cardiovascular disease and metabolic syndrome, are worldwide medical problems. Control of diet and exercise are cornerstones of the management of excess weight. Foods with a low glycemic index may reduce the risk of diabetes and heart disease as well as their complications. As an alternative to a low glycemic index diet, there is a growing body of research into products that slow the absorption of carbohydrates through the inhibition of enzymes responsible for their digestion. These products include alpha-amylase and glucosidase inhibitors. The common white bean (Phaseolus vulgaris) produces an alpha-amylase inhibitor, which has been characterized and tested in numerous clinical studies. A specific and proprietary product named Phase 2® Carb Controller (Pharmachem Laboratories, Kearny, NJ) has demonstrated the ability to cause weight loss with doses of 500 to 3000 mg per day, in either a single dose or in divided doses. Clinical studies also show that Phase 2 has the ability to reduce the post-prandial spike in blood glucose levels. Experiments conducted incorporating Phase 2 into food and beverage products have found that it can be integrated into various products without losing activity or altering the appearance, texture or taste of the food. There have been no serious side effects reported following consumption of Phase 2. Gastro-intestinal side effects are rare and diminish upon extended use of the product. In summary, Phase 2 has the potential to induce weight loss and reduce spikes in blood sugar caused by carbohydrates through its alpha-amylase inhibiting activity.

  13. A proprietary alpha-amylase inhibitor from white bean (Phaseolus vulgaris: A review of clinical studies on weight loss and glycemic control

    Directory of Open Access Journals (Sweden)

    Barrett Marilyn L

    2011-03-01

    Full Text Available Abstract Obesity, and resultant health hazards which include diabetes, cardiovascular disease and metabolic syndrome, are worldwide medical problems. Control of diet and exercise are cornerstones of the management of excess weight. Foods with a low glycemic index may reduce the risk of diabetes and heart disease as well as their complications. As an alternative to a low glycemic index diet, there is a growing body of research into products that slow the absorption of carbohydrates through the inhibition of enzymes responsible for their digestion. These products include alpha-amylase and glucosidase inhibitors. The common white bean (Phaseolus vulgaris produces an alpha-amylase inhibitor, which has been characterized and tested in numerous clinical studies. A specific and proprietary product named Phase 2® Carb Controller (Pharmachem Laboratories, Kearny, NJ has demonstrated the ability to cause weight loss with doses of 500 to 3000 mg per day, in either a single dose or in divided doses. Clinical studies also show that Phase 2 has the ability to reduce the post-prandial spike in blood glucose levels. Experiments conducted incorporating Phase 2 into food and beverage products have found that it can be integrated into various products without losing activity or altering the appearance, texture or taste of the food. There have been no serious side effects reported following consumption of Phase 2. Gastro-intestinal side effects are rare and diminish upon extended use of the product. In summary, Phase 2 has the potential to induce weight loss and reduce spikes in blood sugar caused by carbohydrates through its alpha-amylase inhibiting activity.

  14. 78 FR 12034 - Certain Preserved Mushrooms From India: Final Results of Antidumping Duty Administrative Review...

    Science.gov (United States)

    2013-02-21

    ..., but may contain oil or other additives. The merchandise subject to this order is currently...) of their responsibility concerning the disposition of proprietary information disclosed under APO in...

  15. Report to Congress on Foreign Economic Collection and Industrial Espionage: 2002

    National Research Council Canada - National Science Library

    2003-01-01

    .... It seeks to assess efforts by foreign entities government and private to unlawfully target or acquire critical US technologies, trade secrets, and sensitive financial or proprietary economic information...

  16. Annual Report to Congress on Foreign Economic Collection and Industrial Espionage-2002

    National Research Council Canada - National Science Library

    2003-01-01

    .... It seeks to assess efforts by foreign entities government and private to unlawfully target or acquire critical US technologies, trade secrets, and sensitive financial or proprietary economic information...

  17. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    Energy Technology Data Exchange (ETDEWEB)

    Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

    2013-09-06

    This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

  18. 16 CFR 4.10 - Nonpublic material.

    Science.gov (United States)

    2010-01-01

    ... customers in which there is a proprietary or highly competitive interest. (3) Interagency or intra-agency... intelligence investigation, information furnished by a confidential source; (v) Would disclose techniques and...

  19. 29 CFR 801.14 - Exemption for employers providing security services.

    Science.gov (United States)

    2010-07-01

    ... industry, generally, administrative employees may have access to customer accounts, schedules, information... securities, precious commodities or instruments, or proprietary information. (b)(1) Section 7(e) permits the...” which would be of vital importance during periods of war or civil emergency, or whose sabotage would...

  20. 77 FR 44595 - Application for New Awards; Charter Schools Program (CSP)-Charter School Exemplary Collaboration...

    Science.gov (United States)

    2012-07-30

    ... arts and mathematics combined; and (ii) the school's lack of progress on those assessments over a... include business information that you consider to be proprietary. The Department's regulations define ``business information'' in 34 CFR 5.11. Note: Because the Department plans to make successful applications...

  1. 77 FR 72865 - Announcement of Requirements and Registration for “Mobilizing Data for Pressure Ulcer Prevention...

    Science.gov (United States)

    2012-12-06

    ... proprietary software. Development of a mobile health application (app) for iPhone, iPad, or Android devices... assessment document Apply the following HL7 health care information systems security standards and knowledge... the application provides inaccurate or incomplete information. 6. Security--Submissions must be free...

  2. 78 FR 65277 - Certain Frozen Warmwater Shrimp From the People's Republic of China: Partial Rescission of...

    Science.gov (United States)

    2013-10-31

    ... Commerce. DATES: Effective Date: October 31, 2013. FOR FURTHER INFORMATION CONTACT: Josh Startup, AD/CVD... relevant entries during this review period. Failure to comply with this requirement could result in the....305, which continues to govern business proprietary information in this segment of the proceeding...

  3. 78 FR 16875 - Request of the U.S. Intellectual Property Enforcement Coordinator for Public Comments...

    Science.gov (United States)

    2013-03-19

    ... public. SUMMARY: The theft of trade secrets from U.S. corporations can impact national security... companies or foreign governments to gain an unfair commercial advantage over U.S. companies. We need to... information of a confidential nature, such as sensitive personal information or proprietary business...

  4. 78 FR 286 - Circular Welded Carbon Steel Pipes and Tubes From Turkey; Amended Final Results of Antidumping...

    Science.gov (United States)

    2013-01-03

    ... the scope of this order, except for line pipe, oil country tubular goods, boiler tubing, cold-drawn or... order (``APO'') of their responsibility concerning the disposition of proprietary information disclosed...

  5. 77 FR 12553 - Steel Wire Garment Hangers From the People's Republic of China: Final Results and Final Partial...

    Science.gov (United States)

    2012-03-01

    ... Lucky Cloud Hanger Co., Ltd.\\6\\ Because the Department did not receive any information to the contrary... disclosed under APO in accordance with 19 CFR 351.305, which continues to govern business proprietary...

  6. Interoperability, Data Control and Battlespace Visualization using XML, XSLT and X3D

    National Research Council Canada - National Science Library

    Neushul, James

    2003-01-01

    .... The practical application of this technology is demonstrated. Governance of information systems using structured data and the rejection of proprietary, application specific solutions is a leadership responsibility that is defined as Data Control...

  7. 38 CFR 75.112 - Definitions and terms.

    Science.gov (United States)

    2010-07-01

    ... personal privacy and proprietary information. Data breach means the loss or theft of, or other unauthorized...) INFORMATION SECURITY MATTERS Data Breaches § 75.112 Definitions and terms. For purposes of this subpart... the confidentiality or integrity of the data. Data breach analysis means the process used to determine...

  8. 78 FR 39708 - Certain Frozen Fish Fillets From the Socialist Republic of Vietnam: Final Results of Antidumping...

    Science.gov (United States)

    2013-07-02

    ... parties an opportunity to comment on the Preliminary Results and, based upon our analysis of the comments... Comment I, we have now selected Indonesia as the primary surrogate country. We have also made other... information disclosed under the APO, which continues to govern business proprietary information in this...

  9. 76 FR 33139 - Launch Safety: Lightning Criteria for Expendable Launch Vehicles

    Science.gov (United States)

    2011-06-08

    ... or near an electrified environment in or near a cloud. These changes will increase launch... sending the comment (or signing the comment for an association, business, labor union, etc.). You may... Confidential Business Information Do not file in the docket information that you consider to be proprietary or...

  10. 77 FR 61749 - Application for Final Commitment for a Long-term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-10-11

    ... export of U.S. services and equipment for setting up of new gasification plant and the expansion and... anticipated use of the items being exported: To be used for the expansion and improvement of petrochemical... notice does not include confidential or proprietary business information; information which, if disclosed...

  11. Tools for Trade Analysis and Open Source Information Monitoring for Non-proliferation

    International Nuclear Information System (INIS)

    Cojazzi, G.G.M.; Versino, C.; Wolfart, E.; Renda, G.; Janssens, W.A.M.; )

    2015-01-01

    The new state level approach being proposed by IAEA envisions an objective based and information driven safeguards approach utilizing all relevant information to improve the effectiveness and efficiency of safeguards. To this goal the IAEA makes also use of open source information, here broadly defined as any information that is neither classified nor proprietary. It includes, but is not limited to: media sources, government and non-governmental reports and analyzes, commercial data, and scientific/technical literature, including trade data. Within the EC support programme to IAEA, JRC has surveyed and catalogued open sources on import-export customs trade data and developed tools for supporting the use of the related databases in safeguards. The JRC software The Big Table, (TBT), supports i.a.: a) the search through a collection of reference documents relevant to trade analysis (legal/regulatory documents, technical handbooks); b) the selection of items of interests to specific verifications and c) the mapping of these items to customs commodities searchable in trade databases. In the field of open source monitoring, JRC is developing and operating a ''Nuclear Security Media Monitor'' (NSMM), which is a web-based multilingual news aggregation system that automatically collects news articles from pre-defined web sites. NSMM is a domain specific version of the general JRC-Europe Media Monitor (EMM). NSMM has been established within the EC support programme with the aim, i.e., to streamline IAEA's process of open source information monitoring. In the first part, the paper will recall the trade data sources relevant for non-proliferation and will then illustrate the main features of TBT, recently coupled with the IAEA Physical Model, and new visualization techniques applied to trade data. In the second part it will present the main aspects of the NSMM also by illustrating some of uses done at JRC. (author)

  12. MAGIC: Model and Graphic Information Converter

    Science.gov (United States)

    Herbert, W. C.

    2009-01-01

    MAGIC is a software tool capable of converting highly detailed 3D models from an open, standard format, VRML 2.0/97, into the proprietary DTS file format used by the Torque Game Engine from GarageGames. MAGIC is used to convert 3D simulations from authoritative sources into the data needed to run the simulations in NASA's Distributed Observer Network. The Distributed Observer Network (DON) is a simulation presentation tool built by NASA to facilitate the simulation sharing requirements of the Data Presentation and Visualization effort within the Constellation Program. DON is built on top of the Torque Game Engine (TGE) and has chosen TGE's Dynamix Three Space (DTS) file format to represent 3D objects within simulations.

  13. Overview Report: Normal and Emergency Operation Visualization

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.

    2011-05-01

    This is an overview report to document and illustrate methods used in a project entitled “Normal and Emergency Operations Visualization” for a utility company, conducted in 2009-2010 timeframe with funding from the utility company and the U.S. Department of Energy. The original final report (about 180 pages) for the project is not available for distribution because it alludes to findings that assessed the design of an operational system that contained proprietary information; this abridged version contains descriptions of methods and some findings to illustrate the approach used, while avoiding discussion of sensitive or proprietary information. The client has approved this abridged version of the report for unlimited distribution to give researchers and collaborators the benefit of reviewing the research concepts and methods that were applied in this study.

  14. Chemical and radiation stability of a proprietary cesium ion exchange material manufactured from WWL membrane and SuperLig reg-sign 644

    International Nuclear Information System (INIS)

    Brown, G.N.; Carson, K.J.; DesChane, J.R.; Elovich, R.J.; Berry, P.K.

    1996-09-01

    Pretreatment of nuclear process wastes for ion exchange removal of Cs and other radionuclides is one way to minimize amount of high-level radioactive waste at Hanford. This study evaluated Cs-selective SuperLig reg-sign 644 (IBC Advanced Technologies, American Fork UT) entrapped in a proprietary WWL web membrane (3M) for chemical/radiation stability in simulated caustic neutralized current acid waste (NCAW), 0.5M HNO 3 , water, and air. After exposure up to 2.0E+09 rad, the material was evaluated for Cs uptake in 5M sodium NCAW simulants with varying Cs contents. Radiolytic stability appears to be sufficient for ion exchange pretreatment of radioactive Cs: essentially no decrease in Cs selectivity or loading (Kd) was observed during 60 Cs gamma irradiation in water or 0.5M HNO 3 up to 1.0E+09 rad. Cs Kd decreased by a factor of 2 after 2.0E+09 rad exposure. Cs Kd did not change during irradiation in 5M NCAW or ambient air up to 1.0E+08 rad, but decreased by more than an order of magnitude between 1.0E+08 and 2.0E+09 rad (not typical of process conditions). Chemical stability under caustic conditions is lower than in air or under neutral/acidic conditions. Results indicate that this material is less stable in caustic solution irrespective of radiation exposure. Samples of the membrane retained their physical form throughout the entire experiment and were only slightly brittle after exposure to 2.0E+09 rad. (The material evaluated was a finely ground (400 mesh) particulate engineered to form a polymeric fiber (WWL), not the macroscopic form of SuperLig reg-sign 644 resin (20 to 50 mesh).)

  15. The U.S. national nuclear forensics library, nuclear materials information program, and data dictionary

    International Nuclear Information System (INIS)

    Lamont, Stephen Philip; Brisson, Marcia; Curry, Michael

    2011-01-01

    Nuclear forensics assessments to determine material process history requires careful comparison of sample data to both measured and modeled nuclear material characteristics. Developing centralized databases, or nuclear forensics libraries, to house this information is an important step to ensure all relevant data will be available for comparison during a nuclear forensics analysis and help expedite the assessment of material history. The approach most widely accepted by the international community at this time is the implementation of National Nuclear Forensics libraries, which would be developed and maintained by individual nations. This is an attractive alternative toan international database since it provides an understanding that each country has data on materials produced and stored within their borders, but eliminates the need to reveal any proprietary or sensitive information to other nations. To support the concept of National Nuclear Forensics libraries, the United States Department of Energy has developed a model library, based on a data dictionary, or set of parameters designed to capture all nuclear forensic relevant information about a nuclear material. Specifically, information includes material identification, collection background and current location, analytical laboratories where measurements were made, material packaging and container descriptions, physical characteristics including mass and dimensions, chemical and isotopic characteristics, particle morphology or metallurgical properties, process history including facilities, and measurement quality assurance information. While not necessarily required, it may also be valuable to store modeled data sets including reactor burn-up or enrichment cascade data for comparison. It is fully expected that only a subset of this information is available or relevant to many materials, and much of the data populating a National Nuclear Forensics library would be process analytical or material accountability

  16. 78 FR 12718 - Certain Steel Threaded Rod From the People's Republic of China: Affirmative Final Determination...

    Science.gov (United States)

    2013-02-25

    ... percent of their total length. A variety of finishes or coatings, such as plain oil finish as a temporary... concerning the disposition of proprietary information disclosed under APO in accordance with 19 CFR 351.305(a...

  17. Stealing the Goose: Copyright and Learning

    Science.gov (United States)

    McGreal, Rory

    2004-01-01

    The Internet is the world's largest knowledge common and the information source of first resort. Much of this information is open and freely available. However, there are organizations and companies today that are trying to close off the Internet commons and make it proprietary. These are the "copyright controllers." The preservation of the…

  18. MetaLIMS, a simple open-source laboratory information management system for small metagenomic labs.

    Science.gov (United States)

    Heinle, Cassie Elizabeth; Gaultier, Nicolas Paul Eugène; Miller, Dana; Purbojati, Rikky Wenang; Lauro, Federico M

    2017-06-01

    As the cost of sequencing continues to fall, smaller groups increasingly initiate and manage larger sequencing projects and take on the complexity of data storage for high volumes of samples. This has created a need for low-cost laboratory information management systems (LIMS) that contain flexible fields to accommodate the unique nature of individual labs. Many labs do not have a dedicated information technology position, so LIMS must also be easy to setup and maintain with minimal technical proficiency. MetaLIMS is a free and open-source web-based application available via GitHub. The focus of MetaLIMS is to store sample metadata prior to sequencing and analysis pipelines. Initially designed for environmental metagenomics labs, in addition to storing generic sample collection information and DNA/RNA processing information, the user can also add fields specific to the user's lab. MetaLIMS can also produce a basic sequencing submission form compatible with the proprietary Clarity LIMS system used by some sequencing facilities. To help ease the technical burden associated with web deployment, MetaLIMS options the use of commercial web hosting combined with MetaLIMS bash scripts for ease of setup. MetaLIMS overcomes key challenges common in LIMS by giving labs access to a low-cost and open-source tool that also has the flexibility to meet individual lab needs and an option for easy deployment. By making the web application open source and hosting it on GitHub, we hope to encourage the community to build upon MetaLIMS, making it more robust and tailored to the needs of more researchers. © The Authors 2017. Published by Oxford University Press.

  19. The efficacy and safety of a proprietary onion-pumpkin extract (OPtain120 on blood pressure: an open-label study

    Directory of Open Access Journals (Sweden)

    Orie Yoshinari

    2015-06-01

    Full Text Available Background: Nutraceuticals and functional foods are increasingly being used to help manage hypertension. Treatment with either pumpkin or onion can significantly lower systolic and diastolic blood pressure in animal studies. Traditionally, pumpkin has been used to support healthy blood pressure, glucose tolerance and lipid levels. Onion contains high levels of flavonoids, including quercetin, which decreases blood pressure and promotes restoration of healthy endothelial function. However, human trials on these food sources are limited, and the combined effects of pumpkin and onion have not been examined yet. Objective: We performed an open-label clinical study to evaluate the effects of a proprietary onion-pumpkin extract (OPtain120 on systolic and diastolic blood pressure. Methods: Healthy adults with systolic blood pressure (SBP and diastolic blood pressure (DBP in the elevated range of 140-159 and 80-90 mmHg, respectively, were enrolled in this study. Subjects consumed one capsule of onion-pumpkin extract twice daily for 12 weeks. Daily Home Blood Pressure Measurement (HBPM was taken upon waking and before bed. Office Blood Pressure Measurement (OBPM was taken in-clinic at Week 0, 6, and 12. Results: 52 subjects were screened and 12 were enrolled in the study, with a total of 10 subjects completing the study. Systolic HBPM taken before bed demonstrated a statistically significant reduction from baseline (147.23 mmHg to Week 12 (138.14 mmHg, representing a reduction of 9.09 mmHg (6.17%, p=0.021. Diastolic HBPM taken before bed demonstrated a decrease of 4.06 mmHg (4.46%, p=0.085, a significant reduction from baseline (91.07 mmHg at Week 12 (87.02 mmHg. Non-statistically significant reductions were seen in the early morning Systolic (3.14% and Diastolic (2.57% HBPM and in the Systolic (1.36% OBPM. Conclusion: OPtain120 was safely consumed over a 12-week period. OPtain120 appears to be effective in lowering Systolic Blood Pressure at bedtime in

  20. Science – a joyous playing field

    Indian Academy of Sciences (India)

    Lawrence

    ratory for a pharmaceutical company as part of my first job. I continued to do research ... not considered proprietary information by the management, I in- sisted on ... have the opportunity to appreciate the ability of human beings to uncover the ...

  1. 32 CFR 249.5 - Procedures.

    Science.gov (United States)

    2010-07-01

    ... the requirements of national security. Interaction among concerned parties should commence at least... meeting organization include, but are not limited to, proprietary data, export-controlled data, Privacy... information, privacy data, and foreign government-provided data requires approval of the party controlling...

  2. 77 FR 51023 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2012-08-23

    ... export of a telecommunications satellite and associated equipment to Vietnam. Brief non-proprietary description of the anticipated use of the items being exported: To provide telecommunication services to... of Items Being Exported: One telecommunications satellite and associated equipment. Information on...

  3. 78 FR 69646 - Sodium Nitrite From the People's Republic of China: Final Results of the Expedited First Sunset...

    Science.gov (United States)

    2013-11-20

    ....\\2\\ Therefore, all deadlines in this segment of the proceeding have been extended by 16 days. \\2\\ See... countervailable subsidy rates: Net countervailable Manufacturers/exporters/ producers subsidy rate (percent... (``APO'') of their responsibility concerning the return or destruction of proprietary information...

  4. Field evaluation of the efficacy of proprietary repellent formulations with IR3535 and picaridin against Aedes aegypti.

    Science.gov (United States)

    Naucke, T J; Kröpke, R; Benner, G; Schulz, J; Wittern, K P; Rose, A; Kröckel, U; Grünewald, H W

    2007-06-01

    Seven proprietary repellent formulations (3 hydro-alcoholic spray solutions and 4 skin lotions) with active ingredient IR3,535 (ethyl butylacetylaminopropionate, EBAAP) or Picaridin (hydroxyethyl isobutyl piperidine carboxylate, KBR 3,023, Bayrepel) were tested in a field study on 10 test persons over a period of 10 h for their efficacy at preventing bites. The tests were conducted in Belo Horizonte, Brazil on field populations of the yellow fever mosquito Aedes aegypti. The concentration of the active substances ranged from 10% to 20%. All the tested samples provided lasting protection (time to first bite) over several hours: ranging from 5 h 20 min to 6 h 50 min with a mean of approximately 6 h. The longest protection until the second bite (=first confirmation bite) was approximately 7 h 40 min, whereas the shortest protection was 6 h 50 min. The longest protection until the third bite (=second confirmation bite) was 8 h 35 min, whereas the shortest protection was 7 h 40 min. In the control tests in which none of the samples were applied, the mean times until the first, second and third bites were 26, 46 and 59 min, respectively. The basis for this field study was provided by two American guidelines, which have the greatest international acceptance. The first is a draft guideline from the Environmental Protection Agency (EPA (United States Environmental Protection Agency), Product performance test guidelines. OPPTS 810.3700. Insect repellents for human skin and outdoor premises. Public Draft, 1999) and the second is a standard from the American Society for Testing and Materials (ASTM (American Society for Testing and Materials International), E 939-94 (reapproved 2,000): standard test method of field testing topical applications of compounds as repellents for medically important and pest arthropods (including insects, ticks, and mites): I. Mosquitoes, 2,000). Both guidelines recommend measuring the duration of protection until the first and second bites and also

  5. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    International Nuclear Information System (INIS)

    Luke, S.J.

    2011-01-01

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  6. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  7. 21 CFR 202.1 - Prescription-drug advertisements.

    Science.gov (United States)

    2010-04-01

    ... together, without any intervening written, printed, or graphic matter, except the proprietary names of..., television, or telephone communications systems shall include information relating to the major side effects... distributor or other written, printed, or graphic matter containing no representation or suggestion relating...

  8. 77 FR 59892 - Carbon and Certain Alloy Steel Wire Rod From Mexico: Affirmative Final Determination of...

    Science.gov (United States)

    2012-10-01

    ... opportunity to comment on the Preliminary Determination, and received briefs and rebuttal briefs from... Rod from Brazil, Indonesia, Mexico, Moldova, and Trinidad and Tobago, and Ukraine, 67 FR 65945... continues to govern business proprietary information in this segment of the proceeding. Timely written...

  9. 75 FR 23686 - Order Finding That the Carbon Financial Instrument Contract Offered for Trading on the Chicago...

    Science.gov (United States)

    2010-05-04

    [email protected] . SUPPLEMENTARY INFORMATION: I. Introduction The CFTC Reauthorization Act of 2008... Reduction Schedule, such as market makers and proprietary trading groups. Exchange Participants: Entities or... determination, ICE commented that ``under the Commission's theory, any spot contract automatically serves as a...

  10. Ultra Low Noise Infrared Detector Amplifier for Next Generation Standoff Detector

    Science.gov (United States)

    2016-02-18

    some mismatches. The formation of a heterojunction for the channel entails creating a sufficient degree of difference between the bandgap of the...metal oxide (MOS) capacitor, thereby isolating the ground from dc. EPIR Technologies, Inc. Proprietary Information – Exempt From FOIA 67 Figure

  11. 76 FR 80337 - Uncovered Innerspring Units From the People's Republic of China: Rescission of Antidumping Duty...

    Science.gov (United States)

    2011-12-23

    ... fashion. Uncovered innersprings are classified under subheading 9404.29.9010, 9404.29.9005 and 9404.29... (``APO'') of their responsibility concerning the return or destruction of proprietary information... written notification of the return or destruction of APO materials or conversion to judicial protective...

  12. 77 FR 17427 - Notice of Final Determination of Sales at Less Than Fair Value: Galvanized Steel Wire From Mexico

    Science.gov (United States)

    2012-03-26

    ... the start of their respective verifications, we requested respondents to submit revised sales... convenience and Customs purposes, the written description of the merchandise is dispositive. Scope Comments In... as to avoid disclosure of business proprietary information. See Seamless Refined Copper Pipe and Tube...

  13. 32 CFR 249.4 - Policy.

    Science.gov (United States)

    2010-07-01

    ... engineering performed under contract or grant at colleges, universities, and non-government laboratories is... government have established an understanding or agreement in that specific scientific or technical area. (h...-controlled, proprietary, privacy, and foreign government provided information. (e) Provide timely review of...

  14. Role of a proprietary propolis-based product on the wait-and-see approach in acute otitis media and in preventing evolution to tracheitis, bronchitis, or rhinosinusitis from nonstreptococcal pharyngitis

    Directory of Open Access Journals (Sweden)

    Di Pierro F

    2016-11-01

    Full Text Available Francesco Di Pierro,1 Alberto Zanvit,2 Maria Colombo3 1Scientific Department, Velleja Research, 2Biological Dentistry Department, Italian Stomatology Institute, 3ATS, District 5, Milan, Italy Abstract: Antipyretics and/or anti-inflammatory drugs along with a wait-and-see approach are the only treatments recommended in early acute otitis media (AOM or viral pharyngitis. Propolis has been widely investigated for its antibacterial, antiviral, and anti-inflammatory properties and could perhaps be administered as an add-on therapy during watchful waiting in AOM or for better control of symptoms in nonstreptococcal pharyngitis. However, propolis has well-known problems of poor solubility and low oral bioavailability. We therefore analyzed a proprietary propolis-based product (Propolisina® developed to overcome these limitations, in a retrospective, open-label, controlled study of Streptococcus pyogenes-negative children with a diagnosis of AOM or pharyngitis. Our results show that the use of propolis supplement for 72 hours lessens the severity of AOM and viral pharyngitis, reduces the use of antipyretics and anti-inflammatory drugs, and decreases the rate of evolution to tracheitis, bronchitis, and rhinosinusitis. Our study shows that propolis could be used as a safe add-on therapy in case of AOM and/or viral pharyngitis. Keywords: pediatric infections, cogrinding, bioavailability, propolis

  15. a Web Api and Web Application Development for Dissemination of Air Quality Information

    Science.gov (United States)

    Şahin, K.; Işıkdağ, U.

    2017-11-01

    Various studies have been carried out since 2005 under the leadership of Ministry of Environment and Urbanism of Turkey, in order to observe the quality of air in Turkey, to develop new policies and to develop a sustainable air quality management strategy. For this reason, a national air quality monitoring network has been developed providing air quality indices. By this network, the quality of the air has been continuously monitored and an important information system has been constructed in order to take precautions for preventing a dangerous situation. The biggest handicap in the network is the data access problem for instant and time series data acquisition and processing because of its proprietary structure. Currently, there is no service offered by the current air quality monitoring system for exchanging information with third party applications. Within the context of this work, a web service has been developed to enable location based querying of the current/past air quality data in Turkey. This web service is equipped with up-todate and widely preferred technologies. In other words, an architecture is chosen in which applications can easily integrate. In the second phase of the study, a web-based application was developed to test the developed web service and this testing application can perform location based acquisition of air-quality data. This makes it possible to easily carry out operations such as screening and examination of the area in the given time-frame which cannot be done with the national monitoring network.

  16. Modified Motivation System as the Information Source for Personal Controlling. Case of the Hotel

    Directory of Open Access Journals (Sweden)

    Małgorzata Sztorc

    2008-09-01

    Full Text Available The purpose of the article is to analysis of employee system incentive hotel there be source of information for personal controlling. New incentive system fitted look to suggest for notes entered by employee. It pay attention in article, that there is sole form of motivating of forceful employee proprietary form financial motivator. Proper system of motivation effects boost of efficiency of staff aiming at achievement in firm purposes indicated appointee. Besides, it shows revolt of working group about miscellaneous features, requirements, engagement, skilful management leads achievement of fairest effect of work which. We understand control result of taken personal decision through definition personal controlling, structures of employment, system of remuneration, motivation systems, utilization of active time of employee and cost of work. Among others, counteraction belongs to tasks in sphere of management in taking up of erroneous decision human resources controlling, high cost of employment have, helping with fitting human resources for real requirements of firms and through suitable utilization of potential work stimulation. There is in firm personal wanted controlling in order to it were of limited activity of professional employee for forward taking reward only.

  17. University-Industry Strategic Partnerships. Benefits and Impediments.

    Science.gov (United States)

    Gregory, Eugene H.

    1997-01-01

    University-industry partnership give companies opportunities to observe prospective employees and access to research innovations at lower cost. Faculty increase their familiarity with the state of the art and gain additional funding sources. Barriers include intellectual property issues, publication of proprietary information, and conflicting…

  18. 77 FR 27435 - Certain Frozen Fish Fillets From the Socialist Republic of Vietnam: Final Results of the New...

    Science.gov (United States)

    2012-05-10

    ... the Socialist Republic of Vietnam (``Vietnam'').\\1\\ We gave interested parties an opportunity to...&D Memo at Comment I, we have changed our primary surrogate country selection from Indonesia to... or destruction of proprietary information disclosed under the APO, which continues to govern business...

  19. 78 FR 72116 - Diamond Sawblades and Parts Thereof From China Institution of a Five-Year Review.

    Science.gov (United States)

    2013-12-02

    .... (12) Identify significant changes, if any, in the supply and demand conditions or business cycle for... of business proprietary information (BPI) under an administrative protective order (APO) and APO... trade or business association, or another interested party (including an explanation). If you are a...

  20. 75 FR 67102 - Cased Pencils From China

    Science.gov (United States)

    2010-11-01

    .... (12) Identify significant changes, if any, in the supply and demand conditions or business cycle for..., Deputy Agency Ethics Official, at 202-205-3088. Limited disclosure of business proprietary information... Subject Merchandise, a U.S. or foreign trade or business association, or another interested party...

  1. 77 FR 12614 - Activated Carbon From China; Institution of a Five-Year Review

    Science.gov (United States)

    2012-03-01

    .... (12) Identify significant changes, if any, in the supply and demand conditions or business cycle for..., Deputy Agency Ethics Official, at 202-205-3088. Limited disclosure of business proprietary information..., a U.S. or foreign trade or business association, or another interested party (including an...

  2. 77 FR 5049 - Pure Magnesium From China; Institution of a Five-Year Review

    Science.gov (United States)

    2012-02-01

    .... (12) Identify significant changes, if any, in the supply and demand conditions or business cycle for... disclosure of business proprietary information (BPI) under an administrative protective order (APO) and APO... Subject Merchandise, a U.S. or foreign trade or business association, or another interested party...

  3. 76 FR 168 - Heavy Forged Hand Tools From China

    Science.gov (United States)

    2011-01-03

    .... (12) Identify significant changes, if any, in the supply and demand conditions or business cycle for..., Deputy Agency Ethics Official, at 202-205-3088. Limited disclosure of business proprietary information... Subject Merchandise, a U.S. or foreign trade or business association, or another interested party...

  4. 75 FR 53711 - Polyethylene Terephthalate (PET) Film From Korea

    Science.gov (United States)

    2010-09-01

    ... and demand conditions or business cycle for the Domestic Like Product that have occurred in the United... of business proprietary information (BPI) under an administrative protective order (APO) and APO..., a U.S. or foreign trade or business association, or another interested party (including an...

  5. 77 FR 45653 - Lemon Juice From Argentina and Mexico

    Science.gov (United States)

    2012-08-01

    ... significant changes, if any, in the supply and demand conditions or business cycle for the Domestic Like..., Deputy Agency Ethics Official, at 202-205-3088. Limited disclosure of business proprietary information... trade/business association; import/export Subject Merchandise from more than one Subject Country; or...

  6. Going-public and the influence of disclosure environments

    NARCIS (Netherlands)

    Marra, T.; Suijs, J.

    2004-01-01

    This paper analyzes how differences in disclosure environments affect the firm's choice between private and public capital. Disclosure requirements prescribe to what extent the firm has to release private information that may lead to the firm incurring proprietary costs. We examine which firm types

  7. Going-Public and the Influence of Disclosure Environment

    NARCIS (Netherlands)

    Marra, T.A.; Suijs, J.P.M.

    2000-01-01

    This paper analyzes how differences in disclosure environments affect the firms choice between private and public capital. Disclosure regulations prescribe to what extent the firm has to release confidential information that may lead to the firm incurring proprietary cost. We examine which firms go

  8. 75 FR 13644 - TORP Terminal LP, Bienville Offshore Energy Terminal Liquefied Natural Gas Deepwater Port License...

    Science.gov (United States)

    2010-03-22

    ..., telephone 202-493-0402. SUPPLEMENTARY INFORMATION: Public Meeting and Open House We invite you to learn... Register notices is included below for your convenience. Proposed Action and Alternatives The proposed...Load), which is proprietary technology consisting of a remotely operated floating LNG transfer and...

  9. 77 FR 20090 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2012-04-03

    .... It can be argued that Professionals have the same technological and informational advantages as... continues to incur costs for maintaining these proprietary indexes including marketing expenses. The... participants can easily and readily direct order flow to competing venues if they deem fee levels at a...

  10. 77 FR 21961 - Uncovered Innerspring Units From the People's Republic of China: Final Results and Final...

    Science.gov (United States)

    2012-04-12

    ... material and then glued together in a linear fashion. Uncovered innersprings are classified under... responsibility concerning the return or destruction of proprietary information disclosed under the APO, which... notification of the return/destruction of APO materials or conversion to judicial protective order is hereby...

  11. 76 FR 27988 - Certain Cased Pencils From the People's Republic of China: Final Results of the Antidumping Duty...

    Science.gov (United States)

    2011-05-13

    ... any fashion, and either sharpened or unsharpened. The pencils subject to the order are currently...'') of their responsibility concerning the return or destruction of proprietary information disclosed under the APO in accordance with 19 CFR 351.305. Timely written notification of the return or...

  12. 77 FR 47043 - Work Group on Measuring Systems for Electric Vehicle Fueling

    Science.gov (United States)

    2012-08-07

    ... Systems for Electric Vehicle Fueling AGENCY: National Institute of Standards and Technology, Commerce... electric vehicle fuel. There is no cost for participating in the Work Group. No proprietary information... and sell electricity dispensed as a vehicle fuel) and to ensure that the prescribed methodologies and...

  13. 75 FR 22338 - Reexamination of Roaming Obligations of Commercial Mobile Radio Service Providers

    Science.gov (United States)

    2010-04-28

    ... host's own proprietary information services. In addition, some commenters proposed specific measures to... Commission seeks comment on whether it should adopt any measures or restrictions to help preserve investment... such as LTE impact the technical challenges to developing such roaming arrangements or otherwise affect...

  14. Legal and policy issues associated with monitoring employee E-mail

    Energy Technology Data Exchange (ETDEWEB)

    Segura, M.A.; Rither, A.C.

    1997-01-01

    This paper examines the legal issues involved with employer monitoring of employee e-mail. In addition to identifying pertinent legal issues, the paper provides guidelines that will help the Pacific Northwest National Laboratory (PNNL) establish a program for monitoring outgoing e-mail to insure compliance with company policies, particularly those regarding protection of trade secrets and proprietary information, and to comply with the Department of Energy`s (DOE) procedures for protecting Export Controlled Information (ECI). Electronic communication has allowed companies to enhance efficiency, responsiveness and effectiveness. E-mail allows employees to transmit all types of data to other individuals inside and outside of their companies. The ease with which information can be transmitted by e-mail has placed trade secrets, proprietary information, and other sensitive data at risk from inadvertent disclosure by employees. As employers attempt to protect their interests through measures such as monitoring e-mail, they may expose themselves to liability under federal and state laws for violating employee privacy. Business use of e-mail has proliferated so rapidly that the federal and state legal systems have not been able to adequately address the issues arising out of its use in the workplace.

  15. Factors explaining the level of voluntary human capital disclosure in the Brazilian capital market Factors explaining the level of voluntary human capital disclosure in the Brazilian capital market Factors explaining the level of voluntary human capital disclosure in the Brazilian capital market

    OpenAIRE

    Clea Beatriz Macagnan; Fernando Batista Fontana

    2013-01-01

    Purpose: This paper presents a study on factors explaining the level of voluntary human capital information in companies with shares in the Brazilian stock exchange. Assuming the existence of information asymmetry between managers and shareholders, agency theory states that disclosure might lead to a reduction in agency costs. The proprietary costs theory indicates that information disclosure might increase the company’s costs. According to these theories, the likelihood that the managers wil...

  16. 32 CFR 286.12 - Exemptions.

    Science.gov (United States)

    2010-07-01

    ..., discoveries, or other proprietary data. See also § 286.23(h)(2) of this part. Additionally, when the... to the prevailing wage rate of employees within the Department of Defense. (5) Scientific and manufacturing processes or developments concerning technical or scientific data or other information submitted...

  17. 76 FR 11273 - Ammonium Nitrate From Russia

    Science.gov (United States)

    2011-03-01

    ... significant changes, if any, in the supply and demand conditions or business cycle for the Domestic Like..., Deputy Agency Ethics Official, at 202-205-3088. Limited disclosure of business proprietary information... Subject Merchandise, a U.S. or foreign trade or business association, or another interested party...

  18. 76 FR 74810 - Foundry Coke From China; Institution of a Five-Year Review

    Science.gov (United States)

    2011-12-01

    .... (12) Identify significant changes, if any, in the supply and demand conditions or business cycle for..., Deputy Agency Ethics Official, at (202) 205-3088. Limited disclosure of business proprietary information... exporter of the Subject Merchandise, a U.S. or foreign trade or business association, or another interested...

  19. 78 FR 46607 - Certain Off-The-Road Tires From China Institution of Five-Year Reviews

    Science.gov (United States)

    2013-08-01

    ... and demand conditions or business cycle for the Domestic Like Product that have occurred in the United..., Deputy Agency Ethics Official, at 202-205-3088. Limited disclosure of business proprietary information..., a U.S. or foreign trade or business association, or another interested party [[Page 46609...

  20. 77 FR 25744 - Certain Polyester Staple Fiber From China; Institution of a Five-Year Review

    Science.gov (United States)

    2012-05-01

    ... changes, if any, in the supply and demand conditions or business cycle for the Domestic Like Product that... Official, at 202-205-3088. Limited disclosure of business proprietary information (BPI) under an... business association, or another interested party (including an explanation). If you are a union/worker...

  1. 77 FR 32669 - Ammonium Nitrate from Ukraine Institution of a Five-Year Review

    Science.gov (United States)

    2012-06-01

    ... and demand conditions or business cycle for the Domestic Like Product that have occurred in the United... Official, at 202-205-3088. Limited disclosure of business proprietary information (BPI) under an... business association, or another interested party (including an explanation). If you are a union/worker...

  2. 76 FR 171 - Paper Clips From China

    Science.gov (United States)

    2011-01-03

    ... changes, if any, in the supply and demand conditions or business cycle for the Domestic Like Product that... disclosure of business proprietary information (BPI) under an administrative protective order (APO) and APO..., a U.S. or foreign trade or business association, or another interested party (including an...

  3. 78 FR 39319 - Laminated Woven Sacks From China; Institution of Five-Year Reviews

    Science.gov (United States)

    2013-07-01

    ... and demand conditions or business cycle for the Domestic Like Product that have occurred in the United..., Deputy Agency Ethics Official, at 202-205-3088. Limited disclosure of business proprietary information... Subject Merchandise, a U.S. or foreign trade or business association, or another interested party...

  4. 75 FR 5115 - Tissue Paper From China

    Science.gov (United States)

    2010-02-01

    ... and demand conditions or business cycle for the Domestic Like Product that have occurred in the United... disclosure of business proprietary information (BPI) under an administrative protective order (APO) and APO... business association, or another interested party (including an explanation). If you are a union/worker...

  5. 75 FR 62141 - Glycine From China

    Science.gov (United States)

    2010-10-07

    .... (12) Identify significant changes, if any, in the supply and demand conditions or business cycle for... Official, at 202- 205-3088. Limited disclosure of business proprietary information (BPI) under an... exporter of the Subject Merchandise, a U.S. or foreign trade or business association, or another interested...

  6. 78 FR 33064 - Silicon Metal From Russia; Institution of a Five-Year Review

    Science.gov (United States)

    2013-06-03

    ... significant changes, if any, in the supply and demand conditions or business cycle for the Domestic Like... of business proprietary information (BPI) under an administrative protective order (APO) and APO... producer or exporter of the Subject Merchandise, a U.S. or foreign trade or business association, or...

  7. 78 FR 39321 - Non-Malleable Cast Iron Pipe Fittings From China Institution of a Five-Year Review

    Science.gov (United States)

    2013-07-01

    .... (12) Identify significant changes, if any, in the supply and demand conditions or business cycle for... of business proprietary information (BPI) under an administrative protective order (APO) and APO... exporter of the Subject Merchandise, a U.S. or foreign trade or business association, or another interested...

  8. 78 FR 40172 - Steel Nails From China; Institution of a Five-Year Review

    Science.gov (United States)

    2013-07-03

    .... (12) Identify significant changes, if any, in the supply and demand conditions or business cycle for... of business proprietary information (BPI) under an administrative protective order (APO) and APO... producer or exporter of the Subject Merchandise, a U.S. or foreign trade or business association, or...

  9. 76 FR 18248 - Sulfanilic Acid From China and India

    Science.gov (United States)

    2011-04-01

    ... and demand conditions or business cycle for the Domestic Like Product that have occurred in the United... of business proprietary information (BPI) under an administrative protective order (APO) and APO... to This Notice of Institution: If you are a domestic producer, union/worker group, or trade/business...

  10. 75 FR 67113 - Sparklers From China

    Science.gov (United States)

    2010-11-01

    .... (12) Identify significant changes, if any, in the supply and demand conditions or business cycle for..., Deputy Agency Ethics Official, at 202-205-3088. Limited disclosure of business proprietary information... exporter of the Subject Merchandise, a U.S. or foreign trade or business association, or another interested...

  11. 76 FR 166 - Fresh and Chilled Atlantic Salmon From Norway

    Science.gov (United States)

    2011-01-03

    ... and demand conditions or business cycle for the Domestic Like Product that have occurred in the United... Official, at 202-205-3088. Limited disclosure of business proprietary information (BPI) under an... Subject Merchandise, a U.S. or foreign trade or business association, or another interested party...

  12. 78 FR 65709 - Crawfish Tail Meat From China Institution of a Five-Year Review

    Science.gov (United States)

    2013-11-01

    .... (12) Identify significant changes, if any, in the supply and demand conditions or business cycle for.... Limited disclosure of business proprietary information (BPI) under an administrative protective order (APO... producer or exporter of the Subject Merchandise, a U.S. or foreign trade or business association, or...

  13. 78 FR 8130 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-02-05

    ... the transaction: To support the export of U.S.-manufactured cargo aircraft to Dubai, the United Arab...: Dubai Aerospace Enterprise. Guarantor(s): N/A. Description of Items Being Exported: Boeing 777 aircraft... . Confidential Information: Please note that this notice does not include confidential or proprietary business...

  14. 48 CFR 903.104-7 - Violations or possible violations.

    Science.gov (United States)

    2010-10-01

    ... violation or possible violation of subsections 27 (a), (b), (c) or (d) of the Office of Federal Procurement... disclosure of proprietary or source selection information is the Assistant General Counsel for Procurement...) and (2) for Headquarters activities is the Agency Ethics Official (Designated Agency Ethics Official...

  15. Desktop war - data suppliers competing for bigger market share

    International Nuclear Information System (INIS)

    Sword, M.

    1999-01-01

    The intense competition among suppliers of computerized data and computer software to the petroleum and natural gas industry in western Canada is discussed. It is estimated that the Canadian oil patch spends a large sum, about $ 400 million annually on geoscience information and related costs and industry is looking for ways to significantly reduce those costs. There is a need for integrated, desktop driven data sets. Sensing the determination of industry to reduce information acquisition costs, data providers are responding with major consolidation of data sets. The major evolution in the industry is on-line access to increase the speed of information delivery. Data vendors continue to integrate land, well, log, production and other data sets whether public or proprietary. The result is stronger foundations as platforms for interpretive software. Another development is the rise of the Internet and Intranets and the re-definition of the role of information technology departments in the industry as both of these are paving the way for electronic delivery of information and software tools to the desktop. Development of proprietary data sets, acquisition of competitors with complimentary data sets that enhances products and services are just some of the ways data vendors are using to get a bigger piece of the exploration and development pie

  16. No Place to Play: Current Employee Privacy Rights in Social Networking Sites

    Science.gov (United States)

    Genova, Gina L.

    2009-01-01

    Employers have legitimate business interests in monitoring workplace Internet use: to minimize legal exposure, to increase productivity, and to avoid proprietary information loss. Since employees arguably have no expectation of privacy in their work on employers' computers, there are few grounds for complaint if they are disciplined for straying…

  17. 76 FR 5822 - Orange Juice From Brazil

    Science.gov (United States)

    2011-02-02

    ... and demand conditions or business cycle for the Domestic Like Product that have occurred in the United... of business proprietary information (BPI) under an administrative protective order (APO) and APO... Merchandise, a foreign producer or exporter of the Subject Merchandise, a U.S. or foreign trade or business...

  18. 78 FR 54272 - Steel Wire Garment Hangers From China; Institution of a Five-Year Review

    Science.gov (United States)

    2013-09-03

    ... changes, if any, in the supply and demand conditions or business cycle for the Domestic Like Product that... disclosure of business proprietary information (BPI) under an administrative protective order (APO) and APO... producer or exporter of the Subject Merchandise, a U.S. or foreign trade or business association, or...

  19. 77 FR 5052 - Clad Steel Plate From Japan; Institution of a Five-Year Review

    Science.gov (United States)

    2012-02-01

    ... conditions or business cycle for the Domestic Like Product that have occurred in the United States or in the... Official, at (202) 205-3088. Limited disclosure of business proprietary information (BPI) under an... foreign trade or business association, or another interested party (including an explanation). If you are...

  20. 19 CFR 356.18 - Interim sanctions.

    Science.gov (United States)

    2010-04-01

    ... on the basis of new and material evidence or other good cause shown. The Deputy Under Secretary or a..., including the protection of proprietary information, the Deputy Under Secretary may petition an...) Barring a person from appearing before the Department; and (4) Requiring the person to return material...

  1. Short sales, differences of opinion and fundamental value

    NARCIS (Netherlands)

    Brounen, Dirk; Porras Prado, M.; Ling, D.C.

    2013-01-01

    This study explores the role of short sale constraints in explaining the variation in premiums to Net Asset Value (NAV) in REIT pricing. We use proprietary information on short sales between June 2006 and September 2008 to examine how short sales and short sale constraints affect the variation in

  2. 75 FR 82374 - Notice of Final Results of Antidumping Duty Changed Circumstances Review: Certain Circular Welded...

    Science.gov (United States)

    2010-12-30

    ... the scope of this order, except line pipe, oil country tubular goods, boiler tubing, mechanical tubing... dual or triple certified/stenciled that enters the United States as line pipe of a kind used for oil or... protective orders (APOs) of their responsibility concerning the disposition of proprietary information...

  3. 77 FR 37873 - Small Diameter Graphite Electrodes From the People's Republic of China: Initiation of...

    Science.gov (United States)

    2012-06-25

    ... United States (HTSUS) subheading 8545.11.0010.\\6\\ The HTSUS number is provided for convenience and... have informed the Department that, starting in 2010, imports of SDGEs are classified in the HTSUS under... factors. Because these declarations are largely business proprietary and cannot be further discussed in a...

  4. A WEB API AND WEB APPLICATION DEVELOPMENT FOR DISSEMINATION OF AIR QUALITY INFORMATION

    Directory of Open Access Journals (Sweden)

    K. Şahin

    2017-11-01

    Full Text Available Various studies have been carried out since 2005 under the leadership of Ministry of Environment and Urbanism of Turkey, in order to observe the quality of air in Turkey, to develop new policies and to develop a sustainable air quality management strategy. For this reason, a national air quality monitoring network has been developed providing air quality indices. By this network, the quality of the air has been continuously monitored and an important information system has been constructed in order to take precautions for preventing a dangerous situation. The biggest handicap in the network is the data access problem for instant and time series data acquisition and processing because of its proprietary structure. Currently, there is no service offered by the current air quality monitoring system for exchanging information with third party applications. Within the context of this work, a web service has been developed to enable location based querying of the current/past air quality data in Turkey. This web service is equipped with up-todate and widely preferred technologies. In other words, an architecture is chosen in which applications can easily integrate. In the second phase of the study, a web-based application was developed to test the developed web service and this testing application can perform location based acquisition of air-quality data. This makes it possible to easily carry out operations such as screening and examination of the area in the given time-frame which cannot be done with the national monitoring network.

  5. Proprietary hospitals in cost containment.

    Science.gov (United States)

    Jones, D A

    1985-08-23

    Any effort to control the rise in health care costs must start with analyzing the causes, which are really quite simple. Most cost control efforts fail because they do not address the causes. The causes are large subsidies in several forms that send a false message that health care is free and should be used abundantly, and expansive reimbursement programs that reward inefficient providers with higher payments. This combination of demand stimulation and cost-plus reimbursement produced the world's most expensive health care delivery system and strident calls for reform. A long overdue change in public policy took effect October 1, 1983, when Medicare payments moved from cost-plus reimbursement to fixed, prospectively determined prices. Because it addressed one of the causes of medical inflation, this change has been effective in slowing the rise in Medicare expenditures. Sponsorship of a hospital is not a determinant of its cost-effectiveness. There are examples of efficient and inefficient hospitals in both the voluntary and the investor-owned or taxpaying hospitals. The determining factor is the will of management to keep costs under control.

  6. eDOC: A collaboration infrastructure to manage knowledge and information on nuclear projects and research activities

    International Nuclear Information System (INIS)

    Van Craeynest, J.M.; Jacquemet, F.; Chermette, D.; Bonneau, S.

    2004-01-01

    After a brief recall of Knowledge Management issues and of the MKSM knowledge modelling method developed and used by the CEA, this paper focuses on the eDOC web collaboration platform designed to support a large range of cross-collaboration needs and a large spectrum of community types (from small units to large European Networks of Excellence). Online community members have different needs : knowing other members and their roles, accessing to reference information and documents, reviewing, annotating and publishing documents or sending information to all or part of members, being informed of events, scheduling shared jobs and manage tasks, discuss some questions using forums, etc. They also want to develop a common identity and portal look and structure customizations are very useful for that purpose. The Information System Department of the CEA has launched the eDOC project to supply a rapid demand growth for those tools. In the CEA, this demand is due to the growing importance and number of internal and external cross-collaborations and alliances with industrial and research partners. After a systematic evaluation campaign of both proprietary and open-source solutions, and after having defined the most pragmatic deployment strategy, we have chosen the Collaborative Portal Server (CPS) edited by Nuxeo. CPS is based on the Zope open-source object-oriented application server. Then we invested to improve functionalities and performances of CPS but also to design and implement a security policy adapted to different types of security requirements and information privacy levels. The eDOC web collaboration infrastructure is now used by 50 projects and this number keeps increasing. The main uses are internal documents repositories (to simplify classical 'Intranet' building and maintaining process) and information repositories (including documents but also events, news, calendar, conferences, etc.) for external collaborations. The 6th European research framework program

  7. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  8. Small business innovation research. Abstracts of 1988 phase 1 awards

    Science.gov (United States)

    1990-01-01

    Non-proprietary proposal abstracts of Phase 1 Small Business Innovation Research (SBIR) projects supported by NASA are presented. Projects in the fields of aeronautical propulsion, aerodynamics, acoustics, aircraft systems, materials and structures, teleoperators and robots, computer sciences, information systems, data processing, spacecraft propulsion, bioastronautics, satellite communication, and space processing are covered.

  9. An Economic Analysis of Two Groundwater Allocation Programs for the Salinas Valley

    Science.gov (United States)

    1994-06-01

    farm and its proprietary information. TABLE 5-13. AIl! CULTURAL ANALYSIS FOR THE PERIOD 1988 - 1993 ACRES Loom~bu kuadamor I Ave. Grower 1966 729 131 203...allocate water in the United States. vary greatly among different consumoers . 2) Easy to inplement due to prior governmental 2) There is no ecenomic

  10. Proceedings of the Annual Acquisition Research Symposium (7th), Acquistion Research: Creating Synergy for Informed Change 12-13 May 2010. Volume 1

    Science.gov (United States)

    2010-04-30

    Press. Morgan, J.M., & Liker, J.K. (2006). The Toyota product development system: Integrating people, process, and technology. New York: Productivity...Press. Ohno, T., & Bodek, N. (2008). Toyota production system: Beyond large-scale production. New York: Productivity Press. Reinertsen, D.G. (2009...advanced technology demonstrations (often proprietary) advertised to fully meet the system capability needs and can be developed in a timely and

  11. Implementation of Digital Watermarking Using MATLAB Software

    OpenAIRE

    Karnpriya Vyas; Kirti Sethiya; Sonu Jain

    2012-01-01

    Digital watermarking holds significant promise as one of the keys to protecting proprietary digital content in the coming years. It focuses on embedding information inside a digital object such that the embedded information is in separable bound to the object. The proposed scheme has been implemented on MATLAB, as it is a high level technical computing language and interactive environment for algorithm development, data visualization, data analysis, and numerical computation. We w...

  12. Constructing the informatics and information technology foundations of a medical device evaluation system: a report from the FDA unique device identifier demonstration.

    Science.gov (United States)

    Drozda, Joseph P; Roach, James; Forsyth, Thomas; Helmering, Paul; Dummitt, Benjamin; Tcheng, James E

    2018-02-01

    The US Food and Drug Administration (FDA) has recognized the need to improve the tracking of medical device safety and performance, with implementation of Unique Device Identifiers (UDIs) in electronic health information as a key strategy. The FDA funded a demonstration by Mercy Health wherein prototype UDIs were incorporated into its electronic information systems. This report describes the demonstration's informatics architecture. Prototype UDIs for coronary stents were created and implemented across a series of information systems, resulting in UDI-associated data flow from manufacture through point of use to long-term follow-up, with barcode scanning linking clinical data with UDI-associated device attributes. A reference database containing device attributes and the UDI Research and Surveillance Database (UDIR) containing the linked clinical and device information were created, enabling longitudinal assessment of device performance. The demonstration included many stakeholders: multiple Mercy departments, manufacturers, health system partners, the FDA, professional societies, the National Cardiovascular Data Registry, and information system vendors. The resulting system of systems is described in detail, including entities, functions, linkage between the UDIR and proprietary systems using UDIs as the index key, data flow, roles and responsibilities of actors, and the UDIR data model. The demonstration provided proof of concept that UDIs can be incorporated into provider and enterprise electronic information systems and used as the index key to combine device and clinical data in a database useful for device evaluation. Keys to success and challenges to achieving this goal were identified. Fundamental informatics principles were central to accomplishing the system of systems model. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  13. A secure data privacy preservation for on-demand

    Directory of Open Access Journals (Sweden)

    Dhasarathan Chandramohan

    2017-04-01

    Full Text Available This paper spotlights privacy and its obfuscation issues of intellectual, confidential information owned by insurance and finance sectors. Privacy risk in business era if authoritarians misuse secret information. Software interruptions in steeling digital data in the name of third party services. Liability in digital secrecy for the business continuity isolation, mishandling causing privacy breaching the vicinity and its preventive phenomenon is scrupulous in the cloud, where a huge amount of data is stored and maintained enormously. In this developing IT-world toward cloud, users privacy protection is becoming a big question , albeit cloud computing made changes in the computing field by increasing its effectiveness, efficiency and optimization of the service environment etc, cloud users data and their identity, reliability, maintainability and privacy may vary for different CPs (cloud providers. CP ensures that the user’s proprietary information is maintained more secretly with current technologies. More remarkable occurrence is even the cloud provider does not have suggestions regarding the information and the digital data stored and maintained globally anywhere in the cloud. The proposed system is one of the obligatory research issues in cloud computing. We came forward by proposing the Privacy Preserving Model to Prevent Digital Data Loss in the Cloud (PPM–DDLC. This proposal helps the CR (cloud requester/users to trust their proprietary information and data stored in the cloud.

  14. Process-driven selection of information systems for healthcare

    Science.gov (United States)

    Mills, Stephen F.; Yeh, Raymond T.; Giroir, Brett P.; Tanik, Murat M.

    1995-05-01

    Integration of networking and data management technologies such as PACS, RIS and HIS into a healthcare enterprise in a clinically acceptable manner is a difficult problem. Data within such a facility are generally managed via a combination of manual hardcopy systems and proprietary, special-purpose data processing systems. Process modeling techniques have been successfully applied to engineering and manufacturing enterprises, but have not generally been applied to service-based enterprises such as healthcare facilities. The use of process modeling techniques can provide guidance for the placement, configuration and usage of PACS and other informatics technologies within the healthcare enterprise, and thus improve the quality of healthcare. Initial process modeling activities conducted within the Pediatric ICU at Children's Medical Center in Dallas, Texas are described. The ongoing development of a full enterprise- level model for the Pediatric ICU is also described.

  15. Small business innovation research. Abstracts of completed 1987 phase 1 projects

    Science.gov (United States)

    1989-01-01

    Non-proprietary summaries of Phase 1 Small Business Innovation Research (SBIR) projects supported by NASA in the 1987 program year are given. Work in the areas of aeronautical propulsion, aerodynamics, acoustics, aircraft systems, materials and structures, teleoperators and robotics, computer sciences, information systems, spacecraft systems, spacecraft power supplies, spacecraft propulsion, bioastronautics, satellite communication, and space processing are covered.

  16. PHL10/460: Cancerfacts.com - Vertical Portal with Newly Developed Health Profiler

    OpenAIRE

    Lenz, C; Brucksch, M

    1999-01-01

    Introduction Unlike general health portals such as WebMD and Drkoop.com that cover everything from the flu to heart disease, Silicon Valley-based cancerfacts.com is a so-called vertical portal. It covers only one small vertical niche of health care: cancer, and in particular, prostate cancer. As a value-added proprietary technology, the company offers its newly developed profile engine to health information retrievers. Methods Users are enabled to insert their specific medical information - r...

  17. Cloud Computing: Architecture and Services

    OpenAIRE

    Ms. Ravneet Kaur

    2018-01-01

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. It is a method for delivering information technology (IT) services where resources are retrieved from the Internet through web-based tools and applications, as opposed to a direct connection to a server. Rather than keeping files on a proprietary hard drive or local storage device, cloud-based storage makes it possib...

  18. The Potential of Open Source Information in Supporting Acquisition Pathway Analysis to Design IAEA State Level Approaches

    International Nuclear Information System (INIS)

    Renda, G.; Kim, L.; Jungwirth, R.; Pabian, F.; Wolfart, E.; Cojazzi, G.G.M.; )

    2015-01-01

    International Atomic Energy Agency (IAEA) safeguards designed to deter nuclear proliferation are constantly evolving to respond to new challenges. Within its State Level Concept, the IAEA envisions an objective-based and information-driven approach for designing and implementing State Level Approaches (SLAs), using all available measures to improve the effectiveness and efficiency of safeguards. The main Objectives of a SLA are a) to detect undeclared nuclear material or activities in the State, b) to detect undeclared production or processing of nuclear materials in declared facilities or locations outside facilities (LOFs), c) to detect diversion of declared nuclear material in declared facilities or LOFs. Under the SLA, States will be differentiated based upon objective State-Specific Factors that influence the design, planning, conduct and evaluation of safeguards activities. Proposed categories of factors include both technical and legal aspects, spanning from the deployed fuel cycle and the related state's technical capability to the type of safeguards agreements in force and the IAEA experience in implementing safeguards in that state. To design a SLA, the IAEA foresees the use of Acquisition Path Analysis (APA) to identify the plausible routes for acquiring weapons-usable material and to assess their safeguards significance. In order to achieve this goal, APA will have to identify possible acquisition paths, characterize them and eventually prioritize them. This paper will provide an overview of how the use of open source information (here loosely defined as any type of non-classified or proprietary information and including, but not limited to, media sources, government and non-governmental reports and analyzes, commercial data, satellite imagery, scientific/ technical literature, trade data) can support this activity in the various aspects of a typical APA approach. (author)

  19. Through BHA (Bottom Hole Assembly) cementing with proprietary cementing technology

    Energy Technology Data Exchange (ETDEWEB)

    Fanguy, Charles ' Joey' ; Mueller, Dan T. [BJ Services Company, Houston, TX (United States); Garrett, J.C. [Palm Energy Partners, LLC, Metairie, LA (United States)

    2004-07-01

    There are many problems that can arise when drilling into sub-normally pressured or naturally fractured zones. Lost circulation is one problem that is commonly encountered while drilling oil and gas wells. Lost circulation can lead to increased costs associated with drilling due to rig time, spreadsheet costs, and expensive mud system losses. Cement is one of the most effective treatment options, although it is not normally considered the first option because most operators are forced to trip out of the wellbore and utilize a squeeze packer. This is not always a viable option because of potential well control issues associated with the hydrostatic pressure reduction due to the losses of the whole mud. One treatment option that is commonly overlooked is pumping cement slurries through the bottom hole assembly and drill bit. This is generally not attempted for a variety of reasons. These reasons include: I Concern about 'squeezing off' of the cement in the bit II Lack of potential quality control associated with mixing 'on the fly' III Lack of the ability to test the actual mixed slurry samples The use of a pre-mixed, storable cement slurry has eliminated the concerns associated with pumping cement slurries through mud motors, MWD tools, BHA's, and drill bits. This advanced cement technology has been successfully utilized while reducing the risks associated with these lost circulation treatments. In addition, this technology has eliminated the costs associated with using a squeeze packer and the rig time required for several trips out of the wellbore. The paper will describe the premixed slurry properties and QA/QC procedures that are required for successful through the bit operations. This paper will also provide case histories of successful through the bit operation, as well as background information leading to the treatments. The case histories include successful through the bit remediation of severe lost circulation zones and as well the

  20. Molecular Recognition of Human Papilloma Virus (HPV Using Proprietary PCR Method Based on L1 Gene and the Evaluation of its Frequency in Tissue Samples from Patients with Cervical Cancer

    Directory of Open Access Journals (Sweden)

    Roohollah Dorostkar

    2015-06-01

    Full Text Available Abstract Background: In 1970, human papillomavirus (HPV was introduced as the main etiologic factor of cervical carcinoma. Since there is no possibility of detecting the virus and its subtypes using serological methods and cell culture, the molecular methods such as PCR have particular importance in accurate, early and definite diagnosis of the virus. So, in this research, our goal is to use a proprietary PCR assay based on L1 gene of human papillomavirus for molecular recognition of HPV and to evaluate its prevalence in patient samples. Materials and Methods: In this experimental study, after collecting of samples from malignant cervical lesions, the viral DNA was extracted from paraffin blocks of 50 clinical samples and PCR was done by specific primers for L1 gene of human papillomavirus in all samples. After the analysis of PCR products by 2% agarose gel electrophoresis, sensitivity and specificity of the test were also evaluated. Results: Among 50 patient samples, 33 cases were confirmed to be positive for HPV infection and 17 cases were negative, showing high frequency of HPV in this patient population (about 66%. The results of specificity assay were positive for papilloma samples and sensitivity of the assay was 20 copies of recombinant construct containing L1 per reaction. Conclusion: This study showed that PCR by specific primers for L1 gene of human papilloma virus is a proper and accurate method for detection of this virus and the results confirm the previous reports of correlation between HPV and cervical carcinoma.

  1. Using Process Load Cell Information for IAEA Safeguards at Enrichment Plants

    International Nuclear Information System (INIS)

    Laughter, Mark D.; Whitaker, J. Michael; Howell, John

    2010-01-01

    Uranium enrichment service providers are expanding existing enrichment plants and constructing new facilities to meet demands resulting from the shutdown of gaseous diffusion plants, the completion of the U.S.-Russia highly enriched uranium downblending program, and the projected global renaissance in nuclear power. The International Atomic Energy Agency (IAEA) conducts verification inspections at safeguarded facilities to provide assurance that signatory States comply with their treaty obligations to use nuclear materials only for peaceful purposes. Continuous, unattended monitoring of load cells in UF 6 feed/withdrawal stations can provide safeguards-relevant process information to make existing safeguards approaches more efficient and effective and enable novel safeguards concepts such as information-driven inspections. The IAEA has indicated that process load cell monitoring will play a central role in future safeguards approaches for large-scale gas centrifuge enrichment plants. This presentation will discuss previous work and future plans related to continuous load cell monitoring, including: (1) algorithms for automated analysis of load cell data, including filtering methods to determine significant weights and eliminate irrelevant impulses; (2) development of metrics for declaration verification and off-normal operation detection ('cylinder counting,' near-real-time mass balancing, F/P/T ratios, etc.); (3) requirements to specify what potentially sensitive data is safeguards relevant, at what point the IAEA gains on-site custody of the data, and what portion of that data can be transmitted off-site; (4) authentication, secure on-site storage, and secure transmission of load cell data; (5) data processing and remote monitoring schemes to control access to sensitive and proprietary information; (6) integration of process load cell data in a layered safeguards approach with cross-check verification; (7) process mock-ups constructed to provide simulated load

  2. 7 CFR 983.27 - Proprietary capacity.

    Science.gov (United States)

    2010-01-01

    ... the interest in that capacity as an individual, a shareholder, member of a cooperative, partner... or interest of a producer or handler that, either directly or through one or more intermediaries, is...

  3. The Proprietary Foundations of Corporate Law

    OpenAIRE

    John Armour; Michael J Whincop

    2005-01-01

    Recent work in both the theory of the firm and of corporate law has called into question the appropriateness of analysing corporate law as ‘merely’ a set of standard form contracts. This article develops these ideas by focusing on property law’s role in underpinning corporate enterprise. Rights to control assets are a significant mechanism of governance in the firm. Practical circumstances dictate that such rights must be shared. Property law protects the rights of co-owners against each othe...

  4. Meal replacements and fibre supplement as a strategy for weight loss. Proprietary PGX® meal replacement and PGX® fibre supplement in addition to a calorie-restricted diet to achieve weight loss in a clinical setting.

    Science.gov (United States)

    Reichert, Ronald G; Reimer, Raylene A; Kacinik, Veronica; Pal, Sebely; Gahler, Roland J; Wood, Simon

    2013-01-01

    Meal replacements and viscous soluble fibre represent safe and sustainable aids for weight loss. Our purpose was to determine if PGX® meal replacements and PGX(®) fibre complex in combination with a calorie-restricted diet would aid in weight loss in a clinical setting. Fifty-two overweight and obese participants (49 women, 3 men; average age 47.1 years) with a mean body mass index (BMI) of 33.8 ± 6.4 kg/m(2) consumed 57 g of proprietary PGX® meal replacement product at breakfast and another 57 g at lunch for 12 weeks. In addition to the meal replacements, they were also asked to consume 5 g/day of PGX® fibre in the form of granules, powder or capsules together with 250 mlwater. A registered dietician recommended low-fat, low-glycaemic-index foods for snacks and the dinner menus such that each volunteer was consuming a total of 1200 kcal/day. All participants (n = 52) lost a significant amount of weight from baseline (-4.69 ± 3.73 kg), which was further reflected in the reductions in their waist (-7.11 ± 6.35 cm) and hip circumference (-5.59 ± 3.58 cm) over the 12-week study (p meal replacements and PGX(®) fibre along with a controlled dietary caloric intake is of benefit for short-term weight loss.

  5. Overview of a compre­hensive resource database for the assessment of recoverable hydrocarbons produced by carbon dioxide enhanced oil recovery

    Science.gov (United States)

    Carolus, Marshall; Biglarbigi, Khosrow; Warwick, Peter D.; Attanasi, Emil D.; Freeman, Philip A.; Lohr, Celeste D.

    2017-10-24

    A database called the “Comprehensive Resource Database” (CRD) was prepared to support U.S. Geological Survey (USGS) assessments of technically recoverable hydrocarbons that might result from the injection of miscible or immiscible carbon dioxide (CO2) for enhanced oil recovery (EOR). The CRD was designed by INTEK Inc., a consulting company under contract to the USGS. The CRD contains data on the location, key petrophysical properties, production, and well counts (number of wells) for the major oil and gas reservoirs in onshore areas and State waters of the conterminous United States and Alaska. The CRD includes proprietary data on petrophysical properties of fields and reservoirs from the “Significant Oil and Gas Fields of the United States Database,” prepared by Nehring Associates in 2012, and proprietary production and drilling data from the “Petroleum Information Data Model Relational U.S. Well Data,” prepared by IHS Inc. in 2012. This report describes the CRD and the computer algorithms used to (1) estimate missing reservoir property values in the Nehring Associates (2012) database, and to (2) generate values of additional properties used to characterize reservoirs suitable for miscible or immiscible CO2 flooding for EOR. Because of the proprietary nature of the data and contractual obligations, the CRD and actual data from Nehring Associates (2012) and IHS Inc. (2012) cannot be presented in this report.

  6. Application and Characteristics of Chinese Herbal Medicine Containing Schisandra

    Science.gov (United States)

    Zhao, Hui; Mao, Mingsan

    2018-01-01

    Schisandra is the dried and ripe fruit of Chinese magnoliavine, which has the functions of protecting the liver and gallbladder, lowering blood sugar, antibacterial and antiaging. Schisandra contains biological activity is very high. As a commonly used blind Chinese herbal medicine, Schisandra often appear in the treatment of vertigo, palpitations, insomnia in the proprietary Chinese medicine, play a nourishing liver and kidney, nourishing the nerves and so on. Chinese Pharmacopoeia contains a total of 102 kinds of Chinese medicine containing Schisandra, according to the dosage form will contain Schisandra proprietary Chinese medicine is divided into pills, tablets, granules and other 8 categories, according to the compatibility of Schisandra application, will contain Schisandra proprietary Chinese medicine functional Class 9. In this paper, the main clinical application of proprietary Chinese medicines containing Schisandra chinensis was analyzed by analyzing the classification and functional treatment of Chinese medicinal constituents containing Schisandra in pharmacopoeia, and then providing the basis for the analysis of Schisandra in proprietary Chinese medicine and The study is conducted to give guidance.

  7. Web-based public health geographic information systems for resources-constrained environment using scalable vector graphics technology: a proof of concept applied to the expanded program on immunization data

    Directory of Open Access Journals (Sweden)

    Kamadjeu Raoul

    2006-06-01

    Full Text Available Abstract Background Geographic Information Systems (GIS are powerful communication tools for public health. However, using GIS requires considerable skill and, for this reason, is sometimes limited to experts. Web-based GIS has emerged as a solution to allow a wider audience to have access to geospatial information. Unfortunately the cost of implementing proprietary solutions may be a limiting factor in the adoption of a public health GIS in a resource-constrained environment. Scalable Vector Graphics (SVG is used to define vector-based graphics for the internet using XML (eXtensible Markup Language; it is an open, platform-independent standard maintained by the World Wide Web Consortium (W3C since 2003. In this paper, we summarize our methodology and demonstrate the potential of this free and open standard to contribute to the dissemination of Expanded Program on Immunization (EPI information by providing interactive maps to a wider audience through the Internet. Results We used SVG to develop a database driven web-based GIS applied to EPI data from three countries of WHO AFRO (World Health Organization – African Region. The system generates interactive district-level country immunization coverage maps and graphs. The approach we describe can be expanded to cover other public health GIS demanding activities, including the design of disease atlases in a resources-constrained environment. Conclusion Our system contributes to accumulating evidence demonstrating the potential of SVG technology to develop web-based public health GIS in resources-constrained settings.

  8. Web-based public health geographic information systems for resources-constrained environment using scalable vector graphics technology: a proof of concept applied to the expanded program on immunization data.

    Science.gov (United States)

    Kamadjeu, Raoul; Tolentino, Herman

    2006-06-03

    Geographic Information Systems (GIS) are powerful communication tools for public health. However, using GIS requires considerable skill and, for this reason, is sometimes limited to experts. Web-based GIS has emerged as a solution to allow a wider audience to have access to geospatial information. Unfortunately the cost of implementing proprietary solutions may be a limiting factor in the adoption of a public health GIS in a resource-constrained environment. Scalable Vector Graphics (SVG) is used to define vector-based graphics for the internet using XML (eXtensible Markup Language); it is an open, platform-independent standard maintained by the World Wide Web Consortium (W3C) since 2003. In this paper, we summarize our methodology and demonstrate the potential of this free and open standard to contribute to the dissemination of Expanded Program on Immunization (EPI) information by providing interactive maps to a wider audience through the Internet. We used SVG to develop a database driven web-based GIS applied to EPI data from three countries of WHO AFRO (World Health Organization - African Region). The system generates interactive district-level country immunization coverage maps and graphs. The approach we describe can be expanded to cover other public health GIS demanding activities, including the design of disease atlases in a resources-constrained environment. Our system contributes to accumulating evidence demonstrating the potential of SVG technology to develop web-based public health GIS in resources-constrained settings.

  9. Boosting INPO's programs with supplier know-how

    International Nuclear Information System (INIS)

    Matson, B.

    1984-01-01

    Nuclear industry suppliers, such as Stone and Webster and Babcock and Wilcox, are key participants in the Institute of Nuclear Power Operators (INPO) effort to promote technical information exchanges throughout the industry and to contribute to INPO training programs. Suppliers have 21 employees on loan to the Institute, although steps must be taken to protect proprietary information and to avoid breaking antitrust laws. Among the NUCLEAR NETWORK programs using supplier expertise is the Significant Event Evaluation and Information Network (SEE-IN), which reviews important reports involving their products. Suppliers benefit by observing evaluation teams at construction sites and plant start-ups

  10. Westinghouse experience in the transfer of nuclear technology

    International Nuclear Information System (INIS)

    Simpson, J.W.

    1977-01-01

    Westinghouse experience with transfer of technical information is two-sided. First is our experience in learning, and the second is our experience in teaching others. Westinghouse conducts a special school to which government, academic and industry people are invited. There are many problems involved in all technology transfers; these include: keeping information current, making certain changes are compatible with the supplier's manufacturing capability and also suitable to the receiver, patent right and proprietary information. The building, testing and maintenance of the unit on the line - and then a succession of its sister plant is the basis for the Westinghouse leadership

  11. Experimental investigations into low concentrating line axis solar concentrators for CPV applications

    OpenAIRE

    Singh, H; Sabry, M; Redpath, DAG

    2016-01-01

    Solar photovoltaic conversion systems with integrated, low concentration ratio, non-imaging reflective concentrators, could be on south facing building roofs used to generate power at a lower cost than currently available proprietary systems. The experimental investigation presented by this research provides information on the optical and energy conversion characteristics of two geometrically equivalent non-imaging concentrators; a compound parabolic concentrator and a V-trough reflector. The...

  12. Application of Advanced Multi-Core Processor Technologies to Oceanographic Research

    Science.gov (United States)

    2013-09-30

    1 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. Application of Advanced Multi-Core Processor Technologies...STM32 NXP LPC series No Proprietary Microchip PIC32/DSPIC No > 500 mW; < 5 W ARM Cortex TI OMAP TI Sitara Broadcom BCM2835 Varies FPGA...state-of-the-art information processing architectures. OBJECTIVES Next-generation processor architectures (multi-core, multi-threaded) hold the

  13. A Comprehensive Toolset for General-Purpose Private Computing and Outsourcing

    Science.gov (United States)

    2016-12-08

    contexts businesses are also hesitant to make their proprietary available to the cloud [1]. While in general sensitive data can be protected by the...data sources, gathering and maintaining the data needed , and completing and reviewing the collection of information. Send comments regarding this...project and scientific advances made towards each of the research thrusts throughout the project duration. 1 Project Objectives Cloud computing enables

  14. 77 FR 59998 - Self-Regulatory Organizations; The Options Clearing Corporation; Advance Notice Relating to the...

    Science.gov (United States)

    2012-10-01

    ... portfolio at current prices by selling the net long positions and buying in the net short positions. The... Accounts, non-Proprietary X-M accounts, and internal non-proprietary cross-margining accounts. All such...

  15. Bottom longline analytical data collected in Gulf of Mexico from 1995-01-01 to 2013-12-30 (NCEI Accession 0147683)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA NMFS does not approve, recommend, or endorse any proprietary product or proprietary material mentioned in this publication. No reference shall be made to NMFS,...

  16. International Atomic Energy Agency Annual Report 2010 [Spanish Version]; Informe Anual del OIEA para 2010

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    The Annual Report 2010 aims to summarize only the significant activities of the Agency during the year in question The main part of the report, starting on page 17, generally follows the programme structure as given in The Agency's Programme and Budget 2010-2011 (GC(53)/5). The introductory chapter, 'Overview', seeks to provide a thematic analysis of the Agency's activities within the context of notable developments during the year More detailed information can be found in the latest editions of the Agency's Nuclear Safety Review, Nuclear Technology Review, Technical Cooperation Report and the Safeguards Statement and Background to the Safeguards Statement and Summary. For the convenience of readers, these documents are available on the CD-ROM attached to the inside back cover of this report. Additional information covering various aspects of the Agency's programme is provided on the attached CD-ROM and is also available on the Agency's web site at http://www.iaea.org./Publications/ Reports/index.html. Except where indicated, all sums of money are expressed in United States dollars. The designations employed and the presentation of material in this report do not imply the expression of any opinion whatsoever on the part of the Secretariat concerning the legal status of any country or territory or of its authorities, or concerning the delimitation of its frontiers. The mention of names of specific companies or products (whether or not indicated as registered) does not imply any intention to infringe proprietary rights, nor should it be construed as an endorsement or recommendation on the part of the Agency. The term 'non-nuclear-weapon State' is used as in the Final Document of the 1968 Conference of Non-Nuclear-Weapon States (United Nations document A/7277) and in the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) The term 'nuclear weapon State' is as used in the NPT.

  17. NASA GSFC Tin Whisker Homepage http://nepp.nasa.gov/whisker

    Science.gov (United States)

    Shaw, Harry

    2000-01-01

    The NASA GSFC Tin Whisker Homepage provides general information and GSFC Code 562 experimentation results regarding the well known phenomenon of tin whisker formation from pure tin plated substrates. The objective of this www site is to provide a central repository for information pertaining to this phenomenon and to provide status of the GSFC experiments to understand the behavior of tin whiskers in space environments. The Tin Whisker www site is produced by Code 562. This www site does not provide information pertaining to patented or proprietary information. All of the information contained in this www site is at the level of that produced by industry and university researchers and is published at international conferences.

  18. Materials accounting system for an IBM PC

    International Nuclear Information System (INIS)

    Bearse, R.C.; Thomas, R.J.; Henslee, S.P.; Jackson, B.G.; Tracy, D.B.; Pace, D.M.

    1986-01-01

    We have adapted the Los Alamos MASS accounting system for use on an IBM PC/AT at the Fuels Manufacturing Facility (FMF) at Argonne National Laboratory-West (ANL-WEST) in Idaho Falls, Idaho. Cost of hardware and proprietary software was less than $10,000 per station. The system consists of three stations between which accounting information is transferred using floppy disks accompanying special nuclear material shipments. The programs were implemented in dBASEIII and were compiled using the proprietary software CLIPPER. Modifications to the inventory can be posted in just a few minutes, and operator/computer interaction is nearly instantaneous. After the records are built by the user, it takes 4 to 5 seconds to post the results to the database files. A version of this system was specially adapted and is currently in use at the FMF facility at Argonne National Laboratory in Idaho Falls. Initial satisfaction is adequate and software and hardware problems are minimal

  19. Project managing your simulator DCS upgrade

    International Nuclear Information System (INIS)

    Carr, S.

    2006-01-01

    The intention of this paper is to provide helpful information and tips for the purchaser with regard to the project management of a DCS upgrade for an existing nuclear power station operator-training simulator. This paper was written shortly after STS Powergen completed two nuclear power station simulator DCS projects in the USA. Areas covered by this paper are: - Contractual documents and arrangements; - Licence and Escrow agreements; - Liquidated damages; - Project management; - Project schedules and resources; - Monitoring progress; - Defect reporting; - DCS automation code; - Access to proprietary information; - Tips for project meetings; - Testing; - Cultural issues; - Training

  20. A Classification of Collaborative Knowledge

    Directory of Open Access Journals (Sweden)

    Thomas Marlowe

    2011-12-01

    Full Text Available Efforts involving multiple institutions, whether aimed at sharing resources, at product development or production, at research, or in other directions, often rely on effective knowledge generation and knowledge management. However, there are inherent new difficulties in knowledge management for such inter-institutional collaborations, arising from the need to standardize and synthesize knowledge from multiple sources, and from the need to provide adequate protections for confidential and proprietary information.

  1. Universal data access for run-time resource management in resource constrained wireless networks

    OpenAIRE

    Rerkrai, Krisakorn

    2012-01-01

    Resource-constrainedwireless networks, e.g.wireless sensor networks (WSNs), small embedded devices with limited computational power and energy, have been the subject of intense research in the past decade. Moreover, recent technological advances and growing demand for better efficiency have led to a great number of link and network protocols for WSNs. The protocols depend on specific interfaces to exchange necessary information. Unfortunately these interfaces are often proprietary and highly ...

  2. Final Project Report Project 10749-4.2.2.1 2007-2009

    Energy Technology Data Exchange (ETDEWEB)

    Zacher, Alan H.; Holladay, Johnathan E.; Frye, J. G.; Brown, Heather M.; Santosa, Daniel M.; Oberg, Aaron A.

    2009-05-11

    This is the final report for the DOE Project 10749-4.2.2.1 for the FY2007 - FY2009 period. This report is non-proprietary, and will be submitted to DOE as a final project report. The report covers activities under the DOE Project inside CRADA 269 (Project 53231) as well as project activites outside of that CRADA (Project 56662). This is the final report that is summarized from the non-proprietary quarterlies submitted to DOE over the past 2.5 years, which in turn are summaries from the proprietary technical reporting to UOP.

  3. Actions Needed to Ensure Scientific and Technical Information is Adequately Reviewed at Goddard Space Flight Center, Johnson Space Center, Langley Research Center, and Marshall Space Flight Center

    Science.gov (United States)

    2008-01-01

    This audit was initiated in response to a hotline complaint regarding the review, approval, and release of scientific and technical information (STI) at Johnson Space Center. The complainant alleged that Johnson personnel conducting export control reviews of STI were not fully qualified to conduct those reviews and that the reviews often did not occur until after the STI had been publicly released. NASA guidance requires that STI, defined as the results of basic and applied scientific, technical, and related engineering research and development, undergo certain reviews prior to being released outside of NASA or to audiences that include foreign nationals. The process includes technical, national security, export control, copyright, and trade secret (e.g., proprietary data) reviews. The review process was designed to preclude the inappropriate dissemination of sensitive information while ensuring that NASA complies with a requirement of the National Aeronautics and Space Act of 1958 (the Space Act)1 to provide for the widest practicable and appropriate dissemination of information resulting from NASA research activities. We focused our audit on evaluating the STI review process: specifically, determining whether the roles and responsibilities for the review, approval, and release of STI were adequately defined and documented in NASA and Center-level guidance and whether that guidance was effectively implemented at Goddard Space Flight Center, Johnson Space Center, Langley Research Center, and Marshall Space Flight Center. Johnson was included in the review because it was the source of the initial complaint, and Goddard, Langley, and Marshall were included because those Centers consistently produce significant amounts of STI.

  4. Protocol independent transmission method in software defined optical network

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  5. 27 CFR 21.32 - Formula No. 1.

    Science.gov (United States)

    2010-04-01

    ....Shellac coatings. 014.Other natural resin coatings. 016.Other coatings. 021.Cellulose plastics. 022.Non... binders. 041.Proprietary solvents. 042.Solvents and thinners (other than proprietary solvents or special industrial solvents). 043.Solvents, special (restricted sale). 051.Polishes. 052.Inks (not including meat...

  6. 76 FR 50277 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-08-12

    ... Rule Change To Adopt the Content Outline for the Proprietary Traders Examination (Series 56) August 8... the content outline for the Proprietary Traders Qualification Examination (``Series 56'') program. ISE... proposing to set forth the content of the examination. The qualification examination consists of 100...

  7. 77 FR 33949 - Statement of Policy Regarding the Conformance Period for Entities Engaged in Prohibited...

    Science.gov (United States)

    2012-06-08

    ... company supervised by the Board \\3\\ that engages in proprietary trading and has certain interests in, or... capital requirements, quantitative limits, or other restrictions on nonbank financial companies pursuant... Period for Entities Engaged in Prohibited Proprietary Trading or Private Equity Fund or Hedge Fund...

  8. 75 FR 71475 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-11-23

    ... from a range of possible, and equally reasonable, pricing strategies as the means of recovering total... for accessing posted liquidity. Other platforms may choose a strategy of paying lower rebates (or no... proprietary data and strict pricing discipline for the proprietary products themselves. Numerous exchanges...

  9. Il pericolo degli ebook

    Directory of Open Access Journals (Sweden)

    Maria Chiara Pievatolo

    2014-01-01

    Full Text Available I libri stampati: si possono acquistare anonimamente in contanti; quindi se ne è proprietari: non dobbiamo firmare una licenza che ne restringe l’uso: il loro formato è noto e per leggerli non occorrono tecnologie proprietarie; si possono dare, prestare o...

  10. Health care technology--information technology/Part 4. Why will the Internet be important to clinicians?

    Science.gov (United States)

    Ruffin, M

    1996-10-01

    As the popularity of the Internet's World Wide Web exploded in 1994 and 1995, corporations began adopting the browser software called Mosaic (and its derivatives) for their networks. Why? That same software can be used to "surf" the Internet. Since Intranets are easier to maintain and less expensive, they are replacing the more expensive "groupware" applications based on client-server architectures that corporations installed over the past five years. These Intranets are based on widely-available technologies designed for the Internet, not proprietary software designed for a relatively few customers. Organizations with communication networks integrated with their transaction systems and electronic medical records will be more effective in managing health care resources--and more attractive to employers and insurers for managed care contracting.

  11. Fuel Composition Analysis of Endothermically Heated JP-8 Fuel for Use in a Pulse Detonation Engine

    Science.gov (United States)

    2008-06-01

    FHS consisted of two concentric tube heat exchangers fabricated from inconel , a single seven-micron particulate filter, and instrumentation. In...zeolite structure is made from a silica-alumina, however the catalytic agent is proprietary information (Helfrich, 2007:5). Each inconel heat...exchanger was constructed of an inner 41 2 in. alloy 625 schedule 10 pipe and an outer 2 ½ in. alloy 600 schedule 40 pipe, 0.91 m (36 in.) in length

  12. Achieving Better Buying Power through Acquisition of Open Architecture Software Systems for Web and Mobile Devices

    Science.gov (United States)

    2016-02-22

    user query, a database management system, (like MySQL or Oracle 11) that stores, queries and updates metadata associated with the requested content...5.2 Common technology (e.g., Ozone widget framework, Java ); and 5.3 Shared infrastructure (Joint Information Environment, MPE, ICITE). 5.4 Data...or may not be subject to proprietary IP licenses or “fair use” doctrine (cf. Oracle v. Google, re: Java APIs, now pending before the SCOTUS): 15.1 Use

  13. Dark retweets: investigating non-conventional retweeting patterns

    OpenAIRE

    Azman, Norhidayah; Millard, David E.; Weal, Mark J.

    2012-01-01

    Retweets are an important mechanism for recognising propagation of information on the Twitter social media platform. However, many retweets do not use the official retweet mechanism, or even community established conventions, and these "dark retweets" are not accounted for in many existing analysis. In this paper, a comprehensive matrix of tweet propagation is presented to show the different nuances of retweeting, based on seven characteristics: whether it is proprietary, the mechanism used, ...

  14. Optimal Pricing Strategy in Marketing Research Consulting.

    OpenAIRE

    Chang, Chun-Hao; Lee, Chi-Wen Jevons

    1994-01-01

    This paper studies the optimal pricing scheme for a monopolistic marketing research consultant who sells high-cost proprietary marketing information to her oligopolistic clients in the manufacturing industry. In designing an optimal pricing strategy, the consultant needs to fully consider the behavior of her clients, the behavior of the existing and potential competitors to her clients, and the behavior of her clients' customers. The authors show how the environment uncertainty, the capabilit...

  15. Fulfilling Schmidt Ocean Institute's commitment to open sharing of information, data, and research outcomes: Successes and Lessons Learned from Proposal Evaluation to Public Repositories to Lasting Achievements

    Science.gov (United States)

    Miller, A.; Zykov, V.

    2016-02-01

    Schmidt Ocean Institute's vision is that the world's ocean be understood through technological advancement, intelligent observation, and open sharing of information. As such, making data collected aboard R/V Falkor available to the general public is a key pillar of the organization and a major strategic focus. Schmidt Ocean Institute supports open sharing of information about the ocean to stimulate the growth of its applications and user community, and amplify further exploration, discovery, and deeper understanding of our environment. These efforts are supported through partnerships with data management experts in the oceanographic community to enable standards-compliant sharing of scientific information and data collected during research cruises. To properly fulfill the commitment, proponents' data management plans are evaluated as part of the proposal process when applying for ship time. We request a thorough data management plan be submitted and expert reviewers evaluate the proposal's plan as part of the review process. Once a project is successfully selected, the chief scientist signs an agreement stating delivery dates for post-cruise data deliverables in a timely manner, R/V Falkor underway and meterological data is shared via public repositories, and links and reports are posted on the cruise webpage. This allows many more creative minds and thinkers to analyze, process, and study the data collected in the world ocean rather than privileging one scientist with the proprietary information, driving international and national scientific progress. This presentation will include the Institute's mission, vision, and strategy for sharing data, based on our Founders' passions, the process for evaluating proposed data management plans, and our partnering efforts to make data publically available in fulfillment of our commitment. Recent achievements and successes in data sharing, as well as future plans to improve our efforts will also be discussed.

  16. Mineral profiling, carcass quality and sensory evaluation of broiler ...

    African Journals Online (AJOL)

    An investigation to determine the mineral composition, carcass quality and organoleptic properties of the meat of broilers fed basal broiler feeds supplemented with different leaf meals was conducted. Four treatments: basal proprietary broiler feed only (T1 - PBF) as control, basal proprietary broiler feeds supplemented with ...

  17. 78 FR 18652 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-03-27

    ... their own proprietary account.\\9\\ The Firm Floor Options Transaction Charges in Penny Pilot and Non... Firm's proprietary account, it is reasonable to apply only one Options Transaction Charge. The Exchange... robust market forces and therefore must remain competitive with fees charged and rebates paid by other...

  18. Spreading characteristics of proprietary rectal steroid preparations

    International Nuclear Information System (INIS)

    Hay, D.J.

    1982-01-01

    Three types of rectal steroid preparation were labelled with Technetium 99 or Indium 111, and the extent of spread of each within the bowel was followed, immediately after administration and at 2hrs, using a gamma camera. Patients with ulcerative colitis were compared with controls. Results indicate that 'Colifoam' enema and 'Predsol' suppository act mainly in the rectum, but 'Predsol retention' enema spreads further into the colon, making it more useful for patients with extensive ulcerative colitis. (U.K.)

  19. Information Space, Information Field, Information Environment

    Directory of Open Access Journals (Sweden)

    Victor Ya. Tsvetkov

    2014-08-01

    Full Text Available The article analyzes information space, information field and information environment; shows that information space can be natural and artificial; information field is substantive and processual object and articulates the space property; information environment is concerned with some object and acts as the surrounding in relation to it and is considered with regard to it. It enables to define information environment as a subset of information space. It defines its passive description. Information environment can also be defined as a subset of information field. It corresponds to its active description.

  20. 21 CFR 201.10 - Drugs; statement of ingredients.

    Science.gov (United States)

    2010-04-01

    ... composition, prescribing, side effects, or contraindications and the proprietary name or designation is used... manner that creates an impression of value greater than their true functional role in the formulation. (5... proprietary name or designation appears on the main display panel of the label; but side- or back-panel...

  1. International Atomic Energy Agency Annual Report 2009; Informe Anual para 2009

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-07-01

    The Annual Report 2009 aims to summarize only the significant activities of the Agency during the year in question. The main part of the report generally follows the programme structure as given in The Agency's Programme and Budget 2008-2009 (GC(51)/2). The introductory chapter, '2009 in Perspective', seeks to provide a thematic analysis of the Agency's activities within the context of notable developments during the year. More detailed information can be found in the latest editions of the Agency's Nuclear Safety Review, Nuclear Technology Review, Technical Cooperation Report and the Safeguards Statement for 2009 and Background to the Safeguards Statement. For the convenience of readers, these documents are available on the CD-ROM attached to the inside back cover of this report. Additional infomation covering various aspects of the Agency's programme is provided on the attached CD-ROM, and is also available on the Agency's web site at http://www.iaea.org/Publications/Reports/Anrep2009/index.html. Except where indicated, all sums of money are expressed in United States dollars. The designations employed and the presentation of material in this document do not imply the expression of any opinion whatsoever on the part of the Secretariat concerning the legal status of any country or territory or of its authorities, or concerning the delimitation of its frontiers. The mention of names of specific companies or products (whether or not indicated as registered) does not imply any intention to infringe proprietary rights, nor should it be construed as an endorsement or recommendation on the part of the Agency. The term 'non-nuclear-weapon State' is used as in the Final Document of the 1968 Conference of Non-Nuclear-Weapon States (United Natinos document A/7277) and in the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The term 'nuclear weapon State' is as used in the NPT

  2. Efficiency achievements from a user-developed real-time modifiable clinical information system.

    Science.gov (United States)

    Bishop, Roderick O; Patrick, Jon; Besiso, Ali

    2015-02-01

    This investigation was initiated after the introduction of a new information system into the Nepean Hospital Emergency Department. A retrospective study determined that the problems introduced by the new system led to reduced efficiency of the clinical staff, demonstrated by deterioration in the emergency department's (ED's) performance. This article is an investigation of methods to improve the design and implementation of clinical information systems for an ED by using a process of clinical team-led design and a technology built on a radically new philosophy denoted as emergent clinical information systems. The specific objectives were to construct a system, the Nepean Emergency Department Information Management System (NEDIMS), using a combination of new design methods; determine whether it provided any reduction in time and click burden on the user in comparison to an enterprise proprietary system, Cerner FirstNet; and design and evaluate a model of the effect that any reduction had on patient throughput in the department. The methodology for conducting a direct comparison between the 2 systems used the 6 activity centers in the ED of clerking, triage, nursing assessments, fast track, acute care, and nurse unit manager. A quantitative study involved the 2 systems being measured for their efficiency on 17 tasks taken from the activity centers. A total of 332 task instances were measured for duration and number of mouse clicks in live usage on Cerner FirstNet and in reproduction of the same Cerner FirstNet work on NEDIMS as an off-line system. The results showed that NEDIMS is at least 41% more efficient than Cerner FirstNet (95% confidence interval 21.6% to 59.8%). In some cases, the NEDIMS tasks were remodeled to demonstrate the value of feedback to create improvements and the speed and economy of design revision in the emergent clinical information systems approach. The cost of the effort in remodeling the designs showed that the time spent on remodeling is

  3. Partners in qualified equipment supply

    International Nuclear Information System (INIS)

    Rygg, D.E.; O'Hare, G.J.

    1993-01-01

    Industry initiatives have been taken to improve procurement practices and commercial dedication programs, formation of procurement engineering groups, emphasis on product quality, and increased engineering involvement in procurement and maintenance of qualified equipment. This poses new challenges for many licensees in terms of resources, product knowledge, and access to information normally held proprietary by equipment suppliers. Alternative approaches to future licensee/Westinghouse relationships which will allow licensees to adapt to the changing environment are discussed. 2 figs

  4. Learning Management Systems and Comparison of Open Source Learning Management Systems and Proprietary Learning Management Systems

    Directory of Open Access Journals (Sweden)

    Yücel Yılmaz

    2016-04-01

    Full Text Available The concept of learning has been increasingly gaining importance for individuals, businesses and communities in the age of information. On the other hand, developments in information and communication technologies take effect in the field of learning activities. With these technologies, barriers of time and space against the learning activities largely disappear and these technologies make it easier to carry out these activities more effectively. There remain a lot of questions regarding selection of learning management system (LMS to be used for the management of e-learning processes by all organizations conducing educational practices including universities, companies, non-profit organizations, etc. The main questions are as follows: Shall we choose open source LMS or commercial LMS? Can the selected LMS meet existing needs and future potential needs for the organization? What are the possibilities of technical support in the management of LMS? What kind of problems may be experienced in the use of LMS and how can these problems be solved? How much effective can officials in the organization be in the management of LMS? In this study, primarily e-learning and the concept of LMS will be discussed, and in the next section, as for answers to these questions, open source LMSs and centrally developed LMSs will be examined and their advantages and disadvantages relative to each other will be discussed.

  5. Wave data processing toolbox manual

    Science.gov (United States)

    Sullivan, Charlene M.; Warner, John C.; Martini, Marinna A.; Lightsom, Frances S.; Voulgaris, George; Work, Paul

    2006-01-01

    Researchers routinely deploy oceanographic equipment in estuaries, coastal nearshore environments, and shelf settings. These deployments usually include tripod-mounted instruments to measure a suite of physical parameters such as currents, waves, and pressure. Instruments such as the RD Instruments Acoustic Doppler Current Profiler (ADCP(tm)), the Sontek Argonaut, and the Nortek Aquadopp(tm) Profiler (AP) can measure these parameters. The data from these instruments must be processed using proprietary software unique to each instrument to convert measurements to real physical values. These processed files are then available for dissemination and scientific evaluation. For example, the proprietary processing program used to process data from the RD Instruments ADCP for wave information is called WavesMon. Depending on the length of the deployment, WavesMon will typically produce thousands of processed data files. These files are difficult to archive and further analysis of the data becomes cumbersome. More imperative is that these files alone do not include sufficient information pertinent to that deployment (metadata), which could hinder future scientific interpretation. This open-file report describes a toolbox developed to compile, archive, and disseminate the processed wave measurement data from an RD Instruments ADCP, a Sontek Argonaut, or a Nortek AP. This toolbox will be referred to as the Wave Data Processing Toolbox. The Wave Data Processing Toolbox congregates the processed files output from the proprietary software into two NetCDF files: one file contains the statistics of the burst data and the other file contains the raw burst data (additional details described below). One important advantage of this toolbox is that it converts the data into NetCDF format. Data in NetCDF format is easy to disseminate, is portable to any computer platform, and is viewable with public-domain freely-available software. Another important advantage is that a metadata

  6. 78 FR 62881 - Self-Regulatory Organizations; NYSE MKT LLC; Notice of Filing and Immediate Effectiveness of...

    Science.gov (United States)

    2013-10-22

    ... to fund the S501 CE Program administered to persons registered only as Proprietary Traders who are... Company Products/Variable Contracts Limited Representatives; and (3) the S101 (``S101 CE Program'') for... S201, S106 and S101 CE Programs, ``CE Programs'') for persons registered only as Proprietary Traders.\\8...

  7. 17 CFR 31.9 - Minimum financial requirements.

    Science.gov (United States)

    2010-04-01

    ... term “customer” means customer as defined in § 31.4(d); (ii) The term “proprietary account” means a... the definition of customer (as defined in paragraph (b)(2)(i) of this section) or proprietary account... demonstrates to the satisfaction of the Commission that it complies with the financial requirements of this...

  8. Active and Passive Supplier Assessment Program (ASAP & PSAP) WWW Sites http://nepp.nasa.gov/imd/asap http://nepp.nasa.gov/imd/psap

    Science.gov (United States)

    Brusse, Jay

    2000-01-01

    The Active and Passive Supplier Assessment Programs (ASAP and PSAP) WWW Sites provide general information to the electronic parts community regarding the availability of electronic parts. They also provide information to NASA regarding modifications to commonly used procurement specifications and test methods. The ASAP and PSAP www sites are ongoing resources produced by Code 562 in support of the NASA HQ funded NASA Electronic Parts and Packaging (NEPP) Program. These WWW sites do not provide information pertaining to patented or proprietary information. All of the information contained in these www sites is available through various other public domain resources such as US Military Qualified Producers Listings (QPLs) and Qualified Manufacturer Listings (QMLs) and industry working groups such as the Electronics Industry Alliance (EIA) and the Space Parts Working Group (SPWG).

  9. Automated customized retrieval of radiotherapy data for clinical trials, audit and research.

    Science.gov (United States)

    Romanchikova, Marina; Harrison, Karl; Burnet, Neil G; Hoole, Andrew Cf; Sutcliffe, Michael Pf; Parker, Michael Andrew; Jena, Rajesh; Thomas, Simon James

    2018-02-01

    To enable fast and customizable automated collection of radiotherapy (RT) data from tomotherapy storage. Human-readable data maps (TagMaps) were created to generate DICOM-RT (Digital Imaging and Communications in Medicine standard for Radiation Therapy) data from tomotherapy archives, and provided access to "hidden" information comprising delivery sinograms, positional corrections and adaptive-RT doses. 797 data sets totalling 25,000 scans were batch-exported in 31.5 h. All archived information was restored, including the data not available via commercial software. The exported data were DICOM-compliant and compatible with major commercial tools including RayStation, Pinnacle and ProSoma. The export ran without operator interventions. The TagMap method for DICOM-RT data modelling produced software that was many times faster than the vendor's solution, required minimal operator input and delivered high volumes of vendor-identical DICOM data. The approach is applicable to many clinical and research data processing scenarios and can be adapted to recover DICOM-RT data from other proprietary storage types such as Elekta, Pinnacle or ProSoma. Advances in knowledge: A novel method to translate data from proprietary storage to DICOM-RT is presented. It provides access to the data hidden in electronic archives, offers a working solution to the issues of data migration and vendor lock-in and paves the way for large-scale imaging and radiomics studies.

  10. Soil bioremediation at CFB Trenton: evaluation of bioremediation processes

    International Nuclear Information System (INIS)

    Ouellette, L.; Cathum, S.; Avotins, J.; Kokars, V.; Cooper, D.

    1996-01-01

    Bioremediation processes and their application in the cleanup of contaminated soil, were discussed. The petroleum contaminated soil at CFB Trenton, was evaluated to determine which bioremediation process or combination of processes would be most effective. The following processes were considered: (1) white hot fungus, (2) Daramend proprietary process, (3) composting, (4) bioquest proprietary bioremediation processes, (5) Hobbs and Millar proprietary bioremediation process, and (6) farming. A brief summary of each of these options was included. The project was also used as an opportunity to train Latvian and Ukrainian specialists in Canadian field techniques and laboratory analyses. Preliminary data indicated that bioremediation is a viable method for treatment of contaminated soil. 18 refs., 3 figs

  11. Languages for Software-Defined Networks

    Science.gov (United States)

    2013-02-01

    switches, firewalls, and middleboxes) with closed and proprietary configuration inter- faces. Software - Defined Networks ( SDN ) are poised to change...how- ever, have seen growing interest in software - defined networks ( SDNs ), in which a logically-centralized controller manages the packet-processing...switches, firewalls, and middleboxes) with closed and proprietary configuration interfaces. Software - Defined Networks ( SDN ) are poised to change this

  12. Characteristics and Application Analysis of Traditional Chinese Medicine Containing Sophora Japonica

    Science.gov (United States)

    Wei, Zhenzhen; Feng, Suxiang; Fang, Xiaoyan; Miao, Mingsan

    2018-01-01

    Purposes: To sum up the characteristics of Chinese medicine with Sophora Japonica and provide reference for the research, development and utilization of the Chinese medicine of Sophora japonica in the future. Methods: The author sums up the forms, functions, indications, usage, dosage and contraindications of the proprietary Chinese medicine containing Sophora Japonica in the Chinese Pharmacopoeia and the Ministerial standards. In addition, we will inquire about the clinical application of proprietary Chinese medicine containing Sophora japonica in the China National Knowledge Infrastructure (CNKI). Results: The proprietary Chinese medicine containing Sophora Japonica was widely used in the treatment of various diseases in clinic, but it was taken orally and without any external use of Chinese patent medicine. Moreover, in most of the proprietary Chinese medicine, Sophora japonica was used as a supplement; In addition, the causes of adverse reactions were not analyzed, and the safety of the drugs needed to be further analyzed. Conclusions: To make clear the role of Sophora japonica in proprietary Chinese medicine, we can develop the Chinese medicine new dosage forms of Sophora japonica; The Chinese medicine is made up of a variety of single herbs, some are toxic drugs, when an adverse reaction occurs, We should analyze the specific causes and avoid the occurrence of adverse reactions. In addition, Sophora japonica is a traditional herbal medicine and food in China; we can expand the application in other areas and explore the pharmacological and toxicological pathology.

  13. The EnzymeTracker: an open-source laboratory information management system for sample tracking.

    Science.gov (United States)

    Triplet, Thomas; Butler, Gregory

    2012-01-26

    In many laboratories, researchers store experimental data on their own workstation using spreadsheets. However, this approach poses a number of problems, ranging from sharing issues to inefficient data-mining. Standard spreadsheets are also error-prone, as data do not undergo any validation process. To overcome spreadsheets inherent limitations, a number of proprietary systems have been developed, which laboratories need to pay expensive license fees for. Those costs are usually prohibitive for most laboratories and prevent scientists from benefiting from more sophisticated data management systems. In this paper, we propose the EnzymeTracker, a web-based laboratory information management system for sample tracking, as an open-source and flexible alternative that aims at facilitating entry, mining and sharing of experimental biological data. The EnzymeTracker features online spreadsheets and tools for monitoring numerous experiments conducted by several collaborators to identify and characterize samples. It also provides libraries of shared data such as protocols, and administration tools for data access control using OpenID and user/team management. Our system relies on a database management system for efficient data indexing and management and a user-friendly AJAX interface that can be accessed over the Internet. The EnzymeTracker facilitates data entry by dynamically suggesting entries and providing smart data-mining tools to effectively retrieve data. Our system features a number of tools to visualize and annotate experimental data, and export highly customizable reports. It also supports QR matrix barcoding to facilitate sample tracking. The EnzymeTracker was designed to be easy to use and offers many benefits over spreadsheets, thus presenting the characteristics required to facilitate acceptance by the scientific community. It has been successfully used for 20 months on a daily basis by over 50 scientists. The EnzymeTracker is freely available online at http

  14. Low-cost RFID-based palm oil monitoring system (PMS): First prototype

    International Nuclear Information System (INIS)

    Kiama, J W; Patrick, T H H; Raman, V

    2014-01-01

    Under collaboration with our local oil palm plantation enterprise, our research focuses on producing proof-of-concept by using RFID technology to monitor palm oil productivity. Passive RFID tags are used in the plantation field to uniquely identify each palm oil tree and their Fresh Fruit Bunches (FFB) production is collected and monitored by scanning the passive RFID tags using high frequency RFID scanners. This technology aims to convert the harvest data into digital information which can be processed and analyzed by PMS system and presented as informative outputs such as dynamic charts. This analyzed information is further used as input to a proprietary GIS system where it is mapped as color-coded spatial data which enables an accurate evaluation and monitoring of the overall plantation productivity

  15. Inform@ed space

    DEFF Research Database (Denmark)

    Bjerrum, Peter; Olsen, Kasper Nefer

    2001-01-01

    Inform@ed space Sensorial Perception And Computer Enchancement - bidrag til Nordisk Arkitekturforskningsforenings IT-konference, AAA april 2001.......Inform@ed space Sensorial Perception And Computer Enchancement - bidrag til Nordisk Arkitekturforskningsforenings IT-konference, AAA april 2001....

  16. A Dyadic Perspective on Determinants of Entry Choices in the Global Hospitality Industry

    Directory of Open Access Journals (Sweden)

    Yang Kun

    2017-12-01

    Full Text Available This paper discusses the firm-level determinants of international hotels’ foreign markets entry choices, contrasting acquisition with management and franchise contracts, based on a resource-dependency perspective and appropriability theory. It points out that brand equity, relatedness of products and market segmentation, partner-specific knowledge of hotels, international experience, and the duration of proprietary knowledge impact hotels’ decisions on how to enter a foreign market. In addition, the paper suggests the existence of entry choices sequence favorable to acquisition probability after the end of management contract when the franchisors’ or management companies’ proprietary knowledge attenuates. Contract activity is likely to be renewed after the acquisition, once the management company has established a new form or a higher level of proprietary knowledge.

  17. Project risk definition and measurement in a not-for-profit setting.

    Science.gov (United States)

    Gapenski, L C

    1992-11-01

    The health care finance literature on capital investment decisions generally applies conventional market risk concepts without distinguishing between proprietary and not-for-profit forms of organization. Since proprietary firms have shareholder wealth maximization as their primary goal, a project's relevant risk is its contribution to the riskiness of the equity investors' well diversified stock portfolios, or its market risk. However, not-for-profit organizations do not have shareholder wealth maximization as their primary goal, and thus market risk concepts are not applicable. Rather, the relevant risk in a not-for-profit setting is a project's corporate risk; that is, the project's contribution to the riskiness of the organization. The difference in risk definition and measurement between proprietary and not-for-profit firms has two implications for managerial decisions: (1) in making capital investment decisions, a manager must define and measure a project's riskiness on the basis of the firm's organizational form; and (2) although diversification for the sole purpose of risk reduction is not a valid rationale for proprietary firms because stockholders can achieve the same result at less cost, risk-reducing diversification does make sense for not-for-profit firms.

  18. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  19. Develop improved battery charger (Turbo-Z Battery Charging System). Final report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-09-01

    The output of this project was a flexible control board. The control board can be used to control a variety of rapid battery chargers. The control module will reduce development cost of rapid battery charging hardware. In addition, PEPCO's proprietary battery charging software have been pre-programmed into the control microprocessor. This product is being applied to the proprietary capacitive charging system now under development.

  20. Iodometric determination of ampicillin in proprietary capsules | Ejele ...

    African Journals Online (AJOL)

    The concentration of ampicillin in ampicillin capsule preparations purchased in Owerri main market, Imo State of Nigeria, was determined using the iodometric titration method. The results showed that the ampicillin concentrations in the capsules contained between 250 and 260 mg/cap of ampicillin trihydrate. Statistical ...

  1. Assessment of microbial profile of selected proprietary broiler ...

    African Journals Online (AJOL)

    Bacterial and fungal isolates recovered include Escherichia coli, Staphylococcus albus, Bacillus subtilis, Micrococcus spp, Pseudomonas spp, Aspergillus fumigatus, A. flavus, A. niger, Fusarium spp, Mucor spp, and Penicillium notatum. Total microbial counts were significantly different (P<0.05) among the selected feed ...

  2. Proprietary software versus Open Source Software for Education

    OpenAIRE

    N. Pankaja

    2013-01-01

    The Internet has brought learning "online" and offers many advantages. It is convenient, available at any time of the day, and can be accessed nearly anywhere in the world. Recently, Cloud computing is all the rage. E-Learning offers tremendous potential to increase the availability and convenience of education. Today, online content is varied and can include: text on a website, digital audio, digital video, animated images, and virtual reality environments. This content can be created in a v...

  3. Mine-induced seismicity at East-Rand proprietary mines

    CSIR Research Space (South Africa)

    Milev, AM

    1995-09-01

    Full Text Available Mining results in seismic activity of varying intensity, from small micro seismic events to larger seismic events, often associated with significant seismic induced damages. This work deals with the understanding of the present seismicity...

  4. Emollient treatment of atopic dermatitis: latest evidence and clinical considerations

    Directory of Open Access Journals (Sweden)

    Kam Lun Hon

    2018-04-01

    Full Text Available Aim: To review current classes of emollients in the market, their clinical efficacy in atopic dermatitis (AD and considerations for choice of an emollient. Methods: PubMed Clinical Queries under Clinical Study Categories (with Category limited to Therapy and Scope limited to Narrow and Systematic Reviews were used as the search engine. Keywords of ‘emollient or moisturizer’ and ‘atopic dermatitis’ were used. Overview of findings: Using the keywords of ‘emollient’ and ‘atopic dermatitis’, there were 105 and 36 hits under Clinical Study Categories (with Category limited to Therapy and Scope limited to Narrow and Systematic Reviews, respectively. Plant-derived products, animal products and special ingredients were discussed. Selected proprietary products were tabulated. Conclusions: A number of proprietary emollients have undergone trials with clinical data available on PubMed-indexed journals. Most moisturizers showed some beneficial effects, but there was generally no evidence that one moisturizer is superior to another. Choosing an appropriate emollient for AD patients would improve acceptability and adherence for emollient treatment. Physician’s recommendation is the primary consideration for patients when selecting a moisturizer/ emollient; therefore, doctors should provide evidence-based information about these emollients.

  5. PhyloGeoViz: a web-based program that visualizes genetic data on maps.

    Science.gov (United States)

    Tsai, Yi-Hsin E

    2011-05-01

    The first step of many population genetic studies is the simple visualization of allele frequencies on a landscape. This basic data exploration can be challenging without proprietary software, and the manual plotting of data is cumbersome and unfeasible at large sample sizes. I present an open source, web-based program that plots any kind of frequency or count data as pie charts in Google Maps (Google Inc., Mountain View, CA). Pie polygons are then exportable to Google Earth (Google Inc.), a free Geographic Information Systems platform. Import of genetic data into Google Earth allows phylogeographers access to a wealth of spatial information layers integral to forming hypotheses and understanding patterns in the data. © 2010 Blackwell Publishing Ltd.

  6. Asymmetric GT of social networks

    Science.gov (United States)

    Szu, Harold

    2010-04-01

    Web citation indexes are computed according to a data vector X collected from the frequency of user accesses, citations weighted by other sites' popularities, and modified by the financial sponsorship in a proprietary manner. The indexing determining the information to be retrieved by the public should be made responsible transparently in at least two ways. One shall balance the inbound linkages pointed at the specific i-th site called the popularity (see paper for equation) with the outbound linkages (see paper for equation) called the risk factor before the release of new information as environmental impact analysis. The relationship between these two factors cannot be assumed equivalent (undirected) as in the case of many mainstream Graph Theory (GT) models.

  7. Cooperative endeavors: A case study of success

    Energy Technology Data Exchange (ETDEWEB)

    Baker, J. [Ford Motor Co., Dearborn, MI (United States)

    1997-12-31

    Partnerships and cooperative agreements abound in the environmental arena today. This paper briefly highlights the collaborative approach used by the International Cooperative for Ozone Layer Protection (ICOLP). ICOLP has helped international members and non-members to eliminate most of the ozone-depleting solvents from manufacturing processes through the exchange of technical information in a non-proprietary manner. By using alternatives, companies and governments have realized savings in the multiple millions of dollars. Advantages of participating in cooperative environmental partnerships may include: (1) improved access and exchange of information, (2) cost minimization, (3) promotion and facilitation of business opportunities, (4) improved dialogue between groups, (5) coordinated approach to complex issues, and (6) technology development and transfer opportunities.

  8. Business administration as a basis for development of global entrepreneurship

    OpenAIRE

    Ermakova, N. Y.; Fokina, Olga V.; Tyufiakova, Ekaterina S.; Rogacheva, Irina S.; Tyurina, Yulia

    2016-01-01

    The purpose of the article is to determine the role and meaning of business administration in development of global entrepreneurship. The work uses the proprietary methodology of evaluation of global competitiveness of enterprise and the proprietary methodology of evaluation of efficiency of business administration of enterprise, as well as method of correlation analysis. The authors determine the role of business administration in management of factors of development of global enterprise and...

  9. Development and challenges of using web-based GIS for health applications

    DEFF Research Database (Denmark)

    Gao, Sheng; Mioc, Darka; Boley, Harold

    2011-01-01

    Web-based GIS is increasingly used in health applications. It has the potential to provide critical information in a timely manner, support health care policy development, and educate decision makers and the general public. This paper describes the trends and recent development of health...... applications using a Web-based GIS. Recent progress on the database storage and geospatial Web Services has advanced the use of Web-based GIS for health applications, with various proprietary software, open source software, and Application Programming Interfaces (APIs) available. Current challenges in applying...... care planning, and public health participation....

  10. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  11. Neutron yield of medical electron accelerators

    International Nuclear Information System (INIS)

    McCall, R.C.

    1988-01-01

    Shielding calculations for medical electron accelerators above about 10 MeV require some knowledge of the neutron emission from the machine. This knowledge might come from the manufacturer's specifications or from published measurements of the neutron leakage of that particular model and energy of accelerator. In principle, the yield can be calculated if details of the accelerator design are known. These details are often not available because the manufacturer considers them proprietary. A broader knowledge of neutron emission would be useful and it is the purpose of this paper to present such information

  12. INFOMAT: The international materials assessment and application centre's internet gateway

    Science.gov (United States)

    Branquinho, Carmen Lucia; Colodete, Leandro Tavares

    2004-08-01

    INFOMAT is an electronic directory structured to facilitate the search and retrieval of materials science and technology information sources. Linked to the homepage of the International Materials Assessment and Application Centre, INFOMAT presents descriptions of 392 proprietary databases with links to their host systems as well as direct links to over 180 public domain databases and over 2,400 web sites. Among the web sites are associations/unions, governmental and non-governmental institutions, industries, library holdings, market statistics, news services, on-line publications, standardization and intellectual property organizations, and universities/research groups.

  13. The effect of specialization on operational performance

    DEFF Research Database (Denmark)

    Halkjær, Søren; Lueg, Rainer

    2017-01-01

    -methods approach that includes proprietary data from the management control system of the hospital, public documentation on the policy change, as well as interviews with key informants. These data suggest that operational deficiency is related to the fact that specialization was externally enforced through......Purpose - The purpose of this paper is to analyze how specialization in hospitals affects operational performance, measured by the length of stay and readmission rate. The authors assess a public policy change in the Danish healthcare sector from 2011 which required that some hospital services had...

  14. E2eUberIM

    DEFF Research Database (Denmark)

    Wac, Katarzyna; Cummings, Mark; Dey, Jayanta

    2016-01-01

    , high-quality services, we propose an innovative end-to-end service management framework called e2eUberIM. This framework contains a scalable, flexible, and volatile information model (UberIM) and a real-time, "organic" communication and storage process (e2eUber). It leverages the proprietary interfaces...... of different vendors, enabling the resulting enhanced operations system environment to automatically and in real-time optimize operational overhead while maximizing the user experience, and quickly field new innovative, composed "any-services" (XaaS). We document the e2eUberIM requirements and its design...

  15. Auditing Social Media A Governance and Risk Guide

    CERN Document Server

    MOAC

    2011-01-01

    This book provides auditors and risk managers with a primer on social media.  It discusses what social media is, how it is being used as a tool within corporations, and how it should be monitored.  In addition, it discusses the various risks involved with the use of social media (e.g., reputation/brand risk; compliance risks; proprietary information risks; employee privacy risks; and vendor risks).    It also discusses compliance with Federal Trade Commission guidelines (e.g., education and disclosure requirements as well as audit and record keeping requirements). 

  16. Information and Informality

    DEFF Research Database (Denmark)

    Larsson, Magnus; Segerstéen, Solveig; Svensson, Cathrin

    2011-01-01

    leaders on the basis of their possession of reliable knowledge in technical as well as organizational domains. The informal leaders engaged in interpretation and brokering of information and knowledge, as well as in mediating strategic values and priorities on both formal and informal arenas. Informal...... leaders were thus seen to function on the level of the organization as a whole, and in cooperation with formal leaders. Drawing on existing theory of leadership in creative and professional contexts, this cooperation can be specified to concern task structuring. The informal leaders in our study...... contributed to task structuring through sensemaking activities, while formal leaders focused on aspects such as clarifying output expectations, providing feedback, project structure, and diversity....

  17. Application of Toxic Chinese Medicine in Chinese Pharmacopoeia

    Science.gov (United States)

    Zhao, Hui; Feng, Yu; Mao, Mingsan

    2018-01-01

    Objective: Explore the application characteristics of proprietary Chinese medicine prescriptions containing toxic herbs in pharmacopoeia. Methods: In this paper, according to the clinical application of pharmacopoeia proprietary Chinese medicine is divided into table agent, Qushu agent, diarrhea agent, heat agent, Wen Li agent, cough and asthma agents, resuscitation agent, Gutian agent, Fuzheng agent, Anshen agent, hemostatic agent, The traditional Chinese medicine prescription and the clinical application of the Chinese herbal medicine containing the toxic Chinese medicine were analyzed and sorted out., Summed up the compatibility of toxic herbs and application characteristics. Results: Toxic Chinese herbal medicine in the cure of traditional Chinese medicine to play a long-standing role, through the overall thinking, dialectical thinking, and thinking of toxic Chinese medicine in the analysis of Chinese medicine that [2], toxic Chinese medicine in the application of proprietary Chinese medicine can not lack. Conclusion: Pharmacopoeia included proprietary Chinese medicine not only in the clinical treatment of good, but also the application of its toxic traditional Chinese medicine and its understanding of the enrichment of the toxic characteristics of traditional Chinese medicine and treatment-related disease pathology between the points of contact for patients with clinical applications Based on and theoretical guidance of Chinese medicine [3].

  18. Academic medical centers as innovation ecosystems to address population -omics challenges in precision medicine.

    Science.gov (United States)

    Silva, Patrick J; Schaibley, Valerie M; Ramos, Kenneth S

    2018-02-15

    While the promise of the Human Genome Project provided significant insights into the structure of the human genome, the complexities of disease at the individual level have made it difficult to utilize -omic information in clinical decision making. Some of the existing constraints have been minimized by technological advancements that have reduced the cost of sequencing to a rate far in excess of Moore's Law (a halving in cost per unit output every 18 months). The reduction in sequencing costs has made it economically feasible to create large data commons capturing the diversity of disease across populations. Until recently, these data have primarily been consumed in clinical research, but now increasingly being considered in clinical decision- making. Such advances are disrupting common diagnostic business models around which academic medical centers (AMCs) and molecular diagnostic companies have collaborated over the last decade. Proprietary biomarkers and patents on proprietary diagnostic content are no longer driving biomarker collaborations between industry and AMCs. Increasingly the scope of the data commons and biorepositories that AMCs can assemble through a nexus of academic and pharma collaborations is driving a virtuous cycle of precision medicine capabilities that make an AMC relevant and highly competitive. A rebalancing of proprietary strategies and open innovation strategies is warranted to enable institutional precision medicine asset portfolios. The scope of the AMC's clinical trial and research collaboration portfolios with industry are increasingly dependent on the currency of data, and less on patents. Intrapeneurial support of internal service offerings, clinical trials and clinical laboratory services for example, will be important new points of emphasis at the academic-industry interface. Streamlining these new models of industry collaboration for AMCs are a new area for technology transfer offices to offer partnerships and to add value

  19. Beyond information retrieval: information discovery and multimedia information retrieval

    OpenAIRE

    Roberto Raieli

    2017-01-01

    The paper compares the current methodologies for search and discovery of information and information resources: terminological search and term-based language, own of information retrieval (IR); semantic search and information discovery, being developed mainly through the language of linked data; semiotic search and content-based language, experienced by multimedia information retrieval (MIR).MIR semiotic methodology is, then, detailed.

  20. Systems and Methods for Decoy Routing and Convert Channel Bonding

    Science.gov (United States)

    2013-11-26

    34 Proc. R. Soc. A, vol. 463, Jan. 12, 2007, pp. 1-16. " Stupid censorship Web Proxy," http://www.stupidcensorship.com/, retrieved from the internet on...services such as those offered by Google or Skype, web or microblogs such as Twitter, various social media services such as Face- book, and file...device (e.g., Skype, Google , Jabber, Firefox) to be directed to the proprietary software for processing. For instance, the proprietary software of

  1. Improving Software Sustainability: Lessons Learned from Profiles in Science.

    Science.gov (United States)

    Gallagher, Marie E

    2013-01-01

    The Profiles in Science® digital library features digitized surrogates of historical items selected from the archival collections of the U.S. National Library of Medicine as well as collaborating institutions. In addition, it contains a database of descriptive, technical and administrative metadata. It also contains various software components that allow creation of the metadata, management of the digital items, and access to the items and metadata through the Profiles in Science Web site [1]. The choices made building the digital library were designed to maximize the sustainability and long-term survival of all of the components of the digital library [2]. For example, selecting standard and open digital file formats rather than proprietary formats increases the sustainability of the digital files [3]. Correspondingly, using non-proprietary software may improve the sustainability of the software--either through in-house expertise or through the open source community. Limiting our digital library software exclusively to open source software or to software developed in-house has not been feasible. For example, we have used proprietary operating systems, scanning software, a search engine, and office productivity software. We did this when either lack of essential capabilities or the cost-benefit trade-off favored using proprietary software. We also did so knowing that in the future we would need to replace or upgrade some of our proprietary software, analogous to migrating from an obsolete digital file format to a new format as the technological landscape changes. Since our digital library's start in 1998, all of its software has been upgraded or replaced, but the digitized items have not yet required migration to other formats. Technological changes that compelled us to replace proprietary software included the cost of product licensing, product support, incompatibility with other software, prohibited use due to evolving security policies, and product abandonment

  2. Corrosion inhibitors for carbon steel surfaces in contact with fresh water

    International Nuclear Information System (INIS)

    Abubacker, K.M.; Mehta, C.T.; Pillai, B.P.

    1985-01-01

    Technical evaluation of indigenously available proprietary formulations as well as some non-proprietary chemicals such as phosphates, silicates, borax, benzoic acid, amines, amino-methylene phosphonates etc. have been carried out, with a view, to find the best combination for use in cooling water systems of the Heavy Water Projects of the Department of Atomic Energy. Material compatibility experiments were carried out through laboratory experiments as well as small 10 litre capacity test assembly simulating plant conditions. (author)

  3. Information and information flow an introduction

    CERN Document Server

    Bremer, Manuel

    2004-01-01

    This book is conceived as an introductory text into the theory of syntactic and semantic information, and information flow. Syntactic information theory is concerned with the information contained in the very fact that some signal has a non-random structure. Semantic information theory is concerned with the meaning or information content of messages and the like. The theory of information flow is concerned with deriving some piece of information from another. The main part will take us to situation semantics as a foundation of modern approaches in information theory. We give a brief overview o

  4. Review of Maintenance and Repair Times for Components in Technological Facilities

    Energy Technology Data Exchange (ETDEWEB)

    L. C. Cadwallader

    2012-11-01

    This report is a compilation of some unique component repair time data and it also presents citations of more extensive reports where lists of repair times can be found. This collection of information should support analysts who seek to quantify maintainability and availability of high technology and nuclear energy production systems. While there are newer sources of repair time information, most, if not all, of the newer sources are proprietary and cannot be shared. This report offers data that, while older, is openly accessible and can serve as reasonable estimates of repair times, at least for initial studies. Some times were found for maintenance times in radiation environments, and some guidance for multiplicative factors to use to account for work in contamination areas.

  5. The use of process information for verification of inventory in solvent extraction contactors in near-real-time accounting for reprocessing plants

    International Nuclear Information System (INIS)

    Hakkila, E.A.; Barnes, J.W.; Hafer, J.F.

    1988-01-01

    Near-real-time accounting is being studied as a technique for improving the timeliness of accounting in nuclear fuel reprocessing plants. A major criticism of near-real-time accounting is perceived disclosure of proprietary data for IAEA verification, particularly in verifying the inventory of solvent extraction contractors. This study indicates that the contribution of uncertainties in estimating the inventory of pulsed columns or mixer settlers may be insignificant compared to uncertainties in measured throughput and measurable inventory for most reprocessing plants, and verification may not be a serious problem. Verification can become a problem for plants with low throughput and low inventory in tasks if contactor inventory variations or uncertainties are greater than --25%. Each plant must be evaluated with respect to its specific inventory and throughput characteristics

  6. Does educational intervention improve doctors’ knowledge and perceptions of generic medicines and their generic prescribing rate? A study from Malaysia

    Science.gov (United States)

    Wong, Zhi Yen; Alrasheedy, Alian A.; Saleem, Fahad; Mohamad Yahaya, Abdul Haniff; Aljadhey, Hisham

    2014-01-01

    Objectives: To investigate the impact of an educational intervention on doctors’ knowledge and perceptions towards generic medicines and their generic (international non-proprietary name) prescribing practice. Methods: This is a single-cohort pre-/post-intervention pilot study. The study was conducted in a tertiary care hospital in Perak, Malaysia. All doctors from the internal medicine department were invited to participate in the educational intervention. The intervention consisted of an interactive lecture, an educational booklet and a drug list. Doctors’ knowledge and perceptions were assessed by using a validated questionnaire, while the international non-proprietary name prescribing practice was assessed by screening the prescription before and after the intervention. Results: The intervention was effective in improving doctors’ knowledge towards bioequivalence, similarity of generic medicines and safety standards required for generic medicine registration (p = 0.034, p = 0.034 and p = 0.022, respectively). In terms of perceptions towards generic medicines, no significant changes were noted (p > 0.05). Similarly, no impact on international non-proprietary name prescribing practice was observed after the intervention (p > 0.05). Conclusion: Doctors had inadequate knowledge and misconceptions about generic medicines before the intervention. Moreover, international non-proprietary name prescribing was not a common practice. However, the educational intervention was only effective in improving doctors’ knowledge of generic medicines. PMID:26770747

  7. Metadata-Driven SOA-Based Application for Facilitation of Real-Time Data Warehousing

    Science.gov (United States)

    Pintar, Damir; Vranić, Mihaela; Skočir, Zoran

    Service-oriented architecture (SOA) has already been widely recognized as an effective paradigm for achieving integration of diverse information systems. SOA-based applications can cross boundaries of platforms, operation systems and proprietary data standards, commonly through the usage of Web Services technology. On the other side, metadata is also commonly referred to as a potential integration tool given the fact that standardized metadata objects can provide useful information about specifics of unknown information systems with which one has interest in communicating with, using an approach commonly called "model-based integration". This paper presents the result of research regarding possible synergy between those two integration facilitators. This is accomplished with a vertical example of a metadata-driven SOA-based business process that provides ETL (Extraction, Transformation and Loading) and metadata services to a data warehousing system in need of a real-time ETL support.

  8. The EnzymeTracker: an open-source laboratory information management system for sample tracking

    Directory of Open Access Journals (Sweden)

    Triplet Thomas

    2012-01-01

    Full Text Available Abstract Background In many laboratories, researchers store experimental data on their own workstation using spreadsheets. However, this approach poses a number of problems, ranging from sharing issues to inefficient data-mining. Standard spreadsheets are also error-prone, as data do not undergo any validation process. To overcome spreadsheets inherent limitations, a number of proprietary systems have been developed, which laboratories need to pay expensive license fees for. Those costs are usually prohibitive for most laboratories and prevent scientists from benefiting from more sophisticated data management systems. Results In this paper, we propose the EnzymeTracker, a web-based laboratory information management system for sample tracking, as an open-source and flexible alternative that aims at facilitating entry, mining and sharing of experimental biological data. The EnzymeTracker features online spreadsheets and tools for monitoring numerous experiments conducted by several collaborators to identify and characterize samples. It also provides libraries of shared data such as protocols, and administration tools for data access control using OpenID and user/team management. Our system relies on a database management system for efficient data indexing and management and a user-friendly AJAX interface that can be accessed over the Internet. The EnzymeTracker facilitates data entry by dynamically suggesting entries and providing smart data-mining tools to effectively retrieve data. Our system features a number of tools to visualize and annotate experimental data, and export highly customizable reports. It also supports QR matrix barcoding to facilitate sample tracking. Conclusions The EnzymeTracker was designed to be easy to use and offers many benefits over spreadsheets, thus presenting the characteristics required to facilitate acceptance by the scientific community. It has been successfully used for 20 months on a daily basis by over 50

  9. Transparency in Canadian public drug advisory committees.

    Science.gov (United States)

    Rosenberg-Yunger, Zahava R S; Bayoumi, Ahmed M

    2014-11-01

    Transparency in health care resource allocation decisions is a criterion of a fair process. We used qualitative methods to explore transparency across 11 Canadian drug advisory committees. We developed seven criteria to assess transparency (disclosure of members' names, disclosure of membership selection criteria, disclosure of conflict of interest guidelines and members' conflicts, public posting of decisions not to fund drugs, public posting of rationales for decisions, stakeholder input, and presence of an appeals mechanism) and two sub-criteria for when rationales were posted (direct website link and readability). We interviewed a purposeful sample of key informants who were conversant in English and a current or past member of either a committee or a stakeholder group. We analyzed data using a thematic approach. Interviewing continued until saturation was reached. We examined documents from 10 committees and conducted 27 interviews. The median number of criteria addressed by committees was 2 (range 0-6). Major interview themes included addressing: (1) accessibility issues, including stakeholders' degree of access to the decision making process and appeal mechanisms; (2) communication issues, including improving internal and external communication and public access to information; and (3) confidentiality issues, including the use of proprietary evidence. Most committees have some mechanisms to address transparency but none had a fully transparent process. The most important ways to improve transparency include creating formal appeal mechanisms, improving communication, and establishing consistent rules about the use of, and public access to, proprietary evidence. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  10. High Efficiency and Low Cost Thermal Energy Storage System

    Energy Technology Data Exchange (ETDEWEB)

    Sienicki, James J. [Argonne National Lab. (ANL), Argonne, IL (United States). Nuclear Engineering Division; Lv, Qiuping [Argonne National Lab. (ANL), Argonne, IL (United States). Nuclear Engineering Division; Moisseytsev, Anton [Argonne National Lab. (ANL), Argonne, IL (United States). Nuclear Engineering Division; Bucknor, Matthew [Argonne National Lab. (ANL), Argonne, IL (United States). Nuclear Engineering Division

    2017-09-29

    BgtL, LLC (BgtL) is focused on developing and commercializing its proprietary compact technology for processes in the energy sector. One such application is a compact high efficiency Thermal Energy Storage (TES) system that utilizes the heat of fusion through phase change between solid and liquid to store and release energy at high temperatures and incorporate state-of-the-art insulation to minimize heat dissipation. BgtL’s TES system would greatly improve the economics of existing nuclear and coal-fired power plants by allowing the power plant to store energy when power prices are low and sell power into the grid when prices are high. Compared to existing battery storage technology, BgtL’s novel thermal energy storage solution can be significantly less costly to acquire and maintain, does not have any waste or environmental emissions, and does not deteriorate over time; it can keep constant efficiency and operates cleanly and safely. BgtL’s engineers are experienced in this field and are able to design and engineer such a system to a specific power plant’s requirements. BgtL also has a strong manufacturing partner to fabricate the system such that it qualifies for an ASME code stamp. BgtL’s vision is to be the leading provider of compact systems for various applications including energy storage. BgtL requests that all technical information about the TES designs be protected as proprietary information. To honor that request, only non-proprietay summaries are included in this report.

  11. Device- and service profiles for integrated or systems based on open standards

    Directory of Open Access Journals (Sweden)

    Mildner Alexander

    2015-09-01

    Full Text Available Integrated OR systems nowadays are closed and proprietary, so that the interconnection of components from third-party vendors is only possible with high time and cost effort. An integrated operating theatre with open interfaces, giving clinical operators the opportunity to choose individual medical devices from different manufacturers, is currently being developed in the framework of the BMBF (Federal Ministry of Education and Research funded project OR.NET [1]. Actual standards and concepts regarding technical feasibility and accreditation process do not cope with the requirements for modular integration based on an open standard. Therefore, strategies as well as service and device profiles to enable a procedure for risk management and certifiability are in the focus of the project work. Amongst others, a concept for User Interface Profiles (UI-Profiles has been conceived in order to describe medical device functions and the entire user interface regarding Human-Machine-Interaction (HMI characteristics with the aim to identify human-induced risks of central user interfaces. The use of standardized device and service profiles shall allow the manufacturers to integrate their medical devices in the OR.NET network, without disclosing the medical devices’ risk analysis and related confidential knowledge or proprietary information.

  12. Documentation of the DRI Model of the US economy, December 1993

    Energy Technology Data Exchange (ETDEWEB)

    1994-02-28

    The Energy Information Administration (EIA) uses models of the US economy developed by Data Resources, Inc. (DRI) for conducting policy analyses, preparing forecasts for the Annual Energy Outlook, the Short-Term Energy Outlook, and related analyses in conjunction with EIA`s National Energy Modeling System (NEMS) and its other energy market models. Both the DRI Model of the US Economy and the DRI Personal Computer Input-Output Model (PC-IO){sup 2} were developed and are maintained by DRI as proprietary models. This report provides documentation, as required by EIA standards for the use of proprietary models; describes the theoretical basis, structure and functions of both DRI models; and contains brief descriptions of the models and their equations. Appendix A describes how the two large-scale models documented here are used to support the macroeconomic and interindustry modeling associated with the National Energy Modeling System. Appendix B is an article by Stephen McNees of the Federal Reserve Bank of Boston on ``How Large are Economic Forecast Errors.`` This article assesses the forecast accuracy of a number of economic forecasting models (groups) and is attached as an independent assessment of the forecast accuracy of the DRI Model of the US Economy.

  13. BAID: The Barrow Area Information Database - an interactive web mapping portal and cyberinfrastructure for scientific activities in the vicinity of Barrow, Alaska

    Science.gov (United States)

    Cody, R. P.; Kassin, A.; Gaylord, A.; Brown, J.; Tweedie, C. E.

    2012-12-01

    The Barrow area of northern Alaska is one of the most intensely researched locations in the Arctic. The Barrow Area Information Database (BAID, www.baidims.org) is a cyberinfrastructure (CI) that details much of the historic and extant research undertaken within in the Barrow region in a suite of interactive web-based mapping and information portals (geobrowsers). The BAID user community and target audience for BAID is diverse and includes research scientists, science logisticians, land managers, educators, students, and the general public. BAID contains information on more than 9,600 Barrow area research sites that extend back to the 1940's and more than 640 remote sensing images and geospatial datasets. In a web-based setting, users can zoom, pan, query, measure distance, and save or print maps and query results. Data are described with metadata that meet Federal Geographic Data Committee standards and are archived at the University Corporation for Atmospheric Research Earth Observing Laboratory (EOL) where non-proprietary BAID data can be freely downloaded. BAID has been used to: Optimize research site choice; Reduce duplication of science effort; Discover complementary and potentially detrimental research activities in an area of scientific interest; Re-establish historical research sites for resampling efforts assessing change in ecosystem structure and function over time; Exchange knowledge across disciplines and generations; Facilitate communication between western science and traditional ecological knowledge; Provide local residents access to science data that facilitates adaptation to arctic change; (and) Educate the next generation of environmental and computer scientists. This poster describes key activities that will be undertaken over the next three years to provide BAID users with novel software tools to interact with a current and diverse selection of information and data about the Barrow area. Key activities include: 1. Collecting data on research

  14. Information Need and Information Seeking Behaviour

    OpenAIRE

    Nazan Özenç Uçak

    1997-01-01

    Information need is one of the cognitive needs of humankind. Information need causes information seeking behaviour and these concepts complement each other. Information need and information seeking behaviour are effected by many factors. It is necessary to know these factors in establishing the effective information centers and services.

  15. A Platform for Innovation and Standards Evaluation: a Case Study from the OpenMRS Open-Source Radiology Information System.

    Science.gov (United States)

    Gichoya, Judy W; Kohli, Marc; Ivange, Larry; Schmidt, Teri S; Purkayastha, Saptarshi

    2018-05-10

    Open-source development can provide a platform for innovation by seeking feedback from community members as well as providing tools and infrastructure to test new standards. Vendors of proprietary systems may delay adoption of new standards until there are sufficient incentives such as legal mandates or financial incentives to encourage/mandate adoption. Moreover, open-source systems in healthcare have been widely adopted in low- and middle-income countries and can be used to bridge gaps that exist in global health radiology. Since 2011, the authors, along with a community of open-source contributors, have worked on developing an open-source radiology information system (RIS) across two communities-OpenMRS and LibreHealth. The main purpose of the RIS is to implement core radiology workflows, on which others can build and test new radiology standards. This work has resulted in three major releases of the system, with current architectural changes driven by changing technology, development of new standards in health and imaging informatics, and changing user needs. At their core, both these communities are focused on building general-purpose EHR systems, but based on user contributions from the fringes, we have been able to create an innovative system that has been used by hospitals and clinics in four different countries. We provide an overview of the history of the LibreHealth RIS, the architecture of the system, overview of standards integration, describe challenges of developing an open-source product, and future directions. Our goal is to attract more participation and involvement to further develop the LibreHealth RIS into an Enterprise Imaging System that can be used in other clinical imaging including pathology and dermatology.

  16. Information Need and Information Seeking Behaviour

    Directory of Open Access Journals (Sweden)

    Nazan Özenç Uçak

    1997-12-01

    Full Text Available Information need is one of the cognitive needs of humankind. Information need causes information seeking behaviour and these concepts complement each other. Information need and information seeking behaviour are effected by many factors. It is necessary to know these factors in establishing the effective information centers and services.

  17. Information adaptation the interplay between Shannon information and semantic information in cognition

    CERN Document Server

    Haken, Hermann

    2015-01-01

    This monograph demonstrates the interplay between Shannon information and semantic information in cognition. It shows that Shannon’s information acts as driving force for the formation of semantic information; and vice versa, namely, that semantic information participates in the formation of Shannonian information. The authors show that in cognition, Shannonian and semantic information are interrelated as two aspects of a cognitive process termed as information adaptation. In the latter the mind/brain adapts to the environment by the deflating and/or inflating of the information conveyed by the environment. In the process of information adaptation, quantitative variations in Shannon’s information entail different meanings while different meanings affect the quantity of information. The book illustrates the above conceptually and mathematically by reference to three cognitive processes: pattern recognition, face learning and the recognition of a moving object.

  18. Nuclear Power Plant Construction Contracts: A Review of the Major Problems

    International Nuclear Information System (INIS)

    Crawford, B.B.

    1977-01-01

    This paper analyses the problems raised by nuclear power plant construction contracts. To the extent these contracts can be defined as devices for allocating responsibilities and risks between the Contracting Parties, the author notes that the 'responsibilities' aspect presents no problem peculiar to the nuclear sector and that difficulties mainly stem from co-ordination of work. On the other hand, the list of problems linked to 'nuclear contract risks' is long: uncertainties in the licensing procedure and export licenses, changes in pricing due to inflation, imprevision and force majeure theories, protection of proprietary information, operator's civil liability for nuclear incidents. (NEA) [fr

  19. Agricultural genetics goes to court.

    Science.gov (United States)

    Fox, Jeffrey L; Norman, Colin

    1983-09-30

    A coalition of environmental groups headed by activist Jeremy Rifkin has filed lawsuits to halt experiments that would release genetically engineered organisms into the environment. One suit, filed against the National Institutes of Health on 14 September 1983, would block tests by researchers at the University of California, Berkeley. A second suit, filed 16 September 1983 against Cetus Madison and BioTechnica, seeks to halt field tests that had been approved by NIH's Recombinant DNA Advisory Committee. At issue are NIH's role in evaluating the risks of genetic experimentation, and the public's right of access to proprietary information.

  20. Implications of WWW technologies for exchanging medical records

    Directory of Open Access Journals (Sweden)

    Maurice Dixon

    1999-09-01

    Full Text Available This article addresses some of the implications for medical record exchange of very recent developments in technology and tools that support the World Wide Web. It argues that XML (Extensible Mark-up Language is a very good enabling technology for medical record exchange. XML provides a much cheaper way of executing the exchange of medical information that circumvents the need for proprietary software. Use of XML can also simplify solutions to the problems associated with coping with the evolution of medical systems in time. However XML on its own does not resolve all the semantic heterogeneities.

  1. Open Source and Proprietary Project Management Tools for SMEs.

    OpenAIRE

    Veronika Abramova; Francisco Pires; Jorge Bernardino

    2017-01-01

    The dimensional growth and increasing difficulty in project management promoted the development of different tools that serve to facilitate project management and track project schedule, resources and overall progress. These tools offer a variety of features, from task and time management, up to integrated CRM (Customer Relationship Management) and ERP (Enterprise Resource Planning) modules. Currently, a large number of project management software is available, to assist project team during t...

  2. The proprietary hospital industry: a financial analysis 1972-1982.

    Science.gov (United States)

    Michel, A; Shaked, I; Daley, J

    1985-01-01

    This paper evaluates the performance of both specific firms within the American for-profit hospital industry and the industry as a whole. First, traditional financial analysis is used to evaluate individual publicly traded for-profit chains. Then, industry performance from 1973 to 1982 is evaluated using a set of measures based on Modern Portfolio Theory. The traditional financial analysis indicates that the industry seems increasingly profitable as well as increasingly healthy from the perspective of utilizing its assets and reducing its collection period. However, the industry's rapid growth rate has strained its ability to use additional debt funding and has created a potentially dangerous liquidity position. Measures based on Modern Portfolio Theory indicate that the average return of the industry has improved over the past 5 years. However, its risk has also increased. Nevertheless, the increase in risk is more than offset by the increased average return. In addition, recent legislation designed 'to reward the efficient' has introduced a significant degree of uncertainty into the industry's performance for the coming years. Thus, hospitals' ability to maintain the substantial profitability and rate of growth they have experienced over the past decade will depend on how well they will adapt to the changing environment.

  3. 34 CFR 600.5 - Proprietary institution of higher education.

    Science.gov (United States)

    2010-07-01

    ... of compulsory school attendance in the State in which the institution is physically located; (4) Is... temporarily closed due to a natural disaster that directly affected the institution or the institution's... program it provided during that 24-month period because of new technology or the requirements of other...

  4. Teaching web application development: Microsoft proprietary or open systems?

    Directory of Open Access Journals (Sweden)

    Stephen Corich

    Full Text Available This paper revisits the debate concerning which development environment should be used to teach server-side Web Application Development courses to undergraduate students. In 2002, following an industry-based survey of Web developers, a decision was made to adopt an open source platform consisting of PHP and MySQL rather than a Microsoft platform utilising Access and Active Server Pages. Since that date there have been a number of significant changes within the computing industry that suggest that perhaps it is appropriate to revisit the original decision. This paper investigates expert opinion by reviewing current literature regarding web development environments, it looks at the results of a survey of web development companies and it examines the current employment trends in the web development area. The paper concludes by examining the impact of making a decision to change the development environment used to teach Web Application Development to a third year computing degree class and describes the impact on course delivery that the change has brought about.

  5. Information,Informal finance,and SME financing

    Institute of Scientific and Technical Information of China (English)

    LIN Justin Yifu; SUN Xifang

    2006-01-01

    Informal finance exists extensively and has been playing an important role in small-and medium-sized enterprise (SME) financing in developing economies,This paper tries to rationalize the extensiveness of informal finance.SME financing suffers more serious information asymmetry to the extent that most SMEs are more opaque and can only provide less collateral.Informal lenders have an advantage over formal financial institutions in collecting "soft information" about SME borrowers.This paper establishes a model including formal and informal lenders and high-and low-risk borrowers with or without sufficient collateral and shows that the credit market in which informal finance is eliminated will allocate funds in some inefficient way,and the efficiency of allocating credit funds can be improved once informal finance is allowed to coexist with formal finance.

  6. Informed consent: information or knowledge?

    Science.gov (United States)

    Berger, Ken

    2003-01-01

    A fiduciary relationship should be nurtured between patient and physician. This requires effective communication throughout all aspects of care - especially pertaining to treatment decisions. In the context of illness as experienced by the patient a unique set of circumstances is presented. However, communication in an illness context is fraught with problems. The patient is vulnerable and the situation may be overwhelming. Voluminous amounts of information are available to patients from a host of health care providers, family members, support groups, advocacy centers, books, journals, and the internet. Often conflicting and confusion, frequently complex, this information may be of greater burden than benefit. Some information is of high validity and reliability while other information is of dubious reliability. The emotional freight of bad news may further inhibit understanding. An overload of information may pose an obstacle in decision-making. To facilitate the transformation of information into knowledge, the health care provider must act on some occasions as a filter, on other occasions as a conduit, and on still other occasions simply as a reservoir. The evolution of patient rights to receive or refuse treatment, the right to know or not to know calls for a change in processing of overwhelming information in our modem era. In this paper we will discuss the difference between information and knowledge. How can health care providers ensure they have given their patients all necessary and sufficient information to make an autonomous decision? How can they facilitate the transformation of information into knowledge? The effect of knowledge to consent allows a more focused, relevant and modern approach to choice in health care.

  7. Information management - Assessing the demand for information

    Science.gov (United States)

    Rogers, William H.

    1991-01-01

    Information demand is defined in terms of both information content (what information) and form (when, how, and where it is needed). Providing the information richness required for flight crews to be informed without overwhelming their information processing capabilities will require a great deal of automated intelligence. It is seen that the essence of this intelligence is comprehending and capturing the demand for information.

  8. AirNow Information Management System - Global Earth Observation System of Systems Data Processor for Real-Time Air Quality Data Products

    Science.gov (United States)

    Haderman, M.; Dye, T. S.; White, J. E.; Dickerson, P.; Pasch, A. N.; Miller, D. S.; Chan, A. C.

    2012-12-01

    Built upon the success of the U.S. Environmental Protection Agency's (EPA) AirNow program (www.AirNow.gov), the AirNow-International (AirNow-I) system contains an enhanced suite of software programs that process and quality control real-time air quality and environmental data and distribute customized maps, files, and data feeds. The goals of the AirNow-I program are similar to those of the successful U.S. program and include fostering the exchange of environmental data; making advances in air quality knowledge and applications; and building a community of people, organizations, and decision makers in environmental management. In 2010, Shanghai became the first city in China to run this state-of-the-art air quality data management and notification system. AirNow-I consists of a suite of modules (software programs and schedulers) centered on a database. One such module is the Information Management System (IMS), which can automatically produce maps and other data products through the use of GIS software to provide the most current air quality information to the public. Developed with Global Earth Observation System of Systems (GEOSS) interoperability in mind, IMS is based on non-proprietary standards, with preference to formal international standards. The system depends on data and information providers accepting and implementing a set of interoperability arrangements, including technical specifications for collecting, processing, storing, and disseminating shared data, metadata, and products. In particular, the specifications include standards for service-oriented architecture and web-based interfaces, such as a web mapping service (WMS), web coverage service (WCS), web feature service (WFS), sensor web services, and Really Simple Syndication (RSS) feeds. IMS is flexible, open, redundant, and modular. It also allows the merging of data grids to create complex grids that show comprehensive air quality conditions. For example, the AirNow Satellite Data Processor

  9. An Organizational Perspective on Free and Open Source Software Development

    DEFF Research Database (Denmark)

    Vujovic, Sladjana; Ulhøi, John Parm

    2006-01-01

    The traditional model of innovation, the restricted/close source (R/CS) model, is based on proprietary knowledge and private model of production. A fundamental different one, the open source model is based on non-proprietary knowledge and non-economic motives. Moreover, between the two......, there are various combinations or hybrids, in the following referred to as free/open source-based (F/OS-based) agency. In the discussions, practical examples from software production are included. In conclusion, the paper identifies avenues for future research as well as important managerial and policy implications....

  10. The role of on-line communication in open source software development

    DEFF Research Database (Denmark)

    Vujovic, S.; Ulhøi, John Parm

    2004-01-01

    allow parallel development and dynamic online exchanges during the overall innovation process. In conceptualizing online computer-based innovation process in the form of Open Source Software, the paper will borrow from theory on networks and communities of practice, which take into account social...... the innovation itself and upstream in the value chain to identifying new supporting services. In closing the paper addresses motivations of companies to integrate this alternative and non-proprietary way of product development into their proprietary business model. We do this by presenting an example....

  11. Information asymmetries, information externalities, oil companies strategies and oil exploration information efficiency

    International Nuclear Information System (INIS)

    Nyouki, E.

    1998-07-01

    Both for economics (in general) and energy economics matters, it is important to reach oil exploration efficiency. To achieve this aim, a pragmatic approach is to use the concept of information efficiency which means that the different tracts have to be drilled in the decreasing order of estimated profitabilities, estimations being made on the basis of the best (in the sense of reliability) available information. What does 'best available information' mean? It corresponds either to the information held by the most experienced oil companies (due to the existence of information asymmetries to the profit of these companies), or to information revealed by the drilling and which allows to revise probabilities of success on neighboring tracts with similar geological features (due to the existence of information externalities). In consideration of these information asymmetries and externalities, we will say that exploration is information efficient when. -- on the one hand, initial exploration choices are directed by the most experienced companies, - and, on the other hand, during the drilling phase, in the face of the information externality, companies adopt a sequential drilling, i.e. excluding both over-investment and strategic under-investment. The topic we deal with in this thesis is then to know if oil companies, when they are put in normal competition conditions, are likely to make emerge a state of information efficiency in exploration, the analysis being conducted theoretically and empirically. (author)

  12. Sensitivity and specificity of hypopnoea detection using nasal pressure in the presence of a nasal expiratory resistive device (Provent®)

    International Nuclear Information System (INIS)

    Milne, Stephen; Amis, Terence C; Wheatley, John R; Kairaitis, Kristina

    2014-01-01

    Nasal expiratory resistive valves (Provent ® ) have been proposed as novel therapy for obstructive sleep apnea. We compared pressure measurements from a standard nasal pressure catheter used to assess nasal airflow during sleep with those from nasal expiratory resistive device with attached proprietary nasal pressure cannula. Nasal pressure cannula or Provent ® + proprietary nasal pressure cannula were attached to a bench model of human anterior nares and nasal passages, and pressure measured (P). Respiratory airflows generated by a subject breathing were applied to rear of model and airflow ( V-dot ) measured via pneumotachograph. Airflow amplitude (Δ V-dot ) was plotted against pressure amplitude (ΔP). Hypopnoea detection (<50% Δ V-dot ) sensitivity and specificity was tested by expressing ΔP in terms of two reference breaths: reference breath 1, Δ V-dot 0.55 L s −1  = 100%; and reference breath 2, Δ V-dot 0.45 L s −1  = 100%. ΔP/Δ V-dot relationships were linear for Δ V-dot  ≤ 0.55 L s −1 ; ΔP = 0.37ΔV + 0.16 (nasal pressure cannula), ΔP = 2.7ΔV + 0.12 (Provent ® + proprietary nasal pressure cannula); both R 2  > 0.65, p < 0.0001; p < 0.0001 for between slope difference). For nasal pressure cannula, specificity of hypopnoea detection differed between reference breaths one and two (80.2% and 40.0%, respectively), and Provent ® + proprietary nasal pressure cannula (30.3% and 74.2%, respectively). Quantification of airflow obstruction in the presence of Provent ® + proprietary nasal pressure cannula is greatly influenced by the reference breath chosen to determine a reduction in nasal airflow. Reported variability in therapeutic response to nasal expiratory resistive devices may relate to differences in measurement technique specificity used to quantify the severity of sleep disordered breathing. (paper)

  13. Variables influencing wearable sensor outcome estimates in individuals with stroke and incomplete spinal cord injury: a pilot investigation validating two research grade sensors.

    Science.gov (United States)

    Jayaraman, Chandrasekaran; Mummidisetty, Chaithanya Krishna; Mannix-Slobig, Alannah; McGee Koch, Lori; Jayaraman, Arun

    2018-03-13

    Monitoring physical activity and leveraging wearable sensor technologies to facilitate active living in individuals with neurological impairment has been shown to yield benefits in terms of health and quality of living. In this context, accurate measurement of physical activity estimates from these sensors are vital. However, wearable sensor manufacturers generally only provide standard proprietary algorithms based off of healthy individuals to estimate physical activity metrics which may lead to inaccurate estimates in population with neurological impairment like stroke and incomplete spinal cord injury (iSCI). The main objective of this cross-sectional investigation was to evaluate the validity of physical activity estimates provided by standard proprietary algorithms for individuals with stroke and iSCI. Two research grade wearable sensors used in clinical settings were chosen and the outcome metrics estimated using standard proprietary algorithms were validated against designated golden standard measures (Cosmed K4B2 for energy expenditure and metabolic equivalent and manual tallying for step counts). The influence of sensor location, sensor type and activity characteristics were also studied. 28 participants (Healthy (n = 10); incomplete SCI (n = 8); stroke (n = 10)) performed a spectrum of activities in a laboratory setting using two wearable sensors (ActiGraph and Metria-IH1) at different body locations. Manufacturer provided standard proprietary algorithms estimated the step count, energy expenditure (EE) and metabolic equivalent (MET). These estimates were compared with the estimates from gold standard measures. For verifying validity, a series of Kruskal Wallis ANOVA tests (Games-Howell multiple comparison for post-hoc analyses) were conducted to compare the mean rank and absolute agreement of outcome metrics estimated by each of the devices in comparison with the designated gold standard measurements. The sensor type, sensor location

  14. Information in organisations: directions for information management

    Directory of Open Access Journals (Sweden)

    Joyce Kirk

    1999-01-01

    Full Text Available The work of managers in small and medium-sized enterprises is very information-intensive and the environment in which it is done is very information rich. But are managers able to exploit the wealth of information which surrounds them? And how can information be managed in organisations so that its potential for improving business performance and enhancing the competitiveness of these enterprises can be realised? Answers to these questions lie in clarifying the context of the practice of information management by exploring aspects of organisations and managerial work and in exploring the nature of information at the level of the organisation and the individual manager. From these answers it is possible to suggest some guidelines for managing the integration of business strategy and information, the adoption of a broadly-based definition of information and the development of information capabilities.

  15. Informal information for web-based engineering catalogues

    Science.gov (United States)

    Allen, Richard D.; Culley, Stephen J.; Hicks, Ben J.

    2001-10-01

    Success is highly dependent on the ability of a company to efficiently produce optimal designs. In order to achieve this companies must minimize time to market and possess the ability to make fully informed decisions at the early phase of the design process. Such decisions may include the choice of component and suppliers, as well as cost and maintenance considerations. Computer modeling and electronic catalogues are becoming the preferred medium for the selection and design of mechanical components. In utilizing these techniques, the designer demands the capability to identify, evaluate and select mechanical components both quantitatively and qualitatively. Quantitative decisions generally encompass performance data included in the formal catalogue representation. It is in the area of qualitative decisions that the use of what the authors call 'Informal Information' is of crucial importance. Thus, 'Informal Information' must often be incorporated into the selection process and selection systems. This would enable more informed decisions to be made quicker, without the need for information retrieval via discussion with colleagues in the design environment. This paper provides an overview of the use of electronic information in the design of mechanical systems, including a discussion of limitations of current technology. The importance of Informal Information is discussed and the requirements for association with web based electronic catalogues are developed. This system is based on a flexible XML schema and enables the storage, classification and recall of Informal Information packets. Furthermore, a strategy for the inclusion of Informal Information is proposed, and an example case is used to illustrate the benefits.

  16. NRC Information No. 89-23: Environmental qualification of Litton-Veam CIR series electrical connectors

    International Nuclear Information System (INIS)

    Rossi, C.E.

    1992-01-01

    Litton-Veam CIR series multi-pin electrical connectors are used in core exit thermocouple (CET) and reactor vessel level monitoring (RVLM) systems supplied to numerous plants by Combustion Engineering, Inc., and are used in other applications in at least three additional plants. A proprietary qualification test report has been used to document environmental qualification of the connectors for loss of coolant accident (LOCA) conditions in the CE-supplied systems. During LOCA testing, the connector face seal gasket was completely degraded and elastomeric inserts interacted with simulated containment spray solution which leaked into the connector. Insulation resistances near 1,000 ohms were measured. CE has performed analyses to show that resultant errors are acceptable in CE-supplied CET and RVLM system thermocouple circuits. However, the moisture ingress and resultant low insulation resistances are not acceptable for heater circuits in the RVLM. For that application, CE developed two remedies; one is a clamp, and the other is a new connector design. CE has advised that one of these remedies has been used for all of the RVLM heater circuits. Unmodified CIR connectors are believed to be still in use in other applications

  17. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge Management: Advanced Search. Journal Home > Information Impact: Journal of Information and Knowledge Management: Advanced Search. Log in or Register to get access to full text downloads.

  18. The organizational structure and governing principles of the Food and Drug Administration's Mini-Sentinel pilot program.

    Science.gov (United States)

    Forrow, Susan; Campion, Daniel M; Herrinton, Lisa J; Nair, Vinit P; Robb, Melissa A; Wilson, Marcus; Platt, Richard

    2012-01-01

    The US Food and Drug Administration's Mini-Sentinel pilot program is developing an organizational structure as well as principles and policies to govern its operations. These will inform the structure and function of the eventual Sentinel System. Mini-Sentinel is a collaboration that includes 25 participating institutions. We describe the program's current organizational structure and its major principles and policies. The organization includes a coordinating center with program leadership provided by a principal investigator; a planning board and subcommittees; an operations center; and data, methods, and protocol cores. Ad hoc workgroups are created as needed. A privacy panel advises about protection of individual health information. Principles and policies are intended to ensure that Mini-Sentinel conforms to the principles of fair information practices, protects the privacy of individual health information, maintains the security and integrity of data, assures the confidentiality of proprietary information, provides accurate and timely communications, prevents or manages conflicts of interest, and preserves respect for intellectual property rights. Copyright © 2012 John Wiley & Sons, Ltd.

  19. Information in Our World: Conceptions of Information and Problems of Method in Information Science

    Science.gov (United States)

    Ma, Lai

    2012-01-01

    Many concepts of information have been proposed and discussed in library and information science. These concepts of information can be broadly categorized as empirical and situational information. Unlike nomenclatures in many sciences, however, the concept of information in library and information science does not bear a generally accepted…

  20. Food hypersensitivity in 20 dogs with skin and gastrointestinal signs.

    Science.gov (United States)

    Paterson, S

    1995-12-01

    Canine food allergy can be defined as a nonseasonal, pruritic skin disorder of dogs that is associated with the ingestion of a substance found in the dog's diet. This study records the use of a proprietary dried fish, corn and soya-based diet for the investigation and maintenance of food allergic dogs when fed initially as a restricted allergen diet and then as a maintenance diet after challenge. All the dogs showed evidence of pruritic skin disease and in addition demonstrated gastrointestinal signs. These included the presence of faecal mucus and blood, tenesmus and increased faecal frequency; all the signs associated with colitis. Both cutaneous and gastrointestinal signs resolved when an elimination diet was fed and could be reproduced when the animal was appropriately challenged. Ten dogs were trialled on a home cooked diet of fish and potato and 10 dogs on the proprietary complete food. All the dogs were challenged to identify their food allergies. Nineteen of the dogs have subsequently been successfully maintained on the proprietary food.

  1. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge Management: Site Map. Journal Home > About the Journal > Information Impact: Journal of Information and Knowledge Management: Site Map. Log in or Register to get access to full text downloads.

  2. Role of Information Anxiety and Information Load on Processing of Prescription Drug Information Leaflets.

    Science.gov (United States)

    Bapat, Shweta S; Patel, Harshali K; Sansgiry, Sujit S

    2017-10-16

    In this study, we evaluate the role of information anxiety and information load on the intention to read information from prescription drug information leaflets (PILs). These PILs were developed based on the principals of information load and consumer information processing. This was an experimental prospective repeated measures study conducted in the United States where 360 (62% response rate) university students (>18 years old) participated. Participants were presented with a scenario followed by exposure to the three drug product information sources used to operationalize information load. The three sources were: (i) current practice; (ii) pre-existing one-page text only; and (iii) interventional one-page prototype PILs designed for the study. Information anxiety was measured as anxiety experienced by the individual when encountering information. The outcome variable of intention to read PILs was defined as the likelihood that the patient will read the information provided in the leaflets. A survey questionnaire was used to capture the data and the objectives were analyzed by performing a repeated measures MANOVA using SAS version 9.3. When compared to current practice and one-page text only leaflets, one-page PILs had significantly lower scores on information anxiety ( p information load ( p Information anxiety and information load significantly impacted intention to read ( p < 0.001). Newly developed PILs increased patient's intention to read and can help in improving the counseling services provided by pharmacists.

  3. A mortality index for postmarketing surveillance of new medications.

    Science.gov (United States)

    Rose, J C; Unis, A S

    2000-03-01

    The rate of introduction of new pharmaceuticals is growing as a result of advances in molecular pharmacology and targeted drug development. The Fatal Toxicity Index (FTI) has been proposed as a means for monitoring drug toxicity through post-marketing surveillance. The FTI requires data regarding the general availability of a particular agent in the community which, in the US, is proprietary. The authors propose a Mortality Index as an alternative method for calculating relative lethality that does not rely on proprietary information for postmarketing surveillance. Using data from the Toxic Exposure Surveillance System (TESS) a Mortality Index was calculated from the proportion of deaths occurring among all patients who present to a health care facility with an overdose on the same agent or class of agents. The average Mortality Index for various drugs or drug classes for the years 1989 to 1997 is reported. Because the Mortality Index for desipramine appeared much greater than that for the other tricyclics, a chi-squared analysis was performed. The authors conclude, based on this analysis, that desipramine is significantly more likely to lead to death after overdosage than any other tricyclic antidepressant in the study. Also, the Mortality Index appeared to identify the impact of pediatric formulations on overdose lethality. We conclude that the Mortality Index may be a useful tool for determining the safety of agents during the postmarketing surveillance phase.

  4. Information Architecture the Design of Digital Information Spaces

    CERN Document Server

    Ding, Wei

    2009-01-01

    Information Architecture is about organizing and simplifying information, designing and integrating information spaces/systems, and creating ways for people to find and interact with information content. Its goal is to help people understand and manage information and make right decisions accordingly. In the ever-changing social, organizational and technological contexts, Information Architects not only design individual information spaces (e.g., individual websites, software applications, and mobile devices), but also tackle strategic aggregation and integration of multiple information spaces

  5. A new man-machine-interface at BESSY

    International Nuclear Information System (INIS)

    Mueller, R.; Doll, H.D.; Donasch, I.J.; Marxen, H.; Pause, H.

    1991-01-01

    A UIMS (user interface management system) has been developed, that is completely based on non-proprietary software. Central part of the UIMS are processes (mapper) that act as universal X-clients for each specified X-server. Mapper (graphic server) and applications (graphic clients) exchange requests by an event driven interface. The communication protocol is free from any graphical information. The most powerful mapper client is a form interpreter, that can be programmed to act as an equipment access server. Mapper and form interpreter allow to compose control panels and synoptic views of the machine with statements in a simple and comprehensible UIDL (user interface definition language)

  6. Geospatial Analysis Framework

    Directory of Open Access Journals (Sweden)

    Elisabeta Antonia Haller

    2010-04-01

    Full Text Available In a computerized society, the volume of data grows unexpectedly, making their processing time a very difficult task. A priority has become the processing of data in useful information and knowledge. Thus we can say that data mining is a result of technological developments. Interpretation of spatial data has made the subject of research over time, reaching now to have a large variety of instruments and software products for representation and interpretation. What we need to understand beyond the facilities offered by one system or another, proprietary or open source solution, is how they work and interact with spatial data.

  7. Walls of straw – the cyber risks to higher education

    Directory of Open Access Journals (Sweden)

    Phillip Wood

    2014-07-01

    Full Text Available Globally, in every facet of life, advances in communications technology and our reliance on computers and the internet allow us to live and work more efficiently than ever before. Higher education relies on the development of knowledge and the need to conduct and communicate research activity. Universities are often bound in research activity to business, government and other organizations whose interests need to be protected and managed. But is there a disparity in approach? Is research activity, security and the protection of privileged, proprietary and classified information appropriately implemented and managed in higher education? In this article the author questions: are there gaps open to cyberattack?

  8. Roles of libraries in information society | Awojobi | Information ...

    African Journals Online (AJOL)

    Through the revi ew of relevant literature, the paper examined the roles of libraries in information society. The information society is characterised by proliferation of information through the use of Information and Communication Technology (ICT). One major principle of an information society is accessibility to information ...

  9. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  10. Hurricane Loss Estimation Models: Opportunities for Improving the State of the Art.

    Science.gov (United States)

    Watson, Charles C., Jr.; Johnson, Mark E.

    2004-11-01

    The results of hurricane loss models are used regularly for multibillion dollar decisions in the insurance and financial services industries. These models are proprietary, and this “black box” nature hinders analysis. The proprietary models produce a wide range of results, often producing loss costs that differ by a ratio of three to one or more. In a study for the state of North Carolina, 324 combinations of loss models were analyzed, based on a combination of nine wind models, four surface friction models, and nine damage models drawn from the published literature in insurance, engineering, and meteorology. These combinations were tested against reported losses from Hurricanes Hugo and Andrew as reported by a major insurance company, as well as storm total losses for additional storms. Annual loss costs were then computed using these 324 combinations of models for both North Carolina and Florida, and compared with publicly available proprietary model results in Florida. The wide range of resulting loss costs for open, scientifically defensible models that perform well against observed losses mirrors the wide range of loss costs computed by the proprietary models currently in use. This outcome may be discouraging for governmental and corporate decision makers relying on this data for policy and investment guidance (due to the high variability across model results), but it also provides guidance for the efforts of future investigations to improve loss models. Although hurricane loss models are true multidisciplinary efforts, involving meteorology, engineering, statistics, and actuarial sciences, the field of meteorology offers the most promising opportunities for improvement of the state of the art.

  11. Information Sensitive Consumers and Market Information.

    Science.gov (United States)

    Price, Linda L.; And Others

    1987-01-01

    Past research on consumer information has emphasized the effects of informed consumers of the provision of goods by sellers. This paper examines the effects of informed consumers on other consumers' product choices. These are demand-side effects. Directions for research are outlined. Author/CH)

  12. Information Skills for an Information Age?

    Science.gov (United States)

    Gawith, Gwen

    1986-01-01

    Although information skills are the most basic of skills, the tendency is to teach strategies related to educational projects, erroneously assuming that these "information skills" are applicable to everyday decision-making. Educated imaginations are needed for today's variety of lifelong creative information situations. (17 references)…

  13. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  14. Applying the archetype approach to the database of a biobank information management system.

    Science.gov (United States)

    Späth, Melanie Bettina; Grimson, Jane

    2011-03-01

    The purpose of this study is to investigate the feasibility of applying the openEHR archetype approach to modelling the data in the database of an existing proprietary biobank information management system. A biobank information management system stores the clinical/phenotypic data of the sample donor and sample related information. The clinical/phenotypic data is potentially sourced from the donor's electronic health record (EHR). The study evaluates the reuse of openEHR archetypes that have been developed for the creation of an interoperable EHR in the context of biobanking, and proposes a new set of archetypes specifically for biobanks. The ultimate goal of the research is the development of an interoperable electronic biomedical research record (eBMRR) to support biomedical knowledge discovery. The database of the prostate cancer biobank of the Irish Prostate Cancer Research Consortium (PCRC), which supports the identification of novel biomarkers for prostate cancer, was taken as the basis for the modelling effort. First the database schema of the biobank was analyzed and reorganized into archetype-friendly concepts. Then, archetype repositories were searched for matching archetypes. Some existing archetypes were reused without change, some were modified or specialized, and new archetypes were developed where needed. The fields of the biobank database schema were then mapped to the elements in the archetypes. Finally, the archetypes were arranged into templates specifically to meet the requirements of the PCRC biobank. A set of 47 archetypes was found to cover all the concepts used in the biobank. Of these, 29 (62%) were reused without change, 6 were modified and/or extended, 1 was specialized, and 11 were newly defined. These archetypes were arranged into 8 templates specifically required for this biobank. A number of issues were encountered in this research. Some arose from the immaturity of the archetype approach, such as immature modelling support tools

  15. Evolution of the NFS Filer Service

    CERN Multimedia

    CERN. Geneva; ROUSSEAU, Herve; MASCETTI, Luca

    2015-01-01

    The presentation will give an overview of the operations activities in the IT DSS group on the NFS services and its consolidation with the goal of avoiding proprietary solutions. CERN-IT manages a series of NetApp appliances for NFS applications, the presentation will focus on the Filer history, on a new way to provide NFS-based services using an advanced filesystem like ZFS combined with Ceph (IT-DSS block storage solution for OpenStack) and on the decommissioning strategy of the previous proprietary Filer. The presentation will highlight strengths and weaknesses for each systems and a cost comparison of the different solutions.

  16. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  17. Atoms Want to Be Free Too! Expanding the Critique of Intellectual Property to Physical Goods

    Directory of Open Access Journals (Sweden)

    Johan Söderberg

    2012-01-01

    Full Text Available “Atoms are the new bits”. That is the latest buzz arising from the Californian trade press. What do we get when this dictum is sampled with the old rallying cry: “Information wants to be free”? We suggest that the predominant, bounded critique of intellectual property is thereby destabilised. Constitutive of that critique was the exceptionality attributed to information goods (bits vis-a-vis tangible goods (atoms. It was thus intellectual property could be presented as something altogether different from private property. We recognise that this way of framing the issue has had tactical advantages, but contend that it has stood in the way of a deeper understanding of what intellectual property is. When the critique of proprietary software is expanded by an emerging movement for open hardware development, however, the boundary between intellectual property and property as such crumbles. This enables us to renew our critique of the political economy of information.

  18. Vantagens competitivas com softwares livres: o caso de uma instituição de ensino [doi: 10.5329/RECADM.20100901001

    Directory of Open Access Journals (Sweden)

    Luciana Helena Crnkovic

    2010-05-01

    Full Text Available Normal 0 21 false false false PT-BR X-NONE X-NONE VANTAGENS COMPETITIVAS COM SOFTWARES LIVRES: o caso de uma instituição de ensino   RESUMO O objetivo deste trabalho é investigar o processo de migração de softwares proprietários para softwares livres – SLs em um sistema de informação – SI em uma pequena empresa, no caso, uma instituição de ensino médio. O SI é um recurso fundamental e independe do porte ou ramo de atividade da empresa. Seu bom gerenciamento pode ser capaz de potencializar processos, gerar conhecimento e criar vantagens competitivas importantes. Contudo, o alto custo da aquisição de softwares proprietários é um grande obstáculo para sua implantação abrindo uma boa oportunidade de mercado para o SL, opção gratuita e com bom desempenho. Para investigar o processo de migração para SLs foi conduzido estudo de caso em uma cooperativa de ensino médio na qual pode-se observar o crescimento da importância do SI em sua operação. Na empresa em questão pode-se identificar, após a implantação dos SLs, um aumento da sinergia interdepartamental, maior dinamismo nas atividades por conta da eficiente obtenção das informações, e maior confiabilidade no SI no que se refere à segurança. No que se refere aos SLs pode-se observar claramente sua competitividade frente aos softwares proprietários.   Palavras-Chave tecnologia da informação; sistema de informação; software livre.     COMPETITIVE ADVANTAGES IN FREE SOFTWARE: THE CASE OF AN EDUCATIONAL INSTITUTION   ABSTRACT The objective of this study is to investigate the migration of proprietary software to free software - FS in an small businesses information system – SI, an institution of higher education. The SI is a key resource an is independent of size or area of the company activity. Its appropriated management may be able to improve process, generate knowledge and create significant competitive advantages. However, the high cost of purchasing

  19. Information Retrieval Methods in Libraries and Information Centers ...

    African Journals Online (AJOL)

    The volumes of information created, generated and stored are immense that without adequate knowledge of information retrieval methods, the retrieval process for an information user would be cumbersome and frustrating. Studies have further revealed that information retrieval methods are essential in information centers ...

  20. Computing handbook information systems and information technology

    CERN Document Server

    Topi, Heikki

    2014-01-01

    Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber

  1. Information Interaction: Providing a Framework for Information Architecture.

    Science.gov (United States)

    Toms, Elaine G.

    2002-01-01

    Discussion of information architecture focuses on a model of information interaction that bridges the gap between human and computer and between information behavior and information retrieval. Illustrates how the process of information interaction is affected by the user, the system, and the content. (Contains 93 references.) (LRW)

  2. Identification of improvements of advanced light water reactor concepts

    International Nuclear Information System (INIS)

    Frisch, W.; Liesch, K.; Riegel, B.

    1993-01-01

    The scope of this report is to identify the improvement of reactor developments with respect to reactor safety. This includes the collection of non-proprietary information on the description of the advanced design characteristics, especially summary design descriptions and general publications. This documentation is not intended to include a safety evaluation of the advanced concepts; however, it is structured in such a way that it can serve as a basis for a future safety evaluation. This is taken into account in the structure of the information regarding the distinction of the various concepts with respect to their 'advancement' and the classification of design characteristics according to some basic safety aspects. The overall description concentrates on those features which are relevant to safety. Other aspects, such as economy, operational features, maintenance, the construction period, etc...are not considered explicitly in this report

  3. Banking biological collections: data warehousing, data mining, and data dilemmas in genomics and global health policy.

    Science.gov (United States)

    Blatt, R J R

    2000-01-01

    While DNA databases may offer the opportunity to (1) assess population-based prevalence of specific genes and variants, (2) simplify the search for molecular markers, (3) improve targeted drug discovery and development for disease management, (4) refine strategies for disease prevention, and (5) provide the data necessary for evidence-based decision-making, serious scientific and social questions remain. Whether samples are identified, coded, or anonymous, biological banking raises profound ethical and legal issues pertaining to access, informed consent, privacy and confidentiality of genomic information, civil liberties, patenting, and proprietary rights. This paper provides an overview of key policy issues and questions pertaining to biological banking, with a focus on developments in specimen collection, transnational distribution, and public health and academic-industry research alliances. It highlights the challenges posed by the commercialization of genomics, and proposes the need for harmonization of biological banking policies.

  4. Structured Intuition: A Methodology to Analyse Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed

    and the level of abstraction used in the analysis. Thus, the goal of developing a high level methodology that can be used with different notions of security, authentication, and abstraction is worth considering. In this thesis, we propose a new methodology, called the structured intuition (SI), which addresses...... in our methodology, which is called canonicity, which is a weaker form of message authenticity. As compared to many contemporary analysis techniques, an SI based analysis provides detailed results regarding the design rationales and entity authentication goals of a protocol....... consequences for the security of the system, e.g., private information of legitimate parties may be leaked or the security policy of a trusted system may be violated. At a corporate level, such a failure of authentication may result in loss of proprietary technology or customers' credit card information...

  5. Information Impact | Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Information Impact | Journal of Information and Knowledge Management

    Information Impact | Journal of Information and Knowledge Management. 77 ... Libraries all over the world are applying information and communication ..... Bank Branch Performance, The International Journal on Advances in ICT for Emerging.

  6. Information Crisis

    CERN Document Server

    Losavio, Michael

    2012-01-01

    Information Crisis discusses the scope and types of information available online and teaches readers how to critically assess it and analyze potentially dangerous information, especially when teachers, editors, or other information gatekeepers are not available to assess the information for them. Chapters and topics include:. The Internet as an information tool. Critical analysis. Legal issues, traps, and tricks. Protecting personal safety and identity. Types of online information.

  7. The Information Tekhnology Share In Management Information System

    Directory of Open Access Journals (Sweden)

    Nur Zeina Maya Sari

    2015-08-01

    Full Text Available Abstract Management Information System growth cause change of role from all manager in decision making the information technology. While prima facie reason for the usage of information technology in business to support such a manner so that information system may operate better OBrienamp Marakas 2004. Its meaning with existence of information tekhnology in management information system SIM company management decision making which initially often pursued by many factor of non technical become accurately is relevant complete and on schedule

  8. Developing geographic information infrastructure : The role of information policies

    NARCIS (Netherlands)

    Van Loenen, B.

    2006-01-01

    Within information societies, information availability is a key issue affecting societyâs well being. The infrastructure underlying the foundation of the information society may be referred to as the information infrastructure. A geographic information infrastructure (GII) supports the information

  9. Inform: Efficient Information-Theoretic Analysis of Collective Behaviors

    Directory of Open Access Journals (Sweden)

    Douglas G. Moore

    2018-06-01

    Full Text Available The study of collective behavior has traditionally relied on a variety of different methodological tools ranging from more theoretical methods such as population or game-theoretic models to empirical ones like Monte Carlo or multi-agent simulations. An approach that is increasingly being explored is the use of information theory as a methodological framework to study the flow of information and the statistical properties of collectives of interacting agents. While a few general purpose toolkits exist, most of the existing software for information theoretic analysis of collective systems is limited in scope. We introduce Inform, an open-source framework for efficient information theoretic analysis that exploits the computational power of a C library while simplifying its use through a variety of wrappers for common higher-level scripting languages. We focus on two such wrappers here: PyInform (Python and rinform (R. Inform and its wrappers are cross-platform and general-purpose. They include classical information-theoretic measures, measures of information dynamics and information-based methods to study the statistical behavior of collective systems, and expose a lower-level API that allow users to construct measures of their own. We describe the architecture of the Inform framework, study its computational efficiency and use it to analyze three different case studies of collective behavior: biochemical information storage in regenerating planaria, nest-site selection in the ant Temnothorax rugatulus, and collective decision making in multi-agent simulations.

  10. Information barriers for the protection of sensitive information

    International Nuclear Information System (INIS)

    Dougan, A.D.; Dunn, J.; Seager, K.; Smith, M.; Beach, D.; Clinton, J.; Vanier, P.

    2013-01-01

    An Information Barrier is a combination of technology and procedures that prevent the release of a host country's sensitive information to a monitoring party during an inspection of a sensitive item, while enabling assurance of an accurate assessment of host country declarations regarding the item. Information barriers, as a concept, arose from the need to balance two competing requirements - specifically, certification of information protection by a host country and authentication of measurement and information accuracy by a monitoring party. The U.S. Department of Energy's National Nuclear Security Administration, in conjunction with several U.S. National Laboratories, has explored information barrier development in detail, and has continued the evolution of essential work done by the U.S. Information Barrier Working Group beginning in the late 1990's, and other international efforts, including the U.S.-Russia-IAEA Trilateral Initiative. This paper explains the rationale for information barriers, and explores the development and application of information barrier concepts for potential future arms control initiatives, including recent work and advances in capabilities. It also considers applications of information barrier concepts applied in other fields.The paper is followed by the slides of the presentation. (authors)

  11. Information management

    Science.gov (United States)

    Ricks, Wendell; Corker, Kevin

    1990-01-01

    Primary Flight Display (PFD) information management and cockpit display of information management research is presented in viewgraph form. The information management problem in the cockpit, information management burdens, the key characteristics of an information manager, the interface management system handling the flow of information and the dialogs between the system and the pilot, and overall system architecture are covered.

  12. Correlation Between Information Technology And Management Information Systems Quality

    Directory of Open Access Journals (Sweden)

    Annisa Fitri Anggraeni

    2015-08-01

    Full Text Available The aim of this research is to find out the correlation between Information Technology and Management Information System Quality. This research applies literature review from various theories and previously conducted research where controversies between Information Technology and Management Information Systems. The result of this research shows that Information Technology is a part of Management Information System and supports the performance of Management Information Systems.

  13. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Agricultural informational flow in informal communication networks of farmers in Ghana. ... should identify such farmers who can serve as intermediaries between actors to help disseminate information in rural communities. Keywords: key communicators, farmers, rural communities, social networks, extension agents ...

  14. How Informed Are Informal Educators?

    Science.gov (United States)

    Lederman, Norman G.; Niess, Margaret L.

    1998-01-01

    Explores current reforms in both mathematics and science education that emphasize the importance of learning in informal settings. Suggests that informal education must include planned and purposeful attempts to facilitate students' understanding of mathematics and science in community settings other than the local school. (Author/CCM)

  15. The information activity of rail passenger information staff: a foundation for information system requirements

    Directory of Open Access Journals (Sweden)

    Martin Rose

    2006-01-01

    Full Text Available Introduction. This paper examines the goal-directed information activity of passenger information staff, working in the dynamic environment of rail network control. The explicit aim is to define a meaningful set of information system requirements. The report shows how dynamic situations may lead us to question a number of established theories of information science. Method. Passenger information officers (PIOs were observed on duty within the rail command and control headquarters. Observation sessions totally eight hours involved the manual recording of sequential information flows and the associated activity of PIOs. A semi-structured management interview was also conducted to provide further insight into the organizational context. Analysis. A viewpoint-oriented analysis technique was used to analyse sequential data captured during observation sessions. Event sequences that represent and explain the viewpoints were identified and elaborated into detailed scenario descriptions. Results. The analysis both supports and contests a number of established theories from information science. Additionally, a range of 'mandatory' and 'desirable' system requirements are derived from the scenario and viewpoint analyses. Conclusion. Dynamic situations have a significant impact on information behaviour which is not always predicted by current theories of information science.

  16. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge Management

    Information Impact: Journal of Information and Knowledge Management. 55. Adeola Esther Olutoki ... The main instruments used for data collection were research ... collections in the library and enhance academic performance. ... libraries; they contain the latest information on research findings which are of great importance.

  17. Biological information systems: Evolution as cognition-based information management.

    Science.gov (United States)

    Miller, William B

    2018-05-01

    An alternative biological synthesis is presented that conceptualizes evolutionary biology as an epiphenomenon of integrated self-referential information management. Since all biological information has inherent ambiguity, the systematic assessment of information is required by living organisms to maintain self-identity and homeostatic equipoise in confrontation with environmental challenges. Through their self-referential attachment to information space, cells are the cornerstone of biological action. That individualized assessment of information space permits self-referential, self-organizing niche construction. That deployment of information and its subsequent selection enacted the dominant stable unicellular informational architectures whose biological expressions are the prokaryotic, archaeal, and eukaryotic unicellular forms. Multicellularity represents the collective appraisal of equivocal environmental information through a shared information space. This concerted action can be viewed as systematized information management to improve information quality for the maintenance of preferred homeostatic boundaries among the varied participants. When reiterated in successive scales, this same collaborative exchange of information yields macroscopic organisms as obligatory multicellular holobionts. Cognition-Based Evolution (CBE) upholds that assessment of information precedes biological action, and the deployment of information through integrative self-referential niche construction and natural cellular engineering antecedes selection. Therefore, evolutionary biology can be framed as a complex reciprocating interactome that consists of the assessment, communication, deployment and management of information by self-referential organisms at multiple scales in continuous confrontation with environmental stresses. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. College Students’ Information Needs and Information Seeking Behaviors regarding Personal Information

    Directory of Open Access Journals (Sweden)

    Yu-Wen Liu

    2017-12-01

    Full Text Available This study analyzed college students’ reactions toward the issues of personal information. Students’ needs and seeking behaviors for personal information were assessed. Relevant literature was reviewed for framing the research questions and designing the questionnaire items for survey. Survey subjects were students from an university at northern Taiwan. A set of questionnaire items were used to collect research data. Statistical analysis from 252 valid data reveals some items were highly rated: Students reflected highly for their need of knowledge under the security threat of personal information (M = 4.29. They reacted strongly on acquiring knowledge and resources through the Internet (M = 4.24. They preferred the use of resources clear and easy to be understood (M = 4.04. However, most students had low level faith toward either government or non-governmental organizations in securing their personal information (M < 3.0 for most items. More effort among education and government should be emphasized in the future to improve personal use and reduce uncertainty in the use of personal information.

  19. INFORMATION CULTURE AND INFORMATION SAFETY OF SCHOOLCHILDREN

    Directory of Open Access Journals (Sweden)

    E. G. Belyakova

    2017-01-01

    Full Text Available Introduction. The article is devoted to the problem of interaction between schoolchildren and possible informational risks transmitted on the Internet. Considering the lack of external filters on the way of harmful information streams, it is actually necessary to develop information culture of schoolchildren, their abilities to sensibly and critically interpret the information on the Internet, and choice of adequate behaviour models surfing the Web. The aim of the present research is to analyze the state of informational safety of schoolchildren while using the Internet; gaining an understanding of the role of external restrictions and opportunities of intrapersonal filtration of the harmful Internet content depending on children age. Methodology and research methods. The methodology of the research is based on modern methods aimed to consider the problem of personal socialization in modern information society. Thus, the Internet Initiatives Development Fund (IIDF questionnaire let the authors define the level of awareness of recipients on the problem under consideration. Results and scientific novelty. The theoretical analysis helped the authors predict the correlation of basic methods in order to guarantee personal safety of schoolchildren taking into account the process of maturity as well as the decrease of external filters that may stop harmful content. Empirical part of the research has enabled to reveal decrease in external control of staying of a child in network in the process of growing up against the background of restrictive attitudes prevalence among teachers and parents. Therefore, the research supposed to improve information culture of schoolchildren from the earliest ages encouraging them to sensibly and correctly interpret the information on the Internet. Practical significance. The practical recommendations to parents and teachers in order to improve informational personal safety of schoolchildren are proposed. The relevancy

  20. Rethinking information handling: designing for information offload

    DEFF Research Database (Denmark)

    Hansen, Lone Koefoed; Pedersen, Peter Dalsgård; Eriksson, Eva

    2005-01-01

    This paper introduces information offload as a supplement way of responding to and designing for information. By presenting iFlush, a design concept aiming at providing the user with a possibility to offload information and then instantly dispose of it, the paper presents an approach towards desi...... designing for reflection and also serves as a critique towards information overload. Furthermore, the absence of reflection on the role played by HCI community in the constant augmenting of all spaces is addressed....

  1. Social information

    Directory of Open Access Journals (Sweden)

    Luiz Fernando de Barros Campos

    Full Text Available Based on Erving Goffman's work, the article aims to discuss a definition of information centered on the type conveyed by individuals in a multimodal way, encompassing language and body in situations of co-presence, where face-to-face interaction occurs, and influencing inter-subjective formation of the self. Six types of information are highlighted: material information, expressive information, ritualized information, meta-information, strategic information, and information displays. It is argued that the construction of this empirical object tends to dissolve the tension among material, cognitive and pragmatic aspects, constituting an example of the necessary integration among them. Some vulnerable characteristics of the theory are critically mentioned and it is suggested that the concept of information displays could provide a platform to approach the question of the interaction order in its relations with the institutional and social orders, and consequently, to reassess the scope of the notion of social information analyzed.

  2. Low Resting Membrane Potential and Low Inward Rectifier Potassium Currents Are Not Inherent Features of hiPSC-Derived Cardiomyocytes.

    Science.gov (United States)

    Horváth, András; Lemoine, Marc D; Löser, Alexandra; Mannhardt, Ingra; Flenner, Frederik; Uzun, Ahmet Umur; Neuber, Christiane; Breckwoldt, Kaja; Hansen, Arne; Girdauskas, Evaldas; Reichenspurner, Hermann; Willems, Stephan; Jost, Norbert; Wettwer, Erich; Eschenhagen, Thomas; Christ, Torsten

    2018-03-13

    Human induced pluripotent stem cell (hiPSC) cardiomyocytes (CMs) show less negative resting membrane potential (RMP), which is attributed to small inward rectifier currents (I K1 ). Here, I K1 was measured in hiPSC-CMs (proprietary and commercial cell line) cultured as monolayer (ML) or 3D engineered heart tissue (EHT) and, for direct comparison, in CMs from human right atrial (RA) and left ventricular (LV) tissue. RMP was measured in isolated cells and intact tissues. I K1 density in ML- and EHT-CMs from the proprietary line was similar to LV and RA, respectively. I K1 density in EHT-CMs from the commercial line was 2-fold smaller than in the proprietary line. RMP in EHT of both lines was similar to RA and LV. Repolarization fraction and I K,ACh response discriminated best between RA and LV and indicated predominantly ventricular phenotype in hiPSC-CMs/EHT. The data indicate that I K1 is not necessarily low in hiPSC-CMs, and technical issues may underlie low RMP in hiPSC-CMs. Copyright © 2018 The Author(s). Published by Elsevier Inc. All rights reserved.

  3. Information Needs, Sources, and Information Seeking Behaviour of ...

    African Journals Online (AJOL)

    This work which focused on the policy-makers/administrators as information users was carried out using hundred (100) questionnaire in order to ascertain the information needs, sources and information seeking behaviour of the administrators. The barrier to information flow to them was also identified. The study adopted a ...

  4. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  5. SU-C-209-06: Improving X-Ray Imaging with Computer Vision and Augmented Reality

    Energy Technology Data Exchange (ETDEWEB)

    MacDougall, R.D.; Scherrer, B [Boston Children’s Hospital, Boston, MA (United States); Don, S [Washington University, St. Louis, MO (United States)

    2016-06-15

    Purpose: To determine the feasibility of using a computer vision algorithm and augmented reality interface to reduce repeat rates and improve consistency of image quality and patient exposure in general radiography. Methods: A prototype device, designed for use with commercially available hardware (Microsoft Kinect 2.0) capable of depth sensing and high resolution/frame rate video, was mounted to the x-ray tube housing as part of a Philips DigitalDiagnost digital radiography room. Depth data and video was streamed to a Windows 10 PC. Proprietary software created an augmented reality interface where overlays displayed selectable information projected over real-time video of the patient. The information displayed prior to and during x-ray acquisition included: recognition and position of ordered body part, position of image receptor, thickness of anatomy, location of AEC cells, collimated x-ray field, degree of patient motion and suggested x-ray technique. Pre-clinical data was collected in a volunteer study to validate patient thickness measurements and x-ray images were not acquired. Results: Proprietary software correctly identified ordered body part, measured patient motion, and calculated thickness of anatomy. Pre-clinical data demonstrated accuracy and precision of body part thickness measurement when compared with other methods (e.g. laser measurement tool). Thickness measurements provided the basis for developing a database of thickness-based technique charts that can be automatically displayed to the technologist. Conclusion: The utilization of computer vision and commercial hardware to create an augmented reality view of the patient and imaging equipment has the potential to drastically improve the quality and safety of x-ray imaging by reducing repeats and optimizing technique based on patient thickness. Society of Pediatric Radiology Pilot Grant; Washington University Bear Cub Fund.

  6. SU-C-209-06: Improving X-Ray Imaging with Computer Vision and Augmented Reality

    International Nuclear Information System (INIS)

    MacDougall, R.D.; Scherrer, B; Don, S

    2016-01-01

    Purpose: To determine the feasibility of using a computer vision algorithm and augmented reality interface to reduce repeat rates and improve consistency of image quality and patient exposure in general radiography. Methods: A prototype device, designed for use with commercially available hardware (Microsoft Kinect 2.0) capable of depth sensing and high resolution/frame rate video, was mounted to the x-ray tube housing as part of a Philips DigitalDiagnost digital radiography room. Depth data and video was streamed to a Windows 10 PC. Proprietary software created an augmented reality interface where overlays displayed selectable information projected over real-time video of the patient. The information displayed prior to and during x-ray acquisition included: recognition and position of ordered body part, position of image receptor, thickness of anatomy, location of AEC cells, collimated x-ray field, degree of patient motion and suggested x-ray technique. Pre-clinical data was collected in a volunteer study to validate patient thickness measurements and x-ray images were not acquired. Results: Proprietary software correctly identified ordered body part, measured patient motion, and calculated thickness of anatomy. Pre-clinical data demonstrated accuracy and precision of body part thickness measurement when compared with other methods (e.g. laser measurement tool). Thickness measurements provided the basis for developing a database of thickness-based technique charts that can be automatically displayed to the technologist. Conclusion: The utilization of computer vision and commercial hardware to create an augmented reality view of the patient and imaging equipment has the potential to drastically improve the quality and safety of x-ray imaging by reducing repeats and optimizing technique based on patient thickness. Society of Pediatric Radiology Pilot Grant; Washington University Bear Cub Fund

  7. Design and evaluation of a multimedia electronic patient record "oncoflow" with clinical workflow assistance for head and neck tumor therapy.

    Science.gov (United States)

    Meier, Jens; Boehm, Andreas; Kielhorn, Anne; Dietz, Andreas; Bohn, Stefan; Neumuth, Thomas

    2014-11-01

    The management of patient-specific information is a challenging task for surgeons and physicians because existing clinical information systems are insufficiently integrated into daily clinical routine and contained information entities are distributed across different proprietary databases. Thus, existing information is hardly usable for further electronic processing, workflow support or clinical studies. A Web-based clinical information system has been developed that automatically imports patient-specific information from different information systems. The system is tailored to the existing workflow for the treatment of patients with head and neck cancer. In this paper, the clinical assistance functions and a quantitative as well as a qualitative system evaluation are presented. The information system has been deployed at a clinical site and is in use in daily clinical routine. Two evaluation studies show that the information integration, the structured information presentation in the Web browser and the assistance functions improve the physician's workflow. The studies also show that the usage of the new information system does not impair the time physicians need for a process step compared with the usage of the existing information system. Information integration is crucial for efficient workflow support in the clinic. The central access to information within a modern and structured user interface saves valuable time for the physician. The comprehensive database allows an instant usage of the existing information clinical workflow support or the conduction of trial studies.

  8. High Temperature Materials Laboratory third annual report

    Energy Technology Data Exchange (ETDEWEB)

    Tennery, V.J.; Foust, F.M.

    1990-12-01

    The High Temperature Materials Laboratory has completed its third year of operation as a designated DOE User Facility at the Oak Ridge National Laboratory. Growth of the user program is evidenced by the number of outside institutions who have executed user agreements since the facility began operation in 1987. A total of 88 nonproprietary agreements (40 university and 48 industry) and 20 proprietary agreements (1 university, 19 industry) are now in effect. Sixty-eight nonproprietary research proposals (39 from university, 28 from industry, and 1 other government facility) and 8 proprietary proposals were considered during this reporting period. Research projects active in FY 1990 are summarized.

  9. Red Plague Control Plan (RPCP)

    Science.gov (United States)

    Cooke, Robert W.

    2010-01-01

    SCOPE: Prescribes the minimum requirements for the control of cuprous / cupric oxide corrosion (a.k.a. Red Plague) of silver-coated copper wire, cable, and harness assemblies. PURPOSE: Targeted for applications where exposure to assembly processes, environmental conditions, and contamination may promote the development of cuprous / cupric oxide corrosion (a.k.a. Red Plague) in silver-coated copper wire, cable, and harness assemblies. Does not exclude any alternate or contractor-proprietary documents or processes that meet or exceed the baseline of requirements established by this document. Use of alternate or contractor-proprietary documents or processes shall require review and prior approval of the procuring NASA activity.

  10. Communicating stereotype-relevant information: is factual information subject to the same communication biases as fictional information?

    Science.gov (United States)

    Goodman, Ruth L; Webb, Thomas L; Stewart, Andrew J

    2009-07-01

    Factual information is more frequently read and discussed than fictional information. However, research on the role of communication in shaping stereotypes has focused almost exclusively on fictional narratives. In Experiments 1 and 2 a newspaper article containing information about heroin users was communicated along chains of 4 people. No stereotype-consistency bias was observed. Instead, a greater proportion of stereotype-inconsistent information was communicated than was stereotype-consistent or -neutral information. Three further experiments investigated explanations for the difference between the communication of fictional and factual information. Experiment 3 ruled out the possibility that participants' beliefs about the validity of the information could influence the way that it is communicated. Experiments 4 and 5 divided information into concrete (a specific event or fact) or abstract (opinion). A stereotype-consistency bias emerged only for abstract information. In summary, linguistic abstraction moderates whether stereotype-consistency biases emerge in the communication of stereotype-relevant factual information.

  11. PROPOSTA DE INVESTIGAÇÃO SOBRE O USO DE SOFTWARE NO SUPORTE À INOVAÇÃO EM SERVIÇOS

    Directory of Open Access Journals (Sweden)

    Alessandro de Orlando Maia Pinheiro

    2015-08-01

    Full Text Available This article examines the goals, instruments and characteristics of Information and Communication Technolgy (ICT enabled innovations in the Brazilian software industry emphasizing technologies, transmitting channels, learning processes, and organizational changes required by advanced digital tools. The methodology steams from the adaptation of an existing taxonomy for our specific purposes and the development of a field research in Brazil, with the help of the software Atlas.ti. We found that ICT enabled innovations are not isolated events, since they affect existing processes, the relationship with clients and suppliers, and require greater integration of organizational functions. Important differences were observed due to the firms’ size, internationalization level, technical capabilities and access to proprietary technology.

  12. Managing and Querying Image Annotation and Markup in XML.

    Science.gov (United States)

    Wang, Fusheng; Pan, Tony; Sharma, Ashish; Saltz, Joel

    2010-01-01

    Proprietary approaches for representing annotations and image markup are serious barriers for researchers to share image data and knowledge. The Annotation and Image Markup (AIM) project is developing a standard based information model for image annotation and markup in health care and clinical trial environments. The complex hierarchical structures of AIM data model pose new challenges for managing such data in terms of performance and support of complex queries. In this paper, we present our work on managing AIM data through a native XML approach, and supporting complex image and annotation queries through native extension of XQuery language. Through integration with xService, AIM databases can now be conveniently shared through caGrid.

  13. Managing and Querying Image Annotation and Markup in XML

    Science.gov (United States)

    Wang, Fusheng; Pan, Tony; Sharma, Ashish; Saltz, Joel

    2010-01-01

    Proprietary approaches for representing annotations and image markup are serious barriers for researchers to share image data and knowledge. The Annotation and Image Markup (AIM) project is developing a standard based information model for image annotation and markup in health care and clinical trial environments. The complex hierarchical structures of AIM data model pose new challenges for managing such data in terms of performance and support of complex queries. In this paper, we present our work on managing AIM data through a native XML approach, and supporting complex image and annotation queries through native extension of XQuery language. Through integration with xService, AIM databases can now be conveniently shared through caGrid. PMID:21218167

  14. Information technology acceptance in health information management.

    Science.gov (United States)

    Abdekhoda, M; Ahmadi, M; Dehnad, A; Hosseini, A F

    2014-01-01

    User acceptance of information technology has been a significant area of research for more than two decades in the field of information technology. This study assessed the acceptance of information technology in the context of Health Information Management (HIM) by utilizing Technology Acceptance Model (TAM) which was modified and applied to assess user acceptance of health information technology as well as viability of TAM as a research construct in the context of HIM. This was a descriptive- analytical study in which a sample of 187 personnel from a population of 363 personnel, working in medical records departments of hospitals affiliated to Tehran University of Medical Sciences, was selected. Users' perception of applying information technology was studied by a researcher-developed questionnaire. Collected data were analyzed by SPSS software (version16) using descriptive statistics and regression analysis. The results suggest that TAM is a useful construct to assess user acceptance of information technology in the context of HIM. The findings also evidenced the perceived ease of use (PEOU) and perceived usefulness (PE) were positively associated with favorable users' attitudes towards HIM. PU was relatively more associated (r= 0.22, p = 0.05) than PEOU (r = 0.014, p = 0.05) with favorable user attitudes towards HIM. Users' perception of usefulness and ease of use are important determinants providing the incentive for users to accept information technologies when the application of a successful HIM system is attempted. The findings of the present study suggest that user acceptance is a key element and should subsequently be the major concern of health organizations and health policy makers.

  15. 108 Information Retrieval Methods in Libraries and Information ...

    African Journals Online (AJOL)

    User

    without adequate knowledge of information retrieval methods, the retrieval process for an ... discusses the concept of Information retrieval, the various information ..... Other advantages of automatic indexing are the maintenance of consistency.

  16. Informational Urbanism

    Directory of Open Access Journals (Sweden)

    Wolfgang G. Stock

    2015-10-01

    Full Text Available Contemporary and future cities are often labeled as "smart cities," "ubiquitous cities," "knowledge cities" and "creative cities." Informational urbanism includes all aspects of information and knowledge with regard to urban regions. "Informational city" is an umbrella term uniting the divergent trends of information-related city research. Informational urbanism is an interdisciplinary endeavor incorporating on the one side computer science and information science and on the other side urbanism, architecture, (city economics, and (city sociology. In our research project on informational cities, we visited more than 40 metropolises and smaller towns all over the world. In this paper, we sketch the theoretical background on a journey from Max Weber to the Internet of Things, introduce our research methods, and describe main results on characteristics of informational cities as prototypical cities of the emerging knowledge society.

  17. Information Concepts

    CERN Document Server

    Marchionini, Gary

    2010-01-01

    Information is essential to all human activity, and information in electronic form both amplifies and augments human information interactions. This lecture surveys some of the different classical meanings of information, focuses on the ways that electronic technologies are affecting how we think about these senses of information, and introduces an emerging sense of information that has implications for how we work, play, and interact with others. The evolutions of computers and electronic networks and people's uses and adaptations of these tools manifesting a dynamic space called cyberspace. O

  18. Floridi's Philosophy of Information and Information Ethics

    DEFF Research Database (Denmark)

    Ess, Charles

    2009-01-01

    In order to evaluate Floridi's philosophy of information (PI) and correlative information ethics (IE) as potential frameworks for a global information and computing ethics (ICE), I review a range of important criticisms, defenses, and extensions of PI and IE, along with Floridi's responses to these......, as gathered together in a recent special issue of Ethics and Information Technology. A revised and expanded version of PI and IE emerges here, one that brings to the foreground PI's status as a philosophical naturalism—one with both current application and important potential in the specific domains...... of privacy and information law. Further, the pluralism already articulated by Floridi in his PI is now more explicitly coupled with an ethical pluralism in IE that will be enhanced through IE's further incorporation of discourse ethics. In this form, PI and IE emerge as still more robust frameworks...

  19. Documentation, User Support, and Verification of Wind Turbine and Plant Models

    Energy Technology Data Exchange (ETDEWEB)

    Robert Zavadil; Vadim Zheglov; Yuriy Kazachkov; Bo Gong; Juan Sanchez; Jun Li

    2012-09-18

    As part of the Utility Wind Energy Integration Group (UWIG) and EnerNex's Wind Turbine Modeling Project, EnerNex has received ARRA (federal stimulus) funding through the Department of Energy (DOE) to further the progress of wind turbine and wind plant models. Despite the large existing and planned wind generation deployment, industry-standard models for wind generation have not been formally adopted. Models commonly provided for interconnection studies are not adequate for use in general transmission planning studies, where public, non-proprietary, documented and validated models are needed. NERC MOD (North American Electric Reliability Corporation) reliability standards require that power flow and dynamics models be provided, in accordance with regional requirements and procedures. The goal of this project is to accelerate the appropriate use of generic wind turbine models for transmission network analysis by: (1) Defining proposed enhancements to the generic wind turbine model structures that would allow representation of more advanced; (2) Comparative testing of the generic models against more detailed (and sometimes proprietary) versions developed by turbine vendors; (3) Developing recommended parameters for the generic models to best mimic the performance of specific commercial wind turbines; (4) Documenting results of the comparative simulations in an application guide for users; (5) Conducting technology transfer activities in regional workshops for dissemination of knowledge and information gained, and to engage electric power and wind industry personnel in the project while underway; (6) Designing of a "living" homepage to establish an online resource for transmission planners.

  20. Extended device profiles and testing procedures for the approval process of integrated medical devices using the IEEE 11073 communication standard.

    Science.gov (United States)

    Janß, Armin; Thorn, Johannes; Schmitz, Malte; Mildner, Alexander; Dell'Anna-Pudlik, Jasmin; Leucker, Martin; Radermacher, Klaus

    2018-02-23

    Nowadays, only closed and proprietary integrated operating room systems (IORS) from big manufacturers are available on the market. Hence, the interconnection of components from third-party vendors is only possible with increased time and costs. In the context of the German Federal Ministry of Education and Research (BMBF)-funded project OR.NET (2012-2016), the open integration of medical devices from different manufacturers was addressed. An integrated operating theater based on the open communication standard IEEE 11073 shall give clinical operators the opportunity to choose medical devices independently of the manufacturer. This approach would be advantageous especially for hospital operators and small- and medium-sized enterprises (SME) of medical devices. Actual standards and concepts regarding technical feasibility and the approval process do not cope with the requirements for a modular integration of medical devices in the operating room (OR), based on an open communication standard. Therefore, innovative approval strategies and corresponding certification and test procedures, which cover actual legal and normative standards, have to be developed in order to support the future risk management and the usability engineering process of open integrated medical devices in the OR. The use of standardized device and service profiles and a three-step testing procedure, including conformity, interoperability and integration tests are described in this paper and shall support the manufacturers to integrate their medical devices without disclosing the medical devices' risk analysis and related confidential expertise or proprietary information.

  1. Language as information system: transfer and saving of the information

    Directory of Open Access Journals (Sweden)

    Irina Mikhaylovna Nekipelova

    2015-11-01

    Full Text Available The paper is devoted to research of the language system as an information system. The language is not the information itself. It contains information minimum and has information restrictions. Under the information should be understood texts and speech, created by using a language. Modern forms of existence of living natural language are distributed databases with multiple accesses, because bearers of language constantly and concurrently use it. Language and speech always exchange information, creating a unified information environment, where a human is. At any stage of information exchange the change of self-descriptiveness takes place one way or the other. When a human try to reflect world around him, some part of reflected information is lost due to conversion into language and saving into it in formalized form. These processes of storing information are related to the fact that in the production and perception of the statements optimization mechanisms of human thinking are made. When we perceive information its preservation can happen without information loss and with the loss of information.

  2. Scientific and technical guidance for the preparation and presentation of an application for authorisation of a health claim (revision 1)

    DEFF Research Database (Denmark)

    Tetens, Inge

    2011-01-01

    The scientific and technical guidance of the EFSA Panel on Dietetic Products, Nutrition and Allergies for the preparation and presentation of an application for authorisation of a health claim presents a common format for the organisation of information for the preparation of a well......-structured application for authorisation of health claims which fall under Article 14 (referring to children’s development and health, and to disease risk reduction claims), or 13(5) (which are based on newly developed scientific evidence and/or which include a request for the protection of proprietary data......), or for the modification of an existing authorisation in accordance with Article 19 of Regulation (EC) No 1924/2006 on nutrition and health claims made on foods. This guidance outlines: the information and scientific data which must be included in the application, the hierarchy of different types of data and study designs...

  3. Information Myopia

    Directory of Open Access Journals (Sweden)

    Nadi Helena Presser

    2016-04-01

    Full Text Available This article reflects on the ways of appropriation in organizations. The notion of Information Myopia is characterized by the lack of knowledge about the available informational capabilities in organizations, revealing a narrow view of the information environment. This analysis has focused on the process for renewing the software licenses contracts of a large multinational group, in order to manage its organizational assets in information technology. The collected, explained and justified information allowed to elaborate an action proposal, which enabled the creation of new organizational knowledge. In its theoretical dimension, the value of information was materialized by its use, in a collective process of organizational learning.

  4. Information cultures

    DEFF Research Database (Denmark)

    Skouvig, Laura

    2017-01-01

    The purpose of this article is to suggest a genealogy of the concept of information beyond the 20th century. The article discusses how the concept of information culture might provide a way of formulating such a genealogic strategy. The article approaches this purpose by providing a general...... narrative of premodern information cultures, examining works on early-modern scholars and 18th century savants and discussion of what seems to be a Foucauldian rupture in the conceptualization of information in 19th century England. The findings of the article are situated in the thinking that a genealogy...... of information would reveal that information had specific purposes in specific settings....

  5. Peran Information Conciousness dan Nutrient Information dalam Meningkatkan Kinerja Individual

    Directory of Open Access Journals (Sweden)

    Niken Wahyu Wilujeng

    2014-12-01

    Full Text Available The objective of this research is to analyze nutrient information and information consciousness as factors that influence employee’s performance and job satisfication as intervening variable for finance employee in Brawijaya University. By employing Partial Least Square technique, it was indicated that nutrient information and information consciousness have positive effect to job satisfication, while job satisfication can also fully mediate nutrient information and information consciousness to employee’s performance. This research also indicated that information consciousness and nutrient information are factors that influence finance employee’s performance through intelectual emphasis.

  6. Short Comm.

    African Journals Online (AJOL)

    OGECHI

    mainframe-based applications, incompatible proprietary hardware platforms, disparate software, ... responding to changing organizational structures; ... (2) The various technologies and equipment that manipulate these resources, and.

  7. Information needs and information seeking behaviour of small-scale ...

    African Journals Online (AJOL)

    It is thus important for the government to improve access to extension services, and equip them with necessary skills and adequate information resources. ... information needs, map communities' knowledge and information sources, create awareness of information sources, and knowledge culture, and use multiple sources ...

  8. When Information Improves Information Security

    Science.gov (United States)

    Grossklags, Jens; Johnson, Benjamin; Christin, Nicolas

    This paper presents a formal, quantitative evaluation of the impact of bounded-rational security decision-making subject to limited information and externalities. We investigate a mixed economy of an individual rational expert and several naïve near-sighted agents. We further model three canonical types of negative externalities (weakest-link, best shot and total effort), and study the impact of two information regimes on the threat level agents are facing.

  9. The effects of informal carers' characteristics on their information needs: The information needs state approach.

    Science.gov (United States)

    Alzougool, Basil; Chang, Shanton; Gray, Kathleen

    2017-09-01

    There has been little research that provides a comprehensive account of the nature and aspects of information needs of informal carers. The authors have previously developed and validated a framework that accounts for major underlying states of information need. This paper aims to apply this framework to explore whether there are common demographic and socioeconomic characteristics that affect the information needs states of carers. A questionnaire about the information needs states was completed by 198 carers above 18 years old. We use statistical methods to look for similarities and differences in respondents' information needs states, in terms of the demographic and socioeconomic variables. At least one information needs state varies among carers, in terms of seven demographic and socioeconomic variables: the age of the patient(s) that they are caring for; the condition(s) of the patient(s) that they are caring for; the number of patients that they are caring for; their length of time as a carer; their gender; the country that they live in; and the population of the area that they live in. The findings demonstrate the utility of the information needs state framework. We outline some practical implications of the framework.

  10. 75 FR 28777 - Information Collection; Financial Information Security Request Form

    Science.gov (United States)

    2010-05-24

    ... Collection; Financial Information Security Request Form AGENCY: Forest Service, USDA. ACTION: Notice; Request... currently approved information collection; Financial Information Security Request Form. DATES: Comments must... Standard Time, Monday through Friday. SUPPLEMENTARY INFORMATION: Title: Financial Information Security...

  11. An Evaluation of Information Consistency in Grid Information Systems

    CERN Document Server

    Field, Laurence

    2017-01-01

    A Grid information system resolves queries that may need to consider all information sources (Grid services), which are widely distributed geographically, in order to enable efficient Grid functions that may utilise multiple cooperating services. Fundamentally this can be achieved by either moving the query to the data (query shipping) or moving the data to the query (data shipping). Existing Grid information system implementations have adopted one of the two approaches. This paper explores the two approaches in further detail by evaluating them to the best possible extent with respect to Grid information system benchmarking metrics. A Grid information system that follows the data shipping approach based on the replication of information that aims to improve the currency for highly-mutable information is presented. An implementation of this, based on an Enterprise Messaging System, is evaluated using the benchmarking method and the consequence of the results for the design of Grid information systems is discu...

  12. Differential item functioning of the patient-reported outcomes information system (PROMIS®) pain interference item bank by language (Spanish versus English).

    Science.gov (United States)

    Paz, Sylvia H; Spritzer, Karen L; Reise, Steven P; Hays, Ron D

    2017-06-01

    About 70% of Latinos, 5 years old or older, in the United States speak Spanish at home. Measurement equivalence of the PROMIS ® pain interference (PI) item bank by language of administration (English versus Spanish) has not been evaluated. A sample of 527 adult Spanish-speaking Latinos completed the Spanish version of the 41-item PROMIS ® pain interference item bank. We evaluate dimensionality, monotonicity and local independence of the Spanish-language items. Then we evaluate differential item functioning (DIF) using ordinal logistic regression with item response theory scores estimated from DIF-free "anchor" items. One of the 41 items in the Spanish version of the PROMIS ® PI item bank was identified as having significant uniform DIF. English- and Spanish-speaking subjects with the same level of pain interference responded differently to 1 of the 41 items in the PROMIS ® PI item bank. This item was not retained due to proprietary issues. The original English language item parameters can be used when estimating PROMIS ® PI scores.

  13. Information behaviour of migrant Hispanic farm workers and their families in the Pacific Northwest Information grounds, Information behaviour, Behavior, Washington, Immigrants, Information habits

    Directory of Open Access Journals (Sweden)

    Karen E. Fisher

    2004-01-01

    Full Text Available Immigrants are generally perceived to be information poor, meaning they face major challenges with finding and using greatly needed everyday information. However, little research exists from an information behaviour perspective as differences in language, culture, and other factors such as access make immigrants a difficult population to study. We explored the everyday information behaviour and information grounds of migrant Hispanic farm workers through field observation and interviews with users, non-users, and staff of community technology centres in a major agricultural area. Findings suggest that personal networks having various levels of credibility were used more readily than any other type of information source. Credibility and use of various sources seemed to relate to personal status as well as interest in information.

  14. Collecting Information for Rating Global Assessment of Functioning (GAF): Sources of Information and Methods for Information Collection.

    Science.gov (United States)

    I H, Monrad Aas

    2014-11-01

    Global Assessment of Functioning (GAF) is an assessment instrument that is known worldwide. It is widely used for rating the severity of illness. Results from evaluations in psychiatry should characterize the patients. Rating of GAF is based on collected information. The aim of the study is to identify the factors involved in collecting information that is relevant for rating GAF, and gaps in knowledge where it is likely that further development would play a role for improved scoring. A literature search was conducted with a combination of thorough hand search and search in the bibliographic databases PubMed, PsycINFO, Google Scholar, and Campbell Collaboration Library of Systematic Reviews. Collection of information for rating GAF depends on two fundamental factors: the sources of information and the methods for information collection. Sources of information are patients, informants, health personnel, medical records, letters of referral and police records about violence and substance abuse. Methods for information collection include the many different types of interview - unstructured, semi-structured, structured, interviews for Axis I and II disorders, semistructured interviews for rating GAF, and interviews of informants - as well as instruments for rating symptoms and functioning, and observation. The different sources of information, and methods for collection, frequently result in inconsistencies in the information collected. The variation in collected information, and lack of a generally accepted algorithm for combining collected information, is likely to be important for rated GAF values, but there is a fundamental lack of knowledge about the degree of importance. Research to improve GAF has not reached a high level. Rated GAF values are likely to be influenced by both the sources of information used and the methods employed for information collection, but the lack of research-based information about these influences is fundamental. Further development of

  15. High-Surety Telemedicine in a Distributed, 'Plug-and-Play' Environment

    International Nuclear Information System (INIS)

    Craft, Richard L.; Funkhouser, Donald R.; Gallagher, Linda K.; Garcia, Rudy J.; Parks, Raymond C.; Warren, Steve

    1999-01-01

    Commercial telemedicine systems are increasingly functional, incorporating video-conferencing capabilities, diagnostic peripherals, medication reminders, and patient education services. However, these systems (1) rarely utilize information architectures which allow them to be easily integrated with existing health information networks and (2) do not always protect patient confidentiality with adequate security mechanisms. Using object-oriented methods and software wrappers, we illustrate the transformation of an existing stand-alone telemedicine system into 'plug-and-play' components that function in a distributed medical information environment. We show, through the use of open standards and published component interfaces, that commercial telemedicine offerings which were once incompatible with electronic patient record systems can now share relevant data with clinical information repositories while at the same time hiding the proprietary implementations of the respective systems. Additionally, we illustrate how leading-edge technology can secure this distributed telemedicine environment, maintaining patient confidentiality and the integrity of the associated electronic medical data. Information surety technology also encourages the development of telemedicine systems that have both read and write access to electronic medical records containing patient-identifiable information. The win-win approach to telemedicine information system development preserves investments in legacy software and hardware while promoting security and interoperability in a distributed environment

  16. High-Surety Telemedicine in a Distributed, 'Plug-andPlan' Environment

    Energy Technology Data Exchange (ETDEWEB)

    Craft, Richard L.; Funkhouser, Donald R.; Gallagher, Linda K.; Garcia, Rudy J.; Parks, Raymond C.; Warren, Steve

    1999-05-17

    Commercial telemedicine systems are increasingly functional, incorporating video-conferencing capabilities, diagnostic peripherals, medication reminders, and patient education services. However, these systems (1) rarely utilize information architectures which allow them to be easily integrated with existing health information networks and (2) do not always protect patient confidentiality with adequate security mechanisms. Using object-oriented methods and software wrappers, we illustrate the transformation of an existing stand-alone telemedicine system into `plug-and-play' components that function in a distributed medical information environment. We show, through the use of open standards and published component interfaces, that commercial telemedicine offerings which were once incompatible with electronic patient record systems can now share relevant data with clinical information repositories while at the same time hiding the proprietary implementations of the respective systems. Additionally, we illustrate how leading-edge technology can secure this distributed telemedicine environment, maintaining patient confidentiality and the integrity of the associated electronic medical data. Information surety technology also encourages the development of telemedicine systems that have both read and write access to electronic medical records containing patient-identifiable information. The win-win approach to telemedicine information system development preserves investments in legacy software and hardware while promoting security and interoperability in a distributed environment.

  17. Information Sharing and Information Acqusition in Credit Markets

    NARCIS (Netherlands)

    Karapetyan, A.; Stacescu, B.

    2009-01-01

    Since information asymmetries have been identified as an important source of bank profits, it may seem that the establishment of information sharing arrangements such as credit registers and bureaus will lead to lower investment in acquiring information. However, banks base their decisions on both

  18. Information Architecture in Library and Information Science Curricula.

    Science.gov (United States)

    Robins, David

    2002-01-01

    Discusses how information architecture is being handled in some library and information science (LIS) programs and suggests mappings between traditional LIS curricula and the marketplace for information architects. Topics include terminology used in LIS curricula; current job opportunities; and projections for the future. (LRW)

  19. Multimedia systems overview: the big picture

    Science.gov (United States)

    Riccomi, Alfred

    1993-01-01

    The golden opportunities represented by multimedia systems have been recognized by many. The risk and cost involved in developing the products and the markets has led to a bonanza of unlikely consortia of strange bedfellows. The premier promoter of personal computing systems, Apple Computer, has joined forces with the dominant supplier of corporate computing, IBM, to form a multimedia technology joint venture called Kaleida. The consumer electronics world's leading promoter of free trade, Sony, has joined forces with the leader of Europe's protectionist companies, Philips, to create a consumer multimedia standard called CD-I. While still paying lip service to CD-I, Sony and Philips now appear to be going their separate ways. The software world's most profitable/fastest growing firm, Microsoft, has entered into alliances with each and every multimedia competitor to create a mish mash of product classes and defacto standards. The battle for Multimedia Standards is being fought on all fronts: on standards committees, in corporate strategic marketing meetings, within industry associations, in computer retail stores, and on the streets. Early attempts to set proprietary defacto standards were fought back, but the proprietary efforts continue with renewed vigor. Standards committees were, as always, slow to define specifications, but the official standards are now known nd being implemented; ... but the proprietary efforts continue with renewed vigor. Ultimately, the buyers will decide -- like it or not. Success by the efforts to establish proprietary defacto standards could prove to be a boon to the highly creative and inventive U.S. firms, but at the cost of higher prices for consumers and slower market growth. Success by the official standards could bring lower prices for consumers and fast market growth, but force the higher-wage/higher-overhead U.S. firms to compete on a level playing field. As is always the case, you can't have your cake and eat it too.

  20. Information Science and Information Systems: Conjunct Subjects Disjunct Disciplines.

    Science.gov (United States)

    Ellis, David; Allen, David; Wilson, Tom

    1999-01-01

    Examines the relationship between information science and information-systems (IS) research through analysis of the subject literature of each field and by citation and co-citation analysis of highly cited researchers in each field. Subfields of user studies and information-retrieval research were selected to represent information-science…

  1. Motivated Reasoning, Political Information, and Information Literacy Education

    Science.gov (United States)

    Lenker, Mark

    2016-01-01

    Research in psychology and political science has identified motivated reasoning as a set of biases that inhibit a person's ability to process political information objectively. This research has important implications for the information literacy movement's aims of fostering lifelong learning and informed citizenship. This essay argues that…

  2. Information Theory for Information Science: Antecedents, Philosophy, and Applications

    Science.gov (United States)

    Losee, Robert M.

    2017-01-01

    This paper provides an historical overview of the theoretical antecedents leading to information theory, specifically those useful for understanding and teaching information science and systems. Information may be discussed in a philosophical manner and at the same time be measureable. This notion of information can thus be the subject of…

  3. Information seeking behaviour and use of information resources, by ...

    African Journals Online (AJOL)

    Provision of information materials to meet the information needs of students, Creation of awareness programme that will enlighten the students in getting adequate information needed in the library such as asking a librarian, the use of Online public access(OPAC) and E-granary to get the adequate information they need, ...

  4. Informal Taxation.

    Science.gov (United States)

    Olken, Benjamin A; Singhal, Monica

    2011-10-01

    Informal payments are a frequently overlooked source of local public finance in developing countries. We use microdata from ten countries to establish stylized facts on the magnitude, form, and distributional implications of this "informal taxation." Informal taxation is widespread, particularly in rural areas, with substantial in-kind labor payments. The wealthy pay more, but pay less in percentage terms, and informal taxes are more regressive than formal taxes. Failing to include informal taxation underestimates household tax burdens and revenue decentralization in developing countries. We discuss various explanations for and implications of these observed stylized facts.

  5. 3 CFR - Classified Information and Controlled Unclassified Information

    Science.gov (United States)

    2010-01-01

    ... on Transparency and Open Government and on the Freedom of Information Act, my Administration is... memoranda of January 21, 2009, on Transparency and Open Government and on the Freedom of Information Act; (B... 3 The President 1 2010-01-01 2010-01-01 false Classified Information and Controlled Unclassified...

  6. Preliminary economic evaluation of the Alkox process

    International Nuclear Information System (INIS)

    Silva, L.J.; Lilga, M.A.; Camaioni, D.M.; Snowden, L.J.

    1991-09-01

    A new chemical process has been invented at Battelle Pacific Northwest Laboratories for converting alkanes to alcohols. This new chemistry has been named the ''Alkox Process.'' Pacific Northwest Laboratory prepared a preliminary economic analysis for converting cyclohexane to cyclohexanol, which may be one of the most attractive applications of the Alkox process. A process flow scheme and a material balance were prepared to support rough equipment sizing and costing. The results from the economic analysis are presented in the non-proprietary section of this report. The process details, including the flow diagram and material balance, are contained in separate section of this report that is proprietary to Battelle. 7 refs., 4 tabs

  7. High Temperature Materials Laboratory fourth annual report, October 1990--September 1991

    Energy Technology Data Exchange (ETDEWEB)

    Tennery, V.J.; Foust, F.M.

    1991-12-01

    The High Temperature Materials Laboratory has completed its fourth year of operation as a designated Department of Energy User Facility at the Oak Ridge National Laboratory. Growth of the user program is evidenced by the number of outside institutions who have executed user agreements since the facility began operation in 1987. A total of 118 nonproprietary agreements (62 university and 56 industry) and 28 proprietary agreements (2 university, 26 industry) are now in effect. Five other government facilities have also participated in the user program. Sixty-free nonproprietary research proposals (38 from university, 26 from industry, and 1 other government facility) and four proprietary proposals were considered during this reporting period. Research projects active in FY 1991 are summarized.

  8. Disabilities Information Flow: A Disabilities Information Management System

    Science.gov (United States)

    Ling, Bin; Allison, Colin; Nicholl, J. Ross; Moodley, Luke; Roberts, Dave

    2006-01-01

    The Disabilities Information Flow (DIF) project at the University of St Andrews has sought to provide a means of efficiently managing all student disabilities information within the institution and provide appropriate role-based service interfaces for all staff who need to routinely interact with this information. This paper describes the software…

  9. Creativity, information, and consciousness: The information dynamics of thinking.

    Science.gov (United States)

    Wiggins, Geraint A

    2018-05-07

    This paper presents a theory of the basic operation of mind, Information Dynamics of Thinking, which is intended for computational implementation and thence empirical testing. It is based on the information theory of Shannon, and treats the mind/brain as an information processing organ that aims to be information-efficient, in that it predicts its world, so as to use information efficiently, and regularly re-represents it, so as to store information efficiently. The theory is presented in context of a background review of various research areas that impinge upon its development. Consequences of the theory and testable hypotheses arising from it are discussed. Copyright © 2018. Published by Elsevier B.V.

  10. Network Centric Information Structure - Crisis Information Management

    National Research Council Canada - National Science Library

    Aarholt, Eldar; Berg, Olav

    2004-01-01

    This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...

  11. Promoting Information Literacy by Promoting Health Literacy in the Information Society

    Directory of Open Access Journals (Sweden)

    Meisam Dastani

    2016-09-01

    Full Text Available In the information society, the production, distribution and use of information are freely and widely available for all issues of life. Proper and appropriate use of reliable information is especially important in health care. The present study introduces the concepts and benefits of health literacy and information literacy and its role in improving health literacy. This study was a review based on the concepts of information society, information literacy and information education to present importance of promoting information literacy on health literacy in the information society. The information society is presented by providing a platform of information technology and computer systems to attempt to exchange and develop information among people in the community. Currently, electronic and web-based health information in the mass form is available. Information as a fundamental base of the information society is a phenomenon that our decisions are affected in relation to various issues such as safety and health issues. It is important to avoid the mass of invalid, incorrect and inappropriate information which is available on the internet. This requires information literacy skills such as identifying, accessing and evaluating information. In general, it can be said that the promotion of health literacy in communities requires learning different skills in the form of information literacy.Data obtained from this study can be used in developing the long term health programs to prevention of non-communicable diseases in our country

  12. Informal Taxation*

    Science.gov (United States)

    Olken, Benjamin A.; Singhal, Monica

    2011-01-01

    Informal payments are a frequently overlooked source of local public finance in developing countries. We use microdata from ten countries to establish stylized facts on the magnitude, form, and distributional implications of this “informal taxation.” Informal taxation is widespread, particularly in rural areas, with substantial in-kind labor payments. The wealthy pay more, but pay less in percentage terms, and informal taxes are more regressive than formal taxes. Failing to include informal taxation underestimates household tax burdens and revenue decentralization in developing countries. We discuss various explanations for and implications of these observed stylized facts. PMID:22199993

  13. Informed consent - Providing information about prenatal examinations

    DEFF Research Database (Denmark)

    Dahl, Katja; Kesmodel, Ulrik; Hvidman, Lone

    as well.The review is based on systematic search strategy in the electronic databases Medline and Science Citation. Additional studies were identified through reference lists of individual papers obtained. Improving knowledge scores and reducing decisional conflict can be obtained by group counselling...... pregnant women about prenatal examinations. Women's knowledge, decisional conflict, satisfaction and anxiety will be explored as compared with different ways and different groups of health professionals providing information. To what extent information empowers informed decision making will be explored...

  14. Information delivery manuals to integrate building product information into design

    DEFF Research Database (Denmark)

    Berard, Ole Bengt; Karlshøj, Jan

    2013-01-01

    Despite continuing BIM progress, professionals in the AEC industry often lack the information they need to perform their work. Although this problem could be alleviated by information systems similar to those in other industries, companies struggle to model processes and information needs....... Traditional business process modeling languages often fail to completely cover all four perspectives. BuildingSMART has proposed Information Delivery Manuals (IDMs) to model and re-engineer processes that address the four perspectives through a collaborative methodology in order to standardize and implement...... in the manner necessary to develop information systems that support digital collaboration, workflows, and information exchange. Processes for information systems can be described from four perspectives: task sequence, information need, organizational interaction, and required logic for the specific task...

  15. Radiation information and informed consent for clinical trials

    Energy Technology Data Exchange (ETDEWEB)

    Caon, Martin [School of Nursing and Midwifery, Flinders University, Adelaide (Australia)], E-mail: martin.caon@flinders.edu.au

    2008-09-01

    Examples of the statements about the radiation from medical imaging in the information for participants provided to the Human Research Ethics Committee (HREC) for approval are presented and discussed. There is considerable scope for improvement in the information about radiation that is presented to potential participants in clinical trials. Many radiation statements seem only intended to allay fear and anxiety about radiation rather than providing accurate information. This situation cannot be said to be conducive to allowing the participant to give informed consent to their involvement in a clinical trial in which ionising radiation is used. As many clinical trials are international and conducted at many sites (sometimes over 100), we would expect the same statements to have been seen by members of HRECs in many countries. Few HRECs include a member who is an expert in radiation. Hence, to ensure that the information is sound, those sections of the participant information that refer to radiation should be written or reviewed by a specialist in radiation protection such as a medical physicist, a health physicist or a radiation safety officer. (opinion)

  16. Radiation information and informed consent for clinical trials

    International Nuclear Information System (INIS)

    Caon, Martin

    2008-01-01

    Examples of the statements about the radiation from medical imaging in the information for participants provided to the Human Research Ethics Committee (HREC) for approval are presented and discussed. There is considerable scope for improvement in the information about radiation that is presented to potential participants in clinical trials. Many radiation statements seem only intended to allay fear and anxiety about radiation rather than providing accurate information. This situation cannot be said to be conducive to allowing the participant to give informed consent to their involvement in a clinical trial in which ionising radiation is used. As many clinical trials are international and conducted at many sites (sometimes over 100), we would expect the same statements to have been seen by members of HRECs in many countries. Few HRECs include a member who is an expert in radiation. Hence, to ensure that the information is sound, those sections of the participant information that refer to radiation should be written or reviewed by a specialist in radiation protection such as a medical physicist, a health physicist or a radiation safety officer. (opinion)

  17. Information Diffusion in Facebook-Like Social Networks Under Information Overload

    Science.gov (United States)

    Li, Pei; Xing, Kai; Wang, Dapeng; Zhang, Xin; Wang, Hui

    2013-07-01

    Research on social networks has received remarkable attention, since many people use social networks to broadcast information and stay connected with their friends. However, due to the information overload in social networks, it becomes increasingly difficult for users to find useful information. This paper takes Facebook-like social networks into account, and models the process of information diffusion under information overload. The term view scope is introduced to model the user information-processing capability under information overload, and the average number of times a message appears in view scopes after it is generated is proposed to characterize the information diffusion efficiency. Through theoretical analysis, we find that factors such as network structure and view scope number have no impact on the information diffusion efficiency, which is a surprising result. To verify the results, we conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly.

  18. INFORMATION ASSURANCE - INTELLIGENCE - INFORMATION SUPERIORITY RELATIONSHIP WITHIN NATO OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe BOARU, Ioan-Mihai ILIEŞ

    2011-01-01

    Full Text Available There is a tight relationship between information assurance, the intelligence cycle and information superiority within NATO operations. The intelligence cycle has a discrete architecture and provides on-time and relevant intelligence products to the joint force commanders and to other authorized users in a specifi c joint area of operations. The intelligence cycle must follow the evolution of the operation. A permanent intelligence estimate will be performed during the military decision making process and operations execution. Information superiority is one of the most powerful intelligence cycle achievements. and decisively infuences the success of NATO joint operations. Information superiority must be preserved and enhanced through information assurance. Information assurance is an information operation that must be planned by the military in charge of operation security or by non-military experts, executed by all personnel during the entire intelligence cycle life time and employed during the planning and execution of NATO joint operations.

  19. FINANCIAL INFORMATION, EFFECTS OF FINANCIAL INFORMATION ON ECONOMIC DECISION

    Directory of Open Access Journals (Sweden)

    TAK ISA

    2010-12-01

    Full Text Available Financial information has, indisputably, an important effect in economics. To form an effective capital market, financial information must be reliable and accurate. Misleading financial information always has a negative impact on economic decision taken by users. It is known that financial information as the cornerstone of financial markets, can improve economic performance in several ways. Nowadays we are facing economic crisis due to irregularities of presentation of financial statements to users. Misunderstandings cause economic recession. Detection of fraudulent financial information, is an important issue facing the auditing profession. Currently, bankruptcy of companies around the world, leaves millions of people without jobs, this is caused by financial information which is manipulated by companies. The purpose of this paper is to analyze the effects of errors and manipulation committed in the financial information sector on the real economy. Also one of the purposes of this paper is to analyze error and fraud in financial statements how it effects the real economy and the reasons for committing fraud in financial statements. Also, several suggestions are included in this study about actions that can be taken to prevent errors and manipulation in financial information.

  20. Relationship between stakeholders' information value perception and information security behaviour

    Science.gov (United States)

    Tajuddin, Sharul; Olphert, Wendy; Doherty, Neil

    2015-02-01

    The study, reported in this paper, aims to explore the relationship between the stakeholders' perceptions about the value of information and their resultant information security behaviours. Moreover, this study seeks to explore the role of national and organisational culture in facilitating information value assignment. Information Security is a concept that formed from the recognition that information is valuable and that there is a need to protect it. The ISO 27002 defines information as an asset, which, like other important business assets, is essential to an organisation's business and consequently needs to be appropriately protected. By definition, an asset has a value to the organisation hence it requires protection. Information protection is typically accomplished through the implementation of countermeasures against the threats and vulnerabilities of information security, for example, implementation of technological processes and mechanisms such as firewall and authorization and authentication systems, set-up of deterrence procedures such as password control and enforcement of organisational policy on information handling procedures. However, evidence routinely shows that despite such measures, information security breaches and incidents are on the rise. These breaches lead to loss of information, personal records, or other data, with consequent implications for the value of the information asset. A number of studies have suggested that such problems are not related primarily to technology problems or procedural deficiencies, but rather to stakeholders' poor compliance with the security measures that are in place. Research indicates that compliance behaviour is affected by many variables including perceived costs and benefits, national and organisational culture and norms. However, there has been little research to understand the concept of information value from the perspective of those who interact with the data, and the consequences for information