WorldWideScience

Sample records for surveillance target acquisition

  1. STIS target acquisition

    Science.gov (United States)

    Kraemer, Steve; Downes, Ron; Katsanis, Rocio; Crenshaw, Mike; McGrath, Melissa; Robinson, Rich

    1997-01-01

    We describe the STIS autonomous target acquisition capabilities. We also present the results of dedicated tests executed as part of Cycle 7 calibration, following post-launch improvements to the Space Telescope Imaging Spectrograph (STIS) flight software. The residual pointing error from the acquisitions are < 0.5 CCD pixels, which is better than preflight estimates. Execution of peakups show clear improvement of target centering for slits of width 0.1 sec or smaller. These results may be used by Guest Observers in planning target acquisitions for their STIS programs.

  2. Intelligence, Surveillance, and Reconnaissance (ISR) Acquisition: Issues for Congress

    Science.gov (United States)

    2013-04-16

    vehicle that does not carry a human operation, uses aerodynamic forces to provide vehicle life, can fly autonomously or be piloted remotely, can be...that the Army is even considering the development of intelligence- gathering airships .43 In comparison to the complex acquisition history of UAS, the...43 Walter Pincus, “Military Seeks an Intelligence-Gathering Airship ,” Washington Post, February 16, 2010, p. A11. Intelligence, Surveillance, and

  3. An analytical high value target acquisition model

    OpenAIRE

    Becker, Kevin J.

    1986-01-01

    Approved for public release; distribution is unlimited An Analytical High Value Target (HVT) acquisition model is developed for a generic anti-ship cruise missile system. the target set is represented as a single HVT within a field of escorts. The HVT's location is described by a bivariate normal probability distribution. the escorts are represented by a spatially homogeneous Poisson random field surrounding the HVT. Model output consists of the probability that at least one missile of...

  4. Modular target acquisition model & visualization tool

    NARCIS (Netherlands)

    Bijl, P.; Hogervorst, M.A.; Vos, W.K.

    2008-01-01

    We developed a software framework for image-based simulation models in the chain: scene-atmosphere-sensor-image enhancement-display-human observer: EO-VISTA. The goal is to visualize the steps and to quantify (Target Acquisition) task performance. EO-VISTA provides an excellent means to systematical

  5. COS FUV Target Acquisition Algorithm Verification

    Science.gov (United States)

    Soderblom, David

    2009-07-01

    Verify the ability of the COS FSW to place an isolated point source at the center of the aperture, both for the BOA and PSA, using dispersed light from the object using the FUV gratings. The various options for target centering should be exercised and shown to work properly. This test is for acquisitions in dispersed-light mode only. This program is modeled from SMOV activity summary COS28.This program should be executed two or more weeks after visit 12 of 11469, and after the SIAF update, so that we have confirmed that NUV imaging acquisitions work properly with the BOA.

  6. Differing rates of antibody acquisition to merozoite antigens in malaria: implications for immunity and surveillance.

    Science.gov (United States)

    McCallum, Fiona J; Persson, Kristina E M; Fowkes, Freya J I; Reiling, Linda; Mugyenyi, Cleopatra K; Richards, Jack S; Simpson, Julie A; Williams, Thomas N; Gilson, Paul R; Hodder, Anthony N; Sanders, Paul R; Anders, Robin F; Narum, David L; Chitnis, Chetan; Crabb, Brendan S; Marsh, Kevin; Beeson, James G

    2017-04-01

    Antibodies play a key role in acquired human immunity to Plasmodium falciparum (Pf) malaria and target merozoites to reduce or prevent blood-stage replication and the development of disease. Merozoites present a complex array of antigens to the immune system, and currently, there is only a partial understanding of the targets of protective antibodies and how responses to different antigens are acquired and boosted. We hypothesized that there would be differences in the rate of acquisition of antibodies to different antigens and how well they are boosted by infection, which impacts the acquisition of immunity. We examined responses to a range of merozoite antigens in 2 different cohorts of children and adults with different age structures and levels of malaria exposure. Overall, antibodies were associated with age, exposure, and active infection, and the repertoire of responses increased with age and active infection. However, rates of antibody acquisition varied between antigens and different regions within an antigen following exposure to malaria, supporting our hypothesis. Antigen-specific responses could be broadly classified into early response types in which antibodies were acquired early in childhood exposure and late response types that appear to require substantially more exposure for the development of substantial levels. We identified antigen-specific responses that were effectively boosted after recent infection, whereas other responses were not. These findings advance our understanding of the acquisition of human immunity to malaria and are relevant to the development of malaria vaccines targeting merozoite antigens and the selection of antigens for use in malaria surveillance. © Society for Leukocyte Biology.

  7. Supervisory controlled operations of UAVs for tracking and surveillance of vehicle targets (SCOUTS)

    Science.gov (United States)

    Fischer, Amber; Denny, Nathan

    2008-04-01

    In this paper, we present SCOUTS, an autonomous system for the allocation of multiple small UAVs equipped with video sensors specifically geared to tracking and reacquisition of vehicle targets in urban environments. To demonstrate SCOUTS performance, we test our system in a simulation incorporating the key challenges encountered by real-time UAV tracking scenarios, including unreliable reports from poor image quality, disruption latency in communication, and temporary gaps in persistent surveillance requiring target re-acquisition strategies. The results provided in this paper establish SCOUTS as a robust approach to this challenging problem.

  8. Deubiquitinases: Novel Therapeutic Targets in Immune Surveillance?

    Directory of Open Access Journals (Sweden)

    Gloria Lopez-Castejon

    2016-01-01

    Full Text Available Inflammation is a protective response of the organism to tissue injury or infection. It occurs when the immune system recognizes Pathogen-Associated Molecular Patterns (PAMPs or Damage-Associated Molecular Pattern (DAMPs through the activation of Pattern Recognition Receptors. This initiates a variety of signalling events that conclude in the upregulation of proinflammatory molecules, which initiate an appropriate immune response. This response is tightly regulated since any aberrant activation of immune responses would have severe pathological consequences such as sepsis or chronic inflammatory and autoimmune diseases. Accumulative evidence shows that the ubiquitin system, and in particular ubiquitin-specific isopeptidases also known as deubiquitinases (DUBs, plays crucial roles in the control of these immune pathways. In this review we will give an up-to-date overview on the role of DUBs in the NF-κB pathway and inflammasome activation, two intrinsically related events triggered by activation of the membrane TLRs as well as the cytosolic NOD and NLR receptors. Modulation of DUB activity by small molecules has been proposed as a way to control dysregulation or overactivation of these key players of the inflammatory response. We will also discuss the advances and challenges of a potential use of DUBs as therapeutic targets in inflammatory pathologies.

  9. Understanding trade pathways to target biosecurity surveillance

    Directory of Open Access Journals (Sweden)

    Manuel Colunga-Garcia

    2013-09-01

    Full Text Available Increasing trends in global trade make it extremely difficult to prevent the entry of all potential invasive species (IS. Establishing early detection strategies thus becomes an important part of the continuum used to reduce the introduction of invasive species. One part necessary to ensure the success of these strategies is the determination of priority survey areas based on invasion pressure. We used a pathway-centred conceptual model of pest invasion to address these questions: what role does global trade play in invasion pressure of plant ecosystems and how could an understanding of this role be used to enhance early detection strategies? We concluded that the relative level of invasion pressure for destination ecosystems can be influenced by the intensity of pathway usage (import volume and frequency, the number and type of pathways with a similar destination, and the number of different ecological regions that serve as the source for imports to the same destination. As these factors increase, pressure typically intensifies because of increasing a propagule pressure, b likelihood of transporting pests with higher intrinsic invasion potential, and c likelihood of transporting pests into ecosystems with higher invasibility. We used maritime containerized imports of live plants into the contiguous U.S. as a case study to illustrate the practical implications of the model to determine hotspot areas of relative invasion pressure for agricultural and forest ecosystems (two ecosystems with high potential invasibility. Our results illustrated the importance of how a pathway-centred model could be used to highlight potential target areas for early detection strategies for IS. Many of the hotspots in agricultural and forest ecosystems were within major U.S. metropolitan areas. Invasion ecologists can utilize pathway-centred conceptual models to a better understand the role of human-mediated pathways in pest establishment, b enhance current

  10. On-board target acquisition for CHEOPS

    Science.gov (United States)

    Loeschl, P.; Ferstl, R.; Kerschbaum, F.; Ottensamer, R.

    2016-07-01

    The CHaracterising ExOPlanet Satellite (CHEOPS) is the first ESA S-class and exoplanetary follow-up mission headed for launch in 2018. It will perform ultra-high-precision photometry of stars hosting confirmed exoplanets on a 3-axis stabilised sun-synchronous orbit that is optimised for uninterrupted observations at minimum stray light and thermal variations. Nevertheless, due to the satellites structural design, the alignment of the star trackers and the payload instrument telescope is affected by thermo-elastic deformations. This causes a high pointing uncertainty, which requires the payload instrument to provide an additional acquisition system for distinct target identification. Therefor a star extraction software and two star identification algorithms, originally designed for star trackers, were adapted and optimised for the special case of CHEOPS. In order to evaluate these algorithms reliability, thousands of random star configurations were analysed in Monte-Carlo simulations. We present the implemented identification methods and their performance as well as recommended parameters that guarantee a successful identification under all conditions.

  11. Target tracking and surveillance by fusing stereo and RFID information

    Science.gov (United States)

    Raza, Rana H.; Stockman, George C.

    2012-06-01

    Ensuring security in high risk areas such as an airport is an important but complex problem. Effectively tracking personnel, containers, and machines is a crucial task. Moreover, security and safety require understanding the interaction of persons and objects. Computer vision (CV) has been a classic tool; however, variable lighting, imaging, and random occlusions present difficulties for real-time surveillance, resulting in erroneous object detection and trajectories. Determining object ID via CV at any instance of time in a crowded area is computationally prohibitive, yet the trajectories of personnel and objects should be known in real time. Radio Frequency Identification (RFID) can be used to reliably identify target objects and can even locate targets at coarse spatial resolution, while CV provides fuzzy features for target ID at finer resolution. Our research demonstrates benefits obtained when most objects are "cooperative" by being RFID tagged. Fusion provides a method to simplify the correspondence problem in 3D space. A surveillance system can query for unique object ID as well as tag ID information, such as target height, texture, shape and color, which can greatly enhance scene analysis. We extend geometry-based tracking so that intermittent information on ID and location can be used in determining a set of trajectories of N targets over T time steps. We show that partial-targetinformation obtained through RFID can reduce computation time (by 99.9% in some cases) and also increase the likelihood of producing correct trajectories. We conclude that real-time decision-making should be possible if the surveillance system can integrate information effectively between the sensor level and activity understanding level.

  12. Dynamic FLIR Target Acquisition. Phase I.

    Science.gov (United States)

    1978-08-02

    eas re: e r- tecr- ’t(, es will be ised for the Phase st Cy. 5.3.2 :ae Vnar -oles These v~r ies relate to the im.age characteristics which are...ground target detection and identification, TM 1-62, Aberdeen Proving Grounds, MD: Human Engineering Laboratories, Jan. 1962, (AD273696). Nygaand, J. E

  13. Surveillance

    DEFF Research Database (Denmark)

    Albrechtslund, Anders; Coeckelbergh, Mark; Matzner, Tobias;

    Studying surveillance involves raising questions about the very nature of concepts such as information, technology, identity, space and power. Besides the maybe all too obvious ethical issues often discussed with regard to surveillance, there are several other angles and approaches that we should...... like to encourage. Therefore, our panel will focus on the philosophical, yet non-ethical issues of surveillance in order to stimulate an intense debate with the audience on the ethical implications of our enquiries. We also hope to provide a broader and deeper understanding of surveillance....

  14. Iron Acquisition Pathways as Targets for Antitubercular Drugs.

    Science.gov (United States)

    Meneghetti, Fiorella; Villa, Stefania; Gelain, Arianna; Barlocco, Daniela; Chiarelli, Laurent Roberto; Pasca, Maria Rosalia; Costantino, Luca

    2016-01-01

    Tuberculosis nowadays ranks as the second leading cause of death from an infectious disease worldwide. In the last twenty years, this disease has again started to spread mainly for the appearance of multi-drug resistant forms. Therefore, new targets are needed to address the growing emergence of bacterial resistance and for antitubercular drug development. Efficient iron acquisition is crucial for the pathogenesis of Mycobacterium tuberculosis, because it serves as cofactor in many essential biological processes, including DNA biosynthesis and cellular respiration. Bacteria acquire iron chelating non-heme iron from the host using the siderophore mycobactins and carboxymycobactins and by the uptake of heme iron released by damaged red blood cells, through several acquisition systems. Drug discovery focused its efforts on the inhibition of MbtI and MbtA, which are are two enzymes involved in the mycobactin biosynthetic pathway. In particular, MbtI inhibitors have been studied in vitro, while MbtA inhibitors showed activity also in infected mice. Another class of compounds, MmpL3 inhibitors, showed antitubercular activity in vitro and in vivo, but their mechanism of action seems to be off-target. Some compounds inhibiting 4'-phosphopantetheinyl transferase were discovered but not tested on in vivo assays. The available data reported in this study based on inhibitors and gene deletion studies, suggest that targeting iron acquisition systems could be considered a promising antitubercular strategy. Due to their redundancy, the relative importance of each pathway for Mycobacterium tuberculosis survival has still to be determined. Thus, in vivo studies with new, potent and specific inhibitors are needed to highlight target selection.

  15. Cosmic Origins Spectrograph: On-Orbit Performance of Target Acquisitions

    Science.gov (United States)

    Penton, Steven V.

    2010-07-01

    COS is a slit-less spectrograph with a very small aperture (R=1.2500). To achieve the desired wavelength accuracies, HST+COS must center the target to within 0.100 of the center of the aperture for the FUV channel, and 0.0400 for NUV. During SMOV and early Cycle 17 we fine-tuned the COS target acquisition (TA) procedures to exceed this accuracy for all three COS TA modes; NUV imaging, NUV spectroscopic, and FUV spectroscopic. In Cycle 17, we also adjusted the COSto- FGS offsets in the SIAF file. This allows us to recommend skipping the time consuming ACQ/SEARCH in cases where the target coordinates are well known. Here we will compare the on-orbit performance of all COS TA modes in terms of centering accuracy, efficiency, and required signal-to-noise (S/N).

  16. Review of Current Aided/Automatic Target Acquisition Technology for Military Target Acquisition Tasks

    Science.gov (United States)

    2011-07-01

    new advancements in military-relevant performance. C©2011 Society of Photo -Optical Instrumentation Engineers (SPIE). [DOI: 10.1117/1.3601879] Subject...indication (MTI) become first- step candidate approaches. Change detection can be a major tool in improvised explosive detection (IED) detection. Dis- turbed...Wilson, “A time-critical targeting roadmap,” Air Command and Staff Collage , Maxwell AFB, AL, Source Code 405502 ADA420658 (April 2002). 8. J. R. Rufa

  17. Hepatitis C virus acquisition among Egyptians: analysis of a 10-year surveillance of acute hepatitis C.

    Science.gov (United States)

    Mohsen, Amira; Bernier, Adeline; LeFouler, Lenaig; Delarocque-Astagneau, Elisabeth; El-Daly, Mai; El-Kafrawy, Sherif; El-Mango, Salwa; Abdel-Hamid, Mohamed; Gadallah, Mohsen; Esmat, Gamal; Mohamed, Mostafa K; Fontanet, Arnaud

    2015-01-01

    To identify current risk factors for hepatitis C virus (HCV) acquisition among Egyptians. Patients with acute HCV were identified through a surveillance system of acute hepatitis in four fever hospitals in Egypt between 2002 and 2012. Case-control analysis was conducted, cases being incident acute symptomatic HCV and controls being acute hepatitis A identified at the same hospitals. The questionnaire covered iatrogenic, community and household exposures to HCV in the 1-6 months prior to onset of symptoms. Multivariate models were built to identify risk factors associated with HCV acquisition among non-drug users and drug users separately. Among non-drug users, hospital admission was independently associated with acute HCV infection (OR = 4.2, 95% CI = 1.7-10.5). Several iatrogenic procedures, for example admission in a surgery unit, sutures, IV injections and IV infusions, highly correlated with hospital admission, were also associated with acute HCV infection and could have been used in the final model instead of hospital admission. Among drug users, identified risk factors were multiple sexual relations (OR = 4.0, 95% CI = 1.1-14.7), intravenous drug use (OR = 3.9, 95% CI = 1.2-13.0) and shaving at the barbershops (OR = 8.7, 95% CI = 2.4-31.4). Illiteracy and marriage were significant risk factors in both groups. Invasive medical procedures are still a major risk for acquiring new HCV infections in Egypt, as is illicit drug use in spreading HCV infection. © 2014 John Wiley & Sons Ltd.

  18. radR: an open-source platform for acquiring and analysing data on biological targets observed by surveillance radar.

    Science.gov (United States)

    Taylor, Philip D; Brzustowski, John M; Matkovich, Carolyn; Peckford, Michael L; Wilson, Dave

    2010-10-26

    Radar has been used for decades to study movement of insects, birds and bats. In spite of this, there are few readily available software tools for the acquisition, storage and processing of such data. Program radR was developed to solve this problem. Program radR is an open source software tool for the acquisition, storage and analysis of data from marine radars operating in surveillance mode. radR takes time series data with a two-dimensional spatial component as input from some source (typically a radar digitizing card) and extracts and retains information of biological relevance (i.e. moving targets). Low-level data processing is implemented in "C" code, but user-defined functions written in the "R" statistical programming language can be called at pre-defined steps in the calculations. Output data formats are designed to allow for future inclusion of additional data items without requiring change to C code. Two brands of radar digitizing card are currently supported as data sources. We also provide an overview of the basic considerations of setting up and running a biological radar study. Program radR provides a convenient, open source platform for the acquisition and analysis of radar data of biological targets.

  19. Maritime target and sea clutter measurements with a coherent Doppler polarimetric surveillance radar

    NARCIS (Netherlands)

    Smith, A.J.E.; Gelsema, S.J.; Kester, L.J.H.M.; Melief, H.W.; Premel Cabic, G.; Theil, A.; Woudenberg, E.

    2002-01-01

    Doppler polarimetry in a surveillance radar for the maritime surface picture is considered. This radar must be able to detect low-RCS targets in littoral environments. Measurements on such targets have been conducted with a coherent polarimetric measurement radar in March 2001 and preliminary

  20. Maritime target and sea clutter measurements with a coherent Doppler polarimetric surveillance radar

    NARCIS (Netherlands)

    Smith, A.J.E.; Gelsema, S.J.; Kester, L.J.H.M.; Melief, H.W.; Premel Cabic, G.; Theil, A.; Woudenberg, E.

    2002-01-01

    Doppler polarimetry in a surveillance radar for the maritime surface picture is considered. This radar must be able to detect low-RCS targets in littoral environments. Measurements on such targets have been conducted with a coherent polarimetric measurement radar in March 2001 and preliminary result

  1. Numerical simulation of radar surveillance for the ship target in oceanic clutters

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A fast iterative approach of generalized forward-backward method with the spectrum acceleration algorithm (GFBM/SAA) is developed for solving electromagnetic field integral equation and is applied to numerical simulation of radar surveillance of the ship target in oceanic clutters. Randomly rough surface is realized by the Monte Carlo method using the Pierson-Moskowitz spectrum. Numerical results of bistatic and back-scattering from the ship target and oceanic clutters demonstrate the functional dependencies upon the situation of radar surveillance such as the incidence and observation angles, radar altitude, ship RCS and other oceanic conditions.

  2. Targeted CWD surveillance mule deer HD 600 February 2015

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — February 2015 Progress report for Targeted Chronic Wasting Disease Project in Montana Hunting District 600. From February 5-6th, 25 mule deer were captured in...

  3. Selecting Targeted Symptoms/Syndromes for Syndromic Surveillance in Rural China

    Science.gov (United States)

    Tan, Li; Zhang, Jie; Cheng, Liwei; Yan, Weirong; Diwan, Vinod K.; Long, Lu; Nie, Shaofa

    2013-01-01

    Objective To select the potential targeted symptoms/syndromes as early warning indicators for epidemics or outbreaks detection in rural China. Introduction Patients’ chief complaints (CCs) as a common data source, has been widely used in syndromic surveillance due to its timeliness, accuracy and availability (1). For automated syndromic surveillance, CCs always classified into predefined syndromic categories to facilitate subsequent data aggregation and analysis. However, in rural China, most outpatient doctors recorded the information of patients (e.g. CCs) into clinic logs manually rather than computers. Thus, more convenient surveillance method is needed in the syndromic surveillance project (ISSC). And the first and important thing is to select the targeted symptoms/syndromes. Methods Epidemiological analysis was conducted on data from case report system in Jingmen City (one study site in ISSC) from 2004 to 2009. Initial symptoms/syndromes were selected by literature reviews. And finally expert consultation meetings, workshops and field investigation were held to confirm the targeted symptoms/syndromes. Results 10 kinds of infectious diseases, 6 categories of emergencies, and 4 bioterrorism events (i.e. plague, anthrax, botulism and hemorrhagic fever) were chose as specific diseases/events for monitoring (Table 1). Two surveillance schemes were developed by reviewing on 565 literatures about clinical conditions of specific diseases/events and 14 literatures about CCs based syndromic surveillance. The former one was to monitor symptoms (19 initial symptoms), and then aggregation or analysis on single or combined symptom(s); and the other one was to monitor syndromes (9 initial syndromes) directly (Table 2). The consultation meeting and field investigation identified three issues which should be considered: 1) the abilities of doctors especially village doctors to understand the definitions of symptoms/syndromes; 2) the workload of data collection; 3) the

  4. Upgrade of the SOFIA target acquisition and tracking cameras

    Science.gov (United States)

    Wolf, Jürgen; Wiedemann, Manuel; Pfüller, Enrico; Lachenmann, Michael; Hall, Helen J.; Röser, Hans-Peter

    2014-07-01

    The Stratospheric Observatory for Infrared Astronomy (SOFIA) uses three visible range CCD cameras with different optics for target acquisition and tracking. The Wide Field Imager (WFI with 68mm f/2.0 optics) and the Fine Field Imager (FFI with 254mm f/2.8 optics) are mounted on the telescope front ring and are therefore exposed to stratospheric conditions in flight. The Focal Plane Imager (FPI) receives visible light from the 2.5m Cassegrain/Nasmyth telescope via a dichroic tertiary mirror and is mounted inside the pressurized aircraft cabin at typically +20°C. An upgrade of these three imagers is currently in progress. The new FPI was integrated in February 2013 and is operating as SOFIA's main tracking camera since then. The new FFI and WFI are planned to be integrated in summer of 2015. Andor iXonEM+ DU- 888 cameras will be used in all three imagers to significantly increase the sensitivity compared to the previous CCD sensors. This will allow for tracking on fainter stars, e.g. the new FPI can track on a 16mag star with an integration time of 2 sec. While the FPI uses a commercial off the shelf camera, the cameras for FFI and WFI are extensively modified to withstand the harsh stratospheric environment. The two front ring imagers will also receive new optics to improve the image quality and to provide a stable focus position throughout the temperature range that SOFIA operates in. In this paper we will report on the results of the new FPI and the status of the FFI/WFI upgrade work. This includes the selection and design of the new optics and the design and testing of a prototype camera for the stratosphere. We will also report on preparations to make the new FPI available for scientific measurements.

  5. Error Analysis of Fast Moving Target Geo-location in Wide Area Surveillance Ground Moving Target Indication Mode

    Directory of Open Access Journals (Sweden)

    Zheng Shi-chao

    2013-12-01

    Full Text Available As an important mode in airborne radar systems, Wide Area Surveillance Ground Moving Target Indication (WAS-GMTI mode has the ability of monitoring a large area in a short time, and then the detected moving targets can be located quickly. However, in real environment, many factors introduce considerable errors into the location of moving targets. In this paper, a fast location method based on the characteristics of the moving targets in WAS-GMTI mode is utilized. And in order to improve the location performance, those factors that introduce location errors are analyzed and moving targets are relocated. Finally, the analysis of those factors is proved to be reasonable by simulation and real data experiments.

  6. Predictable Vertical Targets Acquisition - The Eye-Head Coordination and the Triggering Effect

    Science.gov (United States)

    Kolev, Ognyan I.; Reschke, Millard F.

    2016-01-01

    The current study was designed to investigate target acquisition in the vertical plane with emphasis on establishing strategy differences associated with acquisition triggering methods. Eight subjects were tested. Measurements consisted of target acquisition time, eye-head latency differences, velocity of gaze, eyes and head, and head amplitude. Using three-way repeated measures ANOVA the results show that the strategy for acquisition of predictable visual targets in vertical plane with the head unrestrained significantly depended on: (i) the direction of the gaze motion with respect to the gravity vector (i.e. there is significant up-down asymmetry); (ii) the angular distance of the target and (iii) the method of triggering the command to acquire the target - external versus internal. The data also show that when vertical acquisition is compared with triggering methods in the horizontal plane there is a difference in overall strategy for the acquisition of targets with the same spatial distances from straight ahead gaze when both the eyes and head are used. Among the factors contributing to the difference in strategy for vertical target acquisition are: the gravitational vector, the relationship of target displacement and vestibular activation, biomechanical and neural control, asymmetries and the difference in the vertical field of view.

  7. Final Report: Non-Visible, Automated Target Acquisition and Tracking

    Energy Technology Data Exchange (ETDEWEB)

    Ziock, Klaus-Peter [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Fabris, Lorenzo [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Goddard, James K. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hornback, Donald Eric [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Karnowski, Thomas Paul [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Newby, Jason [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-10-01

    The Roadside Tracker (RST) represents a new approach to radiation portal monitors. It uses a combination of gamma-ray and visible-light imaging to localize gamma-ray radiation sources to individual vehicles in free-flowing, multi-lane traffic. Deployed as two trailers that are parked on either side of the roadway (Fig. 1); the RST scans passing traffic with two large gamma-ray imagers, one mounted in each trailer. The system compensates for vehicle motion through the imager’s fields of view by using automated target acquisition and tracking (TAT) software applied to a stream of video images. Once a vehicle has left the field of view, the radiation image of that vehicle is analyzed for the presence of a source, and if one is found, an alarm is sounded. The gamma-ray image is presented to the operator together with the video image of the traffic stream when the vehicle was approximately closest to the system (Fig. 2). The offending vehicle is identified with a bounding box to distinguish it from other vehicles that might be present at the same time. The system was developed under a previous grant from the Department of Homeland Security’s (DHS’s) Domestic Nuclear Detection Office (DNDO). This report documents work performed with follow-on funding from DNDO to further advance the development of the RST. Specifically, the primary thrust was to extend the performance envelope of the system by replacing the visible-light video cameras used by the TAT software with sensors that would allow operation at night and during inclement weather. In particular, it was desired to allow operation after dark without requiring external lighting. As part of this work, the system software was also upgraded to allow the use of 64-bit computers, the current generation operating system (OS), software development environment (Windows 7 vs. Windows XP, and current Visual Studio.Net), and improved software version controls (GIT vs. Source Safe.) With the upgraded performance allowed by

  8. An information potential approach for tracking and surveilling multiple moving targets using mobile sensor agents

    Science.gov (United States)

    Lu, W.; Zhang, G.; Ferrari, S.; Fierro, R.; Palunko, I.

    2011-05-01

    The problem of surveilling moving targets using mobile sensor agents (MSAs) is applicable to a variety of fields, including environmental monitoring, security, and manufacturing. Several authors have shown that the performance of a mobile sensor can be greatly improved by planning its motion and control strategies based on its sensing objectives. This paper presents an information potential approach for computing the MSAs' motion plans and control inputs based on the feedback from a modified particle filter used for tracking moving targets. The modified particle filter, as presented in this paper implements a new sampling method (based on supporting intervals of density functions), which accounts for the latest sensor measurements and adapts, accordingly, a mixture representation of the probability density functions (PDFs) for the target motion. It is assumed that the target motion can be modeled as a semi-Markov jump process, and that the PDFs of the Markov parameters can be updated based on real-time sensor measurements by a centralized processing unit or MSAs supervisor. Subsequently, the MSAs supervisor computes an information potential function that is communicated to the sensors, and used to determine their individual feedback control inputs, such that sensors with bounded field-of-view (FOV) can follow and surveil the target over time.

  9. SURVEILLANCE OF MOVING TARGET BEHIND PARTITIONS USING A UWB-TWDR

    Institute of Scientific and Technical Information of China (English)

    Li Yu; Huang Chunlin; Su Yi

    2005-01-01

    This paper firstly analyzes the property of the low frequency electromagnetic wave,which can penetrate many types of non-metallic materials, and the ability of Ultra-Wide Band (UWB) impulse signal which has high range resolution. Then the methods are discussed for conducting surveillance through walls, detecting and locating the moving persons behind the partitions. The schematic diagram of Through-Wall Detecting Radar (TWDR) and the models of moving target are shown and the principle of detecting the moving target is also proyided with coherent superimposing technique on a range gate. Finally an algorithm for estimating the location of targets is given. The performance of TWDR is validated by the experiments of penetrating a wood block, a red brick wall and a reinforced concrete wall.

  10. A pilot study for targeted surveillance of bovine spongiform encephalopathy in Nigeria.

    Science.gov (United States)

    Nwankiti, O O; Ikeh, E I; Asala, O; Seuberlich, T

    2013-06-01

    Bovine spongiform encephalopathy (BSE), popularly known as 'mad cow disease', led to an epidemic in Europe that peaked in the mid-1990s. Its impact on developing countries, such as Nigeria, has not been fully established as information on livestock and surveillance has eluded those in charge of this task. The BSE risk to Nigeria's cattle population currently remains undetermined, which has resulted in international trade restrictions on commodities from the cattle population. This is mainly because of a lack of updated BSE risk assessments and disease surveillance data. To evaluate the feasibility of BSE surveillance in Nigeria, we carried out a pilot study targeting cattle that were presented for emergency or casualty slaughter. In total, 1551 cattle of local breeds, aged 24 months and above were clinically examined. Ataxia, recumbency and other neurological signs were topmost on our list of criteria. A total of 96 cattle, which correspond to 6.2%, presented clinical signs that supported a suspect of BSE. The caudal brainstem tissues of these animals were collected post-mortem and analysed for the disease-specific form of the prion protein using a rapid test approved by the International Animal Health Organization (OIE). None of the samples were positive for BSE. Although our findings do not exclude the presence of BSE in Nigeria, they do demonstrate that targeted sampling of clinically suspected cases of BSE is feasible in developing countries. In addition, these findings point to the possibility of implementing clinical monitoring schemes for BSE and potentially other diseases with grave economic and public health consequences.

  11. Multi-modal target detection for autonomous wide area search and surveillance

    Science.gov (United States)

    Breckon, Toby P.; Gaszczak, Anna; Han, Jiwan; Eichner, Marcin L.; Barnes, Stuart E.

    2013-10-01

    Generalised wide are search and surveillance is a common-place tasking for multi-sensory equipped autonomous systems. Here we present on a key supporting topic to this task - the automatic interpretation, fusion and detected target reporting from multi-modal sensor information received from multiple autonomous platforms deployed for wide-area environment search. We detail the realization of a real-time methodology for the automated detection of people and vehicles using combined visible-band (EO), thermal-band (IR) and radar sensing from a deployed network of multiple autonomous platforms (ground and aerial). This facilities real-time target detection, reported with varying levels of confidence, using information from both multiple sensors and multiple sensor platforms to provide environment-wide situational awareness. A range of automatic classification approaches are proposed, driven by underlying machine learning techniques, that facilitate the automatic detection of either target type with cross-modal target confirmation. Extended results are presented that show both the detection of people and vehicles under varying conditions in both isolated rural and cluttered urban environments with minimal false positive detection. Performance evaluation is presented at an episodic level with individual classifiers optimized for maximal each object of interest (vehicle/person) detection over a given search path/pattern of the environment, across all sensors and modalities, rather than on a per sensor sample basis. Episodic target detection, evaluated over a number of wide-area environment search and reporting tasks, generally exceeds 90%+ for the targets considered here.

  12. Perspective and predictive information in the cockpit as a target acquisition aid

    NARCIS (Netherlands)

    Breda, L. van

    1998-01-01

    In two flight simulation experiments, the potential benefits of 3D perspective) radar displays for situational awareness support were investigated. In the experimental set-up, a target acquisition task was employed in which subjects, flying a fighter aircraft, were required to locate a target that s

  13. Targeted and non-targeted drug screening in whole blood by UHPLC-TOF-MS with data-independent acquisition

    DEFF Research Database (Denmark)

    Mollerup, Christian Brinch; Dalsgaard, Petur Weihe; Mardal, Marie

    2017-01-01

    ). Analytical data were acquired using ultra-high-performance liquid chromatography coupled with a time-of-flight mass spectrometer (UHPLC-TOF-MS) with data-independent acquisition (DIA). We present a combined targeted and non-targeted screening, where peak deconvolution and filtering reduced the number....... Running targeted-screening true-positive identifications through the filters retained 73% of identifications. In the non-targeted screening, nine of the spiked SBAs were identified in the concentration range of 0.005-0.1 mg/kg, of which three were tentatively identified at concentrations below those...

  14. Collaborative 3D Target Tracking in Distributed Smart Camera Networks for Wide-Area Surveillance

    Directory of Open Access Journals (Sweden)

    Xenofon Koutsoukos

    2013-05-01

    Full Text Available With the evolution and fusion of wireless sensor network and embedded camera technologies, distributed smart camera networks have emerged as a new class of systems for wide-area surveillance applications. Wireless networks, however, introduce a number of constraints to the system that need to be considered, notably the communication bandwidth constraints. Existing approaches for target tracking using a camera network typically utilize target handover mechanisms between cameras, or combine results from 2D trackers in each camera into 3D target estimation. Such approaches suffer from scale selection, target rotation, and occlusion, drawbacks typically associated with 2D tracking. In this paper, we present an approach for tracking multiple targets directly in 3D space using a network of smart cameras. The approach employs multi-view histograms to characterize targets in 3D space using color and texture as the visual features. The visual features from each camera along with the target models are used in a probabilistic tracker to estimate the target state. We introduce four variations of our base tracker that incur different computational and communication costs on each node and result in different tracking accuracy. We demonstrate the effectiveness of our proposed trackers by comparing their performance to a 3D tracker that fuses the results of independent 2D trackers. We also present performance analysis of the base tracker along Quality-of-Service (QoS and Quality-of-Information (QoI metrics, and study QoS vs. QoI trade-offs between the proposed tracker variations. Finally, we demonstrate our tracker in a real-life scenario using a camera network deployed in a building.

  15. Target Acquisition for Projectile Vision-Based Navigation

    Science.gov (United States)

    2014-03-01

    is now a preferred heading, the target distribution is no longer *The center of the annulus in...the solution is unique and coincident with the median. 14 small , the location of the spatial median may be approximated by the coordinate...wise median. Indeed, table 6 shows that for small , the coordinate-wise median almost exactly overlays the spatial median and appears (even for

  16. Target-tracking and identity management algorithms for air traffic surveillance

    Science.gov (United States)

    Balakrishnan, Hamsa

    The air traffic control system of the United States is responsible for managing traffic in the National Airspace System; safety is a paramount concern. The air traffic surveillance network has the task of collecting and processing information on the positions, velocities and identities of the aircraft in the system, before presenting it to air traffic controllers to use in maintaining an orderly flow of traffic. This dissertation attempts to design techniques that provide controllers with high-fidelity information about the aircraft in their controlled airspace, using the observations of the air traffic surveillance network. We propose algorithms for the efficient tracking of aircraft, as well as for maintaining beliefs of their identities. Such methods would improve the processing of aircraft situation data, particularly in a congested airspace with general aviation. In this thesis, we propose an algorithmic framework for the simultaneous tracking and identity management of multiple maneuvering targets. We design an algorithm that efficiently tracks the positions, velocities, flight modes, and identities of multiple aircraft in cluttered environments. We tackle the challenges of data association, identity management and state estimation of aircraft trajectories by proposing a modification of the Joint Probabilistic Data Association algorithm, an algorithm based on identity-mass flow, and a state estimation algorithm for tracking hybrid systems, respectively. The identity of each aircraft, an essential feature of aircraft situation data, is often not available but needs to be inferred from radar observations, and maintained in terms of probabilities. We present an algorithm to update the probabilistic matrices that represent the belief of aircraft identities, in the presence of intermittent measurements. We demonstrate the performance of the framework using examples drawn from air traffic surveillance. We also consider the problem of identifying stochastic hybrid

  17. Dynamic Target Acquisition: Empirical Models of Operator Performance.

    Science.gov (United States)

    1980-08-01

    tarjet to )e centered. At the beginning of those trials with ,i t.trqet present, ,t woiild I nywhere withln the center two-thirds (if the d%,,1 y. MD...Target Tpe Tank Half-Track Truck Low 0.206 0.169 0.191 Medium 0.252 0.205 0.226 High 0.253 o.I l 0.211 Speed FT_SEC. x_ Tarjet 7 ype Tank Half-Track Truck...1 25915 27212 I Scene Complexity Tarjet Type ORDERED MEANS 22521 23190 27743 NS 22521 * 23190 * 27743 I I I I I I I I *p •.05 1723 AOCDOPWOVELL

  18. Risk-targeted selection of agricultural holdings for post-epidemic surveillance: estimation of efficiency gains.

    Directory of Open Access Journals (Sweden)

    Ian G Handel

    Full Text Available Current post-epidemic sero-surveillance uses random selection of animal holdings. A better strategy may be to estimate the benefits gained by sampling each farm and use this to target selection. In this study we estimate the probability of undiscovered infection for sheep farms in Devon after the 2001 foot-and-mouth disease outbreak using the combination of a previously published model of daily infection risk and a simple model of probability of discovery of infection during the outbreak. This allows comparison of the system sensitivity (ability to detect infection in the area of arbitrary, random sampling compared to risk-targeted selection across a full range of sampling budgets. We show that it is possible to achieve 95% system sensitivity by sampling, on average, 945 farms with random sampling and 184 farms with risk-targeted sampling. We also examine the effect of ordering samples by risk to expedite return to a disease-free status. Risk ordering the sampling process results in detection of positive farms, if present, 15.6 days sooner than with randomly ordered sampling, assuming 50 farms are tested per day.

  19. Bistatic weak target detection method using non-cooperative air surveillance radar

    Institute of Scientific and Technical Information of China (English)

    Zengping Chen

    2015-01-01

    At present, most of the passive radar system re-searches utilize FM radios, TV broadcasts, navigation satel ites, etc. as il uminators. The transmitted signals are not specifical y de-signed radar waveforms. In this work, the frequency agile, phased array air surveil ance radar (ASR) is used as the il uminator of opportunity to detect the weak target. The phased array tech-nology can help realize beam agility to track targets from diffe-rent aspects simultaneously. The frequency agility technology is widely employed in radar system design to increase the ability of anti-jamming and increase the detection probability. While the fre-quency bandwidth of radar signals is usual y wide and the range resolution is high, the range cel migration effect is obvious during the long time integration of non-cooperative bistatic radar. In this context, coherent integration methods are not applicable. In this work, a parametric non-coherent integration algorithm based on task de-interweaving is proposed. Numerical experiments verify that this is effective in weak target detection.

  20. LWIR hyperspectral change detection for target acquisition and situation awareness in urban areas

    NARCIS (Netherlands)

    Dekker, R.J.; Schwering, P.B.W.; Benoist, K.W.; Pignatti, S.; Santini, F.; Friman, O.

    2013-01-01

    This paper studies change detection of LWIR (Long Wave Infrared) hyperspectral imagery. Goal is to improve target acquisition and situation awareness in urban areas with respect to conventional techniques. Hyperspectral and conventional broadband high-spatial-resolution data were collected during th

  1. Preservation and Dissolution of the Target Firm's Embedded Ties in Acquisitions

    NARCIS (Netherlands)

    S. Spedale-Latimer (Simona); F.A.J. van den Bosch (Frans); H.W. Volberda (Henk)

    2006-01-01

    textabstractOur study builds on extant theory on embeddness to concentrate on the process of preservation and dissolution of the target firm’s embedded ties in acquisitions. We identify four critical areas - communication, idiosyncratic investments, inter-personal relations and, personnel turnover –

  2. Target acquisition: Human observer performance studies and TARGAC model validation (Final Report)

    NARCIS (Netherlands)

    Valeton, J.M.; Bijl, P.; Gillespie, P.

    1995-01-01

    Human target acquisition performance was studied using the thermal imagery that was collected during Battlefield Emissives Sources Trials under the European Theater Weather and Obscurants, (BEST TWO), organized by NATO AC243/Panel4/RSG.l5 in 1990. Recognition and identification probabilities were me

  3. Target acquisition: Human observer performance studies and TARGAC model validation (Final Report)

    NARCIS (Netherlands)

    Valeton, J.M.; Bijl, P.; Gillespie, P.

    1995-01-01

    Human target acquisition performance was studied using the thermal imagery that was collected during Battlefield Emissives Sources Trials under the European Theater Weather and Obscurants, (BEST TWO), organized by NATO AC243/Panel4/RSG.l5 in 1990. Recognition and identification probabilities were

  4. Risk factors for acquisition of hepatitis C virus infection: a case series and potential implications for disease surveillance

    Science.gov (United States)

    Yee, Leland J; Weiss, Heidi L; Langner, Rebecca G; Herrera, Jorge; Kaslow, Richard A; van Leeuwen, Dirk J

    2001-01-01

    Background Transmission of hepatitis C vims (HCV) is strongly associated with use of contaminated blood products and injection drugs. Other "non-parental" modes of transmission including sexual activity have been increasingly recognized. We examined risk factors for acquiring HCV in patients who were referred to two tertiary care centers and enrolled in an antiviral therapy protocol. Methods Interviews of 148 patients were conducted apart from their physician evaluation using a structured questionnaire covering demographics and risk factors for HCV acquisition. Results Risk factors (blood products, injection/intranasal drugs, razor blades/ toothbrushes, body/ear piercing, occupational exposure, sexual activity) were identified in 141 (95.3%) of participants; 23 (15.5%) had one (most frequently blood or drug exposure), 41 (27.7%) had two, and 84 (53.4%) had more than two risk factors. No patient reported sexual activity as a sole risk factor. Body piercing accounted for a high number of exposures in women. Men were more likely to have exposure to street drugs but less exposure to blood products than women. Blood product exposure was less common in younger than older HCV patients. Conclusion One and often multiple risk factors could be identified in nearly all HCV-infected patients seen in a referral practice. None named sexual transmission as the sole risk factor. The development of a more complete profile of factors contributing to transmission of HCV infection may assist in clinical and preventive efforts. The recognition of the potential presence of multiple risk factors may have important implications in the approach to HCV surveillance, and particularly the use of hierarchical algorithms in the study of risk factors. PMID:11518542

  5. 3D coronary MR angiography at 1.5 T: Volume-targeted versus whole-heart acquisition.

    Science.gov (United States)

    Jin, Hang; Zeng, Meng-Su; Ge, Mei-Ying; Yun, Hong; Yang, Shan

    2013-09-01

    To compare volume-targeted acquisition with whole-heart acquisition in 1.5-T free-breathing 3D coronary magnetic resonance angiography (MRA) with parallel imaging. The major coronary arteries were imaged in 36 subjects using the whole-heart and volume-targeted acquisitions with comparable imaging parameters. The quantitative and semiquantitative data derived from these two acquisition methods were analyzed statistically, with P coronary artery (RCA) / left circumflex artery (LCX)- and the left main (LM) / left anterior descending (LAD)-targeted acquisitions had similar results in navigator efficiencies and apparent signal-to-noise ratio (SNR) in comparison with whole-heart acquisition. Apparent contrast-to-noise ratio (CNR) of the volume-targeted imaging was significantly higher than that of the whole-heart imaging. The imaging time required for a whole-heart scan was significantly longer than each of the RCA/LCX- and LM/LAD-targeted acquisitions. However, the sum of scanning times derived from volume-targeted imaging was significantly longer than that of whole-heart acquisition. Both RCA/LCX- and LM/LAD-targeted acquisition yield higher vessel sharpness and overall image quality in comparison with whole-heart acquisition. The lengths of the major coronary arteries were not significantly different for the whole-heart and volume-targeted approaches. The whole-heart method was obviously superior to the volume-targeted method in terms of visualization of the posterior descending artery. For current 1.5-T navigator coronary MRA, volume-targeted and whole-heart acquisitions have their own advantages and the choice of methods may vary in accordance with the different aims of clinical practice. Copyright © 2013 Wiley Periodicals, Inc., a Wiley company.

  6. Epitope target structures of Fc-mediated effector function during HIV-1 acquisition.

    Science.gov (United States)

    Lewis, George K; Guan, Yongjun; Kamin-Lewis, Roberta; Sajadi, Mohammad; Pazgier, Marzena; Devico, Anthony L

    2014-05-01

    This review analyzes recent studies suggesting that highly conserved epitopes in the HIV-1 Env trimer are targets of potentially protective nonneutralizing antibodies that mediate antibody-dependent cellular cytotoxicity. Recent studies in both non-human primates and humans suggest that nonneutralizing antibodies play a role in blocking infection with hybrid simian HIV (SHIV)/simian immunodeficiency virus (SIV) or HIV-1 by Fc-mediated effector function, in particular antibody-dependent cellular cytotoxicity. Further, several studies implicate highly conserved epitopes in the C1 region of gp120 as targets of these antibodies. However, these suggestions are controversial, as passive immunization studies do not indicate that such antibodies can block acquisition in non-human primates. Potential reasons for this discrepancy are discussed in the structural context of potent antibody-dependent cellular cytotoxicity epitopes on target cells during the narrow window of opportunity when antibodies can block HIV-1 acquisition. Cumulative evidence suggests that, in addition to virus neutralization, Fc-mediated effector responses to highly conserved epitopes in the HIV-1 trimer play distinct as well as overlapping roles in blocking HIV-1 acquisition. Evidence will be discussed as to whether nonneutralizing antibodies specific for epitopes on the HIV-1 Env trimer that become exposed during viral entry contribute significantly to blocking HIV-1 acquisition.

  7. Quantifying warfighter performance in a target acquisition and aiming task using wireless inertial sensors.

    Science.gov (United States)

    Davidson, Steven P; Cain, Stephen M; McGinnis, Ryan S; Vitali, Rachel R; Perkins, Noel C; McLean, Scott G

    2016-09-01

    An array of inertial measurement units (IMUS) was experimentally employed to analyze warfighter performance on a target acquisition task pre/post fatigue. Eleven participants (5M/6F) repeated an exercise circuit carrying 20 kg of equipment until fatigued. IMUs secured to the sacrum, sternum, and a rifle quantified peak angular velocity magnitude (PAVM) and turn time (TT) on a target acquisition task (three aiming events with two 180° turns) within the exercise circuit. Turning performance of two turns was evaluated pre/post fatigue. Turning performance decreased with fatigue. PAVMs decreased during both turns for the sternum (p performance after fatigue. Similar methodologies can be applied to many movement tasks, including quantifying movement performance for load, fatigue, and equipment conditions.

  8. Air-to-Ground Target Acquisition Source Book: A Review of the Literature

    Science.gov (United States)

    1974-09-30

    its backgrotnid. Middleton (1936) studied the applicability of the C.I.E. metric to that of colored point sources. Konchmieder ( 1924 ) thought that...igated in two studieu per- formed by Rusia , Snyder, and GreeninE, (965u) and Rusis, Snyder, Greening, and Rawlingg (1965b), which repreosent exp erionto...acquisition of ground targets by observers in low-leve: high-speed aircraft. Sandia Laboratory, Albuquerque, New Mexico , SC-TM-66-54, February 1966

  9. Identification of Soldier Behaviors Associated with Search and Target Acquisition (STA)

    Science.gov (United States)

    2010-05-01

    3 UNCLASSIFIED different gaps. Each of these FACTs focused on several critical research areas ( CRAs ). The Fiscal Year (FY) 08 Soldier FACT Call...for Proposals identified the following CRA : Soldier Search and Target Acquisition (STA): Determine validity of current Soldier STA processes for...place him in a position where he can engage any threats (i.e., can see where to aim and shoot ). The order of behaviors for “audio cues” and

  10. EFFECTS OF MERGERS AND ACQUISITIONS ON FINANCIAL PERFORMANCE OF THE TARGET COMPANY

    Directory of Open Access Journals (Sweden)

    ADRIANA DUŢESCU

    2013-05-01

    Full Text Available Many studies revealed the fact that mergers and acquisitions are a risky business. Disregarding the M&A advisers’ fees, evaluations show that most of the companies completing M&A transactions disappoint to deliver on promised financial performance. But, as many would say, it is an investment and the highest risks produce the highest results - whether they're good or bad. Within this paper, we were intending to analyse the rate of success of relevant M&A transactions that took place in 2007 in Romania, by comparing the financial statements of the target companies before and after the acquisition, in the current economic context. The main objective of this study is to generally determine the successfulness of the M&A transactions, starting from assessing changes induced by the M&A transaction to the target company, with the help of three important financial ratios: profit margin, ROE and receivable collection period. Even though the study may present some bias, we have tried to be as objective as possible and not influence its outcome: that 80% of 10 most important private Mergers and Acquisitions taking place in Romania in 2007 and that meet several conditions: o The target is part of the consumer goods and services market (mainly trade and tourism and is an important player in its industry o The target is a Romanian private company, and its shares are not listed on the stock exchange o The acquirer is majority shareholder after the transaction The target company remained as a sole entity and was not integrated into the mother company after the transaction were not successful.

  11. Quiet eye training: the acquisition, refinement and resilient performance of targeting skills.

    Science.gov (United States)

    Vine, Samuel J; Moore, Lee J; Wilson, Mark R

    2014-01-01

    How we learn and refine motor skills in the most effective manner and how we prevent performance breakdown in pressurised or demanding circumstances are among the most important questions within the sport psychology and skill acquisition literature. The quiet eye (QE) has emerged as a characteristic of highly skilled perceptual and motor performance in visually guided motor tasks. Defined as the final fixation that occurs prior to a critical movement, over 70 articles have been published in the last 15 years probing the role that the QE plays in underpinning skilled performance. The aim of this review is to integrate research findings from studies examining the QE as a measure of visuomotor control in the specific domain of targeting skills; motor skills requiring an object to be propelled to a distant target. Previous reviews have focused primarily on the differences in QE between highly skilled performers and their less skilled counterparts. The current review aims to discuss contemporary findings relating to 1. The benefits of QE training for the acquisition and refinement of targeting skills; 2. The effects of anxiety upon the QE and subsequent targeting skill performance and 3. The benefits of QE training in supporting resilient performance under elevated anxiety. Finally, potential processes through which QE training proffers this advantage, including improved attentional control, response programming and external focus, will be discussed and directions for future research proposed.

  12. A review on mass spectrometry-based quantitative proteomics: Targeted and data independent acquisition.

    Science.gov (United States)

    Vidova, Veronika; Spacil, Zdenek

    2017-04-29

    Mass spectrometry (MS) based proteomics have achieved a near-complete proteome coverage in humans and in several other organisms, producing a wealth of information stored in databases and bioinformatics resources. Recent implementation of selected/multiple reaction monitoring (SRM/MRM) technology in targeted proteomics introduced the possibility of quantitatively follow-up specific protein targets in a hypothesis-driven experiment. In contrast to immunoaffinity-based workflows typically used in biological and clinical research for protein quantification, SRM/MRM is characterized by high selectivity, large capacity for multiplexing (approx. 200 proteins per analysis) and rapid, cost-effective transition from assay development to deployment. The concept of SRM/MRM utilizes triple quadrupole (QqQ) mass analyzer to provide inherent reproducibility, unparalleled sensitivity and selectivity to efficiently differentiate isoforms, post-translational modifications and mutated forms of proteins. SRM-like targeted acquisitions such as parallel reaction monitoring (PRM) are pioneered on high resolution/accurate mass (HR/AM) platforms based on the quadrupole-orbitrap (Q-orbitrap) mass spectrometer. The expansion of HR/AM also caused development in data independent acquisition (DIA). This review presents a step-by-step tutorial on development of SRM/MRM protein assay intended for researchers without prior experience in proteomics. We discus practical aspects of SRM-based quantitative proteomics workflow, summarize milestones in basic biological and medical research as well as recent trends and emerging techniques. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Target recognition and phase acquisition by using incoherent digital holographic imaging

    Science.gov (United States)

    Lee, Munseob; Lee, Byung-Tak

    2017-05-01

    In this study, we proposed the Incoherent Digital Holographic Imaging (IDHI) for recognition and phase information of dedicated target. Although recent development of a number of target recognition techniques such as LIDAR, there have limited success in target discrimination, in part due to low-resolution, low scanning speed, and computation power. In the paper, the proposed system consists of the incoherent light source, such as LED, Michelson interferometer, and digital CCD for acquisition of four phase shifting image. First of all, to compare with relative coherence, we used a source as laser and LED, respectively. Through numerical reconstruction by using the four phase shifting method and Fresnel diffraction method, we recovered the intensity and phase image of USAF resolution target apart from about 1.0m distance. In this experiment, we show 1.2 times improvement in resolution compared to conventional imaging. Finally, to confirm the recognition result of camouflaged targets with the same color from background, we carry out to test holographic imaging in incoherent light. In this result, we showed the possibility of a target detection and recognition that used three dimensional shape and size signatures, numerical distance from phase information of obtained holographic image.

  14. Case study of the development of the Target Acquisition Designation/Pilot Night Vision System

    OpenAIRE

    2002-01-01

    Approved for public release; distribution in unlimited. This thesis is a case study of the extent to which a series of factors influenced development of the U.S. Army Target Acquisition Designation System/Pilot Night Vision System (TADS/PNVS). This study is one of a series being prepared under an ongoing research effort sponsored by Headquarters U.S. Army Material Command (AMC). These studies will look at various weapon systems that participated in Operation Desert Storm (ODS) and will stu...

  15. Targeted surveillance for highly pathogenic avian influenza in migratory waterfowl across the conterminous United States: chapter 12

    Science.gov (United States)

    Farnsworth, Matthew L.; Kendall, William L.; Doherty, Paul F.; Miller, Ryan S.; White, Gary C.; Nichols, James D.; Burnham, Kenneth P.; Franklin, Alan B.; Majumdar, S.; Brenner, F.J.; Huffman, J.E.; McLean, R.G.; Panah, A.I.; Pietrobon, P.J.; Keeler, S.P.; Shive, S.

    2011-01-01

    Introduction of Asian strain H5N1 Highly Pathogenic avian influenca via waterfowl migration is one potential route of entry into the United States. In conjunction with state, tribe, and laboratory partners, the United States Department of Agriculture collected and tested 124,603 wild bird samples in 2006 as part of a national surveillance effort. A sampling plan was devised to increase the probability fo detecting Asian strain H5N1 at a national scale. Band recovery data were used to identify and prioritize sampling for wild migratory waterfowl, resulting in spatially targeted sampling recommendations focused on reads with high numbers of recoveries. We also compared the spatial and temporal distribution of the 2006 cloacal and fecal waterfowl sampling effort to the bird banding recovery data and found concordance between the two .Finally, we present improvements made to the 2007 fecal sampling component of the surveillance plan and suggest further improvements for future sampling.

  16. Network analysis of translocated Takahe populations to identify disease surveillance targets.

    Science.gov (United States)

    Grange, Zoë L; VAN Andel, Mary; French, Nigel P; Gartrell, Brett D

    2014-04-01

    network in 2011. Likewise, the wild Murchison Mountains population was consistently the sink of the network. Other nodes, such as the offshore islands and the wildlife hospital, varied in importance over time. Common network descriptors and measures of centrality identified key locations for targeting disease surveillance. The visual representation of movements of animals in a population that this technique provides can aid decision makers when they evaluate translocation proposals or attempt to control a disease outbreak. © 2014 Society for Conservation Biology.

  17. Targeting Iron Acquisition Blocks Infection with the Fungal Pathogens Aspergillus fumigatus and Fusarium oxysporum

    Science.gov (United States)

    Leal, Sixto M.; Roy, Sanhita; Vareechon, Chairut; Carrion, Steven deJesus; Clark, Heather; Lopez-Berges, Manuel S.; diPietro, Antonio; Schrettl, Marcus; Beckmann, Nicola; Redl, Bernhard; Haas, Hubertus; Pearlman, Eric

    2013-01-01

    Filamentous fungi are an important cause of pulmonary and systemic morbidity and mortality, and also cause corneal blindness and visual impairment worldwide. Utilizing in vitro neutrophil killing assays and a model of fungal infection of the cornea, we demonstrated that Dectin-1 dependent IL-6 production regulates expression of iron chelators, heme and siderophore binding proteins and hepcidin in infected mice. In addition, we show that human neutrophils synthesize lipocalin-1, which sequesters fungal siderophores, and that topical lipocalin-1 or lactoferrin restricts fungal growth in vivo. Conversely, we show that exogenous iron or the xenosiderophore deferroxamine enhances fungal growth in infected mice. By examining mutant Aspergillus and Fusarium strains, we found that fungal transcriptional responses to low iron levels and extracellular siderophores are essential for fungal growth during infection. Further, we showed that targeting fungal iron acquisition or siderophore biosynthesis by topical application of iron chelators or statins reduces fungal growth in the cornea by 60% and that dual therapy with the iron chelator deferiprone and statins further restricts fungal growth by 75%. Together, these studies identify specific host iron-chelating and fungal iron-acquisition mediators that regulate fungal growth, and demonstrate that therapeutic inhibition of fungal iron acquisition can be utilized to treat topical fungal infections. PMID:23853581

  18. A memetic algorithm for path planning of curvature-constrained UAVs performing surveillance of multiple ground targets

    Institute of Scientific and Technical Information of China (English)

    Zhang Xing; Chen Jie; Xin Bin; Peng Zhihong

    2014-01-01

    The problem of generating optimal paths for curvature-constrained unmanned aerial vehicles (UAVs) performing surveillance of multiple ground targets is addressed in this paper. UAVs are modeled as Dubins vehicles so that the constraints of UAVs’ minimal turning radius can be taken into account. In view of the effective surveillance range of the sensors equipped on UAVs, the problem is formulated as a Dubins traveling salesman problem with neighborhood (DTSPN). Considering its prohibitively high computational complexity, the Dubins paths in the sense of terminal heading relaxation are introduced to simplify the calculation of the Dubins distance, and a boundary-based encoding scheme is proposed to determine the visiting point of every target neighborhood. Then, an evolutionary algorithm is used to derive the optimal Dubins tour. To further enhance the quality of the solutions, a local search strategy based on approximate gradient is employed to improve the visiting points of target neighborhoods. Finally, by a minor modification to the individual encoding, the algorithm is easily extended to deal with other two more sophisticated DTSPN variants (multi-UAV scenario and multiple groups of targets scenario). The performance of the algorithm is demonstrated through comparative experiments with other two state-of-the-art DTSPN algorithms identified in literature. Numerical simulations exhibit that the algorithm proposed in this paper can find high-quality solutions to the DTSPN with lower computational cost and produce significantly improved performance over the other algorithms.

  19. A memetic algorithm for path planning of curvature-constrained UAVs performing surveillance of multiple ground targets

    Directory of Open Access Journals (Sweden)

    Zhang Xing

    2014-06-01

    Full Text Available The problem of generating optimal paths for curvature-constrained unmanned aerial vehicles (UAVs performing surveillance of multiple ground targets is addressed in this paper. UAVs are modeled as Dubins vehicles so that the constraints of UAVs’ minimal turning radius can be taken into account. In view of the effective surveillance range of the sensors equipped on UAVs, the problem is formulated as a Dubins traveling salesman problem with neighborhood (DTSPN. Considering its prohibitively high computational complexity, the Dubins paths in the sense of terminal heading relaxation are introduced to simplify the calculation of the Dubins distance, and a boundary-based encoding scheme is proposed to determine the visiting point of every target neighborhood. Then, an evolutionary algorithm is used to derive the optimal Dubins tour. To further enhance the quality of the solutions, a local search strategy based on approximate gradient is employed to improve the visiting points of target neighborhoods. Finally, by a minor modification to the individual encoding, the algorithm is easily extended to deal with other two more sophisticated DTSPN variants (multi-UAV scenario and multiple groups of targets scenario. The performance of the algorithm is demonstrated through comparative experiments with other two state-of-the-art DTSPN algorithms identified in literature. Numerical simulations exhibit that the algorithm proposed in this paper can find high-quality solutions to the DTSPN with lower computational cost and produce significantly improved performance over the other algorithms.

  20. Midcourse Guidance Law Based on High Target Acquisition Probability Considering Angular Constraint and Line-of-Sight Angle Rate Control

    Directory of Open Access Journals (Sweden)

    Xiao Liu

    2016-01-01

    Full Text Available Random disturbance factors would lead to the variation of target acquisition point during the long distance flight. To acquire a high target acquisition probability and improve the impact precision, missiles should be guided to an appropriate target acquisition position with certain attitude angles and line-of-sight (LOS angle rate. This paper has presented a new midcourse guidance law considering the influences of random disturbances, detection distance restraint, and target acquisition probability with Monte Carlo simulation. Detailed analyses of the impact points on the ground and the random distribution of the target acquisition position in the 3D space are given to get the appropriate attitude angles and the end position for the midcourse guidance. Then, a new formulation biased proportional navigation (BPN guidance law with angular constraint and LOS angle rate control has been derived to ensure the tracking ability when attacking the maneuvering target. Numerical simulations demonstrates that, compared with the proportional navigation guidance (PNG law and the near-optimal spatial midcourse guidance (NSMG law, BPN guidance law demonstrates satisfactory performances and can meet both the midcourse terminal angular constraint and the LOS angle rate requirement.

  1. When the target may know better : Effects of experience and information asymmetries on value from mergers and acquisitions

    NARCIS (Netherlands)

    Cuypers, I.R.P.; Cuypers, Y.K.; Martin, Xavier

    2017-01-01

    Research Summary: Extending research on the effect of experience on acquisition outcomes, we examine how the differential in previous M&A experience between the target and the acquirer affects the value they respectively obtain when the acquirer takes over the target. Drawing on literature about

  2. When the target may know better : Effects of experience and information asymmetries on value from mergers and acquisitions

    NARCIS (Netherlands)

    Cuypers, I.R.P.; Cuypers, Y.K.; Martin, Xavier

    2016-01-01

    Research Summary: Extending research on the effect of experience on acquisition outcomes, we examine how the differential in previous M&A experience between the target and the acquirer affects the value they respectively obtain when the acquirer takes over the target. Drawing on literature about org

  3. When the target may know better : Effects of experience and information asymmetries on value from mergers and acquisitions

    NARCIS (Netherlands)

    Cuypers, I.R.P.; Cuypers, Y.K.; Martin, Xavier

    2017-01-01

    Research Summary: Extending research on the effect of experience on acquisition outcomes, we examine how the differential in previous M&A experience between the target and the acquirer affects the value they respectively obtain when the acquirer takes over the target. Drawing on literature about org

  4. Birds of a Feather: Moving Towards a Joint Acquisition Process to Support the Intelligence, Surveillance and Reconnaissance (ISR) Enterprise

    Science.gov (United States)

    2009-04-01

    AU/ACSC/9694/2008-09 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY BIRDS OF A FEATHER Moving Towards a Joint Acquisition Process to Support the...number. 1. REPORT DATE APR 2009 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE BIRDS OF A FEATHER: Moving Towards a Joint...INTRODUCTION ...........................................................................................................................1 " Birds of a

  5. Automatic assignment of protein backbone resonances by direct spectrum inspection in targeted acquisition of NMR data.

    Science.gov (United States)

    Wong, Leo E; Masse, James E; Jaravine, Victor; Orekhov, Vladislav; Pervushin, Konstantin

    2008-10-01

    The necessity to acquire large multidimensional datasets, a basis for assignment of NMR resonances, results in long data acquisition times during which substantial degradation of a protein sample might occur. Here we propose a method applicable for such a protein for automatic assignment of backbone resonances by direct inspection of multidimensional NMR spectra. In order to establish an optimal balance between completeness of resonance assignment and losses of cross-peaks due to dynamic processes/degradation of protein, assignment of backbone resonances is set as a stirring criterion for dynamically controlled targeted nonlinear NMR data acquisition. The result is demonstrated with the 12 kDa (13)C,(15) N-labeled apo-form of heme chaperone protein CcmE, where hydrolytic cleavage of 29 C-terminal amino acids is detected. For this protein, 90 and 98% of manually assignable resonances are automatically assigned within 10 and 40 h of nonlinear sampling of five 3D NMR spectra, respectively, instead of 600 h needed to complete the full time domain grid. In addition, resonances stemming from degradation products are identified. This study indicates that automatic resonance assignment might serve as a guiding criterion for optimal run-time allocation of NMR resources in applications to proteins prone to degradation.

  6. Automatic assignment of protein backbone resonances by direct spectrum inspection in targeted acquisition of NMR data

    Energy Technology Data Exchange (ETDEWEB)

    Wong, Leo E. [Nanyang Technological University, School of Biological Sciences (Singapore); Masse, James E. [National Institutes of Health (United States); Jaravine, Victor [J. W. Goethe-University Frankfurt, Institute of Biophysical Chemistry (Germany); Orekhov, Vladislav [Gothenburg University, Swedish NMR Centre (Sweden); Pervushin, Konstantin [Nanyang Technological University, School of Biological Sciences (Singapore)], E-mail: kpervushin@ntu.edu.sg

    2008-10-15

    The necessity to acquire large multidimensional datasets, a basis for assignment of NMR resonances, results in long data acquisition times during which substantial degradation of a protein sample might occur. Here we propose a method applicable for such a protein for automatic assignment of backbone resonances by direct inspection of multidimensional NMR spectra. In order to establish an optimal balance between completeness of resonance assignment and losses of cross-peaks due to dynamic processes/degradation of protein, assignment of backbone resonances is set as a stirring criterion for dynamically controlled targeted nonlinear NMR data acquisition. The result is demonstrated with the 12 kDa {sup 13}C,{sup 15} N-labeled apo-form of heme chaperone protein CcmE, where hydrolytic cleavage of 29 C-terminal amino acids is detected. For this protein, 90 and 98% of manually assignable resonances are automatically assigned within 10 and 40 h of nonlinear sampling of five 3D NMR spectra, respectively, instead of 600 h needed to complete the full time domain grid. In addition, resonances stemming from degradation products are identified. This study indicates that automatic resonance assignment might serve as a guiding criterion for optimal run-time allocation of NMR resources in applications to proteins prone to degradation.

  7. Merger and Acquisition Target Selection Based on Interval Neutrosophic Multigranulation Rough Sets over Two Universes

    Directory of Open Access Journals (Sweden)

    Chao Zhang

    2017-07-01

    Full Text Available As a significant business activity, merger and acquisition (M&A generally means transactions in which the ownership of companies, other business organizations or their operating units are transferred or combined. In a typical M&A procedure, M&A target selection is an important issue that tends to exert an increasingly significant impact on different business areas. Although some research works based on fuzzy methods have been explored on this issue, they can only deal with incomplete and uncertain information, but not inconsistent and indeterminate information that exists universally in the decision making process. Additionally, it is advantageous to solve M&A problems under the group decision making context. In order to handle these difficulties in M&A target selection background, we introduce a novel rough set model by combining interval neutrosophic sets (INSs with multigranulation rough sets over two universes, called an interval neutrosophic (IN multigranulation rough set over two universes. Then, we discuss the definition and some fundamental properties of the proposed model. Finally, we establish decision making rules and computing approaches for the proposed model in M&A target selection background, and the effectiveness of the decision making approach is demonstrated by an illustrative case analysis.

  8. Clinical applications of quantitative proteomics using targeted and untargeted data-independent acquisition techniques.

    Science.gov (United States)

    Meyer, Jesse G; Schilling, Birgit

    2017-05-01

    While selected/multiple-reaction monitoring (SRM or MRM) is considered the gold standard for quantitative protein measurement, emerging data-independent acquisition (DIA) using high-resolution scans have opened a new dimension of high-throughput, comprehensive quantitative proteomics. These newer methodologies are particularly well suited for discovery of biomarker candidates from human disease samples, and for investigating and understanding human disease pathways. Areas covered: This article reviews the current state of targeted and untargeted DIA mass spectrometry-based proteomic workflows, including SRM, parallel-reaction monitoring (PRM) and untargeted DIA (e.g., SWATH). Corresponding bioinformatics strategies, as well as application in biological and clinical studies are presented. Expert commentary: Nascent application of highly-multiplexed untargeted DIA, such as SWATH, for accurate protein quantification from clinically relevant and disease-related samples shows great potential to comprehensively investigate biomarker candidates and understand disease.

  9. Directional R-Loop Formation by the CRISPR-Cas Surveillance Complex Cascade Provides Efficient Off-Target Site Rejection

    Directory of Open Access Journals (Sweden)

    Marius Rutkauskas

    2015-03-01

    Full Text Available CRISPR-Cas systems provide bacteria and archaea with adaptive immunity against foreign nucleic acids. In type I CRISPR-Cas systems, invading DNA is detected by a large ribonucleoprotein surveillance complex called Cascade. The crRNA component of Cascade is used to recognize target sites in foreign DNA (protospacers by formation of an R-loop driven by base-pairing complementarity. Using single-molecule supercoiling experiments with near base-pair resolution, we probe here the mechanism of R-loop formation and detect short-lived R-loop intermediates on off-target sites bearing single mismatches. We show that R-loops propagate directionally starting from the protospacer-adjacent motif (PAM. Upon reaching a mismatch, R-loop propagation stalls and collapses in a length-dependent manner. This unambiguously demonstrates that directional zipping of the R-loop accomplishes efficient target recognition by rapidly rejecting binding to off-target sites with PAM-proximal mutations. R-loops that reach the protospacer end become locked to license DNA degradation by the auxiliary Cas3 nuclease/helicase without further target verification.

  10. Shareholders' reactions to announcements of acquisitions of private firms : Do target and bidder markets make a difference?

    NARCIS (Netherlands)

    von Eije, Henk; Wiegerinck, Helene

    We study announcement effects of cross-border acquisitions of private firms on short-term bidders stock market returns in the European Union. We assume that the development status of the target market and the governance within the bidder market make a difference. Investors of bidding companies react

  11. Shareholders' reactions to announcements of acquisitions of private firms : Do target and bidder markets make a difference?

    NARCIS (Netherlands)

    von Eije, Henk; Wiegerinck, Helene

    2010-01-01

    We study announcement effects of cross-border acquisitions of private firms on short-term bidders stock market returns in the European Union. We assume that the development status of the target market and the governance within the bidder market make a difference. Investors of bidding companies react

  12. 医院感染目标性监测报告分析%Target surveillance report of nosocomial infections

    Institute of Scientific and Technical Information of China (English)

    刘卫平; 闫志刚; 苏日娜; 邢慧敏; 杨旭

    2012-01-01

    OBJECTIVE To develop the surveillance of high risk population and infection sites as well as the risk factors so as to control the prevalence of nosocomial infections. METHODS According to the standards for nosocomial infection surveillance, the surveillance of nosocomial infections was performed by reviewing the medical records in combination with clinical ward rounds. RESULTS The nosocomial infection rate was 10. 70% in ICU, the utilization rate of the catheter was 53. 56%, the daily incidence rate of the urinary tract catheter-related infections was 2. 73‰; the utilization rate of central venous catheterization was 99. 09% , the daily infection rate of central venous catheter-related bloodstream infections was 1. ll‰;the utilization rate of ventilator was 46. 25%, the daily incidence rate of ventilator-associated pneumonia was 13. 44‰; the total equipment utilization rate was 198. 90% ; the incidence of nosocomial infections was 0. 86% in the neonates with the daily infection rate of 1. 76‰ ; the incidence of the class Ⅰ surgical incision infections was 1. 02% , class Ⅱ surgical incision infections 2. 35% , class Ⅲ surgical incision infections 20. 00%. CONCLUSION The target surveillance. as a scientific surveillance of nosocomial infections, is flexible and can predict the sources of infections in early stage as well as control the outbreak and prevalence of nosocomial infections.%目的 针对高危人群、高发感染部位等开展医院感染及其危险因素的监测,及时控制医院感染暴发流行.方法 2011年1-6月根据《医院感染监测规范》,采用查看病历与临床查房相结合进行感染监测.结果 ICU医院感染率10.70%,导尿管使用率53.56%,导尿管相关泌尿道感染日感染率2.73‰;中心静脉插管使用率99.09%,中心静脉插管相关血流日感染率1.11‰;呼吸机使用率46.25%,呼吸机相关肺炎日感染率13.44%;总器械使用率198.90%;新生儿医院感染发生率为0

  13. The 2008 Okuda lecture: Management of hepatocellular carcinoma: from surveillance to molecular targeted therapy.

    Science.gov (United States)

    Kudo, Masatoshi

    2010-03-01

    Hepatocellular carcinoma (HCC) is responsible for approximately 600,000-700,000 deaths worldwide. It is highly prevalent in the Asia-Pacific region and Africa, and is increasing in Western countries. Alpha fetoprotein (AFP) alone is insufficient for HCC screening. A combination with other tumor markers, such as PIVKA-II and AFP-L3, and periodical ultrasound surveillance is necessary. Sensitivity of AFP in depicting HCC is highest, followed by PIVKA-II and AFP-L3, but the order of the specificity is inverse, AFP-L3, PIVKA-II, and AFP. Sonazoid-enhanced ultrasound (US) is extremely useful to characterize hepatic tumors equal to or more than multidetector row computed tomography (MDCT). Sonazoid-enhanced US with defect re-perfusion imaging is a breakthrough technique in the treatment of HCC. Defect re-perfusion imaging will markedly change the therapeutic strategy for liver cancer. Gd-EOB-DTPA-magnetic resonance imaging is a newly developed imaging technique in the detection and diagnosis of HCC. It is the most sensitive tool in the differentiation of early HCC from dysplastic nodules. Regarding the treatment strategy, there has been no established systemic chemotherapy for advanced HCC, except for Sorafenib. Empirically, intrahepatic arterial infusion chemotherapy using implanted reservoir port is known to be effective in response rate and overall survival for advanced HCC with vascular invasion. Sorafenib in combination with transcatheter arterial chemoembolization or adjuvant use after ablation or resection will significantly prolong the life expectancy if ongoing clinical trials provide positive results. In conclusion, it is expected that readers will gain deeper insight into the latest progress and updated diagnosis and treatment of HCC described in this review.

  14. NEWTONIAN IMPERIALIST COMPETITVE APPROACH TO OPTIMIZING OBSERVATION OF MULTIPLE TARGET POINTS IN MULTISENSOR SURVEILLANCE SYSTEMS

    Directory of Open Access Journals (Sweden)

    A. Afghan-Toloee

    2013-09-01

    Full Text Available The problem of specifying the minimum number of sensors to deploy in a certain area to face multiple targets has been generally studied in the literatures. In this paper, we are arguing the multi-sensors deployment problem (MDP. The Multi-sensor placement problem can be clarified as minimizing the cost required to cover the multi target points in the area. We propose a more feasible method for the multi-sensor placement problem. Our method makes provision the high coverage of grid based placements while minimizing the cost as discovered in perimeter placement techniques. The NICA algorithm as improved ICA (Imperialist Competitive Algorithm is used to decrease the performance time to explore an enough solution compared to other meta-heuristic schemes such as GA, PSO and ICA. A three dimensional area is used for clarify the multiple target and placement points, making provision x, y, and z computations in the observation algorithm. A structure of model for the multi-sensor placement problem is proposed: The problem is constructed as an optimization problem with the objective to minimize the cost while covering all multiple target points upon a given probability of observation tolerance.

  15. Newtonian Imperialist Competitve Approach to Optimizing Observation of Multiple Target Points in Multisensor Surveillance Systems

    Science.gov (United States)

    Afghan-Toloee, A.; Heidari, A. A.; Joibari, Y.

    2013-09-01

    The problem of specifying the minimum number of sensors to deploy in a certain area to face multiple targets has been generally studied in the literatures. In this paper, we are arguing the multi-sensors deployment problem (MDP). The Multi-sensor placement problem can be clarified as minimizing the cost required to cover the multi target points in the area. We propose a more feasible method for the multi-sensor placement problem. Our method makes provision the high coverage of grid based placements while minimizing the cost as discovered in perimeter placement techniques. The NICA algorithm as improved ICA (Imperialist Competitive Algorithm) is used to decrease the performance time to explore an enough solution compared to other meta-heuristic schemes such as GA, PSO and ICA. A three dimensional area is used for clarify the multiple target and placement points, making provision x, y, and z computations in the observation algorithm. A structure of model for the multi-sensor placement problem is proposed: The problem is constructed as an optimization problem with the objective to minimize the cost while covering all multiple target points upon a given probability of observation tolerance.

  16. Obstacle Avoidance and Target Acquisition for Robot Navigation Using a Mixed Signal Analog/Digital Neuromorphic Processing System

    Science.gov (United States)

    Milde, Moritz B.; Blum, Hermann; Dietmüller, Alexander; Sumislawska, Dora; Conradt, Jörg; Indiveri, Giacomo; Sandamirskaya, Yulia

    2017-01-01

    Neuromorphic hardware emulates dynamics of biological neural networks in electronic circuits offering an alternative to the von Neumann computing architecture that is low-power, inherently parallel, and event-driven. This hardware allows to implement neural-network based robotic controllers in an energy-efficient way with low latency, but requires solving the problem of device variability, characteristic for analog electronic circuits. In this work, we interfaced a mixed-signal analog-digital neuromorphic processor ROLLS to a neuromorphic dynamic vision sensor (DVS) mounted on a robotic vehicle and developed an autonomous neuromorphic agent that is able to perform neurally inspired obstacle-avoidance and target acquisition. We developed a neural network architecture that can cope with device variability and verified its robustness in different environmental situations, e.g., moving obstacles, moving target, clutter, and poor light conditions. We demonstrate how this network, combined with the properties of the DVS, allows the robot to avoid obstacles using a simple biologically-inspired dynamics. We also show how a Dynamic Neural Field for target acquisition can be implemented in spiking neuromorphic hardware. This work demonstrates an implementation of working obstacle avoidance and target acquisition using mixed signal analog/digital neuromorphic hardware. PMID:28747883

  17. A multispectral automatic target recognition application for maritime surveillance, search, and rescue

    Science.gov (United States)

    Schoonmaker, Jon; Reed, Scott; Podobna, Yuliya; Vazquez, Jose; Boucher, Cynthia

    2010-04-01

    Due to increased security concerns, the commitment to monitor and maintain security in the maritime environment is increasingly a priority. A country's coast is the most vulnerable area for the incursion of illegal immigrants, terrorists and contraband. This work illustrates the ability of a low-cost, light-weight, multi-spectral, multi-channel imaging system to handle the environment and see under difficult marine conditions. The system and its implemented detecting and tracking technologies should be organic to the maritime homeland security community for search and rescue, fisheries, defense, and law enforcement. It is tailored for airborne and ship based platforms to detect, track and monitor suspected objects (such as semi-submerged targets like marine mammals, vessels in distress, and drug smugglers). In this system, automated detection and tracking technology is used to detect, classify and localize potential threats or objects of interest within the imagery provided by the multi-spectral system. These algorithms process the sensor data in real time, thereby providing immediate feedback when features of interest have been detected. A supervised detection system based on Haar features and Cascade Classifiers is presented and results are provided on real data. The system is shown to be extendable and reusable for a variety of different applications.

  18. The Effects of Highlighting, Validity, and Feature Type on Air-to-Ground Target Acquisition Performance.

    Science.gov (United States)

    2007-11-02

    cultura I taget Target type Validity X target X leadin interaction on initial response time (highlighted trials) WRONG HIGHLIGHTING ÖU - M ea...natural - leadin cultural ndurd cultura taget I taget Target type Figure 3.10: Validity X lead-in X Target interaction Confirmation time A

  19. Improved Target Detection in Urban Structures Using Distributed Sensing and Fast Data Acquisition Techniques

    Science.gov (United States)

    2013-04-01

    targets. Height information may allow discrimination between people and animals such as household pets, since radar cross - section alone can be unreliable...interest, such as a human or a rifle, which have relatively small radar cross sections (RCS). This makes imaging of stationary targets behind walls...measurement setup. A small trihedral corner reflector with pentagonal panel 12 geometry is used as a point target behind tiie wall, as shown in Fig

  20. Using hardware-assisted geometric hashing for high-speed target acquisition and guidance

    Science.gov (United States)

    Pears, Arnold N.; Pissaloux, Edwige E.

    1997-06-01

    Geometric hashing provides a reliable and transformation independent representation of a target. The characterization of a target object is obtained by establishing a vector basis relative to a number of interest points unique to the target. The number of basis points required is a function of the dimensionality of the environment in which the technique is being used. This basis is used to encode the other points in the object constructing a highly general (transformation independent) representation of the target. The representation is invariant under both affine and geometric transformations of the target interest points. Once a representation of the target has been constructed a simple voting algorithm can be used to examine sets of interest points extracted from subsequent image in order to determine the possible presence and location of that target. Once an instance of the object has been located further computation can be undertaken to determine its scale, orientation, and deformation due to changes in the parameters related to the viewpoint. This information can be further analyzed to provide guidance. This paper discusses the complexity measures associated with task division and target image processing using geometric hashing. These measures are used to determine the areas which will most benefit from hardware assistance, and possible parallelism. These issues are discussed in the context of an architecture design, and a high speed (hardware assisted) geometric hashing approach to target recognition is proposed.

  1. Acquisitions as lotteries? : The selection of target-firm risk and its impact on merger outcomes

    NARCIS (Netherlands)

    Schneider, C.A.R.; Spalt, Oliver

    2017-01-01

    From 1987 to 2008, riskier firms were more likely to be taken over. Yet, on average, the acquirer declined in value by 2.8% when it bought a "risky target" (the third tercile, having an annualized idiosyncratic volatility of 61% or more), but only by 0.6% when it bought a "safe target" (the first

  2. Acquisitions as lotteries? : The selection of target-firm risk and its impact on merger outcomes

    NARCIS (Netherlands)

    Schneider, Christoph; Spalt, Oliver

    2017-01-01

    From 1987 to 2008, riskier firms were more likely to be taken over. Yet, on average, the acquirer declined in value by 2.8% when it bought a "risky target" (the third tercile, having an annualized idiosyncratic volatility of 61% or more), but only by 0.6% when it bought a "safe target" (the first te

  3. Brain derived neurotrophic factor mediated learning, fear acquisition and extinction as targets for developing novel treatments for anxiety

    Directory of Open Access Journals (Sweden)

    Karina Soares de Oliveira

    Full Text Available ABSTRACT Anxiety and obsessive-compulsive related disorders are highly prevalent and disabling disorders for which there are still treatment gaps to be explored. Fear is a core symptom of these disorders and its learning is highly dependent on the activity of the neurotrophin brain-derived neurotrophic factor (BDNF. Should BDNF-mediated fear learning be considered a target for the development of novel treatments for anxiety and obsessive-compulsive related disorders? We review the evidence that suggests that BDNF expression is necessary for the acquisition of conditioned fear, as well as for the recall of its extinction. We describe the findings related to fear learning and genetic/epigenetic manipulation of Bdnf expression in animals and BDNF allelic variants in humans. Later, we discuss how manipulation of BDNF levels represents a promising potential treatment target that may increase the benefits of therapies that extinguish previously conditioned fear.

  4. Target acquisition and tracking based on a priori knowledge and an image sensor

    Science.gov (United States)

    Fang, Zhonghua; Chen, Tao

    2002-07-01

    When intercepting and tracking low-observable point-source or highly maneuvering big targets, the electro-optical (E-O) system will meet a fatal problem that the target lost easily. No effective method intercepts it again according to the dispersed azimuth and elevation tracking data. First, the paper gives an intelligent ATP control system architecture based on the data mart. Then an automatic real-time control algorithm is proposed, which is found on linguistic cloud model and fuzzy logic techniques. The linguistic cloud model is used to translate a linguistic term of qualitative concept into its numerical representation, such that the ATP control system can take full advantage of a priori knowledge which is always presented in natural language to refine the results of sequence images processing. The fuzzy logic technique is adopted to associate these results to target's trajectories. The paper offers an automatic reacquisition and tracking method to solve the targets lost problem.

  5. New target acquisition task for contemporary operating environments: personnel in MWIR, LWIR, and SWIR

    Science.gov (United States)

    Boettcher, Evelyn J.; Leonard, Kevin R.; Hodgkin, Van A.; Thompson, Roger; Miller, Brian; Hixson, Jon; Johnson, Sara; Godbolt, Tehran; Acton, David D.

    2010-04-01

    Operating environments that US Soldiers and Marines are in have changed, along with the types of tasks that they are required to perform. In addition, the potential imaging sensor options available have increased. These changes make it necessary to examine how these new tasks are affected by waveband and time of day. US Army Research, Development and Engineering Command, Communications Electronics Research Development and Engineering Center, Night Vision and Electronic Sensor Directorate (NVESD), investigated one such task for several wavebands (MWIR, LWIR, Visible, and SWIR) and during both day and night. This task involved identification of nine different personnel targets: US Soldier, US Marine, Eastern-European/Asian Soldier, Urban Insurgent, Rural Insurgent, Hostile Militia, Indigenous Inhabitant, Contract Laborer, and Reporter. These nine distinct targets were made up from three tactically significant categories: Friendly Force, Combatant and Neutral/Non-Combatant. A ten second video was taken of an actor dressed as one of these targets. The actors walk a square pattern, enabling all aspects to be seen in each video clip. Target characteristics were measured and characteristic dimension, target contrast tabulated. A nine-alternative, forced-choice human perception test was performed at NVESD. This test allowed NVESD to quantify the ability of observers to discriminate between personnel targets for each waveband and time of day. The task difficulty criterion, V50, was also calculated allowing for future modeling using the NVESD sensor performance model.

  6. The Effects of Target Word Properties on the Incidental Acquisition of Vocabulary through Reading

    Science.gov (United States)

    Reynolds, Barry Lee

    2016-01-01

    The primary aim of this investigation was to determine what combination of target word variables (frequency, patternedness, length, cognateness, lexicalization) could best predict the difficulty of incidentally acquiring vocabulary through reading. A group of adult English First Language (EL1) (n = 20) and adult English as a Foreign Language (EFL)…

  7. Continuous Swarm Surveillance via Distributed Priority Maps

    Science.gov (United States)

    Howden, David

    With recent and ongoing improvements to unmanned aerial vehicle (UAV) endurance and availability, they are in a unique position to provide long term surveillance in risky environments. This paper presents a swarm intelligence algorithm for executing an exhaustive and persistent search of a non-trivial area of interest using a decentralized UAV swarm without long range communication. The algorithm allows for an environment containing arbitrary arrangements of no-fly zones, non-uniform levels of priority and dynamic priority changes in response to target acquisition or external commands. Performance is quantitatively analysed via comparative simulation with another leading algorithm of its class.

  8. Effect of peptide assay library size and composition in targeted data-independent acquisition-MS analyses.

    Science.gov (United States)

    Parker, Sarah J; Venkatraman, Vidya; Van Eyk, Jennifer E

    2016-08-01

    The quantification of peptides using targeted analysis of data-independent acquisition MS (DIA-MS) is dependent on the size and characteristics of the assay library. We addressed several important questions on how library composition influences: (1) the number of peptides extracted from DIA-MS datasets, (2) the quality of these peptides and proteins, and (3) the biological conclusions inferred. To answer these questions we constructed five libraries from mouse vascular smooth muscle cell (VSMC) lysate, each unique in depth, input sample complexity, data acquisition mode (DDA-MS or DIA-MS), and precursor fragmentation mode (TOF-CID or Orbitrap HCD) and extracted them against the same eight DIA-MS files of VSMCs treated with vehicle or transforming growth factor β-1 (TGF-β1). We found that along with differences in peptide and protein composition, the fragments representing a given peptide differed between the libraries. Collectively these differences impacted both peak group score profile and protein abundance estimates. Surprisingly, there was little overlap in the TGF-β1 response proteome between libraries. We conclude that additional work is needed to optimize peptide assay library building for DIA-MS applications, particularly in terms of selecting optimal peptides and their respective fragments for protein quantification.

  9. Acquisition of a Static Human Target in Complex Terrain: Study of Perceptual Learning Utilizing Virtual Environments

    Science.gov (United States)

    2008-09-01

    Example Snellen Chart (From Wikipedia, 2008) ............................................35  Figure 12.  Example Ishihara Plate (From Wikipedia, 2008...subject is capable of focusing upon the virtual scene depicted. A Snellen Chart was placed upon a wall and the subject stood 10 feet away and was asked to...presented targets. Figure 11 is an example of a common Snellen Chart similar to the one utilized during the subject’s visual acuity assessment

  10. Effects of TEL Confusers on Operator Target Acquisition Performance with SAR Imagery

    Science.gov (United States)

    1998-12-01

    processing known as the theory of signal detection (TSD) (Gescheider, 1985; Green & Swets, 1966; Macmillan & Creelman , 1991; Wilson, 1992). A TSD...localizations (Hacker & Ratcliff, 1979; Macmillan & Creelman , 1991). The index of bias in a target localization task provides a measure of the operator’s...of correct localizations substituted for hits (Macmillan & Creelman , 1991). Receiver Operating Characteristic Curves. In addition to the calculation

  11. Acquisition of Cry1Ac protein by non-target arthropods in Bt soybean fields.

    Directory of Open Access Journals (Sweden)

    Huilin Yu

    Full Text Available Soybean tissue and arthropods were collected in Bt soybean fields in China at different times during the growing season to investigate the exposure of arthropods to the plant-produced Cry1Ac toxin and the transmission of the toxin within the food web. Samples from 52 arthropod species/taxa belonging to 42 families in 10 orders were analysed for their Cry1Ac content using enzyme-linked immunosorbent assay (ELISA. Among the 22 species/taxa for which three samples were analysed, toxin concentration was highest in the grasshopper Atractomorpha sinensis and represented about 50% of the concentration in soybean leaves. Other species/taxa did not contain detectable toxin or contained a concentration that was between 1 and 10% of that detected in leaves. These Cry1Ac-positive arthropods included a number of mesophyll-feeding Hemiptera, a cicadellid, a curculionid beetle and, among the predators, a thomisid spider and an unidentified predatory bug belonging to the Anthocoridae. Within an arthropod species/taxon, the Cry1Ac content sometimes varied between life stages (nymphs/larvae vs. adults and sampling dates (before, during, and after flowering. Our study is the first to provide information on Cry1Ac-expression levels in soybean plants and Cry1Ac concentrations in non-target arthropods in Chinese soybean fields. The data will be useful for assessing the risk of non-target arthropod exposure to Cry1Ac in soybean.

  12. Acquisition of Cry1Ac protein by non-target arthropods in Bt soybean fields.

    Science.gov (United States)

    Yu, Huilin; Romeis, Jörg; Li, Yunhe; Li, Xiangju; Wu, Kongming

    2014-01-01

    Soybean tissue and arthropods were collected in Bt soybean fields in China at different times during the growing season to investigate the exposure of arthropods to the plant-produced Cry1Ac toxin and the transmission of the toxin within the food web. Samples from 52 arthropod species/taxa belonging to 42 families in 10 orders were analysed for their Cry1Ac content using enzyme-linked immunosorbent assay (ELISA). Among the 22 species/taxa for which three samples were analysed, toxin concentration was highest in the grasshopper Atractomorpha sinensis and represented about 50% of the concentration in soybean leaves. Other species/taxa did not contain detectable toxin or contained a concentration that was between 1 and 10% of that detected in leaves. These Cry1Ac-positive arthropods included a number of mesophyll-feeding Hemiptera, a cicadellid, a curculionid beetle and, among the predators, a thomisid spider and an unidentified predatory bug belonging to the Anthocoridae. Within an arthropod species/taxon, the Cry1Ac content sometimes varied between life stages (nymphs/larvae vs. adults) and sampling dates (before, during, and after flowering). Our study is the first to provide information on Cry1Ac-expression levels in soybean plants and Cry1Ac concentrations in non-target arthropods in Chinese soybean fields. The data will be useful for assessing the risk of non-target arthropod exposure to Cry1Ac in soybean.

  13. Optimization of acquisition parameters and accuracy of target motion trajectory for four-dimensional cone-beam computed tomography with a dynamic thorax phantom.

    Science.gov (United States)

    Shimohigashi, Yoshinobu; Araki, Fujio; Maruyama, Masato; Nakaguchi, Yuji; Nakato, Kengo; Nagasue, Nozomu; Kai, Yudai

    2015-01-01

    Our purpose in this study was to evaluate the performance of four-dimensional computed tomography (4D-CBCT) and to optimize the acquisition parameters. We evaluated the relationship between the acquisition parameters of 4D-CBCT and the accuracy of the target motion trajectory using a dynamic thorax phantom. The target motion was created three dimensionally using target sizes of 2 and 3 cm, respiratory cycles of 4 and 8 s, and amplitudes of 1 and 2 cm. The 4D-CBCT data were acquired under two detector configurations: "small mode" and "medium mode". The projection data acquired with scan times ranging from 1 to 4 min were sorted into 2, 5, 10, and 15 phase bins. The accuracy of the measured target motion trajectories was evaluated by means of the root mean square error (RMSE) from the setup values. For the respiratory cycle of 4 s, the measured trajectories were within 2 mm of the setup values for all acquisition times and target sizes. Similarly, the errors for the respiratory cycle of 8 s were <4 mm. When we used 10 or more phase bins, the measured trajectory errors were within 2 mm of the setup values. The trajectory errors for the two detector configurations showed similar trends. The acquisition times for achieving an RMSE of 1 mm for target sizes of 2 and 3 cm were 2 and 1 min, respectively, for respiratory cycles of 4 s. The results obtained in this study enable optimization of the acquisition parameters for target size, respiratory cycle, and desired measurement accuracy.

  14. Integrate knowledge acquisition with target recognition through closed-loop ATR

    Science.gov (United States)

    Yu, Ssu-Hsin; McLaughlin, Pat; Zatezalo, Aleksandar; Hsiao, Kai-yuh; Boskovic, Jovan

    2015-05-01

    Automatic Target Recognition (ATR) algorithm performance is highly dependent on the sensing conditions under which the input data is collected. Open-loop fly-bys often produce poor results due to less than ideal measurement conditions. In addition, ATR algorithms must be extremely complicated to handle the diverse range of inputs with a resulting reduction in overall performance and increase in complexity. Our approach, closed-loop ATR (CL-ATR), focuses on improving the quality of information input to the ATR algorithms by optimizing motion, sensor settings and team (vehicle-vehicle-human) collaboration to dramatically improve classification accuracy. By managing the data collection guided by predicted ATR performance gain, we increase the information content of the data and thus dramatically improve ATR performance with existing ATR algorithms. CL-ATR has two major functions; first, an ATR utility function, which represents the performance sensitivity of ATR produced classification labels as a function of parameters that correlate to vehicle/sensor states. This utility function is developed off-line and is often available from the original ATR study as a confusion matrix, or it can be derived through simulation without direct access to the inner working of the ATR algorithm. The utility function is inserted into our CLATR framework to autonomously control the vehicle/sensor. Second, an on-board planner maps the utility function into vehicle position and sensor collection plans. Because we only require the utility function on-board, we can activate any ATR algorithm onto a unmanned aerial vehicle (UAV) platform no matter how complex. This pairing of ATR performance profiles with vehicle/sensor controls creates a unique and powerful active perception behavior.

  15. Significant reduction of endemic MRSA acquisition and infection in cardiothoracic patients by means of an enhanced targeted infection control programme.

    Science.gov (United States)

    Schelenz, S; Tucker, D; Georgeu, C; Daly, S; Hill, M; Roxburgh, J; French, G L

    2005-06-01

    Due to increasing methicillin-resistant Staphylococcus aureus (MRSA) infection in cardiothoracic patients at St Thomas' Hospital, an enhanced infection control programme was introduced in September 2000. It was based on UK national guidelines on the control of MRSA and targeted additional identified risk factors for surgical site infection (SSI). It included recognition of the problem by senior staff and their taking responsibility for it; intensive support, education and advice from the infection control team; improved ward and theatre hygiene; pre-admission, admission and weekly MRSA screening; isolation and clearance treatment; nursing care pathways for MRSA colonized patients; and teicoplanin plus gentamicin surgical prophylaxis. The effectiveness of the programme was assessed by retrospective analysis of computerized patient data for the 16 months before and after the introduction of the programme. There was no significant change in the number of operations or the proportion of patients admitted with MRSA, although nine patients were cleared of carriage before admission. However, there were significant falls in the proportion of patients acquiring MRSA on the ward [38/1036 to 14/921, P=0.003, RR 2.4 (95%CI 1.32-4.42)] and in the rate of bloodstream MRSA infections [12/1075 to 2/956, P=0.014, RR 5.34 (95%CI 1.20-23.78)]. Sternal and leg wound infections both halved (from 28/1075 to 13/956 and 16/1075 to 7/956, respectively) but this did not reach statistical significance. These results demonstrate that an enhanced, targeted infection control programme based on the UK national guidelines, SSI prevention guidelines and local risk assessment can reduce the incidence of nosocomial MRSA acquisition and invasive infection in cardiothoracic patients in the face of continuing endemic risk.

  16. A possible role for short introns in the acquisition of stroma-targeting peptides in the flagellate Euglena gracilis.

    Science.gov (United States)

    Vesteg, Matej; Vacula, Rostislav; Steiner, Jürgen M; Mateásiková, Bianka; Löffelhardt, Wolfgang; Brejová, Brona; Krajcovic, Juraj

    2010-08-01

    The chloroplasts of Euglena gracilis bounded by three membranes arose via secondary endosymbiosis of a green alga in a heterotrophic euglenozoan host. Many genes were transferred from symbiont to the host nucleus. A subset of Euglena nuclear genes of predominately symbiont, but also host, or other origin have obtained complex presequences required for chloroplast targeting. This study has revealed the presence of short introns (41-93 bp) either in the second half of presequence-encoding regions or shortly downstream of them in nine nucleus-encoded E. gracilis genes for chloroplast proteins (Eno29, GapA, PetA, PetF, PetJ, PsaF, PsbM, PsbO, and PsbW). In addition, the E. gracilis Pbgd gene contains two introns in the second half of presequence-encoding region and one at the border of presequence-mature peptide-encoding region. Ten of 12 introns present within presequence-encoding regions or shortly downstream of them identified in this study have typical eukaryotic GT/AG borders, are T-rich, 45-50 bp long, and pairwise sequence identities range from 27 to 61%. Thus single recombination events might have been mediated via these cis-spliced introns. A double crossing over between these cis-spliced introns and trans-spliced introns present in 5'-UTRs of Euglena nuclear genes is also likely to have occurred. Thus introns and exon-shuffling could have had an important role in the acquisition of chloroplast targeting signals in E. gracilis. The results are consistent with a late origin of photosynthetic euglenids.

  17. Hantaan virus surveillance targeting small mammals at Dagmar North Training Area, Gyeonggi Province, Republic of Korea, 2001-2005.

    Science.gov (United States)

    Klein, Terry A; Kang, Hae Ji; Gu, Se Hun; Moon, Sungsil; Shim, So-Hee; Park, Yon Mi; Lee, Sook-Young; Kim, Heung-Chul; Chong, Sung-Tae; O'Guinn, Monica; Lee, John S; Turell, Michael J; Song, Jin-Won

    2011-12-01

    In response to a hemorrhagic fever with renal syndrome case in November 2000, a seasonal rodent-borne disease surveillance program was initiated at Dagmar North Training Area (DNTA), Gyeonggi Province, Republic of Korea. From April 2001-December 2005, 1,848 small mammals were captured. Apodemus agrarius accounted for 92.5%, followed by Mus musculus (3.6%), Crocidura lasiura (2.1%), and Microtus fortis (1.1%). Three species of rodents were found to be antibody-positive (Ab+) for Hantaan virus (HTNV): A. agrarius (22.3%), M. musculus (9.1%), and M. fortis (5.0%). Ab+ rates for A. agrarius increased with increasing weight (age), except for those weighing <10 g. The peak HTNV transmission period in Korea coincided with the peak reproductive potential of A. agrarius during the fall (August/September) surveys. HTNV strains from DNTA were distinct from HTNV strains from the People's Republic of China. From these studies, more accurate risk assessments can be developed to better protect personnel from rodent-borne diseases.

  18. Targeting Newlands Project acquisitions

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This report is about the effects of the Newlands Project in Nevada and the ways in which the Project will impact water available for wetlands and irrigation. The...

  19. Crystal structure of a CRISPR RNA-guided surveillance complex bound to a ssDNA target

    Science.gov (United States)

    Mulepati, Sabin; Héroux, Annie; Bailey, Scott

    2015-01-01

    In prokaryotes, RNA derived from type I and type III CRISPR loci direct large ribonucleoprotein complexes to destroy invading bacteriophage and plasmids. In Escherichia coli, this 405-kDa complex is called Cascade. Here we report the 3.03Å crystal structure of Cascade bound to a single-stranded DNA target. The structure reveals that the CRISPR RNA and target strands do not form a double helix but instead adopt an underwound ribbon-like structure. This non-canonical structure is facilitated by rotation of every sixth nucleotide out of the RNA-DNA hybrid and is stabilized by the highly interlocked organization of protein subunits. These studies provide insight into both the assembly and the activity of this complex and suggest a mechanism to enforce fidelity of target binding. PMID:25123481

  20. Crystal Structure of a CRISPR RNA-guided Surveillance Complex Bound to a ssDNA Target

    Energy Technology Data Exchange (ETDEWEB)

    Mulepati, Sabin [Johns Hopkins Univ., Baltimore, MD (United States); Heroux, Annie; Bailey, Scott [Johns Hopkins Univ., Baltimore, MD (United States)

    2014-09-19

    In prokaryotes, RNA derived from type I and type III CRISPR loci direct large ribonucleoprotein complexes to destroy invading bacteriophage and plasmids. In Escherichia coli, this 405-kilodalton complex is called Cascade. We report the crystal structure of Cascade bound to a single-stranded DNA (ssDNA) target at a resolution of 3.03 angstroms. The structure reveals that the CRISPR RNA and target strands do not form a double helix but instead adopt an underwound ribbon-like structure. This noncanonical structure is facilitated by rotation of every sixth nucleotide out of the RNA-DNA hybrid and is stabilized by the highly interlocked organization of protein subunits. These studies provide insight into both the assembly and the activity of this complex and suggest a mechanism to enforce fidelity of target binding.

  1. Structural biology. Crystal structure of a CRISPR RNA-guided surveillance complex bound to a ssDNA target.

    Science.gov (United States)

    Mulepati, Sabin; Héroux, Annie; Bailey, Scott

    2014-09-19

    In prokaryotes, RNA derived from type I and type III CRISPR loci direct large ribonucleoprotein complexes to destroy invading bacteriophage and plasmids. In Escherichia coli, this 405-kilodalton complex is called Cascade. We report the crystal structure of Cascade bound to a single-stranded DNA (ssDNA) target at a resolution of 3.03 angstroms. The structure reveals that the CRISPR RNA and target strands do not form a double helix but instead adopt an underwound ribbon-like structure. This noncanonical structure is facilitated by rotation of every sixth nucleotide out of the RNA-DNA hybrid and is stabilized by the highly interlocked organization of protein subunits. These studies provide insight into both the assembly and the activity of this complex and suggest a mechanism to enforce fidelity of target binding.

  2. Introduction to surveillance studies

    CERN Document Server

    Petersen, JK

    2012-01-01

    Introduction & OverviewIntroduction Brief History of Surveillance Technologies & TechniquesOptical SurveillanceAerial Surveillance Audio Surveillance Radio-Wave SurveillanceGlobal Positioning Systems Sensors Computers & the Internet Data Cards Biochemical Surveillance Animal Surveillance Biometrics Genetics Practical ConsiderationsPrevalence of Surveillance Effectiveness of Surveillance Freedom & Privacy IssuesConstitutional Freedoms Privacy Safeguards & Intrusions ResourcesReferences Glossary Index

  3. Forward Scatter Radar for Air Surveillance: Characterizing the Target-Receiver Transition from Far-Field to Near-Field Regions

    Directory of Open Access Journals (Sweden)

    Marta Tecla Falconi

    2017-01-01

    Full Text Available A generalized electromagnetic model is presented in order to predict the response of forward scatter radar (FSR systems for air-target surveillance applications in both far-field and near-field conditions. The relevant scattering problem is tackled by developing the Helmholtz–Kirchhoff formula and Babinet’s principle to express the scattered and the total fields in typical FSR configurations. To fix the distinctive features of this class of problems, our approach is applied here to metallic targets with canonical rectangular shapes illuminated by a plane wave, but the model can straightforwardly be used to account for more general scenarios. By exploiting suitable approximations, a simple analytical formulation is derived allowing us to efficiently describe the characteristics of the FSR response for a target transitioning with respect to the receiver from far-field to near-field regions. The effects of different target electrical sizes and detection distances on the received signal, as well as the impact of the trajectory of the moving object, are evaluated and discussed. All of the results are shown in terms of quantities normalized to the wavelength and can be generalized to different configurations once the carrier frequency of the FSR system is set. The range of validity of the proposed closed-form approach has been checked by means of numerical analyses, involving comparisons also with a customized implementation of a full-wave commercial CAD tool. The outcomes of this study can pave the way for significant extensions on the applicability of the FSR technique.

  4. Surveillance Pleasures

    DEFF Research Database (Denmark)

    Albrechtslund, Anders

    and leisure have not been studied with the same intensity as e.g. policing, civil liberties and social sorting. This paper offers a study of trends in surveillance pleasures, i.e. watching and eavesdropping in popular culture. My focus is the existential aspects and ethical dilemmas of surveillance...

  5. ISS Efforts to Fully Utilize its Target Acquisition Capability Serves as an Analog for Future Laser Pointing Communications Systems

    Science.gov (United States)

    Jackson, Dan

    2017-01-01

    The ISS is an outstanding platform for developing, testing and refining laser communications systems for future exploration. A recent ISS project which improved ISS communications satellite acquisition performance proves the platform’s utility as a laser communications systems testbed.

  6. Diagnostics and surveillance methods

    Science.gov (United States)

    Detection and diagnosis of influenza A virus (IAV) infection in animals requires a laboratory test since disease from IAV presents no pathognomonic signs. Diagnosis and surveillance of animal influenza focuses on the detection of virus or type specific antibodies. Whether one targets the virus or ...

  7. Targeted sequencing reveals TP53 as a potential diagnostic biomarker in the post-treatment surveillance of head and neck cancer.

    Science.gov (United States)

    van Ginkel, Joost H; de Leng, Wendy W J; de Bree, Remco; van Es, Robert J J; Willems, Stefan M

    2016-09-20

    Head and neck squamous cell carcinomas (HNSCC) form a large heterogeneous group of tumors and have a relatively poor outcome in advanced cases. Revealing the underlying genetic mutations in HNSCC facilitates the development of diagnostic biomarkers, which might lead to improved diagnosis and post treatment surveillance. We retrospectively analyzed mutational hotspots using targeted next-generation sequencing (NGS) of 239 HNSCC tumor samples in order to examine the mutational profile of HNSCC. Furthermore, we assessed prevalence, co-occurrence, and synonymy of gene mutations in (matched) tumor samples. TP53 was found mutated the most frequent with mutation rates of up to 83% in all tumors, compared to mutation rates of between 0 and 21% of CDKN2A, PIK3CA, HRAS, CDK4, FBXW7 and RB1. Mutational co-occurrence predominantly existed between TP53 and PIK3CA, TP53 and CDKN2A, and HRAS and PIK3CA. Mutational synonymy between primary tumor and associated metastasis and recurrence was present in respectively 88% and 89%. TP53 mutations were concordantly mutated in 95% of metastases and in 91% of recurrences. This indicates TP53 mutations to be highly prevalent and concordant in primary tumors and associated locoregional metastases and recurrences. In turn, this provides ground for further investigating the use of TP53 mutations as diagnostic biomarkers in HNSCC patients.

  8. Individuals with a family history of ESRD are a high-risk population for CKD: implications for targeted surveillance and intervention activities.

    Science.gov (United States)

    McClellan, William M; Satko, Scott G; Gladstone, Elisa; Krisher, Jenna O; Narva, Andrew S; Freedman, Barry I

    2009-03-01

    Activities intended to improve the detection, treatment, and control of chronic kidney disease (CKD) should be incorporated into existing health care systems and targeted to high-risk populations to avoid redundancy and waste of resources. One high-risk population consists of first- or second-degree family members of patients with end-stage renal disease (ESRD), who are 2 to 3 times as likely to have incident ESRD, have high rates of impaired kidney function and undetected and uncontrolled high blood pressure, and are more likely to be obese. These individuals usually are unaware of their underlying CKD and may discount their own risk of ESRD. The ESRD Network 6 Family History Project shows that the ESRD Networks, which constitute a national CKD surveillance system for patients with stage 5 CKD, may be an existing resource that can be used to identify relatives of incident patients with ESRD and provide these families with information about CKD. Nationally available resources have been developed by the National Kidney Disease Education Program for use with these at-risk families. Individuals interested in population-based CKD control activities should be aware of and use these resources.

  9. A Novel Surveillance System Applied in Civil Airport

    Directory of Open Access Journals (Sweden)

    Sun Hua Bo

    2016-01-01

    Full Text Available Conventional security monitoring of civil airport usually uses a fixed camera to acquire images. There are several problems with performance including difficulties introduced in the information transmission, storage, and analysis of the process. Insect compound eyes offer unique advantages for moving target capture and these have attracted the attention of many researchers in recent years. This paper contributes to this research by proposing a new surveillance system applied in civil airport. We discuss the finished bionic structure of the system, the development of the bionic control circuit, and introduce the proposed mathematical model of bionic compound eyes for data acquisition and image mosaic. Image matching for large view is also illustrated with different conditions. This mode and algorithm effectively achieve safety surveillance of airport with large field of view and high real-time processing.

  10. Crypto and empire: the contradictions of counter-surveillance advocacy

    NARCIS (Netherlands)

    Gürses, S.; Kundnani, A.; Van Hoboken, J.

    2016-01-01

    Since Edward Snowden’s revelations of US and UK surveillance programs, privacy advocates, progressive security engineers, and policy makers have been seeking to win majority support for countering surveillance. The problem is framed as the replacement of targeted surveillance with mass surveillance

  11. Field application of a combined pig and poultry market chain and risk pathway analysis within the Pacific Islands region as a tool for targeted disease surveillance and biosecurity.

    Science.gov (United States)

    Brioudes, Aurélie; Gummow, Bruce

    2016-07-01

    Limited resources are one of the major constraints in effective disease monitoring and control in developing countries. This paper examines the pig and poultry market chains of four targeted Pacific Island countries and territories (PICTs): Fiji, Papua New Guinea, Solomon Islands and Vanuatu and combines them with a risk pathway analysis to identify the highest risk areas (risk hotspots) and risky practices and behaviours (risk factors) of animal disease introduction and/or spread, using highly pathogenic avian influenza (HPAI) and foot-and-mouth disease (FMD) as model diseases because of their importance in the region. The results show that combining a market chain analysis with risk pathways is a practical way of communicating risk to animal health officials and improving biosecurity. It provides a participatory approach that helps officials to better understand the trading regulations in place in their country and to better evaluate their role as part of the control system. Common risk patterns were found to play a role in all four PICTs. Legal trade pathways rely essentially on preventive measures put in place in the exporting countries while no or only limited control measures are undertaken by the importing countries. Legal importations of animals and animal products are done mainly by commercial farms which then supply local smallholders. Targeting surveillance on these potential hotspots would limit the risk of introduction and spread of animal diseases within the pig and poultry industry and better rationalize use of skilled manpower. Swill feeding is identified as a common practice in the region that represents a recognized risk factor for dissemination of pathogens to susceptible species. Illegal introduction of animals and animal products is suspected, but appears restricted to small holder farms in remote areas, limiting the risk of spread of transboundary animal diseases along the market chain. Introduction of undeclared goods hidden within a legal

  12. Surveillance of Autism.

    Science.gov (United States)

    Boyle, Coleen A.; Bertrand, Jacquelyn; Yeargin-Allsopp, Marshalyn

    1999-01-01

    This article describes the autism surveillance activities of the Center for Disease Control and Prevention. It considers why surveillance to track prevalence of autistic disorders is needed, how such surveillance is conducted, and the special challenges of autism surveillance. (DB)

  13. Surveillance Angels

    NARCIS (Netherlands)

    Rothkrantz, L.J.M.

    2014-01-01

    The use of sensor networks has been proposed for military surveillance and environmental monitoring applications. Those systems are composed of a heterogeneous set of sensors to observe the environment. In centralised systems the observed data will be conveyed to the control room to process the

  14. Surveillance Angels

    NARCIS (Netherlands)

    Rothkrantz, L.J.M.

    2014-01-01

    The use of sensor networks has been proposed for military surveillance and environmental monitoring applications. Those systems are composed of a heterogeneous set of sensors to observe the environment. In centralised systems the observed data will be conveyed to the control room to process the data

  15. Evaluation of an isometric and a position joystick in a target acquisition task for individuals with cerebral palsy.

    Science.gov (United States)

    Rao, R S; Seliktar, R; Rahman, T

    2000-03-01

    Individuals with cerebral palsy (CP) with upper limb disability have difficulty operating standard computer input devices such as, a mouse and a keyboard. The present study evaluated the performance of unimpaired individuals and those with CP in the use of a zero-order spring-centered position joystick and a zero-order isometric joystick when interacting with the computer. We hypothesize that the isometric device due to its stiff resistance would provide better control on cursor movement than the position joystick. The subjects acquired differently sized targets at different distances by positioning a cursor on the target. Performance with the position joystick was superior to that of the isometric joystick. The time to acquire the target was directly proportional to the cursor-target distance A, and indirectly proportional to the target size W. Subjects chose to move more slowly toward the smaller and closer targets and they increased speed for larger and more distant targets. The phase-plane diagram that plots values of the velocity profile of the cursor over its displacement revealed the presence of one large amplitude movement that accounts for the peak velocity of the cursor, and several submovements. Fitts' index of difficulty, log(e)(2W/A) was found to be a good predictor of the movement time in a cursor positioning task for both, unimpaired individuals and those with CP.

  16. Padeliporfin vascular-targeted photodynamic therapy versus active surveillance in men with low-risk prostate cancer (CLIN1001 PCM301): an open-label, phase 3, randomised controlled trial.

    Science.gov (United States)

    Azzouzi, Abdel-Rahmène; Vincendeau, Sébastien; Barret, Eric; Cicco, Antony; Kleinclauss, François; van der Poel, Henk G; Stief, Christian G; Rassweiler, Jens; Salomon, Georg; Solsona, Eduardo; Alcaraz, Antonio; Tammela, Teuvo T; Rosario, Derek J; Gomez-Veiga, Francisco; Ahlgren, Göran; Benzaghou, Fawzi; Gaillac, Bertrand; Amzal, Billy; Debruyne, Frans M J; Fromont, Gaëlle; Gratzke, Christian; Emberton, Mark

    2017-02-01

    Vascular-targeted photodynamic therapy, a novel tissue-preserving treatment for low-risk prostate cancer, has shown favourable safety and efficacy results in single-arm phase 1 and 2 studies. We compared this treatment with the standard of care, active surveillance, in men with low-risk prostate cancer in a phase 3 trial. This randomised controlled trial was done in 47 European university centres and community hospitals. Men with low-risk, localised prostate cancer (Gleason pattern 3) who had received no previous treatment were randomly assigned (1:1) to vascular-targeted photodynamic therapy (4 mg/kg padeliporfin intravenously over 10 min and optical fibres inserted into the prostate to cover the desired treatment zone and subsequent activation by laser light 753 nm with a fixed power of 150 mW/cm for 22 min 15 s) or active surveillance. Randomisation was done by a web-based allocation system stratified by centre with balanced blocks of two or four patients. Best practice for active surveillance at the time of study design was followed (ie, biopsy at 12-month intervals and prostate-specific antigen measurement and digital rectal examination at 3-month intervals). The co-primary endpoints were treatment failure (histological progression of cancer from low to moderate or high risk or death during 24 months' follow-up) and absence of definite cancer (absence of any histology result definitely positive for cancer at month 24). Analysis was by intention to treat. Treatment was open-label, but investigators assessing primary efficacy outcomes were masked to treatment allocation. This trial is registered with ClinicalTrials.gov, number NCT01310894. Between March 8, 2011, and April 30, 2013, we randomly assigned 206 patients to vascular-targeted photodynamic therapy and 207 patients to active surveillance. Median follow-up was 24 months (IQR 24-25). The proportion of participants who had disease progression at month 24 was 58 (28%) of 206 in the vascular-targeted

  17. Air surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Patton, G.W.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the air surveillance and monitoring programs currently in operation at that Hanford Site. Atmospheric releases of pollutants from Hanford to the surrounding region are a potential source of human exposure. For that reason, both radioactive and nonradioactive materials in air are monitored at a number of locations. The influence of Hanford emissions on local radionuclide concentrations was evaluated by comparing concentrations measured at distant locations within the region to concentrations measured at the Site perimeter. This section discusses sample collection, analytical methods, and the results of the Hanford air surveillance program. A complete listing of all analytical results summarized in this section is reported separately by Bisping (1995).

  18. Tank Farm Operations Surveillance Automation Analysis

    Energy Technology Data Exchange (ETDEWEB)

    MARQUEZ, D.L.

    2000-12-21

    The Nuclear Operations Project Services identified the need to improve manual tank farm surveillance data collection, review, distribution and storage practices often referred to as Operator Rounds. This document provides the analysis in terms of feasibility to improve the manual data collection methods by using handheld computer units, barcode technology, a database for storage and acquisitions, associated software, and operational procedures to increase the efficiency of Operator Rounds associated with surveillance activities.

  19. Surveillance of Mycobacterium avium subsp. paratuberculosis in dairy herds

    NARCIS (Netherlands)

    Weber, M.F.

    2009-01-01

    In this thesis, the potential for improvements in surveillance of Mycobacterium avium subsp. paratuberculosis (Map) infection and paratuberculosis in dairy herds was investigated, leading to a reduction in surveillance costs whilst continuing to meet specific quality targets. In particular, differen

  20. Review of Australia's polio surveillance.

    Science.gov (United States)

    Paterson, Beverley J; Durrheim, David N

    2013-06-30

    With eradication almost within reach, the importance of detecting every poliomyelitis case has taken on additional significance. The selected surveillance strategy must be effective and efficient. A review of polio surveillance in Australia was conducted to consider whether current strategies were optimal. Document review and semi-structured key informant interviews were used to conduct the review. Interviews were recorded, transcribed and thematically analysed. The review was an iterative process with feedback on the findings sought from interviewees. Since Western Pacific Regional polio-elimination status was certified, one imported adult case was detected in 2007 in Australia, with no evidence of further transmission, and no Australian paediatric cases identified. Respondents reported that: it was not possible to prevent importations; paediatric cases were more likely to be identified than adult cases; and there may be a low level of suspicion among clinicians. Case detection and outbreak mitigation were considered key reasons to undertake polio surveillance. While Australia has not achieved one of the key World Health Organization (WHO) surveillance targets, this did not compromise Australias polio-free status. Identified issues with polio surveillance were the potential for an importation with high attendant investigation and containment costs, low stool sample collection rates, and the opportunity to improve safeguards around the importation and laboratory storage of biological samples containing poliovirus. The review found strong support for ongoing polio surveillance, particularly to detect imported cases and to demonstrate commitment to maintaining a polio-free region. Existing polio surveillance strategies were considered appropriate for Australia.

  1. Integrating Remote Sensing and Disease Surveillance to Forecast Malaria Epidemics

    Science.gov (United States)

    Wimberly, M. C.; Beyane, B.; DeVos, M.; Liu, Y.; Merkord, C. L.; Mihretie, A.

    2015-12-01

    Advance information about the timing and locations of malaria epidemics can facilitate the targeting of resources for prevention and emergency response. Early detection methods can detect incipient outbreaks by identifying deviations from expected seasonal patterns, whereas early warning approaches typically forecast future malaria risk based on lagged responses to meteorological factors. A critical limiting factor for implementing either of these approaches is the need for timely and consistent acquisition, processing and analysis of both environmental and epidemiological data. To address this need, we have developed EPIDEMIA - an integrated system for surveillance and forecasting of malaria epidemics. The EPIDEMIA system includes a public health interface for uploading and querying weekly surveillance reports as well as algorithms for automatically validating incoming data and updating the epidemiological surveillance database. The newly released EASTWeb 2.0 software application automatically downloads, processes, and summaries remotely-sensed environmental data from multiple earth science data archives. EASTWeb was implemented as a component of the EPIDEMIA system, which combines the environmental monitoring data and epidemiological surveillance data into a unified database that supports both early detection and early warning models. Dynamic linear models implemented with Kalman filtering were used to carry out forecasting and model updating. Preliminary forecasts have been disseminated to public health partners in the Amhara Region of Ethiopia and will be validated and refined as the EPIDEMIA system ingests new data. In addition to continued model development and testing, future work will involve updating the public health interface to provide a broader suite of outbreak alerts and data visualization tools that are useful to our public health partners. The EPIDEMIA system demonstrates a feasible approach to synthesizing the information from epidemiological

  2. Surveillance and Critical Theory

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2015-09-01

    Full Text Available In this comment, the author reflects on surveillance from a critical theory approach, his involvement in surveillance research and projects, and the status of the study of surveillance. The comment ascertains a lack of critical thinking about surveillance, questions the existence of something called “surveillance studies” as opposed to a critical theory of society, and reflects on issues such as Edward Snowden’s revelations, and Foucault and Marx in the context of surveillance.

  3. TARGET:?

    National Research Council Canada - National Science Library

    James M Acton

    2014-01-01

      By 2003. as military planners had become worried that the country's long-range conventional weapons, such as cruise missiles, might be too slow to reach hypothetical distant targets that needed to be struck urgently...

  4. Surveillance Key Frame Extraction Based on Aggregation Dispersion Entropy and Moving Target Detection%基于聚散熵及运动目标检测的监控视频关键帧提取

    Institute of Scientific and Technical Information of China (English)

    马利克; 彭进业; 冯晓毅

    2015-01-01

    针对公安监控视频检索中根据运动目标准确标注视频关键帧的问题,提出一种基于聚散熵及运动目标检测的监控视频关键帧提取算法。首先通过对视频内容的分析,提出监控视频聚散熵的概念。其次根据聚散熵对监控视频进行子镜头划分,再次根据运动目标检测对子镜头进行划分,从而提取视频关键帧。最后列举出算法在几种典型视频数据库中的实验结果及结果分析。实验结果表明该算法在关键帧提取的准确性和鲁棒性上都有良好表现,该算法针对公安监控视频检索需求,在缩短公安视频侦查时间及智能检索中起到支撑作用。%Key frame extraction is an important step in surveillance video retrieval. We propose a surveillance key frame extraction algorithm which is based on the aggregation dispersion entropy and moving target detection. Firstly, the concept of the aggregation dispersion entropy was defined to distinguish the presence of moving objects in video. Secondly, the aggregation dispersion entropy was used to divide surveillance video into several shots. And then the shots were splitted into sub⁃shots by the moving target detection. So the key frames could be got though the sub⁃shots. Finally, the algorithm of key frame extraction was given. The experimental results and their discussions were given;they showed that this algorithm has good performance both in accuracy and robustness for several different databases. Also, it is the demand of surveillance video retrieval in police use. And it is expected to be of further use in police video investigation.

  5. An autonomous surveillance system for blind sources localization and separation

    Science.gov (United States)

    Wu, Sean; Kulkarni, Raghavendra; Duraiswamy, Srikanth

    2013-05-01

    This paper aims at developing a new technology that will enable one to conduct an autonomous and silent surveillance to monitor sound sources stationary or moving in 3D space and a blind separation of target acoustic signals. The underlying principle of this technology is a hybrid approach that uses: 1) passive sonic detection and ranging method that consists of iterative triangulation and redundant checking to locate the Cartesian coordinates of arbitrary sound sources in 3D space, 2) advanced signal processing to sanitizing the measured data and enhance signal to noise ratio, and 3) short-time source localization and separation to extract the target acoustic signals from the directly measured mixed ones. A prototype based on this technology has been developed and its hardware includes six B and K 1/4-in condenser microphones, Type 4935, two 4-channel data acquisition units, Type NI-9234, with a maximum sampling rate of 51.2kS/s per channel, one NI-cDAQ 9174 chassis, a thermometer to measure the air temperature, a camera to view the relative positions of located sources, and a laptop to control data acquisition and post processing. Test results for locating arbitrary sound sources emitting continuous, random, impulsive, and transient signals, and blind separation of signals in various non-ideal environments is presented. This system is invisible to any anti-surveillance device since it uses the acoustic signal emitted by a target source. It can be mounted on a robot or an unmanned vehicle to perform various covert operations, including intelligence gathering in an open or a confined field, or to carry out the rescue mission to search people trapped inside ruins or buried under wreckages.

  6. Development of an operator`s mental model acquisition system. 1. Estimation of a physical mental model acquisition system

    Energy Technology Data Exchange (ETDEWEB)

    Ikeda, Mitsuru; Mizoguchi, Riichirou [Inst. of Scientific and Industrial Research, Osaka Univ., Ibaraki (Japan); Yoshikawa, Shinji; Ozawa, Kenji

    1997-03-01

    This report describes a technical survey of acquisition method of an operator`s understanding for functions and structures of his target nuclear plant. This method is to play a key role in the information processing framework to support on-training operators in forming their knowledge of the nuclear plants. This kind of technical framework is aiming at enhancing human operator`s ability to cope with anomaly plant situations which are difficult to expect from preceding experiences or engineering surveillance. In these cases, cause identifications and responding operation selections are desired to made not only empirically but also based on thoughts about possible phenomena to take place within the nuclear plant. This report focuses on a particular element technique, defined as `explanation-based knowledge acquisition`, as the candidate technique to potentially be extended to meet the requirement written above, and discusses about applicability to the learning support system and about necessary improvements, to identify future technical developments. (author)

  7. Reduced rectal toxicity with ultrasound-based image guided radiotherapy using BAT trademark (B-mode acquisition and targeting system) for prostate cancer

    Energy Technology Data Exchange (ETDEWEB)

    Bohrer, Markus; Schroeder, Peter; Welzel, Grit; Wertz, Hansjoerg; Lohr, Frank; Wenz, Frederik; Mai, Sabine Kathrin [University Medical Center, Mannheim (Germany). Dept. of Radiation Oncology

    2008-12-15

    To evaluate the effect of image guided radiotherapy with stereotactic ultrasound BAT (B-mode acquisition and targeting system) on rectal toxicity in conformal radiotherapy of prostate cancer. Patients and Methods 42 sequential patients with prostate cancer undergoing radiotherapy before and after the introduction of BAT were included. Planning computed tomography (CT) was performed with empty rectum and moderately filled bladder. The planning target volume (PTV) included the prostate and seminal vesicles with a safety margin of 1.5 cm in anterior and lateral direction. In posterior direction the anterior 1/3 of the rectum circumference were included. Total dose was 66 Gy and a boost of 4 Gy excluding the seminal vesicles. 22 patients (BAT group) were treated with daily stereotactic ultrasound positioning, for the other 20 patients (NoBAT group) an EPID (electronic portal imaging device) was performed once a week. Acute and late genito-urinary (GU) and rectal toxicity and PSA values were evaluated after 1.5, 3, 6, 9 and 12 months. The total median follow up of toxicity was 3 years in the BAT group and 4 years in the NoBAT group. Results In the NoBAT group significant more rectal toxicity occurred, while in GU toxicity no difference was seen. Two patients in the NoBAT group showed late rectal toxicity grade 3, no toxicity > grade 2 occurred in the BAT group. There was no significant difference in PSA reduction between the groups. Conclusion Without BAT significant more acute and a trend to more late rectal toxicity was found. With regard to dose escalation this aspect is currently evaluated with a larger number of patients using intensity-modulated radiotherapy (IMRT). (orig.)

  8. The surveillant assemblage.

    Science.gov (United States)

    Haggerty, K D; Ericson, R V

    2000-12-01

    George Orwell's 'Big Brother' and Michel Foucault's 'panopticon' have dominated discussion of contemporary developments in surveillance. While such metaphors draw our attention to important attributes of surveillance, they also miss some recent dynamics in its operation. The work of Gilles Deleuze and Felix Guattari is used to analyse the convergence of once discrete surveillance systems. The resultant 'surveillant assemblage' operates by abstracting human bodies from their territorial settings, and separating them into a series of discrete flows. These flows are then reassembled in different locations as discrete and virtual 'data doubles'. The surveillant assemblage transforms the purposes of surveillance and the hierarchies of surveillance, as well as the institution of privacy.

  9. Colorado animal-based plague surveillance systems: relationships between targeted animal species and prediction efficacy of areas at risk for humans.

    Science.gov (United States)

    Lowell, Jennifer L; Eisen, Rebecca J; Schotthoefer, Anna M; Xiaocheng, Liang; Montenieri, John A; Tanda, Dale; Pape, John; Schriefer, Martin E; Antolin, Michael F; Gage, Kenneth L

    2009-06-01

    Human plague risks (Yersinia pestis infection) are greatest when epizootics cause high mortality among this bacterium's natural rodent hosts. Therefore, health departments in plague-endemic areas commonly establish animal-based surveillance programs to monitor Y. pestis infection among plague hosts and vectors. The primary objectives of our study were to determine whether passive animal-based plague surveillance samples collected in Colorado from 1991 to 2005 were sampled from high human plague risk areas and whether these samples provided information useful for predicting human plague case locations. By comparing locations of plague-positive animal samples with a previously constructed GIS-based plague risk model, we determined that the majority of plague-positive Gunnison's prairie dogs (100%) and non-prairie dog sciurids (85.82%), and moderately high percentages of sigmodontine rodents (71.4%), domestic cats (69.3%), coyotes (62.9%), and domestic dogs (62.5%) were recovered within 1 km of the nearest area posing high peridomestic risk to humans. In contrast, the majority of white-tailed prairie dog (66.7%), leporid (cottontailed and jack rabbits) (71.4%), and black-tailed prairie dog (93.0%) samples originated more than 1 km from the nearest human risk habitat. Plague-positive animals or their fleas were rarely (one of 19 cases) collected within 2 km of a case exposure site during the 24 months preceding the dates of illness onset for these cases. Low spatial accuracy for identifying epizootic activity prior to human plague cases suggested that other mammalian species or their fleas are likely more important sources of human infection in high plague risk areas. To address this issue, epidemiological observations and multi-locus variable number tandem repeat analyses (MLVA) were used to preliminarily identify chipmunks as an under-sampled, but potentially important, species for human plague risk in Colorado.

  10. Presence, distribution, and molecular epidemiology of methicillin-resistant Staphylococcus aureus in a small animal teaching hospital: a year-long active surveillance targeting dogs and their environment.

    Science.gov (United States)

    van Balen, Joany; Kelley, Christina; Nava-Hoet, Rocio C; Bateman, Shane; Hillier, Andrew; Dyce, Jonathan; Wittum, Thomas E; Hoet, Armando E

    2013-05-01

    Methicillin-resistant Staphylococcus aureus (MRSA) is known to be present in small animal veterinary clinical environments. However, a better understanding of the ecology and dynamics of MRSA in these environments is necessary for the development of effective infectious disease prevention and control programs. To achieve this goal, a yearlong active MRSA surveillance program was established at The Ohio State University (OSU) Veterinary Medical Center to describe the spatial and molecular epidemiology of this bacterium in the small animal hospital. Antimicrobial susceptibility testing, staphylococcal chromosomal cassette mec (SCCmec) typing, pulsed-field gel electrophoresis (PFGE) typing, and dendrogram analysis were used to characterize and analyze the 81 environmental and 37 canine-origin MRSA isolates obtained during monthly sampling events. Overall, 13.5% of surfaces were contaminated with MRSA at 1 or more sampling times throughout the year. The majority of the environmental and canine isolates were SCCmec type II (93.8% and 86.5%, respectively) and USA100 (90.1% and 86.5%, respectively). By PFGE analysis, these isolates were found to be closely related, which reflects a low diversity of MRSA strains circulating in the hospital. For 5 consecutive months, 1 unique pulsotype was the most prevalent across the medical services and was recovered from a variety of surfaces and hospital locations. Carts/gurneys, doors, and examination tables/floors were the most frequently contaminated surfaces. Some surfaces maintained the same pulsotypes for 3 consecutive months. Molecular analysis found that incoming MRSA-positive dogs were capable of introducing a new pulsotype into the hospital environment during the surveillance period. Our results suggest that once a MRSA strain is introduced into the hospital environment, it can be maintained and spread for extended periods of time. These findings can aid in the development of biosecurity and biocontainment protocols aimed at

  11. 基于DIVA模型的语音-映射单元自动获取%Automatic acquisition of speech sound-target cells based on DIVA model

    Institute of Scientific and Technical Information of China (English)

    张少白; 刘欣

    2013-01-01

    针对DIVA模型中存在的“感知能力与语音生成技巧发育不平衡”问题,提出了一种自动获取语音-映射单元的方法。该方法将人耳模拟为一个具有不同带宽的并联带通滤波器组,分别与模型中21维度的听觉存储空间相关联,对不同听觉的不同反应,分别考虑其频带的屏蔽效应、听觉响度与频率的关系。在读取语音输入信号的过程中,模型能较好地获得初始听觉表示,其方式与婴儿咿呀学语的过程基本一致。仿真实验表明,通过边界定义、相似性比较以及搜索更新等步骤,此方法能很好地进行初始输入模式的自组织匹配,并最终使DIVA模型更具语音获取的自然特性。%Contraposing the shortage of Directions Into Velocities of Articulators ( DIVA) model about“infants per-ceptual abilities do develop faster at first than their speech production skills”, the paper presents an automatic ac-quisition method of speech sound-target cells. The method simulates the human ear as a parallel band-pass filter group with different bandwidth and associates respectively;the filter with the 21-dimensional storage space of audi-tory sense in DIVA model. This method was done in order for different auditory reactions, the shielding effect of fre-quency band, sound loudness, and frequency relation could be considered respectively for this study. In the process of reading the input signal of speech, the model can acquire good initial hearing and the process is consistent with baby's babble. The simulation results show that through boundary definition, similarity comparison, searching and updates and so on, the method has nicer self-organized pattern matching effect for initial input, which makes the DIVA model a more natural characteristic regarding speech acquisition.

  12. AIDS-case surveillance.

    Science.gov (United States)

    Lal, S; Khodakevich, L; Sengupta, D

    1994-01-01

    In 1991 in India, the Ministry of Health realized that the diagnostic and reporting network for AIDS cases was inadequate as AIDS cases grew and that the establishment of specialized AIDS units in hospitals was not the best strategy. It decided to integrate AIDS diagnostic and management facilities into primary health services. It would arrange training for 1 physician from each district and peripheral hospital, private hospital, and inpatient service of other medical institutions in AIDS diagnosis and management. These physicians would then train others in the clinical diagnosis and management of AIDS cases. The physicians would use the World Health Organization [WHO] case definition of AIDS supported by HIV serological test results. All AIDS cases would be transferred to the Medical College Hospitals of the States and Union Territories (UTs), regional hospitals, and perhaps some private hospitals. Between May 1986 and October 1993, India had 459 AIDS cases reported from 19 States and UTs, especially the States of Tamil Nadul and Maharashtra. This AIDS case surveillance system should motivate political will, describe the underlying and preceding HIV epidemic, and contribute to the understanding of current and future course of the epidemic. Thus, it will guide decision makers to develop sound preventive strategies, to plan health care, and to evaluate interventions. The surveillance system's target population is all outpatients and inpatients at medical institutions. During 1993-1994, 1000 hospitals should make up the network of referral institutions. AIDS case surveillance coordinators (ASCs) at each institution form the basis of the network. The individual case record of each suspected AIDS case will have details on his/her life and medical history. Records of confirmed cases will be sent to State ASCs who will compile them for the National AIDS Control Organisation. After 3-4 year of training and practice in AIDS diagnosis and reporting, AIDS reporting will be

  13. Targeted surveillance on nosocomial infection and analysis on intervention effect in integrated ICU%综合ICU医院感染目标性监测及干预效果调查

    Institute of Scientific and Technical Information of China (English)

    张萍; 王光明; 焦婕英; 秦彩玲; 葛敏

    2013-01-01

    目的 通过开展目标性检测,了解ICU医院感染发生情况、危险因素及干预效果.方法 采用前瞻性目标性监测的方法,对2011年7月—2012年6月兵器工业五二一医院ICU患者进行医院感染监测,同时运用PDCA循环的方法进行干预.结果 监测338例患者,发生医院感染52例次,例次感染发病率为15.38%,调整例次感染发病率为4.13%;呼吸机相关性肺炎42.58‰,导尿管相关性尿路感染4.33‰,导管相关性血流感染4.94‰.结论 ICU患者导管使用多,呼吸机相关性肺炎发生率高,应加强监测,并针对危险因素运用PDCA循环的方法进行干预,效果良好.%[Objective]To carry out the targeted surveillance, understand the incidence rate, risk factors .and intervention effect of nosocomial infection in ICU. [Methods] By using prospective targeted surveillance, patients in ICU of No. 521 Hospital ( Ordnance Industry Health Institute) were monitored for f nosocomial infection from July 2011 to June 2012, and the intervention was conducted by PDCA circulation method. [Results] Among 338 patients, there were 52 cases-times of nosoeomial infection with the incidence rate of 15.38% , and adjusted incidence rate was 4.13%. The rate of ventilator associated pneumonia was 42.58%e, the rate of catheter associated urinary tract infection was 4. 33%., and the rate of catheter related bloodstream infection was 4. 94%e. [ Conclusion] ICU patients are treated with catheter more frequently, and the incidence rate of ventilator associated pneumonia is high. It is necessary to strengthen the surveillance and implement the effective intervention of PDCA circulation method according to risk factors, which has good effect.

  14. Activation of phosphatidylinositol 3-kinase/Akt-mammalian target of Rapamycin signaling pathway in the hippocampus is essential for the acquisition of morphine-induced place preference in rats.

    Science.gov (United States)

    Cui, Yue; Zhang, X Q; Cui, Y; Xin, W J; Jing, J; Liu, X G

    2010-11-24

    Hippocampus is a critical structure for the acquisition of morphine-induced conditioned place preference (CPP), which is a usual learning paradigm for assessing drug reward. However, the precise mechanisms remain largely unknown. Phosphatidylinositol 3-kinase (PI3K) and its downstream targets, including Akt, mammalian target of Rapamycin (mTOR) and 70-kDa ribosomal S6 kinase (p70S6K), are critical molecules implicated in learning and memory. Here, we tested the role of PI3K/Akt-mTOR-p70S6K signaling pathway in morphine-induced CPP in the hippocampus. Our results showed that the acquisition of morphine CPP increased phosphorylation of Akt in the hippocampal CA3, but not in the nucleus accumbens (NAc), the ventral tegmental area (VTA) or the CA1. Moreover, the phosphorylated Akt exclusively expressed in the CA3 neurons. Likewise, levels of phosphorylated mTOR and p70S6K were significantly enhanced in the CA3 following morphine CPP. The alterations of these phosphorylated proteins are positively correlated with the acquisition of morphine CPP. More importantly, microinjection of PI3K inhibitor (LY294002) or mTOR inhibitor (Rapamycin) into the CA3 prevented the acquisition of CPP and inhibited the activation of PI3K-Akt signaling pathway. In addition, pre-infusion of β-FNA (β-funaltrexamine hydrochloride), a selective irreversible μ opioid receptor antagonist, into CA3 significantly prevented the acquisition of CPP and impaired Akt phosphorylation. All these results strongly implied that the PI3K-Akt signaling pathway activated by μ opioid receptor in hippocampal CA3 plays an important role in acquisition of morphine-induced CPP.

  15. Development and Validation of a Qualitative Method for Target Screening of 448 Pesticide Residues in Fruits and Vegetables Using UHPLC/ESI Q-Orbitrap Based on Data-Independent Acquisition and Compound Database.

    Science.gov (United States)

    Wang, Jian; Chow, Willis; Chang, James; Wong, Jon W

    2017-01-18

    A semiautomated qualitative method for target screening of 448 pesticide residues in fruits and vegetables was developed and validated using ultrahigh-performance liquid chromatography coupled with electrospray ionization quadrupole Orbitrap high-resolution mass spectrometry (UHPLC/ESI Q-Orbitrap). The Q-Orbitrap Full MS/dd-MS(2) (data dependent acquisition) was used to acquire product-ion spectra of individual pesticides to build a compound database or an MS library, while its Full MS/DIA (data independent acquisition) was utilized for sample data acquisition from fruit and vegetable matrices fortified with pesticides at 10 and 100 μg/kg for target screening purpose. Accurate mass, retention time and response threshold were three key parameters in a compound database that were used to detect incurred pesticide residues in samples. The concepts and practical aspects of in-spectrum mass correction or solvent background lock-mass correction, retention time alignment and response threshold adjustment are discussed while building a functional and working compound database for target screening. The validated target screening method is capable of screening at least 94% and 99% of 448 pesticides at 10 and 100 μg/kg, respectively, in fruits and vegetables without having to evaluate every compound manually during data processing, which significantly reduced the workload in routine practice.

  16. Knowledge Transfers following Acquisition

    DEFF Research Database (Denmark)

    Gammelgaard, Jens

    2001-01-01

    Prior relations between the acquiring firm and the target company pave the way for knowledge transfers subsequent to the acquisitions. One major reason is that through the market-based relations the two actors build up mutual trust and simultaneously they learn how to communicate. An empirical...... study of 54 Danish acquisitions taking place abroad from 1994 to 1998 demonstrated that when there was a high level of trust between the acquiring firm and the target firm before the take-over, then medium and strong tie-binding knowledge transfer mechanisms, such as project groups and job rotation...

  17. 基于 OpenGL 的空间目标监视雷达三维显示系统%3D Display System for Space Target Surveillance Radar Based on OpenGL

    Institute of Scientific and Technical Information of China (English)

    沈静波; 刘扬

    2015-01-01

    Due to large detection range of space target surveillance radar and great height of target,a 3D display system is needed to reflect the target’s real spatial position.A framework of radar 3D display system based on OpenGL is proposed,and its modules are divided.For the demands of assistant display for space target,a design for radar beam and search sectors display is put forward to reflect the real-time beam schedu-ling of radar.An earth texture management based on quadtree dynamic fractal is proposed for high resolution display of the surface.A rotation method of 3D earth based on virtual trace ball is proposed to adjust the user’s angle of view agilely.The system is implemented in a space target surveillance radar successfully, achieving smooth display and fluent image.%空间目标监视雷达探测范围较远,目标高度较高,所以需要三维显示软件来反映目标实际的空间位置信息。基于 OpenGL 提出了一种雷达三维显示系统的设计框架和模块划分。针对空间目标的辅助显示需求,提出了雷达波束和搜索屏的显示设计,可以实时反映雷达的波束调度情况;提出了一种基于四叉树动态分形的地球纹理管理方法,用于实现高精度的地表纹理显示;提出了一种基于虚拟轨迹球的三维地球旋转设计,实现了灵活的用户视角调整。该系统已在某型空间目标监视雷达上成功应用,画面显示平滑流畅。

  18. Evaluation of multivariate surveillance

    OpenAIRE

    Frisén,Marianne; Andersson, Eva; Schiöler, Linus

    2009-01-01

    Multivariate surveillance is of interest in many areas such as industrial production, bioterrorism detection, spatial surveillance, and financial transaction strategies. Some of the suggested approaches to multivariate surveillance have been multivariate counterparts to the univariate Shewhart, EWMA, and CUSUM methods. Our emphasis is on the special challenges of evaluating multivariate surveillance methods. Some new measures are suggested and the properties of several measures are demonstrat...

  19. Foreign Acquisition, Wages and Productivity

    DEFF Research Database (Denmark)

    Bandick, Roger

    This paper studies the effect of foreign acquisition on wages and total factor productivity (TFP) in the years following a takeover by using unique detailed firm-level data for Sweden for the period 1993-2002. The paper takes particular account of the potential endogeneity of the acquisition...... no effects on overall, skilled or less-skilled wage growth neither in targeted Swedish MNEs nor in targeted Swedish non-MNEs and neither if the acquisition was motivated by vertical or horizontal motives. However, the results indicate that both targeted Swedish MNEs and non-MNEs have better growth in TFP...

  20. Foreign Acquisition, Wages and Productivity

    DEFF Research Database (Denmark)

    Bandick, Roger

    2011-01-01

    This paper studies the effect of foreign acquisition on wages and total factor productivity (TFP) in the years following a takeover by using unique detailed firm-level data for Sweden for the period 1993-2002. The paper takes particular account of the potential endogeneity of the acquisition...... no effects on overall, skilled or less-skilled wage growth neither in targeted Swedish MNEs nor in targeted Swedish non-MNEs and neither if the acquisition was motivated by vertical or horizontal motives. However, the results indicate that both targeted Swedish MNEs and non-MNEs have better growth in TFP...

  1. GEIS Surveillance Network Program

    Science.gov (United States)

    2013-10-01

    resistance surveillance, diarrhea etiology and antimicrobial resistance surveillance, sexually transmitted illness surveillance, and capacity building...vomiting, diarrhea , joint pains, general malaise. Of the samples analyzed, only 53.7% had an associated etiology: Malaria (47.0%, EBV (39.7...immunity to the disease. Many adults in those situations are reservoirs, facilitating continuing disease transmission to those without immunity. In Kenya

  2. SOA-surveillance Nederland

    NARCIS (Netherlands)

    Rijlaarsdam J; Bosman A; Laar MJW van de; CIE

    2000-01-01

    In May 1999 a working group was started to evaluate the current surveillance systems for sexually transmitted diseases (STD) and to make suggestions for a renewed effective and efficient STD surveillance system in the Netherlands. The surveillance system has to provide insight into the prevalence an

  3. SOA-surveillance Nederland

    NARCIS (Netherlands)

    Rijlaarsdam J; Bosman A; Laar MJW van de; CIE

    2000-01-01

    In May 1999 a working group was started to evaluate the current surveillance systems for sexually transmitted diseases (STD) and to make suggestions for a renewed effective and efficient STD surveillance system in the Netherlands. The surveillance system has to provide insight into the prevalence

  4. ASGE Technology Committee systematic review and meta-analysis assessing the ASGE Preservation and Incorporation of Valuable Endoscopic Innovations thresholds for adopting real-time imaging-assisted endoscopic targeted biopsy during endoscopic surveillance of Barrett's esophagus.

    Science.gov (United States)

    Thosani, Nirav; Abu Dayyeh, Barham K; Sharma, Prateek; Aslanian, Harry R; Enestvedt, Brintha K; Komanduri, Sri; Manfredi, Michael; Navaneethan, Udayakumar; Maple, John T; Pannala, Rahul; Parsi, Mansour A; Smith, Zachary L; Sullivan, Shelby A; Banerjee, Subhas

    2016-04-01

    Endoscopic real-time imaging of Barrett's esophagus (BE) with advanced imaging technologies enables targeted biopsies and may eliminate the need for random biopsies to detect dysplasia during endoscopic surveillance of BE. This systematic review and meta-analysis was performed by the American Society for Gastrointestinal Endoscopy (ASGE) Technology Committee to specifically assess whether acceptable performance thresholds outlined by the ASGE Preservation and Incorporation of Valuable Endoscopic Innovations (PIVI) document for clinical adoption of these technologies have been met. We conducted meta-analyses calculating the pooled sensitivity, negative predictive value (NPV), and specificity for chromoendoscopy by using acetic acid and methylene blue, electronic chromoendoscopy by using narrow-band imaging, and confocal laser endomicroscopy (CLE) for the detection of dysplasia. Random effects meta-analysis models were used. Statistical heterogeneity was evaluated by means of I(2) statistics. The pooled sensitivity, NPV, and specificity for acetic acid chromoendoscopy were 96.6% (95% confidence interval [CI], 95-98), 98.3% (95% CI, 94.8-99.4), and 84.6% (95% CI, 68.5-93.2), respectively. The pooled sensitivity, NPV, and specificity for electronic chromoendoscopy by using narrow-band imaging were 94.2% (95% CI, 82.6-98.2), 97.5% (95% CI, 95.1-98.7), and 94.4% (95% CI, 80.5-98.6), respectively. The pooled sensitivity, NPV, and specificity for endoscope-based CLE were 90.4% (95% CI, 71.9-97.2), 98.3% (95% CI, 94.2-99.5), and 92.7% (95% CI, 87-96), respectively. Our meta-analysis indicates that targeted biopsies with acetic acid chromoendoscopy, electronic chromoendoscopy by using narrow-band imaging, and endoscope-based CLE meet the thresholds set by the ASGE PIVI, at least when performed by endoscopists with expertise in advanced imaging techniques. The ASGE Technology Committee therefore endorses using these advanced imaging modalities to guide targeted biopsies for

  5. Targeting human papillomavirus to reduce the burden of cervical, vulvar and vaginal cancer and pre-invasive neoplasia: establishing the baseline for surveillance.

    Science.gov (United States)

    Nygård, Mari; Hansen, Bo Terning; Dillner, Joakim; Munk, Christian; Oddsson, Kristján; Tryggvadottir, Laufey; Hortlund, Maria; Liaw, Kai-Li; Dasbach, Erik J; Kjær, Susanne Krüger

    2014-01-01

    Infection with high-risk human papillomavirus (HPV) is causally related to cervical, vulvar and vaginal pre-invasive neoplasias and cancers. Highly effective vaccines against HPV types 16/18 have been available since 2006, and are currently used in many countries in combination with cervical cancer screening to control the burden of cervical cancer. We estimated the overall and age-specific incidence rate (IR) of cervical, vulvar and vaginal cancer and pre-invasive neoplasia in Denmark, Iceland, Norway and Sweden in 2004-2006, prior to the availability of HPV vaccines, in order to establish a baseline for surveillance. We also estimated the population attributable fraction to determine roughly the expected effect of HPV16/18 vaccination on the incidence of these diseases. Information on incident cervical, vulvar and vaginal cancers and high-grade pre-invasive neoplasias was obtained from high-quality national population-based registries. A literature review was conducted to define the fraction of these lesions attributable to HPV16/18, i.e., those that could be prevented by HPV vaccination. Among the four countries, the age-standardised IR/10⁵ of cervical, vaginal and vulvar cancer ranged from 8.4-13.8, 1.3-3.1 and 0.2-0.6, respectively. The risk for cervical cancer was highest in women aged 30-39, while vulvar and vaginal cancers were most common in women aged 70+. Age-standardised IR/10⁵ of cervical, vulvar and vaginal pre-invasive neoplasia ranged between 138.8-183.2, 2.5-8.8 and 0.5-1.3, respectively. Women aged 20-29 had the highest risk for cervical pre-invasive neoplasia, while vulvar and vaginal pre-invasive neoplasia peaked in women aged 40-49 and 60-69, respectively. Over 50% of the observed 47,820 incident invasive and pre-invasive cancer cases in 2004-2006 can be attributed to HPV16/18. In the four countries, vaccination against HPV 16/18 could prevent approximately 8500 cases of gynecological cancer and pre-cancer annually. Population-based cancer

  6. Sensors for Desert Surveillance

    Directory of Open Access Journals (Sweden)

    B. S. Chauhan

    2005-10-01

    Full Text Available Various types of sensors-visible, passive night vision, infrared, synthetic aperture radar, etc can be used for desert surveillance. The surveillance capability of these sensors depends to a large extent, on various atmospheric effects, viz., absorption, scattering, aerosol, turbulence, and optical mirage. In this paper, effects of various atmospheric phenomena on the transmission of signals, merits and demerits of different means of surveillance under desert environmental conditions are discussed. Advanced surveillance techniques, ie, multisensor fusion, multi and hyperspectral imaging, having special significance for desert surveillance, have also been discussed.

  7. Health environmental risks surveillance systems: toxicological surveillance

    OpenAIRE

    Ana Ferrer Dufol; Santiago Nogué Xarau; Francisco Vargas Marcos; Olivia Castillo Soria; Pilar Gascó Alberich; Ana de la Torre Reoyo; Eduardo de la Peña de Torres

    2004-01-01

    A study of the Clinical Toxicological Section, about the Epidemiological Surveillance in Emergency Services, in relation to chemical products intoxications during the 1999-2003 period, is presented. This work is a result of an agreement between the Spanish Toxicological Association (AETOX) and the Spanish Ministry of Health and Consumption, and was presented in the National Congress of Environment (CONAMA) within the “Health Environmental Risks Surveillance Systems” working group.

  8. Targeted surveillance of nosocomial infections in general ICU%综合性 ICU 医院感染目标性监测结果分析

    Institute of Scientific and Technical Information of China (English)

    王娇; 陈梦燕; 黄静

    2015-01-01

    OBJECTIVE To understand the prevalence of nosocomial infections in ICU patients and take targeted in‐terventions so as to control the nosocomial infections .METHODS According to the Standards for targeted surveil‐lance of nosocomial infections ,the incidence of nosocomial infections ,daily infection rate ,incidence of three types of catheter‐related infections ,nosocomial infection sites ,and distribution of pathogens in the ICU patients who were hospitalized from Feb 2012 to Feb 2013 were monitored .RESULTS The nosocomial infections occurred in 78 (72 case‐times) of 655 patients with the incidence of nosocomial infections of 11 .90% and the case‐time infection rate of 12 .52% ;the daily infection rate was 13 .84‰ ,and the case‐time daily infection rate was 14 .55‰ ;the inci‐dence of central venous catheter‐related bloodstream infections was 0 .56‰ ,the incidence of urinary catheter‐relat‐ed urinary tract infections was 1 .15‰ ,and the incidence of ventilator‐associated pneumonia was 78 .43‰ .The in‐cidence of lower respiratory tract infections was 80 .25% ,the incidence of bloodstream infections was 7 .41% ,the incidence of urinary tract infections was 3 .70% .The K lebsiella pneumoniae was dominant among the isolated pathogens ,accounting for 42 .74% .CONCLUSION The incidence of nosocomial infections is high in the ICU ,and the catheter‐related infections are the high risk factors .It is necessary to take targeted rectification measures of the ward management so as to reduce the incidence of nosocomial infections .%目的:了解医院IC U患者发生医院感染的情况,以采取针对性的干预措施控制医院感染的发生。方法根据《医院感染目标性监测规范》,监测2012年2月-2013年2月入住IC U患者的医院感染率、日感染率、3种导管相关感染率、医院感染部位及感染病原菌分布。结果监测的655例患者中发生医院感染78例、82例次,医院感染率11

  9. Reassembling Surveillance Creep

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    2017-01-01

    We live in societies in which surveillance technologies are constantly introduced, are transformed, and spread to new practices for new purposes. How and why does this happen? In other words, why does surveillance “creep”? This question has received little attention either in theoretical...... development or in empirical analyses. Accordingly, this article contributes to this special issue on the usefulness of Actor-Network Theory (ANT) by suggesting that ANT can advance our understanding of ‘surveillance creep’. Based on ANT’s model of translation and a historical study of the Danish DNA database......, we argue that surveillance creep involves reassembling the relations in surveillance networks between heterogeneous actors such as the watchers, the watched, laws, and technologies. Second, surveillance creeps only when these heterogeneous actors are adequately interested and aligned. However...

  10. Handbook of surveillance technologies

    CERN Document Server

    Petersen, JK

    2012-01-01

    From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry. The Handbook of Surveillance Technologies, Third Edition is the only comprehensive work to chronicle the background and current applications of the full-range of surveillance technologies--offering the latest in surveillance and privacy issues.Cutting-Edge--updates its bestselling predecessor with discussions on social media, GPS circuits in cell phones and PDAs, new GIS s

  11. Redefining syndromic surveillance.

    Science.gov (United States)

    Katz, Rebecca; May, Larissa; Baker, Julia; Test, Elisa

    2011-12-01

    With growing concerns about international spread of disease and expanding use of early disease detection surveillance methods, the field of syndromic surveillance has received increased attention over the last decade. The purpose of this article is to clarify the various meanings that have been assigned to the term syndromic surveillance and to propose a refined categorization of the characteristics of these systems. Existing literature and conference proceedings were examined on syndromic surveillance from 1998 to 2010, focusing on low- and middle-income settings. Based on the 36 unique definitions of syndromic surveillance found in the literature, five commonly accepted principles of syndromic surveillance systems were identified, as well as two fundamental categories: specific and non-specific disease detection. Ultimately, the proposed categorization of syndromic surveillance distinguishes between systems that focus on detecting defined syndromes or outcomes of interest and those that aim to uncover non-specific trends that suggest an outbreak may be occurring. By providing an accurate and comprehensive picture of this field's capabilities, and differentiating among system types, a unified understanding of the syndromic surveillance field can be developed, encouraging the adoption, investment in, and implementation of these systems in settings that need bolstered surveillance capacity, particularly low- and middle-income countries. Copyright © 2011 Ministry of Health, Saudi Arabia. Published by Elsevier Ltd. All rights reserved.

  12. Surveillance of antibiotic resistance

    National Research Council Canada - National Science Library

    Johnson, Alan P

    2015-01-01

    .... Surveillance of antibiotic resistance involves the collection of antibiotic susceptibility test results undertaken by microbiology laboratories on bacteria isolated from clinical samples sent for investigation...

  13. Foreign acquisition, plant survival, and employment growth

    DEFF Research Database (Denmark)

    Bandick, Roger; Görg, Holger

    2010-01-01

    endogeneity of acquisition using IV and propensity score matching approaches suggest that acquisition by foreign owners increases the lifetime of the acquired plants only if the plant was an exporter. The effect is robust to controlling for domestic acquisitions and differs between horizontal and vertical...... acquisitions. We find robust positive employment growth effects only for exporters and only if the takeover is vertical.......This paper analyzes the effect of foreign acquisition on survival and employment growth of targets using data on Swedish manufacturing plants.We separate targeted plants into those within Swedish MNEs, Swedish exporting non-MNEs, and purely domestic firms. The results, controlling for possible...

  14. High-Speed Data Acquisition System Design of Underwater Target Laser Detection%水下目标激光探测系统中高速信号采集系统的设计

    Institute of Scientific and Technical Information of China (English)

    王鹏飞

    2013-01-01

    介绍了水下目标激光探测高速数据采集系统设计的技术难点,设计了一种基于高速CMOS模/数转换芯片和高性能Stratix Ⅱ FPGA高速数据采集芯片的水下激光信号实时采集与传输系统,信号采集速率可达1GHz.系统的适用性及可靠性在水下目标激光探测试验中得到了验证.%To meet the requirements of high speed data acquisition of underwater laser detection system,1 GSPS high-speed data acquisition system is designed based on high-speed CMOS analog to digit chip and high performance FPGA.The system scheme of high-speed data acquisition is introduced.The applicability and reliability of the system are verified in the test of underwater target laser detection.

  15. Range-Gated Laser Stroboscopic Imaging for Night Remote Surveillance

    Institute of Scientific and Technical Information of China (English)

    WANG Xin-Wei; ZHOU Yan; FAN Song-Tao; HE Jun; LIU Yu-Liang

    2010-01-01

    @@ For night remote surveillance,we present a method,the range-gated laser stroboscopic imaging(RGLSI),which uses a new kind of time delay integration mode to integrate target signals so that night remote surveillance can be realized by a low-energy illuminated laser.The time delay integration in this method has no influence on the video frame rate.

  16. Surveillance and persuasion

    NARCIS (Netherlands)

    Nagenborg, Michael

    2014-01-01

    This paper is as much about surveillance as about persuasive technologies (PTs). With regard to PTs it raises the question about the ethical limits of persuasion. It will be argued that even some forms of self-imposed persuasive soft surveillance technologies may be considered unethical. Therefore,

  17. Soil and vegetation surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Antonio, E.J.

    1995-06-01

    Soil sampling and analysis evaluates long-term contamination trends and monitors environmental radionuclide inventories. This section of the 1994 Hanford Site Environmental Report summarizes the soil and vegetation surveillance programs which were conducted during 1994. Vegetation surveillance is conducted offsite to monitor atmospheric deposition of radioactive materials in areas not under cultivation and onsite at locations adjacent to potential sources of radioactivity.

  18. Human Factors Issues for Controlling Uninhabited Aerial Vehicles: Preliminary Findings in Support of the Canadian Forces Joint Unmanned Aerial Vehicle Surveillance Target Acquisition System Project (Incidence des Facteurs Humains sur le Pilotage des Vehicules Aeriens Telepilotes: Constatations Preliminaires a L’Appui du Projet de Systeme Interarmees D’Acquisition D’Objectif au Moyen de Vehicules Aeriens Telepilotes de Surveillance des Forces Canadiennes)

    Science.gov (United States)

    2010-11-01

    signal detection theory measures of the user’s sensitivity (d ) and the user’s own criterion ( ) (Macmillan & Creelman , 1991), whereby a drop in arousal...Medical Research Council, H. M. Stationery Office. [67] Macmillan, N. A., & Creelman , C. D. (1991). Detection theory: A user’s guide. New York, NY

  19. 2012 Sexually Transmitted Diseases Surveillance

    Science.gov (United States)

    ... National Summary Chlamydia Gonorrhea Syphilis Chancroid Selected STDs Appendix Appendix Interpreting STD Surveillance Data Appendix Tables A1 - A4 STD Surveillance Case Definitions Contributors ...

  20. HIV surveillance in complex emergencies.

    Science.gov (United States)

    Salama, P; Dondero, T J

    2001-04-01

    Many studies have shown a positive association between both migration and temporary expatriation and HIV risk. This association is likely to be similar or even more pronounced for forced migrants. In general, HIV transmission in host-migrant or host-forced-migrant interactions depends on the maturity of the HIV epidemic in both the host and the migrant population, the relative seroprevalence of HIV in the host and the migrant population, the prevalence of other sexually transmitted infections (STIs) that may facilitate transmission, and the level of sexual interaction between the two communities. Complex emergencies are the major cause of mass population movement today. In complex emergencies, additional factors such as sexual interaction between forced-migrant populations and the military; sexual violence; increasing commercial sex work; psychological trauma; and disruption of preventive and curative health services may increase the risk for HIV transmission. Despite recent success in preventing HIV infection in stable populations in selected developing countries, internally displaced persons and refugees (or forced migrants) have not been systematically included in HIV surveillance systems, nor consequently in prevention activities. Standard surveillance systems that rely on functioning health services may not provide useful data in many complex emergency settings. Secondary sources can provide some information in these settings. Little attempt has been made, however, to develop innovative HIV surveillance systems in countries affected by complex emergencies. Consequently, data on the HIV epidemic in these countries are scarce and HIV prevention programs are either not implemented or interventions are not effectively targeted. Second generation surveillance methods such as cross-sectional, population-based surveys can provide rapid information on HIV, STIs, and sexual behavior. The risks for stigmatization and breaches of confidentiality must be recognized

  1. Mergers + acquisitions.

    Science.gov (United States)

    Hoppszallern, Suzanna

    2002-05-01

    The hospital sector in 2001 led the health care field in mergers and acquisitions. Most deals involved a network augmenting its presence within a specific region or in a market adjacent to its primary service area. Analysts expect M&A activity to increase in 2002.

  2. Market-Based Approach to Mobile Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Ahmed M. Elmogy

    2012-01-01

    Full Text Available The active surveillance of public and private sites is increasingly becoming a very important and critical issue. It is, therefore, imperative to develop mobile surveillance systems to protect these sites. Modern surveillance systems encompass spatially distributed mobile and static sensors in order to provide effective monitoring of persistent and transient objects and events in a given area of interest (AOI. The realization of the potential of mobile surveillance requires the solution of different challenging problems such as task allocation, mobile sensor deployment, multisensor management, cooperative object detection and tracking, decentralized data fusion, and interoperability and accessibility of system nodes. This paper proposes a market-based approach that can be used to handle different problems of mobile surveillance systems. Task allocation and cooperative target tracking are studied using the proposed approach as two challenging problems of mobile surveillance systems. These challenges are addressed individually and collectively.

  3. Tumor-Associated Glycans and Immune Surveillance

    OpenAIRE

    Anastas Pashov; Behjatolah Monzavi-Karbassi; Thomas Kieber-Emmons

    2013-01-01

    Changes in cell surface glycosylation are a hallmark of the transition from normal to inflamed and neoplastic tissue. Tumor-associated carbohydrate antigens (TACAs) challenge our understanding of immune tolerance, while functioning as immune targets that bridge innate immune surveillance and adaptive antitumor immunity in clinical applications. T-cells, being a part of the adaptive immune response, are the most popular component of the immune system considered for targeting tumor cells. Howev...

  4. Mergers & Acquisitions

    DEFF Research Database (Denmark)

    Fomcenco, Alex

    and functioning of provisions of European federal corporate law and internationally accepted principles of the law of obligations. This book, however, is not about clarification of the reasons that urge for M&A operations, nor is it about judging the outcome of the transactions. It is about synthesizing......MERGERS & ACQUISITIONS: Counseling and Choice of Method describes and analyzes the current state of law in Europe in regard to some relevant selected elements related to mergers and acquisitions, and the adviser’s counsel in this regard. The focus is aimed and maintained at application......, on the one hand, the methods of M&A and, on the other hand, several selected key elements. Any participating party - as well as their respective advisers - must be aware of these elements prior, throughout, and after the transaction: consideration, succession, taxes and fiscal neutrality, group...

  5. Design and Research of Distributed Real TimeSurveillance Control System

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    Distributed real time surveillance control system is used especially in distributed computer measure and control system, mostly inwidely dispersed measure points without human surveillance. This paper describes theory、construction、control strategy, stabilityanalysis of distributed real time supervisory control and data acquisition system, implements distributed measure signals collectionand design of supervisory control system. The realization of virtual instrument based on VC++ can accomplish measurementsignals acquisition, storage, display and analysis, also the result of surveillance control system is provided, and shows thefunctional powerful agility of virtual instrument based on VC++.

  6. Real-time wideband holographic surveillance system

    Energy Technology Data Exchange (ETDEWEB)

    Sheen, David M. (1917 Hood, Richland, WA 99352); Collins, H. Dale (1751 Duluth, Richland, WA 99352); Hall, Thomas E. (8301 W. Entiat Pl., Kennewick, WA 99336); McMakin, Douglas L. (2173 Shasta Ave., Richland, WA 99352); Gribble, R. Parks (1215 Cottonwood Dr., Richland, WA 99352); Severtsen, Ronald H. (1803 Birch Ave., Richland, WA 99352); Prince, James M. (3029 W. 2nd Ave., Apt. F95, Kennewick, WA 99336); Reid, Larry D. (Rt. 1, Box 1291B, Benton City, WA 99320)

    1996-01-01

    A wideband holographic surveillance system including a transceiver for generating a plurality of electromagnetic waves; antenna for transmitting the electromagnetic waves toward a target at a plurality of predetermined positions in space; the transceiver also receiving and converting electromagnetic waves reflected from the target to electrical signals at a plurality of predetermined positions in space; a computer for processing the electrical signals to obtain signals corresponding to a holographic reconstruction of the target; and a display for displaying the processed information to determine nature of the target. The computer has instructions to apply a three dimensional backward wave algorithm.

  7. Intelligent video surveillance systems and technology

    CERN Document Server

    Ma, Yunqian

    2009-01-01

    From the streets of London to subway stations in New York City, hundreds of thousands of surveillance cameras ubiquitously collect hundreds of thousands of videos, often running 24/7. How can such vast volumes of video data be stored, analyzed, indexed, and searched? How can advanced video analysis and systems autonomously recognize people and detect targeted activities real-time? Collating and presenting the latest information Intelligent Video Surveillance: Systems and Technology explores these issues, from fundamentals principle to algorithmic design and system implementation.An Integrated

  8. Children's Mental Health Surveillance

    Science.gov (United States)

    Children’s Mental Health Surveillance What are childhood mental disorders? The term childhood mental disorder means all mental disorders that can ... is the impact of mental disorders in children? Mental health is important to overall health. Mental disorders are ...

  9. Between visibility and surveillance

    DEFF Research Database (Denmark)

    Uldam, Julie

    visible. It thus enables activists to monitor and expose corporate misconduct, but simultaneously renders them vulnerable to surveillance from corporations. In this presentation, I examine these practices and discuss their implications for political participation by drawing on examples of companies...

  10. Autonomous surveillance for biosecurity.

    Science.gov (United States)

    Jurdak, Raja; Elfes, Alberto; Kusy, Branislav; Tews, Ashley; Hu, Wen; Hernandez, Emili; Kottege, Navinda; Sikka, Pavan

    2015-04-01

    The global movement of people and goods has increased the risk of biosecurity threats and their potential to incur large economic, social, and environmental costs. Conventional manual biosecurity surveillance methods are limited by their scalability in space and time. This article focuses on autonomous surveillance systems, comprising sensor networks, robots, and intelligent algorithms, and their applicability to biosecurity threats. We discuss the spatial and temporal attributes of autonomous surveillance technologies and map them to three broad categories of biosecurity threat: (i) vector-borne diseases; (ii) plant pests; and (iii) aquatic pests. Our discussion reveals a broad range of opportunities to serve biosecurity needs through autonomous surveillance. Crown Copyright © 2015. Published by Elsevier Ltd. All rights reserved.

  11. 522 Postmarket Surveillance Studies

    Data.gov (United States)

    U.S. Department of Health & Human Services — The 522 Postmarket Surveillance Studies Program encompasses design, tracking, oversight, and review responsibilities for studies mandated under section 522 of the...

  12. 522 Postmarket Surveillance Studies

    Data.gov (United States)

    U.S. Department of Health & Human Services — The 522 Postmarket Surveillance Studies Program encompasses design, tracking, oversight, and review responsibilities for studies mandated under section 522 of the...

  13. Using Poison Center Data for Postdisaster Surveillance

    Science.gov (United States)

    Wolkin, Amy; Schnall, Amy H.; Law, Royal; Schier, Joshua

    2015-01-01

    The role of public health surveillance in disaster response continues to expand as timely, accurate information is needed to mitigate the impact of disasters. Health surveillance after a disaster involves the rapid assessment of the distribution and determinants of disaster-related deaths, illnesses, and injuries in the affected population. Public health disaster surveillance is one mechanism that can provide information to identify health problems faced by the affected population, establish priorities for decision makers, and target interventions to meet specific needs. Public health surveillance traditionally relies on a wide variety of data sources and methods. Poison center (PC) data can serve as data sources of chemical exposures and poisonings during a disaster. In the US, a system of 57 regional PCs serves the entire population. Poison centers respond to poison-related questions from the public, health care professionals, and public health agencies. The Centers for Disease Control and Prevention (CDC) uses PC data during disasters for surveillance of disaster-related toxic exposures and associated illnesses to enhance situational awareness during disaster response and recovery. Poison center data can also be leveraged during a disaster by local and state public health to supplement existing surveillance systems. Augmenting traditional surveillance data (ie, emergency room visits and death records) with other data sources, such as PCs, allows for better characterization of disaster-related morbidity and mortality. Poison center data can be used during a disaster to detect outbreaks, monitor trends, track particular exposures, and characterize the epidemiology of the event. This timely and accurate information can be used to inform public health decision making during a disaster and mitigate future disaster-related morbidity and mortality. PMID:25205009

  14. Veterinary surveillance laboratories: developing the training program.

    Science.gov (United States)

    Mitchell, Staci L; McCline, Katasha T; Hanfelt, Margery M

    2010-01-01

    The increased need and demand for onsite, frequent, rapid, and portable food and bottled water testing for indicators of microbiological and chemical agents led to the deployment of 2 laboratory veterinary equipment sets. A Surveillance Food Laboratory Program (SFLP) was developed to allow Veterinary Corps commanders to establish targeted testing programs to enhance food safety and wholesomeness, along with faster responses to food defense, suspected foodborne illness, and food/water risk assessment missions. To support the deployment of the veterinary equipment sets and the SFLP, 2 new functional courses were developed by the Department of Veterinary Science. The Surveillance Food Laboratory Technician Course teaches essential technical skills that include sample processing, assay methodologies, results review, and interpretation of results produced by these laboratories. The Surveillance Food Laboratory Manager Course, developed for designated managers of the laboratories and laboratory programs, teaches the skills critical to ensuring proper surveillance laboratory oversight, testing, evaluation of results, risk communication, and response to presumptive positive results produced by the laboratories. Together, the courses allowed for the successful deployment of the unique veterinary equipment sets, resulting in development of fully operational surveillance laboratories in support of food protection missions in every major theater of operations.

  15. 75 FR 57690 - Acquisition Regulation: Sustainable Acquisition

    Science.gov (United States)

    2010-09-22

    ... Parts 907, 923, 936, 952, and 970 RIN 1991-AB95 Acquisition Regulation: Sustainable Acquisition AGENCY... (DOE) is amending the Department of Energy Acquisition Regulation (DEAR) to implement Executive Order... to leverage agency acquisitions to foster markets for sustainable technologies and energy...

  16. A radar-enabled collaborative sensor network integrating COTS technology for surveillance and tracking.

    Science.gov (United States)

    Kozma, Robert; Wang, Lan; Iftekharuddin, Khan; McCracken, Ernest; Khan, Muhammad; Islam, Khandakar; Bhurtel, Sushil R; Demirer, R Murat

    2012-01-01

    The feasibility of using Commercial Off-The-Shelf (COTS) sensor nodes is studied in a distributed network, aiming at dynamic surveillance and tracking of ground targets. Data acquisition by low-cost (radar through a wireless mote is described. We demonstrate the detection, ranging and velocity estimation, classification and tracking capabilities of the mini-radar, and compare results to simulations and manual measurements. Furthermore, we supplement the radar output with other sensor modalities, such as acoustic and vibration sensors. This method provides innovative solutions for detecting, identifying, and tracking vehicles and dismounts over a wide area in noisy conditions. This study presents a step towards distributed intelligent decision support and demonstrates effectiveness of small cheap sensors, which can complement advanced technologies in certain real-life scenarios.

  17. A Radar-Enabled Collaborative Sensor Network Integrating COTS Technology for Surveillance and Tracking

    Directory of Open Access Journals (Sweden)

    R. Murat Demirer

    2012-01-01

    Full Text Available The feasibility of using Commercial Off-The-Shelf (COTS sensor nodes is studied in a distributed network, aiming at dynamic surveillance and tracking of ground targets. Data acquisition by low-cost ( < $50 US miniature low-power radar through a wireless mote is described. We demonstrate the detection, ranging and velocity estimation, classification and tracking capabilities of the mini-radar, and compare results to simulations and manual measurements. Furthermore, we supplement the radar output with other sensor modalities, such as acoustic and vibration sensors. This method provides innovative solutions for detecting, identifying, and tracking vehicles and dismounts over a wide area in noisy conditions. This study presents a step towards distributed intelligent decision support and demonstrates effectiveness of small cheap sensors, which can complement advanced technologies in certain real-life scenarios.

  18. Surveillance Metrics Sensitivity Study

    Energy Technology Data Exchange (ETDEWEB)

    Bierbaum, R; Hamada, M; Robertson, A

    2011-11-01

    In September of 2009, a Tri-Lab team was formed to develop a set of metrics relating to the NNSA nuclear weapon surveillance program. The purpose of the metrics was to develop a more quantitative and/or qualitative metric(s) describing the results of realized or non-realized surveillance activities on our confidence in reporting reliability and assessing the stockpile. As a part of this effort, a statistical sub-team investigated various techniques and developed a complementary set of statistical metrics that could serve as a foundation for characterizing aspects of meeting the surveillance program objectives. The metrics are a combination of tolerance limit calculations and power calculations, intending to answer level-of-confidence type questions with respect to the ability to detect certain undesirable behaviors (catastrophic defects, margin insufficiency defects, and deviations from a model). Note that the metrics are not intended to gauge product performance but instead the adequacy of surveillance. This report gives a short description of four metrics types that were explored and the results of a sensitivity study conducted to investigate their behavior for various inputs. The results of the sensitivity study can be used to set the risk parameters that specify the level of stockpile problem that the surveillance program should be addressing.

  19. Towards One Health disease surveillance: The Southern African Centre for Infectious Disease Surveillance approach

    Directory of Open Access Journals (Sweden)

    Esron D. Karimuribo

    2012-06-01

    Full Text Available Africa has the highest burden of infectious diseases in the world and yet the least capacity for its risk management. It has therefore become increasingly important to search for ‘fit-for- purpose’ approaches to infectious disease surveillance and thereby targeted disease control. The fact that the majority of human infectious diseases are originally of animal origin means we have to consider One Health (OH approaches which require inter-sectoral collaboration for custom-made infectious disease surveillance in the endemic settings of Africa. A baseline survey was conducted to assess the current status and performance of human and animal health surveillance systems and subsequently a strategy towards OH surveillance system was developed. The strategy focused on assessing the combination of participatory epidemiological approaches and the deployment of mobile technologies to enhance the effectiveness of disease alerts and surveillance at the point of occurrence, which often lies in remote areas. We selected three study sites, namely the Ngorongoro, Kagera River basin and Zambezi River basin ecosystems. We have piloted and introduced the next-generation Android mobile phones running the EpiCollect application developed by Imperial College to aid geo-spatial and clinical data capture and transmission of this data from the field to the remote Information Technology (IT servers at the research hubs for storage, analysis, feedback and reporting. We expect that the combination of participatory epidemiology and technology will significantly improve OH disease surveillance in southern Africa.

  20. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  1. Mergers & Acquisitions

    DEFF Research Database (Denmark)

    Fomcenco, Alex

    This dissertation is a legal dogmatic thesis, the goal of which is to describe and analyze the current state of law in Europe in regard to some relevant selected elements related to mergers and acquisitions, and the adviser’s counsel in this regard. Having regard to the topic of the dissertation...... the focus is aimed and maintained at application and functioning of provisions of European federal corporate law and internationally accepted principles of the law of obligations. This study, however, is not about clarification of the reasons that urge for M&A operations, nor is it about judging the results...... of the transactions. This study is about synthesizing, on the one hand, the methods of M&A, and, on the other hand, several selected key elements, which any participating party, as well as their respective advisers, must be aware of, prior, throughout, and after the transaction: consideration, succession, taxes...

  2. Non-targeted acquisition strategy for screening doping compounds based on GC-EI-hybrid quadrupole-Orbitrap mass spectrometry: A focus on exogenous anabolic steroids.

    Science.gov (United States)

    de Albuquerque Cavalcanti, Gustavo; Rodrigues, Lucas Martins; Dos Santos, Leonardo; Zheng, Xin; Gujar, Amit; Cole, Jason; Padilha, Monica Costa; de Aquino Neto, Francisco Radler

    2017-06-10

    This is a first look at a non-targeted screening method based on Orbitrap gas chromatography-mass spectrometry (GC-MS) technology for a large number of banned compounds in sports found in urine, including exogenous anabolic steroids, β-agonists, narcotics, stimulants, hormone modulators, and diuretics. A simple sample preparation was processed in four steps: an enzymatic hydrolysis, liquid-liquid extraction, evaporation, and trimethylsilylation. All compounds were able to meet the World Anti-Doping Agency's sensitivity criteria with mass accuracies less than 1 ppm and with sufficient points across the peak by running the Orbitrap GC-MS in full-scan mode. In addition, we discuss our initial findings of using a full-scan selected ion monitoring-tandem mass spectrometry (SIM-MS/MS) approach as a way to obtain lower detection limits and reach desirable selectivity for some exogenous anabolic steroids. Copyright © 2017 John Wiley & Sons, Ltd.

  3. Complexity in language acquisition.

    Science.gov (United States)

    Clark, Alexander; Lappin, Shalom

    2013-01-01

    Learning theory has frequently been applied to language acquisition, but discussion has largely focused on information theoretic problems-in particular on the absence of direct negative evidence. Such arguments typically neglect the probabilistic nature of cognition and learning in general. We argue first that these arguments, and analyses based on them, suffer from a major flaw: they systematically conflate the hypothesis class and the learnable concept class. As a result, they do not allow one to draw significant conclusions about the learner. Second, we claim that the real problem for language learning is the computational complexity of constructing a hypothesis from input data. Studying this problem allows for a more direct approach to the object of study--the language acquisition device-rather than the learnable class of languages, which is epiphenomenal and possibly hard to characterize. The learnability results informed by complexity studies are much more insightful. They strongly suggest that target grammars need to be objective, in the sense that the primitive elements of these grammars are based on objectively definable properties of the language itself. These considerations support the view that language acquisition proceeds primarily through data-driven learning of some form.

  4. The plays and arts of surveillance: studying surveillance as entertainment

    NARCIS (Netherlands)

    Albrechtslund, Anders; Dubbeld, L.

    2006-01-01

    This paper suggests a direction in the development of Surveillance Studies that goes beyond current attention for the caring, productive and enabling aspects of surveillance practices. That is, surveillance could be considered not just as positively protective, but even as a comical, playful,

  5. Tumor-Associated Glycans and Immune Surveillance

    Directory of Open Access Journals (Sweden)

    Anastas Pashov

    2013-06-01

    Full Text Available Changes in cell surface glycosylation are a hallmark of the transition from normal to inflamed and neoplastic tissue. Tumor-associated carbohydrate antigens (TACAs challenge our understanding of immune tolerance, while functioning as immune targets that bridge innate immune surveillance and adaptive antitumor immunity in clinical applications. T-cells, being a part of the adaptive immune response, are the most popular component of the immune system considered for targeting tumor cells. However, for TACAs, T-cells take a back seat to antibodies and natural killer cells as first-line innate defense mechanisms. Here, we briefly highlight the rationale associated with the relative importance of the immune surveillance machinery that might be applicable for developing therapeutics.

  6. Tumor-Associated Glycans and Immune Surveillance

    Science.gov (United States)

    Monzavi-Karbassi, Behjatolah; Pashov, Anastas; Kieber-Emmons, Thomas

    2013-01-01

    Changes in cell surface glycosylation are a hallmark of the transition from normal to inflamed and neoplastic tissue. Tumor-associated carbohydrate antigens (TACAs) challenge our understanding of immune tolerance, while functioning as immune targets that bridge innate immune surveillance and adaptive antitumor immunity in clinical applications. T-cells, being a part of the adaptive immune response, are the most popular component of the immune system considered for targeting tumor cells. However, for TACAs, T-cells take a back seat to antibodies and natural killer cells as first-line innate defense mechanisms. Here, we briefly highlight the rationale associated with the relative importance of the immune surveillance machinery that might be applicable for developing therapeutics. PMID:26343966

  7. Student Modelling for Second Language Acquisition.

    Science.gov (United States)

    Bull, Susan

    1994-01-01

    Describes the student model of an intelligent computer-assisted language learning (CALL) system that is based on current theories in the field of second-language acquisition. Highlights include acquisition order of the target rules; language learning strategies; language transfer; language awareness; and student reactions. (Contains seven…

  8. Target surveillance of blood culture positive samples and control of false positive%血培养阳性标本的目标性监测与假阳性的控制

    Institute of Scientific and Technical Information of China (English)

    覃凌; 王慕云

    2012-01-01

    OBJECTIVE To provide objective guidelines for the clinical diagnosis and rational application of antibiotics by analyzing the reasons of the false positive of blood culture and exploring the effect on its incidence after taking corresponding countermeasures. METHODS We monitored all the positive blood culture cases to find the causes of the false positive cases from Jan to Jun 2008. and the interventions were adopted in response to the problems since Jul 2008, the follow-up of the blood culture positive cases was performed during the period of Jul 2008 -Dec 2010. RESULTS The conditional pathogens were dominated in the blood cultured positive cases during Jan-Jun 2008, among which coagulase-negative Staphylococcus accounted for 83. 33%, the rate of false positive blood culture was 35. 29%, while descending to 8. 70% from Jul to Dec 2010 after taking the control measures (x2 =9. 172,P = 0. 002). CONCLUSION By applying quality control administration mode in target surveillance of blood culture positive, taking correct intervention measures such as instituting standardized blood culture sampling procedure and emphasizing the relevant knowledge and operation skills of the nurses as well as the intensifying the quality supervision and assessment, we can improve the quality of submission of the blood culture specimens, reduce the rate of false positive and ensure the accuracy of the examination results.%目的 分析医院血培养假阳性的原因,探讨采取相关措施后对其发生率的影响,为指导临床诊断及合理应用抗菌药物提供客观依据.方法 对2008年1-6月所有血培养阳性的病例进行目标追踪监测,了解假阳性率,分析产生的原因;2008年7月针对问题采取相应的干预措施,持续追踪2008年7月-2010年12月血培养阳性病例.结果 2008年1-6月血培养假阳性病例的病原菌分布以条件致病菌为主,其中凝固酶阴性葡萄球菌占83.33%,血培养假阳性率高达35.29

  9. Targeted surveillance and intervention in ventilator-associated pneumonia in an intensive care unit%重症监护室呼吸机相关性肺炎的目标监测与干预

    Institute of Scientific and Technical Information of China (English)

    李晓红; 杨俐; 邹安娜; 邓惠

    2013-01-01

    Objective To investigate the occurrence of ventilator-associated pneumonia(VAP) in an intensive care unit (ICU),and evaluate the efficacy of intervention measures.Methods Patients receiving mechanical ventilation for >48 h in an ICU from January 2010 to June 2012 were performed targeted surveillance,problems were found out and intervened,incidence of VAP and compliance with infection control measures before and after intervention were compared.Results A total of 1 724 patients with mechanical ventilation were investigated,21.93% (378 cases) of whom developed VAP; incidence of VAP in 2010 and January-June 2012 was 51.54‰ and 19.53‰ respectively(X2 =12.13,P<0.01).The amount of consumption of hand sanitizer and liquid soap per patient per day in 2010,2011 and January-June 2012 was 5.21mL/HD,10.98mL/HD and 30.48 mL/HD respectively.Conclusion The incidence of VAP in this ICU is high,VAP can be controlled effectively through the enforcement of intervention measures and health care workers compliance with infection control measures.%目的 了解某医院综合重症监护室(ICU)呼吸机相关性肺炎(VAP)发病情况,以及实施干预措施后的效果.方法 对2010年1月-2012年6月入住该ICU使用呼吸机辅助呼吸>48 h的患者进行目标监测,及时发现问题并采取针对性干预措施,比较干预前后VAP发病率及感染控制措施的依从性.结果 共调查1 724例接受呼吸机辅助呼吸患者,其中378例发生VAP,VAP发病率为21.93%;2010年与2012年(1-6月)VAP发病率分别为51.54‰和19.53‰,两者比较,差异有统计学意义(X2=12.13,P<0.01).2010年、2011年、2012年(1-6月)速干手消毒剂和皂液合计每患者每住院日消耗量分别为5.21 mL/HD、10.98 mL/HD、30.48 rmL/HD.结论 该院ICU内VAP发病率较高,通过干预措施的有效实施,VAP的发生得到有效控制,医务人员感染控制措施依从性得到提高.

  10. Active surveillance: Oncologic outcome

    NARCIS (Netherlands)

    L.D.F. Venderbos (Lionne); L.P. Bokhorst (Leonard); C.H. Bangma (Chris); M.J. Roobol-Bouts (Monique)

    2013-01-01

    textabstractPURPOSE OF REVIEW: To give insight into recent literature (during the past 12-18 months) reporting on oncologic outcomes of men on active surveillance. RECENT FINDINGS: From recent published trials comparing radical prostatectomy vs. watchful waiting, we learn that radical treatment only

  11. Pregnancy nutrition surveillance system.

    Science.gov (United States)

    2003-01-01

    The Pregnancy Nutrition Surveillance System is a useful tool in monitoring Healthy People 2010 objectives and is intended to provide a framework for analyzing data on the nutritional status and behavioral risk factors of pregnant women and the association to birth outcome. The data are useful to health professionals in providing prenatal care and developing programs to reduce pregnancy-related health risks.

  12. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1996-02-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest National Laboratory (PNNL) for the US Department of Energy (DOE). This document contains the planned 1996 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP), Drinking Water Project, and Ground-Water Surveillance Project.

  13. 2017 NAIP Acquisition Map

    Data.gov (United States)

    Farm Service Agency, Department of Agriculture — Planned States for 2017 NAIP acquisition and acquisition status layer (updated daily). Updates to the acquisition seasons may be made during the season to...

  14. 2016 NAIP Acquisition Map

    Data.gov (United States)

    Farm Service Agency, Department of Agriculture — Planned States for 2016 NAIP acquisition and acquisition status layer (updated daily). Updates to the acquisition seasons may be made during the season to...

  15. Mergers and acquisitions: a most strategic decision.

    Science.gov (United States)

    Laine, Mike; Tyler, David

    2007-11-01

    Five steps are basic to successfully concluding (or deciding not to conclude) a merger or acquisition: Identify targets. Begin with the end in mind. Choose a transaction team. Perform due diligence. Commit to the deal--or to no deal.

  16. Postmarketing surveillance for drug abuse.

    Science.gov (United States)

    Arfken, Cynthia L; Cicero, Theodore J

    2003-06-05

    Assessing actual abuse of prescribed medications requires postmarketing surveillance. In this article we discuss general systems of postmarketing surveillance that exist as of the end of 2002 in the United States and two medication-specific surveillance systems that were devised and tested. The two specific surveillance systems are compared with limitations highlighted. Postmarketing surveillance is in its infancy and requires more research on ways to improve its validity without inducing illicit experimentation. Information on comparator medications is highly recommended both to validate the system and to place the results in context.

  17. Electro-Optical Data Acquisition and Tracking System

    Data.gov (United States)

    Federal Laboratory Consortium — The Electro-Optical Data Acquisition and Tracking System (EDATS) dynamically tracks and measures target signatures. It consists of an instrumentation van integrated...

  18. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  19. Surface-water surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Saldi, K.A.; Dirkes, R.L.; Blanton, M.L.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the Surface water on and near the Hanford Site is monitored to determine the potential effects of Hanford operations. Surface water at Hanford includes the Columbia River, riverbank springs, ponds located on the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site. Columbia River sediments are also included in this discussion. Tables 5.3.1 and 5.3.2 summarize the sampling locations, sample types, sampling frequencies, and sample analyses included in surface-water surveillance activities during 1994. Sample locations are also identified in Figure 5.3.1. This section describes the surveillance effort and summarizes the results for these aquatic environments. Detailed analytical results are reported by Bisping (1995).

  20. Syntax acquisition.

    Science.gov (United States)

    Crain, Stephen; Thornton, Rosalind

    2012-03-01

    Every normal child acquires a language in just a few years. By 3- or 4-years-old, children have effectively become adults in their abilities to produce and understand endlessly many sentences in a variety of conversational contexts. There are two alternative accounts of the course of children's language development. These different perspectives can be traced back to the nature versus nurture debate about how knowledge is acquired in any cognitive domain. One perspective dates back to Plato's dialog 'The Meno'. In this dialog, the protagonist, Socrates, demonstrates to Meno, an aristocrat in Ancient Greece, that a young slave knows more about geometry than he could have learned from experience. By extension, Plato's Problem refers to any gap between experience and knowledge. How children fill in the gap in the case of language continues to be the subject of much controversy in cognitive science. Any model of language acquisition must address three factors, inter alia: 1. The knowledge children accrue; 2. The input children receive (often called the primary linguistic data); 3. The nonlinguistic capacities of children to form and test generalizations based on the input. According to the famous linguist Noam Chomsky, the main task of linguistics is to explain how children bridge the gap-Chomsky calls it a 'chasm'-between what they come to know about language, and what they could have learned from experience, even given optimistic assumptions about their cognitive abilities. Proponents of the alternative 'nurture' approach accuse nativists like Chomsky of overestimating the complexity of what children learn, underestimating the data children have to work with, and manifesting undue pessimism about children's abilities to extract information based on the input. The modern 'nurture' approach is often referred to as the usage-based account. We discuss the usage-based account first, and then the nativist account. After that, we report and discuss the findings of several

  1. Foreign acquisition, plant survival, and employment growth

    DEFF Research Database (Denmark)

    Bandick, Roger; Görg, Holger

    This paper analyses the effect of foreign acquisition on survival probability and employment growth of target plant using data on Swedish manufacturing plants during the period 1993-2002.  An improvement over previous studies is that we take into account firm level heterogeneity by separating...... the targeted plants into those within Swedish MNEs, Swedish exporting non-MNEs, and purely domestic firms before foreign takeover. The results, controlling for possible endogeneity of the acquisition dummy using an IV and propensity score matching approach suggest that acquisition by foreign owners increases...

  2. Surveillance for gastrointestinal malignancies

    Institute of Scientific and Technical Information of China (English)

    Ashish K Tiwari; Heather S Laird-Fick; Ramesh K Wali; Hemant K Roy

    2012-01-01

    Gastrointestinal (GI) malignancies are notorious for frequently progressing to advanced stages even in the absence of serious symptoms,thus leading to delayed diagnoses and dismal prognoses.Secondary prevention of GI malignancies through early detection and treatment of cancer-precursor/premalignant lesions,therefore,is recognized as an effective cancer prevention strategy.In order to efficiently detect these lesions,systemic application of screening tests (surveillance) is needed.However,most of the currently used non-invasive screening tests for GI malignancies (for example,serum markers such as alpha-fetoprotein for hepatocellular carcinoma,and fecal occult blood test,for colon cancer) are only modestly effective necessitating the use of highly invasive endoscopy-based procedures,such as esophagogastroduodenoscopy and colonoscopy for screening purposes.Even for hepatocellular carcinoma where non-invasive imaging (ultrasonography) has become a standard screening tool,the need for repeated liver biopsies of suspicious liver nodules for histopathological confirmation can't be avoided.The invasive nature and high-cost associated with these screening tools hinders implementation of GI cancer screening programs.Moreover,only a small fraction of general population is truly predisposed to developing GI malignancies,and indeed needs surveillance.To spare the average-risk individuals from superfluous invasive procedures and achieve an economically viable model of cancer prevention,it's important to identify cohorts in general population that are at substantially high risk of developing GI malignancies (riskstratification),and select suitable screening tests for surveillance in these cohorts.We herein provide a brief overview of such high-risk cohorts for different GI malignancies,and the screening strategies that have commonly been employed for surveillance purpose in them.

  3. Development of a prototype radiation surveillance equipment for a mid-sized unmanned aerial vehicle

    Energy Technology Data Exchange (ETDEWEB)

    Smolander, P.; Kurvinen, K.; Poellaenen, R. [Radiation and Nuclear Safety Authority, Helsinki (Finland); Kettunen, M. [Forces Research Institute of Technology, Lakiala (Finland); Lyytinen, J. [Helsinki University of Technology, Laboratory of Lightweight Structures, Otaniemi (Finland)

    2003-06-01

    A prototype radiation surveillance equipment has been developed to be used in a mid-sized Ranger unmanned aerial vehicle (UAV) acquired by the Finnish Defence Forces. A multi-detector assembly was designed for the acquisition of dose rate and radionuclide concentration in the release plume. Detector assembly includes a GM-tube based dose rate meter, an inorganic scintillator detector and a semiconductor detector operating at room temperature. A sampling unit was designed for the collection of an aerosol sample of the plume for a detailed analysis in a ground based laboratory. The measurement data from all three detectors and several environmental parameters are collected by the onboard data acquisition computer. Real-time data dissemination is implemented with a TETRA based radio network. Test flights have been carried out with target drones and a small manned airplane. The Northrop KD2R-5 target drones have been used to simulate the high-G launch and vibration environment of the Ranger aerial vehicle. Target drones have been used because their air vehicle classification allows small test packages to be installed without tedious air safety protocols. Stability and survivability of the detectors, GPS navigation and radio frequency communication have been studied with the target drone test flights. Ground station software was developed to visualise the measurement data and to track the position of the air vehicle on a digital map. Test flights with the small manned airplane have been used to study the operational aspects of the detectors with greater detail. The housing for the instruments has been designed and constructed based on the experiences gained with the test flights and the laboratory measurements. The housing satisfies the aviation authority standards. Special attention has been paid to the high modularity, quick installation and ease of use. (orig.)

  4. Ocean surveillance satellites

    Science.gov (United States)

    Laurent, D.

    Soviet and U.S. programs involving satellites for surveillance of ships and submarines are discussed, considering differences in approaches. The Soviet program began with the Cosmos 198 in 1967 and the latest, the Cosmos 1400 series, 15 m long and weighing 5 tons, carry radar for monitoring ships and a nuclear reactor for a power supply. Other Soviet spacecraft carrying passive microwave sensors and ion drives powered by solar panels have recently been detonated in orbit for unknown reasons. It has also been observed that the Soviet satellites are controlled in pairs, with sequential orbital changes for one following the other, and both satellites then overflying the same points. In contrast, U.S. surveillance satellites have been placed in higher orbits, thus placing greater demands on the capabilities of the on-board radar and camera systems. Project White Cloud and the Clipper Bow program are described, noting the continued operation of the White Cloud spacecraft, which are equipped to intercept radio signals from surface ships. Currently, the integrated tactical surveillance system program has completed its study and a decision is expected soon.

  5. History of trichinellosis surveillance

    Directory of Open Access Journals (Sweden)

    Blancou J.

    2001-06-01

    Full Text Available The origin of trichinellosis, which existed in ancient times as testified by the discovery of parasite larvae on an Egyptian mummy, unfolded in several stages: discovery of encapsulated larvae (in the 1820s, identification and scientific description of these larvae (Paget Owen, 1835, followed by experimental infestations of animals (dogs, pigs, rabbits, mice or of humans as from 1850.The main occurrences of trichinellosis were followed with particular attention in Europe (Germany, Denmark, France, etc. and in the United States of America at the end of the XIXth century. They affected numerous domestic animal species (pigs, horses, etc. or wildlife and humans. Germany paid the heaviest toll with regard to the disease in humans, between 1860 and 1880, with several thousands of patients and more than 500 deaths.Different trichinellosis surveillance systems were set up in the relevant countries in the 1860s. In humans, this surveillance was carried out on affected living patients by a biopsy of the biceps muscles and subsequently by an analysis of eosinophilia (1895. In animals, surveillance was for a long time solely based on postmortem examination of the muscles of the affected animals. This method was used for the first time in 863 in Germany, and from the 1 890s, on several hundreds of thousands of pigs in Europe or in the United States of America.

  6. A Super-resolution Reconstruction Algorithm for Surveillance Video

    Directory of Open Access Journals (Sweden)

    Jian Shao

    2017-01-01

    Full Text Available Recent technological developments have resulted in surveillance video becoming a primary method of preserving public security. Many city crimes are observed in surveillance video. The most abundant evidence collected by the police is also acquired through surveillance video sources. Surveillance video footage offers very strong support for solving criminal cases, therefore, creating an effective policy, and applying useful methods to the retrieval of additional evidence is becoming increasingly important. However, surveillance video has had its failings, namely, video footage being captured in low resolution (LR and bad visual quality. In this paper, we discuss the characteristics of surveillance video and describe the manual feature registration – maximum a posteriori – projection onto convex sets to develop a super-resolution reconstruction method, which improves the quality of surveillance video. From this method, we can make optimal use of information contained in the LR video image, but we can also control the image edge clearly as well as the convergence of the algorithm. Finally, we make a suggestion on how to adjust the algorithm adaptability by analyzing the prior information of target image.

  7. Acquisition Support Program Overview

    Science.gov (United States)

    2016-06-30

    Principles of Effective Acquisition © 2006 by Carnegie Mellon University page 31 Summary The SEI, through the Acquisition Support Program , works directly...2006 by Carnegie Mellon University page 1 Acquisition Support Program Overview Brian Gallagher Director, Acquisition Support Program 9 March, 2006...MAR 2006 2. REPORT TYPE 3. DATES COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Acquisition Support Program Overview 5a. CONTRACT

  8. Autonomous soaring and surveillance in wind fields with an unmanned aerial vehicle

    Science.gov (United States)

    Gao, Chen

    Small unmanned aerial vehicles (UAVs) play an active role in developing a low-cost, low-altitude autonomous aerial surveillance platform. The success of the applications needs to address the challenge of limited on-board power plant that limits the endurance performance in surveillance mission. This thesis studies the mechanics of soaring flight, observed in nature where birds utilize various wind patterns to stay airborne without flapping their wings, and investigates its application to small UAVs in their surveillance missions. In a proposed integrated framework of soaring and surveillance, a bird-mimicking soaring maneuver extracts energy from surrounding wind environment that improves surveillance performance in terms of flight endurance, while the surveillance task not only covers the target area, but also detects energy sources within the area to allow for potential soaring flight. The interaction of soaring and surveillance further enables novel energy based, coverage optimal path planning. Two soaring and associated surveillance strategies are explored. In a so-called static soaring surveillance, the UAV identifies spatially-distributed thermal updrafts for soaring, while incremental surveillance is achieved through gliding flight to visit concentric expanding regions. A Gaussian-process-regression-based algorithm is developed to achieve computationally-efficient and smooth updraft estimation. In a so-called dynamic soaring surveillance, the UAV performs one cycle of dynamic soaring to harvest energy from the horizontal wind gradient to complete one surveillance task by visiting from one target to the next one. A Dubins-path-based trajectory planning approach is proposed to maximize wind energy extraction and ensure smooth transition between surveillance tasks. Finally, a nonlinear trajectory tracking controller is designed for a full six-degree-of-freedom nonlinear UAV dynamics model and extensive simulations are carried to demonstrate the effectiveness of

  9. Rope Climbing Robot with Surveillance Capability

    Directory of Open Access Journals (Sweden)

    Kanza Zafar

    2013-08-01

    Full Text Available In the past different engineers and researcher developed robots capable of climbing for various purposes. In this paper we have developed a robot capable of rope climbing in both horizontal and vertical direction. Furthermore, the robot has the ability to perform surveillance using a camera mounted on top of the robot. The quality of the transmitted video from the camera to the computer is clear and stable. Hence the developed robot is a good choice for surveillance purposes. In addition, it can be used to traverse floors of a building. It uses an IR sensor to sense strips attached at each floor. Once the strips are sensed, a dropping mechanism is activated in which a specific object is dropped to the targeted floor or location. The robot can work in automatic mode or manual through RF signals from an RF transmitter. Finally the robot is cost effective compared to many other developed robots for rope climbing.

  10. Predicting Over Target Baseline (OTB) Acquisition Contracts

    Science.gov (United States)

    2010-03-01

    Regression Models: Development Contracts Difference Full Reduced Model 221.5882 912.7929 1134.3810 -LogLikelihood 5 DF 443.1763 ChiSquare <.0001...DF 888.05881 24.73404 912.79285 -LogLikelihood 1776.118 ChiSquare 1.0000 Prob>ChiSq Lack Of Fit Intercept Air Force Navy Fighter=1 SPI*CPI APB Perf...0.1604091 Std Error 14.98 133.64 131.46 146.82 68.78 7.86 ChiSquare 0.0001* <.0001* <.0001* <.0001* <.0001* 0.0051* Prob>ChiSq For log odds of 0/1

  11. Surveillance and Control of Nosocomial Infection in Neonatal ICU

    Institute of Scientific and Technical Information of China (English)

    ZHONG Xiaozhu

    2002-01-01

    Objective To strengthen the surveillance and control of nosocomial infection in neonatal ICU. Methods To be seriously considered by leaders, to carry out rules and systems, to strengthen education and enhance consciousness of infections, to carry out targeted surveillance on basis of routine surveillance. Results The consciousness of infections has been enhanced. Passive carrying out of sterilization and isolation has turned active carrying out. The air quality in NICU has been improved. Ventilator - related infections have been decreased. Conclusion To strengthen surveillance and control of nosocomial infection in neonatal ICU and to find out and solve the weak link in infection control is the key to control nosocomial infection, to insure medical safety, and to improve medical quality.

  12. Vector-borne disease surveillance in livestock populations: a critical review of literature recommendations and implemented surveillance (BTV-8) in five European countries

    DEFF Research Database (Denmark)

    Dórea, Fernanda C.; Elbers, Armin R.W.; Hendrikx, Pascal

    2016-01-01

    Preparedness against vector-borne threats depends on the existence of a long-term, sustainable surveillance of vector-borne disease and their relevant vectors. This work reviewed the availability of such surveillance systems in five European countries (Denmark, France, The Netherlands, Sweden...... of the literature aimed at identifying disease surveillance strategies and methods that are currently suggested as best suited to target vector-borne diseases in order to guide future development of surveillance in the countries in question. Passive surveillance was found to be efficient for early detection...... of diseases during the early phase of introduction into a free country. However, its value diminished once the disease has been established in a territory. Detection of emerging diseases was found to be very context and area specific, and thus active surveillance designs need to take the available...

  13. Ethernet-based integrated surveillance system for homeland security and homeland defense

    Science.gov (United States)

    Schooley, Michael G.; Thompson, Dean

    2004-09-01

    This report documents the results of an internal DRS effort to develop an Ethernet based integrated defense system to improve defense of cities, harbors, airports, power production, energy supplies, bridges, monuments, dams and so forth. Results of the integration of multiple SCOUT LPI radars and multiple Electro-optical targeting systems will be provided, illustrating the benefits of interfacing surveillance radars with imaging sensors to confirm detection and provide visual recognition and identification. An analysis of the handover errors will be provided including errors due to; sensor platforms location and orientation uncertainty, target location measurement errors, data latency and motion prediction errors, which contribute to target handoff and the re-acquisition timeline. These predictions will be compared to measured results. The system architecture will be defined including; security, support for both stationary and moving sensor platforms, remote control of sensor systems and distribution of imagery through the network and remote diagnostics, maintenance and software upgrades. Growth capabilities include secure wireless communication to/from moving platforms, integration with sonar and seismic sensors, cooperative location of friendly forces and acoustic detection and triangulation of gunshots with automated cueing of sensors and security forces to the shooters most probable location. The use of ad hoc multi-hopping wireless networking supplements hardwire networks, augments disaster response capabilities, provides high-speed communications for moving platforms and supplements GPS outage areas.

  14. GSFC Supplier Surveillance

    Science.gov (United States)

    Kelly, Michael P.

    2011-01-01

    Topics covered include: Develop Program/Project Quality Assurance Surveillance Plans The work activities performed by the developer and/or his suppliers are subject to evaluation and audit by government-designated representatives. CSO supports project by selecting on-site supplier representative s by one of several methods: (1) a Defense Contract Management Agency (DCMA) person via a Letter Of Delegation (LOD), (2) an independent assurance contractor (IAC) via a contract Audits, Assessments, and Assurance (A3) Contract Code 300 Mission Assurance Support Contract (MASC)

  15. Bodygraphic Injury Surveillance System

    Science.gov (United States)

    Tsuboi, Toshiki; Kitamura, Koji; Nishida, Yoshihumi; Motomura, Yoichi; Takano, Tachio; Yamanaka, Tatsuhiro; Mizoguchi, Hiroshi

    This paper proposes a new technology,``a bodygraphic injury surveillance system (BISS)'' that not only accumulates accident situation data but also represents injury data based on a human body coordinate system in a standardized and multilayered way. Standardized and multilayered representation of injury enables accumulation, retrieval, sharing, statistical analysis, and modeling causalities of injury across different fields such as medicine, engineering, and industry. To confirm the effectiveness of the developed system, the authors collected 3,685 children's injury data in cooperation with a hospital. As new analyses based on the developed BISS, this paper shows bodygraphically statistical analysis and childhood injury modeling using the developed BISS and Bayesian network technology.

  16. Projectbeschrijving Surveillance Ziekenhuisinfecties 1996-1999

    NARCIS (Netherlands)

    Berg JMJ van den; Boer AS de; Mintjes-de Groot AJ; Sprenger MJW; Cucic S; Pelt W van; Centraal Begeleidingsorgaan; CIE

    1996-01-01

    In the Project Surveillance Hospital Acquired Infections a surveillance system in a national network of hospitals is being developed and implemented. In the project surveillance of hospital acquired infections is implemented in components: surveillance of surgical wound infections, surveillance of i

  17. Speed in Acquisitions

    DEFF Research Database (Denmark)

    Meglio, Olimpia; King, David R.; Risberg, Annette

    2017-01-01

    The advantage of speed is often invoked by academics and practitioners as an essential condition during post-acquisition integration, frequently without consideration of the impact earlier decisions have on acquisition speed. In this article, we examine the role speed plays in acquisitions across...... the acquisition process using research organized around characteristics that display complexity with respect to acquisition speed. We incorporate existing research with a process perspective of acquisitions in order to present trade-offs, and consider the influence of both stakeholders and the pre......-deal-completion context on acquisition speed, as well as the organization’s capabilities to facilitating that speed. Observed trade-offs suggest both that acquisition speed often requires longer planning time before an acquisition and that associated decisions require managerial judgement. A framework for improving...

  18. Sonoma Persistent Surveillance System

    Energy Technology Data Exchange (ETDEWEB)

    Pennington, D M

    2006-03-24

    Sonoma offers the first cost-effective, broad-area, high-resolution, real-time motion imagery system for surveillance applications. Sonoma is unique in its ability to provide continuous, real-time video imagery of an area the size of a small city with resolutions sufficient to track 8,000 moving objects in the field of view. At higher resolutions and over smaller areas, Sonoma can even track the movement of individual people. The visual impact of the data available from Sonoma is already causing a paradigm shift in the architecture and operation of other surveillance systems. Sonoma is expected to cost just one-tenth the price of comparably sized sensor systems. Cameras mounted on an airborne platform constantly monitor an area, feeding data to the ground for real-time analysis. Sonoma was designed to provide real-time data for actionable intelligence in situations such as monitoring traffic, special events, border security, and harbors. If a Sonoma system had been available in the aftermath of the Katrina and Rita hurricanes, emergency responders would have had real-time information on roads, water levels, and traffic conditions, perhaps saving many lives.

  19. Foreign acquisition, plant survival, and employment growth

    DEFF Research Database (Denmark)

    Bandick, Roger; Görg, Holger

    2010-01-01

    This paper analyzes the effect of foreign acquisition on survival and employment growth of targets using data on Swedish manufacturing plants.We separate targeted plants into those within Swedish MNEs, Swedish exporting non-MNEs, and purely domestic firms. The results, controlling for possible en...

  20. Video Sensor Architecture for Surveillance Applications

    Directory of Open Access Journals (Sweden)

    José E. Simó

    2012-02-01

    Full Text Available This paper introduces a flexible hardware and software architecture for a smart video sensor. This sensor has been applied in a video surveillance application where some of these video sensors are deployed, constituting the sensory nodes of a distributed surveillance system. In this system, a video sensor node processes images locally in order to extract objects of interest, and classify them. The sensor node reports the processing results to other nodes in the cloud (a user or higher level software in the form of an XML description. The hardware architecture of each sensor node has been developed using two DSP processors and an FPGA that controls, in a flexible way, the interconnection among processors and the image data flow. The developed node software is based on pluggable components and runs on a provided execution run-time. Some basic and application-specific software components have been developed, in particular: acquisition, segmentation, labeling, tracking, classification and feature extraction. Preliminary results demonstrate that the system can achieve up to 7.5 frames per second in the worst case, and the true positive rates in the classification of objects are better than 80%.

  1. 外资并购中国上市企业的动因研究——基于目标企业的视角%On the Motive of Foreign Merger and Acquisition of Chinese Listed Companies Based on the Perspective of Target Firms

    Institute of Scientific and Technical Information of China (English)

    袁奋强

    2012-01-01

    The paper, using a sample of foreign companies' merger and acquisition of Chinese listed target firms from 1998 to 2007, studies the M&A motive of foreign firms from the perspective of target firms. It finds that the foreign mergers and acquisitions have built financial synergies from the formation of internal capital markets, which are one of the main motives of foreign mergers and acquisitions; speculations are not the motive of mergers and acquisitions, but investments should be the main motive; as an investmentoriented foreign merger and acquisition, after it quickly enters the host country market, it has a motive of freezing the target brand and promoting its own brand.%文章以1998~2007年外资并购上市公司的事件为研究样本,从目标企业的视角分析了外资并购的动因。研究发现:外资并购通过内部资本市场的构建形成了财务协同效应,所以财务协同效应应该是外资并购的主要动因之一;外资并购并非持投机性的动机,而应该是以投资性并购为主要动因;作为投资性的外资并购,外资在快速进入东道主国市场后,具有雪藏目标企业品牌、推广自有品牌的动机。

  2. Language Acquisition without an Acquisition Device

    Science.gov (United States)

    O'Grady, William

    2012-01-01

    Most explanatory work on first and second language learning assumes the primacy of the acquisition phenomenon itself, and a good deal of work has been devoted to the search for an "acquisition device" that is specific to humans, and perhaps even to language. I will consider the possibility that this strategy is misguided and that language…

  3. Language Acquisition without an Acquisition Device

    Science.gov (United States)

    O'Grady, William

    2012-01-01

    Most explanatory work on first and second language learning assumes the primacy of the acquisition phenomenon itself, and a good deal of work has been devoted to the search for an "acquisition device" that is specific to humans, and perhaps even to language. I will consider the possibility that this strategy is misguided and that language…

  4. Surveillance theory and its implications for law

    NARCIS (Netherlands)

    Timan, Tjerk; Galic, Masa; Koops, Bert-Jaap; Yeung, Karen; Brownsword, Roger; Scotford, Eloise

    2016-01-01

    This chapter provides an overview of key surveillance theories and their implications for law and regulation. It presents three stages of theories that characterise changes in thinking about surveillance in society and the disciplining, controlling, and entertaining functions of surveillance.

  5. Calo trigger acquisition system

    CERN Multimedia

    Franchini, Matteo

    2016-01-01

    Calo trigger acquisition system - Evolution of the acquisition system from a multiple boards system (upper, orange cables) to a single board one (below, light blue cables) where all the channels are collected in a single board.

  6. Software Acquisition Program Dynamics

    Science.gov (United States)

    2011-10-24

    techniques to avoid these problems The Objective • Improve acquisition program staff decision-making, and thus improve acquisition program outcomes...classroom training, eLearning , certification, and more—to serve the needs of customers and partners worldwide.

  7. Modelling live forensic acquisition

    CSIR Research Space (South Africa)

    Grobler, MM

    2009-06-01

    Full Text Available This paper discusses the development of a South African model for Live Forensic Acquisition - Liforac. The Liforac model is a comprehensive model that presents a range of aspects related to Live Forensic Acquisition. The model provides forensic...

  8. Playing at Serial Acquisitions

    NARCIS (Netherlands)

    J.T.J. Smit (Han); T. Moraitis (Thras)

    2010-01-01

    textabstractBehavioral biases can result in suboptimal acquisition decisions-with the potential for errors exacerbated in consolidating industries, where consolidators design serial acquisition strategies and fight escalating takeover battles for platform companies that may determine their future co

  9. Malaria Surveillance - United States, 2014.

    Science.gov (United States)

    Mace, Kimberly E; Arguin, Paul M

    2017-05-26

    . Less than 1.0% of patients were infected with two species. The infecting species was unreported or undetermined in 11.7% of cases. CDC provided diagnostic assistance for 14.2% of confirmed cases and tested 12.0% of P. falciparum specimens for antimalarial resistance markers. Of patients who reported purpose of travel, 57.5% were visiting friends and relatives (VFR). Among U.S. residents for whom information on chemoprophylaxis use and travel region was known, 7.8% reported that they initiated and adhered to a chemoprophylaxis drug regimen recommended by CDC for the regions to which they had traveled. Thirty-two cases were among pregnant women, none of whom had adhered to chemoprophylaxis. Among all reported cases, 17.0% were classified as severe illness, and five persons with malaria died. CDC received 137 P. falciparum-positive samples for the detection of antimalarial resistance markers (although some loci for chloroquine and mefloquine were untestable for up to nine samples). Of the 137 samples tested, 131 (95.6%) had genetic polymorphisms associated with pyrimethamine drug resistance, 96 (70.0%) with sulfadoxine resistance, 77 (57.5%) with chloroquine resistance, three (2.3%) with mefloquine drug resistance, one (https://www.cdc.gov/malaria/travelers/drugs.html). Malaria infections can be fatal if not diagnosed and treated promptly with antimalarial medications appropriate for the patient's age and medical history, likely country of malaria acquisition, and previous use of antimalarial chemoprophylaxis. Recent molecular laboratory advances have enabled CDC to identify and conduct molecular surveillance of antimalarial drug resistance markers (https://www.cdc.gov/malaria/features/ars.html) and improve the ability of CDC to track, guide treatment, and manage drug resistance in malaria parasites both domestically and globally. For this effort to be successful, specimens should be submitted for all cases diagnosed in the United States. Clinicians should consult CDC

  10. Defining 'surveillance' in drug safety.

    Science.gov (United States)

    Aronson, Jeffrey K; Hauben, Manfred; Bate, Andrew

    2012-05-01

    The concept of surveillance in pharmacovigilance and pharmacoepidemiology has evolved from the concept of surveillance in epidemiology, particularly of infectious diseases. We have surveyed the etymology, usages, and previous definitions of 'surveillance' and its modifiers, such as 'active' and 'passive'. The following essential definitional features of surveillance emerge: (i) surveillance and monitoring are different--surveillance involves populations, while monitoring involves individuals; (ii) surveillance can be performed repeatedly and at any time during the lifetime of a medicinal product or device; (iii) although itself non-interventional, it can adduce any types of evidence (interventional, observational, or anecdotal, potentially at different times); (iv) it encompasses data collection, management, analysis, and interpretation; (v) it includes actions to be taken after signal detection, including initial evaluation and communication; and (vi) it should contribute to the classification of adverse reactions and their prevention or mitigation and/or to the harnessing of beneficial effects. We conclude that qualifiers add ambiguity and uncertainty without enhancing the idea of surveillance. We propose the following definition of surveillance of health-care products, which embraces all the surveyed ideas and reflects real-world pharmacovigilance processes: 'a form of non-interventional public health research, consisting of a set of processes for the continued systematic collection, compilation, interrogation, analysis, and interpretation of data on benefits and harms (including relevant spontaneous reports, electronic medical records, and experimental data).' As a codicil, we note that the purposes of surveillance are to identify, evaluate, understand, and communicate previously unknown effects of health-care products, or new aspects of known effects, in order to harness such effects (if beneficial) or prevent or mitigate them (if harmful).

  11. Intelligent multimedia surveillance current trends and research

    CERN Document Server

    Atrey, Pradeep K; Cavallaro, Andrea

    2013-01-01

    Intelligent multimedia surveillance concerns the analysis of multiple sensing inputs including video and audio streams, radio-frequency identification (RFID), and depth data. These data are processed for the automated detection and tracking of people, vehicles, and other objects. The goal is to locate moving targets, to understand their behavior, and to detect suspicious or abnormal activities for crime prevention. Despite its benefits, there is societal apprehension regarding the use of such technology, so an important challenge in this research area is to balance public safety and privacy.

  12. Self-surveillance

    DEFF Research Database (Denmark)

    Albrechtslund, Anders

    coupled with social interaction and sometimes framed as entertainment or games. Facilitated by online community and social networking sites, the possibility of collecting and sharing data is a significant feature of these self-monitoring technologies. They all include sharing features where weight, blood...... pressure, fitness activities, sleep cycles, etc. can be broadcasted, e.g. as tweets on Twitter or status updates on Facebook. Such quantification practices with monitoring technologies become co-producing when individuals constitute themselves as subjects engaging in self-tracking, self-care, and self......, and gamification modulate the enactment of selfhood? How does self-surveillance contribute to corresponding notions of self-optimization and self-cultivation such as “the good life”, “sustainable lifestyle”, “healthy living”, “good learning” and “work productivity”?...

  13. Drug approval and surveillance.

    Science.gov (United States)

    Potts, M

    1980-01-01

    This article argues that current regulations governing the licensing of drugs, particularly in the U.S., need to be changed and replaced by a system of provisional or conditional licensing and increased postmarketing surveillance of drug use. In terms of research and development of new forms of contraception, this proposal would have great impact. It is believed that the U.S./Food and Drug Administration (FDA) requirements--animal experiments and Phase 1 and 2 clinical trials--not only put an unacceptable financial burden on any institution attempting to develop new contraceptives, but do not demonstrably contribute to the reduction of risks. The author questions whether even if oral contraceptives introduced prior to new U.S./FDA regulations had been subject to these current regulations that convincing evidence would have been found to alert anyone to the now-known rare adverse effects, such as risk of thromboembolism. It is pointed out that these sorts of rare risks were uncovered by continuous screening processes which are not now a part of the FDA drug regulation requirements. The author also questions the politics of "conpulsory safety," such as might be legislated for regulated car safety belt use. Citing a partnership already established between government and private industry in high-risk/low cost ventures in the aerospace industry, the author sees no reason why such a relationship could not evolve in the pharmaceutical industry. In Britain, proposals have been made to establish a fund to compensate patients adversely affected by drugs which pharmaceutical companies would reimburse if proved negligent; such a fund may work in the U.S. under new regulations which stress postmarketing surveillance.

  14. Secure surveillance videotapes

    Energy Technology Data Exchange (ETDEWEB)

    Resnik, W.M.; Kadner, S.P. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Olsen, R.; Chitumbo, K. [International Atomic Energy Agency, Vienna (Austria); Pepper, S. [International Safeguards Project Office, Vienna (Austria)

    1995-12-31

    With assistance from the US Program for Technical Assistance to IAEA Safeguards (POTAS), Aquila Technologies Group developed the Tamper-Resistant Analog Media (TRAM-1000) system to provide standard VHS surveillance video tapes with an enhanced tamper-indicating capability. This project represents further implementation of the partnership approach in facilities including light water reactors with MOX facilities. These facilities use Uniplex Digiquad system video tapes. The partnership approach ensures that one organization can exchange the tapes in a machine without the presence of the other, without losing continuity of information. The TRAM-1000 system development project was accomplished in two stages. In the first stage of the project, the original system delivered to the IAEA, consists of three parts: (1) the tamper detection unit, (2) a specially augmented VHS video tape, and (3) an HP-95 reader. The tamper detection unit houses a VACOSS active fiber-optic seal and an electronic identification tag (E-TAG) reader. In the second stage of the project, the original TRAM-1000 was modified to its current design based on agency input. After delivery of the original TRAM-1000 system to the IAEA, it was reviewed by inspectors. The inspectors felt that the initial system`s tape storage/transport method could be simplified. Rather than threading the fiber through the tape spindles, the inspectors suggested that the tape be placed in a bag capable of being sealed. Also, a more flexible fiber-optic cable was recommended. As a result of these suggestions, Aquila developed a tamper-proof bag specifically for holding a surveillance video tape and sealable with a VACOSS fiber optical seal.

  15. Acquisition of speech rhythm in first language.

    Science.gov (United States)

    Polyanskaya, Leona; Ordin, Mikhail

    2015-09-01

    Analysis of English rhythm in speech produced by children and adults revealed that speech rhythm becomes increasingly more stress-timed as language acquisition progresses. Children reach the adult-like target by 11 to 12 years. The employed speech elicitation paradigm ensured that the sentences produced by adults and children at different ages were comparable in terms of lexical content, segmental composition, and phonotactic complexity. Detected differences between child and adult rhythm and between rhythm in child speech at various ages cannot be attributed to acquisition of phonotactic language features or vocabulary, and indicate the development of language-specific phonetic timing in the course of acquisition.

  16. Target acquisition probability at hand-off from midcourse to terminal guidance of a BVR air defense missile%超视距防空导弹中末制导交接班时的目标捕获概率研究

    Institute of Scientific and Technical Information of China (English)

    刘少波; 赵良玉

    2016-01-01

    中末制导交接班时的目标捕获概率是超视距防空导弹作战过程中的一个重要指标。为了快速计算中末制导交接班时的目标捕获概率,通过将导弹和目标的三维空间散布转换为视线坐标系下弹目相对位置向量的均值和方差,建立了一种红外导引头中末制导交接班时的目标捕获概率解析计算模型,并利用蒙特卡洛方法验证了其有效性。以此模型为基础,采用正交试验方法完成了目标捕获概率的灵敏度分析,极差和方差分析结果均表明,导引头视场角对目标捕获概率的影响最显著,弹目相对位置向量在视线坐标系OyL 轴和OzL 轴上投影的方差次之。%The target acquisition probability is an important parameter at hand⁃off from midcourse to terminal guidance of a be⁃yond visual range ( BVR) air defense missile. In order to calculate the target acquisition probability with low computational cost, the distributions of the missile and the target in three⁃dimensional space were transformed to the mean and variance of relative range vector in line⁃of⁃sight coordinate firstly, and then an analytical model was established to calculate the target acquisition probability of a kind of missile with an infrared seeker. After the analytical model was verified by the Monte Carlo method, it was employed to investigate the sensitivity of the target acquisition probability by means of orthogonal experiments. The results of range analysis and variance analysis both prove that the influence of seeker field angle on the target acquisition probability is dominated, and influences of variances of projections of relative range vector along OyL and OzL direction in line⁃of⁃sight coordinate are the second.

  17. EFSA Panel on Animal Health and Welfare (AHAW); Scientific Opinion on bluetongue monitoring and surveillance

    DEFF Research Database (Denmark)

    Stegeman, Arjan; Bøtner, Anette; Savini, Giovanni

    for the purpose of monitoring and surveillance programmes for bluetongue. A systematic literature review and a review of monitoring and surveillance data from European Union Member States was performed in order to estimate the prevalences observed in the Member States. The prevalences observed in areas that have...... there is no scientific evidence that suggests an optimal size of the relevant geographic unit for BTV monitoring and surveillance, since it depends on many factors, including the goal of the surveillance programmes. Early warning based on passive surveillance will take place irrespective of the size of the geographical...... unit but, when based on active surveillance, it is best targeted at regions considered at risk for introduction, using small geographical units, a high sampling frequency and sample size. For estimating the impact of interventions on the prevalence of infected animals, smaller areas result in more...

  18. Dynamic intervention: pathogen disarmament of mitochondrial-based immune surveillance.

    Science.gov (United States)

    Holland, Robin L; Blanke, Steven R

    2014-11-12

    In this issue of Cell Host & Microbe, Suzuki et al. (2014) describe a Vibrio cholerae Type-III-secreted effector that targets mitochondrial dynamics to dampen host innate immune signaling. This suggests that mammalian hosts possess surveillance mechanisms to monitor pathogen-mediated alterations in the integrity of normal cellular processes and organelles.

  19. A Risk Management Model for Merger and Acquisition

    Directory of Open Access Journals (Sweden)

    B. S. Chui

    2011-05-01

    Full Text Available In this paper, a merger and acquisition risk management model is proposed for considering risk factors in the merger and acquisition activities. The proposed model aims to maximize the probability of success in merger and acquisition activities by managing and reducing the associated risks. The modeling of the proposed merger and acquisition risk management model is described and illustrated in this paper. The illustration result shows that the proposed model can help to screen the best target company with minimum associated risks in the merger and acquisition activity.

  20. Mechanism Analysis of Air Surveillance Radar Network System Dense False Target Jamming%对空情报雷达网密集假目标干扰机理分析

    Institute of Scientific and Technical Information of China (English)

    赵源; 熊英; 唐斌

    2015-01-01

    针对雷达网欺骗干扰问题,首先讨论了雷达网数据关联处理方法薄弱环节,给出了可以欺骗雷达网的假目标应该满足的条件,然后分析对空情报雷达网密集假目标干扰的产生机理和作用机理,为产生高逼真的假目标,将空间分布转化为非线性最优化问题. 当进行多干扰机协同干扰时,将干扰机功率资源在空间的分配问题转化为非线性规划问题. 仿真研究了对网络化雷达的假目标欺骗干扰效果以及影响干扰效果的因素,该结果可为对空情报雷达网电子对抗提供理论指导.%The weakness of data processing algorithms for radar network is discussed,requirements of false targets for combating the victim radar network is given. Then the mechanism of dense false target jamming against radar network is analyzed. The false target distribution is transformed into a nonlinear optimization in order to generate the false target acting like a real target. For multiple jammers scenario,power resource allocation is turned into a nonlinear programming. The effectiveness of jamming is simulated and the influ-ence factors are studied. This research will provide a theoretical guidance for the radar network electronic countermeasure( ECM) .

  1. Youth Risk Behavior Surveillance System

    Science.gov (United States)

    ... Evaluation FAQs Additional Evaluation Resources Health & Academics Anti-Bullying Policies and Enumeration: An Infobrief for Local Education ... Youth Risk Behavior Surveillance System (YRBSS) monitors six types of health-risk behaviors that contribute to the ...

  2. Radioisotopic Thermoelectric Generator (RTG) Surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Mulford, Roberta Nancy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-29

    This lecture discusses stockpile stewardship efforts and the role surveillance plays in the process. Performance of the RTGs is described, and the question of the absence of anticipated He is addressed.

  3. Cyber surveillance for flood disasters

    National Research Council Canada - National Science Library

    Lo, Shi-Wei; Wu, Jyh-Horng; Lin, Fang-Pang; Hsu, Ching-Han

    2015-01-01

    ... river areas and sections. Therefore, in this paper, we propose an easy method to automatically monitor the flood object of a specific area, based on the currently widely used remote cyber surveillance systems and image...

  4. Airport Surveillance Radar : Model 8 -

    Data.gov (United States)

    Department of Transportation — The Airport Surveillance Radar Model 8 (ASR-8) is a short-range (60 nautical mile (nmi)), analog radar system used to detect and report the presence and location of...

  5. Airport Surveillance Radar : Model 7 -

    Data.gov (United States)

    Department of Transportation — The Airport Surveillance Radar Model 7 (ASR-7) is a short-range (60 nautical miles (nmi)) analog radar system used to detect and report the presence and location of...

  6. Surveillance of rotavirus diarrhea

    Directory of Open Access Journals (Sweden)

    Titis Widowati

    2012-01-01

    Full Text Available Background Rotavirus is a major cause of severe diarrhea and dehydration in children worldwide. Data on the burden of disease in Indonesia is limited. Objective To provide an epidemiological profile of rotavirus infection among children hospitalized for diarrhea in Mohammad Hoesin Hospital, Palembang. Methods In January - December 2006, a prospective, hospital-based surveillance was carried out in children aged less than five years, presenting with diarrhea. Stool samples were examined for rotavirus using enzyme immunoassay (EIA. G- and P-typing were performed on specimens confirmed to be positive by EIA. Results A total of 513 fecal specimens from 534 children were tested for rotavirus. Rotavirus was detected in 64% of the specimens, mostly of the G9 type (62.5%. Incidence of rotavirus diarrhea was highest in the 6 month to 2 years age group (60.4%. Children with rotavirus diarrhea were more likely to present with dehydration, compared to those with non-rotavirus diarrhea (94% vs 70%, respectively, P=0.03. Conclusion Rotavirus was the most common pathogen found in children with diarrhea. Rotavirus was detected in 64% of pediatric diarrheal specimens tested in our study. This finding warrants the use of a large-scale program to prevent disease, such as vaccination against rotavirus. [Paediatr Indones. 2012;52:22-7].

  7. Public Health Disease Surveillance Networks.

    Science.gov (United States)

    Morse, Stephen S

    2014-02-01

    Zoonotic infections are important sources of human disease; most known emerging infections are zoonotic (e.g., HIV, Ebola virus, severe acute respiratory syndrome, Nipah virus, and enteropathogenic Escherichia coli) and originated as natural infections of other species that acquired opportunities to come in contact with humans. There are also serious infectious diseases classically considered zoonotic, such as influenza, rabies, bubonic plague, brucellosis, and leptospirosis. More recently, it has been recognized that wildlife constitutes a particularly important source of novel zoonoses. With all this microbial movement, surveillance is considered the first line of public health defense. The zoonotic origin of many human and livestock infections argues strongly for the synergistic value of a One Health approach, which provides the capability to identify pathogens crossing into new species and could provide earlier warning of potential epidemics. This article discusses public health surveillance and major recent surveillance initiatives and reviews progress toward implementing a One Health surveillance framework. Networks discussed include global intergovernmental organizations and recent combined efforts of these organizations; Web-based nongovernmental systems (e.g., ProMED, the Program for Monitoring Emerging Diseases); and networks of bilateral or multilateral government programs (e.g., the CDC's Global Disease Detection [GDD] platform; the U.S. Department of Defense's Global Emerging Infections Surveillance and Response System [GEIS]; regional and subregional networks; and the U.S. Agency for International Development's Emerging Pandemic Threats [EPT] program and its surveillance component, PREDICT). Syndromic surveillance also has potential to complement existing systems. New technologies are enabling revolutionary capabilities for global surveillance, but in addition to serious technical needs, both sustainability and data-sharing mechanisms remain

  8. Development of the Observational Surveillance

    OpenAIRE

    Rieutort, Delphine

    2015-01-01

    Impact of population on the environment, and conversely, is obvious and represents a real challenge for Public Health since 2000. It has been shown an increase in cancer prevalence, respiratory disease or even reproductive disorders, for which multifactorial origins are strongly suspected. In this context, surveillance has become an essential tool to decision making in public health, and surveillance networks of health events are multiplying, giving rise to numerous databases (sometimes consi...

  9. Syndromic surveillance: A local perspective

    OpenAIRE

    2003-01-01

    The promise of syndromic surveillance extends beyond early warning for bioterrorist attacks. Even if bioterrorism is first detected by an astute clinician, syndromic surveillance can help delineate the size, location, and tempo of the epidemic or provide reassurance that a large outbreak is not occurring when a single case or a small, localized cluster of an unusual illness is detected. More broadly, however, as public health and medicine proceed in our information age, the use of existing el...

  10. Occupational Surveillance for Spaceflight Exposures

    Science.gov (United States)

    Tarver, William J.

    2010-01-01

    This slide presentation reviews the importance of longterm occupational health surveillance of astronauts after exposure to the possible hazards of spaceflight. Because there is not much information about long term effects of spaceflight on human health, it is important to identify some of the possible results of exposure to the many possible factors that can influence longterm health impacts. This surveillance also allows for NASA to meet the obligation to care for the astronauts for their lifetime.

  11. Surface Environmental Surveillance Procedures Manual

    Energy Technology Data Exchange (ETDEWEB)

    RW Hanf; TM Poston

    2000-09-20

    Environmental surveillance data are used in assessing the impact of current and past site operations on human health and the environment, demonstrating compliance with applicable local, state, and federal environmental regulations, and verifying the adequacy of containment and effluent controls. SESP sampling schedules are reviewed, revised, and published each calendar year in the Hanford Site Environmental Surveillance Master Sampling Schedule. Environmental samples are collected by SESP staff in accordance with the approved sample collection procedures documented in this manual.

  12. Excessive acquisition in hoarding.

    Science.gov (United States)

    Frost, Randy O; Tolin, David F; Steketee, Gail; Fitch, Kristin E; Selbo-Bruns, Alexandra

    2009-06-01

    Compulsive hoarding (the acquisition of and failure to discard large numbers of possessions) is associated with substantial health risk, impairment, and economic burden. However, little research has examined separate components of this definition, particularly excessive acquisition. The present study examined acquisition in hoarding. Participants, 878 self-identified with hoarding and 665 family informants (not matched to hoarding participants), completed an Internet survey. Among hoarding participants who met criteria for clinically significant hoarding, 61% met criteria for a diagnosis of compulsive buying and approximately 85% reported excessive acquisition. Family informants indicated that nearly 95% exhibited excessive acquisition. Those who acquired excessively had more severe hoarding; their hoarding had an earlier onset and resulted in more psychiatric work impairment days; and they experienced more symptoms of obsessive-compulsive disorder, depression, and anxiety. Two forms of excessive acquisition (buying and free things) each contributed independent variance in the prediction of hoarding severity and related symptoms.

  13. [Infectious disease surveillance in Miyagi after the Great East Japan Earthquake].

    Science.gov (United States)

    Kim, Mihyun; Kamigaki, Taro; Mimura, Satoshi; Oshitani, Hitoshi

    2013-10-01

    The Great East Japan Earthquake, which occurred on March 11, 2011, damaged many health facilities and compelled many inhabitants to live in evacuation centers. For the purpose of monitoring infectious disease outbreaks, infectious disease surveillance targeted at evacuation centers was established in Miyagi Prefecture. In this study, we summarized the monitoring activities of infectious diseases through this surveillance after the earthquake. Infectious disease surveillance was implemented from March 18 to November 6, 2011. The surveillance consisted of two phases (hereafter, surveillance 1 and 2) reflecting the difference in frequencies of reporting as well as the number of targeted diseases. Surveillance 1 operated between March 18 and May 13, 2011, and Surveillance 2 operated between May 10 and November 6, 2011. We reviewed the number of cases reported, the number of evacuation centers, and demographic information of evacuees with the surveillance. In Surveillance 1, there were 8,737 reported cases; 84% of them were acute respiratory symptoms, and 16% were acute digestive symptoms. Only 4.4% of evacuation centers were covered by the surveillance one week after the earthquake. In Surveillance 2, 1,339 cases were reported; 82% of them were acute respiratory symptoms, and 13% were acute digestive symptoms. Surveillance 2 revealed that the proportion of children aged 5 years and younger was lower than that of other age groups in all targeted diseases. No particular outbreaks were detected through those surveillances. Infectious disease surveillance operated from one week after the earthquake to the closure of all evacuation centers in Miyagi Prefecture. No outbreaks were detected in that period. However, low coverage of evacuation centers just after the earthquake as well as skewed frequencies of reported syndromes draw attention to the improvement of the early warning system. It is important to coordinate with the medical aid team that visits the evacuation centers

  14. An evaluation of the sensitivity of acute flaccid paralysis surveillance for poliovirus infection in Australia

    Directory of Open Access Journals (Sweden)

    Madin Ben

    2009-09-01

    Full Text Available Abstract Background World Health Organization (WHO targets for acute flaccid paralysis (AFP surveillance, including the notification of a minimum rate of AFP among children, are used to assess the adequacy of AFP surveillance for the detection of poliovirus infection. Sensitive surveillance for poliovirus infection in both developed and developing countries is essential to support global disease eradication efforts. We applied recently developed methods for the quantitative evaluation of disease surveillance systems to evaluate the sensitivity of AFP surveillance for poliovirus infection in Australia. Methods A scenario tree model which accounted for administrative region, age, population immunity, the likelihood of AFP, and the probability of notification and stool sampling was used to assess the sensitivity of AFP surveillance for wild poliovirus infection among children aged less than 15 years in Australia. The analysis was based on historical surveillance data collected between 2000 and 2005. We used a surveillance time period of one month, and evaluated the ability of the surveillance system to detect poliovirus infection at a prevalence of 1 case per 100 000 persons and 1 case per million persons. Results There was considerable variation in the sensitivity of AFP surveillance for poliovirus infection among Australian States and Territories. The estimated median sensitivity of AFP surveillance in Australia among children aged less than 15 years was 8.2% per month at a prevalence of 1 case per 100,000 population, and 0.9% per month at a prevalence of 1 case per million population. The probability that Australia is free from poliovirus infection given negative surveillance findings following 5 years of continuous surveillance was 96.9% at a prevalence of 1 case per 100,000 persons and 56.5% at a prevalence of 1 case per million persons. Conclusion Given the ongoing risk of poliovirus importation prior to global eradication, long term

  15. Acquisition IT Integration

    DEFF Research Database (Denmark)

    Henningsson, Stefan; Øhrgaard, Christian

    2015-01-01

    The IT integration of acquisitions consists an important challenge for the many acquiring organizations. Complementing existing research, this paper searches for explanation to differences in acquirers’ abilities for acquisition IT integration in the external of the acquirer, by a study of the use...... of temporary agency workers. Following an analytic induction approach, theoretically grounded in the re-source-based view of the firm, we identify the complimentary and supplementary roles consultants can assume in acquisition IT integration. Through case studies of three acquirers, we investigate how...... of the acquisition IT integration team should consider the balance of these, in practice, commonly mutually excluding needs....

  16. Target Detection of Primary Surveillance Radar in Wind Turbine Clutter%空管一次雷达抗风电场干扰目标检测方法

    Institute of Scientific and Technical Information of China (English)

    冯涛; 刘飞虎; 安凯

    2016-01-01

    In recent years,wind turbine clutter (WTC)caused interference begun to attract attention as the construction of wind farms.Since moving target detection(MTD)can’t filter out the non-zero frequency echoes which reflected from wind turbine,the echoes may cause target shadowing and false alarm rate rises. In order to solving this problem,the author presents a target identification based method.Before aircraft fly into WTC,they are classified into three categories (turbojet aircraft,propeller aircraft or helicopter)using target identification algorithm.Then,after the aircraft flied into WTC,all target echoes which located in range gate will be recognized by jet engine modulation (JEM).The identification algorithm in second step transforms the echo signals into frequency domain and extracts the relevant features,and then using the type of aircraft corresponded classifier to identify the echo signals.After the identification,the WTC will be ruled out and the aircraft echoes will be reserved.Simulation results prove that the method can effectively identify the aircraft and wind turbine echoes and complete WTC mitigation and aircraft detection tasks.%近年来,随着风力发电场建设的不断推进,风电场对雷达探测的干扰问题开始引起人们的重视。动目标检测(Moving Target Detection,MTD)技术无法滤除风轮机的非零频回波,进而引起目标遮蔽及虚警上升。为了解决该问题,提出了一种基于目标识别的抗风电场干扰目标检测方法。该方法在飞行器进入风轮机杂波区前,先对预测进入风电场区域的飞行器进行初始目标识别,利用已有算法完成涡扇飞机、螺旋桨飞机或直升机的判定,提高后续识别的准确率;再在飞行器进入风轮机杂波区后,利用4种目标(3种飞行器目标及风轮机目标)的发动机调制(Jet Engine Modulation,JEM)特性进行识别。第二步识别是通过将所有进入波门区域的目标回波信号,转化到频域并

  17. Developing Air Force Acquisition Leaders for the 21st Century

    Science.gov (United States)

    2007-11-02

    intelligent , but rather the one that is most adaptable to change. Charles Darwin To support the vision of global vigilance, global reach and global...command and control intelligence , surveillance, and reconnaissance (C2ISR). 112 The process in Figure 3 can be illustrated by using the acquisition...first is how they orient themselves to the world (extroversion (E) or introversion (I)) and the second is the attitude taken (judging (J) or perceiving

  18. Occupational Medical Surveillance Recommendations

    Science.gov (United States)

    1991-07-01

    sodium pentachlorophenate) Fumigants (Chlorpicrin, Ethylene dibromide) Rodenticides (Pyriminil, Alpha-naphthylthiourea - ANTU) 23 Target Organs...IA&C_#* AP** 000050-33-9 Phenylbutazone 3. - 000050-55-5 Resperine 3 2 000052-24-4 Tris(Aziridinyl)- Phosphine Sulfide 2A 2 000063-92-3 Phenoxybenzamine

  19. A Focused Ethnographic Study of Alberta Cattle Veterinarians’ Decision Making about Diagnostic Laboratory Submissions and Perceptions of Surveillance Programs

    OpenAIRE

    Kate Sawford; Ardene Robinson Vollman; Craig Stephen

    2013-01-01

    The animal and public health communities need to address the challenge posed by zoonotic emerging infectious diseases. To minimize the impacts of future events, animal disease surveillance will need to enable prompt event detection and response. Diagnostic laboratory-based surveillance systems targeting domestic animals depend in large part on private veterinarians to submit samples from cases to a laboratory. In contexts where pre-diagnostic laboratory surveillance systems have been implemen...

  20. Acquisition Research Program Homepage

    OpenAIRE

    2015-01-01

    Includes an image of the main page on this date and compressed file containing additional web pages. Established in 2003, Naval Postgraduate School’s (NPS) Acquisition Research Program provides leadership in innovation, creative problem solving and an ongoing dialogue, contributing to the evolution of Department of Defense acquisition strategies.

  1. Coring Sample Acquisition Tool

    Science.gov (United States)

    Haddad, Nicolas E.; Murray, Saben D.; Walkemeyer, Phillip E.; Badescu, Mircea; Sherrit, Stewart; Bao, Xiaoqi; Kriechbaum, Kristopher L.; Richardson, Megan; Klein, Kerry J.

    2012-01-01

    A sample acquisition tool (SAT) has been developed that can be used autonomously to sample drill and capture rock cores. The tool is designed to accommodate core transfer using a sample tube to the IMSAH (integrated Mars sample acquisition and handling) SHEC (sample handling, encapsulation, and containerization) without ever touching the pristine core sample in the transfer process.

  2. Robotization in Seismic Acquisition

    NARCIS (Netherlands)

    Blacquière, G.; Berkhout, A.J.

    2013-01-01

    The amount of sources and detectors in the seismic method follows "Moore’s Law of seismic data acquisition", i.e., it increases approximately by a factor of 10 every 10 years. Therefore automation is unavoidable, leading to robotization of seismic data acquisition. Recently, we introduced a new

  3. Second language acquisition

    NARCIS (Netherlands)

    Kootstra, G.J.; Dijkstra, A.F.J.; Starren, M.B.P.

    2015-01-01

    This contribution provides an overview of second language acquisition research from a psycholinguistic perspective. The overview is mainly focused on cross-language interactions during word and sentence production and comprehension at different points in the second-language acquisition process. The

  4. Target classification by surveillance radar based on multifractal features%基于多重分形特征的防空雷达目标分类方法

    Institute of Scientific and Technical Information of China (English)

    李秋生; 谢维信

    2013-01-01

    On basis of introducing the mathematical model of aircraft returns in the conventional radar, by means of the multi-fractal measure analysis, this paper analyzed the multifractal characteristic of the aircraft returns as well as the extraction method of their multifractal signatures, and proposed the classification method for three types of aircraft containing jets, propeller aircrafts and helicopters from the angle of pattern recognition. The experimental analysis shows, the conventional radar returns from three types of aircraft targets, containing jets, propeller aircrafts and helicopters, have significantly different multifractal characteristic curves, and the defined multifractal characteristic parameters can be used as effective features for aircraft target classification and recognition. The simulation validated the validity of the proposed method.%在介绍常规雷达飞机目标回波数学模型的基础上,利用多重分形测度分析手段,分析了常规雷达飞机目标回波的多重分形特性及其多重分形特征的提取方法,并从模式分类的角度,提出了利用多重分形特征对喷气式飞机、螺旋桨飞机和直升机等三类飞机目标进行分类的方法.实验表明,上述三类飞机的目标回波数据具有显著不同的多重分形特征,所定义的多重分形特征参数可以作为飞机目标分类和识别的有效特征,仿真实验验证了所提方法的有效性.

  5. Congenital syphilis surveillance

    Directory of Open Access Journals (Sweden)

    Antonella Marangoni

    2011-06-01

    Full Text Available Congenital syphilis (CS is mainly a consequence of the lack of antenatal care and control of sexually transmitted infections.The bedrock of the prevention of CS is syphilis diagnosis by serological screening during pregnancy.Current Italian guidelines suggest that all the pregnant women should be tested in the first trimester. Due to the frequently absence of specific signs of infection at birth, laboratory tests are often the only method for a correct CS diagnosis. The aim of this study was to evaluate the usefulness of Treponema pallidum IgM Western Blot (WB and Polymerase Chain Reaction (PCR on cerebrospinal fluid (CSF as an aid in the diagnosis of CS during a prospective surveillance study carried out at St. Orsola Hospital in Bologna, Italy, from November 2000 through June 2010. All pregnant women during pregnancy and at delivery were screened for syphilis by ARCHITECT® Syphilis TP, Abbott. Positive samples were further analysed by Treponema Pallidum Hemagglutination Test (TPHA and Rapid Plasma Reagin (RPR tests, Radim.An in-house Western Blot (WB was also performed. Infants born to syphilis seropositive mothers were enrolled in a prospective follow up. At birth, tests were performed (including IgM WB. Infants with positive RPR tests at birth born to mothers not adequately treated received also a long bone radiograph as well as a complete CSF analysis, including Veneral Disease Research Laboratori (VDRL (Siemens Healthcare Diagnostics and PCR testing. All seroreactive infants received careful follow up examinations and serological testing at 0, 3, 6, 9, 12 months or until the tests became negative. In this study, positive syphilis serology was noted in 151 pregnant women delivering in our hospital. Fifteen women had never been adequately treated, and 9 out 15 gave birth to infected newborns.All these 9 infants had positive IgM WB results on serum samples. Two babies had characteristic long bone lesions at X-ray examination and 3 were born

  6. Mergers and Acquisitions

    DEFF Research Database (Denmark)

    Risberg, Annette

    , employee experiences and communication. Mergers and acquisitions remain one of the most common forms of growth, yet they present considerable challenges for the companies and management involved. The effects on stakeholders, including shareholders, managers and employees, must be considered as well......Introduction to the study of mergers and acquisitions. This book provides an understanding of the mergers and acquisitions process, how and why they occur, and also the broader implications for organizations. It presents issues including motives and planning, partner selection, integration...... by editorial commentaries and reflects the important organizational and behavioural aspects which have often been ignored in the past. By providing this in-depth understanding of the mergers and acquisitions process, the reader understands not only how and why mergers and acquisitions occur, but also...

  7. Information systems to support surveillance for malaria elimination.

    Science.gov (United States)

    Ohrt, Colin; Roberts, Kathryn W; Sturrock, Hugh J W; Wegbreit, Jennifer; Lee, Bruce Y; Gosling, Roly D

    2015-07-01

    Robust and responsive surveillance systems are critical for malaria elimination. The ideal information system that supports malaria elimination includes: rapid and complete case reporting, incorporation of related data, such as census or health survey information, central data storage and management, automated and expert data analysis, and customized outputs and feedback that lead to timely and targeted responses. Spatial information enhances such a system, ensuring cases are tracked and mapped over time. Data sharing and coordination across borders are vital and new technologies can improve data speed, accuracy, and quality. Parts of this ideal information system exist and are in use, but have yet to be linked together coherently. Malaria elimination programs should support the implementation and refinement of information systems to support surveillance and response and ensure political and financial commitment to maintain the systems and the human resources needed to run them. National malaria programs should strive to improve the access and utility of these information systems and establish cross-border data sharing mechanisms through the use of standard indicators for malaria surveillance. Ultimately, investment in the information technologies that support a timely and targeted surveillance and response system is essential for malaria elimination.

  8. Character superimposition inpainting in surveillance video

    Science.gov (United States)

    Jia, Lili; Tao, Junjie; You, Ying

    2016-01-01

    Video surveillance systems play an important role in the crime scene investigation, and the digital surveillance system always requires the superimposed video data being subjected to a data compression processing. The purpose of this paper is to study the use of inpainting techniques to remove the characters and inpaint the target region. We give the efficient framework including getting Character Superimposition mask, superimposition movement and inpainting the blanks. The character region is located with the manual ROI selection and varying text extractor, such as the time. The superimposed characters usually have distinguished colors from the original background, so the edges are easily detected. We use the canny operator the get the edge image. The missing information which is effect the structure of the original image is reconstructed using a structure propagating algorithm. The experiment was done with C/C++ in the vs2010 KDE. The framework of this paper showed is powerful to recreate the character superimposition region and helpful to the crime scene investigation.

  9. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... by analyzing a location-based system for airport passengers developed for a Copenhagen Airport, and the dimensions are used to explain user reactions to different services offered by the system....... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach...

  10. Informatics enables public health surveillance

    Directory of Open Access Journals (Sweden)

    Scott J. N McNabb

    2017-01-01

    Full Text Available Over the past decade, the world has radically changed. New advances in information and communication technologies (ICT connect the world in ways never imagined. Public health informatics (PHI leveraged for public health surveillance (PHS, can enable, enhance, and empower essential PHS functions (i.e., detection, reporting, confirmation, analyses, feedback, response. However, the tail doesn't wag the dog; as such, ICT cannot (should not drive public health surveillance strengthening. Rather, ICT can serve PHS to more effectively empower core functions. In this review, we explore promising ICT trends for prevention, detection, and response, laboratory reporting, push notification, analytics, predictive surveillance, and using new data sources, while recognizing that it is the people, politics, and policies that most challenge progress for implementation of solutions.

  11. New perspectives in electronic fetal surveillance.

    Science.gov (United States)

    Hamilton, Emily F; Warrick, Philip A

    2013-01-01

    Despite its recognized limitations, fetal heart rate monitoring is a mainstay of intrapartum care. Although the basic technology in standard electronic fetal monitors has changed little in recent decades, clinical behavior in response to heart rate monitoring has changed considerably. In addition to clearly defined nomenclature and clinical guidelines, there is an increased awareness that environmental and human factors can impair clinical judgment, resulting in delayed intervention and, consequently, birth-related injury. This review examines three essential steps that affect clinical outcome: (1) signal acquisition, (2) associations with physiological outcome, and (3) clinical intervention. Only the third step is directly responsible for changing clinical outcome. However, timely initiation of interventions is dependent upon the second step, which is dependent upon the fi rst step. Thus, deficiencies at each step tend to accumulate and contribute to the worsening of overall clinical outcome. This review article summarizes advances occurring at each step. The synergy and convergence of innovations in engineering, mathematics, and behavioral science shows considerable promise in intrapartum fetal surveillance.

  12. Acquisition Workforce Annual Report 2006

    Data.gov (United States)

    General Services Administration — This is the Federal Acquisition Institute's (FAI's) Annual demographic report on the Federal acquisition workforce, showing trends by occupational series, employment...

  13. Acquisition Workforce Annual Report 2008

    Data.gov (United States)

    General Services Administration — This is the Federal Acquisition Institute's (FAI's) Annual demographic report on the Federal acquisition workforce, showing trends by occupational series, employment...

  14. Foreign acquisitions, domestic multinationals, and R&D

    DEFF Research Database (Denmark)

    Bandick, Roger; Görg, Holger; Karpaty, Patrik

    The aim of this paper is to evaluate the causal effect of foreign acquisition on R&D intensity in targeted domestic firms. We are able to distinguish domestic multinationals and non-multinationals, which allows us to investigate the fear that the change in ownership of domestic to foreign...... endogeneity of the acquisition dummy.  Overall, our results give no support to the fears that foreign acquisition of domestic firms lead to a brain drain of R&D activity in Swedish MNEs. Rather, this paper finds robust evidence that foreign acquisitions lead to increasing R&D intensity in acquired domestic...

  15. National Cardiac Device Surveillance Program Database

    Data.gov (United States)

    Department of Veterans Affairs — The National Cardiac Device Surveillance Program Database supports the Eastern Pacemaker Surveillance Center (EPSC) staff in its function of monitoring some 11,000...

  16. Inappropriate colonoscopic surveillance of hyperplastic polyps.

    LENUS (Irish Health Repository)

    Keane, R A

    2011-11-15

    Colonoscopic surveillance of hyperplastic polyps alone is controversial and may be inappropriate. The colonoscopy surveillance register at a university teaching hospital was audited to determine the extent of such hyperplastic polyp surveillance. The surveillance endoscopy records were reviewed, those patients with hyperplastic polyps were identified, their clinical records were examined and contact was made with each patient. Of the 483 patients undergoing surveillance for colonic polyps 113 (23%) had hyperplastic polyps alone on last colonoscopy. 104 patients remained after exclusion of those under appropriate surveillance. 87 of the 104 patients (84%) were successfully contacted. 37 patients (8%) were under appropriate colonoscopic surveillance for a significant family history of colorectal carcinoma. 50 (10%) patients with hyperplastic polyps alone and no other clinical indication for colonoscopic surveillance were booked for follow up colonoscopy. This represents not only a budgetary but more importantly a clinical opportunity cost the removal of which could liberate valuable colonoscopy time for more appropriate indications.

  17. Regional Disease Surveillance Meeting - Final Paper

    Energy Technology Data Exchange (ETDEWEB)

    Lesperance, Ann M.; Mahy, Heidi A.

    2006-08-08

    On June 1, 2006, public health officials working in surveillance, epidemiological modeling, and information technology communities from the Seattle/Tacoma area and State of Washington met with members of the Pacific Northwest National Laboratory (PNNL) to discuss the current state of disease surveillance and gaps and needs to improve the current systems. The meeting also included a discussion of PNNL initiatives that might be appropriate to enhance disease surveillance and the current tools being used for disease surveillance. Participants broke out into two groups to identify critical gaps and needs for improving a surveillance system, and discuss the requirements for developing improved surveillance. Each group developed a list of key priorities summarizing the requirements for improved surveillance. The objective of this meeting was to work towards the development of an improved disease surveillance system.

  18. A generic rabies risk assessment tool to support surveillance.

    Science.gov (United States)

    Ward, Michael P; Hernández-Jover, Marta

    2015-06-01

    The continued spread of rabies in Indonesia poses a risk to human and animal populations in the remaining free islands, as well as the neighbouring rabies-free countries of Timor Leste, Papua New Guinea and Australia. Here we describe the development of a generic risk assessment tool which can be used to rapidly determine the vulnerability of rabies-free islands, so that scarce resources can be targeted to surveillance activities and the sensitivity of surveillance systems increased. The tool was developed by integrating information on the historical spread of rabies, anthropological studies, and the opinions of local animal health experts. The resulting tool is based on eight critical parameters that can be estimated from the literature, expert opinion, observational studies and information generated from routine surveillance. In the case study presented, results generated by this tool were most sensitive to the probability that dogs are present on private and fishing boats and it was predicted that rabies-infection (one infected case) might occur in a rabies-free island (upper 95% prediction interval) with a volume of 1000 boats movements. With 25,000 boat movements, the median of the probability distribution would be equal to one infected case, with an upper 95% prediction interval of six infected cases. This tool could also be used at the national-level to guide control and eradication plans. An initial recommendation from this study is to develop a surveillance programme to determine the likelihood that boats transport dogs, for example by port surveillance or regularly conducted surveys of fisherman and passenger ferries. However, the illegal nature of dog transportation from rabies-infected to rabies-free islands is a challenge for developing such surveillance.

  19. A rationale to unify measurements of effectiveness for animal health surveillance.

    Science.gov (United States)

    Grosbois, Vladimir; Häsler, Barbara; Peyre, Marisa; Hiep, Dao Thi; Vergne, Timothée

    2015-06-01

    Surveillance systems produce data which, once analysed and interpreted, support decisions regarding disease management. While several performance measures for surveillance are in use, no theoretical framework has been proposed yet with a rationale for defining and estimating effectiveness measures of surveillance systems in a generic way. An effective surveillance system is a system whose data collection, analysis and interpretation processes lead to decisions that are appropriate given the true disease status of the target population. Accordingly, we developed a framework accounting for sampling, testing and data interpretation processes, to depict in a probabilistic way the direction and magnitude of the discrepancy between "decisions that would be made if the true state of a population was known" and the "decisions that are actually made upon the analysis and interpretation of surveillance data". The proposed framework provides a theoretical basis for standardised quantitative evaluation of the effectiveness of surveillance systems. We illustrate such approaches using hypothetical surveillance systems aimed at monitoring the prevalence of an endemic disease and at detecting an emerging disease as early as possible and with an empirical case study on a passive surveillance system aiming at detecting cases of Highly Pathogenic Avian Influenza cases in Vietnamese poultry. Copyright © 2015 Elsevier B.V. All rights reserved.

  20. Surveillance plan for the early detection of H5N1 highly pathogenic avian influenza virus in migratory birds in the United States: surveillance year 2009

    Science.gov (United States)

    Brand, Christopher J.

    2009-01-01

    Executive Summary: This Surveillance Plan (Plan) describes plans for conducting surveillance of wild birds in the United States and its Territories and Freely-Associated States to provide for early detection of the introduction of the H5N1 Highly Pathogenic Avian Influenza (HPAI) subtype of the influenza A virus by migratory birds during the 2009 surveillance year, spanning the period of April 1, 2009 - March 31, 2010. The Plan represents a continuation of surveillance efforts begun in 2006 under the Interagency Strategic Plan for the Early Detection of H5N1 Highly Pathogenic Avian Influenza in Wild Migratory Birds (U.S. Department of Agriculture and U.S. Department of the Interior, 2006). The Plan sets forth sampling plans by: region, target species or species groups to be sampled, locations of sampling, sample sizes, and sampling approaches and methods. This Plan will be reviewed annually and modified as appropriate for subsequent surveillance years based on evaluation of information from previous years of surveillance, changing patterns and threats of H5N1 HPAI, and changes in funding availability for avian influenza surveillance. Specific sampling strategies will be developed accordingly within each of six regions, defined here as Alaska, Hawaiian/Pacific Islands, Lower Pacific Flyway (Washington, Oregon, California, Idaho, Nevada, Arizona), Central Flyway, Mississippi Flyway, and Atlantic Flyway.

  1. Surveillance plan for the early detection of H5N1 highly pathogenic avian influenza virus in migratory birds in the United States: surveillance year 2009

    Science.gov (United States)

    Brand, Christopher J.

    2009-01-01

    Executive Summary: This Surveillance Plan (Plan) describes plans for conducting surveillance of wild birds in the United States and its Territories and Freely-Associated States to provide for early detection of the introduction of the H5N1 Highly Pathogenic Avian Influenza (HPAI) subtype of the influenza A virus by migratory birds during the 2009 surveillance year, spanning the period of April 1, 2009 - March 31, 2010. The Plan represents a continuation of surveillance efforts begun in 2006 under the Interagency Strategic Plan for the Early Detection of H5N1 Highly Pathogenic Avian Influenza in Wild Migratory Birds (U.S. Department of Agriculture and U.S. Department of the Interior, 2006). The Plan sets forth sampling plans by: region, target species or species groups to be sampled, locations of sampling, sample sizes, and sampling approaches and methods. This Plan will be reviewed annually and modified as appropriate for subsequent surveillance years based on evaluation of information from previous years of surveillance, changing patterns and threats of H5N1 HPAI, and changes in funding availability for avian influenza surveillance. Specific sampling strategies will be developed accordingly within each of six regions, defined here as Alaska, Hawaiian/Pacific Islands, Lower Pacific Flyway (Washington, Oregon, California, Idaho, Nevada, Arizona), Central Flyway, Mississippi Flyway, and Atlantic Flyway.

  2. Surveillance intervals for small abdominal aortic aneurysms

    DEFF Research Database (Denmark)

    Bown, Matthew J; Sweeting, Michael J; Brown, Louise C

    2013-01-01

    Small abdominal aortic aneurysms (AAAs [3.0 cm-5.4 cm in diameter]) are monitored by ultrasound surveillance. The intervals between surveillance scans should be chosen to detect an expanding aneurysm prior to rupture.......Small abdominal aortic aneurysms (AAAs [3.0 cm-5.4 cm in diameter]) are monitored by ultrasound surveillance. The intervals between surveillance scans should be chosen to detect an expanding aneurysm prior to rupture....

  3. Anomaly detection for internet surveillance

    NARCIS (Netherlands)

    Bouma, H.; Raaijmakers, S.A.; Halma, A.H.R.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming

  4. Video Surveillance using Distance Maps

    NARCIS (Netherlands)

    Schouten, Theo E.; Kuppens, Harco C.; Broek, van den Egon L.; Kehtarnavaz, Nasser; Laplante, Phillip A.

    2006-01-01

    Human vigilance is limited; hence, automatic motion and distance detection is one of the central issues in video surveillance. Hereby, many aspects are of importance, this paper specially addresses: efficiency, achieving real-time performance, accuracy, and robustness against various noise factors.

  5. Video surveillance with speckle imaging

    Science.gov (United States)

    Carrano, Carmen J.; Brase, James M.

    2007-07-17

    A surveillance system looks through the atmosphere along a horizontal or slant path. Turbulence along the path causes blurring. The blurring is corrected by speckle processing short exposure images recorded with a camera. The exposures are short enough to effectively freeze the atmospheric turbulence. Speckle processing is used to recover a better quality image of the scene.

  6. Anomaly detection for internet surveillance

    NARCIS (Netherlands)

    Bouma, H.; Raaijmakers, S.A.; Halma, A.H.R.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming

  7. Smart sensing surveillance video system

    Science.gov (United States)

    Hsu, Charles; Szu, Harold

    2016-05-01

    An intelligent video surveillance system is able to detect and identify abnormal and alarming situations by analyzing object movement. The Smart Sensing Surveillance Video (S3V) System is proposed to minimize video processing and transmission, thus allowing a fixed number of cameras to be connected on the system, and making it suitable for its applications in remote battlefield, tactical, and civilian applications including border surveillance, special force operations, airfield protection, perimeter and building protection, and etc. The S3V System would be more effective if equipped with visual understanding capabilities to detect, analyze, and recognize objects, track motions, and predict intentions. In addition, alarm detection is performed on the basis of parameters of the moving objects and their trajectories, and is performed using semantic reasoning and ontologies. The S3V System capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments. It would be directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.

  8. Video surveillance using distance maps

    NARCIS (Netherlands)

    Schouten, Theo E.; Kuppens, Harco C.; van den Broek, Egon; Kehtarnavaz, Nasser; Laplante, Phillip A,

    2006-01-01

    Human vigilance is limited; hence, automatic motion and distance detection is one of the central issues in video surveillance. Hereby, many aspects are of importance, this paper specially addresses: efficiency, achieving real-time performance, accuracy, and robustness against various noise factors.

  9. FWS Approved Acquisition Boundaries

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This data layer depicts the external boundaries of lands and waters that are approved for acquisition by the U.S. Fish and Wildlife Service (USFWS) in North America,...

  10. FWS Approved Acquisition Boundaries

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This data layer depicts the external boundaries of lands and waters that are approved for acquisition by the U.S. Fish and Wildlife Service (USFWS) in North...

  11. Acquisition IT Integration

    DEFF Research Database (Denmark)

    Henningsson, Stefan; Øhrgaard, Christian

    2015-01-01

    The IT integration of acquisitions consists an important challenge for the many acquiring organizations. Complementing existing research, this paper searches for explanation to differences in acquirers’ abilities for acquisition IT integration in the external of the acquirer, by a study of the use...... of temporary agency workers. Following an analytic induction approach, theoretically grounded in the re-source-based view of the firm, we identify the complimentary and supplementary roles consultants can assume in acquisition IT integration. Through case studies of three acquirers, we investigate how...... the acquirers appropriate the use of agency workers as part of its acquisition strategy. For the investigated acquirers, assigning roles to agency workers is contingent on balancing the needs of knowledge induction and knowledge retention, as well as experience richness and in-depth under-standing. Composition...

  12. FWS Approved Acquisition Boundaries

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This data layer depicts the external boundaries of lands and waters that are approved for acquisition by the U.S. Fish and Wildlife Service (USFWS) in North America,...

  13. USB data acquisition solution

    Institute of Scientific and Technical Information of China (English)

    Serges Lemo; Zhu June

    2007-01-01

    @@ 1 Introduction In recent years, USB has evolved from a simple, low-speed peripheral bus for mice, keyboards, and other computer accessories to the bus of choice for more demanding applications, including data acquisition (DAQ).

  14. Video Surveillance: Privacy Issues and Legal Compliance

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2015-01-01

    . There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction...

  15. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1995-02-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest Laboratory (PNL) for the U.S. Department of Energy (DOE). This document contains the planned 1994 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP), Drinking Water Project, and Ground-Water Surveillance Project. Samples are routinely collected for the SESP and analyzed to determine the quality of air, surface water, soil, sediment, wildlife, vegetation, foodstuffs, and farm products at Hanford Site and surrounding communities. The responsibility for monitoring onsite drinking water falls outside the scope of the SESP. PNL conducts the drinking water monitoring project concurrent with the SESP to promote efficiency and consistency, utilize expertise developed over the years, and reduce costs associated with management, procedure development, data management, quality control, and reporting. The ground-water sampling schedule identifies ground-water sampling .events used by PNL for environmental surveillance of the Hanford Site. Sampling is indicated as annual, semi-annual, quarterly, or monthly in the sampling schedule. Some samples are collected and analyzed as part of ground-water monitoring and characterization programs at Hanford (e.g. Resources Conservation and Recovery Act (RCRA), Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA), or Operational). The number of samples planned by other programs are identified in the sampling schedule by a number in the analysis column and a project designation in the Cosample column. Well sampling events may be merged to avoid redundancy in cases where sampling is planned by both-environmental surveillance and another program.

  16. A Framework for Operational Due Diligence in Mergers and Acquisitions

    DEFF Research Database (Denmark)

    Porsgaard, Chris Berg; Haubjerg, Mathias; Herbert-Hansen, Zaza Nadja Lee

    The number of mergers and acquisitions (M&As) has over the last five years increased greatly (Institute of Mergers, Acquisitions and Alliances, 2016). Furthermore, private equity professionals point to operational performance gains to drive an acquisition decision and attribute cost reductions...... as the most important lever for value creation, after a private equity firm acquires a company (PwC, 2016). However, the overall success rate of M&A activity remains low and the approach to understand an acquisition target’s operating model remains non-exhaustive and unstandardized. This paper investigates...... the pivotal eterminants for assessing operational performance and identifying improvement potentials in an acquisition target. The research question is: “What are the fundamental operational determinants influencing the acquisition decision for private equity firms in the due diligence phase?” This paper...

  17. LWT Based Sensor Node Signal Processing in Vehicle Surveillance Distributed Sensor Network

    Science.gov (United States)

    Cha, Daehyun; Hwang, Chansik

    Previous vehicle surveillance researches on distributed sensor network focused on overcoming power limitation and communication bandwidth constraints in sensor node. In spite of this constraints, vehicle surveillance sensor node must have signal compression, feature extraction, target localization, noise cancellation and collaborative signal processing with low computation and communication energy dissipation. In this paper, we introduce an algorithm for light-weight wireless sensor node signal processing based on lifting scheme wavelet analysis feature extraction in distributed sensor network.

  18. Pressure Ulcers Surveillance Report

    Directory of Open Access Journals (Sweden)

    Zehra Esin Gencer

    2015-04-01

    Full Text Available Objective: Pressure ulcer is a chronic wound. It reduces the quality of life of the elderly and individuals with restricted range of motion. It prolongs hospital stay and increases the risk of complications. The cost is quite high. Preventive actions for the prevention of pressure ulcers should be developed. Planning protocols and standards of care are among the main targets. Material and Method: Research was conducted in one-year period between 2012 May and 2013 May on patients who were followed up in Akdeniz University Hospital clinics and intensive care unit with pressure ulcers. The research population consisted of 569 patients. Patient data were recorded in SPSS 16 for Windows program. Statistical analyzes were performed with retrospective methods. The demographic characteristics of patients with pressure ulcers were analyzed as frequency and descriptive statistics. Prevalence and incidence of one year were calculated. Results: Of the patients, 58% were males, 42% were females. Of the patients, 36% were in the age range of 61-80 years, and their average length of stay was 42,9 days. Of the patients, 70% were at stage 2 and 3. In 15% of patients pressure ulcers occurred on the first day of hospitalization. Pressure ulcers were developed between days 2 and 10 in 59% of the patients. Prevalence rate was 2.5%, the incidence was 1.9%, the prevalence rate was 5.9% in the intensive care unit. Conclusion: It is easier to prevent pressure ulcers than treating.

  19. Post-Acquisition IT Integration

    DEFF Research Database (Denmark)

    Henningsson, Stefan; Yetton, Philip

    2013-01-01

    The extant research on post-acquisition IT integration analyzes how acquirers realize IT-based value in individual acquisitions. However, serial acquirers make 60% of acquisitions. These acquisitions are not isolated events, but are components in growth-by-acquisition programs. To explain how...... serial acquirers realize IT-based value, we develop three propositions on the sequential effects on post-acquisition IT integration in acquisition programs. Their combined explanation is that serial acquirers must have a growth-by-acquisition strategy that includes the capability to improve...... IT integration capabilities, to sustain high alignment across acquisitions and to maintain a scalable IT infrastructure with a flat or decreasing cost structure. We begin the process of validating the three propositions by investigating a longitudinal case study of a growth-by-acquisition program....

  20. Reactor Vessel Surveillance Program for Advanced Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Kyeong-Hoon; Kim, Tae-Wan; Lee, Gyu-Mahn; Kim, Jong-Wook; Park, Keun-Bae; Kim, Keung-Koo

    2008-10-15

    This report provides the design requirements of an integral type reactor vessel surveillance program for an integral type reactor in accordance with the requirements of Korean MEST (Ministry of Education, Science and Technology Development) Notice 2008-18. This report covers the requirements for the design of surveillance capsule assemblies including their test specimens, test block materials, handling tools, and monitors of the surveillance capsule neutron fluence and temperature. In addition, this report provides design requirements for the program for irradiation surveillance of reactor vessel materials, a layout of specimens and monitors in the surveillance capsule, procedures of installation and retrieval of the surveillance capsule assemblies, and the layout of the surveillance capsule assemblies in the reactor.

  1. Polio eradication initiative in Africa: influence on other infectious disease surveillance development

    Directory of Open Access Journals (Sweden)

    Cochi Stephen

    2002-12-01

    Full Text Available Abstract Background The World Health Organization (WHO and partners are collaborating to eradicate poliomyelitis. To monitor progress, countries perform surveillance for acute flaccid paralysis (AFP. The WHO African Regional Office (WHO-AFRO and the U.S Centers for Disease Control and Prevention are also involved in strengthening infectious disease surveillance and response in Africa. We assessed whether polio-eradication initiative resources are used in the surveillance for and response to other infectious diseases in Africa. Methods During October 1999-March 2000, we developed and administered a survey questionnaire to at least one key informant from the 38 countries that regularly report on polio activities to WHO. The key informants included WHO-AFRO staff assigned to the countries and Ministry of Health personnel. Results We obtained responses from 32 (84% of the 38 countries. Thirty-one (97% of the 32 countries had designated surveillance officers for AFP surveillance, and 25 (78% used the AFP resources for the surveillance and response to other infectious diseases. In 28 (87% countries, AFP program staff combined detection for AFP and other infectious diseases. Fourteen countries (44% had used the AFP laboratory specimen transportation system to transport specimens to confirm other infectious disease outbreaks. The majority of the countries that performed AFP surveillance adequately (i.e., non polio AFP rate = 1/100,000 children aged Conclusions Despite concerns regarding the targeted nature of AFP surveillance, it is partially integrated into existing surveillance and response systems in multiple African countries. Resources provided for polio eradication should be used to improve surveillance for and response to other priority infectious diseases in Africa.

  2. Acquisition of English comparative adjectives.

    Science.gov (United States)

    Graziano-King, Janine; Cairns, Helen Smith

    2005-05-01

    Two experiments investigated the acquisition of English comparative adjective forms, Adj + er and more Adj. In Experiment 1, 72 children, four- and seven-years-old, indicated their preferences for the synthetic or periphrastic comparative form for 16 adjectives in a forced-choice judgement task; their responses were compared to those of a group of adults (Graziano-King, 2003). In Experiment 2, a group of 29 children, ranging in age from 5;1 to 10;9, and a group of 11 adults performed a forced-choice judgement task, similar to that of Experiment 1, and an elicited production task, responding to the same 32 adjectives for both tasks. The two studies together support an acquisition trajectory of three stages. In the first stage, children show no preference for either form of the comparative; in the second, they adopt a suffixation rule; and in the third, they abandon the general rule and become conservative learners, eventually reaching the adult target.

  3. The Sharper Image for Surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Hazi, A

    2006-01-13

    A technique adapted by Livermore scientists to take the twinkle out of stars is now being used to improve the resolution of long-range surveillance systems trained on earthbound objects. The speckle-imaging technique involves taking tens to hundreds of pictures with short-exposure times and reconstructing a single, sharp image using image-processing software. The technique drew the interest of Livermore engineer Carmen Carrano. She developed a prototype remote-surveillance system that can produce a detailed image of a face from a couple of kilometers away. The system also helps identify vehicles tens of kilometers away and improves the viewing of large structures more than 60 kilometers away.

  4. Congenital anomalies surveillance in Canada.

    Science.gov (United States)

    Lowry, R Brian

    2008-01-01

    Congenital anomalies (CA) are present in approximately 3% of all newborn babies and account for about 12% of paediatric hospital admissions. They represent an important public health problem. Surveillance is especially important so that preventive measures such as folic acid fortification can be properly assessed without resorting to a series of ad hoc studies. Canada's surveillance of CAs is weak, with only Alberta and British Columbia having established sytems. Most provinces have perinatal systems but their CA data are incomplete and they do not capture terminations of pregnancy. The same is true of the Public Health Agency of Canada's system. A new system, the Fetal Alert Network, has been proposed for Ontario, which represents a start but will require additional sources of ascertainment if it is to be a truly population-based system for Ontario.

  5. Surveillance of Space in Australia

    Science.gov (United States)

    Newsam, G.

    Australia's geography and technology base got it off to a flying start in the early days of surveillance of space, starting with CSIRO's first radio telescope in the 1940's and climaxing in NASA's establishment of station 43 in the Deep Space Network at Tidbinbilla in 1965. But Britain's exit from space and the subsequent closure of the Woomera launch range and associated space tracking facilities in the early 1970's saw the start of a long draw-down of capability. Programs such as CSIRO's radio astronomy telescopes, Electro-Optic Systems' adoption of laser technology for satellite laser ranging and tracking system, and the exploration of the use of technology developed in Australia's over-the-horizon-radar program for surveillance of space, kept some interest in the problem alive, but there has been no serious national investment in the area for the last thirty years. Recently, however, increased awareness of the vulnerability of space systems and the need to include potential opponents' space capabilities in operations planning has led to a revival of interest in space situational awareness within the Australian Defence Organisation. While firm commitments to new systems must wait on the next Defence White Paper due out at the end of 2007 and the policy directions it formally endorses, discussions have already started with the US on participating in the Space Surveillance Network (SSN) and developing a comprehensive space situational awareness capability. In support of these initiatives the Defence Science and Technology Organisation (DSTO) is drawing up an inventory of relevant Australian capabilities, technologies and activities: the paper will describe the findings of this inventory, and in particular local technologies and systems that might be deployed in Australia to contribute to the SSN. In the optical regime the available options are rather limited; they centre primarily on the satellite laser ranging technology developed by Electro-Optic Systems and

  6. Mining Surveillance and Maintenance Dollars

    Energy Technology Data Exchange (ETDEWEB)

    MARTINEZ, R.

    2000-02-01

    Accelerating site cleanup to reduce facility risks to the workers, the public and the environment during a time of declining federal budgets represents a significant technical and economic challenge to U.S. Department of Energy (DOE) Operations Offices and their respective contractors. A significant portion of a facility's recurring annual expenses are associated with routine, long-term surveillance and maintenance (S&M) activities. However, ongoing S&M activities do nothing to reduce risks and basically spend money that could be reallocated towards facility deactivation. This paper discusses the background around DOE efforts to reduce surveillance and maintenance costs, one approach used to perform cost reviews, lessons learned from field implementation and what assistance is available to assist DOE sites in performing these evaluations.

  7. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1997-01-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest National Laboratory (PNNL)(a) for the US Department of Energy (DOE). This document contains the planned 1997 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP) and Drinking Water Monitoring Project. In addition, Section 3.0, Biota, also reflects a rotating collection schedule identifying the year a specific sample is scheduled for collection. The purpose of these monitoring projects is to evaluate levels of radioactive and nonradioactive pollutants in the Hanford environs, as required in DOE Order 5400.1, General Environmental Protection Program, and DOE Order 5400.5, Radiation Protection of the Public and the Environment. The sampling methods will be the same as those described in the Environmental Monitoring Plan, US Department of Energy, Richland Operations Office, DOE/RL91-50, Rev. 1, US Department of Energy, Richland, Washington.

  8. Attaching Hollywood to a Surveillant Assemblage: Normalizing Discourses of Video Surveillance

    Directory of Open Access Journals (Sweden)

    Randy K Lippert

    2015-10-01

    Full Text Available This article examines video surveillance images in Hollywood film. It moves beyond previous accounts of video surveillance in relation to film by theoretically situating the use of these surveillance images in a broader “surveillant assemblage”. To this end, scenes from a sample of thirty-five (35 films of several genres are examined to discern dominant discourses and how they lend themselves to normalization of video surveillance. Four discourses are discovered and elaborated by providing examples from Hollywood films. While the films provide video surveillance with a positive associative association it is not without nuance and limitations. Thus, it is found that some forms of resistance to video surveillance are shown while its deterrent effect is not. It is ultimately argued that Hollywood film is becoming attached to a video surveillant assemblage discursively through these normalizing discourses as well as structurally to the extent actual video surveillance technology to produce the images is used.

  9. VERITAS Data Acquisition

    Science.gov (United States)

    Hays, E.

    VERITAS employs a multi-stage data acquisition chain that extends from the VME readout of custom 500 MHz flash ADC electronics to the construction of telescope events and ultimately the compilation of information from each telescope into array level data. These systems provide access to the programming of the channel level triggers and the FADCs. They also ensure the proper synchronization of event information across the array and provide the first level of data quality monitoring. Additionally, the data acquisition includes features to handle the readout of special trigger types and to monitor channel scaler rates. In this paper we describe the software and hardware components of the systems and the protocols used to communicate between the VME, telescope, and array levels. We also discuss the performance of the data acquisition for array operations.

  10. VERITAS Data Acquisition

    CERN Document Server

    Hays, E

    2007-01-01

    VERITAS employs a multi-stage data acquisition chain that extends from the VME readout of custom 500 MS/s flash ADC electronics to the construction of telescope events and ultimately the compilation of information from each telescope into array level data. These systems provide access to the programming of the channel level triggers and the FADCs. They also ensure the proper synchronization of event information across the array and provide the first level of data quality monitoring. Additionally, the data acquisition includes features to handle the readout of special trigger types and to monitor channel scaler rates. In this paper we describe the software and hardware components of the systems and the protocols used to communicate between the VME, telescope, and array levels. We also discuss the performance of the data acquisition for array operations.

  11. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1994-02-01

    This document contains the planned 1994 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP), Drinking Water Project, and Ground-Water Surveillance Project. Samples are routinely collected for the SESP and analyzed to determine the quality of air, surface water, soil, sediment, wildlife, vegetation, foodstuffs, and farm products at Hanford Site and surrounding communities. The responsibility for monitoring the onsite drinking water falls outside the scope of the SESP. The Hanford Environmental Health Foundation is responsible for monitoring the nonradiological parameters as defined in the National Drinking Water Standards while PNL conducts the radiological monitoring of the onsite drinking water. PNL conducts the drinking water monitoring project concurrent with the SESP to promote efficiency and consistency, utilize the expertise developed over the years, and reduce costs associated with management, procedure development, data management, quality control and reporting. The ground-water sampling schedule identifies ground-water sampling events used by PNL for environmental surveillance of the Hanford Site.

  12. Mobile Surveillance and Monitoring Robots

    Energy Technology Data Exchange (ETDEWEB)

    Kimberly, Howard R.; Shipers, Larry R.

    1999-07-14

    Long-term nuclear material storage will require in-vault data verification, sensor testing, error and alarm response, inventory, and maintenance operations. System concept development efforts for a comprehensive nuclear material management system have identified the use of a small flexible mobile automation platform to perform these surveillance and maintenance operations. In order to have near-term wide-range application in the Complex, a mobile surveillance system must be small, flexible, and adaptable enough to allow retrofit into existing special nuclear material facilities. The objective of the Mobile Surveillance and Monitoring Robot project is to satisfy these needs by development of a human scale mobile robot to monitor the state of health, physical security and safety of items in storage and process; recognize and respond to alarms, threats, and off-normal operating conditions; and perform material handling and maintenance operations. The system will integrate a tool kit of onboard sensors and monitors, maintenance equipment and capability, and SNL developed non-lethal threat response technology with the intelligence to identify threats and develop and implement first response strategies for abnormal signals and alarm conditions. System versatility will be enhanced by incorporating a robot arm, vision and force sensing, robust obstacle avoidance, and appropriate monitoring and sensing equipment.

  13. Surveillance of hospital-acquired methicillin-resistant Staphylococcus aureus in South Australia.

    Science.gov (United States)

    Cooper, Celia; Ochota, Meredith A

    2003-01-01

    In September 2001, the South Australian state-wide methicillin-resistant Staphylococcus aureus (MRSA) surveillance system was expanded to include three surveillance indicators namely: estimated MRSA burden, MRSA morbidity and estimated MRSA acquisition. The last two indicator rates have been stratified into intensive care unit (ICU) versus non-ICU. Between September 2001 and March 2002, state-wide MRSA burden rates (prevalence) ranged from 27.5 to 39.8 per 10,000 occupied bed days (OBDs). Acquisition rates ranged from 28.2 to 69.0 per 10,000 OBDs (ICU) and 6.3 to 10.1 per 10,000 OBDs (non-ICU). Morbidity rates ranged from 12.9 to 43.1 per 10,000 OBDs (ICU) and 3.0 to 5.0 per 10,000 OBDs (non-ICU). In association with the changes to surveillance indicators, a new monthly surveillance report was developed. Assuring confidentiality to individual contributing hospitals has been a major consideration in the development of the data collection system. Individual contributors have access only to their own indicator rates and pooled state-wide indicator rates. Contributing institutions are urged to use great caution if wishing to compare their own rates with state-wide rates. In particular, contributors are asked to take inter-institutional differences in MRSA burden and casemix complexity into account when making such comparisons.

  14. Naturalistic acquisition in an early language classroom

    Directory of Open Access Journals (Sweden)

    Anne eDahl

    2014-04-01

    Full Text Available This study investigated whether it is possible to provide naturalistic second language acquisition (SLA of vocabulary for young learners in a classroom situation without resorting to a classical immersion approach. Participants were 60 first-grade pupils in Norwegian two elementary schools in their first year. The control group followed regular instruction as prescribed by the school curriculum, while the experimental group received increased naturalistic target language input. This entailed extensive use of English by the teacher during English classes, and also during morning meetings and for simple instructions and classroom management throughout the day. Our hypothesis was that it is possible to facilitate naturalistic acquisition through better quality target language exposure within a normal curriculum. The students' English vocabulary knowledge was measured using the Peabody Picture Vocabulary Test, version 4 (PPVT-IV, Dunn & Dunn, 2007, at the beginning and the end of the first year of school. Findings are that 1 early-start second-language (L2 programs in school do not in themselves guarantee vocabulary development in the first year, 2 a focus on increased exposure to the L2 can lead to a significant increase in receptive vocabulary comprehension in the course of only eight months, and 3 even with relatively modest input, learners in such an early-start L2 program can display vocabulary acquisition comparable in some respects to that of younger native children matched on vocabulary size. The overall conclusion is that naturalistic vocabulary acquisition is in fact possible in a classroom setting.

  15. Naturalistic acquisition in an early language classroom.

    Science.gov (United States)

    Dahl, Anne; Vulchanova, Mila D

    2014-01-01

    This study investigated whether it is possible to provide naturalistic second language acquisition (SLA) of vocabulary for young learners in a classroom situation without resorting to a classical immersion approach. Participants were 60 first-grade pupils in two Norwegian elementary schools in their first year. The control group followed regular instruction as prescribed by the school curriculum, while the experimental group received increased naturalistic target language input. This entailed extensive use of English by the teacher during English classes, and also during morning meetings and for simple instructions and classroom management throughout the day. Our hypothesis was that it is possible to facilitate naturalistic acquisition through better quality target language exposure within a normal curriculum. The students' English vocabulary knowledge was measured using the Peabody Picture Vocabulary Test, version 4 (PPVT-IV, Dunn and Dunn, 2007a), at the beginning and the end of the first year of school. Findings are that (1) early-start second-language (L2) programs in school do not in themselves guarantee vocabulary development in the first year, (2) a focus on increased exposure to the L2 can lead to a significant increase in receptive vocabulary comprehension in the course of only 8 months, and (3) even with relatively modest input, learners in such an early-start L2 program can display vocabulary acquisition comparable in some respects to that of younger native children matched on vocabulary size. The overall conclusion is that naturalistic vocabulary acquisition is in fact possible in a classroom setting.

  16. Nike Facility Diagnostics and Data Acquisition System

    Science.gov (United States)

    Chan, Yung; Aglitskiy, Yefim; Karasik, Max; Kehne, David; Obenschain, Steve; Oh, Jaechul; Serlin, Victor; Weaver, Jim

    2013-10-01

    The Nike laser-target facility is a 56-beam krypton fluoride system that can deliver 2 to 3 kJ of laser energy at 248 nm onto targets inside a two meter diameter vacuum chamber. Nike is used to study physics and technology issues related to laser direct-drive ICF fusion, including hydrodynamic and laser-plasma instabilities, material behavior at extreme pressures, and optical and x-ray diagnostics for laser-heated targets. A suite of laser and target diagnostics are fielded on the Nike facility, including high-speed, high-resolution x-ray and visible imaging cameras, spectrometers and photo-detectors. A centrally-controlled, distributed computerized data acquisition system provides robust data management and near real-time analysis feedback capability during target shots. Work supported by DOE/NNSA.

  17. Avian mortality surveillance for West Nile virus in Colorado.

    Science.gov (United States)

    Nemeth, Nicole M; Beckett, Susan; Edwards, Eric; Klenk, Kaci; Komar, Nicholas

    2007-03-01

    We tested 1,549 avian carcasses of 104 species to identify targets for West Nile virus (WNV) surveillance in Colorado, determine species affected by WNV, compare virus isolation versus RNA detection applied to hearts and oral swabs from carcasses, and compare the VecTest WNV Antigen Assay (VecTest) to standard assays. Forty-two species tested positive. From June to September 2003, 86% of corvids, 34% of non-corvid passerines, and 37% of raptors tested positive. We developed the Target Species Index, which identified American crows as the most important avian indicator species. However, testing multiple species maximizes detection, which may be important early and late in the transmission season. This index may benefit surveillance for other zoonotic pathogens, such as highly pathogenic avian influenza H5N1 virus. VecTest using oral swabs was most sensitive for American crow, black-billed magpie, house finch, house sparrow, and American kestrel. Wildlife rehabilitation centers should be recruited to enhance WNV surveillance.

  18. Real-time, portable genome sequencing for Ebola surveillance

    Science.gov (United States)

    Bore, Joseph Akoi; Koundouno, Raymond; Dudas, Gytis; Mikhail, Amy; Ouédraogo, Nobila; Afrough, Babak; Bah, Amadou; Baum, Jonathan HJ; Becker-Ziaja, Beate; Boettcher, Jan-Peter; Cabeza-Cabrerizo, Mar; Camino-Sanchez, Alvaro; Carter, Lisa L.; Doerrbecker, Juiliane; Enkirch, Theresa; Dorival, Isabel Graciela García; Hetzelt, Nicole; Hinzmann, Julia; Holm, Tobias; Kafetzopoulou, Liana Eleni; Koropogui, Michel; Kosgey, Abigail; Kuisma, Eeva; Logue, Christopher H; Mazzarelli, Antonio; Meisel, Sarah; Mertens, Marc; Michel, Janine; Ngabo, Didier; Nitzsche, Katja; Pallash, Elisa; Patrono, Livia Victoria; Portmann, Jasmine; Repits, Johanna Gabriella; Rickett, Natasha Yasmin; Sachse, Andrea; Singethan, Katrin; Vitoriano, Inês; Yemanaberhan, Rahel L; Zekeng, Elsa G; Trina, Racine; Bello, Alexander; Sall, Amadou Alpha; Faye, Ousmane; Faye, Oumar; Magassouba, N’Faly; Williams, Cecelia V.; Amburgey, Victoria; Winona, Linda; Davis, Emily; Gerlach, Jon; Washington, Franck; Monteil, Vanessa; Jourdain, Marine; Bererd, Marion; Camara, Alimou; Somlare, Hermann; Camara, Abdoulaye; Gerard, Marianne; Bado, Guillaume; Baillet, Bernard; Delaune, Déborah; Nebie, Koumpingnin Yacouba; Diarra, Abdoulaye; Savane, Yacouba; Pallawo, Raymond Bernard; Gutierrez, Giovanna Jaramillo; Milhano, Natacha; Roger, Isabelle; Williams, Christopher J; Yattara, Facinet; Lewandowski, Kuiama; Taylor, Jamie; Rachwal, Philip; Turner, Daniel; Pollakis, Georgios; Hiscox, Julian A.; Matthews, David A.; O’Shea, Matthew K.; Johnston, Andrew McD; Wilson, Duncan; Hutley, Emma; Smit, Erasmus; Di Caro, Antonino; Woelfel, Roman; Stoecker, Kilian; Fleischmann, Erna; Gabriel, Martin; Weller, Simon A.; Koivogui, Lamine; Diallo, Boubacar; Keita, Sakoba; Rambaut, Andrew; Formenty, Pierre; Gunther, Stephan; Carroll, Miles W.

    2016-01-01

    The Ebola virus disease (EVD) epidemic in West Africa is the largest on record, responsible for >28,599 cases and >11,299 deaths 1. Genome sequencing in viral outbreaks is desirable in order to characterize the infectious agent to determine its evolutionary rate, signatures of host adaptation, identification and monitoring of diagnostic targets and responses to vaccines and treatments. The Ebola virus genome (EBOV) substitution rate in the Makona strain has been estimated at between 0.87 × 10−3 to 1.42 × 10−3 mutations per site per year. This is equivalent to 16 to 27 mutations in each genome, meaning that sequences diverge rapidly enough to identify distinct sub-lineages during a prolonged epidemic 2-7. Genome sequencing provides a high-resolution view of pathogen evolution and is increasingly sought-after for outbreak surveillance. Sequence data may be used to guide control measures, but only if the results are generated quickly enough to inform interventions 8. Genomic surveillance during the epidemic has been sporadic due to a lack of local sequencing capacity coupled with practical difficulties transporting samples to remote sequencing facilities 9. In order to address this problem, we devised a genomic surveillance system that utilizes a novel nanopore DNA sequencing instrument. In April 2015 this system was transported in standard airline luggage to Guinea and used for real-time genomic surveillance of the ongoing epidemic. Here we present sequence data and analysis of 142 Ebola virus (EBOV) samples collected during the period March to October 2015. We were able to generate results in less than 24 hours after receiving an Ebola positive sample, with the sequencing process taking as little as 15-60 minutes. We show that real-time genomic surveillance is possible in resource-limited settings and can be established rapidly to monitor outbreaks. PMID:26840485

  19. Resurgence of Diphtheria in North Kerala, India, 2016: Laboratory Supported Case-Based Surveillance Outcomes.

    Science.gov (United States)

    Sangal, Lucky; Joshi, Sudhir; Anandan, Shalini; Balaji, Veeraraghavan; Johnson, Jaichand; Satapathy, Asish; Haldar, Pradeep; Rayru, Ramesh; Ramamurthy, Srinath; Raghavan, Asha; Bhatnagar, Pankaj

    2017-01-01

    As part of national program, laboratory supported vaccine preventable diseases surveillance was initiated in Kerala in 2015. Mechanisms have been strengthened for case investigation, reporting, and data management. Specimens collected and sent to state and reference laboratories for confirmation and molecular surveillance. The major objective of this study is to understand the epidemiological information generated through surveillance system and its utilization for action. Surveillance data captured from reporting register, case investigation forms, and laboratory reports was analyzed. Cases were allotted unique ID and no personal identifying information was used for analysis. Throat swabs were collected from investigated cases as part of surveillance system. All Corynebacterium diphtheriae isolates were confirmed with standard biochemical tests, ELEK's test, and real-time PCR. Isolates were characterized using whole genome-based multi locus sequence typing method. Case investigation forms and laboratory results were recorded electronically. Public health response by government was also reviewed. A total of 533 cases were identified in 11 districts of Kerala in 2016, of which 92% occurred in 3 districts of north Kerala; Malappuram, Kozhikode, and Kannur. Almost 79% cases occurred in >10 years age group. In surveillance for providing real-time information on disease occurrence and mortality is imperative. The epidemiological data thus generated was used for targeted interventions and to formulate vaccine policies. The data on molecular surveillance have given an insight on strain variation and transmission patterns.

  20. Radiation surveillance using an unmanned aerial vehicle.

    Science.gov (United States)

    Pöllänen, Roy; Toivonen, Harri; Peräjärvi, Kari; Karhunen, Tero; Ilander, Tarja; Lehtinen, Jukka; Rintala, Kimmo; Katajainen, Tuure; Niemelä, Jarkko; Juusela, Marko

    2009-02-01

    Radiation surveillance equipment was mounted in a small unmanned aerial vehicle. The equipment consists of a commercial CsI detector for count rate measurement and a specially designed sampling unit for airborne radioactive particles. Field and flight tests were performed for the CsI detector in the area where (137)Cs fallout from the Chernobyl accident is 23-45 kBq m(-2). A 3-GBq (137)Cs point source could be detected at the altitude of 50 m using a flight speed of 70 km h(-1) and data acquisition interval of 1s. Respective response for (192)Ir point source is 1 GBq. During the flight, the detector reacts fast to ambient external dose rate rise of 0.1 microSv h(-1), which gives for the activity concentration of (131)I less than 1 kB qm(-3). Operation of the sampler equipped with different type of filters was investigated using wind-tunnel experiments and field tests with the aid of radon progeny. Air flow rate through the sampler is 0.2-0.7 m(3)h(-1) at a flight speed of 70 km h(-1) depending on the filter type in question. The tests showed that the sampler is able to collect airborne radioactive particles. Minimum detectable concentration for transuranium nuclides, such as (239)Pu, is of the order of 0.2 Bq m(-3) or less when alpha spectrometry with no radiochemical sample processing is used for activity determination immediately after the flight. When a gamma-ray spectrometer is used, minimum detectable concentrations for several fission products such as (137)Cs and (131)I are of the order of 1 Bq m(-3).

  1. Radiation surveillance using an unmanned aerial vehicle

    Energy Technology Data Exchange (ETDEWEB)

    Poellaenen, Roy [STUK-Radiation and Nuclear Safety Authority, P.O. Box 14, FI-00881 (Finland)], E-mail: roy.pollanen@stuk.fi; Toivonen, Harri; Peraejaervi, Kari; Karhunen, Tero; Ilander, Tarja [STUK-Radiation and Nuclear Safety Authority, P.O. Box 14, FI-00881 (Finland); Lehtinen, Jukka [Senya Ltd. Rekitie 7A, 00950 Helsinki (Finland); Rintala, Kimmo; Katajainen, Tuure; Niemelae, Jarkko; Juusela, Marko [Patria Systems Oy, Naulakatu 3, FI-33100 (Finland)

    2009-02-15

    Radiation surveillance equipment was mounted in a small unmanned aerial vehicle. The equipment consists of a commercial CsI detector for count rate measurement and a specially designed sampling unit for airborne radioactive particles. Field and flight tests were performed for the CsI detector in the area where {sup 137}Cs fallout from the Chernobyl accident is 23-45 kBq m{sup -2}. A 3-GBq {sup 137}Cs point source could be detected at the altitude of 50 m using a flight speed of 70 km h{sup -1} and data acquisition interval of 1 s. Respective response for {sup 192}Ir point source is 1 GBq. During the flight, the detector reacts fast to ambient external dose rate rise of 0.1 {mu}Sv h{sup -1}, which gives for the activity concentration of {sup 131}I less than 1 kBq m{sup -3}. Operation of the sampler equipped with different type of filters was investigated using wind-tunnel experiments and field tests with the aid of radon progeny. Air flow rate through the sampler is 0.2-0.7 m{sup 3} h{sup -1} at a flight speed of 70 km h{sup -1} depending on the filter type in question. The tests showed that the sampler is able to collect airborne radioactive particles. Minimum detectable concentration for transuranium nuclides, such as {sup 239}Pu, is of the order of 0.2 Bq m{sup -3} or less when alpha spectrometry with no radiochemical sample processing is used for activity determination immediately after the flight. When a gamma-ray spectrometer is used, minimum detectable concentrations for several fission products such as {sup 137}Cs and {sup 131}I are of the order of 1 Bq m{sup -3}.

  2. Plant and pathogen nutrient acquisition strategies

    OpenAIRE

    Fatima, Urooj; Senthil-Kumar, Muthappa

    2015-01-01

    Nutrients are indispensable elements required for the growth of all living organisms including plants and pathogens. Phyllosphere, rhizosphere, apoplast, phloem, xylem, and cell organelles are the nutrient niches in plants that are the target of bacterial pathogens. Depending upon nutrients availability, the pathogen adapts various acquisition strategies and inhabits the specific niche. In this review, we discuss the nutrient composition of different niches in plants, the mechanisms involved ...

  3. Merger and acquisition medicine.

    Science.gov (United States)

    Powell, G S

    1997-01-01

    This discussion of the ramifications of corporate mergers and acquisitions for employees recognizes that employee adaptation to the change can be a long and complex process. The author describes a role the occupational physician can take in helping to minimize the potential adverse health impact of major organizational change.

  4. Interaction and Language Acquisition

    Institute of Scientific and Technical Information of China (English)

    孙红叶

    2016-01-01

    Based on Long's Interaction Hypothesis (IH), the paper examines the aspects of interaction that might facilitate natu-ralistic language development and goes further to propose features of interaction that could encourage classroom second lan-guage acquisition, in the hope that improved classroom interation will enhance teaching effectiveness in language classroom.

  5. Second Language Acquisition.

    Science.gov (United States)

    McLaughlin, Barry; Harrington, Michael

    1989-01-01

    A distinction is drawn between representational and processing models of second-language acquisition. The first approach is derived primarily from linguistics, the second from psychology. Both fields, it is argued, need to collaborate more fully, overcoming disciplinary narrowness in order to achieve more fruitful research. (GLR)

  6. Competencies: requirements and acquisition

    NARCIS (Netherlands)

    Kuenn, A.C.; Meng, C.M.; Peters, Z.; Verhagen, A.M.C.

    2013-01-01

    Higher education is given the key task to prepare the highly talented among the young to fulfil highly qualified roles in the labour market. Successful labour market performance of graduates is generally associated with the acquisition of the correct competencies. Education as an individual investme

  7. Acquisition of Comparison Constructions

    Science.gov (United States)

    Hohaus, Vera; Tiemann, Sonja; Beck, Sigrid

    2014-01-01

    This article presents a study on the time course of the acquisition of comparison constructions. The order in which comparison constructions (comparatives, measure phrases, superlatives, degree questions, etc.) show up in English- and German-learning children's spontaneous speech is quite fixed. It is shown to be insufficiently determined by…

  8. Surviving mergers & acquisitions.

    Science.gov (United States)

    Dixon, Diane L

    2002-01-01

    Mergers and acquisitions are never easy to implement. The health care landscape is a minefield of failed mergers and uneasy alliances generating great turmoil and pain. But some mergers have been successful, creating health systems that benefit the communities they serve. Five prominent leaders offer their advice on minimizing the difficulties of M&As.

  9. Infection surveillance and control programs in the Department of Veterans Affairs nursing home care units: a preliminary assessment.

    Science.gov (United States)

    Tsan, Linda; Hojlo, Christa; Kearns, Martha A; Davis, Chester; Langberg, Robert; Claggett, Maurice; Coughlin, Nancy; Miller, Michael; Gaynes, Robert; Gibert, Cynthia; Montgomery, Ona; Richards, Chesley; Danko, Linda; Roselle, Gary

    2006-03-01

    A survey was conducted to assess the capacity and current practices of the infection surveillance and control programs at the Department of Veterans Affairs' 130 nursing home care units (VA NHCUs) covering a total of 15,006 beds in 2003. All 130 VA NHCUs responded to the survey, although not all NHCUs answered every question. The majority of the VA NHCUs provided specialized services that might pose increased risks of infection. For every 8 to 10 VA NHCU beds, there was 1 regular-pressure or negative-pressure infection control room available. Each VA NHCU had an active ongoing infection surveillance and control program managed by highly educated infection control personnel (ICP), of which 96% had a minimum of a bachelor degree. A median of 12 hours per week of these ICP efforts was devoted to the infection surveillance and control activities. The most frequently used surveillance methods were targeted surveillance for specific infections and for specific organisms. Most VA NHCUs conducted surveillance for antibiotic-resistant organisms. However, VA NHCUs did not use a uniform set of definitions for nosocomial infections for their infection surveillance and control purposes. We conclude that VA NHCUs have a considerable infrastructure and capacity for infection surveillance and control. This information can be used to develop a nationwide VA NHCU nosocomial infection surveillance system.

  10. Environmental public health tracking/surveillance in Canada: a commentary.

    Science.gov (United States)

    Abelsohn, Alan; Frank, John; Eyles, John

    2009-02-01

    Although public debate in Canada about climate change and air pollution is louder than ever, the state of the environment remains a relatively neglected determinant of health, and environmental public health infrastructure and programs are poorly developed. Health Canada has only recently begun to develop a national environmental public health tracking or surveillance system. The authors review progress on environmental public health tracking in other jurisdictions and suggest a strategic approach to the development of a coherent national system of sensitive, targeted surveillance indicators for environmental health by addressing the following questions: Which environmental hazards and exposures, and which health effects along the continuum from "release" to "health effect," should be tracked? Which indicators are scientifically robust and practical for tracking environmental health problems in Canada? Copyright © 2009 Longwoods Publishing.

  11. Enhanced surveillance program FY97 accomplishments. Progress report

    Energy Technology Data Exchange (ETDEWEB)

    Mauzy, A. [ed.; Laake, B. [comp.

    1997-10-01

    This annual report is one volume of the Enhanced Surveillance Program (ESP) FY97 Accomplishments. The complete accomplishments report consists of 11 volumes. Volume 1 includes an ESP overview and a summary of selected unclassified FY97 program highlights. Volume 1 specifically targets a general audience, reflecting about half of the tasks conducted in FY97 and emphasizing key program accomplishments and contributions. The remaining volumes of the accomplishments report are classified, organized by program focus area, and present in technical detail the progress achieved in each of the 104 FY97 program tasks. Focus areas are as follows: pits; high explosives; organics; dynamics; diagnostics; systems; secondaries; nonnuclear materials; nonnuclear components; and Surveillance Test Program upgrades.

  12. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  13. Energy-aware scheduling of surveillance in wireless multimedia sensor networks.

    Science.gov (United States)

    Wang, Xue; Wang, Sheng; Ma, Junjie; Sun, Xinyao

    2010-01-01

    Wireless sensor networks involve a large number of sensor nodes with limited energy supply, which impacts the behavior of their application. In wireless multimedia sensor networks, sensor nodes are equipped with audio and visual information collection modules. Multimedia contents are ubiquitously retrieved in surveillance applications. To solve the energy problems during target surveillance with wireless multimedia sensor networks, an energy-aware sensor scheduling method is proposed in this paper. Sensor nodes which acquire acoustic signals are deployed randomly in the sensing fields. Target localization is based on the signal energy feature provided by multiple sensor nodes, employing particle swarm optimization (PSO). During the target surveillance procedure, sensor nodes are adaptively grouped in a totally distributed manner. Specially, the target motion information is extracted by a forecasting algorithm, which is based on the hidden Markov model (HMM). The forecasting results are utilized to awaken sensor node in the vicinity of future target position. According to the two properties, signal energy feature and residual energy, the sensor nodes decide whether to participate in target detection separately with a fuzzy control approach. Meanwhile, the local routing scheme of data transmission towards the observer is discussed. Experimental results demonstrate the efficiency of energy-aware scheduling of surveillance in wireless multimedia sensor network, where significant energy saving is achieved by the sensor awakening approach and data transmission paths are calculated with low computational complexity.

  14. Wireless Mesh Networks to Support Video Surveillance: Architecture, Protocol, and Implementation Issues

    Directory of Open Access Journals (Sweden)

    Licandro Francesco

    2007-01-01

    Full Text Available Current video-surveillance systems typically consist of many video sources distributed over a wide area, transmitting live video streams to a central location for processing and monitoring. The target of this paper is to present an experience of implementation of a large-scale video-surveillance system based on a wireless mesh network infrastructure, discussing architecture, protocol, and implementation issues. More specifically, the paper proposes an architecture for a video-surveillance system, and mainly centers its focus on the routing protocol to be used in the wireless mesh network, evaluating its impact on performance at the receiver side. A wireless mesh network was chosen to support a video-surveillance application in order to reduce the overall system costs and increase scalability and performance. The paper analyzes the performance of the network in order to choose design parameters that will achieve the best trade-off between video encoding quality and the network traffic generated.

  15. Wireless Mesh Networks to Support Video Surveillance: Architecture, Protocol, and Implementation Issues

    Directory of Open Access Journals (Sweden)

    Francesco Licandro

    2007-03-01

    Full Text Available Current video-surveillance systems typically consist of many video sources distributed over a wide area, transmitting live video streams to a central location for processing and monitoring. The target of this paper is to present an experience of implementation of a large-scale video-surveillance system based on a wireless mesh network infrastructure, discussing architecture, protocol, and implementation issues. More specifically, the paper proposes an architecture for a video-surveillance system, and mainly centers its focus on the routing protocol to be used in the wireless mesh network, evaluating its impact on performance at the receiver side. A wireless mesh network was chosen to support a video-surveillance application in order to reduce the overall system costs and increase scalability and performance. The paper analyzes the performance of the network in order to choose design parameters that will achieve the best trade-off between video encoding quality and the network traffic generated.

  16. Platforms for Persistent Communications, Surveillance and Reconnaissance

    Science.gov (United States)

    2008-09-01

    Membership Study Manager Ms. Anorme Anim – ASB Communications (Comms) Team Dr. Allen Adler Dr. Pete Swan BG(Ret) Bob Wynn Ms. Madhu Beriwal Surveillance...Pete Swan BG(Ret) Bob Wynn Dr. Madhu Beriwal Surveillance & Reconnaissance (SR) Team Dr. Darrell Collier Mr. Herb Gallagher Mr. Gary Glaser Mr. Steve...ASB Communications (Comms) Team Dr. Allen Adler Dr. Pete Swan BG(Ret) Bob Wynn Ms. Madhu Beriwal Surveillance & Reconnaissance (SR) Team Dr

  17. Priorities for antibiotic resistance surveillance in Europe

    DEFF Research Database (Denmark)

    Fluit, A. C.; van der Bruggen, J. T.; Aarestrup, Frank Møller

    2006-01-01

    Antibiotic resistance is an increasing global problem. Surveillance studies are needed to monitor resistance development, to guide local empirical therapy, and to implement timely and adequate countermeasures. To achieve this, surveillance studies must have standardised methodologies...... to the various reservoirs of antibiotic-resistant bacteria, such as hospitalised patients, nursing homes, the community, animals and food. Two studies that could serve as examples of tailored programmes are the European Antimicrobial Resistance Surveillance System (EARSS), which collects resistance data during...... of antibiotic resistance....

  18. 10 Steps to Building an Architecture for Space Surveillance Projects

    Science.gov (United States)

    Gyorko, E.; Barnhart, E.; Gans, H.

    Space surveillance is an increasingly complex task, requiring the coordination of a multitude of organizations and systems, while dealing with competing capabilities, proprietary processes, differing standards, and compliance issues. In order to fully understand space surveillance operations, analysts and engineers need to analyze and break down their operations and systems using what are essentially enterprise architecture processes and techniques. These techniques can be daunting to the first- time architect. This paper provides a summary of simplified steps to analyze a space surveillance system at the enterprise level in order to determine capabilities, services, and systems. These steps form the core of an initial Model-Based Architecting process. For new systems, a well defined, or well architected, space surveillance enterprise leads to an easier transition from model-based architecture to model-based design and provides a greater likelihood that requirements are fulfilled the first time. Both new and existing systems benefit from being easier to manage, and can be sustained more easily using portfolio management techniques, based around capabilities documented in the model repository. The resulting enterprise model helps an architect avoid 1) costly, faulty portfolio decisions; 2) wasteful technology refresh efforts; 3) upgrade and transition nightmares; and 4) non-compliance with DoDAF directives. The Model-Based Architecting steps are based on a process that Harris Corporation has developed from practical experience architecting space surveillance systems and ground systems. Examples are drawn from current work on documenting space situational awareness enterprises. The process is centered on DoDAF 2 and its corresponding meta-model so that terminology is standardized and communicable across any disciplines that know DoDAF architecting, including acquisition, engineering and sustainment disciplines. Each step provides a guideline for the type of data to

  19. 实物期权在我国跨国并购目标公司价值评估中的应用%Application of Real Option in Value Assessment of Target Company in China's Cross-border Mergers and Acquisitions

    Institute of Scientific and Technical Information of China (English)

    胡冬红

    2012-01-01

    跨国并购已经作为企业迅速扩大规模,进入全球市场,增强世界影响力的重要手段之一。西方学者实证研究发现,约有一半的企业并购活动以失败告终,除了企业整合不善外,对目标企业估价过高,造成并购企业沉重的财务负担是一个重要的原因。企业之所以会支付过高的价格是由于过高的估计了战略协同作用或出价本身过高。运用期权定价的三叉树模型来计算跨国并购的目标企业价值。%Cross-border mergers and acquisitions has become one of the important means of enterprises' expanding scale,accessing to gable market and enhancing influence in the world.Western scholars' empirical research found about half of MA ended in failure,excluding poor business integration,an important cause was the heavy financial burden from the overvaluation of target company on MA enterprise paying the excessive price due to overestimation of strategic synergies or overbidding.This paper tells the value combination of target company and usage of the trigeminal tree model to calculate its value in Cross-border mergers and acquisitions.

  20. The human resources in mergers and acquisitions

    Directory of Open Access Journals (Sweden)

    Noemí Martínez Caraballo

    2007-07-01

    Full Text Available In view of intangible resources -and, among them, human capital- play a significant role in the managerial strategy, this article aims to analyze the fit of human resources in companies that has been target of mergers and/or acquisitions processes. In this sense, the present paper will be centered in carrying out a state of the art of this topic and in showing some evidences about the top managers perceptions of the target company with the purpose of better understanding which are the reasons for the departure and the permanence of them.

  1. Discussion on Application of Polarimetric Synthetic Aperture Radar in Marine Surveillance

    Directory of Open Access Journals (Sweden)

    Zhang Jie

    2016-12-01

    Full Text Available Synthetic Aperture Radar (SAR, an important earth observation sensor, has been used in a wide range of applications for land and marine surveillance. Polarimetric SAR (PolSAR can obtain abundant scattering information of a target to improve the ability of target detection, classification, and quantitative inversion. In this paper, the important role of PolSAR in ocean monitoring is discussed with factors such as sea ice, ships, oil spill, waves, internal waves, and seabed topography. Moreover, the future development direction of PolSAR is put forward to get an inspiration for further research of PolSAR in marine surveillance applications.

  2. Airborne infrared hyperspectral imager for intelligence, surveillance and reconnaissance applications

    Science.gov (United States)

    Lagueux, Philippe; Puckrin, Eldon; Turcotte, Caroline S.; Gagnon, Marc-André; Bastedo, John; Farley, Vincent; Chamberland, Martin

    2012-09-01

    Persistent surveillance and collection of airborne intelligence, surveillance and reconnaissance information is critical in today's warfare against terrorism. High resolution imagery in visible and infrared bands provides valuable detection capabilities based on target shapes and temperatures. However, the spectral resolution provided by a hyperspectral imager adds a spectral dimension to the measurements, leading to additional tools for detection and identification of targets, based on their spectral signature. The Telops Hyper-Cam sensor is an interferometer-based imaging system that enables the spatial and spectral analysis of targets using a single sensor. It is based on the Fourier-transform technology yielding high spectral resolution and enabling high accuracy radiometric calibration. It provides datacubes of up to 320×256 pixels at spectral resolutions as fine as 0.25 cm-1. The LWIR version covers the 8.0 to 11.8 μm spectral range. The Hyper-Cam has been recently used for the first time in two compact airborne platforms: a bellymounted gyro-stabilized platform and a gyro-stabilized gimbal ball. Both platforms are described in this paper, and successful results of high-altitude detection and identification of targets, including industrial plumes, and chemical spills are presented.

  3. Medical surveillance of occupationally exposed workers

    Energy Technology Data Exchange (ETDEWEB)

    2007-05-15

    The guide covers medical surveillance of workers engaged in radiation work and their fitness for this work, protection of the foetus and infant during the worker's pregnancy or breastfeeding, and medical surveillance measures to be taken when the dose limit has been exceeded. The guide also covers recognition of practitioners responsible for medical surveillance of category A workers, medical certificates to be issued to workers, and preservation and transfer of medical records. The medical surveillance requirements specified in this Guide cover the use of radiation and nuclear energy. The guide also applies to exposure to natural radiation in accordance with section 28 of the Finnish Radiation Decree

  4. Remotely piloted LTA vehicle for surveillance

    Science.gov (United States)

    Seemann, G. R.; Harris, G. L.; Brown, G. J.

    1975-01-01

    Various aspects of a remotely piloted mini-LTA vehicle for surveillance, monitoring and measurement for civilian and military applications are considered. Applications, operations and economics are discussed.

  5. Legionnaires’ disease Surveillance in Italy

    Directory of Open Access Journals (Sweden)

    Maria Luisa Ricci

    2004-12-01

    Full Text Available

    In the report presented, data on legionellosis diagnosed in the year 2003 in Italy and notified to the National Surveillance System are analysed. Overall, 617 cases were notified, of which 517 were confirmed and 46 were presumptive.

    The characteristics of the patients are very similar to those reported in the previous years in terms of male/female ratio, age–specific distribution, occupation, etc. Legionella pneumophila serogroup 1 was responsible for approximately 90% of the cases.

  6. Survey of Communicable Diseases Surveillance System in Hospitals of Iran: A Qualitative Approach

    Science.gov (United States)

    Dehcheshmeh, Nayeb Fadaei; Arab, Mohammad; Foroushani, Abbas Rahimi; Farzianpour, Fereshteh

    2016-01-01

    Background: Communicable Disease Surveillance and reporting is one of the key elements to combat against diseases and their control. Fast and timely recognition of communicable diseases can be helpful in controlling of epidemics. One of the main sources of management of communicable diseases reporting is hospitals that collect communicable diseases’ reports and send them to health authorities. One of the focal problems and challenges in this regard is incomplete and imprecise reports from hospitals. In this study, while examining the implementation processes of the communicable diseases surveillance in hospitals, non-medical people who were related to the program have been studied by a qualitative approach. Methods: This study was conducted using qualitative content analysis method. Participants in the study included 36 informants, managers, experts associated with health and surveillance of communicable diseases that were selected using targeted sampling and with diverse backgrounds and work experience (different experiences in primary health surveillance and treatment, Ministry levels, university staff and operations (hospitals and health centers) and sampling was continued until arrive to data saturation. Results: Interviews were analyzed after the elimination of duplicate codes and integration of them. Finally, 73 codes were acquired and categorized in 6 major themes and 21 levels. The main themes included: policy making and planning, development of resources, organizing, collaboration and participation, surveillance process, and monitoring and evaluation of the surveillance system. In point of interviewees, attention to these themes is necessary to develop effective and efficient surveillance system for communicable diseases. Conclusion: Surveillance system in hospitals is important in developing proper macro - policies in health sector, adoption of health related decisions and preventive plans appropriate to the existing situation. Compilation, changing

  7. RF merger and acquisition market

    Directory of Open Access Journals (Sweden)

    Evgeniya V. Vidishcheva

    2011-04-01

    Full Text Available The article gives brief characteristic of merger and acquisition market situation in Russia, brings in overview of bargains in 2009–2010. Russian merger and acquisition market is in early stage of development.

  8. RF merger and acquisition market

    OpenAIRE

    Evgeniya V. Vidishcheva; Merab S. Sichinava; Marina V. Kogan

    2011-01-01

    The article gives brief characteristic of merger and acquisition market situation in Russia, brings in overview of bargains in 2009–2010. Russian merger and acquisition market is in early stage of development.

  9. UC Merced NMR Instrumentation Acquisition

    Science.gov (United States)

    2015-06-18

    UC Merced NMR Instrumentation Acquisition For the UC Merced NMR Instrumentation Acquisition proposal, a new 400 MHz and an upgraded 500 MHz NMR ...UC Merced NMR Instrumentation Acquisition Report Title For the UC Merced NMR Instrumentation Acquisition proposal, a new 400 MHz and an upgraded 500...MHz NMR have been delivered, installed, and incorporated into research and two lab courses. While no results from these instruments have been

  10. PRICISE TARGET GEOLOCATION BASED ON INTEGERATION OF THERMAL VIDEO IMAGERY AND RTK GPS IN UAVS

    Directory of Open Access Journals (Sweden)

    H. R. Hosseinpoor

    2015-12-01

    Full Text Available There are an increasingly large number of uses for Unmanned Aerial Vehicles (UAVs from surveillance, mapping and target geolocation. However, most of commercial UAVs are equipped with low-cost navigation sensors such as C/A code GPS and a low-cost IMU on board, allowing a positioning accuracy of 5 to 10 meters. This low accuracy which implicates that it cannot be used in applications that require high precision data on cm-level. This paper presents a precise process for geolocation of ground targets based on thermal video imagery acquired by small UAV equipped with RTK GPS. The geolocation data is filtered using a linear Kalman filter, which provides a smoothed estimate of target location and target velocity. The accurate geo-locating of targets during image acquisition is conducted via traditional photogrammetric bundle adjustment equations using accurate exterior parameters achieved by on board IMU and RTK GPS sensors and Kalman filtering and interior orientation parameters of thermal camera from pre-flight laboratory calibration process.

  11. Pricise Target Geolocation Based on Integeration of Thermal Video Imagery and Rtk GPS in Uavs

    Science.gov (United States)

    Hosseinpoor, H. R.; Samadzadegan, F.; Dadras Javan, F.

    2015-12-01

    There are an increasingly large number of uses for Unmanned Aerial Vehicles (UAVs) from surveillance, mapping and target geolocation. However, most of commercial UAVs are equipped with low-cost navigation sensors such as C/A code GPS and a low-cost IMU on board, allowing a positioning accuracy of 5 to 10 meters. This low accuracy which implicates that it cannot be used in applications that require high precision data on cm-level. This paper presents a precise process for geolocation of ground targets based on thermal video imagery acquired by small UAV equipped with RTK GPS. The geolocation data is filtered using a linear Kalman filter, which provides a smoothed estimate of target location and target velocity. The accurate geo-locating of targets during image acquisition is conducted via traditional photogrammetric bundle adjustment equations using accurate exterior parameters achieved by on board IMU and RTK GPS sensors and Kalman filtering and interior orientation parameters of thermal camera from pre-flight laboratory calibration process.

  12. Limits on surveillance: frictions, fragilities and failures in the operation of camera surveillance.

    NARCIS (Netherlands)

    Dubbeld, L.

    2004-01-01

    Public video surveillance tends to be discussed in either utopian or dystopian terms: proponents maintain that camera surveillance is the perfect tool in the fight against crime, while critics argue that the use of security cameras is central to the development of a panoptic, Orwellian surveillance

  13. Limits on surveillance: frictions, fragilities and failures in the operation of camera surveillance.

    NARCIS (Netherlands)

    Dubbeld, Lynsey

    2004-01-01

    Public video surveillance tends to be discussed in either utopian or dystopian terms: proponents maintain that camera surveillance is the perfect tool in the fight against crime, while critics argue that the use of security cameras is central to the development of a panoptic, Orwellian surveillance

  14. CCTV Coverage Index Based on Surveillance Resolution and Its Evaluation Using 3D Spatial Analysis

    Directory of Open Access Journals (Sweden)

    Kyoungah Choi

    2015-09-01

    Full Text Available We propose a novel approach to evaluating how effectively a closed circuit television (CCTV system can monitor a targeted area. With 3D models of the target area and the camera parameters of the CCTV system, the approach produces surveillance coverage index, which is newly defined in this study as a quantitative measure for surveillance performance. This index indicates the proportion of the space being monitored with a sufficient resolution to the entire space of the target area. It is determined by computing surveillance resolution at every position and orientation, which indicates how closely a specific object can be monitored with a CCTV system. We present full mathematical derivation for the resolution, which depends on the location and orientation of the object as well as the geometric model of a camera. With the proposed approach, we quantitatively evaluated the surveillance coverage of a CCTV system in an underground parking area. Our evaluation process provided various quantitative-analysis results, compelling us to examine the design of the CCTV system prior to its installation and understand the surveillance capability of an existing CCTV system.

  15. Locative Terms and Warlpiri Acquisition.

    Science.gov (United States)

    Bavin, Edith L.

    1990-01-01

    Focuses on the influence of language specific properties in the acquisition of locative expressions. Some of the claims from literature on the acquisition of locative expressions are discussed and data from the acquisition of Warlpiri are presented and discussed in terms of these claims. (Author/CB)

  16. First Language Acquisition and Teaching

    Science.gov (United States)

    Cruz-Ferreira, Madalena

    2011-01-01

    "First language acquisition" commonly means the acquisition of a single language in childhood, regardless of the number of languages in a child's natural environment. Language acquisition is variously viewed as predetermined, wondrous, a source of concern, and as developing through formal processes. "First language teaching" concerns schooling in…

  17. First Language Acquisition and Teaching

    Science.gov (United States)

    Cruz-Ferreira, Madalena

    2011-01-01

    "First language acquisition" commonly means the acquisition of a single language in childhood, regardless of the number of languages in a child's natural environment. Language acquisition is variously viewed as predetermined, wondrous, a source of concern, and as developing through formal processes. "First language teaching" concerns schooling in…

  18. Resource-based theory and mergers & acquisitions success

    OpenAIRE

    Grill, Plina; Bresser, Rudi K. F.

    2011-01-01

    Mergers & acquisitions (M&A) are most popular external growth strategies. While the number of M&A has been increasing during the past decades, on average, only the shareholders of target firms gain value during the acquisitions process, while acquirers do not receive abnormal positive returns. This paper analyses the impact of strategically valuable resources on the success of M&A decisions. We test complementary resource-based hypotheses regarding the value of M&A for the shareholders of bot...

  19. Unsupervised Language Acquisition

    CERN Document Server

    De Marcken, C

    1996-01-01

    This thesis presents a computational theory of unsupervised language acquisition, precisely defining procedures for learning language from ordinary spoken or written utterances, with no explicit help from a teacher. The theory is based heavily on concepts borrowed from machine learning and statistical estimation. In particular, learning takes place by fitting a stochastic, generative model of language to the evidence. Much of the thesis is devoted to explaining conditions that must hold for this general learning strategy to arrive at linguistically desirable grammars. The thesis introduces a variety of technical innovations, among them a common representation for evidence and grammars, and a learning strategy that separates the ``content'' of linguistic parameters from their representation. Algorithms based on it suffer from few of the search problems that have plagued other computational approaches to language acquisition. The theory has been tested on problems of learning vocabularies and grammars from unse...

  20. Amplitudes, acquisition and imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bloor, Robert

    1998-12-31

    Accurate seismic amplitude information is important for the successful evaluation of many prospects and the importance of such amplitude information is increasing with the advent of time lapse seismic techniques. It is now widely accepted that the proper treatment of amplitudes requires seismic imaging in the form of either time or depth migration. A key factor in seismic imaging is the spatial sampling of the data and its relationship to the imaging algorithms. This presentation demonstrates that acquisition caused spatial sampling irregularity can affect the seismic imaging and perturb amplitudes. Equalization helps to balance the amplitudes, and the dealing strategy improves the imaging further when there are azimuth variations. Equalization and dealiasing can also help with the acquisition irregularities caused by shot and receiver dislocation or missing traces. 2 refs., 2 figs.

  1. Data acquisition instruments: Psychopharmacology

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, D.S. III

    1998-01-01

    This report contains the results of a Direct Assistance Project performed by Lockheed Martin Energy Systems, Inc., for Dr. K. O. Jobson. The purpose of the project was to perform preliminary analysis of the data acquisition instruments used in the field of psychiatry, with the goal of identifying commonalities of data and strategies for handling and using the data in the most advantageous fashion. Data acquisition instruments from 12 sources were provided by Dr. Jobson. Several commonalities were identified and a potentially useful data strategy is reported here. Analysis of the information collected for utility in performing diagnoses is recommended. In addition, further work is recommended to refine the commonalities into a directly useful computer systems structure.

  2. Achievable Rate Estimation of IEEE 802.11ad Visual Big-Data Uplink Access in Cloud-Enabled Surveillance Applications.

    Science.gov (United States)

    Kim, Joongheon; Kim, Jong-Kook

    2016-01-01

    This paper addresses the computation procedures for estimating the impact of interference in 60 GHz IEEE 802.11ad uplink access in order to construct visual big-data database from randomly deployed surveillance camera sensing devices. The acquired large-scale massive visual information from surveillance camera devices will be used for organizing big-data database, i.e., this estimation is essential for constructing centralized cloud-enabled surveillance database. This performance estimation study captures interference impacts on the target cloud access points from multiple interference components generated by the 60 GHz wireless transmissions from nearby surveillance camera devices to their associated cloud access points. With this uplink interference scenario, the interference impacts on the main wireless transmission from a target surveillance camera device to its associated target cloud access point with a number of settings are measured and estimated under the consideration of 60 GHz radiation characteristics and antenna radiation pattern models.

  3. The Effects of Acquisitions on Firm Value, Evidence from Turkey

    Directory of Open Access Journals (Sweden)

    Fatma Büşra GÜNAY BENDAŞ

    2015-01-01

    Full Text Available Acquisitions are assumed to create value for both the target and the acquiring firm. This paper analyzes the sources of value creation in acquisitions and examines the domestic acquisitions that took place in Turkey in 2013. By taking the overall market considerations into account, I measure the degree of value creation over different periods of time. I use the standard market value technique to calculate abnormal returns in stock prices of the acquiring firms and find that the increase in firm value is statistically significant in the long run but not in the short run.

  4. Foreign acquisitions, domestic multinationals, and R&D

    DEFF Research Database (Denmark)

    Bandick, Roger; Görg, Holger; Karpaty, Patrik

    2014-01-01

    The aim of this paper is to evaluate the causal effect of foreign acquisition on R&D intensity in targeted domestic firms. We are able to distinguish domestic multinationals and non-multinationals, which allows us to investigate the fear that the change in ownership of domestic to foreign...... to the fears that foreign acquisition of domestic firms lead to a relocation of R&D activity in Swedish MNEs. Rather, this paper finds robust evidence that foreign acquisitions lead to increasing R&D intensity in acquired domestic MNEs and non-MNEs....

  5. Cyber Surveillance for Flood Disasters

    Directory of Open Access Journals (Sweden)

    Shi-Wei Lo

    2015-01-01

    Full Text Available Regional heavy rainfall is usually caused by the influence of extreme weather conditions. Instant heavy rainfall often results in the flooding of rivers and the neighboring low-lying areas, which is responsible for a large number of casualties and considerable property loss. The existing precipitation forecast systems mostly focus on the analysis and forecast of large-scale areas but do not provide precise instant automatic monitoring and alert feedback for individual river areas and sections. Therefore, in this paper, we propose an easy method to automatically monitor the flood object of a specific area, based on the currently widely used remote cyber surveillance systems and image processing methods, in order to obtain instant flooding and waterlogging event feedback. The intrusion detection mode of these surveillance systems is used in this study, wherein a flood is considered a possible invasion object. Through the detection and verification of flood objects, automatic flood risk-level monitoring of specific individual river segments, as well as the automatic urban inundation detection, has become possible. The proposed method can better meet the practical needs of disaster prevention than the method of large-area forecasting. It also has several other advantages, such as flexibility in location selection, no requirement of a standard water-level ruler, and a relatively large field of view, when compared with the traditional water-level measurements using video screens. The results can offer prompt reference for appropriate disaster warning actions in small areas, making them more accurate and effective.

  6. Health surveillance and endocrine disruptors

    Directory of Open Access Journals (Sweden)

    Waissmann William

    2002-01-01

    Full Text Available The author discusses the extreme relevance of research on the presence of endocrine disruptors (EDs in products of interest to health surveillance (HS. Focusing on EDs, the author highlights the urgency of changes already under way in the direction of HS. The shift should be from product and product-registration approaches to the productive process and its realization in consumption, generation of contaminants, and alterations in the health of workers and the overall population. He briefly describes: regulatory gaps for dealing with EDs; difficulty in evaluating risk and suspension of the production and use of products with its characteristics and the need, as exemplified by such products, to enhance the inter-relationship among all stakeholders and to turn HS into a state-of-the-art technological setting, associated with the academic community and accountable to the public. The author reports on measures already taken in relation to EDs, including the establishment of a reference laboratory for analyzing persistent organic pollutants (POPs, interruption of the use of various POPs in Brazil and an initial review of requirements for registering pesticides under the Brazilian National Health Surveillance Agency (ANVISA.

  7. Health surveillance and endocrine disruptors

    Directory of Open Access Journals (Sweden)

    William Waissmann

    2002-04-01

    Full Text Available The author discusses the extreme relevance of research on the presence of endocrine disruptors (EDs in products of interest to health surveillance (HS. Focusing on EDs, the author highlights the urgency of changes already under way in the direction of HS. The shift should be from product and product-registration approaches to the productive process and its realization in consumption, generation of contaminants, and alterations in the health of workers and the overall population. He briefly describes: regulatory gaps for dealing with EDs; difficulty in evaluating risk and suspension of the production and use of products with its characteristics and the need, as exemplified by such products, to enhance the inter-relationship among all stakeholders and to turn HS into a state-of-the-art technological setting, associated with the academic community and accountable to the public. The author reports on measures already taken in relation to EDs, including the establishment of a reference laboratory for analyzing persistent organic pollutants (POPs, interruption of the use of various POPs in Brazil and an initial review of requirements for registering pesticides under the Brazilian National Health Surveillance Agency (ANVISA.

  8. Stock market driven acquisitions

    OpenAIRE

    Shleifer, Andrei; Vishny, Robert W.

    2003-01-01

    We present a model of mergers and acquisitions based on stock market misvaluations of the combining firms. The key ingredients of the model are the relative valuations of the merging firms and the market’s perception of the synergies from the combination. The model explains who acquires whom, the choice of the medium of payment, the valuation consequences of mergers, and merger waves. The model is consistent with available empirical findings about characteristics and returns of merging firms,...

  9. Stock Market Driven Acquisitions

    OpenAIRE

    Andrei Shleifer; Vishny, Robert W.

    2001-01-01

    We present a model of mergers and acquisitions based on stock market misvaluations of the combining firms. The key ingredients of the model are the relative valuations of the merging firms, the horizons of their respective managers, and the market's perception of the synergies from the combination. The model explains who acquirers whom, whether the medium of payment is cash or stock, what are the valuation consequences of mergers, and why there are merger waves. The model is consistent with a...

  10. Defense ADP Acquisition Study.

    Science.gov (United States)

    1981-11-30

    Government Operations Committee HOI - Headquarters Operating Tnstructions vii HOL - Higher Order Language HQ - Headquarters HW - Hardware I IFB...generates lengthy acquisition times, but rather, the basis for the delays is related to the Air Force acqusition process. -5- (2) The Current Air...information resources is stressed, the Senate language in the bill, and the specific wording in the law, dis- claim an expansion of GSA’s authority, as defined

  11. Second language acquisition

    OpenAIRE

    Indefrey, P; Davidson, D.

    2014-01-01

    This article reviews neurocognitive evidence on second language (L2) processing at speech sound, word, and sentence levels. Hemodynamic (functional magnetic resonance imaging and positron emission tomography) data suggest that L2s are implemented in the same brain structures as the native language but with quantitative differences in the strength of activation that are modulated by age of L2 acquisition and L2 proficiency. Electrophysiological data show a more complex pattern of first and L2 ...

  12. Language Acquisition in Computers

    OpenAIRE

    Belzner, Megan; Colin-Ellerin, Sean; Roman, Jorge H.

    2012-01-01

    This project explores the nature of language acquisition in computers, guided by techniques similar to those used in children. While existing natural language processing methods are limited in scope and understanding, our system aims to gain an understanding of language from first principles and hence minimal initial input. The first portion of our system was implemented in Java and is focused on understanding the morphology of language using bigrams. We use frequency distributions and differ...

  13. Second language acquisition

    OpenAIRE

    Indefrey, P.; Davidson, D.

    2014-01-01

    This article reviews neurocognitive evidence on second language (L2) processing at speech sound, word, and sentence levels. Hemodynamic (functional magnetic resonance imaging and positron emission tomography) data suggest that L2s are implemented in the same brain structures as the native language but with quantitative differences in the strength of activation that are modulated by age of L2 acquisition and L2 proficiency. Electrophysiological data show a more complex pattern of first and L2 ...

  14. Mass Processing of Sentinel-1 Images for Maritime Surveillance

    Directory of Open Access Journals (Sweden)

    Carlos Santamaria

    2017-07-01

    Full Text Available The free, full and open data policy of the EU’s Copernicus programme has vastly increased the amount of remotely sensed data available to both operational and research activities. However, this huge amount of data calls for new ways of accessing and processing such “big data”. This paper focuses on the use of Copernicus’s Sentinel-1 radar satellite for maritime surveillance. It presents a study in which ship positions have been automatically extracted from more than 11,500 Sentinel-1A images collected over the Mediterranean Sea, and compared with ship position reports from the Automatic Identification System (AIS. These images account for almost all the Sentinel-1A acquisitions taken over the area during the two-year period from the start of the operational phase in October 2014 until September 2016. A number of tools and platforms developed at the European Commission’s Joint Research Centre (JRC that have been used in the study are described in the paper. They are: (1 Search for Unidentified Maritime Objects (SUMO, a tool for ship detection in Synthetic Aperture Radar (SAR images; (2 the JRC Earth Observation Data and Processing Platform (JEODPP, a platform for efficient storage and processing of large amounts of satellite images; and (3 Blue Hub, a maritime surveillance GIS and data fusion platform. The paper presents the methodology and results of the study, giving insights into the new maritime surveillance knowledge that can be gained by analysing such a large dataset, and the lessons learnt in terms of handling and processing the big dataset.

  15. Assessment of language acquisition.

    Science.gov (United States)

    de Villiers, Peter A; de Villiers, Jill G

    2010-03-01

    This review addresses questions of what should be assessed in language acquisition, and how to do it. The design of a language assessment is crucially connected to its purpose, whether for diagnosis, development of an intervention plan, or for research. Precise profiles of language strengths and weaknesses are required for clear definitions of the phenotypes of particular language and neurodevelopmental disorders. The benefits and costs of formal tests versus language sampling assessments are reviewed. Content validity, theoretically and empirically grounded in child language acquisition, is claimed to be centrally important for appropriate assessment. Without this grounding, links between phenomena can be missed, and interpretations of underlying difficulties can be compromised. Sensitivity and specificity of assessment instruments are often assessed using a gold standard of existing tests and diagnostic practices, but problems arise if that standard is biased against particular groups or dialects. The paper addresses the issues raised by the goal of unbiased assessment of children from diverse linguistic and cultural backgrounds, especially speakers of non-mainstream dialects or bilingual children. A variety of new approaches are discussed for language assessment, including dynamic assessment, experimental tools such as intermodal preferential looking, and training studies that assess generalization. Stress is placed on the need for measures of the process of acquisition rather than just levels of achievement. Copyright © 2010 John Wiley & Sons, Ltd. For further resources related to this article, please visit the WIREs website. Copyright © 2010 John Wiley & Sons, Ltd.

  16. Second language acquisition.

    Science.gov (United States)

    Juffs, Alan

    2011-05-01

    Second language acquisition (SLA) is a field that investigates child and adult SLA from a variety of theoretical perspectives. This article provides a survey of some key areas of concern including formal generative theory and emergentist theory in the areas of morpho-syntax and phonology. The review details the theoretical stance of the two different approaches to the nature of language: generative linguistics and general cognitive approaches. Some results of key acquisition studies from the two theoretical frameworks are discussed. From a generative perspective, constraints on wh-movement, feature geometry and syllable structure, and morphological development are highlighted. From a general cognitive point of view, the emergence of tense and aspect marking from a prototype account of inherent lexical aspect is reviewed. Reference is made to general cognitive learning theories and to sociocultural theory. The article also reviews individual differences research, specifically debate on the critical period in adult language acquisition, motivation, and memory. Finally, the article discusses the relationship between SLA research and second language pedagogy. Suggestions for further reading from recent handbooks on SLA are provided. WIREs Cogni Sci 2011 2 277-286 DOI: 10.1002/wcs.106 For further resources related to this article, please visit the WIREs website. Copyright © 2010 John Wiley & Sons, Ltd.

  17. A Data Acquisition Protocol for a Reactive Wireless Sensor Network Monitoring Application

    Directory of Open Access Journals (Sweden)

    Femi A. Aderohunmu

    2015-04-01

    Full Text Available Limiting energy consumption is one of the primary aims for most real-world deployments of wireless sensor networks. Unfortunately, attempts to optimize energy efficiency are often in conflict with the demand for network reactiveness to transmit urgent messages. In this article, we propose SWIFTNET: a reactive data acquisition scheme. It is built on the synergies arising from a combination of the data reduction methods and energy-efficient data compression schemes. Particularly, it combines compressed sensing, data prediction and adaptive sampling strategies. We show how this approach dramatically reduces the amount of unnecessary data transmission in the deployment for environmental monitoring and surveillance networks. SWIFTNET targets any monitoring applications that require high reactiveness with aggressive data collection and transmission. To test the performance of this method, we present a real-world testbed for a wildfire monitoring as a use-case. The results from our in-house deployment testbed of 15 nodes have proven to be favorable. On average, over 50% communication reduction when compared with a default adaptive prediction method is achieved without any loss in accuracy. In addition, SWIFTNET is able to guarantee reactiveness by adjusting the sampling interval from 5 min up to 15 s in our application domain.

  18. A GRASP for Next Generation Sapphire Image Acquisition Scheduling

    Directory of Open Access Journals (Sweden)

    Yang Wang

    2016-01-01

    Full Text Available This paper investigates an image acquisition scheduling problem for a Canadian surveillance-of-space satellite named Sapphire that takes images of deep space Earth-orbiting objects. For a set of resident space objects (RSOs that needs to be imaged within the time horizon of one day, the Sapphire image acquisition scheduling (SIAS problem is to find a schedule that maximizes the “Figure of Merit” of all the scheduled RSO images. To address the problem, we propose an effective GRASP heuristic that alternates between a randomized greedy constructive procedure and a local search procedure. Experimental comparisons with the currently used greedy algorithm are presented to demonstrate the merit of the proposed algorithm in handling the SIAS problem.

  19. Prospective surgical site infection surveillance in dogs.

    Science.gov (United States)

    Turk, Ryen; Singh, Ameet; Weese, J Scott

    2015-01-01

    To 1) describe the incidence of surgical site infections (SSI) in dogs undergoing surgery at the Ontario Veterinary College Health Sciences Centre; 2) describe and compare procedure-specific SSI rates; and 3) identify factors associated with development of SSI. Prospective, cohort study Dogs (n = 846) undergoing surgery during 45 weeks (September 2010-July 2011). Follow-up telephone conversation with dog owners was performed 30 days postoperatively, with additional 1-year follow-up performed for cases with surgical implants. A standardized questionnaire was administered to detect and characterize SSI. SSI were identified in 26 (3.0%) dogs; 11 (42%) were classified as superficial SSI, whereas 13 were deep, and 2 were organ/space. Of the confirmed SSI, only 17 (65%) were documented in the medical records. Hypotension (P = .011), class of surgery (P = .029), and use of an implant (P = .001) increased the risk of SSI. Microbial cultures were submitted for 19 cases (73%) and of those, 74% were staphylococci. SSI can result in devastating consequences in dogs and understanding risk factors is critical to target prevention practices. Whereas some risk factors such as hypotension are modifiable, others such as class of surgery are not. When possible, active surveillance should be used as part of a hospital infection control program. © Copyright 2014 by The American College of Veterinary Surgeons.

  20. Video surveillance of passengers with mug shots

    Science.gov (United States)

    Hsu, Ming Kai; Lee, Ting N.; Szu, Harold

    2010-04-01

    The authority officer relies on facial mug-shots to spot suspects among crowds. Passing through a check point, the facial displays and printouts operate in low resolution fixed poses. Thus, a databases-cuing video is recommended for real-time surveillance with Aided-Target Recognition (AiTR) prompting the inspector taking a closer second look at a specific passenger. Taking advantage of commercial available Face Detection System on Chips (SOC) at 0.04sec, we develop a fast and smart algorithm to sort facial poses among passengers. We can increase the overlapping POFs (pixels on faces) in matching mug shots at arbitrary poses with sorted facial poses. Lemma: We define the long exposure as time average of facial poses and the short exposure as single facial pose in a frame of video in 30 Hz. The fiduciary triangle is defined among two eyes and nose-top. Theorem Self-Reference Matched Filtering (Szu et al. Opt Comm. 1980; JOSA, 1982) to Facial-Pose: If we replace the desirable output of Weiner filter as the long exposure, then the filter can select a short exposure as the normal view. Corollary: Given a short exposure as normal view, the fiduciary triangle can decide all poses from left-to-right and top-to-down.

  1. 40 CFR 52.2030 - Source surveillance.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Source surveillance. 52.2030 Section 52.2030 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Pennsylvania § 52.2030 Source surveillance...

  2. European surveillance network for influenza in pigs

    NARCIS (Netherlands)

    Simon, Gaëlle; Larsen, Lars E.; Dürrwald, Ralf; Foni, Emanuela; Harder, Timm; Reeth, Van Kristien; Markowska-Daniel, Iwona; Reid, Scott M.; Dan, Adam; Maldonado, Jaime; Huovilainen, Anita; Billinis, Charalambos; Davidson, Irit; Agüero, Montserrat; Vila, Thaïs; Hervé, Séverine; Breum, Solvej Østergaard; Chiapponi, Chiara; Urbaniak, Kinga; Kyriakis, Constantinos S.; Brown, Ian H.; Loeffen, Willie; Meulen, Van der Karen; Schlegel, Michael; Bublot, Michel; Kellam, Paul; Watson, Simon; Lewis, Nicola S.; Pybus, Oliver G.; Webby, Richard; Chen, Hualan; Vincent, Amy L.

    2014-01-01

    Swine influenza causes concern for global veterinary and public health officials. In continuing two previous networks that initiated the surveillance of swine influenza viruses (SIVs) circulating in European pigs between 2001 and 2008, a third European Surveillance Network for Influenza in Pigs (

  3. Rare disease surveillance: An international perspective

    NARCIS (Netherlands)

    Elliott, E.J.; Nicoll, A.; Lynn, R.; Marchessault, V.; Hirasing, R.A.; Ridley, G.

    2001-01-01

    Background: The International Network of Paediatric Surveillance Units (INoPSU) was established in 1998 and met formally for the first time in Ottawa, Ontario in June 2000. Objectives: To document the methodology and activities of existing national paediatric surveillance units; the formation of

  4. Unattended video surveillance systems for international safeguards

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, C.S.

    1979-01-01

    The use of unattended video surveillance systems places some unique requirements on the systems and their hardware. The systems have the traditional requirements of video imaging, video storage, and video playback but also have some special requirements such as tamper safing. The technology available to meet these requirements and how it is being applied to unattended video surveillance systems are discussed in this paper.

  5. Rare disease surveillance: An international perspective

    NARCIS (Netherlands)

    Elliott, E.J.; Nicoll, A.; Lynn, R.; Marchessault, V.; Hirasing, R.A.; Ridley, G.

    2001-01-01

    Background: The International Network of Paediatric Surveillance Units (INoPSU) was established in 1998 and met formally for the first time in Ottawa, Ontario in June 2000. Objectives: To document the methodology and activities of existing national paediatric surveillance units; the formation of INo

  6. Video Surveillance: All Eyes Turn to IP

    Science.gov (United States)

    Raths, David

    2011-01-01

    Many university officials recognize the need to upgrade their older analog video surveillance systems. In a 2010 survey by "Campus Safety" magazine, half of university respondents expressed dissatisfaction with the quality and coverage of their current video surveillance systems. Among the limitations of analog closed-circuit television…

  7. The Multiple Unmanned Air Vehicle Persistent Surveillance Problem: A Review

    Directory of Open Access Journals (Sweden)

    Nikhil Nigam

    2014-01-01

    Full Text Available Control of autonomous vehicles for applications such as surveillance, search, and exploration has been a topic of great interest over the past two decades. In particular, there has been a rising interest in control of multiple vehicles for reasons such as increase in system reliability, robustness, and efficiency, with a possible reduction in cost. The exploration problem is NP hard even for a single vehicle/agent, and the use of multiple vehicles brings forth a whole new suite of problems associated with communication and cooperation between vehicles. The persistent surveillance problem differs from exploration since it involves continuous/repeated coverage of the target space, minimizing time between re-visits. The use of aerial vehicles demands consideration of vehicle dynamic and endurance constraints as well. Another aspect of the problem that has been investigated to a lesser extent is the design of the vehicles for particular missions. The intent of this paper is to thoroughly review the persistent surveillance problem, with particular focus on multiple Unmanned Air Vehicles (UAVs, and present some of our own work in this area. We investigate the different aspects of the problem and slightly digress into techniques that have been applied to exploration and coverage, but a comprehensive survey of all the work in multiple vehicle control for search, exploration, and coverage is beyond the scope of this paper.

  8. Urine Telomerase for Diagnosis and Surveillance of Bladder Cancer

    Directory of Open Access Journals (Sweden)

    Angela Lamarca

    2012-01-01

    Full Text Available Bladder cancer has increased incidence during last decades. For those patients with nonmuscle involved tumors, noninvasive diagnosis test and surveillance methods must be designed to avoid current cystoscopies that nowadays are done regularly in a lot of patients. Novel urine biomarkers have been developed during last years. Telomerase is important in cancer biology, improving the division capacity of cancer cells. Even urinary telomerase could be a potentially useful urinary tumor marker; its use for diagnosis of asymptomatic and symptomatic patients or its impact during surveillance is still unknown. Moreover, there will need to be uniformity and standardization in the assays before it can become useful in clinical practice. It does not seem to exist a real difference between the most classical assays for the detection of urine telomerase (TRAP and hTERT. However, the new detection methods with modified TeloTAGGG telomerase or with gold nanoparticles must also be taken into consideration for the correct development of this diagnosis method. Maybe the target population would be the high-risk groups within screening programs. To date there is no enough evidence to use it alone and to eliminate cystoscopies from the diagnosis and surveillance of these patients. The combination with cytology or FISH is still preferred.

  9. Screening, Surveillance, and Treatment of Anal Intraepithelial Neoplasia

    Science.gov (United States)

    Long, Kevin C.; Menon, Raman; Bastawrous, Amir; Billingham, Richard

    2016-01-01

    The prevalence of anal intraepithelial neoplasia has been increasing, especially in high-risk patients, including men who have sex with men, human immunodeficiency virus positive patients, and those who are immunosuppressed. Several studies with long-term follow-up have suggested that rate of progression from high-grade squamous intraepithelial lesions to invasive anal cancer is ∼ 5%. This number is considerably higher for those at high risk. Anal cytology has been used to attempt to screen high-risk patients for disease; however, it has been shown to have very little correlation to actual histology. Patients with lesions should undergo history and physical exam including digital rectal exam and standard anoscopy. High-resolution anoscopy can be considered as well, although it is of questionable time and cost–effectiveness. Nonoperative treatments include expectant surveillance and topical imiquimod or 5-fluorouracil. Operative therapies include wide local excision and targeted ablation with electrocautery, infrared coagulation, or cryotherapy. Recurrence rates remain high regardless of treatment delivered and surveillance is paramount, although optimal surveillance regimens have yet to be established. PMID:26929753

  10. Plant and pathogen nutrient acquisition strategies

    Directory of Open Access Journals (Sweden)

    Urooj eFatima

    2015-09-01

    Full Text Available Nutrients are indispensable elements required for the growth of all living organisms including plants and pathogens. Phyllosphere, rhizosphere, apoplast, phloem, xylem and cell organelles are the nutrient niches in plants that are the target of bacterial pathogens. Depending upon nutrients availability, the pathogen adapts various acquisition strategies and inhabits the specific niche. In this review, we discuss the nutrient composition of different niches in plants, the mechanisms involved in the recognition of nutrient niche and the sophisticated strategies used by the bacterial pathogens for acquiring nutrients. We provide insight into various nutrient acquisition strategies used by necrotrophic, biotrophic and hemi-biotrophic bacteria. Specifically we discuss both modulation of bacterial machinery and manipulation of host machinery. In addition, we highlight the current status of our understanding about the nutrient acquisition strategies used by bacterial pathogens, namely targeting the sugar transporters that are dedicated for the plant’s growth and development. Bacterial strategies for altering the plant cell membrane permeability to enhance the release of nutrients are also enumerated along with in-depth analysis of molecular mechanisms behind these strategies. The information presented in this review will be useful to understand the plant-pathogen interaction in nutrient perspective.

  11. Microbiological Food Safety Surveillance in China

    Directory of Open Access Journals (Sweden)

    Xiaoyan Pei

    2015-08-01

    Full Text Available Microbiological food safety surveillance is a system that collects data regarding food contamination by foodborne pathogens, parasites, viruses, and other harmful microbiological factors. It helps to understand the spectrum of food safety, timely detect food safety hazards, and provide relevant data for food safety supervision, risk assessment, and standards-setting. The study discusses the microbiological surveillance of food safety in China, and introduces the policies and history of the national microbiological surveillance system. In addition, the function and duties of different organizations and institutions are provided in this work, as well as the generation and content of the surveillance plan, quality control, database, and achievement of the microbiological surveillance of food safety in China.

  12. Microbiological Food Safety Surveillance in China.

    Science.gov (United States)

    Pei, Xiaoyan; Li, Ning; Guo, Yunchang; Liu, Xiumei; Yan, Lin; Li, Ying; Yang, Shuran; Hu, Jing; Zhu, Jianghui; Yang, Dajin

    2015-08-28

    Microbiological food safety surveillance is a system that collects data regarding food contamination by foodborne pathogens, parasites, viruses, and other harmful microbiological factors. It helps to understand the spectrum of food safety, timely detect food safety hazards, and provide relevant data for food safety supervision, risk assessment, and standards-setting. The study discusses the microbiological surveillance of food safety in China, and introduces the policies and history of the national microbiological surveillance system. In addition, the function and duties of different organizations and institutions are provided in this work, as well as the generation and content of the surveillance plan, quality control, database, and achievement of the microbiological surveillance of food safety in China.

  13. Evaluation of the Measles Surveillance System in Kaduna State, Nigeria (2010-2012).

    Science.gov (United States)

    Ameh, Celestine A; Sufiyan, Muawiyyah B; Jacob, Matthew; Waziri, Ndadilnasiya E; Olayinka, Adebola T

    2016-01-01

    To evaluate the case-based measles surveillance system in Kaduna State of Nigeria and identify gaps in its operation. In Africa, approximately 13 million cases, 650,000 deaths due to measles occur annually, with sub-Saharan Africa having the highest morbidity and mortality. Measles infection is endemic in Nigeria and has been documented to occur all year round, despite high measles routine and supplemental immunization coverage. The frequent outbreaks of measles in Kaduna State prompted the need for the evaluation of the measles case-based surveillance system. We interviewed stakeholders and conducted a retrospective record review of the measles case-based surveillance data from 2010 - 2012 and adapted the 2001 CDC guidelines on surveillance evaluation and the Framework for Evaluating Public Health Surveillance Systems for Early Detection of Outbreaks, to assess the systems usefulness, representativeness, timeliness, stability, acceptability and data quality. We calculated the annualized detection rate of measles and non-measles febrile rash, proportion of available results, proportion of LGAs (Districts) that investigated at least one case with blood, proportion of cases that were IgM positive and the incidence of measles. We compared the results with WHO(2004) recommended performance indicators to determine the quality and effectiveness of measles surveillance system. According to the Stakeholders, the case-based surveillance system was useful and acceptable. Median interval between specimen collection and release of result was 7days (1 - 25 days) in 2010, 38 days (Range: 16 - 109 days) in 2011 and 11 days (Range: 1 - 105 days) in 2012. The annualized detection rate of measles rash in 2010 was 2.1 (target: (3)2), 1.0 (target: (3)2) in 2011 and 1.4 (target: (3)2) in 2012. The annualized detection rate of non-measles febrile rash in 2010 was 2.1 (target: (3)2), 0.6 (target: (3)2) in 2011 and 0.8 (target: (3)2) in 2012. Case definitions are simple and understood by

  14. Control and surveillance of human African trypanosomiasis.

    Science.gov (United States)

    2013-01-01

    In the 1960s, it appeared that human African trypanosomiasis (HAT) could be effectively controlled, but by the beginning of the twenty-first century several decades of neglect had led to alarming numbers of reported new cases, with an estimated 300 000 people infected. The World Health Organization (WHO) responded with a series of initiatives aimed at bringing HAT under control again. Since 2001, the pharmaceutical companies that produce drugs for HAT have committed themselves to providing them free of charge to WHO for distribution for the treatment of patients. In addition, funds have been provided to WHO to support national sleeping sickness control programmes to boost control and surveillance of the disease. That, coupled with bilateral cooperation and the work of nongovernmental organizations, helped reverse the upward trend in HAT prevalence. By 2012, the number of reported cases was fewer than 8000. This success in bringing HAT under control led to its inclusion in the WHO Roadmap for eradication, elimination and control of neglected tropical diseases, with a target set to eliminate the disease as a public health problem by 2020. A further target has been set, by countries in which HAT is endemic, to eliminate gambiense HAT by reducing the incidence of infection to zero in a defined geographical area. This report provides information about new diagnostic approaches, new therapeutic regimens and better understanding of the distribution of the disease with high-quality mapping. The roles of human and animal reservoirs and the tsetse fly vectors that transmit the parasites are emphasized. The new information has formed the basis for an integrated strategy with which it is hoped that elimination of gambiense HAT will be achieved. The report also contains recommendations on the approaches that will lead to elimination of the disease.

  15. Semi-hidden target recognition in gated viewer images fused with thermal IR images

    NARCIS (Netherlands)

    Smeelen, M.A.; Schwering, P.B.W.; Toet, A.; Loog, M.

    2013-01-01

    Defense and security surveillance scenarios typically involve the detection and classification of targets in complex and dynamic backgrounds. Imaging systems deployed for this purpose should therefore provide imagery that enables optimal simultaneous recognition of both targets and their context. He

  16. [Spatial orientation of pilot using a cockpit exterior surveillance system].

    Science.gov (United States)

    Chuntul, A V; Lapa, V V; Davydov, V V

    2013-01-01

    Spatial orientation of pilots using a cockpit exterior surveillance system was tested in real nighttime helicopter flights. Major factors complicating adequate spatial orientation and provoking visual illusions in pilots are lack of information for spatial depth (relation) perception in two-dimensional TV images altering their position along the horizontal and vertical lines of trajectory and simultaneous piloting and target search-identification operations. Reliability of pilot's spatial orientation could be improved by displaying on the exterior imaging screen also relevant flight navigation parameters.

  17. Automatic Dependent Surveillance - Broadcast Verification and Validation Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Automatic Dependent Surveillance ? Broadcast (ADS-B) is an emerging Communications, Navigation, and Surveillance (CNS) technology that will vastly expand the state...

  18. The Nordic Obstetric Surveillance Study

    DEFF Research Database (Denmark)

    Colmorn, Lotte B.; Petersen, Kathrine B; Jakobsson, Maija

    2015-01-01

    OBJECTIVE: To assess the rates and characteristics of women with complete uterine rupture, abnormally invasive placenta, peripartum hysterectomy, and severe blood loss at delivery in the Nordic countries. DESIGN: Prospective, Nordic collaboration. SETTING: The Nordic Obstetric Surveillance Study...... (NOSS) collected cases of severe obstetric complications in the Nordic countries from April 2009 to August 2012. SAMPLE AND METHODS: Cases were reported by clinicians at the Nordic maternity units and retrieved from medical birth registers, hospital discharge registers, and transfusion databases...... hysterectomy was 3.5/10 000 deliveries. Of the women, 25% had two or more complications. Women with complications were more often >35 years old, overweight, with a higher parity, and a history of cesarean delivery compared with the total population. CONCLUSION: The studied obstetric complications are rare...

  19. Symbolic power, robotting, and surveilling

    DEFF Research Database (Denmark)

    Skovsmose, Ole

    2012-01-01

    Symbolic power is discussed with reference to mathematics and formal languages. Two distinctions are crucial for establishing mechanical and formal perspectives: one between appearance and reality, and one between sense and reference. These distinctions include a nomination of what to consider...... primary and secondary. They establish the grammatical format of a mechanical and a formal world view. Such views become imposed on the domains addressed by means of mathematics and formal languages. Through such impositions symbolic power of mathematics becomes exercised. The idea that mathematics...... describes as it prioritises is discussed with reference to robotting and surveillance. In general, the symbolic power of mathematics and formal languages is summarised through the observations: that mathematics treats parts and properties as autonomous, that it dismembers what it addresses and destroys...

  20. Return on shares of steel companies under the influence of mergers and acquisitions

    Directory of Open Access Journals (Sweden)

    J. Zuzik

    2015-01-01

    Full Text Available The present article intends to asses returns on shares of the steel companies that were formed based on either merger or acquisition. The analysis included 14 operations in the steel industry. Attention was paid to returns of the companies performing acquisitions, as well as to the returns on shares that presented the acquisition target. The analysis was performed based on the “event study” method, and the analysed event was the announcement or notification of realization of an acquisition. Shares of the target steel companies as well as acquirers are attaining higher returns, but the change was not statistical significant.

  1. The importance of workforce surveillance, research evidence and political advocacy in the context of international migration of dentists.

    Science.gov (United States)

    Balasubramanian, M; Brennan, D S; Spencer, A J; Watkins, K; Short, S D

    2015-03-01

    The international migration of dentists is an issue of pressing significance that poses several complex policy challenges. Policy-making is mainly constrained by the lack of workforce surveillance, research evidence and political advocacy - all three are required to work together, yet with different purposes. We first discuss the inconsistencies in migrant dentist surveillance in major country-level governmental systems (immigration departments, dentist registration authorities and workforce agencies). We argue that the limitations in surveillance collections affect independent research and in turn scholarly contributions to dental workforce policy. Differences in country-level surveillance collections also hinder valid cross-country comparisons on migrant dentist data, impeding global policy efforts. Due to these limitations, advocacy, or the political process to influence health policy, suffers, but is integral to future challenges on dentist migration. Country-level advocacy is best targeted at improving migrant dentist surveillance systems. Research interest can be invigorated through targeted funding allocations for migration research and by improving the availability of dentist surveillance data for research purposes. At the global level, the WHOs global code of practice for international recruitment of health personnel (a crucial advocacy tool) needs to be strengthened. Global organisations such as the FDI World Dental Federation have an important role to play in advocating for improved migrant dentist workforce surveillance and research evidence, especially in low- and middle-income countries.

  2. Exotic mosquito threats require strategic surveillance and response planning.

    Science.gov (United States)

    Webb, Cameron E; Doggett, Stephen L

    2016-12-14

    Mosquito-borne diseases caused by endemic pathogens such as Ross River, Barmah Forest and Murray Valley encephalitis viruses are an annual concern in New South Wales (NSW), Australia. More than a dozen mosquito species have been implicated in the transmission of these pathogens, with each mosquito occupying a specialised ecological niche that influences their habitat associations, host feeding preferences and the environmental drivers of their abundance. The NSW Arbovirus Surveillance and Mosquito Monitoring Program provides an early warning system for potential outbreaks of mosquito-borne disease by tracking annual activity of these mosquitoes and their associated pathogens. Although the program will effectively track changes in local mosquito populations that may increase with a changing climate, urbanisation and wetland rehabilitation, it will be less effective with current surveillance methodologies at detecting or monitoring changes in exotic mosquito threats, where different surveillance strategies need to be used. Exotic container-inhabiting mosquitoes such as Aedes aegypti and Ae. albopictus pose a threat to NSW because they are nuisance-biting pests and vectors of pathogens such as dengue, chikungunya and Zika viruses. International movement of humans and their belongings have spread these mosquitoes to many regions of the world. In recent years, these two mosquitoes have been detected by the Australian Government Department of Agriculture and Water Resources at local airports and seaports. To target the detection of these exotic mosquitoes, new trapping technologies and networks of surveillance locations are required. Additionally, incursions of these mosquitoes into urban areas of the state will require strategic responses to minimise substantial public health and economic burdens to local communities.

  3. [Ethical problems in health surveillance].

    Science.gov (United States)

    Toffoletto, F; Briatico Vangosa, G; Panizza, C

    2000-01-01

    Surveillance of workers' health in the field of occupational medicine poses substantial ethical problems in view of occupational medicine's complex responsibilities towards workers and employers, preventive and protection services, workers' representatives, public healthcare and preventive medicine facilities, controlling agencies and judicial authorities. Potentially conflicting rights and duties often come into play in this sector. In the last few years various international and national bodies have drawn up codes of ethics or guidelines for the conduct of physicians in occupational medicine, three of which are of particular importance: 1) The International Ethical Code of the International Commission on Occupational Health (ICOH, 1992); 2) The Code of Conduct of the National Association of Company Doctors (ANMA, 1997); 3) The Technical and Ethical Guidelines for workers' health (ILO, 1998). The chief purpose of all these documents is to safeguard the health of workers and to guarantee the safety of the workplace by defining programmes of health supervision to match specific risks. The methods should be non-invasive and should allow for a check or efficiency. The physician is expected to have a high degree of professionalism and up-to-date skills; to be independent and impartial; to be reserved and capable of inter-disciplinary co-operation. On the basis of the above documents, a number of problematic aspects may be appraised concerning the relationship between the occupational health physician responsible for the surveillance activities of the local health authority and the relative company physician. The documents stress the importance of keeping up to date and of quality, fields in which the dominant role played by Scientific Societies is underlined. Finally it is recommended that health supervision be arranged in such a manner as to foster the professionalism and responsibility of the physician in charge rather than the formal implementation of health

  4. The NUSTAR data acquisition

    Energy Technology Data Exchange (ETDEWEB)

    Loeher, B.; Toernqvist, H.T. [TU Darmstadt (Germany); GSI (Germany); Agramunt, J. [IFIC, CSIC (Spain); Bendel, M.; Gernhaeuser, R.; Le Bleis, T.; Winkel, M. [TU Muenchen (Germany); Charpy, A.; Heinz, A.; Johansson, H.T. [Chalmers University of Technology (Sweden); Coleman-Smith, P.; Lazarus, I.H.; Pucknell, V.F.E. [STFC Daresbury (United Kingdom); Czermak, A. [IFJ (Poland); Kurz, N.; Nociforo, C.; Pietri, S.; Schaffner, H.; Simon, H. [GSI (Germany); Scheit, H. [TU Darmstadt (Germany); Taieb, J. [CEA (France)

    2015-07-01

    The diversity of upcoming experiments within the NUSTAR collaboration, including experiments in storage rings, reactions at relativistic energies and high-precision spectroscopy, is reflected in the diversity of the required detection systems. A challenging task is to incorporate the different needs of individual detectors within the unified NUSTAR Data AcQuisition (NDAQ). NDAQ takes up this challenge by providing a high degree of availability via continuously running systems, high flexibility via experiment-specific configuration files for data streams and trigger logic, distributed timestamps and trigger information on km distances, all built on the solid basis of the GSI Multi-Branch System. NDAQ ensures interoperability between individual NUSTAR detectors and allows merging of formerly separate data streams according to the needs of all experiments, increasing reliability in NUSTAR data acquisition. An overview of the NDAQ infrastructure and the current progress is presented. The NUSTAR (NUclear STructure, Astrophysics and Reactions) collaboration represents one of the four pillars motivating the construction of the international FAIR facility. The diversity of NUSTAR experiments, including experiments in storage rings, reactions at relativistic energies and high-precision spectroscopy, is reflected in the diversity of the required detection systems. A challenging task is to incorporate the different needs of individual detectors and components under the umbrella of the unified NUSTAR Data AQuisition (NDAQ) infrastructure. NDAQ takes up this challenge by providing a high degree of availability via continuously running systems, high flexibility via experiment-specific configuration files for data streams and trigger logic, and distributed time stamps and trigger information on km distances, all built on the solid basis of the GSI Multi-Branch System (MBS). NDAQ ensures interoperability between individual NUSTAR detectors and allows merging of formerly separate

  5. First language acquisition.

    Science.gov (United States)

    Goodluck, Helen

    2011-01-01

    This article reviews current approaches to first language acquisition, arguing in favor of the theory that attributes to the child an innate knowledge of universal grammar. Such knowledge can accommodate the systematic nature of children's non-adult linguistic behaviors. The relationships between performance devices (mechanisms for comprehension and production of speech), non-linguistic aspects of cognition, and child grammars are also discussed. WIREs Cogn Sci 2011 2 47-54 DOI: 10.1002/wcs.95 For further resources related to this article, please visit the WIREs website. Copyright © 2010 John Wiley & Sons, Ltd.

  6. Liminal Surveillance. An ethnographic control room study during a local event

    NARCIS (Netherlands)

    Boersma, F.K.

    2013-01-01

    This article is about the targeted, temporarily intensified use of an already existing, permanently installed surveillance system for the safety and security management during a local event at the campus of the University of Illinois, USA. In particular it is the CCTV system that is analyzed after

  7. Colonoscopy surveillance for dysplasia and colorectal cancer in patients with inflammatory bowel disease

    DEFF Research Database (Denmark)

    Aalykke, Claus; Jensen, Michael Dam; Fallingborg, Jan

    2015-01-01

    colitis; and patients with ulcerative colitis as well as Crohn´s disease with a concomitant diagnosis of primary sclerosing cholangitis. A colonoscopy surveillance program is recommended in these subgroups with intervals ranging from every 3-6 months to every 5 years, using chromoendoscopy with targeted...

  8. WHO Regional Office for Europe guidance for influenza surveillance in humans.

    NARCIS (Netherlands)

    Brown, C.S.; Andraghetti, R.; Paget, J.

    2009-01-01

    Recent international mandates, and the emergent circulation of pandemic (H1N1) 2009 virus in human populations, call for strengthening influenza surveillance to better target seasonal influenza control programmes and support pandemic preparedness. This document provides technical guidance to establi

  9. Evaluation of AFP surveillance indicators in polio-free Ghana, 2009-2013.

    Science.gov (United States)

    Odoom, John Kofi; Ntim, Nana Afia Asante; Sarkodie, Badu; Addo, James; Minta-Asare, Keren; Obodai, Evangeline; Eshun, Miriam; Ahove, Vincent V; Diamenu, Stanley; Adjabeng, Michael; Arthur-Quarm, Jacob; Barnor, Jacob S

    2014-07-05

    Ghana recorded the last case of indigenous wild poliovirus in 1999 but suffered two more outbreaks in 2003 and 2008. Following the World Health Organization (WHO) guidelines, transmission was interrupted through high routine immunisation coverage with live-attenuated oral polio vaccine (OPV), effective acute flaccid paralysis (AFP) surveillance and supplementary immunisation activities (SIA). This article describes the results of a five-year surveillance of AFP in polio-free Ghana, evaluate the surveillance indicators and identify areas that need improvement. We investigated 1345 cases of AFP from children aged less than 15 years reported to the Disease Surveillance Department from January 2009 to December 2013. Data on demographic characteristics, vaccination history, clinical presentation and virological investigation on stool specimens collected during investigation were analysed. Of the specimens analysed, 56% were from males and 76.3% were from children less than 5 years of age. Twenty-four percent of the children received up to 3 doses of OPV, 57% received at least 4 doses while the status of 19% was unknown. Core AFP surveillance indicators were partly met for non-polio AFP rate while the WHO target for stool adequacy and timeliness was exceeded over the period of study. All the cases were classified virologically, however no wild polio was found. Sixty-day follow-up was conducted for 56.3% of cases and 8.6% cases classified as compactible with polio. Both laboratory and epidemiological surveillance for AFP were efficient and many WHO targets were met. However, due to the risk of poliovirus importation prior to global eradication, longterm surveillance is required to provide a high degree of confidence in prevention of poliovirus infection in Ghana. Thus, efforts should be made to strengthen regional performance and to follow-up on all AFP cases in order to establish proper diagnoses for the causes of the AFP leading to proper care.

  10. Mass gatherings: A one-stop opportunity to complement global disease surveillance

    Directory of Open Access Journals (Sweden)

    Habida Elachola

    2016-01-01

    Full Text Available Emerging infections including those resulting from the bioterrorist use of infectious agents have indicated the need for global health surveillance. This paper reviews multiple surveillance opportunities presented by mass gatherings (MGs that align with fundamental questions in epidemiology (why, what, who, where, when and how. Some MGs bring together large, diverse population groups coming from countries with high prevalence of communicable diseases and disparate surveillance capacities. MGs have the potential to exacerbate the transmission dynamics of infectious diseases due to various factors including the high population density and rigor of events, increase in number of people with underlying diseases that predisposes them to disease acquisition, mixing of people from countries or regions with and without efficient disease control efforts, and varying endemicity or existence of communicable diseases in home countries. MGs also have the potential to increase the opportunities for mechanical and even heat-related injuries, morbidity or deaths from accidents, alcohol use, deliberate terrorist attacks with biological agents and/or with explosives and from exacerbation of pre-existing conditions. Responding to these wider range of events may require the use of novel bio-surveillance systems designed to collect data from different sources including electronic and non-electronic medical records from emergency departments and hospitalisations, laboratories, medical examiners, emergency call centres, veterinary, food processors, drinking water systems and even other non-traditional sources such as over-the-counter drug sales and crowd photographs. Well-structured, interoperable real-time surveillance and reporting systems should be integral to MG planning. The increase in magnitude of participants exceeding millions and diversity of people attending MGs can be proactively used to conduct active surveillance of communicable and non

  11. Applying participatory approaches in the evaluation of surveillance systems: A pilot study on African swine fever surveillance in Corsica.

    Science.gov (United States)

    Calba, Clémentine; Antoine-Moussiaux, Nicolas; Charrier, François; Hendrikx, Pascal; Saegerman, Claude; Peyre, Marisa; Goutard, Flavie L

    2015-12-01

    The implementation of regular and relevant evaluations of surveillance systems is critical in improving their effectiveness and their relevance whilst limiting their cost. The complex nature of these systems and the variable contexts in which they are implemented call for the development of flexible evaluation tools. Within this scope, participatory tools have been developed and implemented for the African swine fever (ASF) surveillance system in Corsica (France). The objectives of this pilot study were, firstly, to assess the applicability of participatory approaches within a developed environment involving various stakeholders and, secondly, to define and test methods developed to assess evaluation attributes. Two evaluation attributes were targeted: the acceptability of the surveillance system and its the non-monetary benefits. Individual semi-structured interviews and focus groups were implemented with representatives from every level of the system. Diagramming and scoring tools were used to assess the different elements that compose the definition of acceptability. A contingent valuation method, associated with proportional piling, was used to assess the non-monetary benefits, i.e., the value of sanitary information. Sixteen stakeholders were involved in the process, through 3 focus groups and 8 individual semi-structured interviews. Stakeholders were selected according to their role in the system and to their availability. Results highlighted a moderate acceptability of the system for farmers and hunters and a high acceptability for other representatives (e.g., private veterinarians, local laboratories). Out of the 5 farmers involved in assessing the non-monetary benefits, 3 were interested in sanitary information on ASF. The data collected via participatory approaches enable relevant recommendations to be made, based on the Corsican context, to improve the current surveillance system.

  12. Cost effectiveness of surveillance for GI cancers.

    Science.gov (United States)

    Omidvari, Amir-Houshang; Meester, Reinier G S; Lansdorp-Vogelaar, Iris

    2016-12-01

    Gastrointestinal (GI) diseases are among the leading causes of death in the world. To reduce the burden of GI diseases, surveillance is recommended for some diseases, including for patients with inflammatory bowel diseases, Barrett's oesophagus, precancerous gastric lesions, colorectal adenoma, and pancreatic neoplasms. This review aims to provide an overview of the evidence on cost-effectiveness of surveillance of individuals with GI conditions predisposing them to cancer, specifically focussing on the aforementioned conditions. We searched the literature and reviewed 21 studies. Despite heterogeneity of studies in terms of settings, study populations, surveillance strategies and outcomes, most reviewed studies suggested at least some surveillance of patients with these GI conditions to be cost-effective. For some high-risk conditions frequent surveillance with 3-month intervals was warranted, while for other conditions, surveillance may only be cost-effective every 10 years. Further studies based on more robust effectiveness evidence are needed to inform and optimise surveillance programmes for GI cancers. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. Remote container monitoring and surveillance systems

    Energy Technology Data Exchange (ETDEWEB)

    Resnik, W.M.; Kadner, S.P. [Aquila Technologies Group, Inc., Albuquerque, NM (United States)

    1995-12-31

    Aquila Technologies Group is developing a monitoring and surveillance system to monitor containers of nuclear materials. The system will both visually and physically monitor the containers. The system is based on the combination of Aquila`s Gemini All-Digital Surveillance System and on Aquila`s AssetLAN{trademark} asset tracking technology. This paper discusses the Gemini Digital Surveillance system as well as AssetLAN technology. The Gemini architecture with emphasis on anti-tamper security features is also described. The importance of all-digital surveillance versus other surveillance methods is also discussed. AssetLAN{trademark} technology is described, emphasizing the ability to continually track containers (as assets) by location utilizing touch memory technology. Touch memory technology provides unique container identification, as well as the ability to store and retrieve digital information on the container. This information may relate to container maintenance, inspection schedules, and other information. Finally, this paper describes the combination of the Gemini system with AssetLAN technology, yielding a self contained, container monitoring and area/container surveillance system. Secure container fixture design considerations are discussed. Basic surveillance review functions are also discussed.

  14. Modernization of existing VVER-1000 surveillance programs

    Energy Technology Data Exchange (ETDEWEB)

    Kochkin, V.; Erak, D.; Makhotin, D. [NRC ' Kurchatov Inst.' , 1 Kurchatov Square, Moscow 123182 (Russian Federation)

    2011-07-01

    According to generally accepted world practice, evaluation of the reactor pressure vessel (RPV) material behavior during operation is carried out using tests of surveillance specimens. The main objective of the surveillance program consists in insurance of safe RPV operation during the design lifetime and lifetime-extension period. At present, the approaches of pressure vessels residual life validation based on the test results of their surveillance specimens have been developed and introduced in Russia and are under consideration in other countries where vodo-vodyanoi energetichesky reactors- (VVER-) 1000 are in operation. In this case, it is necessary to ensure leading irradiation of surveillance specimens (as compared to the pressure vessel wall) and to provide uniformly irradiated specimen groups for mechanical testing. Standard surveillance program of VVER-1000 has several significant shortcomings and does not meet these requirements. Taking into account program of lifetime extension of VVER-1000 operating in Russia, it is necessary to carry out upgrading of the VVER-1000 surveillance program. This paper studies the conditions of a surveillance specimen's irradiation and upgrading of existing sets to provide monitoring and prognosis of RPV material properties for extension of the reactor's lifetime up to 60 years or more. (authors)

  15. Standardized rendering from IR surveillance motion imagery

    Science.gov (United States)

    Prokoski, F. J.

    2014-06-01

    Government agencies, including defense and law enforcement, increasingly make use of video from surveillance systems and camera phones owned by non-government entities.Making advanced and standardized motion imaging technology available to private and commercial users at cost-effective prices would benefit all parties. In particular, incorporating thermal infrared into commercial surveillance systems offers substantial benefits beyond night vision capability. Face rendering is a process to facilitate exploitation of thermal infrared surveillance imagery from the general area of a crime scene, to assist investigations with and without cooperating eyewitnesses. Face rendering automatically generates greyscale representations similar to police artist sketches for faces in surveillance imagery collected from proximate locations and times to a crime under investigation. Near-realtime generation of face renderings can provide law enforcement with an investigation tool to assess witness memory and credibility, and integrate reports from multiple eyewitnesses, Renderings can be quickly disseminated through social media to warn of a person who may pose an immediate threat, and to solicit the public's help in identifying possible suspects and witnesses. Renderings are pose-standardized so as to not divulge the presence and location of eyewitnesses and surveillance cameras. Incorporation of thermal infrared imaging into commercial surveillance systems will significantly improve system performance, and reduce manual review times, at an incremental cost that will continue to decrease. Benefits to criminal justice would include improved reliability of eyewitness testimony and improved accuracy of distinguishing among minority groups in eyewitness and surveillance identifications.

  16. Unsupervised Language Acquisition

    Science.gov (United States)

    de Marcken, Carl

    1996-11-01

    This thesis presents a computational theory of unsupervised language acquisition, precisely defining procedures for learning language from ordinary spoken or written utterances, with no explicit help from a teacher. The theory is based heavily on concepts borrowed from machine learning and statistical estimation. In particular, learning takes place by fitting a stochastic, generative model of language to the evidence. Much of the thesis is devoted to explaining conditions that must hold for this general learning strategy to arrive at linguistically desirable grammars. The thesis introduces a variety of technical innovations, among them a common representation for evidence and grammars, and a learning strategy that separates the ``content'' of linguistic parameters from their representation. Algorithms based on it suffer from few of the search problems that have plagued other computational approaches to language acquisition. The theory has been tested on problems of learning vocabularies and grammars from unsegmented text and continuous speech, and mappings between sound and representations of meaning. It performs extremely well on various objective criteria, acquiring knowledge that causes it to assign almost exactly the same structure to utterances as humans do. This work has application to data compression, language modeling, speech recognition, machine translation, information retrieval, and other tasks that rely on either structural or stochastic descriptions of language.

  17. Data-acquisition systems

    Energy Technology Data Exchange (ETDEWEB)

    Cyborski, D.R.; Teh, K.M.

    1995-08-01

    Up to now, DAPHNE, the data-acquisition system developed for ATLAS, was used routinely for experiments at ATLAS and the Dynamitron. More recently, the Division implemented 2 MSU/DAPHNE systems. The MSU/DAPHNE system is a hybrid data-acquisition system which combines the front-end of the Michigan State University (MSU) DA system with the traditional DAPHNE back-end. The MSU front-end is based on commercially available modules. This alleviates the problems encountered with the DAPHNE front-end which is based on custom designed electronics. The first MSU system was obtained for the APEX experiment and was used there successfully. A second MSU front-end, purchased as a backup for the APEX experiment, was installed as a fully-independent second MSU/DAPHNE system with the procurement of a DEC 3000 Alpha host computer, and was used successfully for data-taking in an experiment at ATLAS. Additional hardware for a third system was bought and will be installed. With the availability of 2 MSU/DAPHNE systems in addition to the existing APEX setup, it is planned that the existing DAPHNE front-end will be decommissioned.

  18. Application of IR microbolometers in border surveillance

    Science.gov (United States)

    Breakfield, David K.; Norton, Peter; Plemons, Dan; Rodriguez, Christian; Sustare, Dennis

    2007-04-01

    BAE Systems led a collaborative study with New Mexico State University to investigate a series of ground based persistent surveillance solutions for potential use along the Southwest border of the United States. This study considered a wide range of system options for mobile and fixed site applications. This paper summarizes the findings of the study including the central role of the imaging subsystems in mobile ground based surveillance solutions and the suitability of uncooled IR Microbolometers within this subsystem. The paper also provides a discussion of the benefits of real time decision support applications when fielding a persistent surveillance solution.

  19. Collection assessment and acquisitions budgets

    CERN Document Server

    Lee, Sul H

    2013-01-01

    This invaluable new book contains timely information about the assessment of academic library collections and the relationship of collection assessment to acquisition budgets. The rising cost of information significantly influences academic libraries'abilities to acquire the necessary materials for students and faculty, and public libraries'abilities to acquire material for their clientele. Collection Assessment and Acquisitions Budgets examines different aspects of the relationship between the assessment of academic library collections and the management of library acquisition budgets. Librar

  20. Manifold knowledge extraction and target recognition

    Science.gov (United States)

    Chao, Cai; Hua, Zhou

    2009-10-01

    Advanced mammalian target identification derived from the perception of target's manifold and measurement manifolddistance. It does not rely on object's segmented accuracy, not depend on target's variety model, and adapt to a range of changes on targets. In this paper, based on the existed manifold learning algorithm, set up a new bionic automatic target recognition model, discussed the targets manifold knowledge acquisition and the knowledge expression architecture, gave a manifold knowledge-based new method for automatic target recognition. Experiments show that the new method has a strong adaptability to targets various transform, and has a very high correctly identification probability.

  1. The U.S.-Mexico Border Infectious Disease Surveillance Project: Establishing Binational Border Surveillance

    Science.gov (United States)

    Waterman, Stephen; Lucas, Carlos Alvarez; Falcon, Veronica Carrion; Morales, Pablo Kuri; Lopez, Luis Anaya; Peter, Chris; Gutiérrez, Alejandro Escobar; Gonzalez, Ernesto Ramirez; Flisser, Ana; Bryan, Ralph; Valle, Enrique Navarro; Rodriguez, Alfonso; Hernandez, Gerardo Alvarez; Rosales, Cecilia; Ortiz, Javier Arias; Landen, Michael; Vilchis, Hugo; Rawlings, Julie; Leal, Francisco Lopez; Ortega, Luis; Flagg, Elaine; Conyer, Roberto Tapia; Cetron, Martin

    2003-01-01

    In 1997, the Centers for Disease Control and Prevention, the Mexican Secretariat of Health, and border health officials began the development of the Border Infectious Disease Surveillance (BIDS) project, a surveillance system for infectious diseases along the U.S.-Mexico border. During a 3-year period, a binational team implemented an active, sentinel surveillance system for hepatitis and febrile exanthems at 13 clinical sites. The network developed surveillance protocols, trained nine surveillance coordinators, established serologic testing at four Mexican border laboratories, and created agreements for data sharing and notification of selected diseases and outbreaks. BIDS facilitated investigations of dengue fever in Texas-Tamaulipas and measles in California–Baja California. BIDS demonstrates that a binational effort with local, state, and federal participation can create a regional surveillance system that crosses an international border. Reducing administrative, infrastructure, and political barriers to cross-border public health collaboration will enhance the effectiveness of disease prevention projects such as BIDS. PMID:12533288

  2. Surveillance studies about "rear-window ethics"%Surveillance studies about"rear-window ethics"

    Institute of Scientific and Technical Information of China (English)

    黄婷婷

    2016-01-01

    It can be said that people now live in a surveillance society. Some forms of surveillance have always existed as people watch over each other for mutual care, for moral caution and to discover information under the table. Alfred Hitchcock's Rear Window is a typical fi lm for surveillance studies.What is happening on the screen is merely a projection of our own anxieties, our own existence, and our self-ambiguity as portrayed by the characters in this wonderful film.

  3. Language Acquisition in Computers

    CERN Document Server

    Belzner, Megan; Roman, Jorge H

    2012-01-01

    This project explores the nature of language acquisition in computers, guided by techniques similar to those used in children. While existing natural language processing methods are limited in scope and understanding, our system aims to gain an understanding of language from first principles and hence minimal initial input. The first portion of our system was implemented in Java and is focused on understanding the morphology of language using bigrams. We use frequency distributions and differences between them to define and distinguish languages. English and French texts were analyzed to determine a difference threshold of 55 before the texts are considered to be in different languages, and this threshold was verified using Spanish texts. The second portion of our system focuses on gaining an understanding of the syntax of a language using a recursive method. The program uses one of two possible methods to analyze given sentences based on either sentence patterns or surrounding words. Both methods have been i...

  4. 48 CFR 37.604 - Quality assurance surveillance plans.

    Science.gov (United States)

    2010-10-01

    ... assurance surveillance plans. Requirements for quality assurance and quality assurance surveillance plans are in Subpart 46.4. The Government may either prepare the quality assurance surveillance plan or require the offerors to submit a proposed quality assurance surveillance plan for the Government's...

  5. Theories of language acquisition.

    Science.gov (United States)

    Vetter, H J; Howell, R W

    1971-03-01

    Prior to the advent of generative grammar, theoretical approaches to language development relied heavily upon the concepts ofdifferential reinforcement andimitation. Current studies of linguistic acquisition are largely dominated by the hypothesis that the child constructs his language on the basis of a primitive grammar which gradually evolves into a more complex grammar. This approach presupposes that the investigator does not impose his own grammatical rules on the utterances of the child; that the sound system of the child and the rules he employs to form sentences are to be described in their own terms, independently of the model provided by the adult linguistic community; and that there is a series of steps or stages through which the child passes on his way toward mastery of the adult grammar in his linguistic environment. This paper attempts to trace the development of human vocalization through prelinguistic stages to the development of what can be clearly recognized as language behavior, and then progresses to transitional phases in which the language of the child begins to approximate that of the adult model. In the view of the authors, the most challenging problems which confront theories of linguistic acquisition arise in seeking to account for structure of sound sequences, in the rules that enable the speaker to go from meaning to sound and which enable the listener to go from sound to meaning. The principal area of concern for the investigator, according to the authors, is the discovery of those rules at various stages of the learning process. The paper concludes with a return to the question of what constitutes an adequate theory of language ontogenesis. It is suggested that such a theory will have to be keyed to theories of cognitive development and will have to include and go beyond a theory which accounts for adult language competence and performance, since these represent only the terminal stage of linguistic ontogenesis.

  6. Surveillance and Datenschutz in Virtual Environments

    Science.gov (United States)

    Cikic, Sabine; Lehmann-Grube, Fritz; Sablatnig, Jan

    Virtual environments are becoming more and more accepted, and part of the everyday online experience for many users. This offers new potential for both surveillance and data mining. Some of the techniques used are discussed in this paper.

  7. CDC Behavioral Risk Factor Surveillance System (BRFSS)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Behavioral Risk Factor Surveillance System (BRFSS) is a state-based system of health surveys that collects information on health risk behaviors, preventive...

  8. Donning and doffing PPE for HPAI surveillance

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Instructions describing the proper donning and doffing personal protective equipment (PPE) for highly pathogenic avian influenza (HPAI) surveillance. This protocol...

  9. Youth Risk Behavior Surveillance System (YRBSS)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Youth Risk Behavior Surveillance System (YRBSS) monitors 6 types of health-risk behaviors that contribute to the leading causes of death and disability among...

  10. Surveillance and Monitoring of Dialysis Access

    Directory of Open Access Journals (Sweden)

    Lalathaksha Kumbar

    2012-01-01

    Full Text Available Vascular access is the lifeline of a hemodialysis patient. Currently arteriovenous fistula and graft are considered the permanent options for vascular access. Monitoring and surveillance of vascular access are an integral part of the care of hemodialysis patient. Although different techniques and methods are available for identifying access dysfunction, the scientific evidence for the optimal methodology is lacking. A small number of randomized controlled trials have been performed evaluating different surveillance techniques. We performed a study of the recent literature published in the PUBMED, to review the scientific evidence on different methodologies currently being used for surveillance and monitoring and their impact on the care of the dialysis access. The limited randomized studies especially involving fistulae and small sample size of the published studies with conflicting results highlight the need for a larger multicentered randomized study with hard clinical end points to evaluate the optimal surveillance strategy for both fistula and graft.

  11. Hanford Site Environmental Surveillance Master Sampling Schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, Lynn E.

    2000-01-27

    This document contains the CY2000 schedules for the routine collection of samples for the Surface Environmental Surveillance Project (SESP) and Drinking Water Monitoring Project. Each section includes sampling locations, sample types, and analyses to be performed.

  12. Future Airportal Surveillance and Prediction Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Recent advances in airport surface surveillance and other sensor, automation, and data sharing technologies now allow the consideration of a significant change in...

  13. Moving object detection for video surveillance

    National Research Council Canada - National Science Library

    Kalirajan, K; Sudha, M

    2015-01-01

    .... In this paper, a novel approach of object detection for video surveillance is presented. The proposed algorithm consists of various steps including video compression, object detection, and object localization...

  14. Disease Surveillance at Rocky Mountain Arsenal NWR

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Deer populations have been reduced under the new Habitat Management Plan (HMP). Surveillance of chronic wasting disease (CWD) and other common ungulate diseases...

  15. Design of a radiation surveillance unit for an unmanned aerial vehicle.

    Science.gov (United States)

    Kurvinen, K; Smolander, P; Pöllänen, R; Kuukankorpi, S; Kettunen, M; Lyytinen, J

    2005-01-01

    This paper describes a prototype of a compact environmental radiation surveillance instrument designed for a Ranger unmanned aerial vehicle. The instrument, which can be used for tracking a radioactive plume, mapping fallout and searching for point sources, consists of three different detector types (GM, NaI(Tl) and CZT) and an air sampling unit. In addition to the standard electronics for data acquisition, the system contains an onboard computer, a GPS receiver and environmental sensors, all enclosed in a single housing manufactured of fiberglass-reinforced composite material. The data collected during the flight is transmitted in real-time to the ground station via a TETRA radio network. The radiation surveillance unit is an independent module and as such can be used in, for example, airplanes, helicopters and cars.

  16. Image and Processing Models for Satellite Detection in Images Acquired by Space-based Surveillance-of-Space Sensors

    Science.gov (United States)

    2010-09-01

    software. Résumé …..... Dans le cadre de la surveillance de l’espace, les objets spatiaux connus en orbite (OSO), i.e., satellites actifs ou débris...SAPPHIRE et NEOSSat. Ce document contient des modèles qui décrivent la formation des images et le processus d’acquisition de capteurs , basés au sol ou dans

  17. Laboratory-based nationwide surveillance of antimicrobial resistance in Ghana

    Directory of Open Access Journals (Sweden)

    Opintan JA

    2015-11-01

    Full Text Available Japheth A Opintan,1 Mercy J Newman,1 Reuben E Arhin,1 Eric S Donkor,1 Martha Gyansa-Lutterodt,2 William Mills-Pappoe3 1Department of Medical Microbiology, School of Biomedical and Allied Health Sciences, University of Ghana, 2Pharmaceutical Services, Ministry of Health, Ghana Health Services, 3Clinical Laboratory Unit, Institutional Care Division, Ghana Health Service, Accra, Ghana Abstract: Global efforts are underway to combat antimicrobial resistance (AMR. A key target in this intervention is surveillance for local and national action. Data on AMR in Ghana are limited, and monitoring of AMR is nonexistent. We sought to generate baseline data on AMR, and to assess the readiness of Ghana in laboratory-based surveillance. Biomedical scientists in laboratories across Ghana with capacity to perform bacteriological culture were selected and trained. In-house standard operating protocols were used to perform microbiological investigations on clinical specimens. Additional microbiological tests and data analyses were performed at a centralized laboratory. Surveillance data were stored and analyzed using WHONET program files. A total of 24 laboratories participated in the training, and 1,598 data sets were included in the final analysis. A majority of the bacterial species were isolated from outpatients (963 isolates; 60.3%. Urine (617 isolates; 38.6% was the most common clinical specimen cultured, compared to blood (100 isolates; 6.3%. Ten of 18 laboratories performed blood culture. Bacteria isolated included Escherichia coli (27.5%, Pseudomonas spp. (14.0%, Staphylococcus aureus (11.5%, Streptococcus spp. (2.3%, and Salmonella enterica serovar Typhi (0.6%. Most of the isolates were multidrug-resistant, and over 80% of them were extended-spectrum beta-lactamases-producing. Minimum inhibitory concentration levels at 50% and at 90% for ciprofloxacin, ceftriaxone, and amikacin on selected multidrug-resistant bacteria species ranged between 2 µg/mL and

  18. Enhanced surveillance program FY1998 accomplishments

    Energy Technology Data Exchange (ETDEWEB)

    Kass, J

    1998-10-01

    This report highlights the accomplishments of the Enhanced Surveillance Program (ESP), the highest-priority research and development effort in stockpile management today. This is volume one of eleven, the unclassified summary of selected program highlights. These highlights fall into the following focus areas: pits, high explosives, organics, dynamics, diagnostics, systems, secondaries, materials-aging models, non-nuclear components, and routine surveillance testing system upgrades. Principal investigators from around the DOE complex contributed to this report.

  19. Workplace surveillance, privacy protection, and efficiency wages

    OpenAIRE

    Schmitz, Patrick W.

    2005-01-01

    Consider an employer who wants her employee to work hard. As is well known from the efficiency wage literature, the employer must pay the (wealth-constrained) employee a positive rent to provide incentives for exerting unobservable effort. Alternatively, the employer could make effort observable by costly workplace surveillance. It is argued that a privacy protection law preventing surveillance may increase the total surplus. While such a law reduces the employer?s profit, this loss can be ov...

  20. Microbiological Food Safety Surveillance in China

    OpenAIRE

    Xiaoyan Pei; Ning Li; Yunchang Guo; Xiumei Liu; Lin Yan; Ying Li; Shuran Yang; Jing Hu; Jianghui Zhu; Dajin Yang

    2015-01-01

    Microbiological food safety surveillance is a system that collects data regarding food contamination by foodborne pathogens, parasites, viruses, and other harmful microbiological factors. It helps to understand the spectrum of food safety, timely detect food safety hazards, and provide relevant data for food safety supervision, risk assessment, and standards-setting. The study discusses the microbiological surveillance of food safety in China, and introduces the policies and history of the na...

  1. Hanford Site Environmental Surveillance Master Sampling Schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, Lynn E.

    2002-01-16

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by Pacific Northwest National Laboratory (PNNL) for the U.S. Department of Energy (DOE). Sampling is conducted to evaluate levels of radioactive and nonradioactive pollutants in the Hanford environs. The document contains the CY 2002 schedules for the routine collection of samples for the Surface Environmental Surveillance Project (SESP) and Drinking Water Monitoring Project.

  2. Customer Surveillance: Consumer Attitudes and Management Strategies

    OpenAIRE

    Plangger, Kirk Anton

    2015-01-01

    Due to technological advances, customer surveillance (i.e., the collection, capture, use, or storage of customers’ personal data) is becoming less expensive and more covert. Brands use these personal data that contain needs, preferences, characteristics, behavior, attitudes, or other customer attributes (i.e., market intelligence) to develop more competitive products and services. Customer surveillance also can put stress on customer relationships with brands, thus brands must conduct custome...

  3. Resource Complementarity and Value Capture in Firm Acquisitions

    DEFF Research Database (Denmark)

    Grimpe, Christoph; Hussinger, Katrin

    2014-01-01

    exclusion and freedom to operate in R&D. We argue that such property rights hold preemptive power allowing firms to capture the value from combining complementary technologies and to realize gains from trade in strategic factor markets. Our results for a sample of 1,428 acquisitions indicate that......Extant literature holds that firm acquisitions create value through innovation if the knowledge bases of the acquirer and the target complement each other. Little is known about the value that patents associated with a target's knowledge convey to the acquirer, i.e., their value in securing market......—controlling for technological value—acquired preemptive power is an important determinant of the acquisition price, particularly when the acquirer is technology intensive and acquired patents are highly related to the acquirer's knowledge base....

  4. Taxonomies Support Preschoolers’ Knowledge Acquisition from Storybooks

    Directory of Open Access Journals (Sweden)

    Ashley M. Pinkham

    2014-01-01

    Full Text Available For young children, storybooks may serve as especially valuable sources of new knowledge. While most research focuses on how extratextual comments influence knowledge acquisition, we propose that children’s learning may also be supported by the specific features of storybooks. More specifically, we propose that texts that invoke children’s knowledge of familiar taxonomic categories may support learning by providing a conceptual framework through which prior knowledge and new knowledge can be readily integrated. In this study, 60 5-year olds were read a storybook that either invoked their knowledge of a familiar taxonomic category (taxonomic storybook or focused on a common thematic grouping (traditional storybook. Following the book-reading, children’s vocabulary acquisition, literal comprehension, and inferential comprehension were assessed. Children who were read the taxonomic storybook demonstrated greater acquisition of target vocabulary and comprehension of factual content than children who were read the traditional storybook. Inferential comprehension, however, did not differ across the two conditions. We argue for the importance of careful consideration of book features and storybook selection in order to provide children with every opportunity to gain the knowledge foundational for successful literacy development.

  5. Liberal luxury: Decentering Snowden, surveillance and privilege

    Directory of Open Access Journals (Sweden)

    Piro Rexhepi

    2016-11-01

    Full Text Available This paper reflects on the continued potency of veillance theories to traverse beyond the taxonomies of surveillance inside liberal democracies. It provides a commentary on the ability of sousveillance to destabilise and disrupt suer/violence by shifting its focus from the centre to the periphery, where Big Data surveillance is tantamount to sur/violence. In these peripheral political spaces, surveillance is not framed by concerns over privacy, democracy and civil society; rather, it is a matter of life and death, a technique of both biopolitical and thanatopolitical power. I argue that the universalist, and universalizing, debates over surveillance cannot be mapped through the anxieties of privileged middle classes as they would neither transcend nor make possible alternative ways of tackling the intersection of surveillance and violence so long as they are couched in the liberal concerns for democracy. I call this phenomenon “liberal luxury,” whereby debates over surveillance have over-emphasised liberal proclivities at the expense of disengaging those peripheral populations most severely affected by sur/violence.

  6. First and Second Language Acquisition

    Institute of Scientific and Technical Information of China (English)

    任海燕

    2007-01-01

    Though there are similarities between child first language acquisition and adult second language acquisition,this paper explores the differences between these two processes from several aspects and gives the suggestions that how we language teachers teach L2 students well in language teaching.

  7. Markedness and Second Language Acquisition.

    Science.gov (United States)

    Gil-Byeon, Ja

    1999-01-01

    Discusses whether markedness is at work in second-language acquisition in the same way it is in first-language acquisition when Korean speakers learn English as a second language and English speakers learn Korean as a second language. Results are discussed in terms of no access to universal grammar, partial access to universal grammar, and access…

  8. Universals of Second Language Acquisition.

    Science.gov (United States)

    Eckman, Fred R., Ed.; And Others

    Works on second language acquisition theories, affective variables and communicative competence, and interlanguage were compiled as a result of a symposium on universals of second language acquisition at the University of Wisconsin, Milwaukee. The papers include: "On the Variability of Interlangauge Systems" (Elaine Tarone); "Memory, Learning, and…

  9. Investment and Second Language Acquisition

    Science.gov (United States)

    Pittaway, Daniel S.

    2004-01-01

    The article argues that Norton Peirce's (1995) concept of a language learner's investment should figure centrally in how instructors address the needs of adult learners in ESL classrooms. Investment is discussed in relation to second language acquisition research that addresses the role of social factors in second language acquisition. The article…

  10. Language Acquisition, Pidgins and Creoles.

    Science.gov (United States)

    Wode, Henning

    1981-01-01

    Suggests that structural universals between different-based pidgins result from universal linguo-cognitive processing strategies which are employed in learning languages. Some of the strategies occur in all types of acquisition, and others are more applicable to L2 type acquisition. Past research is discussed, and some exemplary data are given.…

  11. 48 CFR 873.105 - Acquisition planning.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Acquisition planning. 873.105 Section 873.105 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS DEPARTMENT... planning. (a) Acquisition planning is an indispensable component of the total acquisition process. (b) For...

  12. 32 CFR 644.88 - Other acquisition.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Other acquisition. 644.88 Section 644.88 National... HANDBOOK Acquisition Acquisition by Purchase, Donation, and Transfer § 644.88 Other acquisition. (a) Acquisition from other Federal departments and agencies—(1) Transfers. Transfers will be obtained from...

  13. 23 CFR 710.501 - Early acquisition.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Early acquisition. 710.501 Section 710.501 Highways... REAL ESTATE Property Acquisition Alternatives § 710.501 Early acquisition. (a) Real property acquisition. The State may initiate acquisition of real property at any time it has the legal authority to...

  14. 48 CFR 234.004 - Acquisition strategy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Acquisition strategy. 234..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION 234.004 Acquisition strategy. (1) See 209.570 for policy applicable to acquisition strategies that consider the use of lead...

  15. 48 CFR 34.004 - Acquisition strategy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Acquisition strategy. 34... CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION General 34.004 Acquisition strategy. The program manager, as specified in agency procedures, shall develop an acquisition strategy tailored to the...

  16. 48 CFR 3034.004 - Acquisition strategy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Acquisition strategy. 3034.004 Section 3034.004 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND... Acquisition strategy. See (HSAR) 48 CFR 3009.570 for policy applicable to acquisition strategies that...

  17. Performance of the Defense Acquisition System, 2015 Annual report

    Science.gov (United States)

    2015-09-16

    performance measure has its strengths and weaknesses , so we use multiple measures (e.g., at both the program and contract level) and subsequent analysis to...could have led to program success or problems. Defense acquisition is complex, and each measure has its strengths and weaknesses , so attributing...Program Contract Costs Related to Targets Proportions of (Non-FFP) Contracts At or Below Cost Targets for Currently Active MDAPs (controlling for

  18. Early Acquisition of Basic Word Order in Japanese

    Science.gov (United States)

    Sugisaki, Koji

    2008-01-01

    The acquisition of word order has been one of the central issues in the study of child language. One striking finding from the detailed investigation of various child languages is that from the earliest observable stages, children are highly sensitive to the basic word order of their target language. However, the evidence so far comes mainly from…

  19. Sociopsychological and Pedagogic Considerations in L2 Acquisition.

    Science.gov (United States)

    Alptekin, Cem

    1981-01-01

    Criticizes Brown's (TESOL Quarterly, 1980) optimal distance model of target language acquisition for having neglected the issue of possibly harmful effects of sociocultural factors upon learners. A distinction is made between second and foreign language learners' motivations. Pedagogic implications are drawn. (Author/AMH)

  20. Sentence Reading and Writing for Second Language Vocabulary Acquisition

    Science.gov (United States)

    Pichette, Francois; de Serres, Linda; Lafontaine, Marc

    2012-01-01

    This study compares the relative effectiveness of reading and writing sentences for the incidental acquisition of new vocabulary in a second language. It also examines if recall varies according to the concreteness of target words. Participants were 203 French-speaking intermediate and advanced English as second language (ESL) learners, tested for…

  1. The role of mirror neurons in language acquisition and evolution.

    Science.gov (United States)

    Behme, Christina

    2014-04-01

    I argue that Cook et al.'s attack of the genetic hypothesis of mirror neurons misses its target because the authors miss the point that genetics may specify how neurons may learn, not what they learn. Paying more attention to recent work linking mirror neurons to language acquisition and evolution would strengthen Cook et al.'s arguments against a rigid genetic hypothesis.

  2. Markedness in Universal Grammar and Second Language Acquisition

    Science.gov (United States)

    Jiang, Zhao-zi; Shao, Chang-zhong

    2006-01-01

    This paper focuses on the study of markedness theory in Universal Grammar (UG) and its implications in Second Language Acquisition (SLA), showing that the language learners should consciously compare and contrast the similarities and differences between his native language and target language, which will facilitate their learning. (Contains 2…

  3. Lexical Learning in Second Language Acquisition: Optionality in the Numeration

    Science.gov (United States)

    Wakabayashi, Shigenori

    2009-01-01

    Lardiere suggests that second language acquisition (SLA) researchers should pay more attention to the distribution of a given feature in source and target languages, using the distribution of [plural] in English, Chinese and Korean to illustrate. I argue that the distribution of [definite] in English shows a similar complexity, and that this has…

  4. Lexical Learning in Second Language Acquisition: Optionality in the Numeration

    Science.gov (United States)

    Wakabayashi, Shigenori

    2009-01-01

    Lardiere suggests that second language acquisition (SLA) researchers should pay more attention to the distribution of a given feature in source and target languages, using the distribution of [plural] in English, Chinese and Korean to illustrate. I argue that the distribution of [definite] in English shows a similar complexity, and that this has…

  5. Qualitative insights into how men with low-risk prostate cancer choosing active surveillance negotiate stress and uncertainty.

    Science.gov (United States)

    Mader, Emily M; Li, Hsin H; Lyons, Kathleen D; Morley, Christopher P; Formica, Margaret K; Perrapato, Scott D; Irwin, Brian H; Seigne, John D; Hyams, Elias S; Mosher, Terry; Hegel, Mark T; Stewart, Telisa M

    2017-05-08

    Active surveillance is a management strategy for men diagnosed with early-stage, low-risk prostate cancer in which their cancer is monitored and treatment is delayed. This study investigated the primary coping mechanisms for men following the active surveillance treatment plan, with a specific focus on how these men interact with their social network as they negotiate the stress and uncertainty of their diagnosis and treatment approach. Thematic analysis of semi-structured interviews at two academic institutions located in the northeastern US. Participants include 15 men diagnosed with low-risk prostate cancer following active surveillance. The decision to follow active surveillance reflects the desire to avoid potentially life-altering side effects associated with active treatment options. Men on active surveillance cope with their prostate cancer diagnosis by both maintaining a sense of control over their daily lives, as well as relying on the support provided them by their social networks and the medical community. Social networks support men on active surveillance by encouraging lifestyle changes and serving as a resource to discuss and ease cancer-related stress. Support systems for men with low-risk prostate cancer do not always interface directly with the medical community. Spousal and social support play important roles in helping men understand and accept their prostate cancer diagnosis and chosen care plan. It may be beneficial to highlight the role of social support in interventions targeting the psychosocial health of men on active surveillance.

  6. A focused ethnographic study of Sri Lankan government field veterinarians' decision making about diagnostic laboratory submissions and perceptions of surveillance.

    Directory of Open Access Journals (Sweden)

    Kate Sawford

    Full Text Available The global public health community is facing the challenge of emerging infectious diseases. Historically, the majority of these diseases have arisen from animal populations at lower latitudes where many nations experience marked resource constraints. In order to minimize the impact of future events, surveillance of animal populations will need to enable prompt event detection and response. Many surveillance systems targeting animals rely on veterinarians to submit cases to a diagnostic laboratory or input clinical case data. Therefore understanding veterinarians' decision-making process that guides laboratory case submission and their perceptions of infectious disease surveillance is foundational to interpreting disease patterns reported by laboratories and engaging veterinarians in surveillance initiatives. A focused ethnographic study was conducted with twelve field veterinary surgeons that participated in a mobile phone-based surveillance pilot project in Sri Lanka. Each participant agreed to an individual in-depth interview that was recorded and later transcribed to enable thematic analysis of the interview content. Results found that field veterinarians in Sri Lanka infrequently submit cases to laboratories--so infrequently that common case selection principles could not be described. Field veterinarians in Sri Lanka have a diagnostic process that operates independently of laboratories. Participants indicated a willingness to take part in surveillance initiatives, though they highlighted a need for incentives that satisfy a range of motivations that vary among field veterinarians. This study has implications for the future of animal health surveillance, including interpretation of disease patterns reported, system design and implementation, and engagement of data providers.

  7. A focused ethnographic study of Sri Lankan government field veterinarians' decision making about diagnostic laboratory submissions and perceptions of surveillance.

    Science.gov (United States)

    Sawford, Kate; Vollman, Ardene Robinson; Stephen, Craig

    2012-01-01

    The global public health community is facing the challenge of emerging infectious diseases. Historically, the majority of these diseases have arisen from animal populations at lower latitudes where many nations experience marked resource constraints. In order to minimize the impact of future events, surveillance of animal populations will need to enable prompt event detection and response. Many surveillance systems targeting animals rely on veterinarians to submit cases to a diagnostic laboratory or input clinical case data. Therefore understanding veterinarians' decision-making process that guides laboratory case submission and their perceptions of infectious disease surveillance is foundational to interpreting disease patterns reported by laboratories and engaging veterinarians in surveillance initiatives. A focused ethnographic study was conducted with twelve field veterinary surgeons that participated in a mobile phone-based surveillance pilot project in Sri Lanka. Each participant agreed to an individual in-depth interview that was recorded and later transcribed to enable thematic analysis of the interview content. Results found that field veterinarians in Sri Lanka infrequently submit cases to laboratories--so infrequently that common case selection principles could not be described. Field veterinarians in Sri Lanka have a diagnostic process that operates independently of laboratories. Participants indicated a willingness to take part in surveillance initiatives, though they highlighted a need for incentives that satisfy a range of motivations that vary among field veterinarians. This study has implications for the future of animal health surveillance, including interpretation of disease patterns reported, system design and implementation, and engagement of data providers.

  8. A Focused Ethnographic Study of Sri Lankan Government Field Veterinarians’ Decision Making about Diagnostic Laboratory Submissions and Perceptions of Surveillance

    Science.gov (United States)

    Sawford, Kate; Vollman, Ardene Robinson; Stephen, Craig

    2012-01-01

    The global public health community is facing the challenge of emerging infectious diseases. Historically, the majority of these diseases have arisen from animal populations at lower latitudes where many nations experience marked resource constraints. In order to minimize the impact of future events, surveillance of animal populations will need to enable prompt event detection and response. Many surveillance systems targeting animals rely on veterinarians to submit cases to a diagnostic laboratory or input clinical case data. Therefore understanding veterinarians’ decision-making process that guides laboratory case submission and their perceptions of infectious disease surveillance is foundational to interpreting disease patterns reported by laboratories and engaging veterinarians in surveillance initiatives. A focused ethnographic study was conducted with twelve field veterinary surgeons that participated in a mobile phone-based surveillance pilot project in Sri Lanka. Each participant agreed to an individual in-depth interview that was recorded and later transcribed to enable thematic analysis of the interview content. Results found that field veterinarians in Sri Lanka infrequently submit cases to laboratories – so infrequently that common case selection principles could not be described. Field veterinarians in Sri Lanka have a diagnostic process that operates independently of laboratories. Participants indicated a willingness to take part in surveillance initiatives, though they highlighted a need for incentives that satisfy a range of motivations that vary among field veterinarians. This study has implications for the future of animal health surveillance, including interpretation of disease patterns reported, system design and implementation, and engagement of data providers. PMID:23133542

  9. Active surveillance and control programme for Salmonella Dublin in Cattle

    DEFF Research Database (Denmark)

    Nielsen, Liza Rosenbaum; Rattenborg, Erik

    2011-01-01

    surveillance systems. Register data might be useful for design of effective surveillance programmes for Salmonella Dublin in cattle in the future. Statistical analysis of register-based variables confirmed previously known risk factors for becoming test-positive (i.e. purchase of animals from test......This study illustrates how prevalence and incidence of Salmonella Dublin in cattle has been markedly reduced in dairy herds during active surveillance and a control programme targeting infected herds in Denmark from 2002 to 2010. The results suggest that this might by a good alternative to passive......-positive herds, number of cattle in test-positive neighbouring herds, herd size and season), but also pointed out additional factors affecting the risk of dairy herds changing status from test-negative to test-positive (indicative of new or recurrent infection). Increasing geometric cell count measured through...

  10. Cooperative Surveillance and Pursuit Using Unmanned Aerial Vehicles and Unattended Ground Sensors

    Science.gov (United States)

    Las Fargeas, Jonathan; Kabamba, Pierre; Girard, Anouck

    2015-01-01

    This paper considers the problem of path planning for a team of unmanned aerial vehicles performing surveillance near a friendly base. The unmanned aerial vehicles do not possess sensors with automated target recognition capability and, thus, rely on communicating with unattended ground sensors placed on roads to detect and image potential intruders. The problem is motivated by persistent intelligence, surveillance, reconnaissance and base defense missions. The problem is formulated and shown to be intractable. A heuristic algorithm to coordinate the unmanned aerial vehicles during surveillance and pursuit is presented. Revisit deadlines are used to schedule the vehicles' paths nominally. The algorithm uses detections from the sensors to predict intruders' locations and selects the vehicles' paths by minimizing a linear combination of missed deadlines and the probability of not intercepting intruders. An analysis of the algorithm's completeness and complexity is then provided. The effectiveness of the heuristic is illustrated through simulations in a variety of scenarios. PMID:25591168

  11. Incorporating prior knowledge of urban scene spatial structure in aperture code designs for surveillance systems

    Science.gov (United States)

    Valenzuela, John R.; Thelen, Brian J.; Subotic, Nikola

    2010-08-01

    Two major missions of Surveillance systems are imaging and ground moving target indication (GMTI). Recent advances in coded aperture electro optical systems have enabled persistent surveillance systems with extremely large fields of regard. The areas of interest for these surveillance systems are typically urban, with spatial topologies having a very definite structure. We incorporate aspects of a priori information on this structure in our aperture code designs to enable optimized dealiasing operations for undersampled focal plane arrays. Our framework enables us to design aperture codes to minimize mean square error for image reconstruction or to maximize signal to clutter ratio for GMTI detection. In this paper we present a technical overview of our code design methodology and show the results of our designed codes on simulated DIRSIG mega-scene data.

  12. Colonoscopy surveillance for dysplasia and colorectal cancer in patients with inflammatory bowel disease

    DEFF Research Database (Denmark)

    Aalykke, Claus; Jensen, Michael Dam; Fallingborg, Jan;

    2015-01-01

    The risk of colorectal cancer (CRC) and dysplasia in patients with inflammatory bowel disease (IBD) has been highly debated as risk estimates from different studies vary greatly. The present national Danish guideline on colonoscopy surveillance for dysplasia and colorectal cancer in patients......, in some subgroups of patients the risk is increased. These subgroups of patients, who should be offered colonoscopy surveillance, include patients with ulcerative colitis having extensive disease and a long disease duration (10-13 years); early age at onset (less than 19 years of age) of ulcerative...... colitis; and patients with ulcerative colitis as well as Crohn´s disease with a concomitant diagnosis of primary sclerosing cholangitis. A colonoscopy surveillance program is recommended in these subgroups with intervals ranging from every 3-6 months to every 5 years, using chromoendoscopy with targeted...

  13. Cooperative Surveillance and Pursuit Using Unmanned Aerial Vehicles and Unattended Ground Sensors

    Directory of Open Access Journals (Sweden)

    Jonathan Las Fargeas

    2015-01-01

    Full Text Available This paper considers the problem of path planning for a team of unmanned aerial vehicles performing surveillance near a friendly base. The unmanned aerial vehicles do not possess sensors with automated target recognition capability and, thus, rely on communicating with unattended ground sensors placed on roads to detect and image potential intruders. The problem is motivated by persistent intelligence, surveillance, reconnaissance and base defense missions. The problem is formulated and shown to be intractable. A heuristic algorithm to coordinate the unmanned aerial vehicles during surveillance and pursuit is presented. Revisit deadlines are used to schedule the vehicles’ paths nominally. The algorithm uses detections from the sensors to predict intruders’ locations and selects the vehicles’ paths by minimizing a linear combination of missed deadlines and the probability of not intercepting intruders. An analysis of the algorithm’s completeness and complexity is then provided. The effectiveness of the heuristic is illustrated through simulations in a variety of scenarios.

  14. The acquisition of dangerous biological materials :

    Energy Technology Data Exchange (ETDEWEB)

    Aceto, Donato Gonzalo; Astuto-Gribble, Lisa M.; Gaudioso, Jennifer M.

    2007-11-01

    Numerous terrorist organizations have openly expressed interest in producing and deploying biological weapons. However, a limiting factor for many terrorists has been the acquisition of dangerous biological agents, as evidenced by the very few successful instances of biological weapons use compared to the number of documented hoaxes. Biological agents vary greatly in their ability to cause loss of life and economic damage. Some agents, if released properly, can kill many people and cause an extensive number of secondary infections; other agents will sicken only a small number of people for a short period of time. Consequently, several biological agents can potentially be used to perpetrate a bioterrorism attack but few are likely capable of causing a high consequence event. It is crucial, from a US national security perspective, to more deeply understand the likelihood that terrorist organizations can acquire the range of these agents. Few studies have attempted to comprehensively compile the technical information directly relevant to the acquisition of dangerous bacteria, viruses and toxins. In this report, technical fact sheets were assembled for 46 potentially dangerous biological agents. Much of the information was taken from various research sources which could ultimately and significantly expedite and improve bioterrorism threat assessments. By systematically examining a number of specific agent characteristics included in these fact sheets, it may be possible to detect, target, and implement measures to thwart future terrorist acquisition attempts. In addition, the information in these fact sheets may be used as a tool to help laboratories gain a rudimentary understanding of how attractive a method laboratory theft is relative to other potential acquisition modes.

  15. Learner uptake and acquisition in three grammar-oriented production activities

    NARCIS (Netherlands)

    Reinders, Hayo

    This study investigates the effects of three types of production activities on uptake (operationalized as correct suppliance of the target structure during the treatment) and acquisition of negative adverbs in English. It also investigates the relationship between uptake and acquisition. The three

  16. The Effects of Bilingualism on Infant Language Development : The Acquisition of Sounds and Words

    NARCIS (Netherlands)

    Liu, Liquan|info:eu-repo/dai/nl/369509870

    2014-01-01

    This dissertation reports on the influence of bilingualism on infants’ sound and word acquisition in the first two years of life. It targets the question of whether mono- and bilingual infants follow the same developmental trajectory of language acquisition, it displays similarities and differences

  17. Learner Uptake and Acquisition in Three Grammar-Oriented Production Activities

    Science.gov (United States)

    Reinders, Hayo

    2009-01-01

    This study investigates the effects of three types of production activities on uptake (operationalized as correct suppliance of the target structure during the treatment) and acquisition of negative adverbs in English. It also investigates the relationship between uptake and acquisition. The three production activities included a dictation, an…

  18. Learner uptake and acquisition in three grammar-oriented production activities

    NARCIS (Netherlands)

    Reinders, Hayo

    2009-01-01

    This study investigates the effects of three types of production activities on uptake (operationalized as correct suppliance of the target structure during the treatment) and acquisition of negative adverbs in English. It also investigates the relationship between uptake and acquisition. The three p

  19. Learner uptake and acquisition in three grammar-oriented production activities

    NARCIS (Netherlands)

    Reinders, Hayo

    2009-01-01

    This study investigates the effects of three types of production activities on uptake (operationalized as correct suppliance of the target structure during the treatment) and acquisition of negative adverbs in English. It also investigates the relationship between uptake and acquisition. The three p

  20. The Effects of Bilingualism on Infant Language Development : The Acquisition of Sounds and Words

    NARCIS (Netherlands)

    Liu, Liquan

    2014-01-01

    This dissertation reports on the influence of bilingualism on infants’ sound and word acquisition in the first two years of life. It targets the question of whether mono- and bilingual infants follow the same developmental trajectory of language acquisition, it displays similarities and differences

  1. Image and Sensor Data Processing for Target Acquisition and Recognition.

    Science.gov (United States)

    1980-11-01

    ou sites d’inter~t militeire, elles qua zones industriellac, zones’ urbaines , voies ferrdes, routes, adrodromes. Nous avons appliqud la...of this object type are an urban area, a forest, an agricultural field, etc. - point like objects have only a short length and a small area such as

  2. The Effect of Hovering Flares on Visual Target Acquisition

    Science.gov (United States)

    1975-01-01

    with an average descent rate of 7.2 ft/sec.5 Simulation of the tlare was accomplished by using a standard No. 47 pilot lamp, but operated 9 volts...100 knots. The nondominant eye of each subject was covered by an eye patch to simulate the absence of Stereovision , since at the actual ranges

  3. Surplus Management and Performance Evaluation of Target Company in Mergers and Acquisitions of China’s Manufacturing Industry%我国制造业并购中目标公司的盈余管理与并购绩效

    Institute of Scientific and Technical Information of China (English)

    赵息; 宫旭

    2014-01-01

    The article changes the traditional view and adopts the perspective of earnings management behavior of the target company to evaluate the earnings management in the process of mergers and acquisitions by using correlation analysis and principal component analysis. Combining with the surplus management model, it analyzes how a company’s earnings management behavior impacts M&A performance and re-examines whether M&A can actually bring real benefits to the target company. The research results show that there is a significantly different change of the target company earnings management behavior in the related years, earnings management and performance evaluation of M&A has a strong correlation and a positive correlation, and perhaps the M&A cannot bring the real improvement of evaluation.%在企业并购的过程中,改变常用的主并公司视角,结合2011年沪市发生并购的目标公司2010~2012年的财务数据,从目标公司的盈余管理行为角度,采用相关性分析和主成分分析,结合盈余管理模型,对目标公司在并购前后的盈余管理行为的变化以及这种变化对并购绩效的影响进行分析,重新审视并购是否能够真正给目标公司带来持久收益。研究结果表明:在并购发生前一年,当年,后一年的三年中,目标公司的盈余管理行为存在着显著不同的变化;盈余管理行为与并购的绩效评价有很强的相关性,且成正相关,并购可能并未带来真正的绩效改善。

  4. DATA ACQUISITION (DAQ)

    CERN Multimedia

    Gerry Bauer

    The CMS Storage Manager System The tail-end of the CMS Data Acquisition System is the Storage Manger (SM), which collects output from the HLT and stages the data at Cessy for transfer to its ultimate home in the Tier-0 center. A SM system has been used by CMS for several years with the steadily evolving software within the XDAQ framework, but until relatively recently, only with provisional hardware. The SM is well known to much of the collaboration through the ‘MiniDAQ’ system, which served as the central DAQ system in 2007, and lives on in 2008 for dedicated sub-detector commissioning. Since March of 2008 a first phase of the final hardware was commissioned and used in CMS Global Runs. The system originally planned for 2008 aimed at recording ~1MB events at a few hundred Hz. The building blocks to achieve this are based on Nexsan's SATABeast storage array - a device  housing up to 40 disks of 1TB each, and possessing two controllers each capable of almost 200 MB/sec throughput....

  5. A review of zoonotic disease surveillance supported by the Armed Forces Health Surveillance Center.

    Science.gov (United States)

    Burke, R L; Kronmann, K C; Daniels, C C; Meyers, M; Byarugaba, D K; Dueger, E; Klein, T A; Evans, B P; Vest, K G

    2012-05-01

    The Armed Forces Health Surveillance Center (AFHSC), Division of Global Emerging Infections Surveillance and Response System conducts disease surveillance through a global network of US Department of Defense research laboratories and partnerships with foreign ministries of agriculture, health and livestock development in over 90 countries worldwide. In 2010, AFHSC supported zoonosis survey efforts were organized into four main categories: (i) development of field assays for animal disease surveillance during deployments and in resource limited environments, (ii) determining zoonotic disease prevalence in high-contact species which may serve as important reservoirs of diseases and sources of transmission, (iii) surveillance in high-risk human populations which are more likely to become exposed and subsequently infected with zoonotic pathogens and (iv) surveillance at the human-animal interface examining zoonotic disease prevalence and transmission within and between human and animal populations. These efforts have aided in the detection, identification and quantification of the burden of zoonotic diseases such as anthrax, brucellosis, Crimean Congo haemorrhagic fever, dengue fever, Hantaan virus, influenza, Lassa fever, leptospirosis, melioidosis, Q fever, Rift Valley fever, sandfly fever Sicilian virus, sandfly fever Naples virus, tuberculosis and West Nile virus, which are of military and public health importance. Future zoonotic surveillance efforts will seek to develop local capacity for zoonotic surveillance focusing on high risk populations at the human-animal interface.

  6. Weighing in on Surveillance: Perception of the Impact of Surveillance on Female Ballet Dancers' Health

    Science.gov (United States)

    Dryburgh, Anne; Fortin, Sylvie

    2010-01-01

    The aim of this qualitative study was to investigate professional ballet dancers' perceptions of the impact of surveillance on their psychological and physical health. The theoretical framework was inspired by Foucault's writing, particularly his concepts of surveillance, power, discipline and docile bodies. Fifteen professional ballet dancers…

  7. Weighing in on Surveillance: Perception of the Impact of Surveillance on Female Ballet Dancers' Health

    Science.gov (United States)

    Dryburgh, Anne; Fortin, Sylvie

    2010-01-01

    The aim of this qualitative study was to investigate professional ballet dancers' perceptions of the impact of surveillance on their psychological and physical health. The theoretical framework was inspired by Foucault's writing, particularly his concepts of surveillance, power, discipline and docile bodies. Fifteen professional ballet dancers…

  8. Economics of zoonoses surveillance in a 'One Health' context: an assessment of Campylobacter surveillance in Switzerland.

    Science.gov (United States)

    Babo Martins, S; Rushton, J; Stärk, K D C

    2017-04-01

    Cross-sectorial surveillance and general collaboration between the animal and the public health sectors are increasingly recognized as needed to better manage the impacts of zoonoses. From 2009, the Swiss established a Campylobacter mitigation system that includes human and poultry surveillance data-sharing within a multi-sectorial platform, in a 'One Health' approach. The objective of this study was to explore the economics of this cross-sectorial approach, including surveillance and triggered interventions. Costs and benefits of the One Health and of the uni-sectorial approach to Campylobacter surveillance were identified using an economic assessment framework developed earlier. Cost information of surveillance activities and interventions was gathered and disability-adjusted life years (DALYs) associated with the disease estimated for 2008 and 2013. In the first 5 years of this One Health approach to Campylobacter mitigation, surveillance contributed with information mainly used to perform risk assessments, monitor trends and shape research efforts on Campylobacter. There was an increase in costs associated with the mitigation activities following integration, due mainly to the allocation of additional resources to research and implementation of poultry surveillance. The overall burden of campylobacteriosis increased by 3·4-8·8% to 1751-2852 DALYs in 2013. In the timing of the analysis, added value associated with this cross-sectorial approach to surveillance of Campylobacter in the country was likely generated through non-measurable benefits such as intellectual capital and social capital.

  9. Unforeseen costs of cutting mosquito surveillance budgets.

    Directory of Open Access Journals (Sweden)

    Gonzalo M Vazquez-Prokopec

    Full Text Available A budget proposal to stop the U.S. Centers for Disease Control and Prevention (CDC funding in surveillance and research for mosquito-borne diseases such as dengue and West Nile virus has the potential to leave the country ill-prepared to handle new emerging diseases and manage existing ones. In order to demonstrate the consequences of such a measure, if implemented, we evaluated the impact of delayed control responses to dengue epidemics (a likely scenario emerging from the proposed CDC budget cut in an economically developed urban environment. We used a mathematical model to generate hypothetical scenarios of delayed response to a dengue introduction (a consequence of halted mosquito surveillance in the City of Cairns, Queensland, Australia. We then coupled the results of such a model with mosquito surveillance and case management costs to estimate the cumulative costs of each response scenario. Our study shows that halting mosquito surveillance can increase the management costs of epidemics by up to an order of magnitude in comparison to a strategy with sustained surveillance and early case detection. Our analysis shows that the total costs of preparedness through surveillance are far lower than the ones needed to respond to the introduction of vector-borne pathogens, even without consideration of the cost in human lives and well-being. More specifically, our findings provide a science-based justification for the re-assessment of the current proposal to slash the budget of the CDC vector-borne diseases program, and emphasize the need for improved and sustainable systems for vector-borne disease surveillance.

  10. Organization of surveillance in GI practice.

    Science.gov (United States)

    Senore, Carlo; Bellisario, Cristina; Hassan, Cesare

    2016-12-01

    Several reports documented an inefficient utilisation of available resources, as well as a suboptimal compliance with surveillance recommendations. Although, evidence suggests that organisational issues can influence the quality of care delivered, surveillance protocols are usually based on non-organized approaches. We conducted a literature search (publication date: 01/2000-06/2016) on PubMed and Cochrane Database of Systematic Reviews, Database of Abstracts of Reviews of Effects and Cochrane Central Register of Controlled Trials for guidelines, or consensus statements, for surveys of practice, reporting information about patients, or providers attitudes and behaviours, for intervention studies to enhance compliance with guidelines. Related articles were also scrutinised. Based on the clinical relevance and burden on endoscopy services this review was focused on surveillance for Barrett's oesophagus, IBD and post-polypectomy surveillance of colonic adenomas. Existing guidelines are generally recognising structure and process requirements influencing delivery of surveillance interventions, while less attention had been devoted to transitions and interfaces in the care process. Available evidence from practice surveys is suggesting the need to design organizational strategies aimed to enable patients to attend and providers to deliver timely and appropriate care. Well designed studies assessing the effectiveness of specific interventions in this setting are however lacking. Indirect evidence from screening settings would suggest that the implementation of automated standardized recall systems, utilisation of clinical registries, removing financial barriers, could improve appropriateness of use and compliance with recommendations. Lack of sound evidence regarding utility and methodology of surveillance can contribute to explain the observed variability in providers and patients attitudes and in compliance with the recommended surveillance. Copyright © 2016 Elsevier

  11. Distributed data processing for public health surveillance

    Directory of Open Access Journals (Sweden)

    Yih Katherine

    2006-09-01

    Full Text Available Abstract Background Many systems for routine public health surveillance rely on centralized collection of potentially identifiable, individual, identifiable personal health information (PHI records. Although individual, identifiable patient records are essential for conditions for which there is mandated reporting, such as tuberculosis or sexually transmitted diseases, they are not routinely required for effective syndromic surveillance. Public concern about the routine collection of large quantities of PHI to support non-traditional public health functions may make alternative surveillance methods that do not rely on centralized identifiable PHI databases increasingly desirable. Methods The National Bioterrorism Syndromic Surveillance Demonstration Program (NDP is an example of one alternative model. All PHI in this system is initially processed within the secured infrastructure of the health care provider that collects and holds the data, using uniform software distributed and supported by the NDP. Only highly aggregated count data is transferred to the datacenter for statistical processing and display. Results Detailed, patient level information is readily available to the health care provider to elucidate signals observed in the aggregated data, or for ad hoc queries. We briefly describe the benefits and disadvantages associated with this distributed processing model for routine automated syndromic surveillance. Conclusion For well-defined surveillance requirements, the model can be successfully deployed with very low risk of inadvertent disclosure of PHI – a feature that may make participation in surveillance systems more feasible for organizations and more appealing to the individuals whose PHI they hold. It is possible to design and implement distributed systems to support non-routine public health needs if required.

  12. A surveillance model for sexually transmitted infections in India

    Directory of Open Access Journals (Sweden)

    Partha Haldar

    2015-01-01

    Full Text Available The strategy for prevention and control of sexually transmitted infections (STIs in India is based on syndromic case management delivered through designated STI/reproductive tract infection (RTI centers (DSRCs situated in medical colleges, district hospitals, and STI-clinics of targeted interventions programs. Laboratory tests for enhanced syndromic management are available at some sites. To ensure country-level planning and effective local implementation of STI services, reliable and consistent epidemiologic information is required on the distribution of STI cases, rate and trends of newly acquired infections, and STI prevalence in specific population groups. The present STI management information system is inadequate to meet these requirements because it is based on syndromic data and limited laboratory investigations on STIs reported passively by DSRCs and laboratories. Geographically representative information on the etiology of STI syndromes and antimicrobial susceptibility of STI pathogens although essential for optimizing available treatment options, is deficient. Surveillance must provide high quality information on: (a prevalence of STIs such as syphilis, trichomoniasis, gonorrhea, and chlamydia among high-risk groups; syphilis in the general population and pregnant antenatal women; (b demographic characteristics such as age, sex, new/recurrent episode, and type of syndromically diagnosed STI cases; (c proportion of acute infections such as urethral discharge (UD in men and nonherpetic genital ulcer disease (GUD in men and women; (d etiology of STI syndromes; and (e gonococcal antimicrobial susceptibility. We describe here a framework for an STI sentinel surveillance system in India, building on the existing STI reporting systems and infrastructure, an overview of the components of the proposed surveillance system, and operational challenges in its implementation.

  13. SAVY-4000 Field Surveillance Plan Update for 2017

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, Elizabeth J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Stone, Timothy Amos [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Smith, Paul Herrick [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Reeves, Kirk Patrick [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Veirs, Douglas Kirk [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Prochnow, David Adrian [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-03-20

    The Packaging Surveillance Program section of the Department of Energy (DOE) Manual 441.1-­1, Nuclear Material Packaging Manual (DOE 2008), requires DOE contractors to “ensure that a surveillance program is established and implemented to ensure the nuclear material storage package continues to meet its design criteria.”This 2017 update reflects changes to the surveillance plan resulting from surveillance findings as documented in Reeves et al. 2016. These findings include observations of corrosion in SAVY and Hagan containers and the indication (in one SAVY container) of possible filter membrane thermal degradation. This surveillance plan update documents the rationale for selecting surveillance containers, specifies the containers for 2017 surveillance, and identifies a minimum set of containers for 2018 surveillance. This update contains important changes to the previous surveillance plans.

  14. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  15. Surveillance issues in inflammatory bowel disease: ulcerative colitis.

    Science.gov (United States)

    Provenzale, D; Onken, J

    2001-02-01

    This review article on the surveillance of patients with ulcerative colitis provides an overview of the criteria for evaluating screening and surveillance programs and applies the criteria to the available evidence to determine the effectiveness of the surveillance of patients with ulcerative colitis. We examine the clinical outcomes associated with surveillance, the additional clinical time required to confirm the diagnosis of dysplasia and cancer, compliance with surveillance and follow-up, and the effectiveness of the individual components of a surveillance program, including colonoscopy and pathologist's interpretation. The disability associated with colectomy is considered, as are the cost and acceptability of surveillance programs. Patients with long-standing ulcerative colitis are at risk for developing colorectal cancer. Recommended surveillance colonoscopy should be supported. New endoscopic and histopathologic techniques to improve the identification of high-risk patients may enhance the effectiveness and cost-effectiveness of surveillance practices.

  16. Data acquisition techniques using PC

    CERN Document Server

    Austerlitz, Howard

    1991-01-01

    Data Acquisition Techniques Using Personal Computers contains all the information required by a technical professional (engineer, scientist, technician) to implement a PC-based acquisition system. Including both basic tutorial information as well as some advanced topics, this work is suitable as a reference book for engineers or as a supplemental text for engineering students. It gives the reader enough understanding of the topics to implement a data acquisition system based on commercial products. A reader can alternatively learn how to custom build hardware or write his or her own software.

  17. Target Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — [Part of the ATLAS user facility.] The Physics Division operates a target development laboratory that produces targets and foils of various thickness and substrates,...

  18. Target Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — [Part of the ATLAS user facility.] The Physics Division operates a target development laboratory that produces targets and foils of various thickness and substrates,...

  19. Toward More Efficient Surveillance of Barrett's Esophagus: Identification and Exclusion of Patients at Low Risk of Cancer.

    Science.gov (United States)

    Lindblad, Mats; Bright, Tim; Schloithe, Ann; Mayne, George C; Chen, Gang; Bull, Jeff; Bampton, Peter A; Fraser, Robert J L; Gatenby, Piers A; Gordon, Louisa G; Watson, David I

    2017-04-01

    Endoscopic surveillance of Barrett's esophagus (BE) is probably not cost-effective. A sub-population with BE at increased risk of high-grade dysplasia (HGD) or esophageal adenocarcinoma (EAC) who could be targeted for cost-effective surveillance was sought. The outcome for BE surveillance from 2003 to 2012 in a structured program was reviewed. Incidence rates and incidence rate ratios for developing HGD or EAC were calculated. Risk stratification identified individuals who could be considered for exclusion from surveillance. A health-state transition Markov cohort model evaluated the cost-effectiveness of focusing on higher-risk individuals. During 2067 person-years of follow-up of 640 patients, 17 individuals progressed to HGD or EAC (annual IR 0.8%). Individuals with columnar-lined esophagus (CLE) ≥2 cm had an annual IR of 1.2% and >8-fold increased relative risk of HGD or EAC, compared to CLE surveillance cohort after the first endoscopy to individuals with CLE ≥2 cm, or dysplasia, followed by a further restriction after the second endoscopy-exclusion of patients without intestinal metaplasia-removed 296 (46%) patients, and 767 (37%) person-years from surveillance. Limiting surveillance to the remaining individuals reduced the incremental cost-effectiveness ratio from US$60,858 to US$33,807 per quality-adjusted life year (QALY). Further restrictions were tested but failed to improve cost-effectiveness. Based on stratification of risk, the number of patients requiring surveillance can be reduced by at least a third. At a willingness-to-pay threshold of US$50,000 per QALY, surveillance of higher-risk individuals becomes cost-effective.

  20. A focused ethnographic study of Alberta cattle veterinarians' decision making about diagnostic laboratory submissions and perceptions of surveillance programs.

    Directory of Open Access Journals (Sweden)

    Kate Sawford

    Full Text Available The animal and public health communities need to address the challenge posed by zoonotic emerging infectious diseases. To minimize the impacts of future events, animal disease surveillance will need to enable prompt event detection and response. Diagnostic laboratory-based surveillance systems targeting domestic animals depend in large part on private veterinarians to submit samples from cases to a laboratory. In contexts where pre-diagnostic laboratory surveillance systems have been implemented, this group of veterinarians is often asked to input data. This scenario holds true in Alberta where private cattle veterinarians have been asked to participate in the Alberta Veterinary Surveillance Network-Veterinary Practice Surveillance, a platform to which pre-diagnostic disease and non-disease case data are submitted. Consequently, understanding the factors that influence these veterinarians to submit cases to a laboratory and the complex of factors that affect their participation in surveillance programs is foundational to interpreting disease patterns reported by laboratories and engaging veterinarians in surveillance. A focused ethnographic study was conducted with ten cattle veterinarians in Alberta. Individual in-depth interviews with participants were recorded and transcribed to enable thematic analysis. Laboratory submissions were biased toward outbreaks of unknown cause, cases with unusual mortality rates, and issues with potential herd-level implications. Decreasing cattle value and government support for laboratory testing have contributed to fewer submissions over time. Participants were willing participants in surveillance, though government support and collaboration were necessary. Changes in the beef industry and veterinary profession, as well as cattle producers themselves, present both challenges and opportunities in surveillance.