WorldWideScience

Sample records for tips email updates

  1. Email Updates

    Science.gov (United States)

    ... of this page: https://medlineplus.gov/listserv.html Email Updates To use the sharing features on this ... view your email history or unsubscribe. Prevent MedlinePlus emails from being marked as "spam" or "junk" To ...

  2. Email Reminders Increase the Frequency That Pet Owners Update Their Microchip Information

    Directory of Open Access Journals (Sweden)

    Katie Goodwin

    2018-01-01

    Full Text Available Stray animals with incorrect microchip details are less likely to be reclaimed, and unclaimed strays are at increased risk of euthanasia. A retrospective cohort study was performed using 394,747 cats and 904,909 dogs registered with Australia’s largest microchip database to describe animal characteristics, determine whether annual email reminders increased the frequency that owners updated their information, and to compare frequencies of microchip information updates according to pet and owner characteristics. More than twice as many dogs (70% than cats (30% were registered on the database; the most numerous pure-breeds were Ragdoll cats and Staffordshire Bull Terrier dogs, and the number of registered animals per capita varied by Australian state or territory. Owners were more likely (p < 0.001 to update their details soon after they were sent a reminder email, compared to immediately before that email, and there were significant (p < 0.001 differences in the frequency of owner updates by state or territory of residence, animal species, animal age, and socioeconomic index of the owner’s postcode. This research demonstrates that email reminders increase the probability of owners updating their details on the microchip database, and this could reduce the percentages of stray animals that are unclaimed and subsequently euthanized.

  3. Invited Review Article: Tip modification methods for tip-enhanced Raman spectroscopy (TERS) and colloidal probe technique: A 10 year update (2006-2016) review

    Science.gov (United States)

    Yuan, C. C.; Zhang, D.; Gan, Y.

    2017-03-01

    Engineering atomic force microscopy tips for reliable tip enhanced Raman spectroscopy (TERS) and colloidal probe technique are becoming routine practices in many labs. In this 10 year update review, various new tip modification methods developed over the past decade are briefly reviewed to help researchers select the appropriate method. The perspective is put in a large context to discuss the opportunities and challenges in this area, including novel combinations of seemingly different methods, potential applications of some methods which were not originally intended for TERS tip fabrication, and the problems of high cost and poor reproducibility of tip fabrication.

  4. Updated Tax Tips for Forest Landowners for the 2010 Tax Year

    Science.gov (United States)

    Linda Wang; John L. Greene

    2010-01-01

    This bulletin is updated as of Dec. 20, 2010, to include the changes from Public Law 111-31 enacted on Dec. 17, 2010. It provides tax tips for woodland owners and their tax advisors in the preparation of the 2010 individual tax return. Please be aware the information presented here is not legal or accounting advice. Consult your legal and tax advisors for more complete...

  5. Teaching Tip: Improving Students' Email Communication through an Integrated Writing Assignment in a Third-Year Toxicology Course.

    Science.gov (United States)

    Kedrowicz, April A; Hammond, Sarah; Dorman, David C

    Client communication is important for success in veterinary practice, with written communication being an important means for veterinarian-client information sharing. Effective communication is adapted to clients' needs and wants, and presents information in a clear, understandable manner while accounting for varying degrees of client health literacy. This teaching tip describes the use of a mock electronic mail assignment as one way to integrate writing into a required veterinary toxicology course. As part of this project, we provide baseline data relating to students' written communication that will guide further development of writing modules in other curricula. Two independent raters analyzed students' writing using a coding scheme designed to assess adherence to the guidelines for effective written health communication. Results showed that the majority of students performed satisfactorily or required some development with respect to recommended guidelines for effective written health communication to facilitate client understanding. These findings suggest that additional instruction and practice should emphasize the importance of incorporating examples, metaphors, analogies, and pictures to create texts that are comprehensible and memorable to clients. Recommendations are provided for effective integration of writing assignments into the veterinary medicine curriculum.

  6. [TIPS

    Science.gov (United States)

    Brazzini, Augusto; Carrillo, Alvaro; Cantella, Raúl

    1998-01-01

    Esophageal hemorrage due to variceal bleeding in cirrhotic patients represents a serious problem for the physician in charge, especially in this country where liver transplants are inexistent; and also, it is a drama for the patient and its familly. We propose here the Transjugular Intrahepatic Portosystemic Shunt (TIPS). Twenty one patients were part of a study where 23 TIPS were placed, observing an immediate improval in 18 of them, a rebleeding in 2, within the first 24 and 48 hours. An embolization of the coronary veins was performed in the procedure in 15 patients, and a second intervention due to rebleeding in 2 of them. In the latter patients, the embolization of the coronary veins was rutinary.The survival of the patients has been outstanding.We conclude that this interventional procedure is a worldwide reality in the treatment of esophageal hemorrage by variceal bleeding due to portal hipertension, and it does not cut down the probability of liver transplant, unfortunately inexistent in our country. This procedure results in a low morbimortality with an adequate quality of life.

  7. Email Negotiation

    OpenAIRE

    Bülow, Anne Marie

    2010-01-01

    This paper investigates a set of email negotiations in order to explain a high number of deadlocks. The paper argues that one reason is the combination of cognitive effort characteristic of the e-mail genre, and the argumentative pattern found when two parties simultaneously try to persuade the other of the justice of their cause. For a negotiation involving the wording of a contract, the evidence suggests that, while there is a distinct advantage in the features of reviewability and revis...

  8. Email Negotiation

    DEFF Research Database (Denmark)

    Bülow, Anne Marie

    the other of the justice of their cause. For a negotiation involving the wording of a contract, the evidence suggests that, while there is a distinct advantage in the features of reviewability and revisablity, the email format allows selective attention to the other party’s arguments, which can be shown...

  9. Therapeutic emails

    Directory of Open Access Journals (Sweden)

    Sinkule Jennifer

    2007-02-01

    Full Text Available Abstract Background In this paper, we show how counselors and psychologists can use emails for online management of substance abusers, including the anatomy and content of emails that clinicians should send substance abusers. Some investigators have attempted to determine if providing mental health services online is an efficacious delivery of treatment. The question of efficacy is an empirical issue that cannot be settled unless we are explicitly clear about the content and nature of online treatment. We believe that it is not the communications via internet that matters, but the content of these communications. The purpose of this paper is to provide the content of our online counseling services so others can duplicate the work and investigate its efficacy. Results We have managed nearly 300 clients online for recovery from substance abuse. Treatment included individual counseling (motivational interviewing, cognitive-behavior therapy, relapse prevention assignments, participation in an electronic support group and the development of a recovery team. Our findings of success with these interventions are reported elsewhere. Our experience has led to development of a protocol of care that is described more fully in this paper. This protocol is based on stages of change and relapse prevention theories and follows a Motivational Interviewing method of counseling. Conclusion The use of electronic media in providing mental health treatment remains controversial due to concerns about confidentiality, security and legal considerations. More research is needed to validate and generalize the use of online treatment for mental health problems. If researchers have to build on each others work, it is paramount that we share our protocols of care, as we have done in this paper.

  10. Email shape analysis

    OpenAIRE

    Sroufe, Paul; Phithakkitnukoon, Santi; Dantu, Ram; Cangussu, João

    2010-01-01

    Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering, and social-context bas...

  11. E-mail marketing

    OpenAIRE

    Jurnečková, Jana

    2014-01-01

    The thesis deals with e-mail marketing. It focuses on identifying factors that affect the behavior of users of e-mail and newsletter subscribers. It evaluates the role of e-mail marketing as a part of communication mix of companies and e-shops, current trends, e-mail campaigns, e-mail marketing software provider. To study the behavior of users of e-mail and newsletter subscribers a questionnaire survey was conducted on a sample of 610 respondents and in-depth interviews (n = 30). Content anal...

  12. Hacked E-mail

    Science.gov (United States)

    ... your email address was “spoofed,” or faked, and hackers don’t actually have access to your account. ... use public Wi-Fi .) Tagged with: antivirus , email , hacker , imposter , password , phishing , scam , social networking July 2013 ...

  13. Efektivitas Email Untuk Pemasaran

    OpenAIRE

    Oetomo, Budi Sutedjo Dharma

    2009-01-01

    Lebih dari 500 juta orang dan badan USAha telah tergabung di internet. Pada umumnya, mereka telah terbiasa untuk memanfaatkan fitur dan aplikasi yang tersedia di internet, seperti email, mailing list, web, blog dan situs jejaring sosial. Diantara fitur dan aplikasi internet itu yang hampir digunakan oleh setiap orang dan badan USAha adalah email, karena mereka telah memiliki alamat email, bahkan lebih dari satu buah. Kini, fitur email telah dimanfaatkan untuk kegiatan pemasaran, khususnya pro...

  14. RECEIVING UNWANTED EMAIL?

    CERN Multimedia

    Denise Heagerty

    2002-01-01

    Unsolicited email, commonly known as SPAM, is a growing problem across the Internet at large. You are recommended to delete it. If the email looks suspicious, do not even open it (from Outlook you can delete email using the right button of your mouse to select the message and then selecting delete). Viruses are often hidden inside attachments, so do not open attachments in unsolicited email. SPAM and virus emails can be disguised to trick you into reading the email and/or performing an action. Here are examples of some techniques to help you recognise them: fake email addresses: emails can appear to be from people you know or even from yourself. Your own email address can appear in emails which you did not send, resulting in non-delivery messages or unexpected replies. Fake addresses may be used to send viruses. If the email looks suspicious then delete it and do not open the attachments. If you are unsure then check with the sender first. enticing subjects: the email subject uses words to make you curious...

  15. Fluctuations in email size

    Science.gov (United States)

    Matsubara, Yoshitsugu; Musashi, Yasuo

    2017-12-01

    The purpose of this study is to explain fluctuations in email size. We have previously investigated the long-term correlations between email send requests and data flow in the system log of the primary staff email server at a university campus, finding that email size frequency follows a power-law distribution with two inflection points, and that the power-law property weakens the correlation of the data flow. However, the mechanism underlying this fluctuation is not completely understood. We collected new log data from both staff and students over six academic years and analyzed the frequency distribution thereof, focusing on the type of content contained in the emails. Furthermore, we obtained permission to collect "Content-Type" log data from the email headers. We therefore collected the staff log data from May 1, 2015 to July 31, 2015, creating two subdistributions. In this paper, we propose a model to explain these subdistributions, which follow log-normal-like distributions. In the log-normal-like model, email senders -consciously or unconsciously- regulate the size of new email sentences according to a normal distribution. The fitting of the model is acceptable for these subdistributions, and the model demonstrates power-law properties for large email sizes. An analysis of the length of new email sentences would be required for further discussion of our model; however, to protect user privacy at the participating organization, we left this analysis for future work. This study provides new knowledge on the properties of email sizes, and our model is expected to contribute to the decision on whether to establish upper size limits in the design of email services.

  16. E-mail marketing

    OpenAIRE

    TŮMOVÁ, Kateřina

    2012-01-01

    The aim of this work is to specify the e-mail marketing and in the practical application to evaluate the pros and cons of e-mail marketing as a tool of targeted marketing communication.Based on personal interviews with representatives of the company was described their existing e-mail marketing.Through the survey it was found, how customers perceive the company's e-mail marketing.Based on the survey, changes were proposed at the end of the thesis.

  17. FNAL central email systems

    Energy Technology Data Exchange (ETDEWEB)

    Schmidt, Jack; Lilianstrom, Al; Pasetes, Ray; Hill, Kevin; /Fermilab

    2004-10-01

    The FNAL Email System is the primary point of entry for email destined for an employee or user at Fermilab. This centrally supported system is designed for reliability and availability. It uses multiple layers of protection to help ensure that: (1) SPAM messages are tagged properly; (2) All mail is inspected for viruses; and (3) Valid mail gets delivered. This system employs numerous redundant subsystems to accomplish these tasks.

  18. Tips for Buying Exercise Equipment

    Science.gov (United States)

    ... Diet Ads Jobs & Making Money Privacy, Identity & Online Security Blog Video & Media Scam Alerts Get health and fitness updates by email Looking for business guidance on health claims? Get Email Updates Blog Feed Facebook YouTube Twitter The Federal Trade Commission (FTC) is ...

  19. EmailTime: visual analytics and statistics for temporal email

    Science.gov (United States)

    Erfani Joorabchi, Minoo; Yim, Ji-Dong; Shaw, Christopher D.

    2011-01-01

    Although the discovery and analysis of communication patterns in large and complex email datasets are difficult tasks, they can be a valuable source of information. We present EmailTime, a visual analysis tool of email correspondence patterns over the course of time that interactively portrays personal and interpersonal networks using the correspondence in the email dataset. Our approach is to put time as a primary variable of interest, and plot emails along a time line. EmailTime helps email dataset explorers interpret archived messages by providing zooming, panning, filtering and highlighting etc. To support analysis, it also measures and visualizes histograms, graph centrality and frequency on the communication graph that can be induced from the email collection. This paper describes EmailTime's capabilities, along with a large case study with Enron email dataset to explore the behaviors of email users within different organizational positions from January 2000 to December 2001. We defined email behavior as the email activity level of people regarding a series of measured metrics e.g. sent and received emails, numbers of email addresses, etc. These metrics were calculated through EmailTime. Results showed specific patterns in the use email within different organizational positions. We suggest that integrating both statistics and visualizations in order to display information about the email datasets may simplify its evaluation.

  20. Detecting and combating malicious email

    CERN Document Server

    Ryan, Julie JCH

    2014-01-01

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both perso...

  1. Tips for TIPS

    NARCIS (Netherlands)

    Cuijpers, C.F.

    2015-01-01

    The transjugular intrahepatic portosystemic shunt (TIPS) procedure is one of the most technically challenging procedures in interventional radiology. During the procedure, interventional radiologists (IRs) insert very thin and long instruments through a little incision in the patient’s neck. They

  2. 6 Tips to Avoid Medication Mistakes

    Science.gov (United States)

    ... use. Computerized Medication Box FDA has cleared for marketing the Electronic Medication Management Assistant (EMMA), a programmable ... for You Sign up for Consumer Updates by E-mail Page Last Updated: 04/02/2018 Note: If ...

  3. Tipping Point

    Medline Plus

    Full Text Available ... death electrical fall furniture head injury product safety television tipover tv Watch the video in Adobe Flash ... tv tip-overs. The force of a large television falling from tipping furniture can be staggering. A ...

  4. CPAP Tips

    Science.gov (United States)

    ... now Try it free Find out why Close CPAP Tips from FDA USFoodandDrugAdmin Loading... Unsubscribe from USFoodandDrugAdmin? ... apnea and use a continuous positive airway pressure (CPAP) device when sleeping? Here are some tips from ...

  5. Tipping Point

    Medline Plus

    Full Text Available ... and furniture, appliance and tv tip-overs. The force of a large television falling from tipping furniture ... 50 lb. TV falls with about the same force as child falling from the third story of ...

  6. Tipping Point

    Medline Plus

    Full Text Available ... Tipping Point by CPSC Blogger September 22, 2009 appliance child Childproofing CPSC danger death electrical fall furniture ... about horrible accidents involving young children and furniture, appliance and tv tip-overs. The force of a ...

  7. Tipping Point

    Medline Plus

    Full Text Available ... en español Blog About OnSafety CPSC Stands for Safety The Tipping Point Home > 60 Seconds of Safety (Videos) > The Tipping Point The Tipping Point by ... danger death electrical fall furniture head injury product safety television tipover tv Watch the video in Adobe ...

  8. Email for clinical communication between healthcare professionals.

    Science.gov (United States)

    Goyder, Clare; Atherton, Helen; Car, Mate; Heneghan, Carl J; Car, Josip

    2015-02-20

    Email is one of the most widely used methods of communication, but its use in healthcare is still uncommon. Where email communication has been utilised in health care, its purposes have included clinical communication between healthcare professionals, but the effects of using email in this way are not well known. We updated a 2012 review of the use of email for two-way clinical communication between healthcare professionals. To assess the effects of email for clinical communication between healthcare professionals on healthcare professional outcomes, patient outcomes, health service performance, and service efficiency and acceptability, when compared to other forms of communicating clinical information. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 9 2013), MEDLINE (OvidSP) (1946 to August 2013), EMBASE (OvidSP) (1974 to August 2013), PsycINFO (1967 to August 2013), CINAHL (EbscoHOST) (1982 to August 2013), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched November 2013). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies, and interrupted time series studies examining interventions in which healthcare professionals used email for communicating clinical information in the form of: 1) unsecured email, 2) secure email, or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two authors independently assessed studies for inclusion, assessed the included studies' risk of bias, and extracted data. We contacted study authors for additional information and have reported all measures as per the study report. The previous version of this review included one randomised controlled

  9. E-mail: Outlook Express

    Directory of Open Access Journals (Sweden)

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu layanan Internet yang sangat penting adalah electronic mail atau sering hanya disebut sebagai e-mail. Untuk menggunakan e-mail, diperlukan piranti lunak khusus supaya pengguna dapat mengirim dan menerima e-mail. Jenis piranti lunak e-mail diantaranya adalah Outlook Express yang merupakan satu paket yang didistribusikan bersama Internet Explorer versi 4. Piranti lunak ini dijalankan pada PC yang mempunyai sistem operasi Windows 95 atau 98. Jenis piranti lunak e-mail yang lain adalah Eudora, Pegasus dan sebagainya. Bahkan ada yang diintegrasikan dengan Web Browser (alat untuk menelusuri situs Web misalnya IE,dan Netscape.Sebagai layaknya pelayanan pos, maka setiap pengguna e-mail mempunyai alamat tertentu yang tidak mungkin dipunyai oleh pengguna lainnya diseluruh dunia. Untuk keperluan pendistribusian, maka e-mail mempunyai semacam kantor pos yang ditempatkan dalam sebuah komputer server (mail server atau sering disebut sebagai host. 

  10. Common Knowledge in Email Exchanges

    NARCIS (Netherlands)

    Sietsma, F.; Apt, K.R.

    We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. This allows us to

  11. Common knowledge in email exchanges

    NARCIS (Netherlands)

    Sietsma, F.; Apt, K.R.

    2011-01-01

    We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. This allows us to

  12. CPAP Tips

    Medline Plus

    Full Text Available ... now Try it free Find out why Close CPAP Tips from FDA USFoodandDrugAdmin Loading... Unsubscribe from USFoodandDrugAdmin? ... apnea and use a continuous positive airway pressure (CPAP) device when sleeping? Here are some tips from ...

  13. Technology Tips

    Science.gov (United States)

    Mathematics Teacher, 2004

    2004-01-01

    Some inexpensive or free ways that enable to capture and use images in work are mentioned. The first tip demonstrates the methods of using some of the built-in capabilities of the Macintosh and Windows-based PC operating systems, and the second tip describes methods to capture and create images using SnagIt.

  14. Tipping Point

    Medline Plus

    Full Text Available ... OnSafety CPSC Stands for Safety The Tipping Point Home > 60 Seconds of Safety (Videos) > The Tipping Point ... 24 hours a day. For young children whose home is a playground, it’s the best way to ...

  15. Tipping Point

    Medline Plus

    Full Text Available ... 60 Seconds of Safety (Videos) > The Tipping Point The Tipping Point by CPSC Blogger September 22, 2009 appliance child Childproofing CPSC danger death electrical fall furniture head injury product safety television tipover tv Watch the video in Adobe Flash ...

  16. Mifrenz: Safe email for children

    Directory of Open Access Journals (Sweden)

    Tim Hunt

    Full Text Available Products currently available for monitoring children\\'s email usage are either considered to encourage dubious ethical behaviour or are time consuming for parents to administer. This paper describes the development of a new email client application for children called Mifrenz. This new application gives parents the ability to let their children safely use email, with the minimum of intervention. It was developed using mostly free software and also with the desire to provide real first hand programming examples to demonstrate to students.

  17. Tipping Point

    Medline Plus

    Full Text Available ... fall furniture head injury product safety television tipover tv Watch the video in Adobe Flash format. Almost ... accidents involving young children and furniture, appliance and tv tip-overs. The force of a large television ...

  18. Tipping Point

    Medline Plus

    Full Text Available ... of a large television falling from tipping furniture can be staggering. A 50 lb. TV falls with ... story of a building. That kind of impact can kill a child or cause severe injuries. About ...

  19. Tipping Point

    Medline Plus

    Full Text Available ... Point by CPSC Blogger September 22, 2009 appliance child Childproofing CPSC danger death electrical fall furniture head ... see news reports about horrible accidents involving young children and furniture, appliance and tv tip-overs. The ...

  20. CPAP Tips

    Medline Plus

    Full Text Available ... sleeping? Here are some tips from the U.S. Food and Drug Administration (FDA) on how to safely and effectively use your CPAP device. Category Education License Standard YouTube License Show more Show ...

  1. CPAP Tips

    Medline Plus

    Full Text Available ... opinion count. Sign in ... and use a continuous positive airway pressure (CPAP) device when sleeping? Here are some tips from the U.S. Food and Drug Administration (FDA) on how to safely ...

  2. Tipping Point

    Medline Plus

    Full Text Available ... third story of a building. That kind of impact can kill a child or cause severe injuries. ... to prevent a tip-over tragedy. Share Post Facebook Twitter Google Plus Reddit Connect with Me:  Visit ...

  3. Four Medication Safety Tips for Older Adults

    Science.gov (United States)

    ... Products For Consumers Home For Consumers Consumer Updates 4 Medication Safety Tips for Older Adults Share Tweet ... you are experiencing could be due to medications. 4. Review Medications with Your Health Care Provider Ideally, ...

  4. Email Adaptation for Conflict Handling

    DEFF Research Database (Denmark)

    Lee, Joyce Yi‐Hui; Panteli, Niki; Bülow, Anne Marie

    2018-01-01

    This paper explores the context of email‐based communication in anestablished but fragile, inter‐organisational partnership, which wasoften overlain with conflict. Drawing upon adaptation theory, thisstudy explores how participants adapt to the use of email to handleconflict. Extensive data were...... obtained during a 6‐month field studyof a case of cross‐border inter‐organisational collaboration in EastAsia. We observed that the individuals involved in the cross‐borderpartnership used email as a lean form of communication to stopcovert conflict from explicitly emerging. In contrast to prior researchon...... the leanness of email in managing conflict, we found that underthe described conflict situation the very leanness of emailwas appreciated and thus, exploited by those concerned tomanage the conflict situation. Specifically, we identified 4 keyconflict‐triggered adaptation strategies, namely...

  5. CPAP Tips

    Medline Plus

    Full Text Available ... Get YouTube Red. Working... Not now Try it free Find out why Close CPAP Tips from FDA ... safely and effectively use your CPAP device. Category Education License Standard YouTube License Show more Show less ...

  6. Tipping Point

    Medline Plus

    Full Text Available ... to prevent a tip-over tragedy. Share Post Facebook Twitter Google Plus Reddit Connect with Me:  Visit other Web Sites Maintained by CPSC: cpsc.gov| poolsafely.gov| recalls.gov| saferproducts.gov Privacy, Security, and Legal Notice | Accessibility Policy | Open Government @ ...

  7. CPAP Tips

    Medline Plus

    Full Text Available ... starting stop Loading... Watch Queue Queue __count__/__total__ It’s YouTube. Uninterrupted. Loading... Want music and videos with ... ads? Get YouTube Red. Working... Not now Try it free Find out why Close CPAP Tips from ...

  8. CPAP Tips

    Medline Plus

    Full Text Available ... sleeping? Here are some tips from the U.S. Food and Drug Administration (FDA) on how to safely and effectively use your CPAP device. Category ... Ambulance Service 21,588 views 4:34 Obstructive Sleep Apnea ...

  9. CPAP Tips

    Medline Plus

    Full Text Available ... sleeping? Here are some tips from the U.S. Food and Drug Administration (FDA) on how to safely ... Developers +YouTube Terms Privacy Policy & Safety Send feedback Test new features Loading... Working... Sign in to add ...

  10. Tip enhancement

    CERN Document Server

    Kawata, Satoshi

    2007-01-01

    This book discusses the recent advances in the area of near-field Raman scattering, mainly focusing on tip-enhanced and surface-enhanced Raman scattering. Some of the key features covered here are the optical structuring and manipulations, single molecule sensitivity, analysis of single-walled carbon nanotubes, and analytic applications in chemistry, biology and material sciences. This book also discusses the plasmonic materials for better enhancement, and optical antennas. Further, near-field microscopy based on second harmonic generation is also discussed. Chapters have been written by some of the leading scientists in this field, who present some of their recent work in this field.·Near-field Raman scattering·Tip-enhanced Raman spectroscopy·Surface-enhanced Raman spectroscopy·Nano-photonics·Nanoanalysis of Physical, chemical and biological materials beyond the diffraction limits·Single molecule detection

  11. Sistema Automatizado de Emailing Marketing

    OpenAIRE

    Martínez López, Javier

    2010-01-01

    Projecte final de carrera realitzat en col.laboració amb E-xpertel S.A El presente proyecto describe el diseño e implementación de un sistema de automatización de campañas de marketing a través de email hacia clientes y/o clientes potenciales. Este sistema tiene como objetivos principales adquirir nuevos clientes y conseguir la delización de los mismos. El sistema se complementa con una plataforma CRM (Customer Relationship Management) para el mantenimiento de datos de empresa...

  12. The Importance of Etiquette in School Email

    Science.gov (United States)

    Filippone, Monica; Survinski, Melissa

    2016-01-01

    This article investigates the appropriate use of email among secondary and postsecondary students and instructors and provides recommendations for proper email etiquette. A review of the current literature shows that poor email etiquette can impact the working relationship between teachers and students. Evidence indicates that email etiquette must…

  13. Email-Set Visualization: Facilitating Re-Finding in Email Archives

    OpenAIRE

    Gorton, Douglas; Murthy, Uma; Vemuri, Naga Srinivas; Pérez-Quiñones, Manuel A.

    2007-01-01

    In this paper we describe ESVT – EmailSet Visualization Tool, an email archive tool that provides users a visualization to re-find and discover information in their email archive. ESVT is an end-to-end email archive tool that can be used from archiving a user’s email messages to visualizing queries on the email archive. We address email archiving by allowing import of email messages from an email server or from a standard existing email client. The central idea in ESVT’s visualization, an “em...

  14. Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

    OpenAIRE

    De Wang; Danesh Irani; Calton Pu

    2014-01-01

    With the increasing dedication and sophistication of spammers, email spam is a persistent problem even today. Popular social network sites such as Facebook, Twitter, and Google+ are not exempt from email spam as they all interface with email systems. While some report predicts that email spam business is dying due to the decreasing volume of email spam. Whether email spam business is really dying is an interesting question. In this paper, we analyze email spam trends on Spam Archive dataset, ...

  15. Perancangan Email Client Dengan Pengklasifikasian Email Menggunakan Algoritma Vector Space Model

    OpenAIRE

    Christian, Moses

    2015-01-01

    On today's age of technology, widely used email to send information throughout the world. During the classification of the email is still done manually and less objective. So in this study, the authors apply the method of Vector Space Model (VSM) to make an automatic email classification and more objective. With this method of email classification can be done automatically based on address, subject, and body of an email that allows users to email in the organization of every incoming email in...

  16. Making Nuclear Malaysia Email Archives Portable

    International Nuclear Information System (INIS)

    Shaharum Ramli

    2013-01-01

    Nuclear Malaysia e-mails can be accessed from any computer and anywhere, even worldwide, via web access. However, this mobility is lost when the e-mails are moved to a personal computer into archive files such as Microsoft Outlook data files. Outlook e-mail archives can only be read on the computer where it is stored. This removal has to be done because of storage space constraints on the e-mail server. This paper shows how e-mail archives can be made portable, brought and read anywhere using a free portable e-mail client application such as Mozilla Thunderbird, Portable Edition. (author)

  17. Conversation Threads Hidden within Email Server Logs

    Science.gov (United States)

    Palus, Sebastian; Kazienko, Przemysław

    Email server logs contain records of all email Exchange through this server. Often we would like to analyze those emails not separately but in conversation thread, especially when we need to analyze social network extracted from those email logs. Unfortunately each mail is in different record and those record are not tided to each other in any obvious way. In this paper method for discussion threads extraction was proposed together with experiments on two different data sets - Enron and WrUT..

  18. Understanding email communication of persons with aphasia

    NARCIS (Netherlands)

    Al Mahmud, A.; Martens, J.B.O.S.

    2011-01-01

    An email program has been developed by the Aphasia Union Netherlands (AVN) to enhance communication between aphasics mutually and with their therapists. In this paper we report intermediate evaluation results of the AVN email program. We evaluated the email program in two ways: a. by analyzing the

  19. Detection of Illegitimate Emails using Boosting Algorithm

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    and spam email detection. For our desired task, we have applied a boosting technique. With the use of boosting we can achieve high accuracy of traditional classification algorithms. When using boosting one has to choose a suitable weak learner as well as the number of boosting iterations. In this paper, we......In this paper, we report on experiments to detect illegitimate emails using boosting algorithm. We call an email illegitimate if it is not useful for the receiver or for the society. We have divided the problem into two major areas of illegitimate email detection: suspicious email detection...

  20. On Successful E-Mail Writing

    Directory of Open Access Journals (Sweden)

    Vesna Vulić

    2009-12-01

    Full Text Available This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette or ‘Netiquette’ and it is therefore important that whether it be for business or private use, the basics of e-mail etiquette are followed. When writing an e-mail it is important to consider the recipient. Careful consideration will determine the content and style of the e-mail. No less important is knowing the points of detail in writing e-mail. That is, to be clear and concise in the specific information that the e-mail should contain. Furthermore, abbreviations, acronyms and emoticons are frequently found in e-mail and their use should also be considered. An e-mail is a valuable communication tool and it is essential to use it effectively in order to improve both professional and private communication.

  1. Email English with new social media section and phrase bank of useful expressions

    CERN Document Server

    Emmerson, Paul

    2013-01-01

    Email English will help students of English to write effective and convincing communications, whether for work or study, whether by email or via social media. Based on hundreds of real examples, Email English deals systematically with key language for constructing effective and convincing emails in English as well as developing an appropriate voice through social media. Basics, including opening and closing emails, giving information, making requests, arranging meetings and checking understanding. Specific situations, such as negotiating, asking for payment and dealing with a supplier or customer. Skills such as describing business trends, relating cause and effect and reporting. General grammar problems, for instance, sentence structure, verb forms, comparison and punctuation. Communication styles: formal and informal, direct and indirect, ways of seeming friendlier. A NEW social media section presents strategies, tips and key language and expressions for writing blogs and on social media platforms such as F...

  2. Assessing e-mail intent and tasks in e-mail messages

    NARCIS (Netherlands)

    Sappelli, M.; Pasi, G.; Verberne, S.; Boer, M. de; Kraaij, W.

    2016-01-01

    In this paper, we analyze corporate e-mail messages as a medium to convey work tasks. Research indicates that categorization of e-mail could alleviate the common problem of information overload. Although e-mail clients provide possibilities of e-mail categorization, not many users spend effort on

  3. Using Insights from Email Users to Inform Organisational Email Management Policy

    Science.gov (United States)

    Ramsay, Judith; Renaud, Karen

    2012-01-01

    One would expect email substantially to increase organisational productivity and efficiency. There is little empirical evidence of this since email use is such a complex tool that it would be well nigh impossible to attribute efficiency increases solely to email. There is anecdotal evidence of the positive aspects of email (Phillips, S.R. and…

  4. Enter your email-address: how German internet users manage their email addresses

    NARCIS (Netherlands)

    Utz, S.

    2004-01-01

    Writing E-mail is the most popular Internet activity. Meanwhile, many people have more than one E-mail address. The question how people manage their E-mail addresses, more specifically, whether they use them deliberately for different purposes, is the central question of this paper. E-mail addresses

  5. Theoretical Approaches on Successful Email Marketing Campaigns

    Directory of Open Access Journals (Sweden)

    Camelia Budac

    2016-01-01

    This paper aims to bring some clarifications on what could bring success to email marketingcampaigns. Responses are related to how sent emails can draw the attention of people (ie how theycan be observed, given that, users’ inboxes are invaded by messages of all kinds, how to measurethe results of a campaign and which are the best practices through which we can get higher returnsfrom email marketing campaigns.

  6. Transparent Proxy for Secure E-Mail

    Science.gov (United States)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  7. On Successful E-Mail Writing

    OpenAIRE

    Vesna Vulić

    2009-01-01

    This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette o...

  8. E-mail security: mail clients must use encrypted protocols

    CERN Multimedia

    2006-01-01

    In the coming weeks, users of mail clients other than Outlook (e.g. Pine, Mozilla, Mac Mail, etc.) may receive an e-mail from Mail-service@cern.ch with instructions to update the security settings of their mail client. The aim of this campaign is to enforce the use of encrypted and authenticated mail protocols in order to prevent the propagation of viruses and protect passwords from theft. As a first step, from 6 June 2006 onwards, access to mail servers from outside CERN will require a securely configured mail client as described in the help page http://cern.ch/mmmservices/Help/?kbid=191040. On this page most users will also find tools that will update their mail client settings automatically. Note that Outlook clients and WebMail access are not affected. The Mail Team

  9. Barbecue Basics: Tips to Prevent Foodborne Illness

    Medline Plus

    Full Text Available ... Español Search FDA Submit search Popular Content Home Food Drugs Medical Devices Radiation-Emitting Products Vaccines, ... Biologics Animal & Veterinary Cosmetics Tobacco Products For Consumers Home For Consumers Consumer Updates Barbecue Basics: Tips to ...

  10. Restaurant Dining: Seven Tips for Staying Gluten Free

    Science.gov (United States)

    GiG Education Bulletin Restaurant Dining: Seven Tips for Staying Gluten-Free Updated May 2014 Tips for Dining Away from Home 1. Selection of ... a number of factors, including the type of restaurant you choose. • Be careful in restaurants where language ...

  11. MedlinePlus Connect: Email List

    Science.gov (United States)

    ... MedlinePlus Connect → Email List URL of this page: https://medlineplus.gov/connect/emaillist.html MedlinePlus Connect: Email ... will change.) Old URLs New URLs Web Application https://apps.nlm.nih.gov/medlineplus/services/mpconnect.cfm? ...

  12. CEAI: CCM based Email Authorship Identification Model

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah

    2013-01-01

    In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some...... more interesting and effective features for email authorship identification (e.g. the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell). We also included Info Gain feature selection based...... reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM)-based models, as well as the models proposed by Iqbal et al. [1, 2]. The proposed model attains an accuracy rate of 94% for 10...

  13. Twitter Tips, Tricks, and Tweets

    CERN Document Server

    McFedries, Paul

    2010-01-01

    Maximize your fun and boost your productivity with this updated, full-color guide to tantalizing Twitter tips!. The popularity of Twitter continues to soar, and is fast becoming the most popular social networking site online. Whether you're looking to learn how to set up an account for the first time or are on the prowl for some cool third-party Twitter apps, this full-color guide will boost your entire Twitter experience. Allowing you to communicate with fellow Twitters within a 140-character limit, this fun and fascinating social networking tool is easier than maintaining a blog and quicker

  14. Did You Get My E-Mail? Moving E-Mails beyond the Inbox

    Science.gov (United States)

    Ellis, Susan J.

    2011-01-01

    The challenge today is how to make e-mail and other forms of electronic communication effective in motivating volunteer action. Is it possible to make e-mails feel personal and welcoming? E-mail, instant messaging, texting, and social media are tools that allow individuals to communicate quickly and inexpensively, but they are lifeless without the…

  15. Tips on Blood Testing

    Science.gov (United States)

    ... Test Pain, Discomfort and Anxiety Tips to Help Children through Their Medical Tests Tips to Help the Elderly through Their Medical Tests Find Us On Social Media: Facebook Twitter Google Plus Footer Menu Home About ...

  16. Tip-over Prevention: Adaptive Control Development

    Science.gov (United States)

    2015-05-30

    Tip-over Prevention: Adaptive Control Development Leah Kelley Massachusetts Institute of Technology Cambridge, MA 02139 Email: lckelley@mit.edu Kurt...Papadopoulos and D. Rey, Proc. IEEE ICRA, vol.4, 1996, pp. 3111. [7] S. Ali, A. Moosavian, and K. Alipour, Robotics, Automation and Mechatronics , 2006 IEEE Conf...on, 2006, pp. 1–6. [8] K. Talke, L. Kelley, P. Longhini, and G. Catron, Proc. SPIE 9084, Unmanned Systems Technology XVI, June 2014, pp. 90 840L–11

  17. The TIPS Liquidity Premium

    DEFF Research Database (Denmark)

    Andreasen, Martin Møller; Christensen, Jens H.E.; Simon Riddell, Simon

    We introduce an arbitrage-free term structure model of nominal and real yields that accounts for liquidity risk in Treasury inflation-protected securities (TIPS). The novel feature of our model is to identify liquidity risk from individual TIPS prices by accounting for the tendency that TIPS, lik...

  18. Application for automatic e-mail forwarding

    OpenAIRE

    Skupek, Rok

    2010-01-01

    The diploma thesis has two main goals: the first objective is to develop a dynamic library, which will contain methods able to download e-mail messages from mail server using POP3 protocol. The second objective involves development of application for processing and distribution of e-mail messages. Introduction cointains presentation of a practical application example in real time situation. Here are described procedures used for development of server - client communication library, which u...

  19. Tip studies using CFD and comparison with tip loss models

    DEFF Research Database (Denmark)

    Hansen, Martin Otto Laver; Johansen, J.

    2004-01-01

    The flow past a rotating LM8.2 blade equipped with two different tips are computed using CFD. The different tip flows are analysed and a comparison with two different tip loss models is made. Keywords: tip flow, aerodynamics, CFD......The flow past a rotating LM8.2 blade equipped with two different tips are computed using CFD. The different tip flows are analysed and a comparison with two different tip loss models is made. Keywords: tip flow, aerodynamics, CFD...

  20. New method for assessing risks of email

    Science.gov (United States)

    Raja, Seyyed H.; Afrooz, Farzad

    2013-03-01

    E-mail technology, has become one of the requirements of human lives for correspondence between individuals. Given this, the important point is that the messages, server and client of e-mail and correspondences that exchanged between different people have acceptable security, to make people sure to use of this technology. In the information age, many of financial and non financial transactions are done electronically, data exchange takes place via the internet and theft and manipulation of data can make exorbitant cost in terms of integrity, financial, political, economic and culture. E-mail correspondence in there is same and it is very important. With review took place, a method that will focus on email system for risks assessment is not provided. We are examining ways of assessing for other systems and their strengths and weaknesses, then we use Mr Convery method for assessing email risks which it is for assessing network risks. At the end of paper we have offered special table for email risk assessment.

  1. Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

    Directory of Open Access Journals (Sweden)

    De Wang

    2014-05-01

    Full Text Available With the increasing dedication and sophistication of spammers, email spam is a persistent problem even today. Popular social network sites such as Facebook, Twitter, and Google+ are not exempt from email spam as they all interface with email systems. While some report predicts that email spam business is dying due to the decreasing volume of email spam. Whether email spam business is really dying is an interesting question. In this paper, we analyze email spam trends on Spam Archive dataset, which contains 5.5 million spam emails over 15 years (1998 – 2013. We statistically analyze emails contents including header information (e.g. content type and embedded items (e.g. URL links. Also, we investigate topic drift using topic modeling technique. Moreover, we perform network analysis on sender-to-receiver IP routing networks. Our study shows the dynamic nature of email spam over one and a half decades and demonstrate that the email spam business is not dying but more capricious.

  2. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  3. Troubleshooting Requests e-mail Confirmation

    CERN Multimedia

    TS Department

    2004-01-01

    In an ongoing effort to improve quality of the repair requests, a new e-mail confirmation automatic system will be implemented starting from the 21st October. All repair requests transmitted to the TCR (72201) or the FM Helpdesk (77777) will be confirmed in an e-mail to the requestor, provided that the latter has a valid e-mail address in the HR database. The e-mail will contain a reference number, a brief description of the problem, the location and a contact where more information can be obtained. A second e-mail will be sent when the processing of the repair request is finished. We hope that this initiative will improve the transparency and quality of our service. Helpdesk Troubleshooting Requests (reminder) We remind you that all the repair requests and other communication concerning the CERN machine buildings have to be transmitted to the TCR via 72201, whereas the ones concerning tertiary buildings are handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equ...

  4. Enhancement of Email Security in Nuclear Malaysia

    International Nuclear Information System (INIS)

    Mohd Fauzi Haris; Raja Murzaferi Raja Moktar; Saaidi Ismail; Mohd Dzul Aiman Aslan; Mohamad Safuan Sulaiman

    2013-01-01

    Task to protect network and data security is not simple and easy. The more advance ICT technology available in the market, the more dependability to the knowledge, skills and appropriate tools would be in order one to cater these threats. Cyber security threats can be considered almost impossible to be demolished or at least to be avoided totally and what we really need is technical capabilities that may include appropriate knowledge and tools to reduce the cyber threats in the organization. Email is one of the important today's application that is being used by many people all around the globe either they are in corporate organizations, government bodies, students and teachers. The total number of worldwide email accounts is expected to increase from 3.3 billion accounts in 2012 to over 4.3 billion accounts by year-end 2016. This represents an average annual growth rate of 6% over the next four years [1]. Parallel with the increment of the usage, number of abusive and misuse of the email is also reported either in the form of spamming, delivery of malicious file attachments, phishing and others. These show the importance to tighten up the security of the email. This paper will discuss and share actions that have been taken by IT Center to enhance the security of official email application. (author)

  5. The Security Email Based on Smart Card

    Science.gov (United States)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  6. Online Counseling Using Email: A Qualitative Study

    Science.gov (United States)

    Salleh, Amla; Hamzah, Ramlan; Nordin, Norazah; Ghavifekr, Simin; Joorabchi, Toktam Namyandeh

    2015-01-01

    Despite numerous studies in increasingly popular online mental health service, the nature of the relationship between online counselors and their clients, particularly in the email modality, deserves more attention. To enhance the knowledge in this area, this study was conducted to explore whether the online counseling relationship could be…

  7. E-mail security a pocket guide

    CERN Document Server

    Furnell, Steven

    2010-01-01

    This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.

  8. Network Analysis with the Enron Email Corpus

    Science.gov (United States)

    Hardin, J. S.; Sarkis, G.; URC, P. .

    2015-01-01

    We use the Enron email corpus to study relationships in a network by applying six different measures of centrality. Our results came out of an in-semester undergraduate research seminar. The Enron corpus is well suited to statistical analyses at all levels of undergraduate education. Through this article's focus on centrality, students can explore…

  9. Fighting Spam: Moving Email to the Cloud

    Science.gov (United States)

    Schrader, Andrew

    2011-01-01

    On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…

  10. Secure e-mail and Web browsing

    CERN Multimedia

    CERN. Geneva

    2009-01-01

    This is an entry-level 1.5-hour training course aimed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. Register at CTA

  11. SPAM: Beware of emails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and must never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake emails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake email message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, however future cases may still occur. Users need to be vigilant for any requests for passwords or personal data. Fake emails should be immediately deleted. In case of questions on this topic, you may contact helpdesk@cern.ch. CERN IT Department

  12. AAP Updates Recommendations on Car Seats

    Science.gov (United States)

    ... Size Email Print Share AAP Updates Recommendations on Car Seats Page Content Article Body Children should ride ... of approved car safety seats. Healthy Children Radio: Car Seat Safety Dennis Durbin, MD, FAAP, lead author ...

  13. Social networking through email : studying email usage patterns of persons with aphasia

    NARCIS (Netherlands)

    Al Mahmud, A.; Martens, J.B.O.S.

    2016-01-01

    Background: A social networking program has been developed by the Aphasia Union Netherlands (AVN) to enhance communication between older persons with aphasia (PWA) mutually and with their therapists. The medium of communication is email. Aims: The aim of the paper is to understand the email usage

  14. ADHD: Tips to Try

    Science.gov (United States)

    ... Staying Safe Videos for Educators Search English Español ADHD: Tips to Try KidsHealth / For Teens / ADHD: Tips to Try Print en español TDAH: Consejos que puedes probar ADHD , short for attention deficit hyperactivity disorder , is a ...

  15. Total Telephone Tips.

    Science.gov (United States)

    Corder, Lloyd E.; And Others

    This manual of telephone behavior tips for business and sales professionals offers ways to handle the disgruntled caller and makes suggestions on topics relevant to the telephone. The manual is divided into the following sections and subsections: (1) Common Courtesy (staff tips, answering the telephone, screening calls, transferring calls, taking…

  16. Tip Cells in Angiogenesis

    NARCIS (Netherlands)

    M.G. Dallinga (Marchien); S.E.M. Boas (Sonja); I. Klaassen (Ingeborg); R.M.H. Merks (Roeland); C.J.F. van Noorden; R.O. Schlingemann (Reinier)

    2015-01-01

    htmlabstractIn angiogenesis, the process in which blood vessel sprouts grow out from a pre-existing vascular network, the so-called endothelial tip cells play an essential role. Tip cells are the leading cells of the sprouts; they guide following endothelial cells and sense their environment for

  17. Clustering and classification of email contents

    Directory of Open Access Journals (Sweden)

    Izzat Alsmadi

    2015-01-01

    Full Text Available Information users depend heavily on emails’ system as one of the major sources of communication. Its importance and usage are continuously growing despite the evolution of mobile applications, social networks, etc. Emails are used on both the personal and professional levels. They can be considered as official documents in communication among users. Emails’ data mining and analysis can be conducted for several purposes such as: Spam detection and classification, subject classification, etc. In this paper, a large set of personal emails is used for the purpose of folder and subject classifications. Algorithms are developed to perform clustering and classification for this large text collection. Classification based on NGram is shown to be the best for such large text collection especially as text is Bi-language (i.e. with English and Arabic content.

  18. INTELLIGENT E-MAIL PERSONALIZATION SYSTEM

    Directory of Open Access Journals (Sweden)

    SHANMUGASUNDARAM HARIHARAN

    2011-02-01

    Full Text Available In Internet era E-mail has become the most important mode of communication in every day life. E-mail offers several advantages like secure delivery, speed, cheaper cost, acknowledgement report, transparent service, and distributed environment. As spammers try to induce large amount of spam or unsolicited mails, managing these E-mails’s in an efficient manner requires huge attention. This paper focus on personalizing the E-mail messages after eliminating the spam messages. The basic step starts with pre-processing the documents and classifying the contents into several folders or categories. The next step is to cluster the documents based on the relativeness they have using cosine similarity metric. This clustering approach is carried out using unsupervised method. The mail messages are the parsed through a filter that would identify the spam immediately. Studies on personalization of mails after spam identification, prioritizing the E-mail’s based on the importance and summarization of were also proposed. The results were quiet promising leading to efficient spam identification providing a platform for further improvements to build a domain independent personalizer system.

  19. E-mail to SMS service change

    CERN Multimedia

    IT Department

    2010-01-01

    If you have a CERN e-mail account, you have probably already used one of the popular services that CERN’s IT Department offers to CERN users: the mail2SMS service. It allows any CERN e-mail account holder to send short messages (SMS) free of charge to CERN GSM phone numbers. Further to recent negotiations with our GSM operator, this service has been extended. It is now possible to send short messages free of charge to any Swiss mobile number. This extension of service aims at replacing the similar service that was made available by SWITCH(1) to CERN users (address: mobilenumber@sms.switch.ch). Because of repeated abuse, this service will be definitively stopped for CERN users on 15th January 2010. Please keep in mind that CERN’s e-mail to SMS service still has some restrictions: messages can only be sent from CERN mail accounts, and not from personal ones, such as GMAIL, MSN, Yahoo; the maximum length of the message is 160 characters (standard maximum SMS length); and only Swiss mobile...

  20. Safety Tips: Basketball (For Parents)

    Science.gov (United States)

    ... Staying Safe Videos for Educators Search English Español Safety Tips: Basketball KidsHealth / For Parents / Safety Tips: Basketball ... make sure they follow these tips. Why Basketball Safety Is Important Fortunately, very few basketball injuries are ...

  1. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... the liver). Portal hypertension can also occur in children, although children are much less likely to require a TIPS. ... intentionally to solve the problem. Although extremely rare, children may also require a TIPS procedure. TIPS in ...

  2. Lightning Safety Tips and Resources

    Science.gov (United States)

    ... Services Careers Contact Us Glossary Safety National Program Lightning Safety Tips and Resources Weather.gov > Safety > Lightning Safety Tips and Resources Lightning Resources Lightning strikes ...

  3. Low Vision Tips

    Science.gov (United States)

    ... this page: https://medlineplus.gov/lowvision.html MedlinePlus: Low Vision Tips We are sorry. MedlinePlus no longer maintains the For Low Vision Users page. You will still find health resources ...

  4. Diabetes: Dental Tips

    Science.gov (United States)

    Diabetes: Dental Tips For more copies contact: National Institute of Dental and Craniofacial Research National Oral Health Information Clearinghouse ... damage the gum and bone that hold your teeth in place and may lead to painful chewing ...

  5. Incontinence Treatment: Dietary Tips

    Science.gov (United States)

    ... helpful, please consider supporting IFFGD with a small tax-deductible donation. Lifestyle Changes Dietary Tips Medication Bowel ... arises requiring an expert’s care. © Copyright 1998-2018 International Foundation for Functional Gastrointestinal Disorders, Inc. (IFFGD). All ...

  6. Using Email to Improve Parental Involvement in Middle School

    Science.gov (United States)

    Radin, Benjamin Theodore

    2013-01-01

    The purpose of this study was to test the relationship between the type of school-to-home communication (regularly sent, structured emails versus ad hoc emails), the originator of these emails (teacher or student), and Parental Involvement (PI) as measured according to the frequency of email contact and distribution of student and parent emails…

  7. Email and Epistolary technologies: Presence, Intimacy, Disembodiment

    Directory of Open Access Journals (Sweden)

    Esther Milne

    2003-01-01

    Full Text Available A key problem for critical media practice is how to assess accurately the technological impact, historical significance and cultural consequences of a particular change in a communications system. Contemporary theorising about the impact of electronic, digitally networked culture is often articulated within an eschatological narrative of apocalypse and last things. The old is cast as naive and redundant while the new appears triumphant, conquering and redemptive. Washing away the sins of the old, the new technology arrives, it seems, out of nowhere. In response to such socio-technological representations, this paper argues that the dialectic between old and new communication systems is more complex than has been assumed by contemporary media theory. Rather than a narrative of radical changes, decisive shifts and abrupt breaks, the relation between epistolary and email technology reveals certain continuities. Specifically, tropes of presence and intimacy are traced through three media sites: a "virtual community" of British nineteenth-century letter writers, the postcard correspondence of an Australian First World War soldier and a twenty first century email discussion list. Mapping these sites reveals a central paradox of technological and discursive cultural practice, namely, that material signifiers can be used to produce incorporeal presence.

  8. Voting-based Classification for E-mail Spam Detection

    Directory of Open Access Journals (Sweden)

    Bashar Awad Al-Shboul

    2016-06-01

    Full Text Available The problem of spam e-mail has gained a tremendous amount of attention. Although entities tend to use e-mail spam filter applications to filter out received spam e-mails, marketing companies still tend to send unsolicited e-mails in bulk and users still receive a reasonable amount of spam e-mail despite those filtering applications. This work proposes a new method for classifying e-mails into spam and non-spam. First, several e-mail content features are extracted and then those features are used for classifying each e-mail individually. The classification results of three different classifiers (i.e. Decision Trees, Random Forests and k-Nearest Neighbor are combined in various voting schemes (i.e. majority vote, average probability, product of probabilities, minimum probability and maximum probability for making the final decision. To validate our method, two different spam e-mail collections were used.

  9. Magnet pole tips

    Science.gov (United States)

    Thorn, Craig E.; Chasman, Chellis; Baltz, Anthony J.

    1984-04-24

    An improved magnet which more easily provides a radially increasing magnetic field, as well as reduced fringe field and requires less power for a given field intensity. The subject invention comprises a pair of spaced, opposed magnetic poles which further comprise a pair of pole roots, each having a pole tip attached to its center. The pole tips define the gap between the magnetic poles and at least a portion of each pole tip is separated from its associated pole root. The separation begins at a predetermined distance from the center of the pole root and increases with increasing radial distance while being constant with azimuth within that portion. Magnets in accordance with the subject invention have been found to be particularly advantageous for use in large isochronous cyclotrons.

  10. E-mail, decisional styles, and rest breaks.

    Science.gov (United States)

    Baker, James R; Phillips, James G

    2007-10-01

    E-mail is a common but problematic work application. A scale was created to measure tendencies to use e-mail to take breaks (e-breaking); and self-esteem and decisional style (vigilance, procrastination, buck-passing, hypervigilance) were used to predict the self-reported and actual e-mail behaviors of 133 participants (students and marketing employees). Individuals who were low in defensive avoidance (buck-passing) engaged in more e-mailing per week, both in time spent on e-mail and message volume. E-breakers were more likely to engage in behavioral procrastination and spent more time on personal e-mail.

  11. Improved flare tip design

    Energy Technology Data Exchange (ETDEWEB)

    Gogolek, P. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Energy Technology Centre

    2004-07-01

    This paper discusses the testing procedures and development of an improved flare tip design. Design objectives included performance equal to or better than utility flares at low wind speed; conversion efficiency; fuel slip; smoking; significant improvement at high wind speed; and no increase in trace emissions. A description of the testing facility of the flare tip was provided, with reference to the fact that the facility allowed for realistic near full scale gas flares in a single-pass flare test facility. Other details of the facility included: an adjustable ceiling; high capacity variable speed fan; sampling ports along working section in stack; windows along working section; and air cooled walls, floor, and ceiling. The fuels used in the flare tip included natural gas, propane, gasoline and inert gases. Details of wind speed, appurtenances and turbulence generating grids were presented, with reference to continuous gas emission measurements. A list of design constraints was provided. Flare performance included wind speed, turbulence and fuel composition. A chart of conversion inefficiencies with a correlation of wind speed and turbulence, fuel flow and pipe size was also presented. Several new tip designs were fabricated for testing, with screening tests for comparison to basic pipe and ranking designs. Significant improvements were found in one of the new designs, including results with 30 per cent propane in fuel. Emissions reduction from 10 to 35 per cent were noted. It was concluded that future work should focus on evaluating improved tip for stability at low wind speeds. Fuel slips are the primary source of emissions, and it was recommended that further research is necessary to improve existing flare tips. tabs, figs.

  12. Productivity tips for developers

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    I like to read about productivity tools and techniques, but the problem is - most of them are completely overrated, the tips are not that useful or they are too difficult to implement. But, sometimes I can find some stuff that really makes me think "damn, how could I live without this before?!". Today, I would like to share some of them and hopefully hear about the tips and tricks that you use. Maybe we can find a way to share them somehow (github repo/forum)?

  13. Sports Dehydration Safety Tips

    Science.gov (United States)

    Sports Dehydration Safety Tips Everything you need to know to keep your kids safe from dehydration when playing sports. To keep kids in top ... to stay hydrated by drinking plenty of fluids. Dehydration occurs when a body loses more water than ...

  14. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  15. Students’ Use of Email and Facebook: A Comparative Perspective

    OpenAIRE

    Rahman, Synthia Bintey

    2013-01-01

    Facebook and email have become widely used communication media to Internet users. University students are a major part of Internet users and they use email and Facebook for multiple communication purposes. This research investigates the context of using Facebook and email by university students, the context of choosing any of the medium in respective communication over the last two years, and student perceptions with regard to Facebook and email as communication media. This study was accompli...

  16. Electronic Identities: The Strategic Use of Email for Impression Management.

    Science.gov (United States)

    Kersten, Larry; Phillips, Stephen R.

    Traditionally, e-mail (electronic mail) has been seen as an efficient communications medium for the transmission of simple, routine, unambiguous messages. More recent research has argued that the simple, efficient view of e-mail is incomplete. Future research should be extended into the strategic and symbolic functions of email, such as the use of…

  17. A Generalized Email Classification System for Workflow Analysis

    NARCIS (Netherlands)

    P. Chaipornkaew (Piyanuch); T. Prexawanprasut (Takorn); C-L. Chang (Chia-Lin); M.J. McAleer (Michael)

    2017-01-01

    textabstractOne of the most powerful internet communication channels is email. As employees and their clients communicate primarily via email, much crucial business data is conveyed via email content. Where businesses are understandably concerned, they need a sophisticated workflow management

  18. Using Mobile-Based Email for English Foreign Language Learners

    Science.gov (United States)

    Alzu'bi, Mohammad Akram mohammad; Sabha, Muhannad Rushdi Nimer

    2013-01-01

    This study aimed at investigating the role of Mobile-based Email in improving Ajloun College English Students' Achievement. It attempts to answer the following questions: What is the potential contribution of mobile-based email exchanged to writing skills? What is the potential contribution of mobile-based email exchanged to vocabulary…

  19. Teaching Email Politeness in the EFL/ESL Classroom

    Science.gov (United States)

    Economidou-Kogetsidis, Maria

    2015-01-01

    Writing status-congruent emails is a skill that requires high pragmatic competence and awareness of the politeness conventions and email etiquette that need to be followed. Planning and composing such emails pose a greater challenge for EFL learners who use English in "lingua franca" communication (ELF), as they not only often struggle…

  20. You’ve Got Email: a Workflow Management Extraction System

    NARCIS (Netherlands)

    P. Chaipornkaew (Piyanuch); T. Prexawanprasut (Takorn); M.J. McAleer (Michael)

    2017-01-01

    textabstractEmail is one of the most powerful tools for communication. Many businesses use email as the main channel for communication, so it is possible that substantial data are included in email content. In order to help businesses grow faster, a workflow management system may be required. The

  1. Investigasi Forensik Pada E-Mail Spoofing Menggunakan Metode Header Analysis

    OpenAIRE

    Hoiriyah, Hoiriyah; Sugiantoro, Bambang; Prayudi, Yudi

    2016-01-01

    Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar informasi. Hal ini memungkinkan pihak ketiga menyalahgunakan email untuk mendapatkan informasi secara ilegal dengan mengubah identitas pengirim email dan menjadikannya seperti email yang berasal dari email yang sah (legitimate email), aktivitas tersebut biasa dikenal dengan istilah email spoofing. Untuk dapat mendeteksi adanya email spoofing, maka perlu adanya investigasi forensik email terhadap ...

  2. Update History of This Database - AT Atlas | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available List Contact us AT Atlas Update History of This Database Date Update contents 2013/12/16 The email address i... ( http://www.tanpaku.org/atatlas/ ) is opened. About This Database Database Description Download License Update History of This Data...base Site Policy | Contact Us Update History of This Database - AT Atlas | LSDB Archive ...

  3. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... or bypass, without the risks that accompany open surgery. TIPS is a minimally invasive procedure that typically has a shorter recovery time than surgery. Your TIPS should have less of an effect ...

  4. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... then placed in this tunnel to keep the pathway open. Patients who typically need a TIPS have ... and stomach. A TIPS procedure involves creating a pathway through the liver that connects the portal vein ( ...

  5. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... and/or hydrothorax (in the chest). Budd-Chiari syndrome , a blockage in one or more veins that ... intentionally to solve the problem. Although extremely rare, children may also require a TIPS procedure. TIPS in ...

  6. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... pressure. top of page How does the procedure work? A TIPS reroutes blood flow in the liver ... filtered out by the liver. The TIPS may cause too much of these substances to bypass the ...

  7. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... the esophagus and stomach. A TIPS procedure involves creating a pathway through the liver that connects the ... diseases. This can result in significant challenges in creating the TIPS. top of page Additional Information and ...

  8. Tips for Living with Scleroderma

    Science.gov (United States)

    ... Patients Tips for Living Tips for Living with Scleroderma Ways to help manage your symptoms The Scleroderma ... help find improved therapies and a cure for scleroderma! Your gift today will be matched to have ...

  9. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... TIPS. top of page What are some common uses of the procedure? A TIPS is used to ... community, you can search the ACR-accredited facilities database . This website does not provide cost information. The ...

  10. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... pressure. top of page How does the procedure work? A TIPS reroutes blood flow in the liver ... recovery time than surgery. Your TIPS should have less of an effect than open surgical bypass on ...

  11. Characterization of metal-coated fiber tip for NSOM lithography by tip-to-tip scan

    International Nuclear Information System (INIS)

    Kubicova, I.; Pudis, D.; Suslik, L.; Skriniarova, J.

    2011-01-01

    For the optical field characterization, a tip-to-tip scan of two metal-coated fiber tips with circular aperture at the apex was performed. The optical field irradiated from the fiber probe in illumination mode was analyzed by NSOM represented by fiber probe in collection mode. The near-field intensity profile of the source fiber tip in the plane perpendicular to the axis of the tip was taken. Experimental stage requires high resolution 3D motion system controlled by computer (Fig. 1). The source and the detector fiber tip were placed on the moving and static part of the 3D nanoposition system, respectively. As a light source, a modulated 473 nm DPSS laser was used. After the source fiber tip characterization, the NSOM lithography was performed. In the experimental setup from Fig. 1, the detector fiber tip was replaced by a sample fixed in a vacuum holder. As a sample, a 600 nm positive photoresist AZ 5214E was spin-coated on a GaAs substrate. Exposure was carried out by irradiation of the sample at desired positions through the fiber tip aperture. The sample was developed in AZ 400K developer for 30 s and rinsed in DI water. A promising tip-to-tip scanning technique for characterization of metal-coated fiber tips with aperture at the apex was presented. Nearly-circular aperture shapes were documented from NSOM measurements with diameter estimated to be less than 460 nm. By knowing the source-detector distance and the FWHM of the near-field intensity profile, the tip-to-tip scan proves an easy and fast method to analyze the fiber tip aperture properties. The fiber tip resolution was confirmed by preparation of 2D planar structures in thin photoresist layer, where the NSOM lithography uses the metal-coated fiber tip characterized in previous section. (authors)

  12. Tip-modified Propellers

    DEFF Research Database (Denmark)

    Andersen, Poul

    1999-01-01

    The paper deals with tip-modified propellers and the methods which, over a period of two decades, have been applied to develop such propellers. The development is driven by the urge to increase the efficiency of propellers and can be seen as analogous to fitting end plates and winglets to aircraft...... propeller, have efficiency increases of a reasonable magnitude in both open-water and behind-ship conditions....

  13. Factors that impact nurses' use of electronic mail (e-mail).

    Science.gov (United States)

    Hughes, J A; Pakieser, R A

    1999-01-01

    As electronic applications are used increasingly in healthcare, nurses are being challenged to adopt them. Electronic mail (e-mail) is an electronic tool with general as well as healthcare uses. E-mail use may be an opportunity to learn a tool that requires skills similar to those used in other applications. This study aimed to identify barriers and facilitators that impact nurses' use of e-mail in the workplace. Data for this study were gathered using focus group methodology. Content analysis identified and labeled factors into seven major categories. Specific factors identified were generally consistent with those previously described in the literature as affecting use of computers in general. However, there were several additional factors identified that were not reported in other previous studies: lack of face-to-face communication, individual writing skills, recency of any educational experience, volume of mail received, password integrity, and technical support. Findings from this study provide information for any individual involved in introducing or updating an e-mail system in a healthcare environment.

  14. Update of CERN exchange network

    CERN Multimedia

    2003-01-01

    An update of the CERN exchange network will be done next April. Disturbances or even interruptions of telephony services may occur from 4th to 24th April during evenings from 18:30 to 00:00 but will not exceed more than 4 consecutive hours (see tentative planning below). CERN divisions are invited to avoid any change requests (set-ups, move or removals) of telephones and fax machines from 4th to 25th April. Everything will be done to minimize potential inconveniences which may occur during this update. There will be no loss of telephone functionalities. CERN GSM portable phones won't be affected by this change. Should you need more details, please send us your questions by email to Standard.Telephone@cern.ch. DateChange typeAffected areas April 11 Update of switch in LHC 4 LHC 4 Point April 14 Update of switch in LHC 5 LHC 5 Point April 15 Update of switches in LHC 3 and LHC 2 Points LHC 3 and LHC 2 April 22 Update of switch N4 Meyrin Ouest April 23 Update of switch  N6 Prévessin Site Ap...

  15. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... or suggestion into the following text box: Comment: E-mail: Area code: Phone no: Thank you! Do ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  16. Anticipating hidden text salting in emails (extended abstract)

    OpenAIRE

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  17. Using Rhythms of Relationships to Understand Email Archives

    National Research Council Canada - National Science Library

    Perer, Adam; Shneiderman, Ben; Oard, Douglas W

    2005-01-01

    ...: analyzing the temporal rhythms of social relationships. We provide methods for constructing meaningful rhythms from the email headers by identifying relationships and interpreting their attributes. With these visualization techniques, email archive explorers can uncover insights that may have been otherwise hidden in the archive. We apply our methods to an individual's fifteen-year email archive, which consists of about 45,000 messages and over 4,000 relationships.

  18. FRMAC Updates

    International Nuclear Information System (INIS)

    Mueller, P.

    1995-01-01

    This talks describes updates in the following updates in FRMAC publications concerning radiation emergencies: Monitoring and Analysis Manual; Evaluation and Assessment Manual; Handshake Series (Biannual) including exercises participated in; environmental Data and Instrument Transmission System (EDITS); Plume in a Box with all radiological data stored onto a hand-held computer; and courses given

  19. Are You Managing Your Email - Or is Email Managing You? An Analysis of Email Among Personnel Within Army Project Management Offices

    National Research Council Canada - National Science Library

    Baroni, Brian; Cook, Linda; Keitelman, Marian; Miller, Steven; Wardle, Adelia

    2005-01-01

    Based on a class project that developed leadership communication competencies for seven levels of Army civilians, email was found to be the most prevalent means of communication, regardless of leadership level...

  20. PENGIRIMAN E-MAIL SPAM SEBAGAI KEJAHATAN CYBER DI INDONESIA

    Directory of Open Access Journals (Sweden)

    Eka Nugraha Putra

    2018-01-01

    Full Text Available The Internet is part of the development of technology, where the internet provides many impacts, both positive and negative. Currently, privacy issues on the internet have also become a complicated legal issue, this is due to quite a number of privacy-related issues, but not all countries in the world manage privacy issues on the internet. As a means of communicating the Internet has introduced e-mail that provides convenience and practicality. But in its development e-mail has an adverse impact on its users in the form of e-mail spam. In terms of its actions, sending spam e-mail is quite a disadvantage, even violate the privacy. Some countries have also set it to one type of cybercrime (cybercrime. This research will discuss e-mail spam in Indonesia, how the legislation in Indonesia see the action of this spam e-mail, is there any possibility of spam e-mail is criminalized as a cybercrime. The research will also look at how spam e-mails violate privacy and review and analyze internet privacy settings in Indonesia in relation to the criminalization of spam email.

  1. Decisional style, mood and work communication: email diaries.

    Science.gov (United States)

    Shirren, S; Phillips, J G

    2011-10-01

    To understand the use of technology to support interpersonal interaction, a theory of decisional style was applied to email use within the workplace. Previous research has used self-report and rating scales to address employee email behaviours, but this falls short of management's capability to monitor the actual behaviour. Thirty-nine employed individuals completed a five-day communication diary recording their actual behaviour upon receiving personal and work-related emails as well as the Melbourne Decision Making Questionnaire and the Depression Anxiety Stress Scales. It was found that vigilant individuals were more likely to use email in an efficient manner by deleting personal email and being less likely to open email later. Procrastinators, buckpassers and people experiencing high levels of negative affect were all more likely to delay dealing with email, which could be viewed as dealing with email in a less efficient manner. STATEMENT OF RELEVANCE: This work offers insights as to how people receive and process emails and is thus relevant to the development and implementation of collaborative technologies. Whilst other studies use individual's self-reports, this study uses a more accurate communication diary. Decisional style can predict the monitoring and response to electronic communication.

  2. Reaching consumers: How the tobacco industry uses email marketing.

    Science.gov (United States)

    Brock, Betsy; Carlson, Samantha C; Moilanen, Molly; Schillo, Barbara A

    2016-12-01

    Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the state of Minnesota, US between January 2010 and May 2015 to determine email frequency by brand. These emails were gathered as part of ongoing surveillance of tobacco industry direct marketing. A subset of these emails received between October 2014 and May 2015 (n = 1646) were content analyzed to identify the purpose of the email communication along with type of product promoted. Tobacco companies use email to communicate with consumers on a regular basis. This communication was observed to be as frequent as nine times per month. Emails are most commonly used to promote contests (54.1%), content on tobacco company websites (39.1%), and tobacco coupons (15.7%). Email promotion of menthol-flavored tobacco products was common and was associated with promotion of coupons. Emails promoting menthol had a 1.9 times higher prevalence of also promoting coupons (95% CI: 1.52-2.37). Little is known about tobacco company email marketing and this study fills an identified research gap. A deeper understanding of this type of marketing is needed in order to counter tobacco industry messaging and advance tobacco control.

  3. Reaching consumers: How the tobacco industry uses email marketing

    Directory of Open Access Journals (Sweden)

    Betsy Brock

    2016-12-01

    Full Text Available Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the state of Minnesota, US between January 2010 and May 2015 to determine email frequency by brand. These emails were gathered as part of ongoing surveillance of tobacco industry direct marketing. A subset of these emails received between October 2014 and May 2015 (n = 1646 were content analyzed to identify the purpose of the email communication along with type of product promoted. Tobacco companies use email to communicate with consumers on a regular basis. This communication was observed to be as frequent as nine times per month. Emails are most commonly used to promote contests (54.1%, content on tobacco company websites (39.1%, and tobacco coupons (15.7%. Email promotion of menthol-flavored tobacco products was common and was associated with promotion of coupons. Emails promoting menthol had a 1.9 times higher prevalence of also promoting coupons (95% CI: 1.52–2.37. Little is known about tobacco company email marketing and this study fills an identified research gap. A deeper understanding of this type of marketing is needed in order to counter tobacco industry messaging and advance tobacco control.

  4. AERODYNAMICS OF WING TIP SAILS

    Directory of Open Access Journals (Sweden)

    MUSHTAK AL-ATABI

    2006-06-01

    Full Text Available Observers have always been fascinated by soaring birds. An interesting feature of these birds is the existence of few feathers extending from the tip of the wing. In this paper, small lifting surfaces were fitted to the tip of a NACA0012 wing in a fashion similar to that of wing tip feathers. Experimental measurements of induced drag, longitudinal static stability and trailing vortex structure were obtained.The tests showed that adding wing tip surfaces (sails decreased the induced drag factor and increased the longitudinal static stability. Results identified two discrete appositely rotated tip vortices and showed the ability of wing tip surfaces to break them down and to diffuse them.

  5. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  6. The Perceived Helpfulness of Rendering Emotional First Aid via Email

    Science.gov (United States)

    Gilat, Itzhak; Reshef, Eyal

    2015-01-01

    The present research examined the perceived helpfulness of an increasingly widespread mode of psychological assistance, namely, emotional first aid via email. The sample comprised 62 naturally occurring email interactions between distressful clients and trained volunteers operating within the framework of the Israeli Association for Emotional…

  7. A Discourse Analysis of School Counseling Supervisory E-Mail

    Science.gov (United States)

    Luke, Melissa; Gordon, Cynthia

    2011-01-01

    This article is a discourse analysis of weekly computer-mediated communications between 8 school counseling interns and their e-mail supervisor over a 16-week semester. Course-required e-mail supervision was provided as an adjunct to traditional face-to-face individual and group supervision. School counselor supervisees and supervisor enacted 3…

  8. Student Perceptions of Peer Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.; Maier, David J.

    2013-01-01

    The purpose of this study was to evaluate students' perceptions of their peer's credibility based on email addresses. The survey was conducted at a community college in Michigan where all students were registered and actively taking at least one course. The survey results show that a student's selection of an email address does influence other…

  9. Faculty Perceptions of Student Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Wiechowski, Linda S.; Scafe, Marla G.

    2011-01-01

    The purpose of this study was to evaluate faculty perceptions of student credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a student's selection of an email address does influence the…

  10. Student Perceptions of Faculty Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.

    2010-01-01

    The purpose of this study was to evaluate students' perceptions of faculty credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a faculty member's selection of an email address does…

  11. Instruction and Pragmatic Change during Study Abroad Email Communication

    Science.gov (United States)

    Alcón-Soler, Eva

    2015-01-01

    The study deals with the effect of instruction and study abroad (SA) on pragmatic knowledge. More specifically, the focus is on gains in explicit knowledge of request mitigators, and whether learners draw on this knowledge when they perform email requests. Email requests produced by 60 Spanish students staying abroad (30 treatment/30 control…

  12. Private E-Mail Requests and the Diffusion of Responsibility.

    Science.gov (United States)

    Barron, Greg; Yechiam, Eldad

    2002-01-01

    Discussion of e-mail technology and requesting information from multiple sources simultaneously focuses on an experiment demonstrating that addressing e-mails simultaneously to multiple recipients may actually reduce the number of helpful responses. Discusses diffusion of responsibility and implications for the application of social cueing theory…

  13. E-Mail at Work: Is it Really Private?

    Science.gov (United States)

    Rosenblum, Cindy

    This paper examines the controversy of e-mail privacy in the workplace. Once an employee uses an e-mail system that belongs to the employer, according to recent case law, their privacy rights are forfeited. Employers will now have to start creating policies to safeguard themselves from expensive litigation, and employees will have to be more…

  14. Technology Corner: Analysing E-mail Headers For Forensic Investigation

    Directory of Open Access Journals (Sweden)

    M. Tariq Banday

    2011-06-01

    Full Text Available Electronic Mail (E-Mail, which is one of the most widely used applications of Internet, has become a global communication infrastructure service.  However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions.  A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies of clients and gateways, etc. Cyber forensic e-mail analysis is employed to collect credible evidence to bring criminals to justice. This paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Further, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions.

  15. Tips for Starting Physical Activity

    Science.gov (United States)

    ... Legislative Information Advisory & Coordinating Committees Strategic Plans & Reports Research Areas FAQs ... Starting Physical Activity Related Topics Section Navigation Tips to Help You Get Active ...

  16. Detection of Fraudulent Emails by Employing Advanced Feature Abundance

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Glasdam, Mathies

    2014-01-01

    In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email detection rate. The different types of features...... are incorporated step by step. The detection of fraudulent email has been considered as a classification problem and it is evaluated using various state-of-the art algorithms and on CCM [1] which is authors' previous cluster based classification model. The experiments have been performed on diverse feature sets...... and the different classification methods. The comparison of the results is also presented and the evaluations shows that for the fraudulent email detection tasks, the feature set is more important regardless of classification method. The results of the study suggest that the task of fraudulent emails detection...

  17. Email medication counseling services provided by Finnish community pharmacies.

    Science.gov (United States)

    Pohjanoksa-Mäntylä, Marika K; Kulovaara, Heidi; Bell, J Simon; Enäkoski, Marianne; Airaksinen, Marja S

    2008-12-01

    The importance of email as a mode of communication between medication users and pharmacists is likely to increase. However, little is known about the email medication counseling practices of community pharmacies. To determine the prevalence of email medication counseling services in Finland and to assess the accuracy and comprehensiveness of responses by pharmacies providing the opportunity for email medication counseling to inquiries related to use of antidepressants. An inventory was made of all Finnish community pharmacies that provided the opportunity for email medication counseling. Data related to the accuracy and comprehensiveness of responses were collected, using a virtual pseudo-customer method with 3 scenarios related to common concerns of patients on antidepressants. Two inquiries were emailed to each pharmacy that provided the opportunity for email medication counseling in January and February 2005. The responses were content analyzed by 2 researchers, using a prestructured scoring system. Almost one-third (30%, n = 182) of Finnish community pharmacies maintained a working Web site, and 94% of those provided the opportunity for email medication counseling. An online "ask-the-pharmacist" service was offered by 13% (n = 23) of the pharmacies with a Web site. Pharmacies responded to 54% of the email inquiries sent by the virtual pseudo-customers. The response rate and the content score ratio between mean and maximum scores varied among the scenarios. The content score ratio was highest for the scenarios concerning the adverse effects of fluoxetine (0.53, n = 55) and interactions with mirtazapine (0.52, n = 63) and lowest for the scenario related to sexual dysfunction and weight gain associated with citalopram (0.38, n = 52). Community pharmacies are potential providers of email medication counseling services. However, more attention should be directed to responding to consumer inquiries and to the content of these responses.

  18. Analyzing E-mail communication of prospective learners

    Directory of Open Access Journals (Sweden)

    Anurag SAXENA

    2005-10-01

    Full Text Available Analyzing E-mail communication of prospective learners Vibha JOSHIAnurag SAXENA Reader School of Management IGNOU, New Delhi, INDIA ABSTRACT Today, computer has replaced all means of communication significantly. E-mail is the most popular means of communication through computers. It has vanished the boundaries between the cities, countries and continents. Earlier Studies that used this medium, had shown evidence of higher quality of responses and also significant cost savings feature of this method (mainly for convenience of dispatch for research purposes. In this communication, an attempt has been made to utilize email responses of prospective learners in education discipline based programs offered through open learning system. The inception of this study is linked to the creation of website (http://www.ignou.ac.in/ and availability of information related to all activated and prospective programs of studies, various school of studies, faculty email addresses and faculty vis-à-vis program coordinator in the University. The present study analyzed 65 email responses received from July 2002 to till date by the researcher on her email ID. These respondents got the email ID from the University website and due to their eagerness to attain qualifications in the field of education/guidance/educational management, sent an e-mail to the program coordinator(s. These email responses were analyzed in order to visualize the learner profiles and viability of the ongoing as well as prospective programs of studies. This paper tries to analyze the e-mail responses of the people who either by surfing IGNOU’s website or from other sources came to know about the various programs of studies offered by the School of Education. The study validates that there is an amount of hidden information even in the curiosity of the learners.

  19. Circular Updates

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Circular Updates are periodic sequentially numbered instructions to debriefing staff and observers informing them of changes or additions to scientific and specimen...

  20. Save our inboxes! Use e-mail wisely

    CERN Multimedia

    Achintya Rao

    2013-01-01

    At CERN, with collaborators all over the world, e-mail is inevitably the primary means of communication: we use it for everything from coordinating projects to organising lunches. But e-mail can also be one of the most inefficient means of communication we have! Here's how to fix it.   Let’s get straight to the point: we receive too many e-mails. Think about all the e-mails that you deleted without a second thought. Think about the times you’ve unnecessarily been in CC. Take a look at the unread e-mails sitting in your inbox at this very moment, ones that you have no intention of ever looking at. You can, however, tame this overload with a few simple measures and turn e-mail into an important communication and productivity tool. Many recommendations for improving e-mail etiquette suggest an abrasive approach riddled with bullet points. In a vastly multi-cultural setting such as CERN, however this approach may fail. So, here are a few dos and don’ts based o...

  1. Data Leakage Prevention: E-Mail Protection via Gateway

    Science.gov (United States)

    Kaur, Kamaljeet; Gupta, Ishu; Singh, Ashutosh Kumar

    2018-01-01

    Protection of digital assets and intellectual property is becoming a challenge for most of the companies. Due to increasing availability of database services on internet, data may be insecure after passing through precarious networks. To protect intellectual property (IP) is a major concern for today's organizations, because a leakage that compromises IP means, sensitive information of a company is in the hands of biggest competitors. Electronic information processing and communication is replacing paper in many applications increasingly. Instead of paper, an email is being used for communication at workplace and from social media logins to bank accounts. Nowadays an email is becoming a mainstream business tool. An email can be misused to leave company’s sensitive data open to compromise. So, it may be of little surprise that attacks on emails are common. So, here we need an email protection system (EPS) that will protect information to leave organization via mail. In this paper, we developed an algorithm that will offer email protection via gateway during data transfer. This algorithm matches the patterns with the keywords stored in the database and then takes the actions accordingly to protect the data. This paper describes why email protection is important? How companies can protect their confidential information from being leaked by insiders.

  2. PubMed Informer: Monitoring MEDLINE/PubMed through E-mail Alerts, SMS, PDA downloads and RSS feeds

    Science.gov (United States)

    Muin, Michael; Fontelo, Paul; Ackerman, Michael

    2005-01-01

    Summary PubMed Informer is a Web-based monitoring tool for topics of interest from MEDLINE/PubMed primarily designed for healthcare professionals. Five tracking methods are available: Web access, e-mail, Short Message Service (SMS), PDA downloads and RSS feeds. PubMed Informer delivers focused search updates and specific information to users with varying information-seeking practices. PMID:16779344

  3. Control of the Water Transport Activity of Barley HvTIP3;1 Specifically Expressed in Seeds.

    Science.gov (United States)

    Utsugi, Shigeko; Shibasaka, Mineo; Maekawa, Masahiko; Katsuhara, Maki

    2015-09-01

    Tonoplast intrinsic proteins (TIPs) are involved in the transport and storage of water, and control intracellular osmotic pressure by transporting material related to the water potential of cells. In the present study, we focused on HvTIP3;1 during the periods of seed development and desiccation in barley. HvTIP3;1 was specifically expressed in seeds. An immunochemical analysis showed that HvTIP3;1 strongly accumulated in the aleurone layers and outer layers of barley seeds. The water transport activities of HvTIP3;1 and HvTIP1;2, which also accumulated in seeds, were measured in the heterologous expression system of Xenopus oocytes. When they were expressed individually, HvTIP1;2 transported water, whereas HvTIP3;1 did not. However, HvTIP3;1 exhibited water transport activity when co-expressed with HvTIP1;2 in oocytes, and this activity was higher than when HvTIP1;2 was expressed alone. This is the first report to demonstrate that the water permeability of a TIP aquaporin was activated when co-expressed with another TIP. The split-yellow fluorescent protein (YFP) system in onion cells revealed that HvTIP3;1 interacted with HvTIP1;2 to form a heterotetramer in plants. These results suggest that HvTIP3;1 functions as an active water channel to regulate water movement through tissues during the periods of seed development and desiccation. © The Author 2015. Published by Oxford University Press on behalf of Japanese Society of Plant Physiologists. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  4. Analysis of E-mail Transactions in Virtual Reference Services

    Directory of Open Access Journals (Sweden)

    Astutik Nur Qomariyah

    2016-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (ref-desk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  5. Tips for Good Electronic Presentations.

    Science.gov (United States)

    Strasser, Dennis

    1996-01-01

    Describes library uses of presentation graphics software and offers tips for creating electronic presentations. Tips include: audience retention; visual aid options; software package options; presentation planning; presentation showing; and use of text, colors, and graphics. Sidebars note common presentation errors and popular presentation…

  6. Publication’s e-mail marketing procedure

    OpenAIRE

    Ebrahim, Nader Ale

    2016-01-01

    Your research findings and publications have to reach thousands of your peers and colleagues by sending an email. If you have recently published a study that would be of interest to others in your field, market it through email. “E-mail marketing” allow the researchers to increase the research impact and citations for their publications. This workshop will provide various techniques to increase the visibility and enhance the impact of researcher’s output by employing the publications E-mail m...

  7. Direct e-mail marketing: Case of Serbia

    Directory of Open Access Journals (Sweden)

    Končar Jelena A.

    2005-01-01

    Full Text Available Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc. The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers. Direct e-mail marketing is not aimed at momentary sale, but at boosting certain product preferences due to the engagement of numerous electronic media.

  8. The Impact of a Targeted Training Program on E-Mail System Processing Capabilities and Self-Perception of E-Mail Overload

    Science.gov (United States)

    Einstein, Michael M.

    2014-01-01

    As business e-mail volumes continue to grow and employees spend increasingly larger portions of their day processing e-mail, there is strong evidence of the negative impacts of e-mail processing, especially with respect to e-mail overload. This study sought to determine whether a training program focused on select e-mail features and processing…

  9. Beemsterboer email discussion Jan. 10 - Mar. 4, 2014

    Science.gov (United States)

    A series of emails between Beemsterboer Slag Corp. and the Air Enforcement department of EPA Region 5 regarding site monitoring, and transportation of pet coke and met coke from facilities in Chicago, Illinois.

  10. Manipulating E-Mail Server Feedback for Spam Prevention

    Directory of Open Access Journals (Sweden)

    O. A. Okunade

    2017-08-01

    Full Text Available The cyber criminals who infect machines with bots are not the same as the spammers who rent botnets to distribute their messages. The activities of these spammers account for the majority of spam emails traffic on the internet. Once their botnets and campaigns are identified, it is not enough to keep on filtering the spam emails, it is necessary to deploy techniques that will carry the fight to their end. It is observed that spammers also take into account server feedback (for example to detect and remove non-existent recipients from email address lists. We can take advantage of this observation by returning fake information, thereby poisoning the server feedback on which the spammers rely. The results of this paper show that by sending misleading information to a spammer, it is possible to prevent recipients from receiving subsequent spam emails from that same spammer.

  11. End of Interactive Emailing from the Technical Network

    CERN Multimedia

    2006-01-01

    According to the CNIC Security Policy for Control Systems (EDMS #584092), interactive emailing on PCs (and other devices) connected to the Technical Network is prohibited. Please note that from November 6th, neither reading emails nor sending emails interactively using e.g. Outlook or Pine mail clients on PCs connected to the Technical Network will be possible anymore. However, automatically generated emails will not be blocked and can still be sent off using CERNMX.CERN.CH as mail server. These restrictions DO NOT apply to PCs connected to any other network, like the General Purpose (or office) network. If you have questions, please do not hesitate to contact Uwe Epting, Pierre Charrue or Stefan Lueders (Technical-Network.Administrator@cern.ch). Your CNIC Working Group

  12. Analysis of E-mail Transactions in Virtual Reference Services

    Directory of Open Access Journals (Sweden)

    Astutik Nur Qomariyah

    2018-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (refdesk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  13. Email for the coordination of healthcare appointments and attendance reminders.

    Science.gov (United States)

    Atherton, Helen; Sawmynaden, Prescilla; Meyer, Barbara; Car, Josip

    2012-08-15

    Email is a popular and commonly-used method of communication, but its use in health care is not routine. Where email communication has been utilised in health care, its purposes have included the coordination of healthcare appointments and attendance reminders, but the effects of using email in this way are not known. This review considers the use of email for the coordination of healthcare appointments and reminders for attendance; particularly scheduling, rescheduling and cancelling healthcare appointments, and providing prompts/reminders for attendance at appointments. To assess the effects of using email for the coordination of healthcare appointments and attendance reminders, compared to other forms of coordinating appointments and reminders, on outcomes for health professionals, patients and carers, and health services, including harms. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010),and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies of interventions that use email for scheduling health appointments, for reminders for a scheduled health appointment or for ongoing coordination of health appointments and that took the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two review authors independently assessed the titles and abstracts of retrieved

  14. Email networks and the spread of computer viruses

    Science.gov (United States)

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  15. Direct e-mail marketing: Case of Serbia

    OpenAIRE

    Končar Jelena A.; Vukmirović Goran; Katai Žita

    2005-01-01

    Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc). The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers....

  16. The role of email addresses and email contact in encouraging web response in a mixed mode design

    OpenAIRE

    Cernat, Alexandru; Lynn, Peter

    2014-01-01

    We examine whether propensity to participate in a web-CAPI mixed-mode survey is influenced by being contacted by email in addition to mail. In panel surveys, researchers can ask at each wave for an email address, but there is little evidence regarding the value of doing so. Using data from a large sample with an experimental design (IP5) we find that using a respondent-supplied email address to send additional invites and reminders does not affect response rates compared to using mailed invit...

  17. Identifying spam e-mail messages using an intelligence algorithm

    Directory of Open Access Journals (Sweden)

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  18. Email as a Data Collection Tool when Interviewing Older Adults

    Directory of Open Access Journals (Sweden)

    Mario A. Brondani DDS, MSc, PhD

    2011-09-01

    Full Text Available This article explores several aspects of electronic communication, specifically its advantages and disadvantages within the context of a brief experience using email to interview elders. Two older adults participated via email as the psychosocial impact of aging was collected using such venue. Our experiences are compared with published reports from others to analyze the benefits and limitations of email as a research tool. The email was spontaneous, comprehensive, interactive, efficient, confidential, and cost effective. The use of email within this exploratory study appeared to be an effective approach to collecting qualitative information about beliefs and behaviours from older adults who feel comfortable with this form of communication. The lack of similar studies limited the scope of discussion and comparison of findings; generalization is limited due to the small sample size. This investigation, however, suggested that the use of email as an interview tool may be considered in today's exploratory research arena as an alternative to conference calls or face-to-face interviews when time is a constraint.

  19. CEAI: CCM-based email authorship identification model

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2013-11-01

    Full Text Available In this paper we present a model for email authorship identification (EAI by employing a Cluster-based Classification (CCM technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature set to include some more interesting and effective features for email authorship identification (e.g., the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell. We also included Info Gain feature selection based content features. It is observed that the use of such features in the authorship identification process has a positive impact on the accuracy of the authorship identification task. We performed experiments to justify our arguments and compared the results with other base line models. Experimental results reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM-based models, as well as the models proposed by Iqbal et al. (2010, 2013 [1,2]. The proposed model attains an accuracy rate of 94% for 10 authors, 89% for 25 authors, and 81% for 50 authors, respectively on Enron dataset, while 89.5% accuracy has been achieved on authors’ constructed real email dataset. The results on Enron dataset have been achieved on quite a large number of authors as compared to the models proposed by Iqbal et al. [1,2].

  20. Internet and Email Use Among STD Clinic Patients

    Science.gov (United States)

    Mark, Karen E.; Wald, Anna; Drolette, Linda; Golden, Matthew R.

    2009-01-01

    Background Little data exist on Internet and email use among STD clinic patients for research and clinical care communication. Methods An anonymous cross-sectional survey of STD clinic patients aged ≥ 18 years in Seattle, Washington, March 13–22, 2006. Results Of 489 study period patients, 251 (51%) completed the questionnaire. Participants had a median age of 30 (range 18–66) years and were 69% male, 56% White, 19% African-American, 9% Hispanic, and 7% Asian/Pacific Islander. 75% had some post-secondary education but half reported an annual income of email that they check at least 3 times a week, and 144 (57%) were willing to receive an email reminding them to come back for a follow-up appointment if diagnosed with an STD. MSM were more likely than women and heterosexual men to be regular Internet and email users (92% versus 70%, p = 0.001) and to have met a sex partner over the Internet during the past year (69% versus 11%, p email use, as was racial/ethnic background (86% of Whites, 48% of African-Americans, 73% of Hispanics, 100% of Asians/Pacific Islanders, and 57% of others, p email use are common and acceptable to many STD clinic patients for research and clinical purposes. PMID:18685548

  1. At the Tipping Point

    Energy Technology Data Exchange (ETDEWEB)

    Wiley, H. S.

    2011-02-28

    There comes a time in every field of science when things suddenly change. While it might not be immediately apparent that things are different, a tipping point has occurred. Biology is now at such a point. The reason is the introduction of high-throughput genomics-based technologies. I am not talking about the consequences of the sequencing of the human genome (and every other genome within reach). The change is due to new technologies that generate an enormous amount of data about the molecular composition of cells. These include proteomics, transcriptional profiling by sequencing, and the ability to globally measure microRNAs and post-translational modifications of proteins. These mountains of digital data can be mapped to a common frame of reference: the organism’s genome. With the new high-throughput technologies, we can generate tens of thousands of data points from each sample. Data are now measured in terabytes and the time necessary to analyze data can now require years. Obviously, we can’t wait to interpret the data fully before the next experiment. In fact, we might never be able to even look at all of it, much less understand it. This volume of data requires sophisticated computational and statistical methods for its analysis and is forcing biologists to approach data interpretation as a collaborative venture.

  2. Tipping the scales.

    Science.gov (United States)

    1998-12-01

    In the US, the October 1998 murder of a physician who performed abortions was an outward manifestation of the insidious battle against legal abortion being waged by radical Christian social conservatives seeking to transform the US democracy into a theocracy. This movement has been documented in a publication entitled, "Tipping the Scales: The Christian Right's Legal Crusade Against Choice" produced as a result of a 4-year investigation conducted by The Center for Reproductive Law and Policy. This publication describes how these fundamentalists have used sophisticated legal, lobbying, and communication strategies to further their goals of challenging the separation of church and state, opposing family planning and sexuality education that is not based solely on abstinence, promoting school prayer, and restricting homosexual rights. The movement has resulted in the introduction of more than 300 anti-abortion bills in states, 50 of which have passed in 23 states. Most Christian fundamentalist groups provide free legal representation to abortion clinic terrorists, and some groups solicit women to bring specious malpractice claims against providers. Sophisticated legal tactics are used by these groups to remove the taint of extremism and mask the danger posed to US constitutional principles being posed by "a well-financed and zealous brand of radical lawyers and their supporters."

  3. Who sends the email? Using electronic surveys in violence research.

    Science.gov (United States)

    Sutherland, Melissa A; Amar, Angela F; Laughon, Kathryn

    2013-08-01

    Students aged 16-24 years are at greatest risk for interpersonal violence and the resulting short and long-term health consequences. Electronic survey methodology is well suited for research related to interpersonal violence. Yet methodological questions remain about best practices in using electronic surveys. While researchers often indicate that potential participants receive multiple emails as reminders to complete the survey, little mention is made of the sender of the recruitment email. The purpose of this analysis is to describe the response rates from three violence-focused research studies when the recruitment emails are sent from a campus office, researcher or survey sampling firm. Three violence-focused studies were conducted about interpersonal violence among college students in the United States. Seven universities and a survey sampling firm were used to recruit potential participants to complete an electronic survey. The sender of the recruitment emails varied within and across the each of the studies depending on institutional review boards and university protocols. An overall response rate of 30% was noted for the 3 studies. Universities in which researcher-initiated recruitment emails were used had higher response rates compared to universities where campus officials sent the recruitment emails. Researchers found lower response rates to electronic surveys at Historically Black Colleges or Universities and that other methods were needed to improve response rates. The sender of recruitment emails for electronic surveys may be an important factor in response rates for violence-focused research. For researchers identification of best practices for survey methodology is needed to promote accurate disclosure and increase response rates.

  4. Who Sends the Email? Using Electronic Surveys in Violence Research

    Directory of Open Access Journals (Sweden)

    Melissa A Sutherland

    2013-08-01

    Full Text Available Introduction: Students aged 16–24 years are at greatest risk for interpersonal violence and the resulting short and long-term health consequences. Electronic survey methodology is well suited for research related to interpersonal violence. Yet methodological questions remain about best practices in using electronic surveys. While researchers often indicate that potential participants receive multiple emails as reminders to complete the survey, little mention is made of the sender of the recruitment email. The purpose of this analysis is to describe the response rates from three violence-focused research studies when the recruitment emails are sent from a campus office, researcher or survey sampling firm. Methods: Three violence-focused studies were conducted about interpersonal violence among college students in the United States. Seven universities and a survey sampling firm were used to recruit potential participants to complete an electronic survey. The sender of the recruitment emails varied within and across the each of the studies depending on institutional review boards and university protocols.Results: An overall response rate of 30% was noted for the 3 studies. Universities in which researcher initiated recruitment emails were used had higher response rates compared to universities where campus officials sent the recruitment emails. Researchers found lower response rates to electronic surveys at Historically Black Colleges or Universities and that other methods were needed to improve response rates.Conclusion: The sender of recruitment emails for electronic surveys may be an important factor in response rates for violence-focused research. For researchers identification of best practices for survey methodology is needed to promote accurate disclosure and increase response rates. [West J Emerg Med. 2013;14(4:363–369.

  5. Exploring the reach and program use of Hello World, an email-based health promotion program for pregnant women in the Netherlands

    NARCIS (Netherlands)

    van Dongen, J.M.; van Poppel, M.N.M.; Milder, I.E.J.; van Oers, H.A.M.; Brug, J.

    2012-01-01

    Background: In 2006, the Dutch government initiated Hello World, an email-based program promoting healthy lifestyles among pregnant women through quizzes with pregnancy-related questions. In 2008, an updated version was released. The present study aimed to (1) examine the reach of Hello World and

  6. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... echoes from the tissues in the body. The principles are similar to sonar used by boats and ... bleeding resistant to traditional medical treatments. The greatest difference in performing TIPS in children is their tremendous ...

  7. Fitness: Tips for Staying Motivated

    Science.gov (United States)

    Healthy Lifestyle Fitness Fitness is for life. Motivate yourself with these practical tips. By Mayo Clinic Staff Have ... 27, 2015 Original article: http://www.mayoclinic.org/healthy-lifestyle/fitness/in-depth/fitness/art-20047624 . Mayo Clinic ...

  8. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... deeply you are sedated. When the needle is advanced through the liver and the pathway is expanded ... are the limitations of TIPS? Patients with more advanced liver disease are at greater risk for worsening ...

  9. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... to determine the severity of the condition. To help plan for the placement of the TIPS stent, ... Radiological Society of North America, Inc. (RSNA). To help ensure current and accurate information, we do not ...

  10. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... avoiding the liver. TIPS may successfully reduce internal bleeding in the stomach and esophagus in patients with ... stomach, lower esophagus, and intestines, causing enlarged vessels, bleeding and the accumulation of fluid in the chest ...

  11. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... in the chest or abdomen. This condition is most commonly seen in adults, often as a result ... minimally invasive procedures such as a TIPS are most often performed by a specially trained interventional radiologist ...

  12. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... open. Patients who typically need a TIPS have portal hypertension , meaning they have increased pressure in the portal ... problems leading to cirrhosis (scarring of the liver). Portal hypertension can also occur in children, although children are ...

  13. Energy Savers: Cool Summer Tips

    International Nuclear Information System (INIS)

    Miller, M.

    2001-01-01

    A tri-fold brochure addressing energy-saving tips for homeowners ranging from low- or no-cost suggestions to higher cost suggestions for longer-term savings. Cooling, windows, weatherizing, and landscaping are addressed

  14. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... complex and lengthy procedures requiring extended fluoroscopy use) death (rare) top of page What are the limitations ... filtered out by the liver. The TIPS may cause too much of these substances to bypass the ...

  15. Girlfriends' Health and Safety Tips

    Science.gov (United States)

    ... in Women? Women's Safety and Health Issues at Work Health Equity Girlfriends' Health and Safety Tips Recommend on Facebook Tweet Share Compartir Having friends is an important part of life. Celebrate female friendship and support your girlfriends by ...

  16. Search Tips: MedlinePlus

    Science.gov (United States)

    ... of this page: https://medlineplus.gov/searchtips.html Search Tips To use the sharing features on this page, please enable JavaScript. How do I search MedlinePlus? The search box appears at the top ...

  17. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... you are pregnant and discuss any recent illnesses, medical conditions, allergies and medications you’re taking. You ... with ascites or variceal bleeding resistant to traditional medical treatments. The greatest difference in performing TIPS in ...

  18. Computerized automatic tip scanning operation

    International Nuclear Information System (INIS)

    Nishikawa, K.; Fukushima, T.; Nakai, H.; Yanagisawa, A.

    1984-01-01

    In BWR nuclear power stations the Traversing Incore Probe (TIP) system is one of the most important components in reactor monitoring and control. In previous TIP systems, however, operators have suffered from the complexity of operation and long operation time required. The system presented in this paper realizes the automatic operation of the TIP system by monitoring and driving it with a process computer. This system significantly reduces the burden on customer operators and improves plant efficiency by simplifying the operating procedure, augmenting the accuracy of the measured data, and shortening operating time. The process computer is one of the PODIA (Plant Operation by Displayed Information Automation) systems. This computer transfers control signals to the TIP control panel, which in turn drives equipment by microprocessor control. The process computer contains such components as the CRT/KB unit, the printer plotter, the hard copier, and the message typers required for efficient man-machine communications. Its operation and interface properties are described

  19. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... the TIPS. top of page Additional Information and Resources Society of Interventional Radiology (SIR) - Patient Center This ... To locate a medical imaging or radiation oncology provider in your community, you can search the ACR- ...

  20. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... pressure. top of page How does the procedure work? A TIPS reroutes blood flow in the liver ... risk of infection. The chance of infection requiring antibiotic treatment appears to be less than one in ...

  1. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... surgery. Your TIPS should have less of an effect than open surgical bypass on future liver transplantation ... Encephalopathy can be treated with certain medications, a special diet or, by revising the stent, but sometimes ...

  2. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... risk of infection. The chance of infection requiring antibiotic treatment appears to be less than one in ... limitations of TIPS? Patients with more advanced liver disease are at greater risk for worsening liver failure ...

  3. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... is completed. top of page What are the benefits vs. risks? Benefits A TIPS is designed to produce the same ... risk of infection. The chance of infection requiring antibiotic treatment appears to be less than one in ...

  4. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... hepatic vein to identify the portal venous system. Access is then gained from the hepatic vein into ... TIPS procedure to make sure that it remains open and functions properly. top of page Who interprets ...

  5. Tips to Prevent Mosquito Bites

    Science.gov (United States)

    ... discourage mosquitoes, ticks and other biting insects from landing on you. Here are tips for other preventive ... CDC Mosquito Control Methods - NPIC Exit Top of Page Contact Us to ask a question, provide feedback, ...

  6. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... while avoiding the liver. TIPS may successfully reduce internal bleeding in the stomach and esophagus in patients ... site. Using ultrasound, the doctor will identify your internal jugular vein , which is situated above your collarbone, ...

  7. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... and medical diseases. This can result in significant challenges in creating the TIPS. top of page Additional ... Please note RadiologyInfo.org is not a medical facility. Please contact your physician with specific medical questions ...

  8. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... the TIPS. top of page Additional Information and Resources Society of Interventional Radiology (SIR) - Patient Center This ... here Images × Image Gallery Radiologist and patient consultation. View full size with caption Pediatric Content Some imaging ...

  9. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... bear denotes child-specific content. Related Articles and Media Radiation Dose in X-Ray and CT Exams Contrast Materials Venography Images related to Transjugular Intrahepatic Portosystemic Shunt (TIPS) Sponsored ...

  10. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... story about radiology? Share your patient story here Images × Image Gallery Radiologist and patient consultation. View full size ... X-Ray and CT Exams Contrast Materials Venography Images related to Transjugular Intrahepatic Portosystemic Shunt (TIPS) Sponsored ...

  11. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... pressure. top of page How does the procedure work? A TIPS reroutes blood flow in the liver ... observed. This procedure is usually completed in an hour or two but may take up to several ...

  12. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... the portal system using a TIPS needle (a special long needle extending from the neck into the ... Encephalopathy can be treated with certain medications, a special diet or, by revising the stent, but sometimes ...

  13. (Allium cepa) root tip mitosis

    African Journals Online (AJOL)

    Aghomotsegin

    their chemical composition and genotoxic effects on cell reproduction. Two petrochemicals, air ... the chromosomes of the individual cells of the root tip could be a pointer to their ..... Chromosome technique: Theory and. Practice. Butterworths ...

  14. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... Intrahepatic Portosystemic Shunt (TIPS)? What are some common uses of the procedure? How should I prepare? What does the equipment look like? How does the procedure work? How is the procedure performed? What will I ...

  15. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... in creating the TIPS. top of page Additional Information and Resources Society of Interventional Radiology (SIR) - Patient ... Send us your feedback Did you find the information you were looking for? Yes No Please type ...

  16. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... pressure. top of page How does the procedure work? A TIPS reroutes blood flow in the liver ... of bleeding that can occur can sometimes be life threatening and those patients are monitored in intensive ...

  17. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... blood draining from the bowel back to the heart while avoiding the liver. TIPS may successfully reduce ... blood away from the liver back to the heart). A stent is then placed in this tunnel ...

  18. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... portal vein to the hepatic vein in the liver. A small metal device called a stent is ... bowel back to the heart while avoiding the liver. TIPS may successfully reduce internal bleeding in the ...

  19. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... pressure. top of page How does the procedure work? A TIPS reroutes blood flow in the liver ... have special pediatric considerations. The teddy bear denotes child-specific content. Related Articles and Media Radiation Dose ...

  20. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... the liver. A small metal device called a stent is placed to keep the connection open and ... a small, tubular metal device commonly called a stent . During a TIPS procedure, interventional radiologists use image ...

  1. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... who typically need a TIPS have portal hypertension , meaning they have increased pressure in the portal vein ... the local anesthetic is injected. Most of the sensation is at the skin incision site, which is ...

  2. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... pressure. top of page How does the procedure work? A TIPS reroutes blood flow in the liver ... physician will numb an area just above your right collarbone with a local anesthetic . A very small ...

  3. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... top of page What are the benefits vs. risks? Benefits A TIPS is designed to produce the ... skin that does not have to be stitched. Risks Any procedure where the skin is penetrated carries ...

  4. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... Patients who typically need a TIPS have portal hypertension , meaning they have increased pressure in the portal ... leading to cirrhosis (scarring of the liver). Portal hypertension can also occur in children, although children are ...

  5. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... pressure. top of page How does the procedure work? A TIPS reroutes blood flow in the liver ... above your collarbone, and guide a catheter, a long, thin, hollow plastic tube into the vessel. Using ...

  6. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... This can result in significant challenges in creating the TIPS. top of page Additional Information and Resources Society of Interventional Radiology (SIR) - Patient Center This page ...

  7. Tip model of cold fission

    International Nuclear Information System (INIS)

    Goennenwein, F.; Boersig, B.

    1991-01-01

    Cold fission is defined to be the limiting case of nuclear fission where virtually all of the available energy is converted into the total kinetic energy of the fragments. The fragments have, therefore, to be born in or at least close to their respective ground states. Starting from the viewpoint that cold fission corresponds to most compact scission configurations, energy constraints have been exploited to calculate minimum tip distances between the two nascent fragments in binary fission. Crucial input parameters to this tip model of cold fission are the ground-state deformations of fragment nuclei. It is shown that the minimum tip distances being compatible with energy conservation vary strongly with both the mass and charge fragmentation of the fission prone nucleus. The tip distances refer to nuclei with equivalent sharp surfaces. In keeping with the size of the surface width of leptodermous nuclei, only configurations where the tip distances are smaller than a few fm may be considered as valid scission configurations. From a comparison with experimental data on cold fission this critical tip distance appears to be 3.0 fm for the model parameters chosen. Whenever the model calculation yields tip distances being smaller than the critical value, a necessary condition for attaining cold fission is considered to be fulfilled. It is shown that this criterion allows to understand in fair agreement with experiment which mass fragmentations are susceptible to lead to cold fission and which fragment-charge divisions are the most favored in each isobaric mass chain. Being based merely on energy arguments, the model cannot aim at predicting fragment yields in cold fission. However, the tip model proposed appears well suited to delineate the phase space where cold fission phenomena may come into sight. (orig.)

  8. DESCRIPTIVE STUDY OF HONORIFIC USE IN KOREAN EMAIL DISCOURSE

    Directory of Open Access Journals (Sweden)

    Jaegu Kim

    2016-07-01

    Full Text Available It is a relatively new field that examines how Korean culture affects Korean language use in terms of age difference in a corpus of computer mediated email discourse. The purpose of this descriptive study and experiment is to prove the close relationship between Korean language and culture. This paper shows the descriptive study of Korean culture in relation to language use. Korean culture acknowledges an inherent hierarchy with regard to age, and considers [+age] as relating socially to [+power]. When younger Koreans converse with older ones, they express different morpho-syntactic patterns, which is an age complex. The main task of the experiment was to examine the way through which the age complex is reflected by Korean honorific linguistic system in email discourse. I asked 15 Korean native speakers between the ages of 20 to 25 to write emails expressing an impositive request to [+age (46-50 years old], [-age (below 25 years old] and [=age] recipients. The results show significant differences in the use of grammatical features in emails written to [+age] recipients, as compared to emails written to [-age] and [=age] recipients. The implication of the findings is that the cultural values that are attached to age and aging in the Korean society affects Koreans’ language use, which means Korean language and culture are closely intermingled.

  9. Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email

    Directory of Open Access Journals (Sweden)

    Albert Ginting

    2015-04-01

    Full Text Available In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography. One fairly popular cryptographic algorithms are RSA algorithm. In this study will discuss the implementation of a cryptographic algorithm RSA encryption and decryption process email. To test created a java-based email client program with message encryption and decryption features messages. This application uses the Java programming language and Netbeans 7.4 as editor. Mail servers used is Google Mail. The initial step of this study was to download email from the Google server and encrypt the message. The second step is decrypt the message to verify whether the message is still the same as the original message before it is encrypted . Results from this study is the application that can encrypt and decrypt messages using RSA cryptographic algorithm. With this application is expected to mail delivery is much safer. Because encrypted email will generate a random decimal number of unknown value .

  10. Detection of fraudulent emails by employing advanced feature abundance

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2014-11-01

    Full Text Available In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email detection rate. The different types of features are incorporated step by step. The detection of fraudulent email has been considered as a classification problem and it is evaluated using various state-of-the art algorithms and on CCM (Nizamani et al., 2011 [1] which is authors’ previous cluster based classification model. The experiments have been performed on diverse feature sets and the different classification methods. The comparison of the results is also presented and the evaluation show that for the fraudulent email detection tasks, the feature set is more important regardless of classification method. The results of the study suggest that the task of fraudulent emails detection requires the better choice of feature set; while the choice of classification method is of less importance.

  11. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  12. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  13. ENHANCING DISTANT LEARNING THROUGH EMAIL COMMUNICATION: A Case of BOU

    Directory of Open Access Journals (Sweden)

    K. M. Rezanur RAHMAN

    2008-04-01

    Full Text Available Today computer has replaced all means of traditional communication significantly. Many distant learning tools claim to be interactive, but few can offer two-way communication. Email is the most popular means of communication medium now-a-days. Therefore, it may be used as an educational tool for learning. In present socio-economic condition of Bangladesh, learners can afford computer, cell phone and Internet. We took this opportunity to investigate the prospective use of these tools for distant learning. The present survey has been carried out to understand the present status of Internet knowledge among the learners and their views for possible introduction of e-mail communication as supporting tool for learning. BOU’s available infrastructural facilities for providing Internet support have been investigated. Furthermore, possible solutions have been pointed out to provide e-mail facility to the learner in a cost effective way.

  14. Model business letters, emails and other business documents

    CERN Document Server

    Taylor, Shirley

    2012-01-01

    For anyone who wants to communicate effectively in business, this is your complete reference guide for any form of written communication. Packed with over 500 sample documents, over 100 tips for better business writing and useful templates you can apply to your writing immediately, Model Business Letters will help you put the key rules of good business writing into action.

  15. Discourse strategies in professional e-mail negotiation

    DEFF Research Database (Denmark)

    Jensen, Astrid

    2009-01-01

    The purpose of this article is to report on some of the preliminary results of an on-going study on the use of discourse strategies in e-mail negotiation. The analysis aims at showing how relations between the participants develop through the use of specific discourse strategies in their e......-mail communication which covers a period of three months, during which the relationship progresses from initial contact to on-going business. Drawing on Hyland's (2005) concept of metadiscourse combined with Charles' (1996) categories of ‘old and new relationship negotiations', this study provides insights...

  16. BEWARE OF OPENING ATTACHMENTS IN E-MAIL

    CERN Multimedia

    2000-01-01

    Following the recent e-mail viruses you are asked to be cautious when opening e-mail attachments on your PC. Attachments that are apparently harmless might hide active content producing nasty effects as soon as they are opened. Some of these so called 'Trojan horses' can conceal themselves in very attractive pictures and funny slide shows.On the PC Windows infrastructure, CERN runs software to protect users from known viruses, but new ones can sometimes arrive before our software recognises them. They can enter your system when you open an attachment. To remove them it may be necessary to re-install the Windows software on your PC.

  17. Machine Learning for Email Spam Filtering and Priority Inbox

    CERN Document Server

    Conway, Drew

    2011-01-01

    If you're an experienced programmer willing to crunch data, this concise guide will show you how to use machine learning to work with email. You'll learn how to write algorithms that automatically sort and redirect email based on statistical patterns. Authors Drew Conway and John Myles White approach the process in a practical fashion, using a case-study driven approach rather than a traditional math-heavy presentation. This book also includes a short tutorial on using the popular R language to manipulate and analyze data. You'll get clear examples for analyzing sample data and writing machi

  18. Promotion and communication through e-mail marketing campaigns

    Directory of Open Access Journals (Sweden)

    Raluca Dania TODOR

    2017-07-01

    Full Text Available The main purpose of this article is to try to emphasize the e-mail marketing campaigns importance and efficiency and the way they increase the interaction between a company and potential customers and to increase their interest in a company’s products and services and finally trigger the buying decision. Also the present paper’s aim is to exemplify how business can gain benefits by using marketing automation tools like e-mail marketing campaigns which is considered nowadays a form of direct marketing which is less expensive than the traditional direct marketing alternatives.

  19. Unraveling mulitple translatorship through an e-mail correspondence

    DEFF Research Database (Denmark)

    Jansen, Hanne

    2017-01-01

    The aim of this study is to shed light on questions of “multiple translatorship” and particularly on translation collaboration processes. The empirical material consists of more than three hundred e-mails exchanged between two co-translators who translated Claudio Magris’s novel Alla cieca (2005......) into Danish. The theoretical framework presents a double perspective through which the e-mail correspondence is studied: on the one hand, as an ethnographic “thick description” (focusing on translation as an event), with the aim of uncovering who the agents involved are, how they interact, and what...

  20. Email for communicating results of diagnostic medical investigations to patients.

    Science.gov (United States)

    Meyer, Barbara; Atherton, Helen; Sawmynaden, Prescilla; Car, Josip

    2012-08-15

    As medical care becomes more complex and the ability to test for conditions grows, pressure on healthcare providers to convey increasing volumes of test results to patients is driving investigation of alternative technological solutions for their delivery. This review addresses the use of email for communicating results of diagnostic medical investigations to patients. To assess the effects of using email for communicating results of diagnostic medical investigations to patients, compared to SMS/ text messaging, telephone communication or usual care, on outcomes, including harms, for health professionals, patients and caregivers, and health services. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies of interventions using email for communicating results of any diagnostic medical investigations to patients, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two review authors independently assessed the titles and abstracts of retrieved citations. No studies were identified for inclusion. Consequently, no data collection or analysis was possible. No studies met the inclusion criteria, therefore there are no results to report on the use of email for communicating results of diagnostic medical

  1. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... of page Who interprets the results and how do I get them? Prior to leaving the hospital, ... E-mail: Area code: Phone no: Thank you! Do you have a personal story about radiology? Share ...

  2. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... type your comment or suggestion into the following text box: Comment: E-mail: Area code: Phone no: Thank ... View full size with caption Pediatric Content Some imaging tests ...

  3. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... consist of a console containing a computer and electronics, a video display screen and a transducer that ... suggestion into the following text box: Comment: E-mail: Area code: Phone no: Thank you! Please help ...

  4. Update of CERN exchange network

    CERN Multimedia

    2003-01-01

    An update of the CERN exchange network will be done next April. Disturbances or even interruptions of telephony services may occur from 4th to 24th April during evenings from 18:30 to 00:00 but will not exceed more than 4 consecutive hours (see tentative planning below). In addition, the voice messaging system will be shut down on March, 26th April from 18:00 to 00:00. Calls supposed to be routed to the voice messaging system will not be possible during the shutdown. CERN divisions are invited to avoid any change requests (set-ups, move or removals) of telephones and fax machines from 4th to 25th April. Everything will be done to minimize potential inconveniences which may occur during this update. There will be no loss of telephone functionalities. CERN GSM portable phones won't be affected by this change. Should you need more details, please send us your questions by email to Standard.Telephone@cern.ch. DateChange typeAffected areas March 26Update of the voice messaging systemAll CERN sites April 4Updat...

  5. Update of CERN exchange network

    CERN Multimedia

    2003-01-01

    An update of the CERN exchange network will be done next April. Disturbances or even interruptions of telephony services may occur from 4th to 24th April during evenings from 18:30 to 00:00 but will not exceed more than 4 consecutive hours (see tentative planning below). In addition, the voice messaging system will be shut down on March, 26th April from 18:00 to 00:00. Calls supposed to be routed to the voice messaging system will not be possible during the shutdown. CERN divisions are invited to avoid any change requests (set-ups, move or removals) of telephones and fax machines from 4th to 25th April. Everything will be done to minimize potential inconveniences which may occur during this update. There will be no loss of telephone functionalities. CERN GSM portable phones won't be affected by this change. Should you need more details, please send us your questions by email to Standard.Telephone@cern.ch. Date Change type Affected areas April 8 Update of switch in LHC 7 LHC 7 Point April 9 Update of...

  6. E-mail et Web : pour une navigation sans risque

    CERN Multimedia

    CERN. Geneva

    2010-01-01

    Présentation orale en français, support visuel en anglais. À travers des exemples concrets, vous consoliderez vos connaissances et pourrez ainsi réajuster vos habitudes concernant l’utilisation sécurisée de votre boîte e-mail et de votre navigateur Web.

  7. Changing a Course of Action: Teachers' E-mail Discussion.

    Science.gov (United States)

    Serafin, Ana Gil

    This study examined the e-mail interactions of teachers who were graduate students in an educational leadership program at a commuter university. Participants attended a 3-hour-per-week course. The instructor inserted into the course syllabus an assessment plan that required computer use, making the students responsible for accessing the…

  8. Communicative In-Betweens of E-mail Communication

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2009-01-01

    In this paper I seek to deconstruct internet-based communication. I highlight Derrida’s focus on the margins and in-betweens of communication, and relate it to the genre of e-mail. I argue (i) that the silence between the dialogic turns becomes more marked, while (ii) the separation of present an...

  9. Colleges Get out of E-Mail Business

    Science.gov (United States)

    Carnevale, Dan

    2008-01-01

    Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like…

  10. E-Mail from Professor Enhances Student Motivation and Attitudes

    Science.gov (United States)

    Legg, Angela M.; Wilson, Janie H.

    2009-01-01

    Traditionally, professors use the first day of class to build rapport. However, current technology allows professors to contact students prior to the first day of class. This study assessed how the receipt of a welcoming e-mail from a female professor 1 week before the first day of class affected student motivation and attitudes toward the…

  11. SPAM: Beware of e-mails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake e-mails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake e-mail message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, but future cases may still occur. Users need to be vigilant regarding any requests for passwords or personal data. Fake e-mails should be immediately deleted. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN IT Department

  12. The Communicative Functions of Emoticons in Workplace E-Mails :-)

    DEFF Research Database (Denmark)

    Skovholt, Karianne; Grønning, Anette; Kankaanranta, Anne

    2014-01-01

    CMC research presents emoticons as visual representations of writers' emotions. We argue that the emoticons in authentic workplace e-mails do not primarily indicate writers' emotions. Rather, they provide information about how an utterance is supposed to be interpreted. We show that emoticons...

  13. Writing for Business Purposes: Elements of Email Etiquette

    OpenAIRE

    Gabriela Dumbravă; Adriana Koronka

    2006-01-01

    Starting from the premise that electronic mail has experienced an explosive development throughout the world over the past few years, gaining substantial territory in the field of business communication, the paper focuses on the basic elements of email etiquette and on their importance in writing an effective and competitive electronic message. adapted to the context and purpose of professional writing.

  14. Orality and literacy, formality and informality in email communication

    Directory of Open Access Journals (Sweden)

    Carmen Pérez Sabater

    2008-04-01

    Full Text Available Approaches to the linguistic characteristics of computer-mediated communication (CMC have highlighted the frequent oral traits involved in electronic mail along with features of written language. But email is today a new communication exchange medium in social, professional and academic settings, frequently used as a substitute for the traditional formal letter. The oral characterizations and linguistic formality involved in this use of emails are still in need of research. This paper explores the formal and informal features in emails based on a corpus of messages exchanged by academic institutions, and studies the similarities and differences on the basis of their mode of communication (one-to-one or one-to-many and the sender’s mother tongue (native or nonnative. The language samples collected were systematically analyzed for formality of greetings and farewells, use of contractions, politeness indicators and non-standard linguistic features. The findings provide new insights into traits of orality and formality in email communication and demonstrate the emergence of a new style in writing for even the most important, confidential and formal purposes which seems to be forming a new sub-genre of letter-writing.

  15. Advanced Email Risk Classification and Recipient Decision Assistance

    Science.gov (United States)

    Estes, Aaron

    2016-01-01

    Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…

  16. The Use of Email to Coach Preservice Early Childhood Teachers

    Science.gov (United States)

    Barton, Erin E.; Fuller, Elizabeth A.; Schnitz, Alana

    2016-01-01

    The purpose of this study was to examine the impact of performance feedback on preservice teachers' use of recommended practices within inclusive early childhood classrooms. A multiple baseline design across behaviors was used to examine the relation between performance feedback delivered via email and practicum students' use of target-recommended…

  17. Enhancing Distant Learning through Email Communication: A Case of BOU

    Science.gov (United States)

    Rahman, K. M. Rezanur; Anwar, Sadat; Numan, Sharker Md.

    2008-01-01

    Today computer has replaced all means of traditional communication significantly. Many distant learning tools claim to be interactive, but few can offer two-way communication. Email is the most popular means of communication medium now-a-days. Therefore, it may be used as an educational tool for learning. In present socioeconomic condition of…

  18. Hesitative introduction of E-mail consultations in general practice.

    NARCIS (Netherlands)

    Verheij, R.; Ton, C.; Tates, K.

    2008-01-01

    Introduction: The Dutch Council for Public Health and Health Care reported in 2005 that 70% of internet users would want to have the opportunity to consult their own general practitioner by e-mail [1]. Since January 1, 2006, general practitioners in the Netherlands are reimbursed 4.50 euro for

  19. Nose muscular dynamics: the tip trigonum.

    Science.gov (United States)

    Figallo, E E; Acosta, J A

    2001-10-01

    In 1995, the senior author (E.E.F.) published an article in which he described the musculus digastricus septi nasi labialis. In the article presented here, work carried out by anatomists and other researchers who, over the last two centuries, studied nose muscular dynamics is described. The present study is based on Gray's Anatomy, which, in 1858, first described the nasal tip muscles, along with the other nasal muscles. Later works not only used different terminology for these muscles but also ignored some, creating tremendous confusion. The study presented here provides an update of the exact terms, location, insertions, and muscle functions of the muscles of the nose. Each nose muscle is described with regard to the two portions able to produce separate contractions. In this study, the term "dual function" is used and characterizes the nasal mimetic muscles that do not have well-defined fascia. Therefore, there is doubt about the existence of a real nasal superficial muscle aponeurotic system. The musculus myrtiformis seems to have a dual function, inserting in the canine fosse and in the periosteum of the central incisors, forming two portions-one to the septum and the other to the nostril-each of which has specific functions. This study has been based on research in physiognomy, the science of expression. With regard to the basis for nose expressions, common anatomical research is excluded because it provides a different view of the dynamics studied to date. The term trigonum musculare apicis nasi defines the interaction of the musculi compressor narium minor and dilator naris anterior, connecting with the columellar bundle of the musculus digastricus and levering the nasal spine. This muscular trigone creates circular concentric and eccentric movements of the nasal tip.

  20. The Educational Impact of E-Mail: Extraverted versus Introverted Students.

    Science.gov (United States)

    Kunderewicz, Larisa; Michener, Stacey; Chambliss, Catherine

    College students (N=151) completed surveys assessing the relationship between e-mail use and extraversion. The variables studied included time spent on e-mail; the frequency of e-mail usage; and the purposes e-mail served for each student. The results suggest that extraverts use e-mail as a form of procrastination more than introverts, and that…

  1. Root tips moving through soil

    Science.gov (United States)

    Curlango-Rivera, Gilberto

    2011-01-01

    Root elongation occurs by the generation of new cells from meristematic tissue within the apical 1–2 mm region of root tips. Therefore penetration of the soil environment is carried out by newly synthesized plant tissue, whose cells are inherently vulnerable to invasion by pathogens. This conundrum, on its face, would seem to reflect an intolerable risk to the successful establishment of root systems needed for plant life. Yet root tip regions housing the meristematic tissues repeatedly have been found to be free of microbial infection and colonization. Even when spore germination, chemotaxis, and/or growth of pathogens are stimulated by signals from the root tip, the underlying root tissue can escape invasion. Recent insights into the functions of root border cells, and the regulation of their production by transient exposure to external signals, may shed light on long-standing observations. PMID:21455030

  2. Crack tip stress and strain

    International Nuclear Information System (INIS)

    Francois, D.

    1975-01-01

    The study of potential energy variations in a loaded elastic solid containing a crack leads to determination of the crack driving force G. Generalization of this concept to cases other than linear elasticity leads to definition of the integral J. In a linear solid, the crack tip stress field is characterized by a single parameter: the stress-intensity factor K. When the crack tip plastic zone size is confined to the elastic singularity J=G, it is possible to establish relationship between these parameters and plastic strain (and in particular the crack tip opening displacement delta). The stress increases because of the triaxiality effect. This overload rises with increasing strain hardening. When the plastic zone size expands, using certain hypotheses, delta can be calculated. The plastic strain intensity is exclusively dependent on parameter J [fr

  3. Optical fiber meta-tips

    Science.gov (United States)

    Principe, Maria; Micco, Alberto; Crescitelli, Alessio; Castaldi, Giuseppe; Consales, Marco; Esposito, Emanuela; La Ferrara, Vera; Galdi, Vincenzo; Cusano, Andrea

    2016-04-01

    We report on the first example of a "meta-tip" configuration that integrates a metasurface on the tip of an optical fiber. Our proposed design is based on an inverted-Babinet plasmonic metasurface obtained by patterning (via focused ion beam) a thin gold film deposited on the tip of an optical fiber, so as to realize an array of rectangular aperture nanoantennas with spatially modulated sizes. By properly tuning the resonances of the aperture nanoantennas, abrupt variations can be impressed in the field wavefront and polarization. We fabricated and characterized several proof-of-principle prototypes operating an near-infrared wavelengths, and implementing the beam-steering (with various angles) of the cross-polarized component, as well as the excitation of surface waves. Our results pave the way to the integration of the exceptional field-manipulation capabilities enabled by metasurfaces with the versatility and ubiquity of fiber-optics technological platforms.

  4. ZBrush Professional Tips and Techniques

    CERN Document Server

    Gaboury, Paul

    2012-01-01

    Learn to work effectively and creatively with all versions of ZBrush! ZBrush is used by top artists in Hollywood to model and sculpt characters in such films as Avatar, Iron Man, and Pirates of the Caribbean. In addition, this amazing technology is also used in jewelry design, forensic science, aerospace, video games, toy creation, and the medical field. Written by Pixologic's in-house ZBrush expert Paul Gaboury, this full-color, beautifully illustrated guide provides you with the ultimate tips and tricks to maximize your use of all versions of ZBrush. Reveals numerous little-known tips and tr

  5. Statistics-based email communication security behavior recognition

    Science.gov (United States)

    Yi, Junkai; Su, Yueyang; Zhao, Xianghui

    2017-08-01

    With the development of information technology, e-mail has become a popular communication medium. It has great significant to determine the relationship between the two sides of the communication. Firstly, this paper analysed and processed the content and attachment of e-mail using the skill of steganalysis and malware analysis. And it also conducts the following feature extracting and behaviour model establishing which based on Naive Bayesian theory. Then a behaviour analysis method was employed to calculate and evaluate the communication security. Finally, some experiments about the accuracy of the behavioural relationship of communication identifying has been carried out. The result shows that this method has a great effects and correctness as eighty-four percent.

  6. BEBAN JARINGAN SAAT MENGAKSES EMAIL DARI BEBERAPA MAIL SERVER

    Directory of Open Access Journals (Sweden)

    Husni Thamrin

    2017-01-01

    Full Text Available Expensive internet facilities require prudent in its use both as a source of information and communication media. This paper discusses observations of the perceived burden of network bandwidth when accessing some of the mail server using a webmail application. Mail server in question consists of three commercial server and 2 non-commercial server. Data when it download home page, while logged in, open the email, and during idle logout recorded with sniffer Wireshark. Observations in various situations and scenarios indicate that access Yahoo email gives the network load is very high while the SquirrelMail gives the network load is very low than 5 other mail servers. For an institution, use a local mail server (institutional is highly recommended in the context of banddwidth savings.

  7. E-mail communication patterns and job burnout

    Science.gov (United States)

    2018-01-01

    A considerable body of research has documented the negative effects of job burnout on employees and their organizations, emphasizing the importance of the identification of early signs of the phenomenon for the purposes of prevention and intervention. However, such timely identification is difficult due to the time and cost of assessing the burnout levels of all employees in an organization using established scales. In this paper, we propose an innovative way to identify employees at risk of job burnout by analyzing their e-mail communication patterns. Building on the Job Demands–Resources model, we theorize about the relationship between e-mail communication patterns and levels of employee exhaustion and disengagement (two dimensions of burnout). We analyzed 52,190 e-mails exchanged between 57 employees of a medium sized R&D company over a five-month period. We then related these employees’ communication patterns to their levels of burnout, collected using an established scale (the OLBI–Oldenburg Burnout Inventory). Our results provide support for the overall proposition of the paper, that e-mail communications can be used to identify individuals at risk of job burnout. Our models explain up to 34% of the variance of burnout and up to 37% and 19% respectively of the variance of exhaustion and disengagement. They also successfully distinguish between employees with a higher risk of burnout and those with lower levels of risk (F1 score of 84% with recall of 100% and 73% precision). We discuss the implications of our results and present suggestions for future research. PMID:29518128

  8. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... procedure work? How is the procedure performed? What will I experience during and after the procedure? Who interprets the results and how do I get them? What are the benefits vs. risks? What are the limitations of TIPS? ...

  9. Nanobits: customizable scanning probe tips

    DEFF Research Database (Denmark)

    Kumar, Rajendra; Shaik, Hassan Uddin; Sardan Sukas, Özlem

    2009-01-01

    We present here a proof-of-principle study of scanning probe tips defined by planar nanolithography and integrated with AFM probes using nanomanipulation. The so-called 'nanobits' are 2-4 mu m long and 120-150 nm thin flakes of Si3N4 or SiO2, fabricated by electron beam lithography and standard s...

  10. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... thin, hollow plastic tube into the vessel. Using real time x-ray guidance, your doctor will then guide ... invasive procedure that typically has a shorter recovery time than surgery. Your TIPS should have less of an effect ...

  11. The tip of the iceberg

    DEFF Research Database (Denmark)

    Bjørst, Lill Rastad

    2010-01-01

      Abstract: The tip of the iceberg: Ice as a nonhuman actor of the climate change debate   The global climate change debate has the Arctic as a core region of concern and ice has become a central aspect of discourses. This article discusses ice representations from six different contexts linked...

  12. Gardening Health and Safety Tips

    Science.gov (United States)

    ... or who take certain medications (i.e. for depression, insomnia, or poor circulation). Eat healthy foods to help keep you energized. Extreme Heat Keep Your Cool in Hot Weather Tips for persons with disabilities and physical activity. Talk to your health care provider if you have physical, mental, or ...

  13. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... Portosystemic Shunt (TIPS) Sponsored by Please note RadiologyInfo.org is not a medical facility. Please contact your ... links: For the convenience of our users, RadiologyInfo .org provides links to relevant websites. RadiologyInfo.org , ACR ...

  14. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Medline Plus

    Full Text Available ... in creating the TIPS. top of page Additional Information and Resources Society of Interventional Radiology (SIR) - Patient Center This page ... of Use | Links | Site Map Copyright © 2018 ... To help ensure current and accurate information, we do not permit copying but encourage linking ...

  15. Useful Tips on Avoiding Plagiarism

    Science.gov (United States)

    Hamalainen, Maryellen

    2007-01-01

    Teachers are generally kind and nurturing people. Students who plagiarize their assignments from these kind and nurturing teachers are often given a second chance when caught and encouraged to do their work over, but it would be better to eliminate their need to plagiarize. The first tip for eliminating plagiarism has not so much to do with what…

  16. Assigning Effective Homework. Classroom Tips

    Science.gov (United States)

    American Federation of Teachers (NJ), 2010

    2010-01-01

    Each new school year brings high hopes, great expectations and challenges for both new and seasoned educators. The American Federation of Teachers (AFT) has developed a series called "Classroom Tips" to help educators start the year right and anticipate the year ahead. Over the past 40 years, most research studies on homework have found that…

  17. Ombuds' corner: Code of Conduct and e-mails

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Luke* holds a key position in the coordination of a large project. He is also a recognized expert in modeling complicated structures. Because of his expertise in the field, he receives a considerable number of e-mails every day which he has trouble responding to in addition to his responsibilities of management and development. Constantly interrupted, he tends to answer his emails quickly, sometimes even in an instinctive way, which leads to somewhat laconic messages. One day he receives an e-mail from Dave* challenging some of the decisions taken by the project’s management. Luke agrees with Dave’s remarks, which seem justified given his own expertise of the su...

  18. Classification of Phishing Email Using Random Forest Machine Learning Technique

    Directory of Open Access Journals (Sweden)

    Andronicus A. Akinyelu

    2014-01-01

    Full Text Available Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals. In 2012, an online report put the loss due to phishing attack at about $1.5 billion. This global impact of phishing attacks will continue to be on the increase and thus requires more efficient phishing detection techniques to curb the menace. This paper investigates and reports the use of random forest machine learning algorithm in classification of phishing attacks, with the major objective of developing an improved phishing email classifier with better prediction accuracy and fewer numbers of features. From a dataset consisting of 2000 phishing and ham emails, a set of prominent phishing email features (identified from the literature were extracted and used by the machine learning algorithm with a resulting classification accuracy of 99.7% and low false negative (FN and false positive (FP rates.

  19. Safe Sex Tips for Seniors

    Science.gov (United States)

    ... day and age — with more open attitudes toward sexuality, better health among older adults, internet dating, and ... problems. Last Updated October 2015 © 2018 Health in Aging. All rights reserved. Feedback • Site Map • Privacy Policy • ...

  20. Tips for Socializing with Aphasia

    Science.gov (United States)

    ... continue to limit distractions such as background noise (music, other talking, TV). As you become more comfortable ... Aphasia," Stroke Connection Magazine, March/April 2006 (Last science update March 2013) Constraint-induced therapies (CIT) have ...

  1. Testing Behavior Change Techniques to Encourage Primary Care Physicians to Access Cancer Screening Audit and Feedback Reports: Protocol for a Factorial Randomized Experiment of Email Content

    Science.gov (United States)

    Witteman, Holly O; Bouck, Zachary; Bravo, Caroline A; Desveaux, Laura; Llovet, Diego; Presseau, Justin; Saragosa, Marianne; Taljaard, Monica; Umar, Shama; Grimshaw, Jeremy M; Tinmouth, Jill; Ivers, Noah M

    2018-01-01

    Background Cancer Care Ontario’s Screening Activity Report (SAR) is an online audit and feedback tool designed to help primary care physicians in Ontario, Canada, identify patients who are overdue for cancer screening or have abnormal results requiring follow-up. Use of the SAR is associated with increased screening rates. To encourage SAR use, Cancer Care Ontario sends monthly emails to registered primary care physicians announcing that updated data are available. However, analytics reveal that 50% of email recipients do not open the email and less than 7% click the embedded link to log in to their report. Objective The goal of the study is to determine whether rewritten emails result in increased log-ins. This manuscript describes how different user- and theory-informed messages intended to improve the impact of the monthly emails will be experimentally tested and how a process evaluation will explore why and how any effects observed were (or were not) achieved. Methods A user-centered approach was used to rewrite the content of the monthly email, including messages operationalizing 3 behavior change techniques: anticipated regret, material incentive (behavior), and problem solving. A pragmatic, 2x2x2 factorial experiment within a multiphase optimization strategy will test the redesigned emails with an embedded qualitative process evaluation to understand how and why the emails may or may not have worked. Trial outcomes will be ascertained using routinely collected administrative data. Physicians will be recruited for semistructured interviews using convenience and snowball sampling. Results As of April 2017, 5576 primary care physicians across the province of Ontario, Canada, had voluntarily registered for the SAR, and in so doing, signed up to receive the monthly email updates. From May to August 2017 participants received the redesigned monthly emails with content specific to their allocated experimental condition prompting use of the SAR. We have not yet

  2. Testing Behavior Change Techniques to Encourage Primary Care Physicians to Access Cancer Screening Audit and Feedback Reports: Protocol for a Factorial Randomized Experiment of Email Content.

    Science.gov (United States)

    Vaisson, Gratianne; Witteman, Holly O; Bouck, Zachary; Bravo, Caroline A; Desveaux, Laura; Llovet, Diego; Presseau, Justin; Saragosa, Marianne; Taljaard, Monica; Umar, Shama; Grimshaw, Jeremy M; Tinmouth, Jill; Ivers, Noah M

    2018-02-16

    Cancer Care Ontario's Screening Activity Report (SAR) is an online audit and feedback tool designed to help primary care physicians in Ontario, Canada, identify patients who are overdue for cancer screening or have abnormal results requiring follow-up. Use of the SAR is associated with increased screening rates. To encourage SAR use, Cancer Care Ontario sends monthly emails to registered primary care physicians announcing that updated data are available. However, analytics reveal that 50% of email recipients do not open the email and less than 7% click the embedded link to log in to their report. The goal of the study is to determine whether rewritten emails result in increased log-ins. This manuscript describes how different user- and theory-informed messages intended to improve the impact of the monthly emails will be experimentally tested and how a process evaluation will explore why and how any effects observed were (or were not) achieved. A user-centered approach was used to rewrite the content of the monthly email, including messages operationalizing 3 behavior change techniques: anticipated regret, material incentive (behavior), and problem solving. A pragmatic, 2x2x2 factorial experiment within a multiphase optimization strategy will test the redesigned emails with an embedded qualitative process evaluation to understand how and why the emails may or may not have worked. Trial outcomes will be ascertained using routinely collected administrative data. Physicians will be recruited for semistructured interviews using convenience and snowball sampling. As of April 2017, 5576 primary care physicians across the province of Ontario, Canada, had voluntarily registered for the SAR, and in so doing, signed up to receive the monthly email updates. From May to August 2017 participants received the redesigned monthly emails with content specific to their allocated experimental condition prompting use of the SAR. We have not yet begun analyses. This study will inform

  3. Tips for Postpartum Dads and Partners

    Science.gov (United States)

    ... Blues: Partners Interview with Wade Bowen Coping with Suicide & Loss Tips for Postpartum Dads and Partners Pregnancy and postpartum mood and anxiety disorders affect the whole family. Here are some tips ...

  4. Tips for Reducing Pesticide Impacts on Wildlife

    Science.gov (United States)

    This Web page provides tips for pesticide users in residential and agricultural settings, as well as tips for certified pesticide applicators for ways to protect wildlife from potentially harmful effects of pesticides.

  5. Sound source location in cavitating tip vortices

    International Nuclear Information System (INIS)

    Higuchi, H.; Taghavi, R.; Arndt, R.E.A.

    1985-01-01

    Utilizing an array of three hydrophones, individual cavitation bursts in a tip vortex could be located. Theoretically, four hydrophones are necessary. Hence the data from three hydrophones are supplemented with photographic observation of the cavitating tip vortex. The cavitation sound sources are found to be localized to within one base chord length from the hydrofoil tip. This appears to correspond to the region of initial tip vortex roll-up. A more extensive study with a four sensor array is now in progress

  6. Radiofrequency Wire Recanalization of Chronically Thrombosed TIPS

    Energy Technology Data Exchange (ETDEWEB)

    Majdalany, Bill S., E-mail: bmajdala@med.umich.edu [University of Michigan Health System, Division of Interventional Radiology, Department of Radiology (United States); Elliott, Eric D., E-mail: eric.elliott@osumc.edu [The Ohio State University Wexner Medical Center, Division of Interventional Radiology, Department of Radiology (United States); Michaels, Anthony J., E-mail: Anthony.michaels@osumc.edu; Hanje, A. James, E-mail: James.Hanje@osumc.edu [The Ohio State University Wexner Medical Center, Division of Gastroenterology and Hepatology, Department of Medicine (United States); Saad, Wael E. A., E-mail: wsaad@med.umich.edu [University of Michigan Health System, Division of Interventional Radiology, Department of Radiology (United States)

    2016-07-15

    Radiofrequency (RF) guide wires have been applied to cardiac interventions, recanalization of central venous thromboses, and to cross biliary occlusions. Herein, the use of a RF wire technique to revise chronically occluded transjugular intrahepatic portosystemic shunts (TIPS) is described. In both cases, conventional TIPS revision techniques failed to revise the chronically thrombosed TIPS. RF wire recanalization was successfully performed through each of the chronically thrombosed TIPS, demonstrating initial safety and feasibility in this application.

  7. Update of CERN exchange network

    CERN Multimedia

    2003-01-01

    An update of the CERN exchange network will be done next April. Disturbances or even interruptions of telephony services may occur from 4th to 24th April during evenings from 18:30 to 00:00 but will not exceed more than 4 consecutive hours (see tentative planning below). In addition, the voice messaging system will be shut down on March, 26th April from 18:00 to 00:00. Calls supposed to be routed to the voice messaging system will not be possible during the shutdown. CERN divisions are invited to avoid any change requests (set-ups, move or removals) of telephones and fax machines from 4th to 25th April. Everything will be done to minimize potential inconveniences which may occur during this update. There will be no loss of telephone functionalities. CERN GSM portable phones won't be affected by this change. Should you need more details, please send us your questions by email to Standard.Telephone@cern.ch. Date Change type Affected areas March 26 Update of the voice messaging system All CERN sites April...

  8. Injector tip for an internal combustion engine

    Science.gov (United States)

    Shyu, Tsu Pin; Ye, Wen

    2003-05-20

    This invention relates to a the tip structure of a fuel injector as used in a internal combustion engine. Internal combustion engines using Homogeneous Charge Compression Ignition (HCCI) technology require a tip structure that directs fuel spray in a downward direction. This requirement necessitates a tip design that is capable of withstanding mechanical stresses associated with the design.

  9. Rapid response: email, immediacy, and medical humanitarianism in Aceh, Indonesia.

    Science.gov (United States)

    Grayman, Jesse Hession

    2014-11-01

    After more than 20 years of sporadic separatist insurgency, the Free Aceh Movement and the Indonesian government signed an internationally brokered peace agreement in August 2005, just eight months after the Indian Ocean tsunami devastated Aceh's coastal communities. This article presents a medical humanitarian case study based on ethnographic data I collected while working for a large aid agency in post-conflict Aceh from 2005 to 2007. In December 2005, the agency faced the first test of its medical and negotiation capacities to provide psychiatric care to a recently amnestied political prisoner whose erratic behavior upon returning home led to his re-arrest and detention at a district police station. I juxtapose two methodological approaches-an ethnographic content analysis of the agency's email archive and field-based participant-observation-to recount contrasting narrative versions of the event. I use this contrast to illustrate and critique the immediacy of the humanitarian imperative that characterizes the industry. Immediacy is explored as both an urgent moral impulse to assist in a crisis and a form of mediation that seemingly projects neutral and transparent transmission of content. I argue that the sense of immediacy afforded by email enacts and amplifies the humanitarian imperative at the cost of abstracting elite humanitarian actors out of local and moral context. As a result, the management and mediation of this psychiatric case by email produced a bureaucratic model of care that failed to account for complex conditions of chronic political and medical instability on the ground. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Phishtest: Measuring the Impact of Email Headers on the Predictive Accuracy of Machine Learning Techniques

    Science.gov (United States)

    Tout, Hicham

    2013-01-01

    The majority of documented phishing attacks have been carried by email, yet few studies have measured the impact of email headers on the predictive accuracy of machine learning techniques in detecting email phishing attacks. Research has shown that the inclusion of a limited subset of email headers as features in training machine learning…

  11. Email Related Crimes%电子邮件犯罪

    Institute of Scientific and Technical Information of China (English)

    王小刚

    2006-01-01

    @@ Email has fast emerged as the world's most preferred form of communication. Billions of email messages traverse1 the globe daily. Like any other form of communication, email is also misused by criminal elements. The ease, speed and relative anonymity2 of email has made it a powerful tool for criminals.

  12. Measuring Future Worker Productivity via Business Email Message Creation: Implications for Education

    Science.gov (United States)

    Hagler, Barbara E.; Erthal, Margaret; Walzer, Dona; Anderson, Marcia A.

    2009-01-01

    Objective: This research was conducted to determine if relationships exist among college students' business email message productivity score and (a) email message quality score, (b) text keying method used to create email message, and (c) self-reported college English grade. Background: Email is increasingly the communication channel preferred for…

  13. Employees' Perceptions of Email Communication, Volume and Management Strategies in an Australian University

    Science.gov (United States)

    Pignata, Silvia; Lushington, Kurt; Sloan, Jeremy; Buchanan, Fiona

    2015-01-01

    Despite email playing a central role in university business, little is known about the strategies used by staff to manage email and the factors contributing to email overload. In a mixed method study undertaken in one Australian university comparing academic (n = 193) and professional (n = 278) staff, we found that while email volume was higher in…

  14. 36 CFR 1250.24 - Will you accept a FOIA request through email?

    Science.gov (United States)

    2010-07-01

    ... request through email? 1250.24 Section 1250.24 Parks, Forests, and Public Property NATIONAL ARCHIVES AND... Access Records Under FOIA § 1250.24 Will you accept a FOIA request through email? Yes, send email FOIA... of your email message that you are sending a FOIA request. The body of the message must contain all...

  15. 36 CFR 1250.76 - May I email my FOIA appeal?

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false May I email my FOIA appeal... email my FOIA appeal? Yes, you may submit a FOIA appeal via email to http://www.archives.gov/global_pages/inquire_form.html. You must put the words “FOIA Appeal” in the subject line of your email message...

  16. Update History of This Database - TP Atlas | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data ...List Contact us TP Atlas Update History of This Database Date Update contents 2013/12/16 The email address i...s ( http://www.tanpaku.org/tpatlas/ ) is opened. About This Database Database Description Download License Update History of Thi...s Database Site Policy | Contact Us Update History of This Database - TP Atlas | LSDB Archive ... ...n the contact information is corrected. 2013/11/19 TP Atlas English archive site is opened. 2008/4/1 TP Atla

  17. Nuclear medicine image and data interchange through e-mail

    Energy Technology Data Exchange (ETDEWEB)

    Lyra, M; Skouroliakou, K; Perris, A; Georgossopoulos, C; Pappas, D [Radiology Department, Athens University, Athens (Greece); Stefanides, C [Pediatric Hospital, Aglaia Kyriakou, Athens (Greece)

    1999-12-31

    Prosperity of easy interchange in every day practice of Nuclear Medicine found its application through the INTERNET media. We use a simple and safe way to interchange images and diagnostic information between the scintigraphic acquisition and processing location and the clinical department in order to improve patient`s health care and young doctor`s education. images and patient reports are transferred and saved through dedicated software to a workstation that transforms y-camera scintigraphic images in a PC readable format. Diagnosis reports and scintigraphic images are incorporated to a database directory in hypertext form. Usual WWW connection gives the possibility of patients` examinations transfer by email attachments as well as interchange of relative comments towards both directions. Cost effective solution has been achieved using standard hard- and soft-ware. Furthermore, both educational files can be downloaded from our department ftp location, by a unique password. (authors) 7 refs., 3 figs.

  18. Nuclear medicine image and data interchange through e-mail

    International Nuclear Information System (INIS)

    Lyra, M.; Skouroliakou, K.; Perris, A.; Georgossopoulos, C.; Pappas, D.; Stefanides, C.

    1998-01-01

    Prosperity of easy interchange in every day practice of Nuclear Medicine found its application through the INTERNET media. We use a simple and safe way to interchange images and diagnostic information between the scintigraphic acquisition and processing location and the clinical department in order to improve patient's health care and young doctor's education. images and patient reports are transferred and saved through dedicated software to a workstation that transforms y-camera scintigraphic images in a PC readable format. Diagnosis reports and scintigraphic images are incorporated to a database directory in hypertext form. Usual WWW connection gives the possibility of patients' examinations transfer by email attachments as well as interchange of relative comments towards both directions. Cost effective solution has been achieved using standard hard- and soft-ware. Furthermore, both educational files can be downloaded from our department ftp location, by a unique password. (authors)

  19. E-Mail Server and Traffic Control Management in 2012

    Directory of Open Access Journals (Sweden)

    Cosmin Catalin Olteanu

    2012-12-01

    Full Text Available Emails represents one of the most used communication system in world wide web for more than 15 years and “spam” messages are one of the most annoying and disturbing phenomena. All of us are aware that online marketers are trying to transmit their advertising messages to as many addresses they can. For such “unwanted” messages, adaptive systems must be assembled to review and mark what is wright and what is bad. Always these systems must adapt to consumers preferences to mark only that messages that are not in his white list. Surveys for more than 3000000 messages showed me that some criteria can be defined by start.

  20. Windows 8 visual quick tips

    CERN Document Server

    McFedries, Paul

    2012-01-01

    Easy-in, easy-out format covers all the bells and whistles of Windows 8 If you want to learn how to work smarter and faster in Microsoft's Windows 8 operating system, this easy-to-use, compact guide delivers the goods. Designed for visual learners, it features short explanations and full-color screen shots on almost every page, and it's packed with timesaving tips and helpful productivity tricks. From enhancing performance and managing digital content to setting up security and much more, this handy guide will help you get more out of Windows 8. Uses full-color screen shots and short, step-by-

  1. Advantages and Disadvantages of Educational Email Alerts for Family Physicians: Viewpoint

    Science.gov (United States)

    Badran, Hani; Grad, Roland

    2015-01-01

    Background Electronic knowledge resources constitute an important channel for accredited Continuing Medical Education (CME) activities. However, email usage for educational purposes is controversial. On the one hand, family physicians become aware of new information, confirm what they already know, and obtain reassurance by reading educational email alerts. Email alerts can also encourage physicians to search Web-based resources. On the other hand, technical difficulties and privacy issues are common obstacles. Objective The purpose of this discussion paper, informed by a literature review and a small qualitative study, was to understand family physicians’ knowledge, attitudes, and behavior in regard to email in general and educational emails in particular, and to explore the advantages and disadvantages of educational email alerts. In addition, we documented participants’ suggestions to improve email alert services for CME. Methods We conducted a qualitative descriptive study using the “Knowledge, Attitude, Behavior” model. We conducted semi-structured face-to-face interviews with 15 family physicians. We analyzed the collected data using inductive-deductive thematic qualitative data analysis. Results All 15 participants scanned and prioritized their email, and 13 of them checked their email daily. Participants mentioned (1) advantages of educational email alerts such as saving time, convenience and valid information, and (2) disadvantages such as an overwhelming number of emails and irrelevance. They offered suggestions to improve educational email. Conclusions The advantages of email alerts seem to compensate for their disadvantages. Suggestions proposed by family physicians can help to improve educational email alerts. PMID:25803184

  2. Advantages and disadvantages of educational email alerts for family physicians: viewpoint.

    Science.gov (United States)

    Badran, Hani; Pluye, Pierre; Grad, Roland

    2015-02-27

    Electronic knowledge resources constitute an important channel for accredited Continuing Medical Education (CME) activities. However, email usage for educational purposes is controversial. On the one hand, family physicians become aware of new information, confirm what they already know, and obtain reassurance by reading educational email alerts. Email alerts can also encourage physicians to search Web-based resources. On the other hand, technical difficulties and privacy issues are common obstacles. The purpose of this discussion paper, informed by a literature review and a small qualitative study, was to understand family physicians' knowledge, attitudes, and behavior in regard to email in general and educational emails in particular, and to explore the advantages and disadvantages of educational email alerts. In addition, we documented participants' suggestions to improve email alert services for CME. We conducted a qualitative descriptive study using the "Knowledge, Attitude, Behavior" model. We conducted semi-structured face-to-face interviews with 15 family physicians. We analyzed the collected data using inductive-deductive thematic qualitative data analysis. All 15 participants scanned and prioritized their email, and 13 of them checked their email daily. Participants mentioned (1) advantages of educational email alerts such as saving time, convenience and valid information, and (2) disadvantages such as an overwhelming number of emails and irrelevance. They offered suggestions to improve educational email. The advantages of email alerts seem to compensate for their disadvantages. Suggestions proposed by family physicians can help to improve educational email alerts.

  3. The relative efficacy of telephone and email reminders to elicit blood donation.

    Science.gov (United States)

    Germain, M; Godin, G

    2016-04-01

    The aim of the study was to test the relative efficacy of telephone and email reminders to trigger blood donation. A sample of 3454 donors was randomized to one of three conditions: phone only (n = 1176), email only (n = 1091) and phone + email (n = 1187). There was a higher proportion of donors who registered to give blood in the phone + email condition (18·45%) compared to the other two conditions (phone: 15·73%, P email: 13·20%; P email conditions did not differ significantly (P = 0·16), suggesting equivalent efficacy. © 2015 International Society of Blood Transfusion.

  4. Collaborative writing: Tools and tips

    Directory of Open Access Journals (Sweden)

    Eapen Bell

    2007-01-01

    Full Text Available Majority of technical writing is done by groups of experts and various web based applications have made this collaboration easy. Email exchange of word processor documents with tracked changes used to be the standard technique for collaborative writing. However web based tools like Google docs and Spreadsheets have made the process fast and efficient. Various versioning tools and synchronous editors are available for those who need additional functionality. Having a group leader who decides the scheduling, communication and conflict resolving protocols is important for successful collaboration.

  5. Collaborative writing: Tools and tips.

    Science.gov (United States)

    Eapen, Bell Raj

    2007-01-01

    Majority of technical writing is done by groups of experts and various web based applications have made this collaboration easy. Email exchange of word processor documents with tracked changes used to be the standard technique for collaborative writing. However web based tools like Google docs and Spreadsheets have made the process fast and efficient. Various versioning tools and synchronous editors are available for those who need additional functionality. Having a group leader who decides the scheduling, communication and conflict resolving protocols is important for successful collaboration.

  6. Exposure to the Tips From Former Smokers Campaign Among Adolescents in the United States.

    Science.gov (United States)

    Zhao, Xiaoquan; Cai, Xiaomei

    2016-05-01

    Evaluation of the Tips from Former Smokers (Tips) campaign in the United States so far has focused exclusively on adult smokers. This study provides evidence on the level of exposure to Tips among adolescents in the United States, an important secondary audience for the campaign. Data came from the 2013 National Youth Tobacco Survey (N = 18 406). Exposure to Tips was measured by ad recall. Characteristics of adolescents reporting exposure versus no exposure were examined through a series of bivariate analysis linking exposure to smoking status, demographics, and important risk factors. Most adolescents in the United States (63%, 95% confidence interval [CI] = 60.6%, 65.3%) were exposed to at least one Tips ad. Current smokers (70.6%, 95% CI = 67.7%, 73.4%), noncurrent smokers (67.7%, 95% CI = 65.5%, 69.7%), and high-risk never-smokers (63.8%, 95% CI = 60.2%, 67.2%) reported greater exposure than low-risk never-smokers (60.7%, 95% CI = 57.8%, 63.5%; all P advertising from one or more sources; and have skipped classes in the past 30 days. Tips has significant reach among adolescents in the United States, particularly among those with smoking experience and those whose life environments include more pro-smoking influences. Close monitoring of the Tips' impact on this important population is needed. This study shows substantial adolescent awareness of the Tips campaign in the United States. This evidence has important implications for the comprehensive evaluation of the public health impact of Tips. So far research on Tips has focused almost entirely on adult smokers. Findings of this study suggest that the potential impact of Tips on adolescents, particularly those at high risk of smoking, should become an integral part of the evaluation research agenda. © The Author 2015. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  7. Towards easy and reliable AFM tip shape determination using blind tip reconstruction

    International Nuclear Information System (INIS)

    Flater, Erin E.; Zacharakis-Jutz, George E.; Dumba, Braulio G.; White, Isaac A.; Clifford, Charles A.

    2014-01-01

    Quantitative determination of the geometry of an atomic force microscope (AFM) probe tip is critical for robust measurements of the nanoscale properties of surfaces, including accurate measurement of sample features and quantification of tribological characteristics. Blind tip reconstruction, which determines tip shape from an AFM image scan without knowledge of tip or sample shape, was established most notably by Villarrubia [J. Res. Natl. Inst. Stand. Tech. 102 (1997)] and has been further developed since that time. Nevertheless, the implementation of blind tip reconstruction for the general user to produce reliable and consistent estimates of tip shape has been hindered due to ambiguity about how to choose the key input parameters, such as tip matrix size and threshold value, which strongly impact the results of the tip reconstruction. These key parameters are investigated here via Villarrubia's blind tip reconstruction algorithms in which we have added the capability for users to systematically vary the key tip reconstruction parameters, evaluate the set of possible tip reconstructions, and determine the optimal tip reconstruction for a given sample. We demonstrate the capabilities of these algorithms through analysis of a set of simulated AFM images and provide practical guidelines for users of the blind tip reconstruction method. We present a reliable method to choose the threshold parameter corresponding to an optimal reconstructed tip shape for a given image. Specifically, we show that the trend in how the reconstructed tip shape varies with threshold number is so regular that the optimal, or Goldilocks, threshold value corresponds with the peak in the derivative of the RMS difference with respect to the zero threshold curve vs. threshold number. - Highlights: • Blind tip reconstruction algorithms have been implemented and augmented to determine the optimal input parameters. • We demonstrate the capabilities of the algorithms using a simulated AFM

  8. Influence of the tip mass on the tip-sample interactions in TM-AFM

    Energy Technology Data Exchange (ETDEWEB)

    Pishkenari, Hossein Nejat, E-mail: nejat@mech.sharif.edu [Nano-Robotics Laboratory, Center of Excellence in Design, Robotics and Automation, School of Mechanical Engineering, Sharif University of Technology, Tehran, P.O. Box 11365-9465 (Iran, Islamic Republic of); Meghdari, Ali [Nano-Robotics Laboratory, Center of Excellence in Design, Robotics and Automation, School of Mechanical Engineering, Sharif University of Technology, Tehran, P.O. Box 11365-9465 (Iran, Islamic Republic of)

    2011-07-15

    This paper focuses on the influences of the tip mass ratio (the ratio of the tip mass to the cantilever mass), on the excitation of higher oscillation eigenmodes and also on the tip-sample interaction forces in tapping mode atomic force microscopy (TM-AFM). A precise model for the cantilever dynamics capable of accurate simulations is essential for the investigation of the tip mass effects on the interaction forces. In the present work, the finite element method (FEM) is used for modeling the AFM cantilever to consider the oscillations of higher eigenmodes oscillations. In addition, molecular dynamics (MD) is used to calculate precise data for the tip-sample force as a function of tip vertical position with respect to the sample. The results demonstrate that in the presence of nonlinear tip-sample interaction forces, the tip mass ratio plays a significant role in the excitations of higher eigenmodes and also in the normal force applied on the surface. Furthermore, it has been shown that the difference between responses of the FEM and point-mass models in different system operational conditions is highly affected by the tip mass ratio. -- Highlights: {yields} A strong correlation exists between the tip mass ratio and the 18th harmonic amplitude. {yields} Near the critical tip mass ratio a small change in the tip mass may lead to a significant force change. {yields} Inaccuracy of the lumped model depends significantly on the tip mass ratio.

  9. Tip Clearance Control Using Plasma Actuators

    Science.gov (United States)

    2007-03-01

    Clearance Control Using Plasma Actuators 4 posed by Denton (1993). A number of investigators have used partial shrouds, or " winglet " designs to...SDBD actuator Plasma enhanced aerodynamics has been demonstrated in a range of applications involving sepa- ration control, lift enhancement, drag... aerodynamic benefits of a squealer tip geometry. Specifically, the squealer tip is known to reduce the discharge coefficient of the tip gap, thereby

  10. Numerical investigation of tip leakage vortex

    OpenAIRE

    Fredriksen, Vegard

    2017-01-01

    The Kaplan turbine has a small clearance gap between the blade tip and casing to allow the blades to rotate freely. This clearance gap is the cause of an undesirable Tip Leakage Vortex (TLV). A TLV might reduce the turbine efficiency, erode the turbine blades or cause instabilities for the power output. A literature study indicated that the tip clearance gap was a critical parameter affecting the behavior of the TLV. A research gap was observed for an operating Kaplan turbine where the ...

  11. RANS computations of tip vortex cavitation

    Science.gov (United States)

    Decaix, Jean; Balarac, Guillaume; Dreyer, Matthieu; Farhat, Mohamed; Münch, Cécile

    2015-12-01

    The present study is related to the development of the tip vortex cavitation in Kaplan turbines. The investigation is carried out on a simplified test case consisting of a NACA0009 blade with a gap between the blade tip and the side wall. Computations with and without cavitation are performed using a R ANS modelling and a transport equation for the liquid volume fraction. Compared with experimental data, the R ANS computations turn out to be able to capture accurately the development of the tip vortex. The simulations have also highlighted the influence of cavitation on the tip vortex trajectory.

  12. Direct calculation of wind turbine tip loss

    DEFF Research Database (Denmark)

    Wood, D.H.; Okulov, Valery; Bhattacharjee, D.

    2016-01-01

    . We develop three methods for the direct calculation of the tip loss. The first is the computationally expensive calculation of the velocities induced by the helicoidal wake which requires the evaluation of infinite sums of products of Bessel functions. The second uses the asymptotic evaluation......The usual method to account for a finite number of blades in blade element calculations of wind turbine performance is through a tip loss factor. Most analyses use the tip loss approximation due to Prandtl which is easily and cheaply calculated but is known to be inaccurate at low tip speed ratio...

  13. Email authentication using symmetric and asymmetric key algorithm encryption

    Science.gov (United States)

    Halim, Mohamad Azhar Abdul; Wen, Chuah Chai; Rahmi, Isredza; Abdullah, Nurul Azma; Rahman, Nurul Hidayah Ab.

    2017-10-01

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

  14. Email solicitation for scholarly work--a single researcher's perspective.

    Science.gov (United States)

    Bugeja, Justine; Grech, Victor

    2015-01-01

    Publishing is important for career progression. The traditional journal model results in subscribers bearing publication costs. The eagerness with which researchers seek journals for the publishing of their work, along with the internet, has resulted in the creation of a new model called open access (OA). Author/s or their institution/s pay an actual publication fee. This has in turn resulted in the creation of questionable journals which charge steep publishing fees. Emails soliciting publication to one of the authors (VG) were collected for the month of March 2015. Information collected included costs of OA publishing, and whether or not this information was readily available. The appropriateness of said solicitations was also assessed with regard to topics with which the targeted author was familiar. There was a total of 44 solicitations: 3 were duplicates. Out of 41 solicitations, 20 (49%) were appropriate. The open access fee was readily available in 27 out of 41 solicitations (66%). The open access fee averaged $475, ranging from $25 to $1500. The only journal which provided true OA was Medical Principles and Practice, with no fees charged whatsoever. Potential authors should carefully investigate OA journals prior to choosing journals wherein to submit their work.

  15. Improving email strategies to target stress and productivity in clinical practice.

    Science.gov (United States)

    Armstrong, Melissa J

    2017-12-01

    Physician burnout is gaining increased attention in medicine and neurology and often relates to hours worked and insufficient time. One component of this is administrative burden, which relates to regulatory requirements and electronic health record tasks but may also involve increased time spent processing emails. Research in academic medical centers demonstrates that physicians face increasing inbox sizes related to mass distribution emails from various sources on top of emails required for patient care, research, and teaching. This commentary highlights the contribution of administrative tasks to physician burnout, research to date on email in medical contexts, and corporate strategies for reducing email burden that are applicable to neurology clinical practice. Increased productivity and decreased stress can be achieved by limiting the amount one accesses email, managing inbox size, and utilizing good email etiquette. Department and practice physician leaders have roles in decreasing email volume and modeling good practice.

  16. CFD analysis of cloud cavitation on three tip-modified propellers with systematically varied tip geometry

    DEFF Research Database (Denmark)

    Shin, K. W.; Andersen, Poul

    2015-01-01

    The blade tip loading is often reduced as an effort to restrain sheet and tip vortex cavitation in the design of marine propellers. This CFD analysis demonstrates that an excessive reduction of the tip loading can cause cloud cavitation responsible for much of noise and surface erosion. Detached...

  17. 78 FR 45910 - Proposed Information Collection; Comment Request; Current Population Survey (CPS) Email Address...

    Science.gov (United States)

    2013-07-30

    ... Population Survey (CPS) Email Address Collection Test Supplement AGENCY: U.S. Census Bureau, Commerce. ACTION... request clearance for the collection of data concerning the November 2013 Email Address Collection Test... tool to help increase response rates. We foresee that in the future, we could collect email addresses...

  18. Email use in elementary school: an analysis of exchange patterns and content

    NARCIS (Netherlands)

    van der Meij, Hans; Boersma, Kerst

    Email was embedded in a project in design and technology education in elementary school. During four lessons children worked in groups on building a flying object. These groups communicated through email with groups of children from another school. The analyses of the emails, as viewed from

  19. 49 CFR 551.63 - May a foreign manufacturer submit a designation by email or facsimile?

    Science.gov (United States)

    2010-10-01

    ... email or facsimile? 551.63 Section 551.63 Transportation Other Regulations Relating to Transportation... foreign manufacturer submit a designation by email or facsimile? No, the statute requires designation... designation documents submitted via email or facsimile, as they do not satisfy this requirement. ...

  20. The Application of E-Mail to College English Teaching in China

    Science.gov (United States)

    Wang, Guofeng

    2010-01-01

    With the development of information technology in the past 10 years, e-mail has been widely used in the field of English teaching. This paper, based on an analysis of the ways of using e-mail in college English teaching in China, probes the feasibility and the benefits of application of e-mail to college English teaching.

  1. Crack Tip Mechanics in Distortion Gradient Plasticity

    DEFF Research Database (Denmark)

    Fuentes-Alonso, Sandra; Martínez Pañeda, Emilio

    2017-01-01

    Gradient Plasticity (DGP), the influence on crack tip mechanics of DGP's distinguishing features that entail superior modelling capabilities has not been investigated yet. In this work crack tip fields are thoroughly examined by implementing the higher order theory of DGP in an implicit finite element...

  2. Jagged gives endothelial tip cells an edge.

    Science.gov (United States)

    Suchting, Steven; Eichmann, Anne

    2009-06-12

    Sprouting blood vessels have tip cells that lead and stalk cells that follow. Benedito et al. (2009) now show that competition between endothelial cells for the tip position is regulated by glycosylation of Notch receptors and by the opposing actions of the Notch ligands Jagged1 and Delta-like 4.

  3. Twelve Tips for Effective Electronic Presentation.

    Science.gov (United States)

    Crosby, Joy

    1994-01-01

    Offers 12 tips for effective electronic presentation. This article is intended for readers who may be considering using electronic presentation for the first time. Offers reasons for its popularity and occasions when it may be used. The tips offer assistance in the design and presentation of electronic material. (LZ)

  4. Etiquette for medical students' email communication with faculty members: a single-institution study.

    Science.gov (United States)

    Kim, Do-Hwan; Yoon, Hyun Bae; Yoo, Dong-Mi; Lee, Sang-Min; Jung, Hee-Yeon; Kim, Seog Ju; Shin, Jwa-Seop; Lee, Seunghee; Yim, Jae-Joon

    2016-04-27

    Email is widely used as a means of communication between faculty members and students in medical education because of its practical and educational advantages. However, because of the distinctive nature of medical education, students' inappropriate email etiquette may adversely affect their learning as well as faculty members' perception of them. Little data on medical students' competency in professional email writing is available; therefore, this study explored the strengths and weaknesses of medical students' email etiquette and factors that contribute to professional email writing. A total of 210 emails from four faculty members at Seoul National University College of Medicine were collected. An evaluation criteria and a scoring rubric were developed based on the various email-writing guidelines. The rubric comprised 10 items, including nine items for evaluation related to the email components and one item for the assessment of global impression of politeness. Three evaluators independently assessed all emails according to the criteria. Students were identified as being 61.0% male and 52.8% were in the undergraduate-entry program. The sum of each component score was 62.21 out of 100 and the mean value for global impression was 2.6 out of 4. The results demonstrated that students' email etiquettes remained low-to-mediocre for most criteria, except for readability and honorifics. Three criteria, salutation (r=0.668), closing (r=0.653), and sign-off (r=0.646), showed a strong positive correlation with the global impression of politeness. Whether a student entered a graduate-entry program or an undergraduate-entry program significantly contributed to professional email writing after other variables were controlled. Although students in the graduate-entry program demonstrated a relatively superior level of email etiquette, the majority of medical students did not write emails professionally. Educating all medical students in email etiquette may well contribute to

  5. Early warning of climate tipping points

    Science.gov (United States)

    Lenton, Timothy M.

    2011-07-01

    A climate 'tipping point' occurs when a small change in forcing triggers a strongly nonlinear response in the internal dynamics of part of the climate system, qualitatively changing its future state. Human-induced climate change could push several large-scale 'tipping elements' past a tipping point. Candidates include irreversible melt of the Greenland ice sheet, dieback of the Amazon rainforest and shift of the West African monsoon. Recent assessments give an increased probability of future tipping events, and the corresponding impacts are estimated to be large, making them significant risks. Recent work shows that early warning of an approaching climate tipping point is possible in principle, and could have considerable value in reducing the risk that they pose.

  6. EMAIL MARKETING CAMPAIGNS: THE EASIEST PATH FROM ORGANIZATIONS TO CONSUMERS – AN EXPLORATORY ASSESSMENT

    Directory of Open Access Journals (Sweden)

    Pantea Carmen

    2010-07-01

    Full Text Available The email is a valuable marketing tool for conveying short, simple messages that call for action on behalf of the recipient. Usually companies develop email marketing campaigns for attracting new customers, persuading the existing customers to buy again, encourage customer loyalty, announce or remind about special offers or events. For an email marketing campaign to be efficient, it is wanted a greater number of responses from those in the target. The paper assesses in an exploratory manner the frequency in using the email accounts, the level of exposure to email marketing campaigns as well as the type of information wanted to be received by the Romanian users.

  7. Understanding Patient Experience Using Internet-based Email Surveys: A Feasibility Study at Mount Sinai Hospital.

    Science.gov (United States)

    Morgan, Matthew; Lau, Davina; Jivraj, Tanaz; Principi, Tania; Dietrich, Sandra; Bell, Chaim M

    2015-01-01

    Email is becoming a widely accepted communication tool in healthcare settings. This study sought to test the feasibility of Internet-based email surveys of patient experience in the ambulatory setting. We conducted a study of email Internet-based surveys sent to patients in selected ambulatory clinics at Mount Sinai Hospital in Toronto, Canada. Our findings suggest that email links to Internet surveys are a feasible, timely and efficient method to solicit patient feedback about their experience. Further research is required to optimally leverage Internet-based email surveys as a tool to better understand the patient experience.

  8. Transcaval TIPS in patients with failed revision of occluded previous TIPS

    Energy Technology Data Exchange (ETDEWEB)

    Seong, Chang Kyu; Kim, Yong Joo; Shin, Tae Beom; Park, Hyo Yong; Kim, Tae Hun; Kang, Duk Sik [Kyungpook National University School of Medicine, Daegu (Korea, Republic of)

    2001-12-01

    To determine the feasibility of transcaval transjugular intrahepatic portosystemic shunt (TIPS) in patients with occluded previous TIPS. Between February 1996 and December 2000 we performed five transcaval TIPS procedures in four patients with recurrent gastric cardiac variceal bleeding. All four had occluded TIPS, which was between the hepatic and portal vein. The interval between initial TIPS placement and revisional procedures with transcaval TIPS varied between three and 31 months; one patient underwent transcaval TIPS twice, with a 31-month interval. After revision of the occluded shunt failed, direct cavoportal puncture at the retrohepatic segment of the IVC was attempted. Transcaval TIPS placement was technically successful in all cases. In three, tractography revealed slight leakage of contrast materials into hepatic subcapsular or subdiaphragmatic pericaval space. There was no evidence of propagation of extravasated contrast materials through the retroperitoneal space or spillage into the peritoneal space. After the tract was dilated by a bare stent, no patient experienced trans-stent bleeding and no serious procedure-related complications occurred. After successful shunt creation, variceal bleeding ceased in all patients. Transcaval TIPS placement is an effective and safe alternative treatment in patients with occluded previous TIPS and no hepatic veins suitable for new TIPS.

  9. Securing E-mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

    Directory of Open Access Journals (Sweden)

    Andri Zakariya

    2012-12-01

    Full Text Available One of the most popular internet services is electronic mail (e-mail. By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

  10. The tipping point: A mathematical model for the profit-driven abandonment of restaurant tipping

    Science.gov (United States)

    Clifton, Sara M.; Herbers, Eileen; Chen, Jack; Abrams, Daniel M.

    2018-02-01

    The custom of voluntarily tipping for services rendered has gone in and out of fashion in America since its introduction in the 19th century. Restaurant owners that ban tipping in their establishments often claim that social justice drives their decisions, but we show that rational profit-maximization may also justify the decisions. Here, we propose a conceptual model of restaurant competition for staff and customers, and we show that there exists a critical conventional tip rate at which restaurant owners should eliminate tipping to maximize profits. Because the conventional tip rate has been increasing steadily for the last several decades, our model suggests that restaurant owners may abandon tipping en masse when that critical tip rate is reached.

  11. An Empirical Study of Email-Based Advertisement and its Influence on Consumers’ Attitude

    Directory of Open Access Journals (Sweden)

    Navid Behravan

    2012-07-01

    Full Text Available E-commerce becomes a cornerstone for many businesses over the recent years. Align with e-commerce activities, the marketing communication through online media plays a major role in achieving competitive advantageous. E-mail advertising in this context offers a cost effective, direct and reciprocal means for businesses overcoming time and geographical barriers. As so, this study discussed the advertising e-mail characteristics and its influences on customers' attitude about email-based advertisement. According to the research findings, entertainment and informativeness of advertising email content is strongly and positively affect customers’ attitude about email-based advertisement. On the other hand, the privacy of advertising e-mail is strongly, yet negatively influences the customers’ attitude towards email-based advertisement.

  12. Clinician-patient E-mail communication: challenges for reimbursement.

    Science.gov (United States)

    Komives, Eugenie M

    2005-01-01

    Clinicians are rapidly gaining experience with online clinician-patient consultation, and more tools are becoming available to support these efforts. In addition, we now have evidence that using electronic communication is cost-effective to payers and appealing to patients and providers. At present, there appear to be few barriers to the adoption of these solutions for practices that use other online services. Security concerns can easily be overcome by using programs described in this commentary. Larger and longer studies that evaluate the benefits and cost savings in more detail may help convince other payers and providers of the utility of the Web-based programs. More studies are needed to understand the effect of dinician-patient electronic communication on the costs of caring for chronic illness. When these solutions also include support tools, such as electronic prescribing, which could improve patient safety and quality of care, they should be encouraged. In their article entitled, "Electrons in Flight-Email between Doctors and Patients," Delbanco and Sands postulate that the future of e-communication in medicine will be integrated with a patient-controlled health record and will include secure synchronous and asynchronous communication, video conferencing and messaging, instant transcription into the written record, full-patient access to the record, translation into different languages, connectivity to multiple data sources, incorporation of multi-media educational materials. It-will also allow data from home-based diagnostic technology to be sent to clinicians. "Electronic communication will move medicine inexorably toward such transparency, enabling doctors and patients to share knowledge, responsibility, and decision-making more equally. We need to explore rapidly how this change will affect the quality of care for patients and the quality of life for doctors." The widespread dependence on Internet-based electronic communication to support a variety of

  13. Tipping device for large components

    International Nuclear Information System (INIS)

    Guigon, J.P.; Beraudier, D.

    1984-01-01

    For large components machining as components of a pressurized water reactor, it is necessary to have means allowing to present them in a position determined with regard to the machine tool used. The aim of the invention is a tipping device which consists of a base resting on the ground, a support-table mounted on this base, moving in rotation with the aid of at least a pivot joint of which axis is horizontal and parallel to the table and a gear pivot allowing to get a very good precision for the orientation of the piece and a very good stability whatever the orientation may be. The output shaft pinion of the base meshes with a gear wheel segment fixed to the table structure. Safety straps fasten the table structure to the base, as they are secured by horizontal pins. The toe pins run in straight slot holes incorporated in base jaws. The table rotation may be controlled by a spring-loaded braking mechanism which acts on the pivot axis and can be released by a hydraulic jack. The hydraulic pressure is used to prevent motor operation, unless the brakes have been released [fr

  14. Tipping Points, Great and Small

    Science.gov (United States)

    Morrison, Foster

    2010-12-01

    The Forum by Jordan et al. [2010] addressed environmental problems of various scales in great detail, but getting the critical message through to the formulators of public policies requires going back to basics, namely, that exponential growth (of a population, an economy, or most anything else) is not sustainable. When have you heard any politician or economist from anywhere across the ideological spectrum say anything other than that more growth is essential? There is no need for computer models to demonstrate “limits to growth,” as was done in the 1960s. Of course, as one seeks more details, the complexity of modeling will rapidly outstrip the capabilities of both observation and computing. This is common with nonlinear systems, even simple ones. Thus, identifying all possible “tipping points,” as suggested by Jordan et al. [2010], and then stopping just short of them, is impractical if not impossible. The main thing needed to avoid environmental disasters is a bit of common sense.

  15. What parents want from emails with their pediatrician: implications for teaching communication skills.

    Science.gov (United States)

    Schiller, Jocelyn H; Christner, Jennifer G; Stansfield, Robert Brent; Watnick, Caroline S; Mullan, Patricia B

    2013-07-01

    Physician-patient email communication is increasing but trainees receive no education on this communication medium. Research eliciting patient preferences about email communication could inform training. Investigators elicited parents' perspectives on physician-parent email communication and compared parent and faculty assessments of medical students' emails. This mixed methods study explored physician-parent email communication in 5 parent focus groups using qualitative analyses to identify themes. Differences between faculty and parent assessment scores for students' email responses were calculated using univariate general linear modeling. Themes that emerged were: (1) Building the Relationship, (2) Clarity of Communication and (3) Expectations. Parents criticized student's statements as condescending. The sum of assessment scores by parents and faculty were moderately correlated (r(44)=.407, Pparents gave students lower scores on "acknowledges validity/expresses empathy" (P=.01) and higher scores on "provides next steps" (PParents place value on students' abilities to communicate clearly and convey respect and empathy in email. Parent and faculty perspectives on email communication are similar but not the same. Differences between parental and faculty assessments of medical students' emails supports the need for the involvement of patients and families in email communication curriculum development. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  16. THE DEVELOPMENT OF E-MAIL LITERACY: FROM WRITING TO PEERS TO WRITING TO AUTHORITY FIGURES

    Directory of Open Access Journals (Sweden)

    Chi-Fen Emily Chen

    2006-05-01

    Full Text Available Though e-mail has become a common interpersonal communication medium, it does not mean that this medium is used without difficulty. While people can write e-mails to peers in any manner they like, writing e-mails to authority figures requires higher pragmatic competence and critical language awareness of how discourse shapes and reflects power asymmetry in an institutional context. For L2 learners, the challenge of composing this type of e-mail can be greater due not only to their limited linguistic ability but also their unfamiliarity with the target culture's norms and values. To provide a deeper understanding of how an L2 learner develops e-mail literacy in the target language environment, this paper presents a longitudinal case study of a Taiwanese graduate student’s e-mail practice in English during her studies at a U.S. university for two and a half years. Using a critical discourse analysis approach, the study reveals the complexity of an L2 learner’s evolving e-mail practice and struggle for appropriateness, particularly in her e-mail communication with professors. Her development of e-mail literacy is discussed in relation to her evolving understanding of the e-mail medium, changing performance of student identity, increasing knowledge of student-professor interaction and realization of culture-specific politeness.

  17. TEM observations of crack tip: cavity interactions

    International Nuclear Information System (INIS)

    Horton, J.A.; Ohr, S.M.; Jesser, W.A.

    1981-01-01

    Crack tip-cavity interactions have been studied by performing room temperature deformation experiments in a transmission electron microscope on ion-irradiated type 316 stainless steel with small helium containing cavities. Slip dislocations emitted from a crack tip cut, sheared, and thereby elongated cavities without a volume enlargement. As the crack tip approached, a cavity volume enlargement occurred. Instead of the cavities continuing to enlarge until they touch, the walls between the cavities fractured. Fracture surface dimples do not correlate in size or density with these enlarged cavities

  18. Numerical model updating technique for structures using firefly algorithm

    Science.gov (United States)

    Sai Kubair, K.; Mohan, S. C.

    2018-03-01

    Numerical model updating is a technique used for updating the existing experimental models for any structures related to civil, mechanical, automobiles, marine, aerospace engineering, etc. The basic concept behind this technique is updating the numerical models to closely match with experimental data obtained from real or prototype test structures. The present work involves the development of numerical model using MATLAB as a computational tool and with mathematical equations that define the experimental model. Firefly algorithm is used as an optimization tool in this study. In this updating process a response parameter of the structure has to be chosen, which helps to correlate the numerical model developed with the experimental results obtained. The variables for the updating can be either material or geometrical properties of the model or both. In this study, to verify the proposed technique, a cantilever beam is analyzed for its tip deflection and a space frame has been analyzed for its natural frequencies. Both the models are updated with their respective response values obtained from experimental results. The numerical results after updating show that there is a close relationship that can be brought between the experimental and the numerical models.

  19. The style of academic e-mails and conventional letters: contrastive analysis of four conversational routines

    Directory of Open Access Journals (Sweden)

    Clyde Ancarno

    2005-04-01

    Full Text Available This paper presents the results of a corpus-based study which investigates the genre of academic email and more specifically its pragmatic dimension. Four conversational routines (thank yous, apologies, requests, offers are analysed and compared in two channels: academic e-mails and conventional print letters. In addition, data from both native and non-native speakers of English is considered, which sheds light on some of the differences found in the academic e-mail writing of learners of English. The findings indicate that academic e-mail is a relatively formal type of correspondence which is still largely influenced, as is to be expected, by the genre of the academic letter, and that as a genre, academic e-mail is in the process of formation or semi-formation. Finally, native speakers of English are found to be more informal than non-native speakers of English in academic e-mails.

  20. Modeling Personalized Email Prioritization: Classification-based and Regression-based Approaches

    Energy Technology Data Exchange (ETDEWEB)

    Yoo S.; Yang, Y.; Carbonell, J.

    2011-10-24

    Email overload, even after spam filtering, presents a serious productivity challenge for busy professionals and executives. One solution is automated prioritization of incoming emails to ensure the most important are read and processed quickly, while others are processed later as/if time permits in declining priority levels. This paper presents a study of machine learning approaches to email prioritization into discrete levels, comparing ordinal regression versus classier cascades. Given the ordinal nature of discrete email priority levels, SVM ordinal regression would be expected to perform well, but surprisingly a cascade of SVM classifiers significantly outperforms ordinal regression for email prioritization. In contrast, SVM regression performs well -- better than classifiers -- on selected UCI data sets. This unexpected performance inversion is analyzed and results are presented, providing core functionality for email prioritization systems.

  1. Sleep Tips: 7 Steps to Better Sleep

    Science.gov (United States)

    ... turn every night. Consider simple tips for better sleep, from setting a sleep schedule to including physical activity in your daily ... factors that can interfere with a good night's sleep — from work stress and family responsibilities to unexpected ...

  2. Diabetes Prevention: 5 Tips for Taking Control

    Science.gov (United States)

    ... Consider the latest diabetes prevention tips from the American Diabetes Association. There are many benefits to regular physical activity. ... if diabetes testing is appropriate for you. The American Diabetes Association recommends blood glucose screening if: You're age ...

  3. Tips to Help You Get Active

    Science.gov (United States)

    ... A Step in the Right Direction Tips to Help You Get Active View or Print All Sections ... and quality of life. Being more active may help you manage your weight. Starting Physical Activity Healthy ...

  4. Brain Injury Safety Tips and Prevention

    Science.gov (United States)

    ... submit" name="commit" type="submit" value="Submit" /> Brain Injury Safety Tips and Prevention Recommend on Facebook ... not grass or dirt. More HEADS UP Video: Brain Injury Safety and Prevention frame support disabled and/ ...

  5. Tips for Teens with Diabetes: About Diabetes

    Science.gov (United States)

    National Diabetes Education Program (NDEP), 2010

    2010-01-01

    Diabetes is a serious disease. It means that one's blood glucose, also called blood sugar, is too high. Having too much glucose in a person's blood is not healthy. This paper offers tips for managing diabetes.

  6. Daily Tips for Good Oral Hygiene

    Science.gov (United States)

    ... this article Daily Tips for Good Oral Hygiene Bacteria can live in your mouth in the form of plaque, causing cavities and gingivitis, which can lead to periodontal (gum) disease. In order to keep your mouth ...

  7. Impetigo: Tips for Treatment and Prevention

    Science.gov (United States)

    ... DO Videos Contact Close ‹ Back to Healthy Living Impetigo: Tips for Treatment and Prevention The symptoms of ... to other parts of their bodies. Causes of Impetigo Impetigo usually affects preschool and school-aged children, ...

  8. Can't sleep? Try these tips

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000853.htm Can't sleep? Try these tips To use the ... you get the rest you need. What you can do Some people have trouble falling asleep. Others ...

  9. Essential Outdoor Sun Safety Tips for Winter

    Science.gov (United States)

    ... Weekend Warriors expand/collapse Vitamin D Essential Outdoor Sun Safety Tips for Winter Winter sports enthusiasts are ... skiing! Be Mindful of Time Spent in the Sun, Regardless of the Season If possible, ski early ...

  10. 6 Tips: IBS and Complementary Health Practices

    Science.gov (United States)

    ... health practice for IBS, here are 6 tips: Hypnotherapy (hypnosis). This practice involves the power of suggestion by ... IBS. According to reviews of the scientific literature, hypnotherapy may be a helpful treatment for managing IBS ...

  11. Compressor airfoil tip clearance optimization system

    Science.gov (United States)

    Little, David A.; Pu, Zhengxiang

    2015-08-18

    A compressor airfoil tip clearance optimization system for reducing a gap between a tip of a compressor airfoil and a radially adjacent component of a turbine engine is disclosed. The turbine engine may include ID and OD flowpath boundaries configured to minimize compressor airfoil tip clearances during turbine engine operation in cooperation with one or more clearance reduction systems that are configured to move the rotor assembly axially to reduce tip clearance. The configurations of the ID and OD flowpath boundaries enhance the effectiveness of the axial movement of the rotor assembly, which includes movement of the ID flowpath boundary. During operation of the turbine engine, the rotor assembly may be moved axially to increase the efficiency of the turbine engine.

  12. Tips for Older Dietary Supplement Users

    Science.gov (United States)

    ... Information for Consumers Tips for Older Dietary Supplement Users Share Tweet Linkedin Pin it More sharing options ... site are provided as a service to our users and do not represent FDA endorsement of these ...

  13. Rancang Bangun Aplikasi Enkripsi dan Dekripsi Email Dengan Menggunakan Algoritma Advanced Encryption Standard Dan Knapsack

    Directory of Open Access Journals (Sweden)

    Timothy John Pattiasina

    2014-07-01

    Full Text Available Advanced Encryption Standard (AES dan Knapsack adalah dua algoritma enkripsi simetris dan asimetris yang paling sering digunakan. Penelitian ini menganalisa kedua algoritma AES dan algoritma Knapsack. Prototipe aplikasi enkripsi email ini dirancang dengan menggabungkan karateristik algoritma AES dan Knapsack untuk memecahkan masalah keamanan email. Algoritma AES digunakan untuk mengenkripsi dan deskripsi email berupa teks atau file, sedangkan Algoritma Knapsack di gunakan untuk mengenkripsi kunci AES. Enkripsi hybrid yang diterapkan pada aplikasi bertujuan untuk menambah keamanan informasi dalam sebuah jaringan.

  14. Normative Data for Email Writing by Native Speakers of British English

    Directory of Open Access Journals (Sweden)

    Lindsey Thiel

    2015-05-01

    Full Text Available This dataset includes emails from forty two control participants ranging from 16 to 88 years of age (mean = 46 and 9 to 24 years of education (mean = 13. Three emails were produced by each participant (between 2011 and 2014, each within a time limit of three minutes. It is expected that this normative data will be useful for clinicians and researchers working with adults with acquired language disorders in assessing email writing.

  15. Normative Data for Email Writing by Native Speakers of British English

    OpenAIRE

    Thiel, Lindsey; Sage, Karen; Conroy, Paul

    2015-01-01

    This dataset includes emails from forty two control participants ranging from 16 to 88 years of age (mean = 46) and 9 to 24 years of education (mean = 13). Three emails were produced by each participant (between 2011 and 2014), each within a time limit of three minutes. It is expected that this normative data will be useful for clinicians and researchers working with adults with acquired language disorders in assessing email writing.

  16. The transjugular intrahepatic portosystemic shunt (TIPS)

    International Nuclear Information System (INIS)

    Owen, A.R.; Stanley, A.J.; Vijayananthan, A.; Moss, J.G.

    2009-01-01

    The creation of an intrahepatic portosystemic shunt via a transjugular approach (TIPS) is an interventional radiological procedure used to treat the complications of portal hypertension. TIPS insertion is principally indicated to prevent or arrest variceal bleeding when medical or endoscopic treatments fail, and in the management refractory ascites. This review discusses the development and execution of the technique, with focus on its clinical efficacy. Patient selection, imaging surveillance, revision techniques, and complications are also discussed.

  17. The transjugular intrahepatic portosystemic shunt (TIPS)

    Energy Technology Data Exchange (ETDEWEB)

    Owen, A.R. [Department of Radiology, Austin Health, Heidelberg, Melbourne (Australia)], E-mail: andrewowen@doctors.org.uk; Stanley, A.J. [Department of Gastroenterology, Glasgow Royal Infirmary, Glasgow (United Kingdom); Vijayananthan, A. [Department of Biomedical Imaging, University of Malaya, Kuala Lumpur (Malaysia); Moss, J.G. [Department of Radiology, Gartnavel General Hospital, Glasgow (United Kingdom)

    2009-07-15

    The creation of an intrahepatic portosystemic shunt via a transjugular approach (TIPS) is an interventional radiological procedure used to treat the complications of portal hypertension. TIPS insertion is principally indicated to prevent or arrest variceal bleeding when medical or endoscopic treatments fail, and in the management refractory ascites. This review discusses the development and execution of the technique, with focus on its clinical efficacy. Patient selection, imaging surveillance, revision techniques, and complications are also discussed.

  18. Superconducting phase transition in STM tips

    Energy Technology Data Exchange (ETDEWEB)

    Eltschka, Matthias; Jaeck, Berthold; Assig, Maximilian; Etzkorn, Markus; Ast, Christian R. [Max Planck Institute for Solid State Research, Stuttgart (Germany); Kern, Klaus [Max Planck Institute for Solid State Research, Stuttgart (Germany); Ecole Polytechnique Federale de Lausanne (Switzerland)

    2015-07-01

    The superconducting properties of systems with dimensions comparable to the London penetration depth considerably differ from macroscopic systems. We have studied the superconducting phase transition of vanadium STM tips in external magnetic fields. Employing Maki's theory we extract the superconducting parameters such as the gap or the Zeeman splitting from differential conductance spectra. While the Zeeman splitting follows the theoretical description of a system with s=1/2 and g=2, the superconducting gaps as well as the critical fields depend on the specific tip. For a better understanding of the experimental results, we solve a one dimensional Usadel equation modeling the superconducting tip as a cone with the opening angle α in an external magnetic field. We find that only a small region at the apex of the tip is superconducting in high magnetic fields and that the order of the phase transition is directly determined by α. Further, the spectral broadening increases with α indicating an intrinsic broadening mechanism due to the conical shape of the tip. Comparing these calculations to our experimental results reveals the order of the superconducting phase transition of the STM tips.

  19. Assessment of email communication skills of rheumatology fellows: a pilot study

    Science.gov (United States)

    Dhuper, Sonal; Siva, Chokkalingam; Fresen, John L; Petruc, Marius; Velázquez, Celso R

    2010-01-01

    Physician–patient email communication is gaining popularity. However, a formal assessment of physicians' email communication skills has not been described. We hypothesized that the email communication skills of rheumatology fellows can be measured in an objective structured clinical examination (OSCE) setting using a novel email content analysis instrument which has 18 items. During an OSCE, we asked 50 rheumatology fellows to respond to a simulated patient email. The content of the responses was assessed using our instrument. The majority of rheumatology fellows wrote appropriate responses scoring a mean (±SD) of 10.6 (±2.6) points (maximum score 18), with high inter-rater reliability (0.86). Most fellows were concise (74%) and courteous (68%) but not formal (22%). Ninety-two percent of fellows acknowledged that the patient's condition required urgent medical attention, but only 30% took active measures to contact the patient. No one encrypted their messages. The objective assessment of email communication skills is possible using simulated emails in an OSCE setting. The variable email communication scores and incidental patient safety gaps identified, suggest a need for further training and defined proficiency standards for physicians' email communication skills. PMID:20962134

  20. Comparing appropriateness and equivalence of email interviews to phone interviews in qualitative research on reproductive decisions.

    Science.gov (United States)

    Hershberger, Patricia E; Kavanaugh, Karen

    2017-10-01

    Despite an increasing use of qualitative email interviews by nurse researchers, there is little understanding about the appropriateness and equivalence of email interviews to other qualitative data collection methods, especially on sensitive topics research. The purpose is to describe our procedures for completing asynchronous, email interviews and to evaluate the appropriateness and equivalency of email interviews to phone interviews in two qualitative research studies that examined reproductive decisions. Content analysis guided the methodological appraisal of appropriateness and equivalency of in-depth, asynchronous email interviews to single phone interviews. Appropriateness was determined by: (a) participants' willingness to engage in email or phone interviews, (b) completing data collection in a timely period, and (c) participants' satisfaction with the interview. Equivalency was evaluated by: (a) completeness of the interview data, and (b) insight obtained from the data. Of the combined sample in the two studies (N=71), 31% of participants chose to participate via an email interview over a phone interview. The time needed to complete the email interviews averaged 27 to 28days and the number of investigator probe-participant response interchanges was 4 to 5cycles on average. In contrast, the phone interviews averaged 59 to 61min in duration. Most participants in both the email and phone interviews reported they were satisfied or very satisfied with their ability to express their true feelings throughout the interview. Regarding equivalence, 100% of the email and phone interviews provided insight into decision processes. Although insightful, two of the email and one phone interview had short answers or, at times, underdeveloped responses. Participants' quotes and behaviors cited within four published articles, a novel evaluation of equivalency, revealed that 20% to 37.5% of the citations about decision processes were from email participants, which is

  1. Are Forecast Updates Progressive?

    NARCIS (Netherlands)

    C-L. Chang (Chia-Lin); Ph.H.B.F. Franses (Philip Hans); M.J. McAleer (Michael)

    2010-01-01

    textabstractMacro-economic forecasts typically involve both a model component, which is replicable, as well as intuition, which is non-replicable. Intuition is expert knowledge possessed by a forecaster. If forecast updates are progressive, forecast updates should become more accurate, on average,

  2. Email communication in a developing country: different family physician and patient perspectives.

    Science.gov (United States)

    Makarem, Nisrine N; Antoun, Jumana

    2016-01-01

    Email communication between physicians and patients could improve access to and delivery of health care. Most of the literature studies about email communication between physicians and patients have been conducted in developing countries. Therefore, this study aims to analyze the practices, attitudes, and barriers of both physicians' and patients' use of email within the same health care setting of a developing country. A cross-sectional paper-based survey was conducted among 39 physicians and 500 patients at the Family Medicine clinics of the American University of Beirut, a tertiary academic medical center. Most of the surveyed patients and physicians reported that they would like to communicate through email and agreed that it is useful. However, only 19% of the patients have ever communicated with their physicians via email, and only 5.1% of physicians have often communicated with their patients via email. Almost half of the patients surveyed were unaware of the possibility of this form of communication, and only 17% reported that their physician offered them his or her email address. In addition, physicians and patients did not agree on the services to be provided by email communication. For instance, almost half of the patients indicated consultation for an urgent medical matter as suitable for email communication. The use of email communication in health care is still scarce. Patients and physicians have different perspectives of its use and importance. Further rigorous research is needed to clarify the advantages and disadvantages of this form of communication, especially in the developing world. Interested physicians are encouraged to establish appropriate personal policies for email communication with adequate announcement and patient education plans.

  3. Travel Tips: A Guide for Kidney Patients

    Science.gov (United States)

    ... now available, which are easy to carry on airplanes and to use in hotel rooms, campers, etc. ... for specific treatment recommendations. Print Email Read related articles Fluoride Talking to Your Friends About Kidney Disease ...

  4. TIPS Evaluation Project Retrospective Study: Wave 1 and 2.

    Science.gov (United States)

    Hubbard, Susan M.; Mulvey, Kevin P.

    2003-01-01

    Measured substance abuse treatment professionals' knowledge, attitudes, and practices regarding the Treatment Improvement Protocol (TIP) series and the 28 TIPs. Results for 3,267 respondents in wave 1 and 1,028 in wave 2 indicate that almost half of all professionals were aware of the TIPs. Attitudes toward TIPs were positive, but professionals…

  5. Email for the provision of information on disease prevention and health promotion.

    Science.gov (United States)

    Sawmynaden, Prescilla; Atherton, Helen; Majeed, Azeem; Car, Josip

    2012-11-14

    Email is a popular and commonly used method of communication, but its use in health care is not routine. Its application in health care has included the provision of information on disease prevention and health promotion, but the effects of using email in this way are not known. This review assesses the use of email for the provision of information on disease prevention and health promotion. To assess the effects of email for the provision of information on disease prevention and health promotion, compared to standard mail or usual care, on outcomes for healthcare professionals, patients and caregivers, and health services, including harms. We searched: the Cochrane Consumers and Communication Review Group Specialised Register (January 2010), the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (1950 to January 2010), EMBASE (1980 to January 2010), CINAHL (1982 to February 2010), ERIC (1965 to January 2010) and PsycINFO (1967 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists, contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies examining interventions where email is used by healthcare professionals to provide information to patients on disease prevention and health promotion, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. We considered healthcare professionals or associated administrative staff as participants originating the email communication, and patients and caregivers as participants receiving the email communication, in all settings. Email communication was one-way from healthcare professionals or associated administrative staff originating the email communication, to patients or caregivers receiving the email communication. Two

  6. Perceptions and use of e-mail among Universiti Utara Malaysia staff: A pilot study

    Science.gov (United States)

    Mohamed, Shafinah Farvin Packeer; Ku-Mahamud, Ku Ruhana; Ramli, Razamin; Abdullah, Kamarudin

    2017-10-01

    The use of e-mail has become common either for work purposes or personal usage. Despite its usefulness, complain about the overwhelming messages received which cause the users to have problem in managing those messages. Similar situation occurred among Universiti Utara Malaysia (UUM) staff. Thus, a pilot study was conducted to investigate its staff's perception and use of e-mail in order to improve the e-mail service provided to them. This paper discusses the findings from the pilot study, which involves 41 UUM staff. Self-administered questionnaires were used to gather the data, while descriptive statistical analysis was used for data analysis. The findings of the study reveal that UUM staff appreciate the e-mail service. However they faced problems like limited storage size and overwhelming e-mails. They think that UUM e-mail is being abused by the repeating advertisements and news sent to them. The output of this study can be used as a guideline by the UUM management in revising its e-mail policy to serve better quality of e-mail service.

  7. An E-mail Service in a Military Adolescent Medicine Clinic: will teens ...

    African Journals Online (AJOL)

    The goal of this study was to determine utilization patterns of an Adolescent Medicine Clinic e-mail service. An e-mail service was offered to 6134 patients presenting for care to a military Adolescent Medicine Clinic in San Antonio, Texas over a 6-month period. Families had to complete an authorization form acknowledging ...

  8. Ethical Judgments Concerning Email Use in the Workplace: University Students' Perceptions.

    Science.gov (United States)

    Keith, Nancy; Perreault, Heidi; Sutliff, Kris

    2001-01-01

    A survey of 1,272 college students showed that most believed it appropriate to use company e-mail accounts for personal messages, but inappropriate to read others' e-mail or send messages with ethnic, racial, or sexual content. Students who participated in ethics discussions were less likely to rate certain behaviors as appropriate. (Contains 22…

  9. Con Artists Attack Colleges with Fake Help-Desk E-Mail

    Science.gov (United States)

    Young, Jeffrey R.

    2008-01-01

    An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…

  10. Redefining Technological Literacy in the Workplace: A Qualitative Study of Social Affordances in Workplace Email

    Science.gov (United States)

    Bacci, Tina Marie

    2011-01-01

    This dissertation examines the social affordances of workplace email use. Through group and individual interviews of six knowledge workers in a distributed real estate firm, it explores the extent workplace writers recognize and rely on extra-textual devices (i.e., copy, blind-copy, and forward devices) and email applications (i.e., email…

  11. New information technology and communication in health care: using e-mail for marketing services

    Directory of Open Access Journals (Sweden)

    Jorge Iván Martínez Espitia

    2015-01-01

    Full Text Available Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email marketing by independent health professionals was conducted in Colombia. Four variables, including tenure email account, receiving these email accounts marketing of products or services, read marketing emails and use by marketing professionals were measured with email. The result of this study showed that independent health professionals in Colombia are familiar with this type of marketing. Generally interested incorporate it as one of your marketing tools, but do not know how to do this activity, which is described in a simple way how to do a marketing campaign with the use of emails to the users of health services.

  12. E-mail marketing grows up: a primer for the managed care industry.

    Science.gov (United States)

    Dysart, J

    2000-02-01

    Managed care plans are jumping onto the electronic marketing bandwagon in a big way, taking advantage of not only the basic E-mail system but also expanding on that medium and developing creative vehicles to send the health plan's message. In this article, the author describes how E-mail technology is being used to hone the marketing edge in MCOs.

  13. Location Is Everything: The Use and Marketing of Reference E-Mail

    Science.gov (United States)

    Collins, Susan L.

    2006-01-01

    Reference e-mail continues to be a vital reference service. This article studies the trends in reference e-mail use over an eight year period. Usage statistics are analyzed particularly in light of the marketing of the service via changes in the location of the service on the official university libraries' Web pages. Included are recommendations…

  14. Pandora's electronic box: GPs reflect upon email communication with their patients

    Directory of Open Access Journals (Sweden)

    Felicity Goodyear-Smith

    2005-11-01

    Conclusion Study sample closely mirrored current NZ GP population. Although few GPs emailed with patients, many might once barriers are addressed. GPs had a collective view of the appropriate boundaries for email communication, routine tasks and the transmission of information. GPs would encourage professional debate regarding guidelines for good practice, managing demand and remuneration.

  15. A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence

    NARCIS (Netherlands)

    M.S. Bargh; A. Padmos; R. Choenni; F. Jansen; N. Stembert

    2015-01-01

    Cyber criminals use phishing emails in high-volume and spear phishing emails in low volume to achieve their malicious objectives. Hereby they inflict financial, reputational, and emotional damages on individuals and organizations. These (spear) phishing attacks get steadily more sophisticated as

  16. The Impact of Using Email on Improving the Writing Skills among Iranian Students

    Science.gov (United States)

    Janfaza, Abusaied; Shahsavari, Khadijeh; Soori, Afshin

    2014-01-01

    The need for the application of technology in education has been increased. One of the new approaches in technology is using email for learning a second or a foreign language. The present study aimed at investigating the effectiveness of using email in improving writing skills among Iranian EFL students. The participants of the study were 42…

  17. Power Perceptions and Negotiations in a Cross-National Email Writing Activity

    Science.gov (United States)

    Liu, Yichun

    2011-01-01

    The present study investigates EFL students' perceptions of power differentials and their negotiation strategies when communicating with native English-speaking students via emails. The study involved 28 Taiwanese and American undergraduates who participated in a semester-long cross-national email writing activity. Findings show that students in…

  18. Re-connect: designing accessible email communication support for persons with aphasia

    NARCIS (Netherlands)

    Mahmud, Al A.; Martens, J.B.O.S.

    2010-01-01

    In this paper we present some preliminary outcomes concerning the design of an email communication tool for persons with expressive aphasia. The purpose of our design is to make email accessible for aphasics. It is based on interviews with persons with aphasia and their partners and has been

  19. E-Mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    Science.gov (United States)

    Nazari, Behzad; Ninknejad, Sahar

    2015-01-01

    The present study highly supported the effective role of providing background information via email by the teacher to write e-mail by the students in learners' writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of…

  20. COMMUNICATION TOPICS AND STRATEGIES IN E-MAIL CONSULTATION: COMPARISON BETWEEN AMERICAN AND INTERNATIONAL UNIVERSITY STUDENTS

    Directory of Open Access Journals (Sweden)

    Sigrun Biesenbach-Lucas

    2005-05-01

    Full Text Available On today's "wired" college campuses, students avail themselves in increasing numbers of electronic channels, most notably e-mail, as a means to consult with their professors. While some research has investigated the purposes for which university students communicate with their instructors via e-mail, little research has examined differences in e-mail use between American and international students. In the present study, e-mail messages sent by American and international students enrolled in a teacher-preparation program to their professor were collected over the course of one semester. The messages were examined for three major communication topics (facilitative, substantive, relational and communication strategies (requesting, negotiating, reporting. Results indicate quantitative and qualitative differences in American and international students' e-mail topics and strategies, suggesting, similar to findings for face-to-face academic advising sessions, that American students demonstrate greater initiative and ability to adapt to the spatial and temporal remoteness between interlocutors in e-mail interaction, especially when using e-mail to solicit face-to-face appointments and input on projects. Findings also show that messages from both groups of students contained substantial relational communication, perhaps in an attempt to compensate for the lack of visual and paralinguistic clues in the e-mail medium.

  1. Use of email in communication between the Finnish primary healthcare system and general practitioners

    Directory of Open Access Journals (Sweden)

    Tuula Karhula

    2011-03-01

    Conclusion Especially during periods of change in the workplace, it is very important that management is conducted personally. Care must be taken so that disinformation does not spoil the informative value of email in the administration of primary health care. The needed technical assistance should be given to everyone in order to get the best advantage from the use of the email system.

  2. Relationships between Emotional States and Emoticons in Mobile Phone Email Communication in Japan

    Science.gov (United States)

    Kato, Shogo; Kato, Yuuki; Scott, Douglass

    2009-01-01

    Three related studies conducted on the role of emotional transfer in email messages were studied in order to better understand Japanese college students' online communications and their broader participation in online communications. The first study investigated users' initiatives in preventing emotional misunderstandings when sending email.…

  3. Mapping network development of international new ventures with the use of company e-mails

    NARCIS (Netherlands)

    Wakkee, I.A.M.

    2006-01-01

    International new ventures use e-mail frequently to communicate with globally dispersed contacts. In this paper we present and discuss a qualitative research method to map international network development based on company e-mails. Our approach also allows for combinations of inductive and deductive

  4. New information technology and communication in health care: using e-mail for marketing services

    Directory of Open Access Journals (Sweden)

    Jorge Iván Martínez Espitia

    2014-07-01

    Full Text Available Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email marketing by independent health professionals was conducted in Colombia. Four variables, including tenure email account, receiving these email accounts marketing of products or services, read marketing emails and use by marketing professionals were measured with email. The result of this study showed that independent health professionals in Colombia are familiar with this type of marketing. Generally interested incorporate it as one of your marketing tools, but do not know how to do this activity, which is described in a simple way how to do a marketing campaign with the use of emails to the users of health services.

  5. Using Email Interviews in Qualitative Educational Research: Creating Space to Think and Time to Talk

    Science.gov (United States)

    James, Nalita

    2016-01-01

    The article explores how the Internet and email offer space for participants to think and make sense of their experiences in the qualitative research encounter. It draws on a research study that used email interviewing to generate online narratives to understand academic lives and identities through research encounters in virtual space. The…

  6. Understanding Style, Language and Etiquette in Email Communication in Higher Education: A Survey

    Science.gov (United States)

    Lewin-Jones, Jenny; Mason, Victoria

    2014-01-01

    This study investigates academic staff and student attitudes to style and etiquette of emails. Data were collected through two online staff and student surveys. Reported use and acceptability of particular features of email style were assessed. Open-ended responses yielded four themes: the balance between formality and informality, relationships,…

  7. Detecting Targeted Malicious Email through Supervised Classification of Persistent Threat and Recipient Oriented Features

    Science.gov (United States)

    Amin, Rohan Mahesh

    2010-01-01

    Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…

  8. Teaching Email Requests in the Academic Context: A Focus on the Role of Corrective Feedback

    Science.gov (United States)

    Nguyen, Thi Thuy Minh; Do, Thi Thanh Ha; Nguyen, Anh Tuan; Pham, Thi Thanh Thuy

    2015-01-01

    As email requests from students to professors have become increasingly common in academic settings, research has also shown second-language (L2) students' unfamiliarity with email etiquette in L2 has adversely affected their communication with their professors. The present study examines whether giving corrective feedback on students' performance…

  9. Using Email to Enable E[superscript 3] (Effective, Efficient, and Engaging) Learning

    Science.gov (United States)

    Kim, ChanMin

    2008-01-01

    This article argues that technology that supports both noncognitive and cognitive aspects can make learning more effective, efficient, and engaging (e[superscript 3]-learning). The technology of interest in this article is email. The investigation focuses on characteristics of email that are likely to enable e[superscript 3]-learning. In addition,…

  10. Test of the Behavioral Perspective Model in the Context of an E-Mail Marketing Experiment

    Science.gov (United States)

    Sigurdsson, Valdimar; Menon, R. G. Vishnu; Sigurdarson, Johannes Pall; Kristjansson, Jon Skafti; Foxall, Gordon R.

    2013-01-01

    An e-mail marketing experiment based on the behavioral perspective model was conducted to investigate consumer choice. Conversion e-mails were sent to two groups from the same marketing database of registered consumers interested in children's books. The experiment was based on A-B-A-C-A and A-C-A-B-A withdrawal designs and consisted of sending B…

  11. Combining textual and non-textual features for e-mail importance estimation

    NARCIS (Netherlands)

    Sappelli, M.; Verberne, S.; Kraaij, W.

    2013-01-01

    In this work, we present a binary classification problem in which we aim to identify those email messages that the receiver will reply to. The future goal is to develop a tool that informs a knowledge worker which emails are likely to need a reply. The Enron corpus was used to extract training

  12. Design and development of mobile Email system based on brew and IMAP4

    International Nuclear Information System (INIS)

    Chen Liangchen; Liu Shuzhen; Yan Xiaofei; Sun Gongxing

    2007-01-01

    In order to achieve IMAP4 support agreement in the mobile e-mail client application on the smart phone, using the Qualcomm introduced wireless devices designed for the BREW platform. Research on the BREW platform mobile and IMAP4 protocol, design and implement the 3G technology standard smart phone e-mail client based on the BREW platform. (authors)

  13. Using E-mail in a Math/Computer Core Course.

    Science.gov (United States)

    Gurwitz, Chaya

    This paper notes the advantages of using e-mail in computer literacy classes, and discusses the results of incorporating an e-mail assignment in the "Introduction to Mathematical Reasoning and Computer Programming" core course at Brooklyn College (New York). The assignment consisted of several steps. The students first read and responded…

  14. A Mobile App Offering Distractions and Tips to Cope With Cigarette Craving: A Qualitative Study

    Science.gov (United States)

    Smith, Wally; Pearce, Jon; Borland, Ron

    2014-01-01

    Background Despite considerable effort, most smokers relapse within a few months after quitting due to cigarette craving. The widespread adoption of mobile phones presents new opportunities to provide support during attempts to quit. Objective To design and pilot a mobile app "DistractMe" to enable quitters to access and share distractions and tips to cope with cigarette cravings. Methods A qualitative study with 14 smokers who used DistractMe on their mobiles during the first weeks of their quit attempt. Based on interviews, diaries, and log data, we examined how the app supported quitting strategies. Results Three distinct techniques of coping when using DistractMe were identified: diversion, avoidance, and displacement. We further identified three forms of engagement with tips for coping: preparation, fortification, and confrontation. Overall, strategies to prevent cravings and their effects (avoidance, displacement, preparation, and fortification) were more common than immediate coping strategies (diversion and confrontation). Tips for coping were more commonly used than distractions to cope with cravings, because they helped to fortify the quit attempt and provided opportunities to connect with other users of the application. However, distractions were important to attract new users and to facilitate content sharing. Conclusions Based on the qualitative results, we recommend that mobile phone-based interventions focus on tips shared by peers and frequent content updates. Apps also require testing with larger groups of users to assess whether they can be self-sustaining. PMID:25099632

  15. Reconstruction of the Tip-Surface Interaction Potential by Analysis of the Brownian Motion of an Atomic Force Microscope Tip

    NARCIS (Netherlands)

    Willemsen, O.H.; Kuipers, L.; van der Werf, Kees; de Grooth, B.G.; Greve, Jan

    2000-01-01

    The thermal movement of an atomic force microscope (AFM) tip is used to reconstruct the tip-surface interaction potential. If a tip is brought into the vicinity of a surface, its movement is governed by the sum of the harmonic cantilever potential and the tip-surface interaction potential. By

  16. Facework in Non-Face-Threatening Emails by Native and Non-Native English Speakers

    Directory of Open Access Journals (Sweden)

    - Зохре Ислами Р

    2015-12-01

    Full Text Available The aim of this research is to investigate the speech act of assignment submission and presence of facework in submission emails sent to faculty members by native and nonnative English speaking graduate students. Brown and Levinson’s politeness theory (1987 and Spencer-Oatey’s (2002, 2008 rapport management framework were utilized to analyze the emails. The corpus consisted of 105 emails from 40 NES and NNES students. Drawing on speech event analysis approach (Merrison, Wilson, Davies, & Haugh, 2012, we analyze both submission head act as well as optional elements like openings, small talk and closings in an email. Our exploratory study revealed that, contrary to the argument that CMC is a lean medium (Duthler, 2006 in which it is difficult to achieve interpersonal communication, through the employment of opening, small talk and closing strategies, students attended to relational goals in their email communication.

  17. Language Use in Computer-Mediated Communication: An Investigation into the Genre of Workplace Emails

    Directory of Open Access Journals (Sweden)

    Mohammad Awad AlAfnan

    2015-01-01

    Full Text Available This study investigated the moves and communicative purposes used in 522 email messages that were exchanged in a Malaysian private educational institute. Using Swales’s (1990 move approach, this study revealed that email writers used fourteen moves that are mainly six framing and eight content moves. Content moves included four main, one intertextual, one supporting and two follow-up moves. The four main content moves reflected the main communicative purposes of the emails that are discussing issues, enquiring about issues, couriering (delivering documents and informing about organizational and academic issues. The four communicative purposes varied in their structural organization, number of recipients and reaction to receiving the email. Keywords: Genre analysis; Email communication; Rhetorical moves; Communicative purposes; Discourse community

  18. A qualitative analysis of email interactions of children who use augmentative and alternative communication.

    Science.gov (United States)

    Sundqvist, Anett; Rönnberg, Jerker

    2010-12-01

    The aim of this study was to introduce email as a form of interaction for a group of six children who used augmentative and alternative communication. In a 12-week exploratory study, aspects of the email messages sent were analyzed. The content of the messages was analyzed by an inductive qualitative method, and seven descriptive categories emerged. The most frequently occurring categories were Social Etiquette, Personal/Family Statistics and Personal Common Ground. The children utilized different email strategies that included use of most of the above-mentioned categories. Through the email writing practice, the children developed new social skills and increased their social participation. Email practice may be a good strategy to increase children's social networks.

  19. Development of an E-mail Application Seemit and its Utilization in an Information Literacy Course

    Science.gov (United States)

    Kita, Toshihiro; Miyazaki, Makoto; Nakano, Hiroshi; Sugitani, Kenichi; Akiyama, Hidenori

    We have developed a simple e-mail application named Seemit which is designed for being used in information literacy courses. It has necessary and sufficient functionality of an e-mail application, and it has been developed for the purpose of learning basic operations and mechanisms of e-mail transfer easily. It is equipped with the function to automatically set the configuration of user's SMTP/POP servers and e-mail address, etc. The process of transferring e-mail via SMTP and POP can be demonstrated step by step showing actual messages passed during the client-server interaction. We have utilized Seemit in a university-wide information literacy course which holds about 1800 students.

  20. Hard-tip, soft-spring lithography.

    Science.gov (United States)

    Shim, Wooyoung; Braunschweig, Adam B; Liao, Xing; Chai, Jinan; Lim, Jong Kuk; Zheng, Gengfeng; Mirkin, Chad A

    2011-01-27

    Nanofabrication strategies are becoming increasingly expensive and equipment-intensive, and consequently less accessible to researchers. As an alternative, scanning probe lithography has become a popular means of preparing nanoscale structures, in part owing to its relatively low cost and high resolution, and a registration accuracy that exceeds most existing technologies. However, increasing the throughput of cantilever-based scanning probe systems while maintaining their resolution and registration advantages has from the outset been a significant challenge. Even with impressive recent advances in cantilever array design, such arrays tend to be highly specialized for a given application, expensive, and often difficult to implement. It is therefore difficult to imagine commercially viable production methods based on scanning probe systems that rely on conventional cantilevers. Here we describe a low-cost and scalable cantilever-free tip-based nanopatterning method that uses an array of hard silicon tips mounted onto an elastomeric backing. This method-which we term hard-tip, soft-spring lithography-overcomes the throughput problems of cantilever-based scanning probe systems and the resolution limits imposed by the use of elastomeric stamps and tips: it is capable of delivering materials or energy to a surface to create arbitrary patterns of features with sub-50-nm resolution over centimetre-scale areas. We argue that hard-tip, soft-spring lithography is a versatile nanolithography strategy that should be widely adopted by academic and industrial researchers for rapid prototyping applications.

  1. Numerical analysis of turbine blade tip treatments

    Science.gov (United States)

    Gopalaswamy, Nath S.; Whitaker, Kevin W.

    1992-01-01

    Three-dimensional solutions of the Navier-Stokes equations for a turbine blade with a turning angle of 180 degrees have been computed, including blade tip treatments involving cavities. The geometry approximates a preliminary design for the GGOT (Generic Gas Oxidizer Turbine). The data presented here will be compared with experimental data to be obtained from a linear cascade using original GGOT blades. Results have been computed for a blade with 1 percent clearance, based on chord, and three different cavity sizes. All tests were conducted at a Reynolds number of 4 x 10 exp 7. The grid contains 39,440 points with 10 spanwise planes in the tip clearance region of 5.008E-04 m. Streamline plots and velocity vectors together with velocity divergence plots reveal the general flow behavior in the clearance region. Blade tip temperature calculations suggest placement of a cavity close to the upstream side of the blade tip for reduction of overall blade tip temperature. The solutions do not account for the relative motion between the endwall and the turbine blade. The solutions obtained are generally consistent with previous work done in this area,

  2. Centrifugal compressor tip clearance and impeller flow

    Energy Technology Data Exchange (ETDEWEB)

    Jaatinen-Varri, Ahti; Tiainen, Jonna; Turunen-Saaresti, Teemu; Gronman, Aki; Ameli, Alireza; Backman, Jari [Laboratory of Fluid Dynamics, LUT School of Energy Systems, Lappeenranta University of Technology, Lappeenranta (Finland); Engeda, Abraham [Turbomachinery Laboratory, Dept. of Mechanical Engineering, Michigan State University, East Lansing (United States)

    2016-11-15

    Compressors consume a considerable portion of the electricity used in the industrial sector. Hence, improvements in compressor efficiency lead to energy savings and reduce environmental impacts. The efficiency of an unshrouded centrifugal compressor suffers from leakage flow over the blade tips. The effect of tip leakage flow on the passage flow differs between the full and splitter blade passages. In this study, the differences in the flow fields between the full and splitter blade passages were studied numerically in detail. An industrial high-speed compressor with a design pressure ratio of 1.78 was modelled. Numerical studies were conducted with six different tip clearances and three different diffuser widths. The results show that increasing tip clearance considerably increases the reversed flow into the impeller with an unpinched diffuser. The reversed flow then partly mixes into the flow in the same blade passage it entered the impeller and the rest migrates over the blade, mixing with the tip clearance flow. Furthermore, as the reversed and clearance flow mix into the wake, the wake is weakened. As pinch reduces both the reversed flow and clearance flow, the passage wakes are stronger with pinches. However, the pinch is beneficial as the losses at the impeller outlet decrease.

  3. Centrifugal compressor tip clearance and impeller flow

    International Nuclear Information System (INIS)

    Jaatinen-Varri, Ahti; Tiainen, Jonna; Turunen-Saaresti, Teemu; Gronman, Aki; Ameli, Alireza; Backman, Jari; Engeda, Abraham

    2016-01-01

    Compressors consume a considerable portion of the electricity used in the industrial sector. Hence, improvements in compressor efficiency lead to energy savings and reduce environmental impacts. The efficiency of an unshrouded centrifugal compressor suffers from leakage flow over the blade tips. The effect of tip leakage flow on the passage flow differs between the full and splitter blade passages. In this study, the differences in the flow fields between the full and splitter blade passages were studied numerically in detail. An industrial high-speed compressor with a design pressure ratio of 1.78 was modelled. Numerical studies were conducted with six different tip clearances and three different diffuser widths. The results show that increasing tip clearance considerably increases the reversed flow into the impeller with an unpinched diffuser. The reversed flow then partly mixes into the flow in the same blade passage it entered the impeller and the rest migrates over the blade, mixing with the tip clearance flow. Furthermore, as the reversed and clearance flow mix into the wake, the wake is weakened. As pinch reduces both the reversed flow and clearance flow, the passage wakes are stronger with pinches. However, the pinch is beneficial as the losses at the impeller outlet decrease

  4. Using email reminders to engage physicians in an Internet-based CME intervention

    Directory of Open Access Journals (Sweden)

    Wall Terry

    2004-09-01

    Full Text Available Abstract Background Engaging practicing physicians in educational strategies that reinforce guideline adoption and improve the quality of healthcare may be difficult. Push technologies such as email offer new opportunities to engage physicians in online educational reinforcing strategies. The objectives are to investigate 1 the effectiveness of email announcements in engaging recruited community-based primary care physicians in an online guideline reinforcement strategy designed to promote Chlamydia screening, 2 the characteristics of physicians who respond to email announcements, as well as 3 how quickly and when they respond to email announcements. Methods Over a 45-week period, 445 recruited physicians received up to 33 email contacts announcing and reminding them of an online women's health guideline reinforcing CME activity. Participation was defined as physician log-on at least once to the website. Data were analyzed to determine participation, to compare characteristics of participants with recruited physicians who did not participate, and to determine at what point and when participants logged on. Results Of 445 recruited physicians with accurate email addresses, 47.2% logged on and completed at least one module. There were no significant differences by age, race, or specialty between participants and non-participants. Female physicians, US medical graduates and MDs had higher participation rates than male physicians, international medical graduates and DOs. Physicians with higher baseline screening rates were significantly more likely to log on to the course. The first 10 emails were the most effective in engaging community-based physicians to complete the intervention. Physicians were more likely to log on in the afternoon and evening and on Monday or Thursday. Conclusions Email course reminders may enhance recruitment of physicians to interventions designed to reinforce guideline adoption; physicians' response to email reminders may

  5. The impacts of email reminder/recall on adolescent influenza vaccination.

    Science.gov (United States)

    Dombkowski, Kevin J; Cowan, Anne E; Reeves, Sarah L; Foley, Matthew R; Dempsey, Amanda F

    2017-05-25

    We sought to: (1) explore the feasibility of using email for seasonal influenza vaccination reminders to parents of adolescents and (2) assess influenza vaccination rates among adolescents whose parents were randomized to either receive or not receive email reminders. Email addresses were obtained for parents of patients 10-18years from 4 practices in Michigan. Addresses were randomized to either receive email reminders, or not. Reminder messages were sent during October 2012-March 2013 (Season 1) and October 2013-March 2014 (Season 2). Vaccination status was determined 60days following the last email reminder for each season using the statewide Michigan Care Improvement Registry (MCIR); per protocol bivariate and multivariate logistic regression analyses were conducted to evaluate reminder notification. After email cleaning, testing, and matching with MCIR, approximately half of email addresses (2348 of 5312 in Season 1; 3457 of 6549 in Season 2) were randomized. Bivariate analyses found that influenza vaccination within 60days after notification date was similar among those notified (34%) versus not notified (29%) in both Season 1 (p=0.06) and Season 2 (39% vs. 37%, p=0.20). However, multivariate models adjusted for season, site, and receipt of notification in two seasons found a higher likelihood of influenza vaccination among children that received notification (aOR=1.28, 95% CI=1.09, 1.51); in addition, differences in influenza vaccination were also observed between practice sites (range: p=0.15 to pemail influenza vaccine reminders to parents of adolescents are feasible, but not without complications. Our study demonstrates that email reminders from practices can yield increases in influenza vaccination rates among adolescents. Practices should consider email as an option for influenza reminders and establish business practices for collecting and maintaining patient email addresses. This study is registered at www.ClinicalTrials.gov id #NCT01732315. Copyright

  6. Mass Communication and Journalism Faculty's Perceptions of the Effectiveness of Email Communication with College Students: A Nationwide Study

    Science.gov (United States)

    Yates, Bradford L.; Adams, Jennifer Wood; Brunner, Brigitta R.

    2009-01-01

    Nearly 700 US journalism and mass communication faculty (all teaching personnel) reported their perceptions of student email use via a web-based survey. This nationwide study focused on the content of email sent by faculty to students, email's effectiveness, and email's effect on student learning. Comparisons were made based on faculty gender,…

  7. Nanobits - exchangable and customisable scanning probe tips

    DEFF Research Database (Denmark)

    Yildiz, Izzet

    dimensions: tips suitable for imaging high-aspect ratio structures and sidewall profiles were designed. Tip diameters in the order of 30 nm were reproducibly obtained with the FIB milling and the smallest tip diameter achieved was ... process by providing direct picking up of the NanoBits by the AFM probe was investigated. Two different bending mechanisms were studied for out-of-plane bending studies: FIB irradiation- and the residual stress-driven bending in bimorph structures. With FIB irradiation studies, NanoBits were demonstrated...... of the structure which may be starting at 170°C. The fabricated NanoBits were assembled and their performance as AFM probes were tested at OFFIS. The NanoBits were successfully picked up by a microgripper, collected in a cartridge and mounted to an AFM probe. Performances of the assembled high-aspect-ratio Nano...

  8. Tipping elements in the Arctic marine ecosystem.

    Science.gov (United States)

    Duarte, Carlos M; Agustí, Susana; Wassmann, Paul; Arrieta, Jesús M; Alcaraz, Miquel; Coello, Alexandra; Marbà, Núria; Hendriks, Iris E; Holding, Johnna; García-Zarandona, Iñigo; Kritzberg, Emma; Vaqué, Dolors

    2012-02-01

    The Arctic marine ecosystem contains multiple elements that present alternative states. The most obvious of which is an Arctic Ocean largely covered by an ice sheet in summer versus one largely devoid of such cover. Ecosystems under pressure typically shift between such alternative states in an abrupt, rather than smooth manner, with the level of forcing required for shifting this status termed threshold or tipping point. Loss of Arctic ice due to anthropogenic climate change is accelerating, with the extent of Arctic sea ice displaying increased variance at present, a leading indicator of the proximity of a possible tipping point. Reduced ice extent is expected, in turn, to trigger a number of additional tipping elements, physical, chemical, and biological, in motion, with potentially large impacts on the Arctic marine ecosystem.

  9. Some observations of tip-vortex cavitation

    Science.gov (United States)

    Arndt, R. E. A.; Arakeri, V. H.; Higuchi, H.

    1991-08-01

    Cavitation has been observed in the trailing vortex system of an elliptic platform hydrofoil. A complex dependence on Reynolds number and gas content is noted at inception. Some of the observations can be related to tension effects associated with the lack of sufficiently large-sized nuclei. Inception measurements are compared with estimates of pressure in the vortex obtained from LDV measurements of velocity within the vortex. It is concluded that a complete correlation is not possible without knowledge of the fluctuating levels of pressure in tip-vortex flows. When cavitation is fully developed, the observed tip-vortex trajectory flows. When cavitation is fully developed, the observed tip-vortex trajectory shows a surprising lack of dependence on any of the physical parameters varied, such as angle of attack, Reynolds number, cavitation number, and dissolved gas content.

  10. Tip vortices in the actuator line model

    Science.gov (United States)

    Martinez, Luis; Meneveau, Charles

    2017-11-01

    The actuator line model (ALM) is a widely used tool to represent the wind turbine blades in computational fluid dynamics without the need to resolve the full geometry of the blades. The ALM can be optimized to represent the `correct' aerodynamics of the blades by choosing an appropriate smearing length scale ɛ. This appropriate length scale creates a tip vortex which induces a downwash near the tip of the blade. A theoretical frame-work is used to establish a solution to the induced velocity created by a tip vortex as a function of the smearing length scale ɛ. A correction is presented which allows the use of a non-optimal smearing length scale but still provides the downwash which would be induced using the optimal length scale. Thanks to the National Science Foundation (NSF) who provided financial support for this research via Grants IGERT 0801471, IIA-1243482 (the WINDINSPIRE project) and ECCS-1230788.

  11. Tip-Based Nanofabrication for Scalable Manufacturing

    Directory of Open Access Journals (Sweden)

    Huan Hu

    2017-03-01

    Full Text Available Tip-based nanofabrication (TBN is a family of emerging nanofabrication techniques that use a nanometer scale tip to fabricate nanostructures. In this review, we first introduce the history of the TBN and the technology development. We then briefly review various TBN techniques that use different physical or chemical mechanisms to fabricate features and discuss some of the state-of-the-art techniques. Subsequently, we focus on those TBN methods that have demonstrated potential to scale up the manufacturing throughput. Finally, we discuss several research directions that are essential for making TBN a scalable nano-manufacturing technology.

  12. Tip-Based Nanofabrication for Scalable Manufacturing

    International Nuclear Information System (INIS)

    Hu, Huan; Somnath, Suhas

    2017-01-01

    Tip-based nanofabrication (TBN) is a family of emerging nanofabrication techniques that use a nanometer scale tip to fabricate nanostructures. Here in this review, we first introduce the history of the TBN and the technology development. We then briefly review various TBN techniques that use different physical or chemical mechanisms to fabricate features and discuss some of the state-of-the-art techniques. Subsequently, we focus on those TBN methods that have demonstrated potential to scale up the manufacturing throughput. Finally, we discuss several research directions that are essential for making TBN a scalable nano-manufacturing technology.

  13. Twelve tips for "flipping" the classroom.

    Science.gov (United States)

    Moffett, Jennifer

    2015-04-01

    The flipped classroom is a pedagogical model in which the typical lecture and homework elements of a course are reversed. The following tips outline the steps involved in making a successful transition to a flipped classroom approach. The tips are based on the available literature alongside the author's experience of using the approach in a medical education setting. Flipping a classroom has a number of potential benefits, for example increased educator-student interaction, but must be planned and implemented carefully to support effective learning.

  14. Windows 7 Annoyances Tips, Secrets, and Solutions

    CERN Document Server

    Karp, David

    2010-01-01

    Windows 7 may be faster and more stable than Vista, but it's a far cry from problem-free. David A. Karp comes to the rescue with the latest in his popular Windows Annoyances series. This thorough guide gives you the tools you need to fix the troublesome parts of this operating system, plus the solutions, hacks, and timesaving tips to make the most of your PC. Streamline Windows Explorer, improve the Search tool, eliminate the Green Ribbon of Death, and tame User Account Control promptsExplore powerful Registry tips and tools, and use them to customize every aspect of Windows and solve its sho

  15. A survey to evaluate patients' perspective concerning e-mail in an oncology practice

    International Nuclear Information System (INIS)

    Katzen, C.S.; Dicker, A.P.

    2001-01-01

    Purpose: Use of e-mail to improve physician-patient communication is becoming increasingly widespread, however, little research has been done to evaluate patients' interest and concerns regarding this technology. The goals of this study were to (1) evaluate the effectiveness of e-mail for communication between patients and their oncologist and (2) assess from the perspective of the patient the accessibility and usefulness of e-mail to facilitate medical treatment and advice as compared to conventional mail and telephone. E-mail as a clinical tool is a new trend in medicine that is growing quickly, however, there are few reports to date that evaluate the patients' perspective concerning e-mail usage. The use of e-mail in doctor-patient communication is potentially faster and more efficient than conventional mail and may reduce 'telephone tag'. E-mail initiated by the physician also allows for potential follow-up after treatment. Our study evaluated the types of transactions (personal medical questions, referrals, etc.) for which patients' preferred using e-mail in place of conventional communication methods. Materials and Methods: A self-administered survey (8 pages; 50 items) was mailed to 65 patients who were treated within the previous three years for prostate cancer in a radiation oncology practice. This survey explored the opinions and behaviors of patients with regard to online communication about general healthcare issues. The items included: patients' interest in e-mail, comfort in using e-mail, concerns about confidentiality, and access to e-mail. Patients' interest in using e-mail for specific situations were also evaluated, such as, making appointments, following up on treatment, or asking general health related questions. Patients' concerns about using email to communicate with healthcare organizations also were assessed. Results: The response rate to the survey was 63%, with a median age of 68 years (range 53-82), and the majority of respondents were

  16. The STRENGTH Ezine: an application of e-mail for health promotion in adolescent girls.

    Science.gov (United States)

    Abroms, Lorien C; Fagan, Pebbles; Eisenberg, Marla E; Lee, Hye-Seung H; Remba, Natania; Sorensen, Glorian

    2004-01-01

    Few studies have investigated the efficacy of e-mail for promoting behavior change. This study evaluates the participation in and outcomes associated with an e-mail-based health promotion program. Adolescent girls aged 15 to 17 years were recruited at a shopping mall. Participants with an e-mail address were assigned to the interactive e-mail magazine (Ezine) group (n = 37), whereas those not reporting an e-mail address were assigned to the non-Ezine group (n = 33). Participants in the Ezine group received the health Ezine, which included a quiz and an advice column, on a weekly basis. Results indicate that among the Ezine group, there was a high recall of the Ezine (81.1%), and more than one third of the participants replied to Ezine volumes with quiz answers or an advice question (36.6%). Differences in health behavior change between the Ezine and non-Ezine groups were not significant. E-mails on health-related matters can generate moderate levels of involvement in adolescent girls. Given the widespread use of e-mail, more studies are needed on the effective application of e-mail for health behavior change.

  17. E-mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    Directory of Open Access Journals (Sweden)

    Behzad NAZARI

    2015-01-01

    Full Text Available The present study highly supported the effective role of providing background information via e-mail by the teacher to write e-mail by the students in learners’ writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of Oxford English Language Placement Test (OELPT the students' proficiency level seems to be nearly the same. Participants were randomly assign into two groups of experimental and control, each consisting of 25 students. After the administration of the proficiency test, all groups were assigned to write topic 1 as the pre-test. Next, the teacher involved the learners in the new instruction (treatment. During writing topics 2, 3, 4, 5, 6, and 7 experimental group’s background knowledge was activated through e-mail before writing and e-mailing topics while the control group received no background knowledge activation through e-mail. After the treatment was given to the experimental group, the students in both groups were required to write another composition about the last topic, topic 8. Again, in this phase, none of the groups received any background information. The results indicated that providing background information via e-mail by the teacher to write e-mail by the students significantly improved learners’ writing ability.

  18. Email communication at the medical primary–secondary care interface: a qualitative exploration

    Science.gov (United States)

    Sampson, Rod; Barbour, Rosaline; Wilson, Philip

    2016-01-01

    Background There is little published research into the influence of email communication between primary and secondary care clinicians on patient care. Aim To explore the use of email communication between clinicians across the primary– secondary care interface, and how this may relate to patient care. Design and setting A qualitative study involving primary and secondary care services in the NHS Highland Health Board area, Scotland. Ten GPs and 12 hospital consultants were purposively sampled to reflect diversity. Method Eligible clinicians were invited to take part in a semi-structured interview. Data were analysed using a thematic analysis approach. Results Key themes that emerged for clinicians included general perceptions of email; using email in practice (managing workload, impact on patient journeys, and ‘quick answers’); system issues (variability and governance); relational aspects; and email skills. Conclusion Email communication between primary and secondary care clinicians generally has a positive impact on patient access to specialist expertise. Governance issues around the use of clinical email need to be defined. There may currently be a two-tier health service for those patients (and their GPs) requiring ‘quick answers’. PMID:27162209

  19. The relevance of existing health communication models in the email age: An

    Science.gov (United States)

    Fage-Butler, Antoinette Mary; Jensen, Matilde Nisbeth

    2015-01-01

    Email communication is being integrated relatively slowly into doctor–patient communication. Patients have expressed enthusiasm for the medium, while doctors are generally more reluctant. As existing health communication models have characteristically assumed the co-presence of doctor and patient and primarily reflect medical practitioners’ perspectives, their suitability in relation to email communication and patients’ perspectives warrants further investigation. Following a two-step process and using the methodology of the integrative literature review, 29 articles from 2004–2014 are analysed with the aim of investigating the advantages and disadvantages of the medium of email from the patient’s perspective. The findings are compared to the health communication models of biomedicine, patient-centeredness, patient education and patient empowerment to investigate these models’ relevance for doctor–patient email communication. Results show that patients identify numerous advantages with email communication, including improved convenience and access, more detailed informational exchanges, greater reflection opportunities, freedom from the medical gaze and the potential to level out power imbalances, as well as a number of primarily medium-related disadvantages. The findings indicate that email can counteract some of the communicative problems associated with biomedicine and suggest the ongoing relevance of aspects of the models of patient empowerment, patient-centeredness and patient education for email communication.

  20. Email communication at the medical primary-secondary care interface: a qualitative exploration.

    Science.gov (United States)

    Sampson, Rod; Barbour, Rosaline; Wilson, Philip

    2016-07-01

    There is little published research into the influence of email communication between primary and secondary care clinicians on patient care. To explore the use of email communication between clinicians across the primary- secondary care interface, and how this may relate to patient care. A qualitative study involving primary and secondary care services in the NHS Highland Health Board area, Scotland. Ten GPs and 12 hospital consultants were purposively sampled to reflect diversity. Eligible clinicians were invited to take part in a semi-structured interview. Data were analysed using a thematic analysis approach. Key themes that emerged for clinicians included general perceptions of email; using email in practice (managing workload, impact on patient journeys, and 'quick answers'); system issues (variability and governance); relational aspects; and email skills. Email communication between primary and secondary care clinicians generally has a positive impact on patient access to specialist expertise. Governance issues around the use of clinical email need to be defined. There may currently be a two-tier health service for those patients (and their GPs) requiring 'quick answers'. © British Journal of General Practice 2016.

  1. Pediatric caregiver attitudes toward email communication: survey in an urban primary care setting.

    Science.gov (United States)

    Dudas, Robert Arthur; Crocetti, Michael

    2013-10-23

    Overall usage of email communication between patients and physicians continues to increase, due in part to expanding the adoption of electronic health records and patient portals. Unequal access and acceptance of these technologies has the potential to exacerbate disparities in care. Little is known about the attitudes of pediatric caregivers with regard to their acceptance of email as a means to communicate with their health care providers. We conducted a survey to assess pediatric caregiver access to and attitudes toward the use of electronic communication modalities to communicate with health care providers in an urban pediatric primary care clinic. Participants were pediatric caregivers recruited from an urban pediatric primary care clinic in Baltimore, Maryland, who completed a 35-item questionnaire in this cross-sectional study. Of the 229 caregivers who completed the survey (91.2% response rate), 171 (74.6%) reported that they use email to communicate with others. Of the email users, 145 respondents (86.3%) stated that they would like to email doctors, although only 18 (10.7%) actually do so. Among email users, African-American caregivers were much less likely to support the expanded use of email communication with health care providers (adjusted OR 0.34, 95% CI 0.14-0.82) as were those with annual incomes less than US $30,000 (adjusted OR 0.26, 95% CI 0.09-0.74). Caregivers of children have access to email and many would be interested in communicating with health care providers. However, African-Americans and those in lower socioeconomic groups were much less likely to have positive attitudes toward email.

  2. National Pediatric Program Update

    International Nuclear Information System (INIS)

    2008-01-01

    The book of the National Pediatric Program Update, issued by the Argentina Society of Pediatrics, describes important issues, including: effective treatment of addictions (drugs); defects of the neural tube; and the use of radiation imaging in diagnosis. [es

  3. Teleradiology with DICOM e-mail: recommendations of rate at GIT; Teleradiologie mit DICOM E-mail: Empfehlungen der rate at GIT

    Energy Technology Data Exchange (ETDEWEB)

    Mildenberger, P.; Kaemmerer, M.; Klos, G.; Schuetze, B. [Klinik und Poliklinik fuer Radiologie, Johannes Gutenberg-Univ. Mainz (Germany); Engelmann, U. [Deutsches Krebsforschungszentrum, Abt. Medizinische und Biologische Informatik, Heidelberg (Germany); Ruggiero, S.; Runa, A.; Weisser, G. [Inst. fuer Klinische Radiologie, Universitaetsklinikum Mannheim (Germany); Schroeter, A. [CHILI GmbH, Heidelberg (Germany); Walz, M. [TUeV Industrie Service GmbH, TUeV-SUeD-Gruppe, Aerztliche Stelle fuer Qualitaetssicherung in der Radiologie, Eschborn (Germany)

    2005-05-01

    E-mail is ideal for ad-hoc connections in teleradiology. The DICOM standard offers the possibility to append DICOM data types as a MIME attachment to any e-mail, thus ensuring the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g. protection of data privacy) which must be obeyed. Because of the lack of given standards which would grant interoperability as well as manufacturer independence, teleradiology has not been established in Germany until today. Therefore, the IT-Team (Arbeitsgemeinschaft fuer Informationstechnologie, rate at GIT) of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) set up an initiative to standardise telemedicine by using e-mail. Its members agreed that an e-mail-based variant would be the most practicable way to a communication solution - as easy to implement as to use. In their opinion, e-mail represents the smallest common denominator for a safe data interchange that would fulfill the legal advantages for telemedicine in Germany. (orig.)

  4. Study of tip loss corrections using CFD rotor computations

    DEFF Research Database (Denmark)

    Shen, Wen Zhong; Zhu, Wei Jun; Sørensen, Jens Nørkær

    2014-01-01

    Tip loss correction is known to play an important role for engineering prediction of wind turbine performance. There are two different types of tip loss corrections: tip corrections on momentum theory and tip corrections on airfoil data. In this paper, we study the latter using detailed CFD...... computations for wind turbines with sharp tip. Using the technique of determination of angle of attack and the CFD results for a NordTank 500 kW rotor, airfoil data are extracted and a new tip loss function on airfoil data is derived. To validate, BEM computations with the new tip loss function are carried out...... and compared with CFD results for the NordTank 500 kW turbine and the NREL 5 MW turbine. Comparisons show that BEM with the new tip loss function can predict correctly the loading near the blade tip....

  5. Tip off the HAT- Epigenetic control of learning and memory by Drosophila Tip60.

    Science.gov (United States)

    Xu, Songjun; Elefant, Felice

    2015-01-01

    Disruption of epigenetic gene control mechanisms involving histone acetylation in the brain causes cognitive impairment, a debilitating hallmark of most neurodegenerative disorders. Histone acetylation regulates cognitive gene expression via chromatin packaging control in neurons. Unfortunately, the histone acetyltransferases (HATs) that generate such neural epigenetic signatures and their mechanisms of action remain unclear. Our recent findings provide insight into this question by demonstrating that Tip60 HAT action is critical for morphology and function of the mushroom body (MB), the learning and memory center in the Drosophila brain. We show that Tip60 is robustly produced in MB Kenyon cells and extending axonal lobes and that targeted MB Tip60 HAT loss results in axonal outgrowth disruption. Functional consequences of loss and gain of Tip60 HAT levels in the MB are evidenced by defects in memory. Tip60 ChIP-Seq analysis reveals enrichment for genes that function in cognitive processes and accordingly, key genes representing these pathways are misregulated in the Tip60 HAT mutant fly brain. Remarkably, increasing levels of Tip60 in the MB rescues learning and memory deficits resulting from Alzheimer's disease associated amyloid precursor protein (APP) induced neurodegeneration. Our studies highlight the potential of HAT activators as a therapeutic option for cognitive disorders.

  6. Dielectrophoretic positioning of single nanoparticles on atomic force microscope tips for tip-enhanced Raman spectroscopy.

    Science.gov (United States)

    Leiterer, Christian; Deckert-Gaudig, Tanja; Singh, Prabha; Wirth, Janina; Deckert, Volker; Fritzsche, Wolfgang

    2015-05-01

    Tip-enhanced Raman spectroscopy, a combination of Raman spectroscopy and scanning probe microscopy, is a powerful technique to detect the vibrational fingerprint of molecules at the nanometer scale. A metal nanoparticle at the apex of an atomic force microscope tip leads to a large enhancement of the electromagnetic field when illuminated with an appropriate wavelength, resulting in an increased Raman signal. A controlled positioning of individual nanoparticles at the tip would improve the reproducibility of the probes and is quite demanding due to usually serial and labor-intensive approaches. In contrast to commonly used submicron manipulation techniques, dielectrophoresis allows a parallel and scalable production, and provides a novel approach toward reproducible and at the same time affordable tip-enhanced Raman spectroscopy tips. We demonstrate the successful positioning of an individual plasmonic nanoparticle on a commercial atomic force microscope tip by dielectrophoresis followed by experimental proof of the Raman signal enhancing capabilities of such tips. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. How to Increase the Efficiency and Reach of Email Marketing: Case Onninen Finland

    OpenAIRE

    Nuutinen, Sami

    2015-01-01

    This thesis took an analytical and practical approach on email marketing, and studied it from the perspective of the case study company Onninen. The aim was at finding out how to increase the efficiency and reach of email marketing at the case company. The case company, Onninen, is a large Finnish distributor of HVACR, steel, and electrical goods. Email marketing can be one of the most effective tools for marketers to invest in. In order to find solutions to the aforementioned aim of the...

  8. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    OpenAIRE

    Biloš, Antun; Turkalj, Davorin; Kelić, Ivan

    2016-01-01

    Purpose – The main purpose of this paper is to test the controlled experiment (A/B split) methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes o...

  9. Email Between Patient and Provider: Assessing the Attitudes and Perspectives of 624 Primary Health Care Patients.

    Science.gov (United States)

    Seth, Puneet; Abu-Abed, Mohamed Ismail; Kapoor, Vikram; Nicholson, Kathryn; Agarwal, Gina

    2016-12-22

    Email between patients and their health care providers can serve as a continuous and collaborative forum to improve access to care, enhance convenience of communication, reduce administrative costs and missed appointments, and improve satisfaction with the patient-provider relationship. The main objective of this study was to investigate the attitudes of patients aged 16 years and older toward receiving email communication for health-related purposes from an academic inner-city family health team in Southern Ontario. In addition to exploring the proportion of patients with a functioning email address and interest in email communication with their health care provider, we also examined patient-level predictors of interest in email communication. A cross-sectional study was conducted using a self-administered, 1-page survey of attitudes toward electronic communication for health purposes. Participants were recruited from attending patients at the McMaster Family Practice in Hamilton, Ontario, Canada. These patients were aged 16 years and older and were approached consecutively to complete the self-administered survey (N=624). Descriptive analyses were conducted using the Pearson chi-square test to examine correlations between variables. A logistic regression analysis was conducted to determine statistically significant predictors of interest in email communication (yes or no). The majority of respondents (73.2%, 457/624) reported that they would be willing to have their health care provider (from the McMaster Family Practice) contact them via email to communicate health-related information. Those respondents who checked their personal email more frequently were less likely to want to engage in this electronic communication. Among respondents who check their email less frequently (fewer than every 3 days), 46% (37/81) preferred to communicate with the McMaster Family Practice via email. Online applications, including email, are emerging as a viable avenue for patient

  10. Numerical investigation of three wind turbine blade tips

    Energy Technology Data Exchange (ETDEWEB)

    Johansen, J.; Soerensen, N.N.

    2002-08-01

    The complex three-dimensional flow around three different tip shapes on a rotating wind turbine blade is investigated and analyzed using Computational Fluid Dynamics. Differences in production, flap wise bending moments and forces are discussed. A method for determining the local inflow angle of attack is presented and further analysis is performed on lift and drag coefficients. It is shown that the original Standard tip results in a more concentrated tip vortex leading to a steeper gradient on both tangential and normal forces when approaching the tip, whereas the two tapered tips show a more flat behavior. This again leads to lower flap wise bending moments and lower production for the Standard tip compared to the two tapered tips. At 12 m/s, though, the Swept tip shows a separation pattern on the surface. This separation causes a decrease in normal force and an increase in tangential force. The Taper tip keeps the higher loading causing the flap wise bending moment to be higher as seen in measurements. To determine the radial variation of lift and drag coefficients the local inflow angle of attack is determined. It is shown that the Standard tip experiences a slightly larger angle of attack at the tip compared to the two tapered tips. The lift coefficients are kept at a more constant level for the two tapered tips due to the decrease in chord, while the drag coefficients actually decrease for the two tapered tips, especially for the Swept tip. For the Swept tip at 12 m/s both lift and drag coefficients changed considerably due to the separation. Differences in aerodynamic damping of the three tips were investigated using HAWCDAMP. The Standard tip seems to be slightly less damped with respect to the edgewise vibrations. (au)

  11. Ongewenste email

    NARCIS (Netherlands)

    Happé, R.H.

    2002-01-01

    Voorstel van de schrijver om in het wetsontwerp massale bezwaarschriften de factor rechtsbescherming een ruimere plek te geven en de belastingplichtige het recht te laten behouden een bezwaarschrift in te dienen dat individueel wordt behandeld en afgedaan.

  12. Ten Tips for Better Time Management.

    Science.gov (United States)

    Van Loozen, Luann F.

    1982-01-01

    Presents time management tips, especially for board of education members, including recommendations to realize that managing time is a skill, develop a more accurate sense of how one's time is spent, examine and reestablish goals, learn to say no, organize files and information, and master the telephone. (Author/JM)

  13. The Tipping Points of Technology Development

    Directory of Open Access Journals (Sweden)

    Tauno Kekäle

    2014-07-01

    Full Text Available The tipping point, the decisive point in time in the competition between old and new, is an interesting phenomenon in physics of today. This aspect in technology acceptance is connected to many business decisions such as technology investments, product releases, resource allocation, sales forecasts and, ultimately, affects the profitability and even survival of a company. The tipping point itself is based on many stochastic and dynamic variables, and the process may at least partly be described as path-dependent. This paper analyses the tipping point from three aspects: (1 product performance, (2 features of the market and infrastructure (including related technologies and human network externalities, and (3 actions of the incumbents (including customer lock-in, systems lock-in, and sustaining innovation. The paper is based on the Bass s-curve idea and the technology trajectory concept proposed by Dosi. Three illustrative cases are presented to make the point of the multiple factors affecting technology acceptance and, thus, the tipping point. The paper also suggests outlines for further research in field of computer simulation.

  14. Tip Saves Energy, Money for Pennsylvania Plant

    Science.gov (United States)

    A wastewater treatment plant in Berks County, Pennsylvania is saving nearly $45,000 a year and reducing hundreds of metric tons of greenhouse gases since employing an energy conservation tip offered by the Water Protection Division in EPA’s R3 and PADEP.

  15. The Tipping Point and the Adventure Advantage.

    Science.gov (United States)

    Prouty, Dick

    1998-01-01

    Insights from chaos theory--the interconnectedness of everything, nonlinear cause and effect, leverage and the "tipping point," and the importance of aligning interventions within a system--are applied to social action and illustrated via the role of adventure education in school and community interventions in the Brattleboro (Vermont) Leadership…

  16. Adipogenesis: forces that tip the scales

    DEFF Research Database (Denmark)

    MacDougald, Ormond A; Mandrup, Susanne

    2001-01-01

    factors reviewed include Wnt, transforming growth factor beta, inflammatory cytokines and prostaglandin F(2alpha). Tipping the scales towards or away from adipogenesis has profound implications for human health. In this review, we describe recent contributions to the field and will focus on factors...

  17. Can Wing Tip Vortices Be Accurately Simulated?

    Science.gov (United States)

    2011-07-01

    Aerodynamics , Flow Visualization, Numerical Investigation, Aero Suite 16. SECURITY CLASSIFICATION OF: Unclassified 17. LIMITATION OF ABSTRACT 18...additional tail buffeting.2 In commercial applications, winglets have been installed on passenger aircraft to minimize vortex formation and reduce lift...air. In military applications, wing tip In commercial applications, winglets have been installed on passenger aircraft to minimize increases with downstream distances.

  18. Tip cells: master regulators of tubulogenesis?

    Science.gov (United States)

    Weavers, Helen; Skaer, Helen

    2014-07-01

    The normal development of an organ depends on the coordinated regulation of multiple cell activities. Focusing on tubulogenesis, we review the role of specialised cells or groups of cells that are selected from within tissue primordia and differentiate at the outgrowing tips or leading edge of developing tubules. Tip or leading cells develop distinctive patterns of gene expression that enable them to act both as sensors and transmitters of intercellular signalling. This enables them to explore the environment, respond to both tissue intrinsic signals and extrinsic cues from surrounding tissues and to regulate the behaviour of their neighbours, including the setting of cell fate, patterning cell division, inducing polarity and promoting cell movement and cell rearrangements by neighbour exchange. Tip cells are also able to transmit mechanical tension to promote tissue remodelling and, by interacting with the extracellular matrix, they can dictate migratory pathways and organ shape. Where separate tubular structures fuse to form networks, as in the airways of insects or the vascular system of vertebrates, specialised fusion tip cells act to interconnect disparate elements of the developing network. Finally, we consider their importance in the maturation of mature physiological function and in the development of disease. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  19. Social Media Tips to Enhance Medical Education.

    Science.gov (United States)

    Shah, Vikas; Kotsenas, Amy L

    2017-06-01

    In this article, we describe how social media can supplement traditional education, articulate the advantages and disadvantages of various social media platforms for both teachers and learners, discuss best practices to maintain confidentiality of protected health information, and provide tips for implementing social media-based teaching into the training curriculum. Copyright © 2017 The Association of University Radiologists. All rights reserved.

  20. [Effective communication with talkative patients: 10 tips

    NARCIS (Netherlands)

    Giroldi, E.; Veldhuijzen, W.; Bareman, F.; Bueving, H.; Weijden, T.T. van der; Vleuten, C. van der; Muris, J.

    2016-01-01

    Consultations with talkative patients present a challenge to doctors. It is difficult to gather all the necessary information within the available time, without damaging the doctor-patient relationship. Based on the listed existing literature and doctors' experiences, we present ten tips for

  1. What Do You Mean, 'Tipping Point'?

    NARCIS (Netherlands)

    Nes, van E.H.; Shojaei Arani, M.; Staal, A.; Bolt, van der B.; Flores, Bernardo M.; Bathiany, S.; Scheffer, M.

    2016-01-01

    Over the past 10 years the use of the term ‘tipping point’ in the scientific literature has exploded. It was originally used loosely as a metaphor for the phenomenon that, beyond a certain threshold, runaway change propels a system to a new state. Although several specific mathematical definitions

  2. Final Technical Report: Electrohydrodynamic Tip Streaming

    Energy Technology Data Exchange (ETDEWEB)

    Basaran, Osman [Purdue Univ., West Lafayette, IN (United States)

    2016-01-06

    When subjected to strong electric fields, liquid drops and films form conical tips and emit thin jets from their tips. Such electrodydrodynamic (EDH) tip streaming or cone-jetting phenomena, which are sometimes referred to as electrospraying, occur widely in nature, e.g., in ejection of streams of small charged drops from pointed tips of raindrops in thunderclouds, and technology, e.g., in electrospray mass spectrometry or electric field-driven solvent extraction. More recently, EHD cone-jetting has emerged as a powerful technique for direct printing of solar cells, micro- and nano- particle production, and microencapsulation for controlled release. In many of the aforementioned situations, of equal importance to the processes by which one drop disintegrates to form several drops are those by which (a) two drops come together and coalesce and (b) two drops are coupled to form a double droplet system (DDS) or a capillary switch (CS). the main objective of this research program is to advance through simulation, theory, and experiment the breakup, coalescence, and oscillatory dynamics of single and pairs of charged as well as uncharged drops.

  3. Barbecue Basics: Tips to Prevent Foodborne Illness

    Medline Plus

    Full Text Available ... Medical Devices Radiation-Emitting Products Vaccines, Blood & Biologics Animal & Veterinary Cosmetics Tobacco Products For Consumers Home For ... 2017 back to top More in Consumer Updates Animal & Veterinary Children's Health Cosmetics Dietary Supplements Drugs Food ...

  4. Ten Tips to Prevent an Accidental Overdose

    Science.gov (United States)

    ... always good practice to first, check the outside packaging for such things as cuts, slices, or tears. ... Ingested OTC Liquid Drug Products (PDF - 595KB) Drug Interactions: What You Should Know Related Consumer Updates Codeine ...

  5. Barbecue Basics: Tips to Prevent Foodborne Illness

    Medline Plus

    Full Text Available ... Emitting Products Vaccines, Blood & Biologics Animal & Veterinary Cosmetics Tobacco Products For Consumers Home For Consumers Consumer Updates ... Drugs Food Medical Devices Nutrition Radiation-Emitting Products Tobacco Products Vaccines, Blood & Biologics Articulos en Espanol Alimentos ...

  6. Barbecue Basics: Tips to Prevent Foodborne Illness

    Medline Plus

    Full Text Available ... to top More in Consumer Updates Animal & Veterinary Children's Health Cosmetics Dietary Supplements Drugs Food Medical Devices Nutrition Radiation-Emitting Products Tobacco Products Vaccines, Blood & Biologics Articulos en Espanol Alimentos y Bebidas ...

  7. Barbecue Basics: Tips to Prevent Foodborne Illness

    Medline Plus

    Full Text Available ... Radiation-Emitting Products Vaccines, Blood & Biologics Animal & Veterinary Cosmetics Tobacco Products For Consumers Home For Consumers Consumer ... More in Consumer Updates Animal & Veterinary Children's Health Cosmetics Dietary Supplements Drugs Food Medical Devices Nutrition Radiation- ...

  8. Barbecue Basics: Tips to Prevent Foodborne Illness

    Medline Plus

    Full Text Available ... Devices Radiation-Emitting Products Vaccines, Blood & Biologics Animal & Veterinary Cosmetics Tobacco Products For Consumers Home For Consumers ... back to top More in Consumer Updates Animal & Veterinary Children's Health Cosmetics Dietary Supplements Drugs Food Medical ...

  9. Cohort Profile Update

    DEFF Research Database (Denmark)

    Omland, Lars Haukali; Ahlström, Magnus Glindvad; Obel, Niels

    2014-01-01

    of Causes of Death, the Danish National Prescription Registry, the Attainment Register and the Integrated Database for Labour Market Research to get information on vital status, migration, cancer, hospital contacts, causes of death, dispensed prescriptions, education and employment. Using this design, rates...... the Danish Data Protection Agency. Potential collaborators can contact the study director, Niels Obel (e-mail: niels.obel@regionh.dk)....

  10. Report: Congressionally Requested Inquiry Into the EPA’s Use of Private and Alias Email Accounts

    Science.gov (United States)

    Report #13-P-0433, September 26, 2013. We found no evidence that the EPA used, promoted or encouraged the use of private “non-governmental” email accounts to circumvent records management responsibilities

  11. Tipping news in information accumulation system

    Science.gov (United States)

    Shin, J. K.

    2010-05-01

    As a continuous opinion dynamics model, the information accumulation system (IAS) includes three basic mechanisms of the news, the inheritance and the diffusion as contributing to the information accumulation process of a system. A system is composed of agents who diffuse information through internal interaction, while each of them has incomplete memory or inheritance rate. The news comes from external sources of information, such as mass media. Previously the model IAS was studied only for the small news problems. In this study, a tipping news problem is considered. A key question of the problem is: what is the minimum strength of advertisement that can tip the minority opinion to a majority one? Dynamics of the IAS is briefly revisited with a special interest on nonlinear behavior of the model. In particular, it is shown that a discrete map of the IAS for a single color problem can be transformed into a logistic map, from which the dynamics of the IAS can be better understood. To show the applicability of the IAS model, the result is applied to explain the concept of the critical population size, which claims that there is a minimum population size for a social knowledge system to be continuously inherited without being lost. And critical size of the tipping news is found analytically in terms of IAS parameters. Some of the key results from the present study are compared in detail with the results from the Brownian particle model, which is believed to be the most similar model to the IAS. The concept of tipping news is used to show that a traditional society can tip at an exceptionally low inter-community exposure. Finally, the result was applied to the language competition problem.

  12. Hierarchical and Matrix Structures in a Large Organizational Email Network: Visualization and Modeling Approaches

    OpenAIRE

    Sims, Benjamin H.; Sinitsyn, Nikolai; Eidenbenz, Stephan J.

    2014-01-01

    This paper presents findings from a study of the email network of a large scientific research organization, focusing on methods for visualizing and modeling organizational hierarchies within large, complex network datasets. In the first part of the paper, we find that visualization and interpretation of complex organizational network data is facilitated by integration of network data with information on formal organizational divisions and levels. By aggregating and visualizing email traffic b...

  13. Providing cell phone numbers and email addresses to Patients: the physician's perspective

    Science.gov (United States)

    2011-01-01

    Background The provision of cell phone numbers and email addresses enhances the accessibility of medical consultations, but can add to the burden of physicians' routine clinical practice and affect their free time. The objective was to assess the attitudes of physicians to providing their telephone number or email address to patients. Methods Primary care physicians in the southern region of Israel completed a structured questionnaire that related to the study objective. Results The study population included 120 primary care physicians with a mean age of 41.2 ± 8.5, 88 of them women (73.3%). Physicians preferred to provide their cell phone number rather than their email address (P = 0.0007). They preferred to answer their cell phones only during the daytime and at predetermined times, but would answer email most hours of the day, including weekends and holidays (P = 0.001). More physicians (79.7%) would have preferred allotted time for email communication than allotted time for cell phone communication (50%). However, they felt that email communication was more likely to lead to miscommunication than telephone calls (P = 0.0001). There were no differences between male and female physicians on the provision of cell phone numbers or email addresses to patients. Older physicians were more prepared to provide cell phone numbers that younger ones (P = 0.039). Conclusions The attitude of participating physicians was to provide their cell phone number or email address to some of their patients, but most of them preferred to give out their cell phone number. PMID:21426591

  14. Providing cell phone numbers and email addresses to Patients: the physician's perspective

    Directory of Open Access Journals (Sweden)

    Freud Tamar

    2011-03-01

    Full Text Available Abstract Background The provision of cell phone numbers and email addresses enhances the accessibility of medical consultations, but can add to the burden of physicians' routine clinical practice and affect their free time. The objective was to assess the attitudes of physicians to providing their telephone number or email address to patients. Methods Primary care physicians in the southern region of Israel completed a structured questionnaire that related to the study objective. Results The study population included 120 primary care physicians with a mean age of 41.2 ± 8.5, 88 of them women (73.3%. Physicians preferred to provide their cell phone number rather than their email address (P = 0.0007. They preferred to answer their cell phones only during the daytime and at predetermined times, but would answer email most hours of the day, including weekends and holidays (P = 0.001. More physicians (79.7% would have preferred allotted time for email communication than allotted time for cell phone communication (50%. However, they felt that email communication was more likely to lead to miscommunication than telephone calls (P = 0.0001. There were no differences between male and female physicians on the provision of cell phone numbers or email addresses to patients. Older physicians were more prepared to provide cell phone numbers that younger ones (P = 0.039. Conclusions The attitude of participating physicians was to provide their cell phone number or email address to some of their patients, but most of them preferred to give out their cell phone number.

  15. Email and All that Jazz: Training Staff to Use Electronic Communication Tools Professionally

    Science.gov (United States)

    Stephens, Karen

    2008-01-01

    There are many benefits of e-mails. Through e-mail, a person can relay specific details to any number of "need to know" persons at the press of a "send" key at any time of day, without playing endless phone tag or waking someone up on the wrong side of the time zone. A person can also get "newsy" information out fast and save printing money, too.…

  16. Analysis of Naïve Bayes Algorithm for Email Spam Filtering across Multiple Datasets

    Science.gov (United States)

    Fitriah Rusland, Nurul; Wahid, Norfaradilla; Kasim, Shahreen; Hafit, Hanayanti

    2017-08-01

    E-mail spam continues to become a problem on the Internet. Spammed e-mail may contain many copies of the same message, commercial advertisement or other irrelevant posts like pornographic content. In previous research, different filtering techniques are used to detect these e-mails such as using Random Forest, Naïve Bayesian, Support Vector Machine (SVM) and Neutral Network. In this research, we test Naïve Bayes algorithm for e-mail spam filtering on two datasets and test its performance, i.e., Spam Data and SPAMBASE datasets [8]. The performance of the datasets is evaluated based on their accuracy, recall, precision and F-measure. Our research use WEKA tool for the evaluation of Naïve Bayes algorithm for e-mail spam filtering on both datasets. The result shows that the type of email and the number of instances of the dataset has an influence towards the performance of Naïve Bayes.

  17. Legal and policy issues associated with monitoring employee E-mail

    Energy Technology Data Exchange (ETDEWEB)

    Segura, M.A.; Rither, A.C.

    1997-01-01

    This paper examines the legal issues involved with employer monitoring of employee e-mail. In addition to identifying pertinent legal issues, the paper provides guidelines that will help the Pacific Northwest National Laboratory (PNNL) establish a program for monitoring outgoing e-mail to insure compliance with company policies, particularly those regarding protection of trade secrets and proprietary information, and to comply with the Department of Energy`s (DOE) procedures for protecting Export Controlled Information (ECI). Electronic communication has allowed companies to enhance efficiency, responsiveness and effectiveness. E-mail allows employees to transmit all types of data to other individuals inside and outside of their companies. The ease with which information can be transmitted by e-mail has placed trade secrets, proprietary information, and other sensitive data at risk from inadvertent disclosure by employees. As employers attempt to protect their interests through measures such as monitoring e-mail, they may expose themselves to liability under federal and state laws for violating employee privacy. Business use of e-mail has proliferated so rapidly that the federal and state legal systems have not been able to adequately address the issues arising out of its use in the workplace.

  18. Chemically etched fiber tips for near-field optical microscopy: a process for smoother tips.

    Science.gov (United States)

    Lambelet, P; Sayah, A; Pfeffer, M; Philipona, C; Marquis-Weible, F

    1998-11-01

    An improved method for producing fiber tips for scanning near-field optical microscopy is presented. The improvement consists of chemically etching quartz optical fibers through their acrylate jacket. This new method is compared with the previous one in which bare fibers were etched. With the new process the meniscus formed by the acid along the fiber does not move during etching, leading to a much smoother surface of the tip cone. Subsequent metallization is thus improved, resulting in better coverage of the tip with an aluminum opaque layer. Our results show that leakage can be avoided along the cone, and light transmission through the tip is spatially limited to an optical aperture of a 100-nm dimension.

  19. An Optical Fiber Bundle Sensor for Tip Clearance and Tip Timing Measurements in a Turbine Rig

    Directory of Open Access Journals (Sweden)

    María Asunción Illarramendi

    2013-06-01

    Full Text Available When it comes to measuring blade-tip clearance or blade-tip timing in turbines, reflective intensity-modulated optical fiber sensors overcome several traditional limitations of capacitive, inductive or discharging probe sensors. This paper presents the signals and results corresponding to the third stage of a multistage turbine rig, obtained from a transonic wind-tunnel test. The probe is based on a trifurcated bundle of optical fibers that is mounted on the turbine casing. To eliminate the influence of light source intensity variations and blade surface reflectivity, the sensing principle is based on the quotient of the voltages obtained from the two receiving bundle legs. A discrepancy lower than 3% with respect to a commercial sensor was observed in tip clearance measurements. Regarding tip timing measurements, the travel wave spectrum was obtained, which provides the average vibration amplitude for all blades at a particular nodal diameter. With this approach, both blade-tip timing and tip clearance measurements can be carried out simultaneously. The results obtained on the test turbine rig demonstrate the suitability and reliability of the type of sensor used, and suggest the possibility of performing these measurements in real turbines under real working conditions.

  20. Barbecue Basics: Tips to Prevent Foodborne Illness

    Medline Plus

    Full Text Available ... it Email Print Subscribe: FDA Consumer Health Information Español It’s the season for picnics, cookouts, and other ... Products Tobacco Products Vaccines, Blood & Biologics Articulos en Espanol Alimentos y Bebidas Cosméticos Dispositivos Médicos ...

  1. Barbecue Basics: Tips to Prevent Foodborne Illness

    Medline Plus

    Full Text Available ... Skip to common links HHS U.S. Department of Health and Human Services U.S. Food and Drug Administration ... Linkedin Pin it Email Print Subscribe: FDA Consumer Health Information Español It’s the season for picnics, cookouts, ...

  2. Barbecue Basics: Tips to Prevent Foodborne Illness

    Medline Plus

    Full Text Available ... Pin it Email Print Subscribe: FDA Consumer Health Information Español It’s the season for picnics, cookouts, and ... 13/2017 Note: If you need help accessing information in different file formats, see Instructions for Downloading ...

  3. Scaled multiple holes suction tip for microneurosurgery; Technical note

    Directory of Open Access Journals (Sweden)

    Abdolkarim Rahmanian, Associate Professor of Neurosurgery

    2017-12-01

    Conclusion: The new suction tip permits easy and precise adjustment of suction power in microneurosirgical operations. Our scaled 3 and 4-hole suction tip is a simple and useful device for controlling the suction power during the microneurosurgeical procedures.

  4. Tips to Help Parents Manage Their Child's Asthma Every Day

    Science.gov (United States)

    ... Tips to Help Parents Manage Their Child's Asthma Every Day Past Issues / Fall 2013 Table of Contents Asthma ... Tips to Help Parents Manage Their Child's Asthma Every Day Fall 2013 Issue: Volume 8 Number 3 Page ...

  5. Back-to-School Health Tips: Exercise and Sleep

    Science.gov (United States)

    ... up the same times each day. Keep room temperature on the cool side. A TV or computer in the bedroom can be a distraction. Read More "Back-to-School" Articles Health Tips: Immunizations / Health Tips: Exercise and ...

  6. Lifting Safety: Tips To Help Prevent Back Injuries

    Science.gov (United States)

    ... Prevent Back Injuries Lifting Safety: Tips to Help Prevent Back Injuries Share Print Back injuries are common problems at work, home, and play. They can be caused by accidents or improper lifting technique. Below are tips to ...

  7. The effect of full coverage winglets on tip leakage aerodynamics over the plane tip in a turbine cascade

    International Nuclear Information System (INIS)

    Lee, Sang Woo; Cheon, Joo Hong; Zhang, Qiang

    2014-01-01

    Highlights: • The effect of full coverage (FC) winglets on tip leakage aerodynamics is tested. • A qualitative tip gap flow model for the FC winglet is suggested. • The FC winglet of w/p = 10.55% is considered an optimal one for the plane tip. -- Abstract: The effect of full coverage (FC) winglets on tip leakage aerodynamics over the plane tip in a turbine cascade has been investigated with the variation of winglet width (w) up to w/p = 15.83% for a tip gap-to-span (chord) ratio of h/s = 1.36% (h/c = 2.0%). A qualitative tip gap flow model for the FC winglet is suggested on the bases of the near-tip surface flow visualizations. As w/p increases, the passage vortex tends to be weakened meanwhile the tip leakage vortex becomes stronger and wall-jet-like. With an increment of w/p, the mass-averaged aerodynamic loss all over the measurement plane decreases steeply up to w/p = 10.55% and then becomes almost unchanged. Thus, the FC winglet of w/p = 10.55% is considered an optimal one for the plane tip. With respect to the baseline plane tip without winglet, the maximum mass-averaged loss reduction by installing the FC winglet on the plane tip is still somewhat smaller than that by employing the cavity squealer rim on the plane tip surface

  8. Experiences of using email for general practice consultations: a qualitative study.

    Science.gov (United States)

    Atherton, Helen; Pappas, Yannis; Heneghan, Carl; Murray, Elizabeth

    2013-11-01

    Reports suggest approximately 21-23% of GPs in the UK have consulted with patients using email, but little is known about the nature of this use and what it means for clinicians and patients in general practice. To understand the use of email consultation in general practice by investigating the experiences of existing users and views of experts. A qualitative study conducted in 2010 using purposive sampling and semi-structured interviews in general practice and community settings in some London boroughs. A maximum variation sample of GPs and patients who had used email for consultation in general practice were recruited, as were policy and/or implementation experts. Interviews continued until saturation was achieved. In total 10 GPs, 14 patients, and six experts were interviewed. Consultation by email was often triggered by logistic or practical issues; motivators for ongoing use were the benefits, such as convenience, for GPs and patients. Both GPs and patients reported concerns about safety and lack of guidance about the 'rules of engagement' in email consultations, with GPs also concerned about workload. In response, both groups attempted to introduce their own rules, although this only went some way to addressing uncertainty. Long term, participants felt there was a need for regulation and guidance. Consultations by email in general practice occur in an unregulated and unstructured way. Current UK policy is to promote consultations by email, making it crucial to consider the responsibility and workload faced by clinicians, and the changes required to ensure safe use; not doing so may risk safety breaches and result in suboptimal care for patients.

  9. 100 Consejos para los Padres (100 Tips for Parents).

    Science.gov (United States)

    Department of Education, Washington, DC.

    Noting that involved parents can improve their children's chances of succeeding in school, this packet of Spanish-language cards offers 100 tips created to help parents become more involved in their child's education. Following a card of general tips on becoming involved, tips are offered in the following topic areas: keeping a child alcohol,…

  10. Modular design of AFM probe with sputtered silicon tip

    DEFF Research Database (Denmark)

    Rasmussen, Peter; Thaysen, Jacob; Bouwstra, Siebe

    2001-01-01

    of the thin films constituting the cantilever. The AFM probe has an integrated tip made of a thick sputtered silicon layer, which is deposited after the probe has been defined and just before the cantilevers are released. The tips are so-called rocket tips made by reactive ion etching. We present probes...

  11. AFM tip-sample convolution effects for cylinder protrusions

    Science.gov (United States)

    Shen, Jian; Zhang, Dan; Zhang, Fei-Hu; Gan, Yang

    2017-11-01

    A thorough understanding about the AFM tip geometry dependent artifacts and tip-sample convolution effect is essential for reliable AFM topographic characterization and dimensional metrology. Using rigid sapphire cylinder protrusions (diameter: 2.25 μm, height: 575 nm) as the model system, a systematic and quantitative study about the imaging artifacts of four types of tips-two different pyramidal tips, one tetrahedral tip and one super sharp whisker tip-is carried out through comparing tip geometry dependent variations in AFM topography of cylinders and constructing the rigid tip-cylinder convolution models. We found that the imaging artifacts and the tip-sample convolution effect are critically related to the actual inclination of the working cantilever, the tip geometry, and the obstructive contacts between the working tip's planes/edges and the cylinder. Artifact-free images can only be obtained provided that all planes and edges of the working tip are steeper than the cylinder sidewalls. The findings reported here will contribute to reliable AFM characterization of surface features of micron or hundreds of nanometers in height that are frequently met in semiconductor, biology and materials fields.

  12. Update of European bioethics

    DEFF Research Database (Denmark)

    Rendtorff, Jacob Dahl

    2015-01-01

    This paper presents an update of the research on European bioethics undertaken by the author together with Professor Peter Kemp since the 1990s, on Basic ethical principles in European bioethics and biolaw. In this European approach to basic ethical principles in bioethics and biolaw......, the principles of autonomy, dignity, integrity and vulnerability are proposed as the most important ethical principles for respect for the human person in biomedical and biotechnological development. This approach to bioethics and biolaw is presented here in a short updated version that integrates the earlier...... research in a presentation of the present understanding of the basic ethical principles in bioethics and biolaw....

  13. Twelve tips for facilitating Millennials' learning.

    Science.gov (United States)

    Roberts, David H; Newman, Lori R; Schwartzstein, Richard M

    2012-01-01

    The current, so-called "Millennial" generation of learners is frequently characterized as having deep understanding of, and appreciation for, technology and social connectedness. This generation of learners has also been molded by a unique set of cultural influences that are essential for medical educators to consider in all aspects of their teaching, including curriculum design, student assessment, and interactions between faculty and learners.  The following tips outline an approach to facilitating learning of our current generation of medical trainees.  The method is based on the available literature and the authors' experiences with Millennial Learners in medical training.  The 12 tips provide detailed approaches and specific strategies for understanding and engaging Millennial Learners and enhancing their learning.  With an increased understanding of the characteristics of the current generation of medical trainees, faculty will be better able to facilitate learning and optimize interactions with Millennial Learners.

  14. Neural adaptive control for vibration suppression in composite fin-tip of aircraft.

    Science.gov (United States)

    Suresh, S; Kannan, N; Sundararajan, N; Saratchandran, P

    2008-06-01

    In this paper, we present a neural adaptive control scheme for active vibration suppression of a composite aircraft fin tip. The mathematical model of a composite aircraft fin tip is derived using the finite element approach. The finite element model is updated experimentally to reflect the natural frequencies and mode shapes very accurately. Piezo-electric actuators and sensors are placed at optimal locations such that the vibration suppression is a maximum. Model-reference direct adaptive neural network control scheme is proposed to force the vibration level within the minimum acceptable limit. In this scheme, Gaussian neural network with linear filters is used to approximate the inverse dynamics of the system and the parameters of the neural controller are estimated using Lyapunov based update law. In order to reduce the computational burden, which is critical for real-time applications, the number of hidden neurons is also estimated in the proposed scheme. The global asymptotic stability of the overall system is ensured using the principles of Lyapunov approach. Simulation studies are carried-out using sinusoidal force functions of varying frequency. Experimental results show that the proposed neural adaptive control scheme is capable of providing significant vibration suppression in the multiple bending modes of interest. The performance of the proposed scheme is better than the H(infinity) control scheme.

  15. Interviewing When You’re Not Face-To-Face: The Use of Email Interviews in a Phenomenological Study

    Directory of Open Access Journals (Sweden)

    Chandra Bowden

    2015-01-01

    Full Text Available As Internet usage becomes more commonplace, researchers are beginning to explore the use of email interviews. Email interviews have a unique set of tools, advantages, and limitations, and are not meant to be blind reproductions of traditional face-to-face interview techniques. Email interviews should be implemented when: 1 researchers can justify email interviews are useful to a research project; 2 there is evidence that the target population will be open to email interviewing as a form of data collection; and 3 the justification of the email interview supports the researchers’ theoretical perspective. The objective of this study was to develop an email interviewing methodology. As with other forms of qualitative interviewing, it is important that the researcher: 1 identifies constraints; 2 adequately prepares for the interview; 3 establishes rapport; 4 asks appropriate questions; 5 actively listens; and 6 ends the email interview appropriately.

  16. Deception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military

    National Research Council Canada - National Science Library

    Rockwell, Roy

    2002-01-01

    ... their ability to detect email forgery. The results did determine that government computer users are extremely vulnerable to email forgery and that new security measures need to be adapted to protect these systems from this type...

  17. Oracle Apex reporting tips and tricks

    CERN Document Server

    Bara, George

    2013-01-01

    Take advantage of all the exciting Reporting features of Oracle Application Express 4.2. Designed for a hands-on approach, this book contains in-depth practical guidelines from George Bara, a well-known Oracle Apex expert and blogger. From Classic to Interactive Reports, Web Services and Pdf Printing, "Oracle Apex Reporting Tips & Tricks" is a must-have for all database developers that want to make the most out of the Oracle Apex reporting engine.

  18. Design and implementation of an automated email notification system for results of tests pending at discharge.

    Science.gov (United States)

    Dalal, Anuj K; Schnipper, Jeffrey L; Poon, Eric G; Williams, Deborah H; Rossi-Roh, Kathleen; Macleay, Allison; Liang, Catherine L; Nolido, Nyryan; Budris, Jonas; Bates, David W; Roy, Christopher L

    2012-01-01

    Physicians are often unaware of the results of tests pending at discharge (TPADs). The authors designed and implemented an automated system to notify the responsible inpatient physician of the finalized results of TPADs using secure, network email. The system coordinates a series of electronic events triggered by the discharge time stamp and sends an email to the identified discharging attending physician once finalized results are available. A carbon copy is sent to the primary care physicians in order to facilitate communication and the subsequent transfer of responsibility. Logic was incorporated to suppress selected tests and to limit notification volume. The system was activated for patients with TPADs discharged by randomly selected inpatient-attending physicians during a 6-month pilot. They received approximately 1.6 email notifications per discharged patient with TPADs. Eighty-four per cent of inpatient-attending physicians receiving automated email notifications stated that they were satisfied with the system in a brief survey (59% survey response rate). Automated email notification is a useful strategy for managing results of TPADs.

  19. Detection of Spam Email by Combining Harmony Search Algorithm and Decision Tree

    Directory of Open Access Journals (Sweden)

    M. Z. Gashti

    2017-06-01

    Full Text Available Spam emails is probable the main problem faced by most e-mail users. There are many features in spam email detection and some of these features have little effect on detection and cause skew detection and classification of spam email. Thus, Feature Selection (FS is one of the key topics in spam email detection systems. With choosing the important and effective features in classification, its performance can be optimized. Selector features has the task of finding a subset of features to improve the accuracy of its predictions. In this paper, a hybrid of Harmony Search Algorithm (HSA and decision tree is used for selecting the best features and classification. The obtained results on Spam-base dataset show that the rate of recognition accuracy in the proposed model is 95.25% which is high in comparison with models such as SVM, NB, J48 and MLP. Also, the accuracy of the proposed model on the datasets of Ling-spam and PU1 is high in comparison with models such as NB, SVM and LR.

  20. Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail.

    Science.gov (United States)

    Wang, Jing; Madnick, Stuart; Li, Xitong; Alstott, Jeff; Velu, Chander

    2015-01-01

    Social mobilization is a process that enlists a large number of people to achieve a goal within a limited time, especially through the use of social media. There is increasing interest in understanding the factors that affect the speed of social mobilization. Based on the Langley Knights competition data set, we analyzed the differences in mobilization speed between users of Facebook and e-mail. We include other factors that may influence mobilization speed (gender, age, timing, and homophily of information source) in our model as control variables in order to isolate the effect of such factors. We show that, in this experiment, although more people used e-mail to recruit, the mobilization speed of Facebook users was faster than that of those that used e-mail. We were also able to measure and show that the mobilization speed for Facebook users was on average seven times faster compared to e-mail before controlling for other factors. After controlling for other factors, we show that Facebook users were 1.84 times more likely to register compared to e-mail users in the next period if they have not done so at any point in time. This finding could provide useful insights for future social mobilization efforts.

  1. Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail.

    Directory of Open Access Journals (Sweden)

    Jing Wang

    Full Text Available Social mobilization is a process that enlists a large number of people to achieve a goal within a limited time, especially through the use of social media. There is increasing interest in understanding the factors that affect the speed of social mobilization. Based on the Langley Knights competition data set, we analyzed the differences in mobilization speed between users of Facebook and e-mail. We include other factors that may influence mobilization speed (gender, age, timing, and homophily of information source in our model as control variables in order to isolate the effect of such factors. We show that, in this experiment, although more people used e-mail to recruit, the mobilization speed of Facebook users was faster than that of those that used e-mail. We were also able to measure and show that the mobilization speed for Facebook users was on average seven times faster compared to e-mail before controlling for other factors. After controlling for other factors, we show that Facebook users were 1.84 times more likely to register compared to e-mail users in the next period if they have not done so at any point in time. This finding could provide useful insights for future social mobilization efforts.

  2. Kajian Kesantunan dalam E-Mail Permohonan yang Ditulis oleh Penutur Jepang dan Pembelajar Indonesia

    Directory of Open Access Journals (Sweden)

    Hani Wahyuningtias

    2014-05-01

    Full Text Available Nowadays electronic mail (e-mail is a communication tool that is often used in everyday life. One of the utilizations of e-mail is used in practical purposes such as making a request. This paper provided views on linguistic politeness in submitting an e-mail containing the request based on e-mail data written by native speakers of Japanese (J and the Indonesian Japanese language learners (IJL. The data was analyzed using the theory of politeness expressed by Brown and Levinson. This paper focused on the strategy that what more likely was to be used by J and IJL in the expression of request. In the final part, it concluded the view about what should be considered in connection with the linguistic politeness in Japanese e-mail containing request. It was intended for learners of foreign language, especially Indonesian people, to know the limitation of politeness, so that IJL will not repeat the same mistakes in the future.

  3. Formalized Conflicts Detection Based on the Analysis of Multiple Emails: An Approach Combining Statistics and Ontologies

    Science.gov (United States)

    Zakaria, Chahnez; Curé, Olivier; Salzano, Gabriella; Smaïli, Kamel

    In Computer Supported Cooperative Work (CSCW), it is crucial for project leaders to detect conflicting situations as early as possible. Generally, this task is performed manually by studying a set of documents exchanged between team members. In this paper, we propose a full-fledged automatic solution that identifies documents, subjects and actors involved in relational conflicts. Our approach detects conflicts in emails, probably the most popular type of documents in CSCW, but the methods used can handle other text-based documents. These methods rely on the combination of statistical and ontological operations. The proposed solution is decomposed in several steps: (i) we enrich a simple negative emotion ontology with terms occuring in the corpus of emails, (ii) we categorize each conflicting email according to the concepts of this ontology and (iii) we identify emails, subjects and team members involved in conflicting emails using possibilistic description logic and a set of proposed measures. Each of these steps are evaluated and validated on concrete examples. Moreover, this approach's framework is generic and can be easily adapted to domains other than conflicts, e.g. security issues, and extended with operations making use of our proposed set of measures.

  4. The impact of e-mail in acquiring and retaining whole-blood donors: a comparative analysis of the Puget Sound Blood Center donor e-mail communication program.

    Science.gov (United States)

    Geyer, Maria Elena

    2005-12-01

    With the emergence of e-mail as a common form of communication, it is important to understand the role and impact e-mail can have on acquiring and retaining whole-blood donors. Whole-blood donors who opted in to receive e-mail communications (n = 43,232) from the Puget Sound Blood Center (PSBC) and as a result participated in one or more of five e-mail marketing campaigns between July 2002 and March 2003 were studied. New donors with e-mail addresses grew by 74 percent over the measurement period compared with 2 percent growth of those without e-mail addresses. Nearly 15,000 prospective donors were reached as a result of donors passing along e-mails they received from PSBC to friends and family. Nearly 5 percent of PSBC e-mail campaign recipients registered to donate online. PSBC e-mail campaigns have outperformed e-mail marketing industry mean open rates by 44 percent and click-through rates by 36 percent. E-mail is now a mainstream communication medium. It has proven to be an effective method of reaching new donors and generating new donation registrations. Donors respond more favorably to e-mail communications from PSBC compared with e-mail they receive from other organizations. Deeper understanding of how different segments of blood donors use e-mail may help blood centers adjust their donor acquisition and retention programs. New recruitment methods are needed to grow the overall donor base, and e-mail appears to have the potential to make a significant contribution to meeting this objective.

  5. Sugammadex: An Update

    Directory of Open Access Journals (Sweden)

    Ezri Tiberiu

    2016-01-01

    Full Text Available The purpose of this update is to provide recent knowledge and debates regarding the use of sugammadex in the fields of anesthesia and critical care. The review is not intended to provide a comprehensive description of sugammadex and its clinical use.

  6. Supreme Court Update

    Science.gov (United States)

    Taylor, Kelley R.

    2009-01-01

    "Chief Justice Flubs Oath." "Justice Ginsburg Has Cancer Surgery." At the start of this year, those were the news headlines about the U.S. Supreme Court. But January 2009 also brought news about key education cases--one resolved and two others on the docket--of which school administrators should take particular note. The Supreme Court updates on…

  7. Update of telephone exchange

    CERN Multimedia

    2006-01-01

    As part of the upgrade of telephone services, the CERN switching centre will be updated on Monday 3 July between 8.00 p.m. and 3.00 a.m. Telephone services may be disrupted and possibly even interrupted during this operation.We apologise in advance for any inconvenience this may cause. CERN TELECOM Service

  8. Update of telephone exchange

    CERN Multimedia

    2006-01-01

    As part of the upgrade of telephone services, the CERN switching centre will be updated on Wednesday 14 June between 8.00 p.m. and midnight. Telephone services may be disrupted and possibly even interrupted during this operation. We apologise in advance for any inconvenience this may cause. CERN TELECOM Service

  9. Update of telephone exchange

    CERN Multimedia

    2006-01-01

    As part of the upgrade of telephone services, the CERN switching centre will be updated on between Monday 23 October 8.00 p.m. and Tuesday 24 October 2.00 a.m. Telephone services may be disrupted and possibly even interrupted during this operation. We apologise in advance for any inconvenience this may cause. CERN TELECOM Service

  10. Update of telephone exchange

    CERN Multimedia

    2006-01-01

    As part of the upgrade of telephone services, the CERN switching centre will be updated on Monday 3 July between 8.00 p.m. and 3.00 a.m. Telephone services may be disrupted and possibly even interrupted during this operation. We apologise in advance for any inconvenience this may cause. CERN TELECOM Service

  11. [Cardiology update in 2016].

    Science.gov (United States)

    Gabus, Vincent; Tran, Van Nam; Regamey, Julien; Pascale, Patrizio; Monney, Pierre; Hullin, Roger; Vogt, Pierre

    2017-01-11

    In 2016 the European Society of Cardiology (ESC) published new guidelines. These documents update the knowledge in various fields such as atrial fibrillation, heart failure, cardiovascular prevention and dyslipidemia. Of course it is impossible to summarize these guidelines in detail. Nevertheless, we decided to highlight the major modifications, and to emphasize some key points that are especially useful for the primary care physician.

  12. OSATE Overview & Community Updates

    Science.gov (United States)

    2015-02-15

    update 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Delange /Julien 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK...main language capabilities Modeling patterns & model samples for beginners Error-Model examples EMV2 model constructs Demonstration of tools Case

  13. Email for clinical communication between patients/caregivers and healthcare professionals.

    Science.gov (United States)

    Atherton, Helen; Sawmynaden, Prescilla; Sheikh, Aziz; Majeed, Azeem; Car, Josip

    2012-11-14

    Email is a popular and commonly-used method of communication, but its use in health care is not routine. Where email communication has been demonstrated in health care this has included its use for communication between patients/caregivers and healthcare professionals for clinical purposes, but the effects of using email in this way is not known.This review addresses the use of email for two-way clinical communication between patients/caregivers and healthcare professionals. To assess the effects of healthcare professionals and patients using email to communicate with each other, on patient outcomes, health service performance, service efficiency and acceptability. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010) and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists, contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies examining interventions using email to allow patients to communicate clinical concerns to a healthcare professional and receive a reply, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two authors independently assessed the risk of bias of included studies and extracted data. We contacted study authors for additional information. We assessed risk of bias according to the Cochrane Handbook for Systematic Reviews of Interventions. For continuous measures, we report effect sizes as mean

  14. ‘Thank you in advance’: Slovenian Request Emails and Responses

    Directory of Open Access Journals (Sweden)

    Sara Orthaber

    2017-10-01

    Full Text Available Communication through email represents one of the most important forms of business communication, not just within a company but also externally with customers. The paper examines email interactions between the agents representing a Slovenian transport company and its customers. More specifically, the study examines specific aspects and elements of email production in a Slovenian customer service setting. It is hoped that the findings will help enhance the communication skills of learners of Slovenian as a foreign language and students of translation and increase their cultural awareness and their knowledge of technology-mediated customer service communication. Moreover, the findings could increase students’ understanding of the pragmatic motivations behind interactants’ linguistic choices.

  15. Using PLSI-U To Detect Insider Threats from Email Traffic

    Science.gov (United States)

    Okolica, James; Peterson, Gilbert; Mills, Robert

    Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to commercial and government organizations. Once information on a specific topic has gone missing, being able to quickly determine who has shown an interest in that topic can allow investigators to focus their attention. Even more promising is when individuals can be found who have an interest in the topic but who have never communicated that interest within the organization. An employee's interests can be discerned by data mining corporate email correspondence. These interests can be used to construct social networks that graphically expose investigative leads. This paper describes the use of Probabilistic Latent Semantic Indexing (PLSI) [4] extended to include users (PLSI-U) to determine topics that are of interest to employees from their email activity. It then applies PLSI-U to the Enron email corpus and finds a small number of employees (0.02%) who appear to have had clandestine interests.

  16. EVALUATION OF E-MAIL USAGE BY EXTENDED TECHNOLOGY ACCEPTANCE MODEL

    Directory of Open Access Journals (Sweden)

    Savaş Mutlu

    2013-01-01

    Full Text Available This study is performed to evaluate E-mail usage by Extended Technology Acceptance Model (TAM2 and to test the moderation effects of Espoused National Cultural Values between Subjective Norm (SN and E-mail usage Behavioral Intention (BI/Perceived Usefulness (PU. Survey was conducted in Adana Branches of an important Turkish State-Run Bank including 151 participants who have E-mail access for work purposes. As the results of the study; PU and Perceived Ease Of Use (PEOU have positive effects on BI, PEOU and SN both effect PU, Femininity (F shows positive moderating effect on the relationship between SN and PU as well as the relation between SN and BI, Collectivism (C shows positive moderation effect between SN and PU, moderation effect of SN on PU is higher for people who have higher tolerance to uncertainty.

  17. The impact of email as a communicative medium on the doctor-patient relationship

    DEFF Research Database (Denmark)

    Jensen, Matilde Nisbeth; Fage-Butler, Antoinette Mary

    Background and objective: Although theoretical perspectives on the doctor-patient relationship have characteristically assumed the temporal and physical co-presence of doctor and patient, the advent of email in doctor-patient communication has brought with it a different communicative reality. New...... technologies come with significant implications as, amongst other things, they impose practices and identities on participants (Malater 2007). The purpose of this integrative literature review is thus to investigate how the advent of email as a medium of communication affects the doctor-patient relationship...... of the medium, convenience, freedom from the clinical gaze, pseudo-anonymity and greater opportunities for reflection, whilst doctors express concerns about confidentiality, time and the challenge of conveying empathy electronically. Implications: The impact of email on the doctor-patient relationship has...

  18. Tailored emails prompt electric vehicle owners to engage with tariff switching information

    Science.gov (United States)

    Nicolson, Moira; Huebner, Gesche M.; Shipworth, David; Elam, Simon

    2017-06-01

    The carbon intensity of the electricity used to charge an electric vehicle (EV) is dependent on when in the day charging occurs. However, persuading EV owners to adopt incentives to charge during off-peak hours is challenging. Here we show that governments could exploit the 'window of opportunity' created when people purchase their first EV to promote time-of-use tariffs. Email recipients (n = 7,038 EV owners) were more likely to click-through to an information webpage when the email emphasized specific reductions in home-charging costs versus general bill savings. However, the 'window of opportunity' for maximizing potential adoption is short; email open rates declined from over 70% immediately after purchase to 40% for recipients owning their EV for over three months. These results demonstrate the potential of prompts to change behaviours for which opt-out enrolment (where enrolment is automatic unless people explicitly opt out) would be unethical or less effective.

  19. Magnetic elements for switching magnetization magnetic force microscopy tips

    International Nuclear Information System (INIS)

    Cambel, V.; Elias, P.; Gregusova, D.; Martaus, J.; Fedor, J.; Karapetrov, G.; Novosad, V.

    2010-01-01

    Using combination of micromagnetic calculations and magnetic force microscopy (MFM) imaging we find optimal parameters for novel magnetic tips suitable for switching magnetization MFM. Switching magnetization MFM is based on two-pass scanning atomic force microscopy with reversed tip magnetization between the scans. Within the technique the sum of the scanned data with reversed tip magnetization depicts local atomic forces, while their difference maps the local magnetic forces. Here we propose the design and calculate the magnetic properties of tips suitable for this scanning probe technique. We find that for best performance the spin-polarized tips must exhibit low magnetic moment, low switching fields, and single-domain state at remanence. The switching field of such tips is calculated and optimum shape of the Permalloy elements for the tips is found. We show excellent correspondence between calculated and experimental results for Py elements.

  20. Continuum damage mechanics analysis of crack tip zone

    International Nuclear Information System (INIS)

    Yinchu, L.; Jianping, Z.

    1989-01-01

    The crack tip field and its intensity factor play an important role in fracture mechanics. Generally, the damage such as microcracks, microvoids etc. will initiate and grow in materials as the cracked body is subjected to external loadings, especially in the crack tip zone. The damage evolution will load to the crack tip damage field and the change of the stress, strain and displacement fields of cracks tip zone. In this paper, on the basis of continuum damage mechanics, the authors have derived the equations which the crack tip field and its intensity factor must satisfy in a loading process, calculated the angle distribution curves of stress, strain and displacement fields in a crack tip zone and have compared them with the corresponding curves of HRR field and linear elastic field in undamaged materials. The equations of crack tip field intensity factors have been solved and its solutions give the variation of the field intensity factors with the loading parameter