WorldWideScience

Sample records for university email system

  1. FNAL central email systems

    Schmidt, Jack; Lilianstrom, Al; Pasetes, Ray; Hill, Kevin; /Fermilab

    2004-10-01

    The FNAL Email System is the primary point of entry for email destined for an employee or user at Fermilab. This centrally supported system is designed for reliability and availability. It uses multiple layers of protection to help ensure that: (1) SPAM messages are tagged properly; (2) All mail is inspected for viruses; and (3) Valid mail gets delivered. This system employs numerous redundant subsystems to accomplish these tasks.

  2. INTELLIGENT E-MAIL PERSONALIZATION SYSTEM

    SHANMUGASUNDARAM HARIHARAN

    2011-02-01

    Full Text Available In Internet era E-mail has become the most important mode of communication in every day life. E-mail offers several advantages like secure delivery, speed, cheaper cost, acknowledgement report, transparent service, and distributed environment. As spammers try to induce large amount of spam or unsolicited mails, managing these E-mails’s in an efficient manner requires huge attention. This paper focus on personalizing the E-mail messages after eliminating the spam messages. The basic step starts with pre-processing the documents and classifying the contents into several folders or categories. The next step is to cluster the documents based on the relativeness they have using cosine similarity metric. This clustering approach is carried out using unsupervised method. The mail messages are the parsed through a filter that would identify the spam immediately. Studies on personalization of mails after spam identification, prioritizing the E-mail’s based on the importance and summarization of were also proposed. The results were quiet promising leading to efficient spam identification providing a platform for further improvements to build a domain independent personalizer system.

  3. Employees' Perceptions of Email Communication, Volume and Management Strategies in an Australian University

    Pignata, Silvia; Lushington, Kurt; Sloan, Jeremy; Buchanan, Fiona

    2015-01-01

    Despite email playing a central role in university business, little is known about the strategies used by staff to manage email and the factors contributing to email overload. In a mixed method study undertaken in one Australian university comparing academic (n = 193) and professional (n = 278) staff, we found that while email volume was higher in…

  4. You’ve Got Email: a Workflow Management Extraction System

    P. Chaipornkaew (Piyanuch); T. Prexawanprasut (Takorn); M.J. McAleer (Michael)

    2017-01-01

    textabstractEmail is one of the most powerful tools for communication. Many businesses use email as the main channel for communication, so it is possible that substantial data are included in email content. In order to help businesses grow faster, a workflow management system may be required. The

  5. Perceptions and use of e-mail among Universiti Utara Malaysia staff: A pilot study

    Mohamed, Shafinah Farvin Packeer; Ku-Mahamud, Ku Ruhana; Ramli, Razamin; Abdullah, Kamarudin

    2017-10-01

    The use of e-mail has become common either for work purposes or personal usage. Despite its usefulness, complain about the overwhelming messages received which cause the users to have problem in managing those messages. Similar situation occurred among Universiti Utara Malaysia (UUM) staff. Thus, a pilot study was conducted to investigate its staff's perception and use of e-mail in order to improve the e-mail service provided to them. This paper discusses the findings from the pilot study, which involves 41 UUM staff. Self-administered questionnaires were used to gather the data, while descriptive statistical analysis was used for data analysis. The findings of the study reveal that UUM staff appreciate the e-mail service. However they faced problems like limited storage size and overwhelming e-mails. They think that UUM e-mail is being abused by the repeating advertisements and news sent to them. The output of this study can be used as a guideline by the UUM management in revising its e-mail policy to serve better quality of e-mail service.

  6. COMMUNICATION TOPICS AND STRATEGIES IN E-MAIL CONSULTATION: COMPARISON BETWEEN AMERICAN AND INTERNATIONAL UNIVERSITY STUDENTS

    Sigrun Biesenbach-Lucas

    2005-05-01

    Full Text Available On today's "wired" college campuses, students avail themselves in increasing numbers of electronic channels, most notably e-mail, as a means to consult with their professors. While some research has investigated the purposes for which university students communicate with their instructors via e-mail, little research has examined differences in e-mail use between American and international students. In the present study, e-mail messages sent by American and international students enrolled in a teacher-preparation program to their professor were collected over the course of one semester. The messages were examined for three major communication topics (facilitative, substantive, relational and communication strategies (requesting, negotiating, reporting. Results indicate quantitative and qualitative differences in American and international students' e-mail topics and strategies, suggesting, similar to findings for face-to-face academic advising sessions, that American students demonstrate greater initiative and ability to adapt to the spatial and temporal remoteness between interlocutors in e-mail interaction, especially when using e-mail to solicit face-to-face appointments and input on projects. Findings also show that messages from both groups of students contained substantial relational communication, perhaps in an attempt to compensate for the lack of visual and paralinguistic clues in the e-mail medium.

  7. A Generalized Email Classification System for Workflow Analysis

    P. Chaipornkaew (Piyanuch); T. Prexawanprasut (Takorn); C-L. Chang (Chia-Lin); M.J. McAleer (Michael)

    2017-01-01

    textabstractOne of the most powerful internet communication channels is email. As employees and their clients communicate primarily via email, much crucial business data is conveyed via email content. Where businesses are understandably concerned, they need a sophisticated workflow management

  8. Evaluation Methodologies for Information Management Systems; Building Digital Tobacco Industry Document Libraries at the University of California, San Francisco Library/Center for Knowledge Management; Experiments with the IFLA Functional Requirements for Bibliographic Records (FRBR); Coming to Term: Designing the Texas Email Repository Model.

    Morse, Emile L.; Schmidt, Heidi; Butter, Karen; Rider, Cynthia; Hickey, Thomas B.; O'Neill, Edward T.; Toves, Jenny; Green, Marlan; Soy, Sue; Gunn, Stan; Galloway, Patricia

    2002-01-01

    Includes four articles that discuss evaluation methods for information management systems under the Defense Advanced Research Projects Agency; building digital libraries at the University of California San Francisco's Tobacco Control Archives; IFLA's Functional Requirements for Bibliographic Records; and designing the Texas email repository model…

  9. A Study of Jordanian University Students' Perceptions of Using Email Exchanges with Native English Keypals for Improving Their Writing Competency

    Mahfouz, Safi Mahmoud

    2010-01-01

    English foreign language learners generally tend to consider email exchanges with native speakers (NSs) as an effective tool for improving their foreign language proficiency. This study investigated Jordanian university students' perceptions of using email exchanges with native English keypals (NEKs) for improving their writing competency. A…

  10. Fluctuations in email size

    Matsubara, Yoshitsugu; Musashi, Yasuo

    2017-12-01

    The purpose of this study is to explain fluctuations in email size. We have previously investigated the long-term correlations between email send requests and data flow in the system log of the primary staff email server at a university campus, finding that email size frequency follows a power-law distribution with two inflection points, and that the power-law property weakens the correlation of the data flow. However, the mechanism underlying this fluctuation is not completely understood. We collected new log data from both staff and students over six academic years and analyzed the frequency distribution thereof, focusing on the type of content contained in the emails. Furthermore, we obtained permission to collect "Content-Type" log data from the email headers. We therefore collected the staff log data from May 1, 2015 to July 31, 2015, creating two subdistributions. In this paper, we propose a model to explain these subdistributions, which follow log-normal-like distributions. In the log-normal-like model, email senders -consciously or unconsciously- regulate the size of new email sentences according to a normal distribution. The fitting of the model is acceptable for these subdistributions, and the model demonstrates power-law properties for large email sizes. An analysis of the length of new email sentences would be required for further discussion of our model; however, to protect user privacy at the participating organization, we left this analysis for future work. This study provides new knowledge on the properties of email sizes, and our model is expected to contribute to the decision on whether to establish upper size limits in the design of email services.

  11. Ethical Judgments Concerning Email Use in the Workplace: University Students' Perceptions.

    Keith, Nancy; Perreault, Heidi; Sutliff, Kris

    2001-01-01

    A survey of 1,272 college students showed that most believed it appropriate to use company e-mail accounts for personal messages, but inappropriate to read others' e-mail or send messages with ethnic, racial, or sexual content. Students who participated in ethics discussions were less likely to rate certain behaviors as appropriate. (Contains 22…

  12. Use of email in communication between the Finnish primary healthcare system and general practitioners

    Tuula Karhula

    2011-03-01

    Conclusion Especially during periods of change in the workplace, it is very important that management is conducted personally. Care must be taken so that disinformation does not spoil the informative value of email in the administration of primary health care. The needed technical assistance should be given to everyone in order to get the best advantage from the use of the email system.

  13. Email Updates

    ... of this page: https://medlineplus.gov/listserv.html Email Updates To use the sharing features on this ... view your email history or unsubscribe. Prevent MedlinePlus emails from being marked as "spam" or "junk" To ...

  14. Effects of text messaging in addition to emails on physical activity among university and college employees in the UK.

    Suggs, Suzanne; Blake, Holly; Bardus, Marco; Lloyd, Scott

    2013-04-01

    To test the effects of adding text messages to weekly email communications on recipients' total physical activity (leisure-time; workplace; domestic and garden; and active transportation) in employees of universities and colleges in the UK. A randomised trial with two study groups (email only or email plus text messaging for 12 weeks) was implemented at five workplaces. Data were collected at baseline, immediately after, and four weeks after the intervention. Intervention effects on physical activity were evaluated using latent growth modelling. Total physical activity decreased over time in both groups but the decrease was non-significant. The only significant difference between groups was found for workplace physical activity, with the group receiving emails and text messages having a linear decrease of 2.81 Metabolic Equivalent h/week (β = -0.31, p = 0.035) compared to the email only group. Sending employees two additional text messages resulted in less physical activity. Further investigation is needed to understand whether text messaging may play a beneficial role in promoting physical activity in workplace settings. © The Author(s) 2013 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  15. Design and implementation of an automated email notification system for results of tests pending at discharge.

    Dalal, Anuj K; Schnipper, Jeffrey L; Poon, Eric G; Williams, Deborah H; Rossi-Roh, Kathleen; Macleay, Allison; Liang, Catherine L; Nolido, Nyryan; Budris, Jonas; Bates, David W; Roy, Christopher L

    2012-01-01

    Physicians are often unaware of the results of tests pending at discharge (TPADs). The authors designed and implemented an automated system to notify the responsible inpatient physician of the finalized results of TPADs using secure, network email. The system coordinates a series of electronic events triggered by the discharge time stamp and sends an email to the identified discharging attending physician once finalized results are available. A carbon copy is sent to the primary care physicians in order to facilitate communication and the subsequent transfer of responsibility. Logic was incorporated to suppress selected tests and to limit notification volume. The system was activated for patients with TPADs discharged by randomly selected inpatient-attending physicians during a 6-month pilot. They received approximately 1.6 email notifications per discharged patient with TPADs. Eighty-four per cent of inpatient-attending physicians receiving automated email notifications stated that they were satisfied with the system in a brief survey (59% survey response rate). Automated email notification is a useful strategy for managing results of TPADs.

  16. The Impact of a Targeted Training Program on E-Mail System Processing Capabilities and Self-Perception of E-Mail Overload

    Einstein, Michael M.

    2014-01-01

    As business e-mail volumes continue to grow and employees spend increasingly larger portions of their day processing e-mail, there is strong evidence of the negative impacts of e-mail processing, especially with respect to e-mail overload. This study sought to determine whether a training program focused on select e-mail features and processing…

  17. Email based remote access and surveillance system for smart home infrastructure

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  18. Email Negotiation

    Bülow, Anne Marie

    2010-01-01

    This paper investigates a set of email negotiations in order to explain a high number of deadlocks. The paper argues that one reason is the combination of cognitive effort characteristic of the e-mail genre, and the argumentative pattern found when two parties simultaneously try to persuade the other of the justice of their cause. For a negotiation involving the wording of a contract, the evidence suggests that, while there is a distinct advantage in the features of reviewability and revis...

  19. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  20. Alcohol assessment & feedback by e-mail for university student hazardous and harmful drinkers: study protocol for the AMADEUS-2 randomised controlled trial.

    McCambridge, Jim; Bendtsen, Marcus; Karlsson, Nadine; White, Ian R; Bendtsen, Preben

    2013-10-10

    Alcohol is responsible for a large and growing proportion of the global burden of disease, as well as being the cause of social problems. Brief interventions are one component of comprehensive policy measures necessary to reduce these harms. Brief interventions increasingly take advantage of the Internet to reach large numbers of high risk groups such as students. The research literature on the efficacy and effectiveness of online interventions is developing rapidly. Although many studies show benefits in the form of reduced consumption, other intervention studies show no effects, for reasons that are unclear. Sweden became the first country in the world to implement a national system in which all university students are offered a brief online intervention via an e-mail. This randomized controlled trial (RCT) aims to evaluate the effectiveness of this national system comprising a brief online intervention among university students who are hazardous and harmful drinkers. This study employs a conventional RCT design in which screening to determine eligibility precedes random allocation to immediate or delayed access to online intervention. The online intervention evaluated comprises three main components; assessment, normative feedback and advice on reducing drinking. Screening is confined to a single question in order to minimise assessment reactivity and to prevent contamination. Outcomes will be evaluated after 2 months, with total weekly alcohol consumption being the primary outcome measure. Invitations to participate are provided by e-mail to approximately 55,000 students in 9 Swedish universities. This RCT evaluates routine service provision in Swedish universities via a delay in offer of intervention to the control group. It evaluates effects in the key population for whom this intervention has been designed. Study findings will inform the further development of the national service provision. ISRCTN02335307.

  1. Email Negotiation

    Bülow, Anne Marie

    the other of the justice of their cause. For a negotiation involving the wording of a contract, the evidence suggests that, while there is a distinct advantage in the features of reviewability and revisablity, the email format allows selective attention to the other party’s arguments, which can be shown...

  2. (Mis)Use of Email in Student-Faculty Interaction: Implications for University Instruction in Germany, Saudi Arabia, and Japan

    Danielewicz-Betz, Anna

    2013-01-01

    This paper examines student-faculty communication by email and the lack of clear guidelines that leads to misuse of email in student-faculty interaction, whereby status-incongruent pragmatic markers are employed, resulting in impoliteness and inappropriateness. The main objective is to bridge the gap in research on other than requestive speech…

  3. New Secure E-mail System Based on Bio-Chaos Key Generation and Modified AES Algorithm

    Hoomod, Haider K.; Radi, A. M.

    2018-05-01

    The E-mail messages exchanged between sender’s Mailbox and recipient’s Mailbox over the open systems and insecure Networks. These messages may be vulnerable to eavesdropping and itself poses a real threat to the privacy and data integrity from unauthorized persons. The E-mail Security includes the following properties (Confidentiality, Authentication, Message integrity). We need a safe encryption algorithm to encrypt Email messages such as the algorithm Advanced Encryption Standard (AES) or Data Encryption Standard DES, as well as biometric recognition and chaotic system. The proposed E-mail system security uses modified AES algorithm and uses secret key-bio-chaos that consist of biometric (Fingerprint) and chaotic system (Lu and Lorenz). This modification makes the proposed system more sensitive and random. The execution time for both encryption and decryption of the proposed system is much less from original AES, in addition to being compatible with all Mail Servers.

  4. Design and development of mobile Email system based on brew and IMAP4

    Chen Liangchen; Liu Shuzhen; Yan Xiaofei; Sun Gongxing

    2007-01-01

    In order to achieve IMAP4 support agreement in the mobile e-mail client application on the smart phone, using the Qualcomm introduced wireless devices designed for the BREW platform. Research on the BREW platform mobile and IMAP4 protocol, design and implement the 3G technology standard smart phone e-mail client based on the BREW platform. (authors)

  5. Therapeutic emails

    Sinkule Jennifer

    2007-02-01

    Full Text Available Abstract Background In this paper, we show how counselors and psychologists can use emails for online management of substance abusers, including the anatomy and content of emails that clinicians should send substance abusers. Some investigators have attempted to determine if providing mental health services online is an efficacious delivery of treatment. The question of efficacy is an empirical issue that cannot be settled unless we are explicitly clear about the content and nature of online treatment. We believe that it is not the communications via internet that matters, but the content of these communications. The purpose of this paper is to provide the content of our online counseling services so others can duplicate the work and investigate its efficacy. Results We have managed nearly 300 clients online for recovery from substance abuse. Treatment included individual counseling (motivational interviewing, cognitive-behavior therapy, relapse prevention assignments, participation in an electronic support group and the development of a recovery team. Our findings of success with these interventions are reported elsewhere. Our experience has led to development of a protocol of care that is described more fully in this paper. This protocol is based on stages of change and relapse prevention theories and follows a Motivational Interviewing method of counseling. Conclusion The use of electronic media in providing mental health treatment remains controversial due to concerns about confidentiality, security and legal considerations. More research is needed to validate and generalize the use of online treatment for mental health problems. If researchers have to build on each others work, it is paramount that we share our protocols of care, as we have done in this paper.

  6. Technical Perspective on Using Information Demand Pattern in a Collaborative Recommendation System for Improving E-Mail Communication

    Dirk Stamer

    2015-04-01

    Full Text Available Today e-mail communication information is widely used in organizations to distribute information. The increasing volume of received e-mails hinders an efficient work. It becomes more and more difficult to identify relevant e-mails inside this enormous volume of information. This work presents a solution in a multi-user environment by improving an established e-mail client extension based on information demand pattern with a recommendation system. The contributions of this work are (1 the concept and implementation of the solution for a single-user environment using information demand pattern, (2 the concept and architecture to use the solution in a multi-user environment (3 a detailed technical description about the proposed solutions.

  7. An analysis of Vigimed, a global e-mail system for the exchange of pharmacovigilance information.

    Johansson, Kristina; Olsson, Sten; Hellman, Björn; Meyboom, Ronald H B

    2007-01-01

    The Internet provides novel ways for communication and data exchange between national regulators. One innovation was the introduction of Vigimed, an e-mail discussion forum for national pharmacovigilance centres (NPCs). We reviewed a sample of Vigimed messages to learn more about this new tool and about the problems encountered in everyday pharmacovigilance and how these are handled. We analysed the contents of 100 subsequent questions and the corresponding responses as stored in the Vigimed datafile. To the 100 questions circulated through Vigimed, 575 answers were received; mean number of answers per question 6, range 0-20. Fifty-five (77%) of the 71 collaborating countries and 88 (43%) of the 204 individuals who had access in the study period had submitted at least one question or answer. These countries were in all parts of the world and in various phases of development. A total of 38% of the questions concerned the regulatory status of a drug; 30% safety issues; 13% regulatory actions under consideration; and 10% drug use-related problems (more than one category possible). Of the questions, 89% concerned established drugs; 11% were classified as new. A total of 90% of the questions concerned specific active substances or drug groups. Of the drugs, 73% were classified as 'orthodox' and 9% as herbal; 4% were vaccines and 4% excipients. Emerging drug groups (anatomical therapeutic chemical codes) were NSAIDs and analgesics (M01, N02), antibacterials (J01), antiobesity drugs (A08), psychotropic drugs (N05) and antihistamines (R06). NPCs operate in a restricted environment and there is little published information about the daily practices and experiences at NPCs. Our study concerned a sample in a limited period in time. In the meantime, the use of Vigimed has greatly expanded. The data in the Vigimed records are subjected to confidentiality in regard to the identities of countries, staff members, drug products and pharmaceutical companies, which limits the

  8. Kurumsal Bilgi Kaynağı Olarak E-posta Yönetim Sistemleri = E-mail Management Systems as an Enterprise Information Resource

    Külcü, Özgür

    2012-01-01

    Full Text Available Çalışmada, e-posta kullanımı ve yönetimine ilişkin uluslararası koşullar incelenmekte, bu çerçevede Türkiye’de 28 kurum örneğinde gerçekleştirilen anket verileri değerlendirilmektedir. Betimleme yönteminin kullanıldığı çalışmada literatür incelemesi ve anket tekniklerine dayanarak gerekli veriler elde edilmiştir. Araştırmada e-posta kullanımına ilişkin elde edilen verilerin, ilgili alanda sistemler geliştirmeye çalışan araştırmacılara yardımcı olması beklenmektedir. Kurumsal e-posta yönetimine ilişkin temel sorunlar arasında mesajların üretimi, düzenlenmesi, ayıklanması ve uzun süre korunmasını içeren e-posta yönetim sistemlerinin geliştirilmesi yer almaktadır. Ayrıca insan kaynakları, mali ve idari konuların yönetimi ile belge ve arşiv yönetimi çalışmalarını kapsamına alan, içerisine e-posta yönetiminin de dâhil olduğu sistemlerin bütünleştirilmesi güncel araştırma konuları arasındadır. / This study examines the universal usage and management of e-mail communication and compares with the data, gathered from 28 Turkish institutions. This is a descriptive research in nature and the quantitative data were collected through surveys. It is expected that the results one-mail communication and its usage styles will shed a ligth into researcher who are working on system development. One of the basic problems of organizational e-mail management systems are lack of e-mail systems including message creation, maintenance, disposition, and long term preservation. Furthermore, the results indicate that integration of human resources management, financial and administrative management systems and archival management systems with e-mail managment system is another major problem.

  9. Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

    De Wang; Danesh Irani; Calton Pu

    2014-01-01

    With the increasing dedication and sophistication of spammers, email spam is a persistent problem even today. Popular social network sites such as Facebook, Twitter, and Google+ are not exempt from email spam as they all interface with email systems. While some report predicts that email spam business is dying due to the decreasing volume of email spam. Whether email spam business is really dying is an interesting question. In this paper, we analyze email spam trends on Spam Archive dataset, ...

  10. Email shape analysis

    Sroufe, Paul; Phithakkitnukoon, Santi; Dantu, Ram; Cangussu, João

    2010-01-01

    Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering, and social-context bas...

  11. E-mail marketing

    Jurnečková, Jana

    2014-01-01

    The thesis deals with e-mail marketing. It focuses on identifying factors that affect the behavior of users of e-mail and newsletter subscribers. It evaluates the role of e-mail marketing as a part of communication mix of companies and e-shops, current trends, e-mail campaigns, e-mail marketing software provider. To study the behavior of users of e-mail and newsletter subscribers a questionnaire survey was conducted on a sample of 610 respondents and in-depth interviews (n = 30). Content anal...

  12. Hacked E-mail

    ... your email address was “spoofed,” or faked, and hackers don’t actually have access to your account. ... use public Wi-Fi .) Tagged with: antivirus , email , hacker , imposter , password , phishing , scam , social networking July 2013 ...

  13. Efektivitas Email Untuk Pemasaran

    Oetomo, Budi Sutedjo Dharma

    2009-01-01

    Lebih dari 500 juta orang dan badan USAha telah tergabung di internet. Pada umumnya, mereka telah terbiasa untuk memanfaatkan fitur dan aplikasi yang tersedia di internet, seperti email, mailing list, web, blog dan situs jejaring sosial. Diantara fitur dan aplikasi internet itu yang hampir digunakan oleh setiap orang dan badan USAha adalah email, karena mereka telah memiliki alamat email, bahkan lebih dari satu buah. Kini, fitur email telah dimanfaatkan untuk kegiatan pemasaran, khususnya pro...

  14. RECEIVING UNWANTED EMAIL?

    Denise Heagerty

    2002-01-01

    Unsolicited email, commonly known as SPAM, is a growing problem across the Internet at large. You are recommended to delete it. If the email looks suspicious, do not even open it (from Outlook you can delete email using the right button of your mouse to select the message and then selecting delete). Viruses are often hidden inside attachments, so do not open attachments in unsolicited email. SPAM and virus emails can be disguised to trick you into reading the email and/or performing an action. Here are examples of some techniques to help you recognise them: fake email addresses: emails can appear to be from people you know or even from yourself. Your own email address can appear in emails which you did not send, resulting in non-delivery messages or unexpected replies. Fake addresses may be used to send viruses. If the email looks suspicious then delete it and do not open the attachments. If you are unsure then check with the sender first. enticing subjects: the email subject uses words to make you curious...

  15. The NASA Astrophysics Data System Free Access to the Astronomical Literature On-Line and through Email

    Eichhorn, G; Grant, C S; Kurtz, M J; Murray, S S

    2001-01-01

    The Astrophysics Data System (ADS) provides access to the astronomical literature through the World Wide Web. It is a NASA funded project and access to all the ADS services is free to everybody world-wide.The ADS Abstract Service allows the searching of four databases with abstracts in Astronomy, Instrumentation, Physics/Geophysics, and the LANL Preprints with a total of over 2.2 million references. The system also provides access to reference and citation information, links to on-line data, electronic journal articles, and other on-line information. The ADS Article Service contains the articles for most of the astronomical literature back to volume 1. It contains the scanned pages of all the major journals (Astrophysical Journal, Astronomical Journal, Astronomy & Astrophysics, Monthly Notices of the Royal Astronomical Society, and Solar Physics), as well as most smaller journals back to volume 1. The ADS can be accessed through any web browser without signup or login. Alternatively an email interface is ...

  16. E-mail marketing

    TŮMOVÁ, Kateřina

    2012-01-01

    The aim of this work is to specify the e-mail marketing and in the practical application to evaluate the pros and cons of e-mail marketing as a tool of targeted marketing communication.Based on personal interviews with representatives of the company was described their existing e-mail marketing.Through the survey it was found, how customers perceive the company's e-mail marketing.Based on the survey, changes were proposed at the end of the thesis.

  17. Management and Archiving e-mail Messages in Governmental Organization

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  18. Impact of an automated email notification system for results of tests pending at discharge: a cluster-randomized controlled trial.

    Dalal, Anuj K; Roy, Christopher L; Poon, Eric G; Williams, Deborah H; Nolido, Nyryan; Yoon, Cathy; Budris, Jonas; Gandhi, Tejal; Bates, David W; Schnipper, Jeffrey L

    2014-01-01

    Physician awareness of the results of tests pending at discharge (TPADs) is poor. We developed an automated system that notifies responsible physicians of TPAD results via secure, network email. We sought to evaluate the impact of this system on self-reported awareness of TPAD results by responsible physicians, a necessary intermediary step to improve management of TPAD results. We conducted a cluster-randomized controlled trial at a major hospital affiliated with an integrated healthcare delivery network in Boston, Massachusetts. Adult patients with TPADs who were discharged from inpatient general medicine and cardiology services were assigned to the intervention or usual care arm if their inpatient attending physician and primary care physician (PCP) were both randomized to the same study arm. Patients of physicians randomized to discordant study arms were excluded. We surveyed these physicians 72 h after all TPAD results were finalized. The primary outcome was awareness of TPAD results by attending physicians. Secondary outcomes included awareness of TPAD results by PCPs, awareness of actionable TPAD results, and provider satisfaction. We analyzed data on 441 patients. We sent 441 surveys to attending physicians and 353 surveys to PCPs and received 275 and 152 responses from 83 different attending physicians and 112 different PCPs, respectively (attending physician survey response rate of 63%). Intervention attending physicians and PCPs were significantly more aware of TPAD results (76% vs 38%, adjusted/clustered OR 6.30 (95% CI 3.02 to 13.16), pemail notification represents a promising strategy for managing TPAD results, potentially mitigating an unresolved patient safety concern. ClinicalTrials.gov (NCT01153451).

  19. Analyzing E-mail communication of prospective learners

    Anurag SAXENA

    2005-10-01

    Full Text Available Analyzing E-mail communication of prospective learners Vibha JOSHIAnurag SAXENA Reader School of Management IGNOU, New Delhi, INDIA ABSTRACT Today, computer has replaced all means of communication significantly. E-mail is the most popular means of communication through computers. It has vanished the boundaries between the cities, countries and continents. Earlier Studies that used this medium, had shown evidence of higher quality of responses and also significant cost savings feature of this method (mainly for convenience of dispatch for research purposes. In this communication, an attempt has been made to utilize email responses of prospective learners in education discipline based programs offered through open learning system. The inception of this study is linked to the creation of website (http://www.ignou.ac.in/ and availability of information related to all activated and prospective programs of studies, various school of studies, faculty email addresses and faculty vis-à-vis program coordinator in the University. The present study analyzed 65 email responses received from July 2002 to till date by the researcher on her email ID. These respondents got the email ID from the University website and due to their eagerness to attain qualifications in the field of education/guidance/educational management, sent an e-mail to the program coordinator(s. These email responses were analyzed in order to visualize the learner profiles and viability of the ongoing as well as prospective programs of studies. This paper tries to analyze the e-mail responses of the people who either by surfing IGNOU’s website or from other sources came to know about the various programs of studies offered by the School of Education. The study validates that there is an amount of hidden information even in the curiosity of the learners.

  20. Association between secure patient-clinician email and clinical services utilisation in a US integrated health system: a retrospective cohort study.

    Meng, Di; Palen, Ted E; Tsai, Joanne; McLeod, Melanie; Garrido, Terhilda; Qian, Heather

    2015-11-09

    To assess associations between secure patient-clinician email use and clinical services utilisation over time. Retrospective cohort study between July 2010 and December 2013. Controlling for a utilisation surge around first secure email use, we analysed difference of differences between propensity score-matched groups of secure patient-clinician email users and non-users for utilisation 1-12 months before and 7-18 months after first email (users) or a randomly assigned index date (non-users). US integrated healthcare delivery system. 9345 adults with first secure email use between July 2011 and July 2012 and continuous enrolment for ≥30 months and 9345 adults without secure email use between July 2010 and July 2012 matched to users on demographics, health status, and baseline utilisation. Rates of office visits, patient-initiated phone calls, scheduled telephone visits, after-hours clinic visits, emergency department visits, and hospitalisations. After controlling for multiple factors, no statistically significant differences in utilisation between secure email users and non-users occurred. Utilisation transiently increased by 88-237% around first email use. Annual rates of patient-initiated phone calls decreased among secure email users, 0.2 fewer calls per person (95% CI -0.3 to -0.1), from a mean of 4.1 calls per person 1-12 months before first use to a mean of 3.8 calls per person 7-18 months after first use. Rates of patient-initiated phone calls also decreased among non-users, 0.1 fewer calls per person (95% CI -0.2 to 0.0), from a mean of 4.2 calls per person 1-12 months before the index date to mean of 4.1 calls per person 7-18 months after the index date. Compared with non-users, patient use of secure email with clinicians was not associated with statistically significant differences in clinical services utilisation 7-18 months after first use. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted

  1. Information Systems for University Planning.

    Robinson, Robert J.

    This paper proposes construction of a separate data base environment for university planning information, distinct from data bases and systems supporting operational functioning and management. The data base would receive some of its input from the management information systems (MIS)/transactional data bases and systems through a process of…

  2. EmailTime: visual analytics and statistics for temporal email

    Erfani Joorabchi, Minoo; Yim, Ji-Dong; Shaw, Christopher D.

    2011-01-01

    Although the discovery and analysis of communication patterns in large and complex email datasets are difficult tasks, they can be a valuable source of information. We present EmailTime, a visual analysis tool of email correspondence patterns over the course of time that interactively portrays personal and interpersonal networks using the correspondence in the email dataset. Our approach is to put time as a primary variable of interest, and plot emails along a time line. EmailTime helps email dataset explorers interpret archived messages by providing zooming, panning, filtering and highlighting etc. To support analysis, it also measures and visualizes histograms, graph centrality and frequency on the communication graph that can be induced from the email collection. This paper describes EmailTime's capabilities, along with a large case study with Enron email dataset to explore the behaviors of email users within different organizational positions from January 2000 to December 2001. We defined email behavior as the email activity level of people regarding a series of measured metrics e.g. sent and received emails, numbers of email addresses, etc. These metrics were calculated through EmailTime. Results showed specific patterns in the use email within different organizational positions. We suggest that integrating both statistics and visualizations in order to display information about the email datasets may simplify its evaluation.

  3. Detecting and combating malicious email

    Ryan, Julie JCH

    2014-01-01

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both perso...

  4. Montana University System Fact Book.

    Montana Univ. System, Helena. Office of the Commissioner of Higher Education.

    This report contains numerous figures and tables providing data about the Montana University System. The report is divided into 11 sections, with some preceded by a brief text summary, followed by data tables and figures. Sections cover: (1) total funds, (2) state appropriated funds, (3) funding sources, (4) enrollment, (5) employment, (6) state…

  5. Automated Podcasting System for Universities

    Ypatios Grigoriadis

    2013-03-01

    Full Text Available This paper presents the results achieved at Graz University of Technology (TU Graz in the field of automating the process of recording and publishing university lectures in a very new way. It outlines cornerstones of the development and integration of an automated recording system such as the lecture hall setup, the recording hardware and software architecture as well as the development of a text-based search for the final product by method of indexing video podcasts. Furthermore, the paper takes a look at didactical aspects, evaluations done in this context and future outlook.

  6. Students’ Use of Email and Facebook: A Comparative Perspective

    Rahman, Synthia Bintey

    2013-01-01

    Facebook and email have become widely used communication media to Internet users. University students are a major part of Internet users and they use email and Facebook for multiple communication purposes. This research investigates the context of using Facebook and email by university students, the context of choosing any of the medium in respective communication over the last two years, and student perceptions with regard to Facebook and email as communication media. This study was accompli...

  7. University Program Management Information System

    Gans, Gary (Technical Monitor)

    2004-01-01

    As basic policy, NASA believes that colleges and universities should be encouraged to participate in the nation's space and aeronautics program to the maximum extent practicable. Indeed, universities are considered as partners with government and industry in the nation's aerospace program. NASA's objective is to have them bring their scientific, engineering, and social research competence to bear on aerospace problems and on the broader social, economic, and international implications of NASA's technical and scientific programs. It is expected that, in so doing, universities will strengthen both their research and their educational capabilities to contribute more effectively to the national well being. This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program. This report is consistent with agency accounting records, as the data is obtained from NASA's Financial and Contractual Status (FACS) System, operated by the Financial Management Division and the Procurement Office. However, in accordance with interagency agreements, the orientation differs from that required for financial or procurement purposes. Any apparent discrepancies between this report and other NASA procurement or financial reports stem from the selection criteria for the data.

  8. University Program Management Information System

    2001-01-01

    As basic policy, NASA believes that colleges and universities should be encouraged to participate in the nation's space and aeronautics program to the maximum extent practicable. Indeed, universities are considered as partners with government and industry in the nation's aerospace program. NASA' objective is to have them bring their scientific, engineering, and social research competence to bear on aerospace problems and on the broader social, economic, and international implications of NASA's technical and scientific programs. It is expected that, in so doing, universities will strengthen both their research and their educational capabilities to contribute more effectively to the national well being. This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program. This report is consistent with agency accounting records, as the data is obtained from NASA's Financial and Contractual Status (FACS) System, operated by the Financial Management Division and the Procurement Office. However, in accordance with interagency agreements, the orientation differs from that required for financial or procurement purposes. Any apparent discrepancies between this report and other NASA procurement or financial reports stem from the selection criteria for the data.

  9. Transparent Proxy for Secure E-Mail

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  10. Information Systems in University Learning

    Gheorghe SABAU

    2010-01-01

    Full Text Available The authors of this article are going to bring into light the significance, the place and the role of information systems in the university education process. At the same time they define the objectives and the target group of the subject named Economic Information Systems and state the competence gained by students by studying this subject. Special attention is given to the curriculum to be taught to students and to a suggestive enumeration of a series of economic applications that can be themes for laboratory practice and for students’ dissertation (graduation thesis.

  11. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  12. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  13. Universities Earth System Scientists Program

    Estes, John E.

    1995-01-01

    This document constitutes the final technical report for the National Aeronautics and Space Administration (NASA) Grant NAGW-3172. This grant was instituted to provide for the conduct of research under the Universities Space Research Association's (USRA's) Universities Earth System Scientist Program (UESSP) for the Office of Mission to Planet Earth (OMTPE) at NASA Headquarters. USRA was tasked with the following requirements in support of the Universities Earth System Scientists Programs: (1) Bring to OMTPE fundamental scientific and technical expertise not currently resident at NASA Headquarters covering the broad spectrum of Earth science disciplines; (2) Conduct basic research in order to help establish the state of the science and technological readiness, related to NASA issues and requirements, for the following, near-term, scientific uncertainties, and data/information needs in the areas of global climate change, clouds and radiative balance, sources and sinks of greenhouse gases and the processes that control them, solid earth, oceans, polar ice sheets, land-surface hydrology, ecological dynamics, biological diversity, and sustainable development; (3) Evaluate the scientific state-of-the-field in key selected areas and to assist in the definition of new research thrusts for missions, including those that would incorporate the long-term strategy of the U.S. Global Change Research Program (USGCRP). This will, in part, be accomplished by study and evaluation of the basic science needs of the community as they are used to drive the development and maintenance of a global-scale observing system, the focused research studies, and the implementation of an integrated program of modeling, prediction, and assessment; and (4) Produce specific recommendations and alternative strategies for OMTPE that can serve as a basis for interagency and national and international policy on issues related to Earth sciences.

  14. Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

    De Wang

    2014-05-01

    Full Text Available With the increasing dedication and sophistication of spammers, email spam is a persistent problem even today. Popular social network sites such as Facebook, Twitter, and Google+ are not exempt from email spam as they all interface with email systems. While some report predicts that email spam business is dying due to the decreasing volume of email spam. Whether email spam business is really dying is an interesting question. In this paper, we analyze email spam trends on Spam Archive dataset, which contains 5.5 million spam emails over 15 years (1998 – 2013. We statistically analyze emails contents including header information (e.g. content type and embedded items (e.g. URL links. Also, we investigate topic drift using topic modeling technique. Moreover, we perform network analysis on sender-to-receiver IP routing networks. Our study shows the dynamic nature of email spam over one and a half decades and demonstrate that the email spam business is not dying but more capricious.

  15. Biomass universal district heating systems

    Soltero, Victor Manuel; Rodríguez-Artacho, Salvador; Velázquez, Ramón; Chacartegui, Ricardo

    2017-11-01

    In mild climate regions Directive 27/2012 EU application for developing sustainable district heating networks in consolidated urban nucleus is a challenge. In Spain most of the municipalities above 5,000 inhabitants have a reliable natural gas network and individual heating systems at homes. In this work a new heating network paradigm is proposed, the biomass universal heating network in rural areas. This model involves all the economic, legal and technical aspects and interactions between the different agents of the systems: provider company, individual and collective end-users and local and regional administration. The continental region in Spain has 588 municipalities with a population above 1,500 inhabitants close to forest biomass with renewable use. In many of these cases the regulation identifies the ownership of the forest resources use. The universal heating networks are a great opportunity for energy saving of 2,000 GWh, avoiding 2.7 million tons of CO2 emissions and with a global annual savings for end users of 61.8 million of euros. The presented model is easily extrapolated to other small municipalities in Europe. The real application of the model is presented for three municipalities in different locations of Spain where Universal Heating Networks are under development. The analysis show the interest of the integrated model for the three cases with different structural agents and relationships between them. The use of sustainable forest resources, extracted and managed by local companies, strengths circular economy in the region with a potential global economic impact above 200 M€.

  16. E-mail: Outlook Express

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu layanan Internet yang sangat penting adalah electronic mail atau sering hanya disebut sebagai e-mail. Untuk menggunakan e-mail, diperlukan piranti lunak khusus supaya pengguna dapat mengirim dan menerima e-mail. Jenis piranti lunak e-mail diantaranya adalah Outlook Express yang merupakan satu paket yang didistribusikan bersama Internet Explorer versi 4. Piranti lunak ini dijalankan pada PC yang mempunyai sistem operasi Windows 95 atau 98. Jenis piranti lunak e-mail yang lain adalah Eudora, Pegasus dan sebagainya. Bahkan ada yang diintegrasikan dengan Web Browser (alat untuk menelusuri situs Web misalnya IE,dan Netscape.Sebagai layaknya pelayanan pos, maka setiap pengguna e-mail mempunyai alamat tertentu yang tidak mungkin dipunyai oleh pengguna lainnya diseluruh dunia. Untuk keperluan pendistribusian, maka e-mail mempunyai semacam kantor pos yang ditempatkan dalam sebuah komputer server (mail server atau sering disebut sebagai host. 

  17. Computer Application Systems at the University.

    Bazewicz, Mieczyslaw

    1979-01-01

    The results of the WASC Project at the Technical University of Wroclaw have confirmed the possibility of constructing informatic systems based on the recognized size and specifics of user's needs (needs of the university) and provided some solutions to the problem of collaboration of computer systems at remote universities. (Author/CMV)

  18. New method for assessing risks of email

    Raja, Seyyed H.; Afrooz, Farzad

    2013-03-01

    E-mail technology, has become one of the requirements of human lives for correspondence between individuals. Given this, the important point is that the messages, server and client of e-mail and correspondences that exchanged between different people have acceptable security, to make people sure to use of this technology. In the information age, many of financial and non financial transactions are done electronically, data exchange takes place via the internet and theft and manipulation of data can make exorbitant cost in terms of integrity, financial, political, economic and culture. E-mail correspondence in there is same and it is very important. With review took place, a method that will focus on email system for risks assessment is not provided. We are examining ways of assessing for other systems and their strengths and weaknesses, then we use Mr Convery method for assessing email risks which it is for assessing network risks. At the end of paper we have offered special table for email risk assessment.

  19. Common Knowledge in Email Exchanges

    Sietsma, F.; Apt, K.R.

    We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. This allows us to

  20. Common knowledge in email exchanges

    Sietsma, F.; Apt, K.R.

    2011-01-01

    We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. This allows us to

  1. Mifrenz: Safe email for children

    Tim Hunt

    Full Text Available Products currently available for monitoring children\\'s email usage are either considered to encourage dubious ethical behaviour or are time consuming for parents to administer. This paper describes the development of a new email client application for children called Mifrenz. This new application gives parents the ability to let their children safely use email, with the minimum of intervention. It was developed using mostly free software and also with the desire to provide real first hand programming examples to demonstrate to students.

  2. Troubleshooting Requests e-mail Confirmation

    TS Department

    2004-01-01

    In an ongoing effort to improve quality of the repair requests, a new e-mail confirmation automatic system will be implemented starting from the 21st October. All repair requests transmitted to the TCR (72201) or the FM Helpdesk (77777) will be confirmed in an e-mail to the requestor, provided that the latter has a valid e-mail address in the HR database. The e-mail will contain a reference number, a brief description of the problem, the location and a contact where more information can be obtained. A second e-mail will be sent when the processing of the repair request is finished. We hope that this initiative will improve the transparency and quality of our service. Helpdesk Troubleshooting Requests (reminder) We remind you that all the repair requests and other communication concerning the CERN machine buildings have to be transmitted to the TCR via 72201, whereas the ones concerning tertiary buildings are handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equ...

  3. University Program Management Information System: NASA's University Program Active Projects

    Gans, Gary (Technical Monitor)

    2003-01-01

    As basic policy, NASA believes that colleges and universities should be encouraged to participate in the nation's space and aeronautics program to the maximum extent practicable. Indeed, universities are considered as partners with government and industry in the nation's aerospace program. NASA's objective is to have them bring their scientific, engineering, and social research competence to bear on aerospace problems and on the broader social, economic, and international implications of NASA's technical and scientific programs. It is expected that, in so doing, universities will strengthen both their research and their educational capabilities to contribute more effectively to the national well being. This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program. This report is consistent with agency accounting records, as the data is obtained from NASA's Financial and Contractual Status (FACS) System, operated by the Financial Management Division and the Procurement Office. However, in accordance with interagency agreements, the orientation differs from that required for financial or procurement purposes. Any apparent discrepancies between this report and other NASA procurement or financial reports stem from the selection criteria for the data. This report was prepared by the Office of Education/N.

  4. The Security Email Based on Smart Card

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  5. On the Recommender System for University Library

    Fu, Shunkai; Zhang, Yao; Seinminn

    2013-01-01

    Libraries are important to universities, and they have two primary features: readers as well as collections are highly professional. In this study, based on the experimental study with five millions of users' borrowing records, our discussion covers: (1) the necessity of recommender system for university libraries; (2) collaborative filtering (CF)…

  6. Email Adaptation for Conflict Handling

    Lee, Joyce Yi‐Hui; Panteli, Niki; Bülow, Anne Marie

    2018-01-01

    This paper explores the context of email‐based communication in anestablished but fragile, inter‐organisational partnership, which wasoften overlain with conflict. Drawing upon adaptation theory, thisstudy explores how participants adapt to the use of email to handleconflict. Extensive data were...... obtained during a 6‐month field studyof a case of cross‐border inter‐organisational collaboration in EastAsia. We observed that the individuals involved in the cross‐borderpartnership used email as a lean form of communication to stopcovert conflict from explicitly emerging. In contrast to prior researchon...... the leanness of email in managing conflict, we found that underthe described conflict situation the very leanness of emailwas appreciated and thus, exploited by those concerned tomanage the conflict situation. Specifically, we identified 4 keyconflict‐triggered adaptation strategies, namely...

  7. Entrepreneurial universities in a world educational system

    Iryna Kalenyuk

    2016-12-01

    Full Text Available This article analyzes modern development tendencies of university activities, it proved establishing of a global educational system, which shows increase of university education role, competition escalating and transformation of modern universities functions. It comprehensively studies the process when universities, both traditional and modern – business ones, are extending their functions. The article studied the development of scientists’ beliefs related to the essence and forms of entrepreneurial universities. On a basis of generalization of existing approaches, the authors give definition of the essence of entrepreneurial university as a subject of educational, scientific and other allied activities, which receives financial resources from diversified sources, extends fields of its activities and services. The foundation of the system of extended and main criteria for definition of entrepreneurial universities was laid. The main ones are the following: considerable financial autonomy and receiving of significant funding from non-governmental and diversified sources. Amounts and financial funding structure of the world leading universities were analyzed. It was proved that income from activities, which are allied with the main one (educational activity, increase. The article provides the amounts and the significance of international grants that ensure financial firmness, financial motivation of personnel, upgrades of facilities and resources, initiation and effectiveness of scientific-research activities of universities. Special attention was paid to research of such financial resources of the world leading universities as endowment funds, their scales, features and importance to boost economic capacities of higher education establishments. It was proved that it is important to consider world experience of entrepreneurial universities’ work within development and improving of competitive performance of Ukrainian higher education

  8. Universality in Nonequilibrium Lattice Systems Theoretical Foundations

    Ódor, Géza

    2008-01-01

    Universal scaling behavior is an attractive feature in statistical physics because a wide range of models can be classified purely in terms of their collective behavior due to a diverging correlation length. This book provides a comprehensive overview of dynamical universality classes occurring in nonequilibrium systems defined on regular lattices. The factors determining these diverse universality classes have yet to be fully understood, but the book attempts to summarize our present knowledge, taking them into account systematically.The book helps the reader to navigate in the zoo of basic m

  9. Analysis of technical university information system

    Savelyev, N. A.; Boyarkin, M. A.

    2018-05-01

    The paper covers a set and interaction of the existing higher education institution automated control systems in φ state budgetary educational institution of higher professional education "Industrial University of Tyumen ". A structural interaction of the existing systems and their functions has been analyzed which has become a basis for identification of a number of system-related and local (related to separate modules) drawbacks of the university activities automation. The authors suggested a new structure of the automated control system, consisting of three major subsystems: management support; training and methodology support; distance and supplementary education support. Functionality for each subsystem has been defined in accordance with the educational institution automation requirements. The suggested structure of the ACS will solve the challenges facing the university during reorganization and optimization of the processes of management of the institution activities as a whole.

  10. Hong Kong's Cross-System University Partnerships

    Postiglione, Gerard A.; Yunyun, Qin; Te, Alice Y. C.

    2016-01-01

    The authors examine the special case of Hong Kong higher education's institutional partnerships in the Chinese mainland. After noting the rise of cross-system university partnership in Asia, it provides a neoinstitutional perspective on the differences between the two China higher education systems. Finally, a case study of the experience of the…

  11. ENGINEERING OF UNIVERSITY INTELLIGENT LEARNING SYSTEMS

    Vasiliy M. Trembach

    2016-01-01

    Full Text Available In the article issues of engineering intelligent tutoring systems of University with adaptation are considered. The article also dwells on some modern approaches to engineering of information systems. It shows the role of engineering e-learning devices (systems in system engineering. The article describes the basic principles of system engineering and these principles are expanded regarding to intelligent information systems. The structure of intelligent learning systems with adaptation of the individual learning environments based on services is represented in the article.

  12. NASA University Program Management Information System

    1999-01-01

    As basic policy, NASA believes that colleges and universities should be encouraged to participate in the nation's space and aeronautics program to the maximum extent practicable. Indeed, universities are considered as partners with government and industry in the nation's aerospace program. NASA's objective is to have them bring their scientific, engineering, and social research competence to bear on aerospace problems and on the broader social, economic, and international implications of NASA's technical and scientific programs. It is expected that, in so doing, universities will strengthen both their research and their educational capabilities to contribute more effectively to the national well-being. NASA field codes and certain Headquarters program offices provide funds for those activities in universities which contribute to the mission needs of that particular NASA element. Although NASA has no predetermined amount of money to devote to university activities, the effort funded each year is substantial. (See the bar chart on the next page). This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program. This report is consistent with agency accounting records, as the data is obtained from NASA's Financial and Contractual Status (FACS) System, operated by the Financial Management Division and the Procurement Office. However, in accordance with interagency agreements, the orientation differs from that required for financial or procurement purposes. Any apparent discrepancies between this report and other NASA procurement or financial reports stem from the selection criteria for the data.

  13. Nursing scholarship within the British university system.

    Ramcharan, P; Ashmore, R; Nicklin, L; Drew, J

    This article is a review of how a school of nursing and midwifery might promote scholarship within the university system. It is argued that the emphasis on research in universities has undermined the importance of scholarship within education and practice. The difficulties of recognizing scholarly processes as opposed to products such as publications is outlined in relation to three areas of potential scholarship within nurse education, i.e. research, teaching and practice. Issues are raised about how scholarship might be promoted in these three areas in practical terms. It is argued that systems of recognition and reward should be equitably distributed between these wide areas of potential scholarship. This will mean universities accommodating different models of scholarship and nurses recognizing their responsibility to contribute to scholarly activity.

  14. Sistema Automatizado de Emailing Marketing

    Martínez López, Javier

    2010-01-01

    Projecte final de carrera realitzat en col.laboració amb E-xpertel S.A El presente proyecto describe el diseño e implementación de un sistema de automatización de campañas de marketing a través de email hacia clientes y/o clientes potenciales. Este sistema tiene como objetivos principales adquirir nuevos clientes y conseguir la delización de los mismos. El sistema se complementa con una plataforma CRM (Customer Relationship Management) para el mantenimiento de datos de empresa...

  15. Universal formats for nonlinear ordinary differential systems

    Kerner, E.H.

    1981-01-01

    It is shown that very general nonlinear ordinary differential systems (embracing all that arise in practice) may, first, be brought down to polynomial systems (where the nonlinearities occur only as polynomials in the dependent variables) by introducing suitable new variables into the original system; second, that polynomial systems are reducible to ''Riccati systems,'' where the nonlinearities are quadratic at most; third, that Riccati systems may be brought to elemental universal formats containing purely quadratic terms with simple arrays of coefficients that are all zero or unity. The elemental systems have representations as novel types of matrix Riccati equations. Different starting systems and their associated Riccati systems differ from one another, at the final elemental level, in order and in initial data, but not in format

  16. Is our universe an open system?

    Page, D.N.

    1983-01-01

    The author gives a brief summary of the arguments which might indicate the universe to be an open system. The arguments concern the formation and evaporation of black holes and the asymptotic completeness or incompleteness of the Hilbert space of quantum gravity. (Auth.)

  17. NASA University Program Management Information System

    2000-01-01

    As basic policy, NASA believes that colleges and universities should be encouraged to participate in the nation's space and aeronautics program to the maximum extent practicable. Indeed, universities are considered as partners with government and industry in the nation's aerospace program. NASA:s objective is to have them bring their scientific, engineering, and social research competence to bear on aerospace problems and on the broader social, economic, and international implications of NASA's technical and scientific programs. It is expected that, in so doing, universities will strengthen both their research and their educational capabilities to contribute more effectively to the national well-being. NASA field codes and certain Headquarters program offices provide funds for those activities in universities which contribute to the mission needs of that particular NASA element. Although NASA has no predetermined amount of money to devote to university activities, the effort funded each year is substantial. This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program. This report is consistent with agency accounting records, as the data is obtained from NASA:s Financial and Contractual Status (FACS) System, operated by the Financial Management Division and the Procurement Office. However, in accordance with interagency agreements, the orientation differs from that required for financial or procurement purposes. Any apparent discrepancies between this report and other NASA procurement or financial reports stem from the selection criteria for the data.* This report was prepared by the Education Division/FE, Office of Human Resources and Education, using a management information system which was modernized during FY 1993.

  18. Clustering and classification of email contents

    Izzat Alsmadi

    2015-01-01

    Full Text Available Information users depend heavily on emails’ system as one of the major sources of communication. Its importance and usage are continuously growing despite the evolution of mobile applications, social networks, etc. Emails are used on both the personal and professional levels. They can be considered as official documents in communication among users. Emails’ data mining and analysis can be conducted for several purposes such as: Spam detection and classification, subject classification, etc. In this paper, a large set of personal emails is used for the purpose of folder and subject classifications. Algorithms are developed to perform clustering and classification for this large text collection. Classification based on NGram is shown to be the best for such large text collection especially as text is Bi-language (i.e. with English and Arabic content.

  19. The Importance of Etiquette in School Email

    Filippone, Monica; Survinski, Melissa

    2016-01-01

    This article investigates the appropriate use of email among secondary and postsecondary students and instructors and provides recommendations for proper email etiquette. A review of the current literature shows that poor email etiquette can impact the working relationship between teachers and students. Evidence indicates that email etiquette must…

  20. Universal behavior of strongly correlated Fermi systems

    Shaginyan, Vasilii R [B.P. Konstantinov St. Petersburg Institute of Nuclear Physics, Russian Academy of Sciences, Gatchina, Leningrad region, Rusian Federation (Russian Federation); Amusia, M Ya [A.F. Ioffe Physico-Technical Institute, Russian Academy of Sciences, St. Petersburg (Russian Federation); Popov, Konstantin G [Komi Scientific Center, Ural Branch of the Russian Academy of Sciences, Syktyvkar (Russian Federation)

    2007-06-30

    This review discusses the construction of a theory and the analysis of phenomena occurring in strongly correlated Fermi systems such as high-T{sub c} superconductors, heavy-fermion metals, and quasi-two-dimensional Fermi systems. It is shown that the basic properties and the universal behavior of strongly correlated Fermi systems can be described in the framework of the Fermi-condensate quantum phase transition and the well-known Landau paradigm of quasiparticles and the order parameter. The concept of fermion condensation may be fruitful in studying neutron stars, finite Fermi systems, ultra-cold gases in traps, and quark plasma. (reviews of topical problems)

  1. Universal behavior of strongly correlated Fermi systems

    Shaginyan, Vasilii R; Amusia, M Ya; Popov, Konstantin G

    2007-01-01

    This review discusses the construction of a theory and the analysis of phenomena occurring in strongly correlated Fermi systems such as high-T c superconductors, heavy-fermion metals, and quasi-two-dimensional Fermi systems. It is shown that the basic properties and the universal behavior of strongly correlated Fermi systems can be described in the framework of the Fermi-condensate quantum phase transition and the well-known Landau paradigm of quasiparticles and the order parameter. The concept of fermion condensation may be fruitful in studying neutron stars, finite Fermi systems, ultra-cold gases in traps, and quark plasma. (reviews of topical problems)

  2. E-Mail at Work: Is it Really Private?

    Rosenblum, Cindy

    This paper examines the controversy of e-mail privacy in the workplace. Once an employee uses an e-mail system that belongs to the employer, according to recent case law, their privacy rights are forfeited. Employers will now have to start creating policies to safeguard themselves from expensive litigation, and employees will have to be more…

  3. Email-Set Visualization: Facilitating Re-Finding in Email Archives

    Gorton, Douglas; Murthy, Uma; Vemuri, Naga Srinivas; Pérez-Quiñones, Manuel A.

    2007-01-01

    In this paper we describe ESVT – EmailSet Visualization Tool, an email archive tool that provides users a visualization to re-find and discover information in their email archive. ESVT is an end-to-end email archive tool that can be used from archiving a user’s email messages to visualizing queries on the email archive. We address email archiving by allowing import of email messages from an email server or from a standard existing email client. The central idea in ESVT’s visualization, an “em...

  4. Global Peace through the Global University System

    Cengiz Hakan AYDIN

    2006-01-01

    Full Text Available Utopia is defined in Encarta Dictionary as “an ideal and perfect place or state, where everyone lives in harmony and everything is for the best.” Developments all around the world especially in the last decade have supported the idea that global peace is nothing but just a utopian dream. However, for centuries a group of believers have always been in search of global peace via different means. This book, titled as “Global Peace through the Global University System”, can be considered as one of the artifacts of this search.Actually this book is a collection of papers presented in working conference on the Global University System (GUS hosted by the University of Tampere, Finland in 1999. The main goal of the conference was bringing international experts to share their philosophy, past and present experiences about the GUS. The conference was held by the University of Tampere because UNESCO has an agreement with the University to establish the UNESCOChair in Global e-Learning.

  5. Who sends the email? Using electronic surveys in violence research.

    Sutherland, Melissa A; Amar, Angela F; Laughon, Kathryn

    2013-08-01

    Students aged 16-24 years are at greatest risk for interpersonal violence and the resulting short and long-term health consequences. Electronic survey methodology is well suited for research related to interpersonal violence. Yet methodological questions remain about best practices in using electronic surveys. While researchers often indicate that potential participants receive multiple emails as reminders to complete the survey, little mention is made of the sender of the recruitment email. The purpose of this analysis is to describe the response rates from three violence-focused research studies when the recruitment emails are sent from a campus office, researcher or survey sampling firm. Three violence-focused studies were conducted about interpersonal violence among college students in the United States. Seven universities and a survey sampling firm were used to recruit potential participants to complete an electronic survey. The sender of the recruitment emails varied within and across the each of the studies depending on institutional review boards and university protocols. An overall response rate of 30% was noted for the 3 studies. Universities in which researcher-initiated recruitment emails were used had higher response rates compared to universities where campus officials sent the recruitment emails. Researchers found lower response rates to electronic surveys at Historically Black Colleges or Universities and that other methods were needed to improve response rates. The sender of recruitment emails for electronic surveys may be an important factor in response rates for violence-focused research. For researchers identification of best practices for survey methodology is needed to promote accurate disclosure and increase response rates.

  6. Who Sends the Email? Using Electronic Surveys in Violence Research

    Melissa A Sutherland

    2013-08-01

    Full Text Available Introduction: Students aged 16–24 years are at greatest risk for interpersonal violence and the resulting short and long-term health consequences. Electronic survey methodology is well suited for research related to interpersonal violence. Yet methodological questions remain about best practices in using electronic surveys. While researchers often indicate that potential participants receive multiple emails as reminders to complete the survey, little mention is made of the sender of the recruitment email. The purpose of this analysis is to describe the response rates from three violence-focused research studies when the recruitment emails are sent from a campus office, researcher or survey sampling firm. Methods: Three violence-focused studies were conducted about interpersonal violence among college students in the United States. Seven universities and a survey sampling firm were used to recruit potential participants to complete an electronic survey. The sender of the recruitment emails varied within and across the each of the studies depending on institutional review boards and university protocols.Results: An overall response rate of 30% was noted for the 3 studies. Universities in which researcher initiated recruitment emails were used had higher response rates compared to universities where campus officials sent the recruitment emails. Researchers found lower response rates to electronic surveys at Historically Black Colleges or Universities and that other methods were needed to improve response rates.Conclusion: The sender of recruitment emails for electronic surveys may be an important factor in response rates for violence-focused research. For researchers identification of best practices for survey methodology is needed to promote accurate disclosure and increase response rates. [West J Emerg Med. 2013;14(4:363–369.

  7. UNIVERSAL INTERFACE TO MULTIPLE OPERATIONS SYSTEMS

    Sonnenwald, Diane H.

    1986-01-01

    Alternative ways to provide access to operations systems that maintain, test, and configure complex telephone networks are being explored. It is suggested that a universal interface that provides simultaneous access to multiple operations systems that execute in different hardware and software...... environments, can be provided by an architecture that is based on the separation of presentation issues from application issues and on a modular interface management system that consists of a virtual user interface, physical user interface, and interface agent. The interface functionality that is needed...

  8. Groundwork for Universal Canister System Development

    Price, Laura L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gross, Mike [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Prouty, Jeralyn L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rigali, Mark J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Craig, Brian [Argonne National Lab. (ANL), Argonne, IL (United States); Han, Zenghu [Argonne National Lab. (ANL), Argonne, IL (United States); Lee, John Hok [Argonne National Lab. (ANL), Argonne, IL (United States); Liu, Yung [Argonne National Lab. (ANL), Argonne, IL (United States); Pope, Ron [Argonne National Lab. (ANL), Argonne, IL (United States); Connolly, Kevin [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Feldman, Matt [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Jarrell, Josh [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Radulescu, Georgeta [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Scaglione, John [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Wells, Alan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-09-01

    The mission of the United States Department of Energy's Office of Environmental Management is to complete the safe cleanup of the environmental legacy brought about from five decades of nuclear weapons development and go vernment - sponsored nuclear energy re search. S ome of the waste s that that must be managed have be en identified as good candidates for disposal in a deep borehole in crystalline rock (SNL 2014 a). In particular, wastes that can be disposed of in a small package are good candidates for this disposal concept. A canister - based system that can be used for handling these wastes during the disposition process (i.e., storage, transfers, transportation, and disposal) could facilitate the eventual disposal of these wastes. This report provides information for a program plan for developing specifications regarding a canister - based system that facilitates small waste form packaging and disposal and that is integrated with the overall efforts of the DOE's Office of Nuclear Energy Used Fuel Dis position Camp aign's Deep Borehole Field Test . Groundwork for Universal Ca nister System Development September 2015 ii W astes to be considered as candidates for the universal canister system include capsules containing cesium and strontium currently stored in pools at the Hanford Site, cesium to be processed using elutable or nonelutable resins at the Hanford Site, and calcine waste from Idaho National Laboratory. The initial emphasis will be on disposal of the cesium and strontium capsules in a deep borehole that has been drilled into crystalline rock. Specifications for a universal canister system are derived from operational, performance, and regulatory requirements for storage, transfers, transportation, and disposal of radioactive waste. Agreements between the Department of Energy and the States of Washington and Idaho, as well as the Deep Borehole Field Test plan provide schedule requirements for development of the universal canister system

  9. ACADEMIC INTEGRITY SUPPORT SYSTEM FOR UKRAINIAN UNIVERSITIES

    V. G. Sherstjuk

    2017-04-01

    Full Text Available Purpose. Developing the methodology for providing academic integrity in the university. The methodology is based on Web-oriented academic integrity support system, developed by the authors, which enters into the information system of learning process control. Academic integrity support system is aimed at maintaining academic integrity as a basic institutional value, which will help to reduce corruption, plagiarism and other types of academic dishonesty. Methodology. The methodology of problem to solve is based on the development of the information system of education process control with the integral elements of quality control. The information subsystem of academic integrity support is its basic part. Findings. The proposed information system allows us to fulfill the following levels: educational process monitoring; audit of internal processes, which is necessary for developing the effective quality control system; assessment of achievements of educational process participants; formalization of the interaction of educational process participants. The system is aimed at the development of new academic society based on the following principles: open access to the information, at which the access of wide audience to the information provides participation, forming the sense of responsibility and social control; transparency of the information, by which its relevance, quality, reliability are meant; responsibility of all members of educational process; measurability, at which any action in educational process should be measured; detail of describing the actions, results and processes; support, which is meant by automatic tools of the realization of the principles of open access to the information, transparency of the information, responsibility of all participants of educational process, measurability, detail, support. The practical realization of information system is based on the development of a common repository of university information. The

  10. Perancangan Email Client Dengan Pengklasifikasian Email Menggunakan Algoritma Vector Space Model

    Christian, Moses

    2015-01-01

    On today's age of technology, widely used email to send information throughout the world. During the classification of the email is still done manually and less objective. So in this study, the authors apply the method of Vector Space Model (VSM) to make an automatic email classification and more objective. With this method of email classification can be done automatically based on address, subject, and body of an email that allows users to email in the organization of every incoming email in...

  11. Information Systems in Western Australian Universities

    Craig Standing

    2006-11-01

    Full Text Available Systems (IS teaching and research within Western Australia (WA. A brief overview of the WA environment is followed by an exploration of teaching and research in the four main Universities. This is examined against the framework for the study and, in particular, the impact of social processes (Ariav et al, 1987; Klein et al, 1991 and local contingencies (Culnan et al, 1993; Checkland and Howell, 1998, which are found to be of relevance to historic developments.

  12. INFORMATION-ANALYTICAL LEARNING MANAGEMENT SYSTEM UNIVERSITIES

    Yu. Tryus

    2016-12-01

    Full Text Available We consider conceptual approaches to creation of information systems, learning management school, which uses modern methods of decision-making and simulational modeling, web-technologies. The main criteria for the selection of development tools of the system are: openness, free of charge, easy to use and independence from system software and hardware. The chosen technology and the system itself satisfies such requirements as: focus on national and international standards in the field of higher education, adherence to service-oriented architecture, ensuring stable operation with a large number of users, support for a clear division of user rights to obtain and change information resources, software modularity the final product and its ability to integrate into the corporate information system of the university

  13. Making Nuclear Malaysia Email Archives Portable

    Shaharum Ramli

    2013-01-01

    Nuclear Malaysia e-mails can be accessed from any computer and anywhere, even worldwide, via web access. However, this mobility is lost when the e-mails are moved to a personal computer into archive files such as Microsoft Outlook data files. Outlook e-mail archives can only be read on the computer where it is stored. This removal has to be done because of storage space constraints on the e-mail server. This paper shows how e-mail archives can be made portable, brought and read anywhere using a free portable e-mail client application such as Mozilla Thunderbird, Portable Edition. (author)

  14. Conversation Threads Hidden within Email Server Logs

    Palus, Sebastian; Kazienko, Przemysław

    Email server logs contain records of all email Exchange through this server. Often we would like to analyze those emails not separately but in conversation thread, especially when we need to analyze social network extracted from those email logs. Unfortunately each mail is in different record and those record are not tided to each other in any obvious way. In this paper method for discussion threads extraction was proposed together with experiments on two different data sets - Enron and WrUT..

  15. Analysis of E-mail Transactions in Virtual Reference Services

    Astutik Nur Qomariyah

    2016-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (ref-desk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  16. Understanding email communication of persons with aphasia

    Al Mahmud, A.; Martens, J.B.O.S.

    2011-01-01

    An email program has been developed by the Aphasia Union Netherlands (AVN) to enhance communication between aphasics mutually and with their therapists. In this paper we report intermediate evaluation results of the AVN email program. We evaluated the email program in two ways: a. by analyzing the

  17. Universal blind quantum computation for hybrid system

    Huang, He-Liang; Bao, Wan-Su; Li, Tan; Li, Feng-Guang; Fu, Xiang-Qun; Zhang, Shuo; Zhang, Hai-Long; Wang, Xiang

    2017-08-01

    As progress on the development of building quantum computer continues to advance, first-generation practical quantum computers will be available for ordinary users in the cloud style similar to IBM's Quantum Experience nowadays. Clients can remotely access the quantum servers using some simple devices. In such a situation, it is of prime importance to keep the security of the client's information. Blind quantum computation protocols enable a client with limited quantum technology to delegate her quantum computation to a quantum server without leaking any privacy. To date, blind quantum computation has been considered only for an individual quantum system. However, practical universal quantum computer is likely to be a hybrid system. Here, we take the first step to construct a framework of blind quantum computation for the hybrid system, which provides a more feasible way for scalable blind quantum computation.

  18. Email and Epistolary technologies: Presence, Intimacy, Disembodiment

    Esther Milne

    2003-01-01

    Full Text Available A key problem for critical media practice is how to assess accurately the technological impact, historical significance and cultural consequences of a particular change in a communications system. Contemporary theorising about the impact of electronic, digitally networked culture is often articulated within an eschatological narrative of apocalypse and last things. The old is cast as naive and redundant while the new appears triumphant, conquering and redemptive. Washing away the sins of the old, the new technology arrives, it seems, out of nowhere. In response to such socio-technological representations, this paper argues that the dialectic between old and new communication systems is more complex than has been assumed by contemporary media theory. Rather than a narrative of radical changes, decisive shifts and abrupt breaks, the relation between epistolary and email technology reveals certain continuities. Specifically, tropes of presence and intimacy are traced through three media sites: a "virtual community" of British nineteenth-century letter writers, the postcard correspondence of an Australian First World War soldier and a twenty first century email discussion list. Mapping these sites reveals a central paradox of technological and discursive cultural practice, namely, that material signifiers can be used to produce incorporeal presence.

  19. Detection of Illegitimate Emails using Boosting Algorithm

    Nizamani, Sarwat; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    and spam email detection. For our desired task, we have applied a boosting technique. With the use of boosting we can achieve high accuracy of traditional classification algorithms. When using boosting one has to choose a suitable weak learner as well as the number of boosting iterations. In this paper, we......In this paper, we report on experiments to detect illegitimate emails using boosting algorithm. We call an email illegitimate if it is not useful for the receiver or for the society. We have divided the problem into two major areas of illegitimate email detection: suspicious email detection...

  20. Intelligent tutoring system of the university department

    A. S. Aleshchenko

    2016-01-01

    Full Text Available The aim of the research is intelligent tutoring system for planning and development of individual learning programs for students. One of the important components of modern training programs is the individual practice programs that are formed from the first course and built up in the process of learning in the subsequent courses. Each individual practice program is formed on the basis of the Working program of practice for a specific group. At later practice stages planning and adjustment of the individual program are worked out for a particular student.The agent-oriented approach for the planning of individual learning programs is used for the formation of individual practice program. Agents of the intelligent learning systems are created according to the requirements of service-oriented architecture. To apply knowledge there used an integrated approach to represent knowledge.As a result of research, the authors propose the architecture of intelligent educational systems of the University Department, using the repository of learning objects, telecommunication systems and such agents as: the learner, the assessment of the student’s knowledge, the formation of individual programs for learning, the personal learning environment, the methodical support, the businesses. The authors demonstrate the possibility for the formation of individual practice programs using an agent of the methodical support.Application of the approaches and technologies which were considered in the article will allow to solve problems of the formation of individual practice programs. The use of such applications will extend the possibilities of intelligent tutoring systems of the University departments.

  1. Email medication counseling services provided by Finnish community pharmacies.

    Pohjanoksa-Mäntylä, Marika K; Kulovaara, Heidi; Bell, J Simon; Enäkoski, Marianne; Airaksinen, Marja S

    2008-12-01

    The importance of email as a mode of communication between medication users and pharmacists is likely to increase. However, little is known about the email medication counseling practices of community pharmacies. To determine the prevalence of email medication counseling services in Finland and to assess the accuracy and comprehensiveness of responses by pharmacies providing the opportunity for email medication counseling to inquiries related to use of antidepressants. An inventory was made of all Finnish community pharmacies that provided the opportunity for email medication counseling. Data related to the accuracy and comprehensiveness of responses were collected, using a virtual pseudo-customer method with 3 scenarios related to common concerns of patients on antidepressants. Two inquiries were emailed to each pharmacy that provided the opportunity for email medication counseling in January and February 2005. The responses were content analyzed by 2 researchers, using a prestructured scoring system. Almost one-third (30%, n = 182) of Finnish community pharmacies maintained a working Web site, and 94% of those provided the opportunity for email medication counseling. An online "ask-the-pharmacist" service was offered by 13% (n = 23) of the pharmacies with a Web site. Pharmacies responded to 54% of the email inquiries sent by the virtual pseudo-customers. The response rate and the content score ratio between mean and maximum scores varied among the scenarios. The content score ratio was highest for the scenarios concerning the adverse effects of fluoxetine (0.53, n = 55) and interactions with mirtazapine (0.52, n = 63) and lowest for the scenario related to sexual dysfunction and weight gain associated with citalopram (0.38, n = 52). Community pharmacies are potential providers of email medication counseling services. However, more attention should be directed to responding to consumer inquiries and to the content of these responses.

  2. On Successful E-Mail Writing

    Vesna Vulić

    2009-12-01

    Full Text Available This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette or ‘Netiquette’ and it is therefore important that whether it be for business or private use, the basics of e-mail etiquette are followed. When writing an e-mail it is important to consider the recipient. Careful consideration will determine the content and style of the e-mail. No less important is knowing the points of detail in writing e-mail. That is, to be clear and concise in the specific information that the e-mail should contain. Furthermore, abbreviations, acronyms and emoticons are frequently found in e-mail and their use should also be considered. An e-mail is a valuable communication tool and it is essential to use it effectively in order to improve both professional and private communication.

  3. Changing a Course of Action: Teachers' E-mail Discussion.

    Serafin, Ana Gil

    This study examined the e-mail interactions of teachers who were graduate students in an educational leadership program at a commuter university. Participants attended a 3-hour-per-week course. The instructor inserted into the course syllabus an assessment plan that required computer use, making the students responsible for accessing the…

  4. The use of VB.NET in the business daily e-mail System%VB.NET在经营日报邮件系统中的应用

    陈中

    2011-01-01

    The use of Visual Studio. NET 2003 technology development business daily e-mail system, to achieve the basic operating conditions of the daily data, key indicators and results of the audit, according tO different business needs analysis produced several reports by email daily sent to business leaders and department heads so that they can be the first time to understand the business situation, according to formulate policy responses to market changes. This principle of the system development, system features and design are introduced.%利用Visual Studio.NET 2003技术开发的经营日报邮件系统,实现了将每目的经营状况基本数据、关键指标和稽核结果,按照不同业务部门各种需求分析制作成多个报表,通过邮件方式每日发送给企业领导及部门负责人,让他们能在第一时间了解企业经营现状,根据市场变化制定应对政策。本文对该系统的开发原理、系统的功能特最和设计方案进行了介绍。

  5. Organizational Behavior Analysis Focusing on the University of Texas System

    Terry, Bobby K.

    2011-01-01

    This project analyzes the organizational behavior of the University of Texas System. The University of Texas System is comprised of nine academic and six health institutions. The University of Texas System has over 85,000 employees; the student enrollment is 202,240 with a budget of $2.25 billion dollars. This project has a total of four parts and…

  6. Data Leakage Prevention: E-Mail Protection via Gateway

    Kaur, Kamaljeet; Gupta, Ishu; Singh, Ashutosh Kumar

    2018-01-01

    Protection of digital assets and intellectual property is becoming a challenge for most of the companies. Due to increasing availability of database services on internet, data may be insecure after passing through precarious networks. To protect intellectual property (IP) is a major concern for today's organizations, because a leakage that compromises IP means, sensitive information of a company is in the hands of biggest competitors. Electronic information processing and communication is replacing paper in many applications increasingly. Instead of paper, an email is being used for communication at workplace and from social media logins to bank accounts. Nowadays an email is becoming a mainstream business tool. An email can be misused to leave company’s sensitive data open to compromise. So, it may be of little surprise that attacks on emails are common. So, here we need an email protection system (EPS) that will protect information to leave organization via mail. In this paper, we developed an algorithm that will offer email protection via gateway during data transfer. This algorithm matches the patterns with the keywords stored in the database and then takes the actions accordingly to protect the data. This paper describes why email protection is important? How companies can protect their confidential information from being leaked by insiders.

  7. Assessing e-mail intent and tasks in e-mail messages

    Sappelli, M.; Pasi, G.; Verberne, S.; Boer, M. de; Kraaij, W.

    2016-01-01

    In this paper, we analyze corporate e-mail messages as a medium to convey work tasks. Research indicates that categorization of e-mail could alleviate the common problem of information overload. Although e-mail clients provide possibilities of e-mail categorization, not many users spend effort on

  8. Using Insights from Email Users to Inform Organisational Email Management Policy

    Ramsay, Judith; Renaud, Karen

    2012-01-01

    One would expect email substantially to increase organisational productivity and efficiency. There is little empirical evidence of this since email use is such a complex tool that it would be well nigh impossible to attribute efficiency increases solely to email. There is anecdotal evidence of the positive aspects of email (Phillips, S.R. and…

  9. Enter your email-address: how German internet users manage their email addresses

    Utz, S.

    2004-01-01

    Writing E-mail is the most popular Internet activity. Meanwhile, many people have more than one E-mail address. The question how people manage their E-mail addresses, more specifically, whether they use them deliberately for different purposes, is the central question of this paper. E-mail addresses

  10. Analysis of E-mail Transactions in Virtual Reference Services

    Astutik Nur Qomariyah

    2018-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (refdesk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  11. Theoretical Approaches on Successful Email Marketing Campaigns

    Camelia Budac

    2016-01-01

    This paper aims to bring some clarifications on what could bring success to email marketingcampaigns. Responses are related to how sent emails can draw the attention of people (ie how theycan be observed, given that, users’ inboxes are invaded by messages of all kinds, how to measurethe results of a campaign and which are the best practices through which we can get higher returnsfrom email marketing campaigns.

  12. On Successful E-Mail Writing

    Vesna Vulić

    2009-01-01

    This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette o...

  13. Development of a Universal Waste Management System

    Stapleton, Thomas J.; Baccus, Shelley; Broyan, James L., Jr.

    2013-01-01

    NASA is working with a number of commercial companies to develop the next low Earth orbit spacecraft. The hardware volume and weight constraints are similar to or greater than those of the Apollo era. This, coupled with the equally demanding cost challenge of the proposed commercial vehicles, causes much of the Environmental Control and Life Support System (ECLSS) designs to be reconsidered. The Waste Collection System (WCS) is within this group of ECLSS hardware. The development to support this new initiative is discussed within. A WCS concept - intended to be common for all the vehicle platforms currently on the drawing board - is being developed. The new concept, referred to as the Universal Waste Management System (UWMS), includes favorable features from previous designs while improving on other areas on previous Space Shuttle and the existing International Space Station (ISS) WCS hardware, as needed. The intent is to build a commode that requires less crew time, improved cleanliness, and a 75% reduction in volume and weight compared to the previous US ISS/Extended Duration Orbitor WCS developed in the 1990s. The UWMS is most similar to the ISS Development Test Objective (DTO) WCS design. It is understood that the most dramatic cost reduction opportunity occurs at the beginning of the design process. To realize this opportunity, the cost of each similar component between the UWMS and the DTO WCS was determined. The comparison outlined were the design changes that would result with the greatest impact. The changes resulted in simplifying the approach or eliminating components completely. This initial UWMS paper will describe the system layout approach and a few key features of major components. Future papers will describe the UWMS functionality, test results, and components as they are developed.

  14. End of Interactive Emailing from the Technical Network

    2006-01-01

    According to the CNIC Security Policy for Control Systems (EDMS #584092), interactive emailing on PCs (and other devices) connected to the Technical Network is prohibited. Please note that from November 6th, neither reading emails nor sending emails interactively using e.g. Outlook or Pine mail clients on PCs connected to the Technical Network will be possible anymore. However, automatically generated emails will not be blocked and can still be sent off using CERNMX.CERN.CH as mail server. These restrictions DO NOT apply to PCs connected to any other network, like the General Purpose (or office) network. If you have questions, please do not hesitate to contact Uwe Epting, Pierre Charrue or Stefan Lueders (Technical-Network.Administrator@cern.ch). Your CNIC Working Group

  15. SCT module testing system at Charles University in Prague

    Broklova, Z; Dolezal, Z; Kodys, P; Kubik, P; Reznicek, P

    2003-01-01

    Detector control system (DCS) is built up to ensure adequate environment conditions during mass testing of silicon strip modules for ATLAS Inner Detector. DCS protects modules against damage and simplifies the whole testing procedure as well. In the automatic mode, the system measures several environmental parameters and checks them. In case of accident or unexpected situation, it alerts operator of the system (for example via email). It can safely stop all testing. The system also contains components for remote observation plus control of the testing status.

  16. MedlinePlus Connect: Email List

    ... MedlinePlus Connect → Email List URL of this page: https://medlineplus.gov/connect/emaillist.html MedlinePlus Connect: Email ... will change.) Old URLs New URLs Web Application https://apps.nlm.nih.gov/medlineplus/services/mpconnect.cfm? ...

  17. Wireless GPS fleet tracking system at the University of Albany.

    2014-07-01

    This report provides an overview of the project undertaken at the University at Albany to make alternative transportation a more : viable option by implementing a GPS Tracking System on the University bus fleet and broadcasting the bus locations to c...

  18. CEAI: CCM based Email Authorship Identification Model

    Nizamani, Sarwat; Memon, Nasrullah

    2013-01-01

    In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some...... more interesting and effective features for email authorship identification (e.g. the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell). We also included Info Gain feature selection based...... reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM)-based models, as well as the models proposed by Iqbal et al. [1, 2]. The proposed model attains an accuracy rate of 94% for 10...

  19. Information system governance in Moroccan universities: case of ...

    Information system governance in Moroccan universities: case of student ... contribution of these systems to the overall performance of an organizational being. ... Keywords: Information System; Governance; Data Quality, Process Quality ...

  20. Did You Get My E-Mail? Moving E-Mails beyond the Inbox

    Ellis, Susan J.

    2011-01-01

    The challenge today is how to make e-mail and other forms of electronic communication effective in motivating volunteer action. Is it possible to make e-mails feel personal and welcoming? E-mail, instant messaging, texting, and social media are tools that allow individuals to communicate quickly and inexpensively, but they are lifeless without the…

  1. Improving University Ranking to Achieve University Competitiveness by Management Information System

    Dachyar, M.; Dewi, F.

    2015-05-01

    One way to increase university competitiveness is through information system management. A literature review was done to find information system factors that affect university performance in Quacquarelli Symonds (QS) University Ranking: Asia evaluation. Information system factors were then eliminated using Delphi method through consensus of 7 experts. Result from Delphi method was used as measured variables in PLS-SEM. Estimation with PLS-SEM method through 72 respondents shows that the latent variable academic reputation and citation per paper have significant correlation to university competitiveness. In University of Indonesia (UI) the priority to increase university competitiveness as follow: (i) network building in international conference, (ii) availability of research data to public, (iii) international conference information, (iv) information on achievements and accreditations of each major, (v) ease of employment for alumni.

  2. Application for automatic e-mail forwarding

    Skupek, Rok

    2010-01-01

    The diploma thesis has two main goals: the first objective is to develop a dynamic library, which will contain methods able to download e-mail messages from mail server using POP3 protocol. The second objective involves development of application for processing and distribution of e-mail messages. Introduction cointains presentation of a practical application example in real time situation. Here are described procedures used for development of server - client communication library, which u...

  3. Etiquette for medical students' email communication with faculty members: a single-institution study.

    Kim, Do-Hwan; Yoon, Hyun Bae; Yoo, Dong-Mi; Lee, Sang-Min; Jung, Hee-Yeon; Kim, Seog Ju; Shin, Jwa-Seop; Lee, Seunghee; Yim, Jae-Joon

    2016-04-27

    Email is widely used as a means of communication between faculty members and students in medical education because of its practical and educational advantages. However, because of the distinctive nature of medical education, students' inappropriate email etiquette may adversely affect their learning as well as faculty members' perception of them. Little data on medical students' competency in professional email writing is available; therefore, this study explored the strengths and weaknesses of medical students' email etiquette and factors that contribute to professional email writing. A total of 210 emails from four faculty members at Seoul National University College of Medicine were collected. An evaluation criteria and a scoring rubric were developed based on the various email-writing guidelines. The rubric comprised 10 items, including nine items for evaluation related to the email components and one item for the assessment of global impression of politeness. Three evaluators independently assessed all emails according to the criteria. Students were identified as being 61.0% male and 52.8% were in the undergraduate-entry program. The sum of each component score was 62.21 out of 100 and the mean value for global impression was 2.6 out of 4. The results demonstrated that students' email etiquettes remained low-to-mediocre for most criteria, except for readability and honorifics. Three criteria, salutation (r=0.668), closing (r=0.653), and sign-off (r=0.646), showed a strong positive correlation with the global impression of politeness. Whether a student entered a graduate-entry program or an undergraduate-entry program significantly contributed to professional email writing after other variables were controlled. Although students in the graduate-entry program demonstrated a relatively superior level of email etiquette, the majority of medical students did not write emails professionally. Educating all medical students in email etiquette may well contribute to

  4. Evaluating Usability of E-Learning Systems in Universities

    Nicholas Kipkurui Kiget; Professor G. Wanyembi; Anselemo Ikoha Peters

    2014-01-01

    The use of e-learning systems has increased significantly in the recent times. E-learning systems are supplementing teaching and learning in universities globally. Kenyan universities have adopted e-learning technologies as means for delivering course content. However despite adoption of these systems, there are considerable challenges facing the usability of the systems. Lecturers and students have different perceptions in regard to the usability of e-learning systems. The aim of this study ...

  5. Universal canonical entropy for gravitating systems

    Similar to this is the case of ref. [12] which also uses the saddle point approximation to express the microcanonical entropy in terms of the canonical entropy [12a]. Recalling that there is at least 'circumstantial' evidence that the microcanonical entropy has a 'universal' form [13–15], identical to that obtained in ref. [6] quoted.

  6. Economic Impact of the North Dakota University System in 2011

    Coon, Randal C.; Bangsund, Dean A.; Hodur, Nancy M.

    2012-01-01

    The North Dakota University System consists of the North Dakota University System Office and 11 college campuses located throughout the state. In addition to the 11 main campuses, numerous other university facilities, centers, and offices are located throughout the state. Institutions of higher education have an economic effect in their respective areas and across the state as those institutions acquire inputs, purchase services, and provide for payroll and employment at both the local and st...

  7. Location Is Everything: The Use and Marketing of Reference E-Mail

    Collins, Susan L.

    2006-01-01

    Reference e-mail continues to be a vital reference service. This article studies the trends in reference e-mail use over an eight year period. Usage statistics are analyzed particularly in light of the marketing of the service via changes in the location of the service on the official university libraries' Web pages. Included are recommendations…

  8. 49 CFR 37.25 - University transportation systems.

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false University transportation systems. 37.25 Section 37.25 Transportation Office of the Secretary of Transportation TRANSPORTATION SERVICES FOR INDIVIDUALS WITH DISABILITIES (ADA) Applicability § 37.25 University transportation systems. (a...

  9. Achieving Quality Assurance in Nigeria University System through ...

    This paper examines how quality assurance can be attained through Strategic Human Resources Development in Nigerian University system. The purpose is to ensure quality control and maintenance of acceptable standards in the University system. To seek solution to the problem, three research questions were posed.

  10. The University Immune System: Overcoming Resistance to Change

    Gilley, Ann; Godek, Marisha; Gilley, Jerry W.

    2009-01-01

    A university, similar to any other organization, has an immune system that erects a powerful barrier against change. This article discusses the university immune system and what can be done to counteract its negative effects and thereby allow change to occur.

  11. Information system for strategic planning the university sustainable development

    Drevs, Yu.G.

    2013-01-01

    Issues of designing the information system which helps the University principal's office to take decisions as concerns the strategic planning are discussed. The importance of having the University simulation model is emphasized; model representation in terms of system dynamics is given [ru

  12. On the Universality and Non-Universality of Spiking Neural P Systems With Rules on Synapses.

    Song, Tao; Xu, Jinbang; Pan, Linqiang

    2015-12-01

    Spiking neural P systems with rules on synapses are a new variant of spiking neural P systems. In the systems, the neuron contains only spikes, while the spiking/forgetting rules are moved on the synapses. It was obtained that such system with 30 neurons (using extended spiking rules) or with 39 neurons (using standard spiking rules) is Turing universal. In this work, this number is improved to 6. Specifically, we construct a Turing universal spiking neural P system with rules on synapses having 6 neurons, which can generate any set of Turing computable natural numbers. As well, it is obtained that spiking neural P system with rules on synapses having less than two neurons are not Turing universal: i) such systems having one neuron can characterize the family of finite sets of natural numbers; ii) the family of sets of numbers generated by the systems having two neurons is included in the family of semi-linear sets of natural numbers.

  13. The Open Education System, Anadolu University, Turkey: E-Transformation in a Mega-University

    Latchem, Colin; Ozkul, Ali Ekrem; Aydin, Cengiz Hakan; Mutlu, Mehmet Emin

    2006-01-01

    Anadolu University in Turkey is one of the world's largest and least known mega-universities. Well over one million students in Turkey, the European Union and Northern Cyprus are enrolled in its Open Education System and yet few accounts of this dual-mode provider appear in the international literature. This article describes the evolution of the…

  14. DESCRIPTIVE STUDY OF HONORIFIC USE IN KOREAN EMAIL DISCOURSE

    Jaegu Kim

    2016-07-01

    Full Text Available It is a relatively new field that examines how Korean culture affects Korean language use in terms of age difference in a corpus of computer mediated email discourse. The purpose of this descriptive study and experiment is to prove the close relationship between Korean language and culture. This paper shows the descriptive study of Korean culture in relation to language use. Korean culture acknowledges an inherent hierarchy with regard to age, and considers [+age] as relating socially to [+power]. When younger Koreans converse with older ones, they express different morpho-syntactic patterns, which is an age complex. The main task of the experiment was to examine the way through which the age complex is reflected by Korean honorific linguistic system in email discourse. I asked 15 Korean native speakers between the ages of 20 to 25 to write emails expressing an impositive request to [+age (46-50 years old], [-age (below 25 years old] and [=age] recipients. The results show significant differences in the use of grammatical features in emails written to [+age] recipients, as compared to emails written to [-age] and [=age] recipients. The implication of the findings is that the cultural values that are attached to age and aging in the Korean society affects Koreans’ language use, which means Korean language and culture are closely intermingled.

  15. BEWARE OF OPENING ATTACHMENTS IN E-MAIL

    2000-01-01

    Following the recent e-mail viruses you are asked to be cautious when opening e-mail attachments on your PC. Attachments that are apparently harmless might hide active content producing nasty effects as soon as they are opened. Some of these so called 'Trojan horses' can conceal themselves in very attractive pictures and funny slide shows.On the PC Windows infrastructure, CERN runs software to protect users from known viruses, but new ones can sometimes arrive before our software recognises them. They can enter your system when you open an attachment. To remove them it may be necessary to re-install the Windows software on your PC.

  16. Email for clinical communication between healthcare professionals.

    Goyder, Clare; Atherton, Helen; Car, Mate; Heneghan, Carl J; Car, Josip

    2015-02-20

    Email is one of the most widely used methods of communication, but its use in healthcare is still uncommon. Where email communication has been utilised in health care, its purposes have included clinical communication between healthcare professionals, but the effects of using email in this way are not well known. We updated a 2012 review of the use of email for two-way clinical communication between healthcare professionals. To assess the effects of email for clinical communication between healthcare professionals on healthcare professional outcomes, patient outcomes, health service performance, and service efficiency and acceptability, when compared to other forms of communicating clinical information. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 9 2013), MEDLINE (OvidSP) (1946 to August 2013), EMBASE (OvidSP) (1974 to August 2013), PsycINFO (1967 to August 2013), CINAHL (EbscoHOST) (1982 to August 2013), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched November 2013). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies, and interrupted time series studies examining interventions in which healthcare professionals used email for communicating clinical information in the form of: 1) unsecured email, 2) secure email, or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two authors independently assessed studies for inclusion, assessed the included studies' risk of bias, and extracted data. We contacted study authors for additional information and have reported all measures as per the study report. The previous version of this review included one randomised controlled

  17. Enhancement of Email Security in Nuclear Malaysia

    Mohd Fauzi Haris; Raja Murzaferi Raja Moktar; Saaidi Ismail; Mohd Dzul Aiman Aslan; Mohamad Safuan Sulaiman

    2013-01-01

    Task to protect network and data security is not simple and easy. The more advance ICT technology available in the market, the more dependability to the knowledge, skills and appropriate tools would be in order one to cater these threats. Cyber security threats can be considered almost impossible to be demolished or at least to be avoided totally and what we really need is technical capabilities that may include appropriate knowledge and tools to reduce the cyber threats in the organization. Email is one of the important today's application that is being used by many people all around the globe either they are in corporate organizations, government bodies, students and teachers. The total number of worldwide email accounts is expected to increase from 3.3 billion accounts in 2012 to over 4.3 billion accounts by year-end 2016. This represents an average annual growth rate of 6% over the next four years [1]. Parallel with the increment of the usage, number of abusive and misuse of the email is also reported either in the form of spamming, delivery of malicious file attachments, phishing and others. These show the importance to tighten up the security of the email. This paper will discuss and share actions that have been taken by IT Center to enhance the security of official email application. (author)

  18. THE DEVELOPMENT OF E-MAIL LITERACY: FROM WRITING TO PEERS TO WRITING TO AUTHORITY FIGURES

    Chi-Fen Emily Chen

    2006-05-01

    Full Text Available Though e-mail has become a common interpersonal communication medium, it does not mean that this medium is used without difficulty. While people can write e-mails to peers in any manner they like, writing e-mails to authority figures requires higher pragmatic competence and critical language awareness of how discourse shapes and reflects power asymmetry in an institutional context. For L2 learners, the challenge of composing this type of e-mail can be greater due not only to their limited linguistic ability but also their unfamiliarity with the target culture's norms and values. To provide a deeper understanding of how an L2 learner develops e-mail literacy in the target language environment, this paper presents a longitudinal case study of a Taiwanese graduate student’s e-mail practice in English during her studies at a U.S. university for two and a half years. Using a critical discourse analysis approach, the study reveals the complexity of an L2 learner’s evolving e-mail practice and struggle for appropriateness, particularly in her e-mail communication with professors. Her development of e-mail literacy is discussed in relation to her evolving understanding of the e-mail medium, changing performance of student identity, increasing knowledge of student-professor interaction and realization of culture-specific politeness.

  19. Stakeholder views on the incorporation of traditional birth attendants into the formal health systems of low-and middle-income countries: a qualitative analysis of the HIFA2015 and CHILD2015 email discussion forums.

    Owolabi, Onikepe Oluwadamilola; Glenton, Claire; Lewin, Simon; Pakenham-Walsh, Neil

    2014-03-27

    Health workforce shortages are key obstacles to the achievement of the health-related Millennium Development Goals. Task shifting is seen as a way to improve access to pregnancy and childbirth care. However, the role of traditional birth attendants (TBAs) within task shifting initiatives remains contested. The objective of this study was to explore stakeholder views and justifications regarding the incorporation of TBAs into formal health systems. Data were drawn from messages submitted to the HIFA2015 and CHILD2015 email discussion forums. The forums focus on the healthcare information needs of frontline health workers and citizens in low - and middle-income countries, and how these needs can be met, and also include discussion of diverse aspects of health systems. Messages about TBAs submitted between 2007-2011 were analysed thematically. We identified 658 messages about TBAs from a total of 193 participants. Most participants supported the incorporation of trained TBAs into primary care systems to some degree, although their justifications for doing so varied. Participant viewpoints were influenced by the degree to which TBA involvement was seen as a long-term or short-term solution and by the tasks undertaken by TBAs. Many forum members indicated that they were supportive of trained TBAs being involved in the provision of pregnancy care. Members noted that TBAs were already frequently used by women and that alternative options were lacking. However, a substantial minority regarded doing so as a threat to the quality and equity of healthcare. The extent of TBA involvement needs to be context-specific and should be based on evidence on effectiveness as well as evidence on need, acceptability and feasibility.

  20. Online Counseling Using Email: A Qualitative Study

    Salleh, Amla; Hamzah, Ramlan; Nordin, Norazah; Ghavifekr, Simin; Joorabchi, Toktam Namyandeh

    2015-01-01

    Despite numerous studies in increasingly popular online mental health service, the nature of the relationship between online counselors and their clients, particularly in the email modality, deserves more attention. To enhance the knowledge in this area, this study was conducted to explore whether the online counseling relationship could be…

  1. E-mail security a pocket guide

    Furnell, Steven

    2010-01-01

    This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.

  2. Network Analysis with the Enron Email Corpus

    Hardin, J. S.; Sarkis, G.; URC, P. .

    2015-01-01

    We use the Enron email corpus to study relationships in a network by applying six different measures of centrality. Our results came out of an in-semester undergraduate research seminar. The Enron corpus is well suited to statistical analyses at all levels of undergraduate education. Through this article's focus on centrality, students can explore…

  3. Fighting Spam: Moving Email to the Cloud

    Schrader, Andrew

    2011-01-01

    On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…

  4. Secure e-mail and Web browsing

    CERN. Geneva

    2009-01-01

    This is an entry-level 1.5-hour training course aimed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. Register at CTA

  5. SPAM: Beware of emails asking for passwords

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and must never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake emails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake email message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, however future cases may still occur. Users need to be vigilant for any requests for passwords or personal data. Fake emails should be immediately deleted. In case of questions on this topic, you may contact helpdesk@cern.ch. CERN IT Department

  6. Universities, regional innovation systems and the Bangalore experience

    Vang, Jan; Coenen, Lars; Chaminade, Christina

    2007-01-01

    This paper takes stock with one-size-fits-all models on the role of universities in regional innovation systems in Asia. It proposes a contextual and evolutionary perspective which focuses on the match between the specific competences and capabilities of the universities and the firms' particular...

  7. Developing National Systems of Innovation: University-Industry ...

    2015-01-30

    Jan 30, 2015 ... Interactions between firms and universities are key building blocks of innovation systems. With a focus on developing countries, this book presents novel comparative research spanning three continents. The result is a more universal and dynamic view of the shaping and reshaping of interactions between ...

  8. Characteristics quality system assurance of university programs

    Lucian Ion Medar

    2011-03-01

    Full Text Available Quality assurance program of study requires time, dedication, effort, innovative thinking and creativity. Competitive research programs monitored by quality assurance system to create the desired results on the relationship between learning and teaching methods and assessment.

  9. A Universal Logging System for LHCb Online

    Nikolaidis, Fotis; Brarda, Loic; Garnier, Jean-Christophe; Neufeld, Niko

    2011-01-01

    A log is recording of system's activity, aimed to help system administrator to traceback an attack, find the causes of a malfunction and generally with troubleshooting. The fact that logs are the only information an administrator may have for an incident, makes logging system a crucial part of an IT infrastructure. In large scale infrastructures, such as LHCb Online, where quite a few GB of logs are produced daily, it is impossible for a human to review all of these logs. Moreover, a great percentage of them as just n oise . That makes clear that a more automated and sophisticated approach is needed. In this paper, we present a low-cost centralized logging system which allow us to do in-depth analysis of every log.

  10. Social networking through email : studying email usage patterns of persons with aphasia

    Al Mahmud, A.; Martens, J.B.O.S.

    2016-01-01

    Background: A social networking program has been developed by the Aphasia Union Netherlands (AVN) to enhance communication between older persons with aphasia (PWA) mutually and with their therapists. The medium of communication is email. Aims: The aim of the paper is to understand the email usage

  11. THE BPMN APPROACH OF THE UNIVERSITY INFORMATION SYSTEMS

    Catalin STRȊMBEI

    2016-08-01

    Full Text Available In this article we provide a new vision about the enterprise modelling in the context of Business Process Model and Notation (BPMN and the university area. Although the flow objects, artefacts, connecting objects and swim lanes are very used in the process of Enterprise Modelling, they have specific roles in the university information systems. The paper will reveal a specific approach of BPMN in the context of university information systems based on a comparative analysis of some representative universities from United States and Central Europe. Our ideas are argued with a practical case study that includes 4 realistic and complex systems: study programs and curriculum, students’ admission, student roadmap, students’ exchange. The future directions of the article are some visions of BPMN orchestration of a SOA-based architecture for Student Record Systems.

  12. Modifying scoring system at South African University rugby level ...

    Success in rugby is measured by winning the game and in order to do so, teams need to score more points ... if modifying the scoring system at South African University rugby level changes the game dynamics. ... AJOL African Journals Online.

  13. INFORMATION SYSTEM DESIGN OF PERFORMANCE ACHIEVEMENTS MONITORING IN THE UNIVERSITY: A CASE STUDY IN BINUS UNIVERSITY

    Irma Irawati Ibrahim

    2012-05-01

    Full Text Available Dashboard is a computer interface that displays a variety of charts, graphs, tables, which are selected reports from various data that are considered important to display rapidly, with an attractive appearance, dynamic, and relevant so that it can immediately be seen quickly to analyze a condition. Dashboard information system is widely used in various companies as a support system for decision-making where Dashboard usually displays data business trends of the company or the achievement of KPI (Key Performance Indicator of a company. The method used is descriptive analysis by means of collecting information that areimportant for universities to be considered asthe Key Success Factors (KSF of the university, and then, the design of the dashboard is made in accordance with these important factors.The result of this study is a grand design of information systems for the university performance monitoring, starting from the reception of students, faculty performance, student academic achievement, effectiveness and efficiency of services, including graduates. It is expected that by the time the system has been fully implemented, the university can take action quickly and accurately with respect to the required conditions.Keywords: Information System Dashboard; Dashboard; Academic Dashboard; University Dashboard

  14. The University of Wisconsin OAO operating system

    Heacox, H. C.; Mcnall, J. F.

    1972-01-01

    The Wisconsin OAO operating system is presented which consists of two parts: a computer program called HARUSPEX, which makes possible reasonably efficient and convenient operation of the package and ground operations equipment which provides real-time status monitoring, commanding and a quick-look at the data.

  15. Managing examination malpractice in Nigerian University system ...

    Examination malpractice is as old as examination itself. However, the rate at which examination malpractices occurs in the Nigerian educational system is highly disturbing. The challenge therefore needs prompt attention. The phenomenon which has both moral and legal dimensions is considered as a hydra-headed ...

  16. A new remote-imaging diagnosis system at Komazawa University

    Shimada, Morio; Kohda, Eiichi; Yoshikawa, Kohki

    2007-01-01

    We developed a remote-imaging diagnosis system that links the highly experienced radiologists at Komazawa University with Fuji Electric Hospital, where no such radiologists are present. MRI or CT images from Fuji Electric hospital are transmitted to Komazawa University via private line (INS64). The radiologists at Komazawa University then read the MRI or CT images, and relay the results to Fuji Electric Hospital. We describe the advantages and disadvantages of this system. MRI or CT imaging data from 80 cases were used. The data were stored in the imaging system server at Fuji Electric Hospital and were evaluated by experienced radiologists at Komazawa University. The images were sent one by one to the diagnostic support system server at Komazawa University through the private INS64 line. We examined transmission time per case and the security of transmission. Transmission of MRI or CT images from the 80 cases required a mean duration of 63 minutes 30 seconds per image. The quality of all images was highly satisfactory. In addition, there was no evidence of weaknesses in security. A physician at Fuji Electric Hospital was able to readily explain to the patient the results of the images by referring to the findings written by a radiologist at Komazawa University. We were able to transmit MRI or CT images by using this system safely and readily. The primary disadvantage of this system was the slow transmission speed. This will be improved by upgrading to an optical fibers. (author)

  17. Smart information system for gachon university gil hospital.

    Park, Dong Kyun; Jung, Eun Young; Jeong, Byung Hui; Moon, Byung Chan; Kang, Hyung Wook; Tchah, Hann; Han, Gi Seong; Cheng, Woo Sung; Lee, Young Ho

    2012-03-01

    In this research, the hospital information system of Gachon University Gil hospital is introduced and a future strategy for hospital information systems is proposed. This research introduces the development conditions of hospital information system at Gachon University Gil hospital, information about the development of the enterprise resource planning (ERP), a medical service process improvement system, and the personal health record (PHR) system. The medical service process and work efficiency were improved through the medical service process improvement system, which is the most common hospital information system at Gachon University Gil hospital and which includes an emergency medical service system, an online evaluation system and a round support system. Gachon University Gil hospital developed medical service improvement systems to increase work efficiency of medical team and optimized the systems to prove the availability of high-quality medical services for patients and their families. The PHR-based personalized health care solution is under development and will provide higher quality medical service for more patients in the future.

  18. The Management and Demonstration System at Murray State University.

    Schroeder, Gary G.

    The management system in use at the Murray State University Teacher Corps Project is described. The system uses management by objectives and the demonstration approach, and encourages managers to focus on the development and demonstration of ideas, processes, and structures. The system's operating concepts of time management and human resources…

  19. The Bristol University neutron dosimetry system

    Worley, A.; Fews, A.P.; Henshaw, D.L.

    1987-01-01

    The neutron dosimetry system developed at Bristol is based on recording recoil proton tracks in conventionally etched PADC plastic using a fully automated image analysis system. Two features contribute to the achievement of a low dose threshold: high quality plastic is manufactured and undergoes extensive quality control tests prior to acceptance for use in dosimetry, and a readout system with high efficiency for rejecting background events is used. The principal dosemeter that has been developed consists of three orthogonal elements, each containing two 3 cm x 1 cm plastics on either side of a polyethylene radiator. On each plastic an area of 0.15 cm 2 is scanned giving a total active area of 0.90 cm 2 . Each plastic is coded for manual identification and for computer recognition. The track counts from the six plastics are added with different weightings to achieve a measure of dose which is independent of irradiation direction when worn on the body. The device has been calibrated using monoenergetic neutrons in the range 100 keV to 14.7 MeV at NPL, and using the recent CENDOS exposure. If the track counts are added without weighting, the device has a nominal response of 120 tracks cm -2 .mSv -1 and an energy threshold at 200 keV. Taken together with a background of 20 track cm -2 , a dose threshold of around 80μSv is implied. A simpler dosemeter, using a single plastic/radiator combination, may also be considered. If a 1 cm 2 device is used for normal incidence exposure, the dose threshold is calculated to be 25 μSv. (author)

  20. A 'Universal Time' system for ASDEX upgrade

    Raupp, Gerhard; Cole, R.; Behler, K.; Fitzek, M.; Heimann, P.; Lohs, A.; Lueddecke, K.; Neu, G.; Schacht, J.; Treutterer, W.; Zasche, D.; Zehetbauer, Th.; Zilker, M.

    2003-01-01

    For the new generation of intelligent controllers for plasma diagnostics, discharge control and long-pulse experiment control a new time system supporting steady state real-time operation has been devised. A central unit counts time at nanosecond resolution, covering more than the experiment lifetime. The broadcast time information serves local units to perform application functions such as current time readout, trigger generation and sample time measurement. Time is treated as a precisely measured quantity like other physical quantities. Tagging all detected events and sampled values with measured times as [value; time]-entities facilitates real-time data analysis, steady state protocolling and time-sorted archiving

  1. Nottingham Trent University and Makerere University School of Public Health partnership: experiences of co-learning and supporting the healthcare system in Uganda.

    Musoke, David; Gibson, Linda; Mukama, Trasias; Khalil, Yesmean; Ssempebwa, John C

    2016-03-28

    Partnerships between developed and developing country institutions are increasingly becoming important in addressing contemporary global health challenges faced by health systems. Inter-university health collaboration such as the Nottingham Trent University (UK) and Makerere University School of Public Health (Uganda) partnership provide opportunities for working together in training, research and service delivery while strengthening health systems. This paper shares the experiences, achievements and opportunities of this partnership in co-learning and supporting the health system in Uganda. This includes a project being implemented to strengthen the training, supervision and motivation of community health workers in rural Uganda. Training and research are a key focus of the partnership and have involved both staff and students of both institutions including guest lectures, seminars and conference presentations. The partnership's collaboration with stakeholders such as the Ministry of Health (Uganda) and local health authorities has ensured participation necessary in supporting implementation of sustainable interventions. The partnership uses several channels such as email, telephone, Skype, Dropbox and WhatsApp which have been useful in maintaining constant and effective communication. The challenges faced by the partnership include lack of funding to support student mobility, and varying academic schedules of the two institutions. The experiences and prospects of this growing partnership can inform other collaborations in similar settings.

  2. E-mail to SMS service change

    IT Department

    2010-01-01

    If you have a CERN e-mail account, you have probably already used one of the popular services that CERN’s IT Department offers to CERN users: the mail2SMS service. It allows any CERN e-mail account holder to send short messages (SMS) free of charge to CERN GSM phone numbers. Further to recent negotiations with our GSM operator, this service has been extended. It is now possible to send short messages free of charge to any Swiss mobile number. This extension of service aims at replacing the similar service that was made available by SWITCH(1) to CERN users (address: mobilenumber@sms.switch.ch). Because of repeated abuse, this service will be definitively stopped for CERN users on 15th January 2010. Please keep in mind that CERN’s e-mail to SMS service still has some restrictions: messages can only be sent from CERN mail accounts, and not from personal ones, such as GMAIL, MSN, Yahoo; the maximum length of the message is 160 characters (standard maximum SMS length); and only Swiss mobile...

  3. Deception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military

    Rockwell, Roy

    2002-01-01

    ... their ability to detect email forgery. The results did determine that government computer users are extremely vulnerable to email forgery and that new security measures need to be adapted to protect these systems from this type...

  4. UNIVERSITY TURBINE SYSTEMS RESEARCH PROGRAM SUMMARY AND DIRECTORY

    Lawrence P. Golan; Richard A. Wenglarz

    2004-07-01

    The South Carolina Institute for Energy Studies (SCIES), administratively housed at Clemson University, has participated in the advancement of combustion turbine technology for over a decade. The University Turbine Systems Research Program, previously referred to as the Advanced Gas Turbine Systems Research (AGTSR) program, has been administered by SCIES for the U.S. DOE during the 1992-2003 timeframe. The structure of the program is based on a concept presented to the DOE by Clemson University. Under the supervision of the DOE National Energy Technology Laboratory (NETL), the UTSR consortium brings together the engineering departments at leading U.S. universities and U.S. combustion turbine developers to provide a solid base of knowledge for the future generations of land-based gas turbines. In the UTSR program, an Industrial Review Board (IRB) (Appendix C) of gas turbine companies and related organizations defines needed gas turbine research. SCIES prepares yearly requests for university proposals to address the research needs identified by the IRB organizations. IRB technical representatives evaluate the university proposals and review progress reports from the awarded university projects. To accelerate technology transfer technical workshops are held to provide opportunities for university, industry and government officials to share comments and improve quality and relevancy of the research. To provide educational growth at the Universities, in addition to sponsored research, the UTSR provides faculty and student fellowships. The basis for all activities--research, technology transfer, and education--is the DOE Turbine Program Plan and identification, through UTSR consortium group processes, technology needed to meet Program Goals that can be appropriately researched at Performing Member Universities.

  5. Resident use of the Internet, e-mail, and personal electronics in the care of surgical patients.

    Plant, Mathew A; Fish, Joel S

    2015-01-01

    The use of smartphones, e-mail, and the Internet has affected virtually all areas of patient care. Current university and hospital policies concerning the use of devices may be incongruent with day-to-day patient care. The goal was to assess the current usage patterns of the Internet, e-mail, and personal electronics for clinical purposes by surgical residents as well as their communication habits and preferences. Also assessed was residents' knowledge regarding the institutional policies surrounding these issues. Surgical residents (n = 294) at a large teaching institution were surveyed regarding their knowledge of university policies as well as daily use of various communication technologies. Communication preferences were determined using theoretical clinical scenarios. Our survey with a response rate of 54.7% (n = 161) revealed that 93.8% of participants indicated daily Internet use for clinical duties. Most respondents (72%) were either completely unaware of the existence of guidelines for its use or aware but had no familiarity with their content. Use of e-mail for clinical duties was common (85%), and 74% of the respondents rated e-mail as "very important" or "extremely important" for patient care. Everyone who responded had a mobile phone with 98.7% being "smartphones," which the majority (82.9%) stated was "very important" or "extremely important" for patient care. Text messaging was the primary communication method for 57.8% of respondents. The traditional paging system was the primary communication method for only 1.3% of respondents and the preferred method for none. Daily use of technology is the norm among residents; however, knowledge of university guidelines was exceedingly low. Residents need better education regarding current guidelines. Current guidelines do not reflect current clinical practice. Hospitals should consider abandoning the traditional paging system and consider facilitating better use of residents' mobile phones.

  6. Development of an E-mail Application Seemit and its Utilization in an Information Literacy Course

    Kita, Toshihiro; Miyazaki, Makoto; Nakano, Hiroshi; Sugitani, Kenichi; Akiyama, Hidenori

    We have developed a simple e-mail application named Seemit which is designed for being used in information literacy courses. It has necessary and sufficient functionality of an e-mail application, and it has been developed for the purpose of learning basic operations and mechanisms of e-mail transfer easily. It is equipped with the function to automatically set the configuration of user's SMTP/POP servers and e-mail address, etc. The process of transferring e-mail via SMTP and POP can be demonstrated step by step showing actual messages passed during the client-server interaction. We have utilized Seemit in a university-wide information literacy course which holds about 1800 students.

  7. Performance Based Supplementary Payment System at University Hospitals in Turkey

    Vahit YÝÐÝT

    2017-06-01

    Results: The result of the analysis has revealed that PBSP system encourage physicians who would like to receive financial incentives. PBSP system supports the individual performance, reduces waiting times in patients, increases revenues and decreases expenditures and increases in efficiency of department. However, this payment system increases work load, number of examinations and provokes the conflict among personals. Conclusions: University hospitals are academic institutions that perform important missions such as research, medical education and health services provision. Therefore, PBSP system should be revised so as to encourage performing these missions at university hospitals. There is also shortage of financial resources at the university hospitals. This situation leads to less additional payments to physicians. [J Contemp Med 2017; 7(2.000: 126-131

  8. User Requirements Model for University Timetable Management System

    Ahmad Althunibat; Mohammad I. Muhairat

    2016-01-01

    Automated timetables are used to schedule courses, lectures and rooms in universities by considering some constraints. Inconvenient and ineffective timetables often waste time and money. Therefore, it is important to investigate the requirements and potential needs of users. Thus, eliciting user requirements of University Timetable Management System (TMS) and their implication becomes an important process for the implementation of TMS. On this note, this paper seeks to propose a m...

  9. An Affordable Microcomputer Library Information System Developed by Georgetown University.

    Broering, Naomi C.

    1984-01-01

    Discusses development of a library information system by Georgetown University Medical Center's Dahlgren Memorial Library; describes its components, including online catalog and OCLC interface, circulation, serials control, acquisitions, networking/interlibrary loans, word processing and mini-Medline system; and discusses user reaction, staff…

  10. Placing the Solar System in its Universal Context

    Grier, J. A.; Steel, S. J.; Dussault, M. E.; Reinfeld, E. L.; Gould, R. R.

    2004-11-01

    Data from surveys and evaluations of recent space science education programs show that both teachers and students use the terms 'solar system', 'galaxy' and 'universe' interchangeably. For some this merely represents a barrier in vocabulary, but for most, it is indicative of an underlying lack of structure within their internal models of the solar system and universe. Some of the misconceptions of size of the solar system, placement, distance, scale and hierarchy of objects in the galaxy and universe are introduced by not including the solar system in a consistent, coherent picture within the rest of the galaxy and universe. If these ideas and misconceptions are not addressed through a targeted educational experience, they can form barriers to developing new and more accurate internal models, and impede the assimilation of any new evidence or ideas within those models. We are developing focused educational products and experiences that allow students to encounter the topics of 'solar system', 'galaxy' and 'universe' as an integrated whole, showing the common and unique features, natural interrelationships, and hierarchies that allow students and teachers to develop more powerful internal models of their place in space and time. We have used this approach to enhance the learning experience at Girl Scouts 'Train the Trainer' Workshops, in the 'Modeling the Universe' Professional Development Workshops, and in several venues for urban public school teachers. We have also created activities such as the "Cosmic Timeline", and products such as the "How Big is the Universe?" booklet to support learning about size and scale from the Earth to the Sun, and then all the way out to the edge of space.

  11. Modeling Personalized Email Prioritization: Classification-based and Regression-based Approaches

    Yoo S.; Yang, Y.; Carbonell, J.

    2011-10-24

    Email overload, even after spam filtering, presents a serious productivity challenge for busy professionals and executives. One solution is automated prioritization of incoming emails to ensure the most important are read and processed quickly, while others are processed later as/if time permits in declining priority levels. This paper presents a study of machine learning approaches to email prioritization into discrete levels, comparing ordinal regression versus classier cascades. Given the ordinal nature of discrete email priority levels, SVM ordinal regression would be expected to perform well, but surprisingly a cascade of SVM classifiers significantly outperforms ordinal regression for email prioritization. In contrast, SVM regression performs well -- better than classifiers -- on selected UCI data sets. This unexpected performance inversion is analyzed and results are presented, providing core functionality for email prioritization systems.

  12. Email communication in a developing country: different family physician and patient perspectives.

    Makarem, Nisrine N; Antoun, Jumana

    2016-01-01

    Email communication between physicians and patients could improve access to and delivery of health care. Most of the literature studies about email communication between physicians and patients have been conducted in developing countries. Therefore, this study aims to analyze the practices, attitudes, and barriers of both physicians' and patients' use of email within the same health care setting of a developing country. A cross-sectional paper-based survey was conducted among 39 physicians and 500 patients at the Family Medicine clinics of the American University of Beirut, a tertiary academic medical center. Most of the surveyed patients and physicians reported that they would like to communicate through email and agreed that it is useful. However, only 19% of the patients have ever communicated with their physicians via email, and only 5.1% of physicians have often communicated with their patients via email. Almost half of the patients surveyed were unaware of the possibility of this form of communication, and only 17% reported that their physician offered them his or her email address. In addition, physicians and patients did not agree on the services to be provided by email communication. For instance, almost half of the patients indicated consultation for an urgent medical matter as suitable for email communication. The use of email communication in health care is still scarce. Patients and physicians have different perspectives of its use and importance. Further rigorous research is needed to clarify the advantages and disadvantages of this form of communication, especially in the developing world. Interested physicians are encouraged to establish appropriate personal policies for email communication with adequate announcement and patient education plans.

  13. Filtration Systems Design for Universal Oils in Agricultural Tractors

    R. Majdan

    2017-12-01

    Full Text Available Three filtration systems using the tractor hydraulic circuit were proposed and verified during the tractors operation. Using the tractor-implement hydraulic system and filter body with accessories the universally useful filtration systems were designed. The designed filtration systems are the second stage of universal oil filtration whereas the first stage is the standard tractor filter. The decrease in the content of iron reached the values 25.53 %, 32.95 % and 41.55 % and the average decrease in oil contamination characterized by average value of decrease in content of iron, copper and silicium reached values 24.3 %, 24.7 % and 35.53 % in dependence on the filtration system and an oil contamination level. The decrease in contamination level verified the ability of designed filtration systems for agricultural tractors.

  14. Using Email to Improve Parental Involvement in Middle School

    Radin, Benjamin Theodore

    2013-01-01

    The purpose of this study was to test the relationship between the type of school-to-home communication (regularly sent, structured emails versus ad hoc emails), the originator of these emails (teacher or student), and Parental Involvement (PI) as measured according to the frequency of email contact and distribution of student and parent emails…

  15. E-mail marketing grows up: a primer for the managed care industry.

    Dysart, J

    2000-02-01

    Managed care plans are jumping onto the electronic marketing bandwagon in a big way, taking advantage of not only the basic E-mail system but also expanding on that medium and developing creative vehicles to send the health plan's message. In this article, the author describes how E-mail technology is being used to hone the marketing edge in MCOs.

  16. Academic entrepreneurship in a medical university: A system dynamics approach

    Tofighi Sharam

    2017-01-01

    Full Text Available Academic entrepreneurship is a dynamic field which is growing after the second academic revolution that added entrepreneurial mission as the Third Mission of universities. In this sense, dynamics of this phenomenon is a suitable field of study and provides fruitful insights for both theory and practice. Thus, in this research, system dynamics approach is used to scrutinize academic entrepreneurship. The main question of this research is 'how academic entrepreneurship might evolve in a medical university of a developing country?' Therefore, Cross Impact Analysis method is used to examine the system behavior. In this study, the main attributes are adapted from a recent study by Salamzadeh et al. (2013a. Then, some policy variables are proposed and their effects on the model were shown. Findings show that although entrepreneurial ecosystem is growing in the country, still there are problems to be taken into account in order to improve the entrepreneurship in university.

  17. Universality of the topology of period doubling dynamical systems

    Beiersdorfer, P.

    1983-10-01

    The evolution of the topology of the invariant manifolds of the attractors of 3-D autonomous dynamical systems during period doubling is shown to be universal. The overall topology of the nth attractor is shown to depend only on the topology of the first attractor at birth

  18. Systems Thinking Evidence from Colleges of Business and Their Universities

    Seiler, John H.; Kowalsky, Michelle

    2011-01-01

    This study investigated instances of the term "systems thinking" among the websites of the Top 25 business schools as ranked by "U. S. News and World Report" in 2010. Since a greater number of instances of the term and its variants in a university's web documents may indicate an increased interest of the institution in the…

  19. Implementation of a radiology information system in an University Hospital

    Marques, Paulo Mazzoncini de Azevedo; Santos, Antonio Carlos; Elias Junior, Jorge; Trad, Clovis Simao; Goes, Wilson Moraes; Castro, Carlos Roberto de

    2000-01-01

    This paper describes a radiology information system (RIS) developed and in the process of implementation in an University Hospital (Hospital das Clinicas da Faculdade de Medicina de Ribeirao Preto - Universidade de Sao Paulo) which integrates a plan for a 'filmless' radiology facility. (author)

  20. New compliance management system of the University Hospital Frankfurt, Germany

    Irmscher, Bettina

    2016-01-01

    The meaning of Corporate Governance is all values and principles guiding or regulating good and responsible business management. Clearly defined roles and responsibilities for managing compliance, risks and checks is the prerequisite for the latter. For that reason, a compliance management system was set up at the University Hospital Frankfurt in 2015.

  1. WEAKNESSES OF THE MANAGEMENT SYSTEM OF TRADITIONAL HUNGARIAN UNIVERSITIES

    Gabriella KECZER

    2008-01-01

    Full Text Available Transformation of the management of traditional higher education institutionsemerged in Hungary following the change of the political system in 1990,however, an appropriate answer has not been found to date. The first step inthe management of reform is identification of the issues that need to beresolved through the implementation of changes.The present research has been aimed at identifying the present weaknessesof the inner management system of traditional Hungarian universities, thusfind a solid starting point for reforming it. I conducted in-depth interviews inthe course of research, with 10 top university managers who represent 9institutions, thus the majority of traditional Hungarian universities. Such aresearch has not been made at least for the last decade.In my paper first I present the current legal framework of the system ofuniversity management. Then I give an assessment of it on the basis of theinterviews, analysing the deficiencies, the external and internal obstacles toefficient management I conclude that the present leaders of theuniversities can exactly identify those deficiencies of the system and therelated external and internal circumstances that lead to disturbed operationand low efficiency. The results obtained through the interviews suggest that areform of the internal management should rearrange intra-university powerrelations and harmonize scopes of responsibility and competence. A shifttoward a stronger central, rectoral and a more limited faculty- and bodyrelatedmanagement appears necessary.

  2. Voting-based Classification for E-mail Spam Detection

    Bashar Awad Al-Shboul

    2016-06-01

    Full Text Available The problem of spam e-mail has gained a tremendous amount of attention. Although entities tend to use e-mail spam filter applications to filter out received spam e-mails, marketing companies still tend to send unsolicited e-mails in bulk and users still receive a reasonable amount of spam e-mail despite those filtering applications. This work proposes a new method for classifying e-mails into spam and non-spam. First, several e-mail content features are extracted and then those features are used for classifying each e-mail individually. The classification results of three different classifiers (i.e. Decision Trees, Random Forests and k-Nearest Neighbor are combined in various voting schemes (i.e. majority vote, average probability, product of probabilities, minimum probability and maximum probability for making the final decision. To validate our method, two different spam e-mail collections were used.

  3. A new compact AMS system at Peking University

    Liu Kexin; Ding Xingfang; Fu Dongpo; Pan Yan; Wu Xiaohong; Guo Zhiyu; Zhou Liping

    2007-01-01

    A compact 14 C AMS system manufactured by the National Electrostatics Corporation has been installed at the Institute of Heavy Ion Physics, Peking University. The system is based on a Model 1.5SDH-1 Pelletron accelerator with a maximum terminal voltage of 0.6 MV. The 14 C measurement accuracy with this system is better than 0.4% and the machine background is lower than 0.03 pMC. The performance of the new system, especially the background and the δ 13 C measurements, is presented. Several important applications are also described briefly

  4. E-mail, decisional styles, and rest breaks.

    Baker, James R; Phillips, James G

    2007-10-01

    E-mail is a common but problematic work application. A scale was created to measure tendencies to use e-mail to take breaks (e-breaking); and self-esteem and decisional style (vigilance, procrastination, buck-passing, hypervigilance) were used to predict the self-reported and actual e-mail behaviors of 133 participants (students and marketing employees). Individuals who were low in defensive avoidance (buck-passing) engaged in more e-mailing per week, both in time spent on e-mail and message volume. E-breakers were more likely to engage in behavioral procrastination and spent more time on personal e-mail.

  5. Universal bursty behavior in the air transportation system.

    Ito, Hidetaka; Nishinari, Katsuhiro

    2015-12-01

    Social activities display bursty behavior characterized by heavy-tailed interevent time distributions. We examine the bursty behavior of airplanes' arrivals in hub airports. The analysis indicates that the air transportation system universally follows a power-law interarrival time distribution with an exponent α=2.5 and an exponential cutoff. Moreover, we investigate the mechanism of this bursty behavior by introducing a simple model to describe it. In addition, we compare the extent of the hub-and-spoke structure and the burstiness of various airline networks in the system. Remarkably, the results suggest that the hub-and-spoke network of the system and the carriers' strategy to facilitate transit are the origins of this universality.

  6. Accreditation Role of the National Universities Commission and the Quality of the Educational Inputs into Nigerian University System

    Ibijola; Yinka, Elizabeth

    2014-01-01

    The Accreditation role of the National Universities Commission (NUC) and the quality of the educational inputs into Nigerian university system was investigated in this work, using a descriptive research of survey design. The population consisted of public Universities in South-West, Nigeria. The sample was made up of 300 subjects, consisting of 50…

  7. Mobile Attendance Checking System on Android Platform for Kazakhstani University

    Saparkhojayev, N.; Shakhov, E.; Mailybayev, Y.

    2016-04-01

    In the 21st century-the century of Information Technology, it is difficult to imagine life without any gadgets: phones, tablets, computers, laptops, and so on. Today, smartphones and tablets are becoming popular, and thus their operating systems become popular too. Android is designed for low-power devices that run on battery power at full capacity, using all of its services, such as cameras, lights, GPS navigation, Wi-Fi, etc. In Kazakhstani universities, the process of checking students’ attendance is one of the important issues, because final grade evaluation of students is based on their total number of appearances and their grades during the whole semester. This raises the question of having some tool to control students’ attendance. There are many possible ways of controlling attendance: there are many examples when universities prefer to control attendance by the use of paper sheet, and some universities prefer to use two-stage way of controlling attendance: firstly, teachers and professors use paper sheet for checking students’ attendance and after this, they fill out these information into a system manually. However, this is not an efficient way since there will be spent much of time for calling students names and putting marks like “presence” or “absence” if the class is a lecture class, and in this class at least 5 groups are presented. Furthermore, some students may call his/her friend as “presence” nevertheless to the fact that this student is currently absent. After taking into consideration all these issues and the fact that many gadgets use Android platform, authors of the following research paper decided to create a mobile system that makes easier to check students’ attendance automatically, and this system is implemented in Almaty Management University, Kazakhstan. The system is based on Android platform, and in this paper, details of this system are presented.

  8. Computer-Mediated Communication in Psychology Teaching: Influence of Cultural Background on E-Mail Content and on Appraisal

    Hansen, Miriam; Jucks, Regina

    2014-01-01

    A significant amount of communication between lecturers and students takes place via e-mail. This study provides evidence that two types of cultural cues contained in the e-mail impacts lecturers' linguistic adaptation to, and appraisal of, the student. A total of 186 psychology lecturers from universities in Germany answered a fictitious…

  9. Two Minute Training in Class Significantly Increases the Use of Professional Formatting in Student to Faculty Email Correspondence

    Aguilar-Roca, Nancy; Williams, Adrienne; Warrior, Rahul; O'Dowd, Diane K.

    2009-01-01

    Many university faculty value email as an important tool for communicating with colleagues, but express frustration with a high incidence of unprofessional email correspondence from students. The goals of this study were to document the frequency of specific formatting mistakes that contribute to faculty's unfavorable perception of student emails…

  10. Learning Management Systems and E-Learning within Cyprus Universities

    Amirkhanpour, Monaliz

    2011-01-01

    Full Text Available This paper presents an extensive research study and results on the use of existing open-source Learning Management Systems, or LMS within the public and private universities of Cyprus. The most significant objective of this research is the identification of the different types of E-Learning, i.e. Computer-Based Training (CBT, Technology-Based Learning (TBL, and Web-Based Training (WBT within Cyprus universities. The paper identifies the benefits and limitations of the main learning approaches used in higher educational institutions, i.e. synchronous and asynchronous learning, investigates the open-source LMS used in the Cypriot universities and compares their features with regards to students’ preferences for a collaborative E-Learning environment. The required data for this research study were collected from undergraduate and graduate students, alumni, faculty members, and IT professionals who currently work and/or study at the public and private universities of Cyprus. The most noteworthy recommendation of this study is the clear indication that most of the undergraduate students that extensively use the specific E-Learning platform of their university do not have a clear picture of the differences between an LMS and a VLE. This gap has to be gradually diminished in order to make optimum use of the different features offered by the specific E-Learning platform.

  11. University of Hawaii Lure Observatory. [lunar laser ranging system construction

    Carter, W. E.; Williams, J. D.

    1973-01-01

    The University of Hawaii's Institute for Astronomy is currently constructing a lunar laser ranging observatory at the 3050-meter summit of Mt. Haleakala, Hawaii. The Nd YAG laser system to be employed provides three pulses per second, each pulse being approximately 200 picoseconds in duration. The energy contained in one pulse at 5320 A lies in the range from 250 to 350 millijoules. Details of observatory construction are provided together with transmitter design data and information concerning the lunastat, the feed telescope, the relative pointing system, the receiver, and the event timer system.

  12. A universal measuring and monitoring system for nuclear radiation

    Genrich, V.

    1988-01-01

    Genitron Instruments, Frankfurt/Main, committed themselves to revise the 'conventional' concept of counting tube metrology. The goal was to develop a modular system that would allow large-area measuring tasks. The contribution in hand explains this development, which consists of a highly integrated measuring head that can be combined with various detector types, and complemented by various system components, to form a universal measuring and monitoring system for nuclear radiation. This modular design concept is capable of fulfilling a multitude of tasks, ranging from single, specific applications to non-stop monitoring tasks within a large-area measuring network. (orig./DG) [de

  13. Haldane's statistical interactions and universal properties of anyon systems

    Protogenov, A.

    1995-03-01

    The exclusion principle of fractional statistics proposed by Haldane is applied to systems with internal degrees of freedom. The symmetry of these systems is included in the statistical interaction matrix which contains the Cartan matrix of Lie algebras. The solutions of the equations for the statistical weights, which coincide with the thermodynamic Bethe ansatz equations are determined in the high temperature limit by the squares of q-deformed dimensions of irreducible representations. The entropy and other thermodynamic properties of anyon systems in this limit are completely characterized by the algebraic structure of symmetry in the universal form. (author). 39 refs

  14. Phase transition universality classes of classical, nonequilibrium systems

    Ódor, G

    2004-01-01

    In the first chapter I summarize the most important critical exponents and relations used in this work. In the second chapter I briefly address the question of scaling behavior at first order phase transitions.In chapter three I review dynamical extensions of basic static classes, show the effect of mixing dynamics and percolation behavior. The main body of this work is given in chapter four where genuine, dynamical universality classes specific to nonequilibrium systems are introduced. In chapter five I continue overviewing such nonequilibrium classes but in coupled, multi-component systems. Most of known transitions in low dimensional systems are between active and absorbing states of reaction-diffusion type systems, but I briefly introduce related classes that appear in interface growth models in chapter six. Some of them are related to critical behavior of coupled, multi-component systems. Finally in chapter seven I summarize families of absorbing state system classes, mean-field classes and the most freq...

  15. Effectiveness and Limitations of E-Mail Security Protocols

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  16. Universality in driven-dissipative quantum many-body systems

    Sieberer, L.M.

    2015-01-01

    Recent experimental investigations of condensation phenomena in driven-dissipative quantum many-body systems raise the question of what kind of novel universal behavior can emerge under non-equilibrium conditions. We explore various aspects of universality in this context. Our results are of relevance for a variety of open quantum systems on the interface of quantum optics and condensed matter physics, ranging from exciton-polariton condensates to cold atomic gases. In Part I we characterize the dynamical critical behavior at the Bose-Einstein condensation phase transition in driven open quantum systems in three spatial dimensions. Although thermodynamic equilibrium conditions are emergent at low frequencies, the approach to this thermalized low-frequency regime is described by a critical exponent which is specific to the non-equilibrium transition, and places the latter beyond the standard classification of equilibrium dynamical critical behavior. Our theoretical approach is based on the functional renormalization group within the framework of Keldysh non-equilibrium field theory, which is equivalent to a microscopic description of the open system dynamics in terms of a many-body quantum master equation. Universal behavior in the coherence properties of driven-dissipative condensates in reduced dimensions is investigated in Part II. We show that driven two-dimensional Bose systems cannot exhibit algebraic order as in thermodynamic equilibrium, unless they are sufficiently anisotropic. However, we find evidence that even isotropic systems may have a finite superfluidity fraction. In one-dimensional systems, non-equilibrium conditions are traceable in the behavior of the autocorrelation function. We obtain these results by mapping the long-wavelength condensate dynamics onto the Kardar-Parisi-Zhang equation. In Part III we show that systems in thermodynamic equilibrium have a specific symmetry, which makes them distinct from generic driven open systems. The novel

  17. Explanation of model design and talent management system in universities

    AH Nazaripour; SNJ Mosavi; M Hakak; A Pirzad

    2017-01-01

    Abstract Background and aim: Nowadays talented human resources are considerd as the most important and valuable organizational asset. Proper management of these major asset, the the most essential task manager and the progress of any organization in this field is fierce competition with competitor. The aim of this study was to develop a model system for talent management in universities in the country. Methods: In this study the population was composed of 10 Azad Univers...

  18. Development of robotic mobile platform with the universal chassis system

    Ryadchikov, I.; Nikulchev, E.; Sechenev, S.; Drobotenko, M.; Svidlov, A.; Volkodav, P.; Feshin, A.

    2018-02-01

    The problem of stabilizing the position of mobile devices is extremely relevant at the modern level of technology development. This includes the problem of stabilizing aircraft and stabilizing the pitching of ships. In the laboratory of robotics and mechatronics of the Kuban State University, a robot is developed. The robot has additional internal degrees of freedom, responsible for compensating for deflections - the dynamic stabilization system.

  19. Electronic Identities: The Strategic Use of Email for Impression Management.

    Kersten, Larry; Phillips, Stephen R.

    Traditionally, e-mail (electronic mail) has been seen as an efficient communications medium for the transmission of simple, routine, unambiguous messages. More recent research has argued that the simple, efficient view of e-mail is incomplete. Future research should be extended into the strategic and symbolic functions of email, such as the use of…

  20. Using Mobile-Based Email for English Foreign Language Learners

    Alzu'bi, Mohammad Akram mohammad; Sabha, Muhannad Rushdi Nimer

    2013-01-01

    This study aimed at investigating the role of Mobile-based Email in improving Ajloun College English Students' Achievement. It attempts to answer the following questions: What is the potential contribution of mobile-based email exchanged to writing skills? What is the potential contribution of mobile-based email exchanged to vocabulary…

  1. Teaching Email Politeness in the EFL/ESL Classroom

    Economidou-Kogetsidis, Maria

    2015-01-01

    Writing status-congruent emails is a skill that requires high pragmatic competence and awareness of the politeness conventions and email etiquette that need to be followed. Planning and composing such emails pose a greater challenge for EFL learners who use English in "lingua franca" communication (ELF), as they not only often struggle…

  2. Investigasi Forensik Pada E-Mail Spoofing Menggunakan Metode Header Analysis

    Hoiriyah, Hoiriyah; Sugiantoro, Bambang; Prayudi, Yudi

    2016-01-01

    Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar informasi. Hal ini memungkinkan pihak ketiga menyalahgunakan email untuk mendapatkan informasi secara ilegal dengan mengubah identitas pengirim email dan menjadikannya seperti email yang berasal dari email yang sah (legitimate email), aktivitas tersebut biasa dikenal dengan istilah email spoofing. Untuk dapat mendeteksi adanya email spoofing, maka perlu adanya investigasi forensik email terhadap ...

  3. Universality in few-body systems with large scattering length

    Hammer, H.-W.

    2005-01-01

    Effective Field Theory (EFT) provides a powerful framework that exploits a separation of scales in physical systems to perform systematically improvable, model-independent calculations. Particularly interesting are few-body systems with short-range interactions and large two-body scattering length. Such systems display remarkable universal features. In systems with more than two particles, a three-body force with limit cycle behavior is required for consistent renormalization already at leading order. We will review this EFT and some of its applications in the physics of cold atoms and nuclear physics. In particular, we will discuss the possibility of an infrared limit cycle in QCD. Recent extensions of the EFT approach to the four-body system and N-boson droplets in two spatial dimensions will also be addressed

  4. Combined PACS and intranet information system in a University Hospital

    Heiss, D.; Pfluger, T.; Pfeifer, K.J.; Hahn, K.; Koenig, A.; Endres, S.

    2000-01-01

    Purpose: The Department of Radiology at the University Hospital Innenstadt Munich provides all clinical departments of a large university hospital with several radiology units at different locations. During the last four years all units have been fully digitalized with a stepwise installation of a PACS. The PACS also processes images from the Nuclear Medicine Department. Methods: As image modalities, archive systems and review workstations, we use devices from multiple vendors, which are integrated into a consistent system using the DICOM standard. The hospital has developed its own RIS and an intranet information system, which provides access to all reports and images from radiology for all clinical departments inside the hospital. Additionally, other clinical information such as laboratory results or ECG examinations are available through the system. Results: After one year of operation, the system succeeded in the clinical routine work as the primary source for radiological reports and images as well as for laboratory values. Conclusion: The advantages of digitalization were, besides reduction of film cost, especially optimizations of work flow with access to digital images from every where at any time. (orig.) [de

  5. THE QUALITY MANAGEMENT SYSTEM AT THE UNIVERSITY. PROBLEMS IN IMPLEMENTING

    L. I. Nazina

    2014-01-01

    Full Text Available Summary. Beginning of the XXI century marked the active integration of Russia and the world community, including entry into the world educational space. The international activities of the leading universities of the country depends on the level of cooperation with foreign countries in the field of scientific and educational activities. Today topical issue recognition of the quality of Russian education abroad. One way to confirm this is the certification of the quality management system of the university. As long-term, mostly foreign experience, achieving the required level of quality and continue to improve the most productive is accomplished by implementing a quality management system in accordance with ISO 9000. In the modern system of higher education a lot of attention paid to quality, to ensure the competitiveness of the institution in the education market by training qualified specialists. Implementation of the quality management system is to move the university to process management prepared in accordance with approved and enacted by the QMS documents. Workplaces should determine the duties, powers and responsibilities of each employee within the quality management system, develop and implement the job descriptions, staff verify documented procedures. Implementation of the certification must be accompanied by specific and persistent administration by management in conjunction with the training and retraining of all managers and employees involved in the work on the implementation of the QMS in the organization. This article describes the goals, objectives in the formation and implementation of QMS in higher education arising from this problem and barriers (information, methodological, psychological, multiple ways to address them.

  6. 77 FR 33895 - Universal Service Contribution Methodology; a National Broadband Plan for Our Future

    2012-06-07

    ... contribution system in an effort to promote efficiency, fairness, and sustainability. The Commission seeks... improved; and recovery of universal service contributions from consumers. DATES: Comments are due on or... print, electronic files, audio format), send an email to [email protected] or call the Consumer...

  7. Huria: Journal of the Open University of Tanzania - Vol 18, No 1 (2014)

    Huria: Journal of the Open University of Tanzania. ... Convergence of Distance Education and Conventional Learning: ... Challenges of Implementing Quality Assurance Systems in Blended Learning in Uganda: ... Learning Programmes: A Case Study of the Institute of Adult Education · EMAIL FULL TEXT EMAIL FULL TEXT

  8. E-Mail Server and Traffic Control Management in 2012

    Cosmin Catalin Olteanu

    2012-12-01

    Full Text Available Emails represents one of the most used communication system in world wide web for more than 15 years and “spam” messages are one of the most annoying and disturbing phenomena. All of us are aware that online marketers are trying to transmit their advertising messages to as many addresses they can. For such “unwanted” messages, adaptive systems must be assembled to review and mark what is wright and what is bad. Always these systems must adapt to consumers preferences to mark only that messages that are not in his white list. Surveys for more than 3000000 messages showed me that some criteria can be defined by start.

  9. Computer network access to scientific information systems for minority universities

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  10. The Researches on Food Traceability System of University takeout

    lu, Jia xin; zhao, Ce; li, Zhuang zhuang; shao, Zi rong; pi, Kun yi

    2018-06-01

    In recent years, campus takeaway has developed rapidly, and all kinds of online ordering platforms are running. The problem of distribution in the campus can not only save the time cost of the businessmen, but also guarantee the effective management of the school, which is beneficial to the construction of the standard health system for the takeout. But distribution according to the existing mode will cause certain safety and health risks. The establishment of the University takeaway food traceability system can solve this problem. This paper first analyzes the sharing mode and distribution process of campus takeaway, and then designs the intelligent tracing system for the campus takeaway; the construction of the food distribution information platform and the problem of the recycling of the green environment of the dining box. Finally, the intelligent tracing system of the school takeout is analyzed with the braised chicken as an example.

  11. The Researches on Food Traceability System of University takeout

    lu Jia xin

    2018-01-01

    Full Text Available In recent years, campus takeaway has developed rapidly, and all kinds of online ordering platforms are running. The problem of distribution in the campus can not only save the time cost of the businessmen, but also guarantee the effective management of the school, which is beneficial to the construction of the standard health system for the takeout. But distribution according to the existing mode will cause certain safety and health risks. The establishment of the University takeaway food traceability system can solve this problem. This paper first analyzes the sharing mode and distribution process of campus takeaway, and then designs the intelligent tracing system for the campus takeaway; the construction of the food distribution information platform and the problem of the recycling of the green environment of the dining box. Finally, the intelligent tracing system of the school takeout is analyzed with the braised chicken as an example.

  12. Expert System for Quality Assessment in "Tibiscus" University

    Catalin Tuican

    2008-01-01

    Full Text Available The periodical evaluation of the teaching staff in „Tibiscus” University bases on the specifications of The Romanian Agency for Quality Assurance in Higher Education (Agenţia Română de Asigurare a Calităţii în Învăţământul Superior, ARACIS namely : „The quality of the teaching and researching staff The universities must dispose of teaching staff which, as number and functional base, must be correctly allocated to the total number of students, depending on the study domain, and regarding the qualifications it must depend on the specific of the study program and the proposed quality objectives.” This paper presents the implementation of an expert system, offering to the students the possibility to perform the evaluation in a modern way and to the evaluation committee a quick access to all necessary data.

  13. A Universal Motor Performance Test System Based on Virtual Instrument

    Wei Li

    2014-09-01

    Full Text Available With the development of technology universal motors play a more and more important role in daily life and production, they have been used in increasingly wide field and the requirements increase gradually. How to control the speed and monitor the real-time temperature of motors are key issues. The cost of motor testing system based on traditional technology platform is very high in many reasons. In the paper a universal motor performance test system which based on virtual instrument is provided. The system achieves the precise control of the current motor speed and completes the measurement of real-time temperature of motor bearing support in order to realize the testing of general-purpose motor property. Experimental result shows that the system can work stability in controlling the speed and monitoring the real-time temperature. It has advantages that traditional using of SCM cannot match in speed, stability, cost and accuracy aspects. Besides it is easy to expand and reconfigure.

  14. Systems for the management of information in a university context: an investigation of user need. Information systems, Universities, Information strategy

    Marcella R.

    2004-01-01

    Full Text Available The accessibility, reliability, consistency, and relevance of data underpinning information systems are crucial to its use and effectiveness in a university setting. This article reports on the findings of a research project carried out at a new university, which highlighted the role information plays in the success of the operation and in allowing the institution to evolve and meet the challenges posed by the government, students and other stakeholders. Data were gathered from the academic and administrative staff of the university through interviews with senior managers, and a Web-based questionnaire completed by 863 respondents (a 47.9% response rate. The project aimed to explore data and information activities supporting management and strategic decision making in a new university. Project results indicate that there are real deficiencies in the realization of the case institution's information strategy and that these deficiencies must be addressed in developments focusing on improving strategic effectiveness in the future. Particular issues identified included the lack of clarity in responsibility regarding information and concerns about the validity of much of the internally created and maintained data.

  15. Universality classes and critical phenomena in confined liquid systems

    A.V. Chalyi

    2013-06-01

    Full Text Available It is well known that the similar universal behavior of infinite-size (bulk systems of different nature requires the same basic conditions: space dimensionality; number components of order parameter; the type (short- or long-range of the intermolecular interaction; symmetry of the fluctuation part of thermodynamical potential. Basic conditions of similar universal behavior of confined systems needs the same supplementary conditions such as the number of monolayers for a system confinement; low crossover dimensionality, i.e., geometric form of restricted volume; boundary conditions on limiting surfaces; physical properties under consideration. This review paper is aimed at studying all these conditions of similar universal behavior for diffusion processes in confined liquid systems. Special attention was paid to the effects of spatial dispersion and low crossover dimensionality. This allowed us to receive receiving correct nonzero expressions for the diffusion coefficient at the critical point and to take into account the specific geometric form of the confined liquid volume. The problem of 3D⇔2D dimensional crossover was analyzed. To receive a smooth crossover for critical exponents, the Kawasaki-like approach from the theory of mode coupling in critical dynamics was proposed. This ensured a good agreement between data of computer experiment and theoretical calculations of the size dependence of the critical temperature Tc(H of water in slitlike pores. The width of the quasi-elastic scattering peak of slow neutrons near the structural phase transition in the aquatic suspensions of plasmatic membranes (mesostructures with the typical thickness up to 10 nm was studied. It was shown that the width of quasi-elastic peak of neutron scattering decreases due to the process of cell proliferation, i.e., with an increase of the membrane size (including the membrane thickness. Thus, neutron studies could serve as an additional diagnostic test for the

  16. Digital Literacies and Generational Micro-Cultures: Email Feedback in Lebanon

    De Coursey, Christina; Dandashly, Nadine

    2015-01-01

    This study reports on the introduction of email feedback, in a private university in Lebanon with marked generational differences and a traditional instructor culture focused on grammar correction. The instructor profile showed insufficient ELT training and a disjuncture between those with low and those with long service. Instructors were trained,…

  17. Becoming Known through Email: A Case of Woman, Leadership, and an Awfully Familiar Strange Land

    Drake, Pat

    2015-01-01

    This project explores women and educational leadership from the perspective of an individual who moved from the UK to Australia in order to take up the position of Dean of an education grouping in a university. Emails sent by the Dean to the group are analysed after nine months in post and categorised according to the requirements of the position…

  18. A universal DNA-based protein detection system.

    Tran, Thua N N; Cui, Jinhui; Hartman, Mark R; Peng, Songming; Funabashi, Hisakage; Duan, Faping; Yang, Dayong; March, John C; Lis, John T; Cui, Haixin; Luo, Dan

    2013-09-25

    Protein immune detection requires secondary antibodies which must be carefully selected in order to avoid interspecies cross-reactivity, and is therefore restricted by the limited availability of primary/secondary antibody pairs. Here we present a versatile DNA-based protein detection system using a universal adapter to interface between IgG antibodies and DNA-modified reporter molecules. As a demonstration of this capability, we successfully used DNA nano-barcodes, quantum dots, and horseradish peroxidase enzyme to detect multiple proteins using our DNA-based labeling system. Our system not only eliminates secondary antibodies but also serves as a novel method platform for protein detection with modularity, high capacity, and multiplexed capability.

  19. Helping Students with Cognitive Disabilities Improve Social Writing Skills through Email Modeling and Scaffolding

    Wang, Xiao-lei; Eberhard, Dominique; Voron, Mike; Bernas, Ronan

    2016-01-01

    The purpose of this study is to examine the effects of email modeling and scaffolding on the social writing quality of students with cognitive disabilities. Ten students from a university-affiliated lab school (mean age = 19.3; SD = 1.2) with an average of IQ of 55.30 (SD = 5.98) and 10 teacher candidates in a university teacher education…

  20. Universality of emergent states in diverse physical systems

    Guidry, Mike

    2017-12-01

    Our physics textbooks are dominated by examples of simple weakly-interacting microscopic states, but most of the real world around us is most effectively described in terms of emergent states that have no clear connection to simple textbook states. Emergent states are strongly-correlated and dominated by properties that emerge as a consequence of interactions and are not part of the description of the corresponding weakly-interacting system. This paper proposes a connection of weakly-interacting textbook states and realistic emergent states through fermion dynamical symmetries having fully-microscopic generators of the emergent states. These imply unique truncation of the Hilbert space for the weakly-interacting system to a collective subspace where the emergent states live. Universality arises because the possible symmetries under commutation of generators, which transcend the microscopic structure of the generators, are highly restricted in character and determine the basic structure of the emergent state, with the microscopic structure of the generators influencing emergent state only parametrically. In support of this idea we show explicit evidence that high-temperature superconductors, collective states in heavy atomic nuclei, and graphene quantum Hall states in strong magnetic fields exhibit a near-universal emergent behavior in their microscopically-computed total energy surfaces, even though these systems share essentially nothing in common at the microscopic level and their emergent states are characterized by fundamentally different order parameters.

  1. A universal approach to the study of nonlinear systems

    Hwa, Rudolph C.

    2004-07-01

    A large variety of nonlinear systems have been treated by a common approach that emphasizes the fluctuation of spatial patterns. By using the same method of analysis it is possible to discuss the chaotic behaviors of quark jets and logistic map in the same language. Critical behaviors of quark-hadron phase transition in heavy-ion collisions and of photon production at the threshold of lasing can also be described by a common scaling behavior. The universal approach also makes possible an insight into the recently discovered phenomenon of wind reversal in cryogenic turbulence as a manifestation of self-organized criticality.

  2. Research on the Teaching System of the University Computer Foundation

    Ji Xiaoyun

    2016-01-01

    Full Text Available Inonal students, the teaching contents, classification, hierarchical teaching methods with the combination of professional level training, as well as for top-notch students after class to promote comprehensive training methods for different students, establish online Q & A, test platform, to strengthen the integration professional education and computer education and training system of college computer basic course of study and exploration, and the popularization and application of the basic programming course, promote the cultivation of university students in the computer foundation, thinking methods and innovative practice ability, achieve the goal of individualized educ the College of computer basic course teaching, the specific circumstances of the need for students, professiation.

  3. Email communication at the medical primary–secondary care interface: a qualitative exploration

    Sampson, Rod; Barbour, Rosaline; Wilson, Philip

    2016-01-01

    Background There is little published research into the influence of email communication between primary and secondary care clinicians on patient care. Aim To explore the use of email communication between clinicians across the primary– secondary care interface, and how this may relate to patient care. Design and setting A qualitative study involving primary and secondary care services in the NHS Highland Health Board area, Scotland. Ten GPs and 12 hospital consultants were purposively sampled to reflect diversity. Method Eligible clinicians were invited to take part in a semi-structured interview. Data were analysed using a thematic analysis approach. Results Key themes that emerged for clinicians included general perceptions of email; using email in practice (managing workload, impact on patient journeys, and ‘quick answers’); system issues (variability and governance); relational aspects; and email skills. Conclusion Email communication between primary and secondary care clinicians generally has a positive impact on patient access to specialist expertise. Governance issues around the use of clinical email need to be defined. There may currently be a two-tier health service for those patients (and their GPs) requiring ‘quick answers’. PMID:27162209

  4. Email communication at the medical primary-secondary care interface: a qualitative exploration.

    Sampson, Rod; Barbour, Rosaline; Wilson, Philip

    2016-07-01

    There is little published research into the influence of email communication between primary and secondary care clinicians on patient care. To explore the use of email communication between clinicians across the primary- secondary care interface, and how this may relate to patient care. A qualitative study involving primary and secondary care services in the NHS Highland Health Board area, Scotland. Ten GPs and 12 hospital consultants were purposively sampled to reflect diversity. Eligible clinicians were invited to take part in a semi-structured interview. Data were analysed using a thematic analysis approach. Key themes that emerged for clinicians included general perceptions of email; using email in practice (managing workload, impact on patient journeys, and 'quick answers'); system issues (variability and governance); relational aspects; and email skills. Email communication between primary and secondary care clinicians generally has a positive impact on patient access to specialist expertise. Governance issues around the use of clinical email need to be defined. There may currently be a two-tier health service for those patients (and their GPs) requiring 'quick answers'. © British Journal of General Practice 2016.

  5. A new external microbeam system in Fudan University

    Zheng, Y.; Shen, H.; Li, Y.Q.; Li, X.Y.; Yang, M.J.; Mi, Y.

    2013-01-01

    A cost-effective and removable external beam system is set up based on the Oxford Microbeam system in Fudan University. In our external beam system, 7.5-μm-thick Kapton film is used as exit window with a diameter of 3.5 mm. The spatial resolution is about 18 μm full width at half maximum (FWHM) on a copper grid. As an example, calcium distribution in otolith is present by the external micro-PIXE. In addition, little change can be done to the external system mentioned above for radiobiology experiments. The exit window can be changed from the focal plane to the observation window of vacuum chamber. By calculation, the beam spot size can reach less than 30 μm. Since the Oxford type octagonal target chamber is popular among the nuclear microprobe facilities, this method can be provided to easily replace the in-vacuum system with the external system, extending the in-vacuum analysis to external beam analysis

  6. A new external microbeam system in Fudan University

    Zheng, Y.; Shen, H., E-mail: haoshen@fudan.edu.cn; Li, Y.Q.; Li, X.Y.; Yang, M.J.; Mi, Y.

    2013-07-01

    A cost-effective and removable external beam system is set up based on the Oxford Microbeam system in Fudan University. In our external beam system, 7.5-μm-thick Kapton film is used as exit window with a diameter of 3.5 mm. The spatial resolution is about 18 μm full width at half maximum (FWHM) on a copper grid. As an example, calcium distribution in otolith is present by the external micro-PIXE. In addition, little change can be done to the external system mentioned above for radiobiology experiments. The exit window can be changed from the focal plane to the observation window of vacuum chamber. By calculation, the beam spot size can reach less than 30 μm. Since the Oxford type octagonal target chamber is popular among the nuclear microprobe facilities, this method can be provided to easily replace the in-vacuum system with the external system, extending the in-vacuum analysis to external beam analysis.

  7. A new external microbeam system in Fudan University

    Zheng, Y. [Applied Ion Beam Physics Laboratory, Institute of Modern Physics, Fudan University, Shanghai 200433 (China); Shen, H., E-mail: haoshen@fudan.edu.cn [Applied Ion Beam Physics Laboratory, Institute of Modern Physics, Fudan University, Shanghai 200433 (China); Li, Y.Q.; Li, X.Y.; Yang, M.J.; Mi, Y. [Applied Ion Beam Physics Laboratory, Institute of Modern Physics, Fudan University, Shanghai 200433 (China)

    2013-02-01

    A cost-effective and removable external beam system is set up based on the Oxford Microbeam system in Fudan University. In our external beam system, 7.5-μm-thick Kapton film is used as exit window with a diameter of 3.5 mm. The spatial resolution is about 18 μm full width at half maximum (FWHM) on a copper grid. As an example, calcium distribution in otolith is present by the external micro-PIXE. In addition, little change can be done to the external system mentioned above for radiobiology experiments. The exit window can be changed from the focal plane to the observation window of vacuum chamber. By calculation, the beam spot size can reach less than 30 μm. Since the Oxford type octagonal target chamber is popular among the nuclear microprobe facilities, this method can be provided to easily replace the in-vacuum system with the external system, extending the in-vacuum analysis to external beam analysis.

  8. Scientific and Ethical Reflections on Academic Corruption in Universities: On the Science Research Evaluation System in China's Universities

    Xiaochun, Wu; Dan, Jia

    2007-01-01

    A study of the science research activities in China's institutions of higher learning in recent years indicates that there is a major connection between the current instances of corruption in scientific research at colleges and universities and the evaluations system for scientific research implemented at many of the colleges and universities.…

  9. Competing health policies: insurance against universal public systems

    Asa Ebba Cristina Laurell

    2016-01-01

    Full Text Available Objectives: This article analyzes the content and outcome of ongoing health reforms in Latin America: Universal Health Coverage with Health Insurance, and the Universal and Public Health Systems. It aims to compare and contrast the conceptual framework and practice of each and verify their concrete results regarding the guarantee of the right to health and access to required services. It identifies a direct relationship between the development model and the type of reform. The neoclassical-neoliberal model has succeeded in converting health into a field of privatized profits, but has failed to guarantee the right to health and access to services, which has discredited the governments. The reform of the progressive governments has succeeded in expanding access to services and ensuring the right to health, but faces difficulties and tensions related to the permanence of a powerful, private, industrial-insurance medical complex and persistence of the ideologies about medicalized 'good medicine'. Based on these findings, some strategies to strengthen unique and supportive public health systems are proposed.

  10. Four-level systems and a universal quantum gate

    Baldiotti, M.C.; Gitman, D.M. [Instituto de Fisica, Universidade de Sao Paulo, Sao Paulo, S.P. (Brazil)

    2008-07-15

    We discuss the possibility of implementing a universal quantum XOR gate by using two coupled quantum dots subject to external magnetic fields that are parallel and slightly different. We consider this system in two different field configurations. In the first case, parallel external fields with the intensity difference at each spin being proportional to the time-dependent interaction between the spins. A general exact solution describing this system is presented and analyzed to adjust field parameters. Then we consider parallel fields with intensity difference at each spin being constant and the interaction between the spins switching on and off adiabatically. In both cases we adjust characteristics of the external fields (their intensities and duration) in order to have the parallel pulse adequate for constructing the XOR gate. In order to provide a complete theoretical description of all the cases, we derive relations between the spin interaction, the inter-dot distance, and the external field. (Abstract Copyright [2008], Wiley Periodicals, Inc.)

  11. Anticipating hidden text salting in emails (extended abstract)

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  12. Using Rhythms of Relationships to Understand Email Archives

    Perer, Adam; Shneiderman, Ben; Oard, Douglas W

    2005-01-01

    ...: analyzing the temporal rhythms of social relationships. We provide methods for constructing meaningful rhythms from the email headers by identifying relationships and interpreting their attributes. With these visualization techniques, email archive explorers can uncover insights that may have been otherwise hidden in the archive. We apply our methods to an individual's fifteen-year email archive, which consists of about 45,000 messages and over 4,000 relationships.

  13. Are You Managing Your Email - Or is Email Managing You? An Analysis of Email Among Personnel Within Army Project Management Offices

    Baroni, Brian; Cook, Linda; Keitelman, Marian; Miller, Steven; Wardle, Adelia

    2005-01-01

    Based on a class project that developed leadership communication competencies for seven levels of Army civilians, email was found to be the most prevalent means of communication, regardless of leadership level...

  14. PENGIRIMAN E-MAIL SPAM SEBAGAI KEJAHATAN CYBER DI INDONESIA

    Eka Nugraha Putra

    2018-01-01

    Full Text Available The Internet is part of the development of technology, where the internet provides many impacts, both positive and negative. Currently, privacy issues on the internet have also become a complicated legal issue, this is due to quite a number of privacy-related issues, but not all countries in the world manage privacy issues on the internet. As a means of communicating the Internet has introduced e-mail that provides convenience and practicality. But in its development e-mail has an adverse impact on its users in the form of e-mail spam. In terms of its actions, sending spam e-mail is quite a disadvantage, even violate the privacy. Some countries have also set it to one type of cybercrime (cybercrime. This research will discuss e-mail spam in Indonesia, how the legislation in Indonesia see the action of this spam e-mail, is there any possibility of spam e-mail is criminalized as a cybercrime. The research will also look at how spam e-mails violate privacy and review and analyze internet privacy settings in Indonesia in relation to the criminalization of spam email.

  15. Decisional style, mood and work communication: email diaries.

    Shirren, S; Phillips, J G

    2011-10-01

    To understand the use of technology to support interpersonal interaction, a theory of decisional style was applied to email use within the workplace. Previous research has used self-report and rating scales to address employee email behaviours, but this falls short of management's capability to monitor the actual behaviour. Thirty-nine employed individuals completed a five-day communication diary recording their actual behaviour upon receiving personal and work-related emails as well as the Melbourne Decision Making Questionnaire and the Depression Anxiety Stress Scales. It was found that vigilant individuals were more likely to use email in an efficient manner by deleting personal email and being less likely to open email later. Procrastinators, buckpassers and people experiencing high levels of negative affect were all more likely to delay dealing with email, which could be viewed as dealing with email in a less efficient manner. STATEMENT OF RELEVANCE: This work offers insights as to how people receive and process emails and is thus relevant to the development and implementation of collaborative technologies. Whilst other studies use individual's self-reports, this study uses a more accurate communication diary. Decisional style can predict the monitoring and response to electronic communication.

  16. SCORPION II persistent surveillance system with universal gateway

    Coster, Michael; Chambers, Jonathan; Brunck, Albert

    2009-05-01

    This paper addresses improvements and benefits derived from the next generation Northrop Grumman SCORPION II family of persistent surveillance and target recognition systems produced by the Xetron campus in Cincinnati, Ohio. SCORPION II reduces the size, weight, and cost of all SCORPION components in a flexible, field programmable system that is easier to conceal, backward compatible, and enables integration of over forty Unattended Ground Sensor (UGS) and camera types from a variety of manufacturers, with a modular approach to supporting multiple Line of Sight (LOS) and Beyond Line of Sight (BLOS) communications interfaces. Since 1998 Northrop Grumman has been integrating best in class sensors with its proven universal modular Gateway to provide encrypted data exfiltration to Common Operational Picture (COP) systems and remote sensor command and control. In addition to being fed to COP systems, SCORPION and SCORPION II data can be directly processed using a common sensor status graphical user interface (GUI) that allows for viewing and analysis of images and sensor data from up to seven hundred SCORPION system Gateways on single or multiple displays. This GUI enables a large amount of sensor data and imagery to be used for actionable intelligence as well as remote sensor command and control by a minimum number of analysts.

  17. Howard University Energy Expert Systems Institute Summer Program (EESI)

    Momoh, James A.; Chuku, Arunsi; Abban, Joseph

    1996-01-01

    Howard University, under the auspices of the Center for Energy Systems and Controls runs the Energy Expert Systems Institute (EESI) summer outreach program for high school/pre-college minority students. The main objectives are to introduce precollege minority students to research in the power industry using modern state-of-the-art technology such as Expert Systems, Fuzzy Logic and Artificial Neural Networks; to involve minority students in space power management, systems and failure diagnosis; to generate interest in career options in electrical engineering; and to experience problem-solving in a teamwork environment consisting of faculty, senior research associates and graduate students. For five weeks the students are exposed not only to the exciting experience of college life, but also to the inspiring field of engineering, especially electrical engineering. The program consists of lectures in the fundamentals of engineering, mathematics, communication skills and computer skills. The projects are divided into mini and major. Topics for the 1995 mini projects were Expert Systems for the Electric Bus and Breast Cancer Detection. Topics on the major projects include Hybrid Electric Vehicle, Solar Dynamics and Distribution Automation. On the final day, designated as 'EESI Day' the students did oral presentations of their projects and prizes were awarded to the best group. The program began in the summer of 1993. The reaction from the students has been very positive. The program also arranges field trips to special places of interest such as the NASA Goddard Space Center.

  18. Universe

    2009-01-01

    The Universe, is one book in the Britannica Illustrated Science Library Series that is correlated to the science curriculum in grades 5-8. The Britannica Illustrated Science Library is a visually compelling set that covers earth science, life science, and physical science in 16 volumes.  Created for ages 10 and up, each volume provides an overview on a subject and thoroughly explains it through detailed and powerful graphics-more than 1,000 per volume-that turn complex subjects into information that students can grasp.  Each volume contains a glossary with full definitions for vocabulary help and an index.

  19. Norfolk State University Research Experience in Earth System Science

    Chaudhury, Raj

    2002-01-01

    The truly interdisciplinary nature of Earth System Science lends itself to the creation of research teams comprised of people with different scientific and technical backgrounds. In the annals of Earth System Science (ESS) education, the lack of an academic major in the discipline might be seen as a barrier to the involvement of undergraduates in the overall ESS-enterprise. This issue is further compounded at minority-serving institutions by the rarity of departments dedicated to Atmospheric Science, Oceanography or even the geosciences. At Norfolk State University, a Historically Black College, a six week, NASA-supported, summer undergraduate research program (REESS - Research Experience in Earth System Science) is creating a model that involves students with majors in diverse scientific disciplines in authentic ESS research coupled with a structured education program. The project is part of a wider effort at the University to enhance undergraduate education by identifying specific areas of student weaknesses regarding the content and process of science. A pre- and post-assessment test, which is focused on some fundamental topics in global climate change, is given to all participants as part of the evaluation of the program. Student attitudes towards the subject and the program's approach are also surveyed at the end of the research experience. In 2002, 11 undergraduates participated in REESS and were educated in the informed use of some of the vast remote sensing resources available through NASA's Earth Science Enterprise (ESE). The program ran from June 3rd through July 12, 2002. This was the final year of the project.

  20. DEVELOPMENT OF THE LEVEL INDICES SYSTEM OF UNIVERSITY INTERNATIONALIZATION

    Artem R. Denisov

    2015-01-01

    Full Text Available The aim of the investigation is to show possible variants of audit in the higher educational institution while processes of internationalisation (procedures of definition of its level; to find out an estimation method of the received results in the given sphere.Methods. The methods involve comparative analysis, synthesis, range and systematization of information concerning the discussed problem.Results and scientific novelty. The necessity of universities participating in internationalization processes is proved. Existing approaches to internationalization evaluation levels are reviewed, as well as best practices for each criterion. Level indicators of considered process are proposed due to summarising the results of the given review, and also as a result of the coordination of criteria NAFSA and authors’ system of indicators: international programs supporting by a university administration, curricular changes, faculty involving into international research, faculty involving into teaching process, students participation, abroad study support, international students and teachers support. The research demonstrates that to improve the adequacy the system of indicators has to be supplemented with some indicators to evaluate the conformity of a university’s internationalization to its mission; the conformity of a university’s internationalization to the government geopolitics; extracurricular activities of students; cultural aspects of internationalization including communication with local ethnical groups; attractiongetting mechanisms for international students.Practical significance. The proposed system of indicators can be used for an estimation of high school development in internationalisation sphere, and under certain correction and improvement for efficiency definition of development of its academic divisions in the given field.

  1. Reaching consumers: How the tobacco industry uses email marketing.

    Brock, Betsy; Carlson, Samantha C; Moilanen, Molly; Schillo, Barbara A

    2016-12-01

    Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the state of Minnesota, US between January 2010 and May 2015 to determine email frequency by brand. These emails were gathered as part of ongoing surveillance of tobacco industry direct marketing. A subset of these emails received between October 2014 and May 2015 (n = 1646) were content analyzed to identify the purpose of the email communication along with type of product promoted. Tobacco companies use email to communicate with consumers on a regular basis. This communication was observed to be as frequent as nine times per month. Emails are most commonly used to promote contests (54.1%), content on tobacco company websites (39.1%), and tobacco coupons (15.7%). Email promotion of menthol-flavored tobacco products was common and was associated with promotion of coupons. Emails promoting menthol had a 1.9 times higher prevalence of also promoting coupons (95% CI: 1.52-2.37). Little is known about tobacco company email marketing and this study fills an identified research gap. A deeper understanding of this type of marketing is needed in order to counter tobacco industry messaging and advance tobacco control.

  2. Reaching consumers: How the tobacco industry uses email marketing

    Betsy Brock

    2016-12-01

    Full Text Available Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the state of Minnesota, US between January 2010 and May 2015 to determine email frequency by brand. These emails were gathered as part of ongoing surveillance of tobacco industry direct marketing. A subset of these emails received between October 2014 and May 2015 (n = 1646 were content analyzed to identify the purpose of the email communication along with type of product promoted. Tobacco companies use email to communicate with consumers on a regular basis. This communication was observed to be as frequent as nine times per month. Emails are most commonly used to promote contests (54.1%, content on tobacco company websites (39.1%, and tobacco coupons (15.7%. Email promotion of menthol-flavored tobacco products was common and was associated with promotion of coupons. Emails promoting menthol had a 1.9 times higher prevalence of also promoting coupons (95% CI: 1.52–2.37. Little is known about tobacco company email marketing and this study fills an identified research gap. A deeper understanding of this type of marketing is needed in order to counter tobacco industry messaging and advance tobacco control.

  3. Exploring Synthetic and Systems Biology at the University of Edinburgh.

    Fletcher, Liz; Rosser, Susan; Elfick, Alistair

    2016-06-15

    The Centre for Synthetic and Systems Biology ('SynthSys') was originally established in 2007 as the Centre for Integrative Systems Biology, funded by the Biotechnology and Biological Sciences Research Council (BBSRC) and the Engineering and Physical Sciences Research Council (EPSRC). Today, SynthSys embraces an extensive multidisciplinary community of more than 200 researchers from across the University with a common interest in synthetic and systems biology. Our research is broad and deep, addressing a diversity of scientific questions, with wide ranging impact. We bring together the power of synthetic biology and systems approaches to focus on three core thematic areas: industrial biotechnology, agriculture and the environment, and medicine and healthcare. In October 2015, we opened a newly refurbished building as a physical hub for our new U.K. Centre for Mammalian Synthetic Biology funded by the BBSRC/EPSRC/MRC as part of the U.K. Research Councils' Synthetic Biology for Growth programme. © 2016 The Author(s). published by Portland Press Limited on behalf of the Biochemical Society.

  4. Vacuum system of tandem type electrostatic accelerator of Kyushu University

    Nakajima, Yutaka

    1981-01-01

    In the tandem type electrostatic accelerator of Kyushu University, the problem of vacuum in the beam transport system including the accelerator tube has been considered as one of the important elements for the performance of the electrostatic accelerator from the beginning of construction. Though the three-stage tandem accelerating scheme was considered as the beam transport system at the beginning of the program, in which the existing 6 MV Van de Graaf accelerator was to be used as the injector, three types of ion sources are prepared at present; the sputter ion source to generate negative heavy ions, the polarizing ion source to generate negative polarized protons or deuterons, and direct extraction type negative ion source. Ultrahigh evacuating system, in which the sputter ion pump is mainly employed, and the turbo-molecular pump is used supplementarily, was installed in the vacuum system. The vacuum of approximately 10 - 9 Torr level off-beam at the inlet or outlet of the accelerator tube and approximately 10 - 8 Torr level in the tubing section in the center terminal were achieved. Since the upper limit of withstand voltage of the accelerating tube was not able to be satisfied for the insufficient baking at the beginning, it was finally decided that the accelerating tube should be heated by directly supplying power to the electrode through low voltage discharge in the tube. This method enabled the generated voltage at the terminal to exceed 10 MV. (Wakatsuki, Y.)

  5. Virtual Exploration of the Ring Systems Chemical Universe.

    Visini, Ricardo; Arús-Pous, Josep; Awale, Mahendra; Reymond, Jean-Louis

    2017-11-27

    Here, we explore the chemical space of all virtually possible organic molecules focusing on ring systems, which represent the cyclic cores of organic molecules obtained by removing all acyclic bonds and converting all remaining atoms to carbon. This approach circumvents the combinatorial explosion encountered when enumerating the molecules themselves. We report the chemical universe database GDB4c containing 916 130 ring systems up to four saturated or aromatic rings and maximum ring size of 14 atoms and GDB4c3D containing the corresponding 6 555 929 stereoisomers. Almost all (98.6%) of these ring systems are unknown and represent chiral 3D-shaped macrocycles containing small rings and quaternary centers reminiscent of polycyclic natural products. We envision that GDB4c can serve to select new ring systems from which to design analogs of such natural products. The database is available for download at www.gdb.unibe.ch together with interactive visualization and search tools as a resource for molecular design.

  6. World University Ranking Systems: An Alternative Approach Using Partial Least Squares Path Modelling

    Jajo, Nethal K.; Harrison, Jen

    2014-01-01

    University rankings are key drivers in national and institutional strategic planning. The increase in the number of university ranking systems and the diversity of methods and indicators used by these systems necessitate the development of an index that can measure a university's performance in all these systems at once. This article presents…

  7. Universal Behavior of Few-Boson Systems Using Potential Models

    Kievsky, A.; Viviani, M.; Álvarez-Rodríguez, R.; Gattobigio, M.; Deltuva, A.

    2017-01-01

    The universal behavior of a three-boson system close to the unitary limit is encoded in a simple dependence of many observables in terms of few parameters. For example the product of the three-body parameter κ_∗ and the two-body scattering length a, κ_∗a depends on the angle ξ defined by E_3/E_2=tan"2ξ. A similar dependence is observed in the ratio a_A_D/a with a_A_D the boson-dimer scattering length. We use a two-parameter potential to determine this simple behavior and, as an application, to compute a_A_D for the case of three "4He atoms. (author)

  8. The Perceived Helpfulness of Rendering Emotional First Aid via Email

    Gilat, Itzhak; Reshef, Eyal

    2015-01-01

    The present research examined the perceived helpfulness of an increasingly widespread mode of psychological assistance, namely, emotional first aid via email. The sample comprised 62 naturally occurring email interactions between distressful clients and trained volunteers operating within the framework of the Israeli Association for Emotional…

  9. A Discourse Analysis of School Counseling Supervisory E-Mail

    Luke, Melissa; Gordon, Cynthia

    2011-01-01

    This article is a discourse analysis of weekly computer-mediated communications between 8 school counseling interns and their e-mail supervisor over a 16-week semester. Course-required e-mail supervision was provided as an adjunct to traditional face-to-face individual and group supervision. School counselor supervisees and supervisor enacted 3…

  10. Student Perceptions of Peer Credibility Based on Email Addresses

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.; Maier, David J.

    2013-01-01

    The purpose of this study was to evaluate students' perceptions of their peer's credibility based on email addresses. The survey was conducted at a community college in Michigan where all students were registered and actively taking at least one course. The survey results show that a student's selection of an email address does influence other…

  11. Faculty Perceptions of Student Credibility Based on Email Addresses

    Livermore, Jeffrey A.; Wiechowski, Linda S.; Scafe, Marla G.

    2011-01-01

    The purpose of this study was to evaluate faculty perceptions of student credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a student's selection of an email address does influence the…

  12. Student Perceptions of Faculty Credibility Based on Email Addresses

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.

    2010-01-01

    The purpose of this study was to evaluate students' perceptions of faculty credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a faculty member's selection of an email address does…

  13. Instruction and Pragmatic Change during Study Abroad Email Communication

    Alcón-Soler, Eva

    2015-01-01

    The study deals with the effect of instruction and study abroad (SA) on pragmatic knowledge. More specifically, the focus is on gains in explicit knowledge of request mitigators, and whether learners draw on this knowledge when they perform email requests. Email requests produced by 60 Spanish students staying abroad (30 treatment/30 control…

  14. Private E-Mail Requests and the Diffusion of Responsibility.

    Barron, Greg; Yechiam, Eldad

    2002-01-01

    Discussion of e-mail technology and requesting information from multiple sources simultaneously focuses on an experiment demonstrating that addressing e-mails simultaneously to multiple recipients may actually reduce the number of helpful responses. Discusses diffusion of responsibility and implications for the application of social cueing theory…

  15. Technology Corner: Analysing E-mail Headers For Forensic Investigation

    M. Tariq Banday

    2011-06-01

    Full Text Available Electronic Mail (E-Mail, which is one of the most widely used applications of Internet, has become a global communication infrastructure service.  However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions.  A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies of clients and gateways, etc. Cyber forensic e-mail analysis is employed to collect credible evidence to bring criminals to justice. This paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Further, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions.

  16. NASA university program management information system, FY 1985

    1985-01-01

    The University Program Report provides current information and related statistics for approximately 4200 grants/contracts/cooperative agreements active during the reporting period. NASA Field Centers and certain Headquarters Program Offices provide funds for those research and development activities in universities which contribute to the mission needs of that particular NASA element. This annual report is one means of documenting the NASA-University relationship, frequently denoted, collectively, as NASA's University Program.

  17. NASA university program management information system, FY 1994

    1994-01-01

    The University Program report, Fiscal Year 1994, provides current information and related statistics for 7841 grants/contracts/cooperative agreements active during the reporting period. NASA field centers and certain Headquarters program offices provide funds for those activities in universities which contribute to the mission needs of that particular NASA element. This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program.

  18. NASA University Program Management Information System: FY 1995

    1995-01-01

    The University Program Report, Fiscal Year 1995, provides current information and related statistics for grants/contracts/cooperative agreements active during the report period. NASA field centers and certain Headquarters program offices provide funds for those R&D activities in universities which contribute to the mission needs of that particular NASA element. This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program.

  19. NASA university program management information system, FY 1986

    1986-01-01

    The University Program Report provides current information and related statistics for approximately 4300 grants/contracts/cooperative agreements active during the report period. NASA Field centers and certain Headquarters Program Offices provide funds for those R&D activities in universities which contribute to the mission needs of that particular NASA element. This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program.

  20. NASA University program management information system, FY 1993

    1993-01-01

    The University Program Report, Fiscal Year 1993, provides current information and related statistics for 7682 grants/contracts/cooperative agreements active during the report period. NASA field centers and certain Headquarters program offices provide funds for those R&D activities in universities which contribute to the mission needs of that particular NASA element. This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program.

  1. The University of Missouri Research Reactor facility can melter system

    Edwards, C.B. Jr.; Olson, O.L.; Stevens, R.; Brugger, R.M.

    1987-01-01

    At the University of Missouri Research Reactor (MURR), a waste compacting system for reducing the volume of radioactive aluminum cans has been designed, built and put into operation. In MURR's programs of producing radioisotopes and transmutation doping of silicon, a large volume of radioactive aluminum cans is generated. The Can Melter System (CMS) consists of a sorting station, a can masher, an electric furnace and a gas fired furnace. This system reduces the cans and other radioactive metal into barrels of solid metal close to theoretical density. The CMS has been in operation at the MURR now for over two years. Twelve hundred cu ft of cans and other metals have been reduced into 150 cu ft of shipable waste. The construction cost of the CMS was $4950.84 plus 1680 man hours of labor, and the operating cost of the CMS is $18/lb. The radiation exposure to the operator is 8.6 mR/cu ft. The yearly operating savings is $30,000. 20 figs., 10 tabs

  2. Detection of Fraudulent Emails by Employing Advanced Feature Abundance

    Nizamani, Sarwat; Memon, Nasrullah; Glasdam, Mathies

    2014-01-01

    In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email detection rate. The different types of features...... are incorporated step by step. The detection of fraudulent email has been considered as a classification problem and it is evaluated using various state-of-the art algorithms and on CCM [1] which is authors' previous cluster based classification model. The experiments have been performed on diverse feature sets...... and the different classification methods. The comparison of the results is also presented and the evaluations shows that for the fraudulent email detection tasks, the feature set is more important regardless of classification method. The results of the study suggest that the task of fraudulent emails detection...

  3. Universal Authenticated Item Monitoring System (AIMS) second generation equipment

    Schoeneman, J.L.; Baumann, M.J.; Fox, L.J.; Jenkins, C.D.; Perlinsk, A.W.

    1992-01-01

    Sandia National Laboratories (SNL) is in the final stages of developing a Universal Authenticated Item Monitoring System (AIMS). When completed, AIMS will provide applicable agencies in the US government, and those in the International arena, with a secure and convenient method of monitoring the physical status of selected items. The benefit derived from this development activity will be the commercial availability of an item monitoring system with the capability for ''quick set-up'' monitoring, as well as long-term unattended monitoring. The AIMS includes a variety of sensors, a robust and authenticated radio frequency (RF) communication link, a Receiver Processing Unit (RPU), and an inspector-friendly personal computer (PC) interface for collecting, sorting, viewing and archiving pertinent event histories. The system will provide the capability to monitor selected items in a real-time mode, a remotely interrogated mode, and a stand-alone, unattended data collection mode. The sensor suite under development includes advanced motion sensors, interior volumetric intrusion sensors, Re-usable, In-situ Verifiable Authenticated (RIVA) fiber-optic seal sensors, generic utility sensors (to accommodate contact closure inputs), and radiation and environmental sensors. A new generation authentication algorithm recently has been developed that provides a high degree of system security 121. The AIMS has potential safeguards applications in the areas of arms control and treaty verification military asset control, International Atomic Energy Agency (IAEA) and Euratom safeguards verification activities, as well as domestic nuclear safeguard activities. Commercial applications could include high-value inventory control and security systems. This paper describes the second-generation AIMS along with its recently expanded sensor suite and enhanced data collection capabilities

  4. Legal and policy issues associated with monitoring employee E-mail

    Segura, M.A.; Rither, A.C.

    1997-01-01

    This paper examines the legal issues involved with employer monitoring of employee e-mail. In addition to identifying pertinent legal issues, the paper provides guidelines that will help the Pacific Northwest National Laboratory (PNNL) establish a program for monitoring outgoing e-mail to insure compliance with company policies, particularly those regarding protection of trade secrets and proprietary information, and to comply with the Department of Energy`s (DOE) procedures for protecting Export Controlled Information (ECI). Electronic communication has allowed companies to enhance efficiency, responsiveness and effectiveness. E-mail allows employees to transmit all types of data to other individuals inside and outside of their companies. The ease with which information can be transmitted by e-mail has placed trade secrets, proprietary information, and other sensitive data at risk from inadvertent disclosure by employees. As employers attempt to protect their interests through measures such as monitoring e-mail, they may expose themselves to liability under federal and state laws for violating employee privacy. Business use of e-mail has proliferated so rapidly that the federal and state legal systems have not been able to adequately address the issues arising out of its use in the workplace.

  5. Save our inboxes! Use e-mail wisely

    Achintya Rao

    2013-01-01

    At CERN, with collaborators all over the world, e-mail is inevitably the primary means of communication: we use it for everything from coordinating projects to organising lunches. But e-mail can also be one of the most inefficient means of communication we have! Here's how to fix it.   Let’s get straight to the point: we receive too many e-mails. Think about all the e-mails that you deleted without a second thought. Think about the times you’ve unnecessarily been in CC. Take a look at the unread e-mails sitting in your inbox at this very moment, ones that you have no intention of ever looking at. You can, however, tame this overload with a few simple measures and turn e-mail into an important communication and productivity tool. Many recommendations for improving e-mail etiquette suggest an abrasive approach riddled with bullet points. In a vastly multi-cultural setting such as CERN, however this approach may fail. So, here are a few dos and don’ts based o...

  6. 77 FR 56212 - Federal Acquisition Regulation; Information Collection; Use of Data Universal Numbering System...

    2012-09-12

    ...; Information Collection; Use of Data Universal Numbering System (DUNS) as Primary Contractor Identification... ``Information Collection 9000-0145, Use of Data Universal Numbering System (DUNS) as Primary Contractor... extension of a previously approved information collection requirement concerning use of the Data Universal...

  7. Adaptive Robotic Systems Design in University of Applied Sciences

    Gunsing Jos

    2016-01-01

    Full Text Available In the industry for highly specialized machine building (small series with high variety and high complexity and in healthcare a demand for adaptive robotics is rapidly coming up. Technically skilled people are not always available in sufficient numbers. A lot of know how with respect to the required technologies is available but successful adaptive robotic system designs are still rare. In our research at the university of applied sciences we incorporate new available technologies in our education courses by way of research projects; in these projects students will investigate the application possibilities of new technologies together with companies and teachers. Thus we are able to transfer knowledge to the students including an innovation oriented attitude and skills. Last years we developed several industrial binpicking applications for logistics and machining-factories with different types of 3D vision. Also force feedback gripping has been developed including slip sensing. Especially for healthcare robotics we developed a so-called twisted wire actuator, which is very compact in combination with an underactuated gripper, manufactured in one piece in polyurethane. We work both on modeling and testing the functions of these designs but we work also on complete demonstrator systems. Since the amount of disciplines involved in complex product and machine design increases rapidly we pay a lot of attention with respect to systems engineering methods. Apart from the classical engineering disciplines like mechanical, electrical, software and mechatronics engineering, especially for adaptive robotics more and more disciplines like industrial product design, communication … multimedia design and of course physics and even art are to be involved depending on the specific application to be designed. Design tools like V-model, agile/scrum and design-approaches to obtain the best set of requirements are being implemented in the engineering studies from

  8. Pair correlations in an expanding universe for a multicomponent system

    Kandrup, H.E.

    1983-01-01

    Fall and Saslaw have derived an equation for the growth of pair correlations in an expanding universe of identical self-gravitating point masses which is correlation-free at some initial time. Their equation is rigorously true for the earliest stages of growth, assuming only that the system is spatially homogeneous and isotropic, and that it is characterized in the ''comoving frame'' by a Maxwellian distribution of velocities. This paper generalizes their analysis to the case of a multicomponent system of particles with different masses, each species of which is characterized by a Maxwellian distribution at the same temperature. Here there are two types of pair correlations to consider, namely among members of the same species and among members of different species. The general behavior may be understood most readily by considering the covariance functions, which assume very simple forms. Thus one finds that the ''strength'' of the covariance scales, for sufficiently small radial separations, as the product of the masses, whereas the ''range'' of the covariance varies inversely as the square root of the reduced mass of the two constituents. This implies that, for two very different masses, the ''range'' will be set by the lighter constituent. Knowledge of the covariances also permits the calculation of such objects as the correlational energy densities of the various interactions. Consider, for example, a two-component system. Here one finds that even a very small contamination of heavy masses, which would have a negligible effect upon the total mass or kinetic energy densities, can increase the total correlational energy density, and hence decrease the time scale for the evolution of interesting structure, by orders of magnitude

  9. Publication’s e-mail marketing procedure

    Ebrahim, Nader Ale

    2016-01-01

    Your research findings and publications have to reach thousands of your peers and colleagues by sending an email. If you have recently published a study that would be of interest to others in your field, market it through email. “E-mail marketing” allow the researchers to increase the research impact and citations for their publications. This workshop will provide various techniques to increase the visibility and enhance the impact of researcher’s output by employing the publications E-mail m...

  10. Direct e-mail marketing: Case of Serbia

    Končar Jelena A.

    2005-01-01

    Full Text Available Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc. The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers. Direct e-mail marketing is not aimed at momentary sale, but at boosting certain product preferences due to the engagement of numerous electronic media.

  11. CORPORATE E-MAIL SERVICE GOOGLE APPS AS AN INSTRUMENT OF ACTIVITY OF ORGANIZATIONAL-EDUCATIONAL UNITS OF THE HIGHER EDUCATIONAL INSTITUTION

    Кarpenko А.

    2017-03-01

    Full Text Available The advantages of usage of cloud technologies, particularly, of Gmail service Google Apps in work of organizational-educational units of higher educational institutions are analyzed in this work. The main accents are put concerning usage of corporate e-mail Gmail service Google Apps, with the help of which informational-analytical support of activity of organizational-educational units of the University is provided. The author of the publication underlines key advantages of Gmail and analyses its opportunities. Main characteristics of corporate e-mail Gmail service Google Apps are described. It is identified that implementation of corporate e-mail Gmail service Google Apps is a part of creation of certain information system, that will ensure united information space of a modern higher educational institution. Effective organization of educational process, that was used by methodist of organizational-educational units (Scientific-methodological centre of research, scientific projects and programs of Borys Grinchenko Kyiv University in the work of corporate mail Gmail service Google Aps is analyzed and presented. It is identified, that creation and improvement of mechanisms of building corporate content with the help of Gmail service Google Apps will allow the collaborators of organizational-educational units of the higher educational institution to plan and organize educational process. Such organization of educational process optimizes the activity of organizational-educational units of higher educational institutions.

  12. Sistema de ayuda para la redacción de mensajes en un servicio de referencia por correo electrónico Help system for messages writing in a reference service via e-mail

    Pedro Falcato

    2005-12-01

    Full Text Available El presente artículo trata el origen, el desarrollo y las propiedades del sistema de ayuda que utiliza un servicio de referencia digital como apoyo para elaborar respuestas. Está basado en la compilación y clasificación de locuciones de uso frecuente cuya eficacia comunicativa ha sido puesta a prueba en la práctica, adaptadas de modo tal que el referencista puede emplearlas como módulos para construir los mensajes. Se exponen las principales características de la interfaz diseñada. Se tratan también los alcances y limitaciones que tiene un sistema de este tipo, así como la aplicabilidad de la idea que le dio origen para construir ayudas equivalentes en otros entornos de referencia.The article deals with the origin, development, and properties of the help system used by a digital reference service as a support to develop answers. It is based on the compilation and classification of frequently used idioms whose communication effectiveness was practically put to the test, adapted in such a way that the reference librarian can use them as modules to construct the messages. Main characteristics of the interface design are stated. Scopes and limitations of that kind of system are discussed as well as the compatibility of the original idea to build equivalent helps in some other reference environment.

  13. Deception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military

    Rockwell, Roy

    2002-01-01

    This research describes the results of a field experiment which examines the effects of warnings on system trust and individual awareness in government computer systems through the use of email forgery...

  14. Beemsterboer email discussion Jan. 10 - Mar. 4, 2014

    A series of emails between Beemsterboer Slag Corp. and the Air Enforcement department of EPA Region 5 regarding site monitoring, and transportation of pet coke and met coke from facilities in Chicago, Illinois.

  15. Manipulating E-Mail Server Feedback for Spam Prevention

    O. A. Okunade

    2017-08-01

    Full Text Available The cyber criminals who infect machines with bots are not the same as the spammers who rent botnets to distribute their messages. The activities of these spammers account for the majority of spam emails traffic on the internet. Once their botnets and campaigns are identified, it is not enough to keep on filtering the spam emails, it is necessary to deploy techniques that will carry the fight to their end. It is observed that spammers also take into account server feedback (for example to detect and remove non-existent recipients from email address lists. We can take advantage of this observation by returning fake information, thereby poisoning the server feedback on which the spammers rely. The results of this paper show that by sending misleading information to a spammer, it is possible to prevent recipients from receiving subsequent spam emails from that same spammer.

  16. Consolidating the University Career Service System in Taiwan

    Ho, Hsuan-Fu; Hu, Tien-Ling

    2017-01-01

    The university graduate unemployment rate reached a record high of 6% in 2009 in Taiwan; paradoxically, business managers complained that they could not find enough qualified employees. The mismatch between knowledge taught in universities and the requests of the job market has been criticized as the main reason for the escalation of the…

  17. Autonomy, Professionalism and Management Structure in the German University System

    Bayer, Ingo

    2011-01-01

    Declining public finances and ever increasing national and international competition force state-owned German universities to adapt to an increasingly competitive environment. In a first phase the universities have concentrated their efforts on the optimisation of budgeting processes and on the development of strategies and goals to come to a more…

  18. Universally sloppy parameter sensitivities in systems biology models.

    Ryan N Gutenkunst

    2007-10-01

    Full Text Available Quantitative computational models play an increasingly important role in modern biology. Such models typically involve many free parameters, and assigning their values is often a substantial obstacle to model development. Directly measuring in vivo biochemical parameters is difficult, and collectively fitting them to other experimental data often yields large parameter uncertainties. Nevertheless, in earlier work we showed in a growth-factor-signaling model that collective fitting could yield well-constrained predictions, even when it left individual parameters very poorly constrained. We also showed that the model had a "sloppy" spectrum of parameter sensitivities, with eigenvalues roughly evenly distributed over many decades. Here we use a collection of models from the literature to test whether such sloppy spectra are common in systems biology. Strikingly, we find that every model we examine has a sloppy spectrum of sensitivities. We also test several consequences of this sloppiness for building predictive models. In particular, sloppiness suggests that collective fits to even large amounts of ideal time-series data will often leave many parameters poorly constrained. Tests over our model collection are consistent with this suggestion. This difficulty with collective fits may seem to argue for direct parameter measurements, but sloppiness also implies that such measurements must be formidably precise and complete to usefully constrain many model predictions. We confirm this implication in our growth-factor-signaling model. Our results suggest that sloppy sensitivity spectra are universal in systems biology models. The prevalence of sloppiness highlights the power of collective fits and suggests that modelers should focus on predictions rather than on parameters.

  19. Universally sloppy parameter sensitivities in systems biology models.

    Gutenkunst, Ryan N; Waterfall, Joshua J; Casey, Fergal P; Brown, Kevin S; Myers, Christopher R; Sethna, James P

    2007-10-01

    Quantitative computational models play an increasingly important role in modern biology. Such models typically involve many free parameters, and assigning their values is often a substantial obstacle to model development. Directly measuring in vivo biochemical parameters is difficult, and collectively fitting them to other experimental data often yields large parameter uncertainties. Nevertheless, in earlier work we showed in a growth-factor-signaling model that collective fitting could yield well-constrained predictions, even when it left individual parameters very poorly constrained. We also showed that the model had a "sloppy" spectrum of parameter sensitivities, with eigenvalues roughly evenly distributed over many decades. Here we use a collection of models from the literature to test whether such sloppy spectra are common in systems biology. Strikingly, we find that every model we examine has a sloppy spectrum of sensitivities. We also test several consequences of this sloppiness for building predictive models. In particular, sloppiness suggests that collective fits to even large amounts of ideal time-series data will often leave many parameters poorly constrained. Tests over our model collection are consistent with this suggestion. This difficulty with collective fits may seem to argue for direct parameter measurements, but sloppiness also implies that such measurements must be formidably precise and complete to usefully constrain many model predictions. We confirm this implication in our growth-factor-signaling model. Our results suggest that sloppy sensitivity spectra are universal in systems biology models. The prevalence of sloppiness highlights the power of collective fits and suggests that modelers should focus on predictions rather than on parameters.

  20. Dual Fan Separator within the Universal Waste Management System

    Stapleton, Tom; Converse, Dave; Broyan, James Lee, Jr.

    2014-01-01

    Since NASA's new spacecraft in development for both LEO and Deep Space capability have considerable crew volume reduction in comparison to the Space Shuttle, the need became apparent for a smaller commode. In response the Universal Waste Management System (UWMS) was designed, resulting in an 80% volume reduction from the last US commode, while enhancing performance. The ISS WMS and previous shuttle commodes have a fan supplying air flow to capture feces and a separator to capture urine and separate air from the captured air/urine mixture. The UWMS combined both rotating equipment components into a single unit, referred to at the Dual Fan Separator (DFS). The combination of these components resulted in considerable packaging efficiency and weight reduction, removing inter-component plumbing, individual mounting configurations and required only a single motor and motor controller, in some of the intended UWMS platform applications the urine is pumped to the ISS Urine Processor Assembly (UPA) system. It requires the DFS to include less than 2.00% air inclusion, by volume, in the delivered urine. The rotational speed needs to be kept as low as possible in centrifugal urine separators to reduce air inclusion in the pumped fluid, while fans depend on rotational speed to develop delivered head. To satisfy these conflicting requirements, a gear reducer was included, allowing the fans to rotate at a much higher speed than the separator. This paper outlines the studies and analysis performed to develop the DFS configuration. The studies included a configuration trade study, dynamic stability analysis of the rotating bodies and a performance analysis of included labyrinth seals. NASA is considering a program to fly the UWMS aboard the ISS as a flight experiment. The goal of this activity is to advance the Technical Readiness Level (TRL) of the DFS and determine if the concept is ready to be included as part of the flight experiment deliverable.

  1. Email for the coordination of healthcare appointments and attendance reminders.

    Atherton, Helen; Sawmynaden, Prescilla; Meyer, Barbara; Car, Josip

    2012-08-15

    Email is a popular and commonly-used method of communication, but its use in health care is not routine. Where email communication has been utilised in health care, its purposes have included the coordination of healthcare appointments and attendance reminders, but the effects of using email in this way are not known. This review considers the use of email for the coordination of healthcare appointments and reminders for attendance; particularly scheduling, rescheduling and cancelling healthcare appointments, and providing prompts/reminders for attendance at appointments. To assess the effects of using email for the coordination of healthcare appointments and attendance reminders, compared to other forms of coordinating appointments and reminders, on outcomes for health professionals, patients and carers, and health services, including harms. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010),and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies of interventions that use email for scheduling health appointments, for reminders for a scheduled health appointment or for ongoing coordination of health appointments and that took the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two review authors independently assessed the titles and abstracts of retrieved

  2. Email networks and the spread of computer viruses

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  3. Direct e-mail marketing: Case of Serbia

    Končar Jelena A.; Vukmirović Goran; Katai Žita

    2005-01-01

    Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc). The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers....

  4. The role of email addresses and email contact in encouraging web response in a mixed mode design

    Cernat, Alexandru; Lynn, Peter

    2014-01-01

    We examine whether propensity to participate in a web-CAPI mixed-mode survey is influenced by being contacted by email in addition to mail. In panel surveys, researchers can ask at each wave for an email address, but there is little evidence regarding the value of doing so. Using data from a large sample with an experimental design (IP5) we find that using a respondent-supplied email address to send additional invites and reminders does not affect response rates compared to using mailed invit...

  5. Identifying spam e-mail messages using an intelligence algorithm

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  6. Email as a Data Collection Tool when Interviewing Older Adults

    Mario A. Brondani DDS, MSc, PhD

    2011-09-01

    Full Text Available This article explores several aspects of electronic communication, specifically its advantages and disadvantages within the context of a brief experience using email to interview elders. Two older adults participated via email as the psychosocial impact of aging was collected using such venue. Our experiences are compared with published reports from others to analyze the benefits and limitations of email as a research tool. The email was spontaneous, comprehensive, interactive, efficient, confidential, and cost effective. The use of email within this exploratory study appeared to be an effective approach to collecting qualitative information about beliefs and behaviours from older adults who feel comfortable with this form of communication. The lack of similar studies limited the scope of discussion and comparison of findings; generalization is limited due to the small sample size. This investigation, however, suggested that the use of email as an interview tool may be considered in today's exploratory research arena as an alternative to conference calls or face-to-face interviews when time is a constraint.

  7. CEAI: CCM-based email authorship identification model

    Sarwat Nizamani

    2013-11-01

    Full Text Available In this paper we present a model for email authorship identification (EAI by employing a Cluster-based Classification (CCM technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature set to include some more interesting and effective features for email authorship identification (e.g., the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell. We also included Info Gain feature selection based content features. It is observed that the use of such features in the authorship identification process has a positive impact on the accuracy of the authorship identification task. We performed experiments to justify our arguments and compared the results with other base line models. Experimental results reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM-based models, as well as the models proposed by Iqbal et al. (2010, 2013 [1,2]. The proposed model attains an accuracy rate of 94% for 10 authors, 89% for 25 authors, and 81% for 50 authors, respectively on Enron dataset, while 89.5% accuracy has been achieved on authors’ constructed real email dataset. The results on Enron dataset have been achieved on quite a large number of authors as compared to the models proposed by Iqbal et al. [1,2].

  8. Internet and Email Use Among STD Clinic Patients

    Mark, Karen E.; Wald, Anna; Drolette, Linda; Golden, Matthew R.

    2009-01-01

    Background Little data exist on Internet and email use among STD clinic patients for research and clinical care communication. Methods An anonymous cross-sectional survey of STD clinic patients aged ≥ 18 years in Seattle, Washington, March 13–22, 2006. Results Of 489 study period patients, 251 (51%) completed the questionnaire. Participants had a median age of 30 (range 18–66) years and were 69% male, 56% White, 19% African-American, 9% Hispanic, and 7% Asian/Pacific Islander. 75% had some post-secondary education but half reported an annual income of email that they check at least 3 times a week, and 144 (57%) were willing to receive an email reminding them to come back for a follow-up appointment if diagnosed with an STD. MSM were more likely than women and heterosexual men to be regular Internet and email users (92% versus 70%, p = 0.001) and to have met a sex partner over the Internet during the past year (69% versus 11%, p email use, as was racial/ethnic background (86% of Whites, 48% of African-Americans, 73% of Hispanics, 100% of Asians/Pacific Islanders, and 57% of others, p email use are common and acceptable to many STD clinic patients for research and clinical purposes. PMID:18685548

  9. The Usage of Social Areas in University Campus Systems

    Begüm ERÇEVİK

    2011-10-01

    Full Text Available Universities aim to help students gain occupational skills through academic training and practice; to produce knowledge by carrying out applications and investigations which have scientific, social and economic bases, to prepare young people for com munity life by giving them duties and responsibilities; and finally, to make contributions to the social and educational level of the community. Moreover social and cultural activity areas in uni versities in which, apart from lecture halls, students spend most of their time during their educational, lives, are of great impor tance for social interaction. Social spaces, whose educational and awareness-raising role of preparing the youth for community life, are taken into account and of these areas, about their use of student assessment analysis is aimed. During this analysis, student views were investigated and compared at different university campus locations. Bahçeşehir University Beşiktaş Campus as a town university, Yıldız Teknik University Yıldız Merkez Campus as an in-town campus, Koç University Sarıyer Campus as a out-oftown campus were chosen as locations for the study. Statistical analysis is applied to the data obtained from the questionaries completed by students in the chosen universities. Following such investigations, findings relating to the sufficiency of social and cultural activity areas in campuses, their occupancy and reachability; and the user profile of the activity areas and town usage as a cultural area are obtained and evaluated.

  10. Email authentication using symmetric and asymmetric key algorithm encryption

    Halim, Mohamad Azhar Abdul; Wen, Chuah Chai; Rahmi, Isredza; Abdullah, Nurul Azma; Rahman, Nurul Hidayah Ab.

    2017-10-01

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

  11. ORIGINAL ARTICLE Effect of Jimma University Libraries System ...

    WJH

    that impact negatively on quality education in Jimma University. Thus, the ... stakeholders/customers centered way. ... the misuse of the budget allocated for ..... Table 3: Relationship of JULS use and the purpose for the library materials use.

  12. Acceptability of a theory of planned behaviour email-based nutrition intervention.

    Kothe, E J; Mullan, B A

    2014-03-01

    This study investigated feasibility and acceptability of a new email-delivered intervention promoting fruit and vegetable consumption in a university-based population of Australian young adults. The study explored whether there are differences in the reported feasibility and acceptability between demographic groups within the population of interest and at three levels of intervention intensity. The email-delivered intervention program consists of an implementation intention 'planning task' and between 3 and 15 short email messages over a 15-day study period. The intervention program was developed using the Theory of Planned Behaviour and was designed to modify perceived behavioural control. One hundred and ten participants (mean age = 19.21 years, 25.6% male) completed the feasibility and acceptability questionnaire at Day 15. This questionnaire contained items about all intervention components. High acceptability and feasibility scores were found for all intervention parts and at all levels of intervention intensity. There were few significant differences in the reported acceptability of items between key demographic sub-groups, and no differences in reported acceptability at different levels of intervention intensity. These results suggest that this email-delivered intervention is an acceptable and feasible tool for promoting fruit and vegetable consumption for participants in the target population.

  13. Using viral e-mails to distribute tobacco control advertisements: an experimental investigation.

    Carter, Owen B J; Donovan, Robert; Jalleh, Geoffrey

    2011-08-01

    The authors' objective was to conduct a trial of viral e-mail marketing as a distribution method for tobacco control advertisements. University students (n = 200) in the state of Western Australia were randomly allocated to receive 1 of 2 e-mails with hyperlinks to tobacco control advertisements ("Toilet" and "Rubbish") emphasizing the disgusting nature of smoking. Recipients followed a hyperlink to a Web page playing Toilet or Rubbish on endless loop. Viewers were encouraged to forward the e-mail to their friends and invited to complete an online survey about the advertisement. Unique downloads for each advertisement were identified by internet provider (IP) location and tallied by date and geographical location to assess subsequent dissemination beyond the initial 200 students. There were 826 unique viewings of the advertisements averaging 26.9 viewings per day for the first fortnight, followed by a lower average of 4.1 hits per day for the next 3.5 months. IP addresses identified hits from 3 other Australian states and 7 other countries. Online surveys were completed by 103 respondents (12.5% of total hits) but included few smokers (n = 9). Significantly more respondents rated Toilet as "funny" compared with Rubbish (40% vs. 11%; p e-mail sent but daily hits rapidly deteriorated over time. Entertainment appears to facilitate viral e-mails being forwarded onwards but only exceptionally compelling tobacco control materials are ever likely to become self-perpetuating.

  14. Wave function of the Universe as a leaking system

    Suen, W.; Young, K.

    1989-01-01

    We propose a path-integral formulation for the wave function of the Universe which requires neither the Euclidean nor the conformal rotation. The boundary condition is taken to be that ''all possible boundaries are included.'' The resulting wave function in a simple model is shown to have the following properties: (i) the wave function tends to zero as the scale factor of the Universe tends to zero; (ii) in the semiclassical regime, it contains only the expanding component; (iii) it favors inflation

  15. The Difficult Transition of the Italian University System: Growth, Underfunding and Reforms

    Turri, Matteo

    2016-01-01

    The evolution of Italian universities in terms of growth, economic sustainability and reforms can be interpreted in the light of the élite, mass and universal access categories defined by Martin Trow. The findings from this analysis show that although the number of enrolled students and funding problems propel the Italian university system towards…

  16. Revitalising the Nigerian University System: The Imperatives of a Market Driven Funding Mechanism

    Chiemeka, Nnorom; Nwagwu, Nwakaire Onuzuruike

    2015-01-01

    The needs assessment report of Nigerian public universities (2012) exposed a disturbing level of decay in public universities in Nigeria. The report, among other things advocated better financial management as a panacea for revitalising the university system. This paper compared the direct funding allocation mechanism (which is the major way of…

  17. Managerial Systems as Measures of Quality Management in Universities in Uganda

    Neema-Abooki, P.

    2014-01-01

    This paper envisions that, since universities are basically consent organizations university management has an obligation to processes that engender total participation and passion of all employees. This study aimed at delving into management stances at universities. It based on Likert's systems of management, which depict the total organization…

  18. Detection of Spam Email by Combining Harmony Search Algorithm and Decision Tree

    M. Z. Gashti

    2017-06-01

    Full Text Available Spam emails is probable the main problem faced by most e-mail users. There are many features in spam email detection and some of these features have little effect on detection and cause skew detection and classification of spam email. Thus, Feature Selection (FS is one of the key topics in spam email detection systems. With choosing the important and effective features in classification, its performance can be optimized. Selector features has the task of finding a subset of features to improve the accuracy of its predictions. In this paper, a hybrid of Harmony Search Algorithm (HSA and decision tree is used for selecting the best features and classification. The obtained results on Spam-base dataset show that the rate of recognition accuracy in the proposed model is 95.25% which is high in comparison with models such as SVM, NB, J48 and MLP. Also, the accuracy of the proposed model on the datasets of Ling-spam and PU1 is high in comparison with models such as NB, SVM and LR.

  19. Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email

    Albert Ginting

    2015-04-01

    Full Text Available In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography. One fairly popular cryptographic algorithms are RSA algorithm. In this study will discuss the implementation of a cryptographic algorithm RSA encryption and decryption process email. To test created a java-based email client program with message encryption and decryption features messages. This application uses the Java programming language and Netbeans 7.4 as editor. Mail servers used is Google Mail. The initial step of this study was to download email from the Google server and encrypt the message. The second step is decrypt the message to verify whether the message is still the same as the original message before it is encrypted . Results from this study is the application that can encrypt and decrypt messages using RSA cryptographic algorithm. With this application is expected to mail delivery is much safer. Because encrypted email will generate a random decimal number of unknown value .

  20. Detection of fraudulent emails by employing advanced feature abundance

    Sarwat Nizamani

    2014-11-01

    Full Text Available In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email detection rate. The different types of features are incorporated step by step. The detection of fraudulent email has been considered as a classification problem and it is evaluated using various state-of-the art algorithms and on CCM (Nizamani et al., 2011 [1] which is authors’ previous cluster based classification model. The experiments have been performed on diverse feature sets and the different classification methods. The comparison of the results is also presented and the evaluation show that for the fraudulent email detection tasks, the feature set is more important regardless of classification method. The results of the study suggest that the task of fraudulent emails detection requires the better choice of feature set; while the choice of classification method is of less importance.

  1. Shared Semantics and the Use of Organizational Memories for E-Mail Communications.

    Schwartz, David G.

    1998-01-01

    Examines the use of shared semantics information to link concepts in an organizational memory to e-mail communications. Presents a framework for determining shared semantics based on organizational and personal user profiles. Illustrates how shared semantics are used by the HyperMail system to help link organizational memories (OM) content to…

  2. [Document management systems to support quality management systems at university hospitals - an interview-based study].

    Holderried, Martin; Bökel, Ann-Catrin; Ochsmann, Elke

    2018-05-01

    In order to save and control the processes and quality of medical services, a suitable steering system of all relevant documents is essential from the point of view of clinical quality management. Systems supporting an automated steering system of documents are called document management systems (DMS), and they also enter the healthcare sector. The use of DMS in the German healthcare sector has hardly been investigated so far. To close this knowledge gap, interviews were carried out with German university hospitals over a six-month period and subjected to a qualitative content analysis according to Mayring. In total, 25 university hospitals agreed to participate in this study, 19 of which have been working with a digital DMS for about six years on average. There was a great variety among the IT systems used. Document management and usability of the DMS as well as its integration into existing IT structures were key decision-making criteria for the selection of a digital DMS. In general, the long-term usability of the DMS is supported by regular evaluation of one's own requirements for the system, administration and training programs. In addition, DMS have a positive effect on patient safety and the quality of medical care. Copyright © 2018. Published by Elsevier GmbH.

  3. ENHANCING DISTANT LEARNING THROUGH EMAIL COMMUNICATION: A Case of BOU

    K. M. Rezanur RAHMAN

    2008-04-01

    Full Text Available Today computer has replaced all means of traditional communication significantly. Many distant learning tools claim to be interactive, but few can offer two-way communication. Email is the most popular means of communication medium now-a-days. Therefore, it may be used as an educational tool for learning. In present socio-economic condition of Bangladesh, learners can afford computer, cell phone and Internet. We took this opportunity to investigate the prospective use of these tools for distant learning. The present survey has been carried out to understand the present status of Internet knowledge among the learners and their views for possible introduction of e-mail communication as supporting tool for learning. BOU’s available infrastructural facilities for providing Internet support have been investigated. Furthermore, possible solutions have been pointed out to provide e-mail facility to the learner in a cost effective way.

  4. Design and Development of a University E-Library System in Turkey: A Case from Dicle University

    Murat YALMAN

    2014-08-01

    Full Text Available Services provided for students in traditional libraries at universities have been renovated in line with the development of technology. Therefore, today libraries are not evaluated with their sizes of places but with the variety and abundance of sources found in libraries. In terms of current educational activities, it is fairly important for universities to structure and renovate their libraries. The reason is that learning is now independent of place and time. The spread of the Internet and of Internet technologies and the increase in the number of Internet users make e-library obligatory and unavoidable. Therefore, universities should internalize the concept of e-library and take electronic library into consideration while restructuring their library services. The present study tried to determine how to carry out an e-library design in accordance with the library services of universities. In this process, the overall purpose was to determine the needs by examining the user interface of the webpage designed, its interface features, its differences, ease of its use, its clarity for users to understand and the pros and cons of the system. In this way, universities using e-library are believed to provide their students with better services by increasing their quality of education.

  5. Universality of anomalous diffusion in extremely disordered systems

    Dyre, Jeppe; Jacobsen, Jacob M.

    1996-01-01

    The universal time-dependence of the mean-square displacement for motion in a random energy landscape with equal minima is evaluated analytically and numerically in the percolation path approximation (PPA), which was recently shown by extensive computer simulations in two and three dimensions [Dy...

  6. Evolutionary Systems Theory, Universities, and Endogenous Regional Economic Development

    Bowen, William M.

    2007-01-01

    Universities today are increasingly being viewed in terms of serving the purpose of economic development. This paper postulates that their chief purpose is to advance knowledge and that in doing so they effectuate regional economic growth and development through processes specified in the endogenous economic growth model. To achieve this purpose…

  7. Networking in the sport delivery system in South African Universities ...

    Network theory, the cluster concept of Porter (1998) and the social capital ... for case study analysis of 60 sport-related entities at the 23 public universities in South ... them to schools and community clubs in the value chain of service provision.

  8. Discourse strategies in professional e-mail negotiation

    Jensen, Astrid

    2009-01-01

    The purpose of this article is to report on some of the preliminary results of an on-going study on the use of discourse strategies in e-mail negotiation. The analysis aims at showing how relations between the participants develop through the use of specific discourse strategies in their e......-mail communication which covers a period of three months, during which the relationship progresses from initial contact to on-going business. Drawing on Hyland's (2005) concept of metadiscourse combined with Charles' (1996) categories of ‘old and new relationship negotiations', this study provides insights...

  9. Machine Learning for Email Spam Filtering and Priority Inbox

    Conway, Drew

    2011-01-01

    If you're an experienced programmer willing to crunch data, this concise guide will show you how to use machine learning to work with email. You'll learn how to write algorithms that automatically sort and redirect email based on statistical patterns. Authors Drew Conway and John Myles White approach the process in a practical fashion, using a case-study driven approach rather than a traditional math-heavy presentation. This book also includes a short tutorial on using the popular R language to manipulate and analyze data. You'll get clear examples for analyzing sample data and writing machi

  10. Promotion and communication through e-mail marketing campaigns

    Raluca Dania TODOR

    2017-07-01

    Full Text Available The main purpose of this article is to try to emphasize the e-mail marketing campaigns importance and efficiency and the way they increase the interaction between a company and potential customers and to increase their interest in a company’s products and services and finally trigger the buying decision. Also the present paper’s aim is to exemplify how business can gain benefits by using marketing automation tools like e-mail marketing campaigns which is considered nowadays a form of direct marketing which is less expensive than the traditional direct marketing alternatives.

  11. Unraveling mulitple translatorship through an e-mail correspondence

    Jansen, Hanne

    2017-01-01

    The aim of this study is to shed light on questions of “multiple translatorship” and particularly on translation collaboration processes. The empirical material consists of more than three hundred e-mails exchanged between two co-translators who translated Claudio Magris’s novel Alla cieca (2005......) into Danish. The theoretical framework presents a double perspective through which the e-mail correspondence is studied: on the one hand, as an ethnographic “thick description” (focusing on translation as an event), with the aim of uncovering who the agents involved are, how they interact, and what...

  12. Email for communicating results of diagnostic medical investigations to patients.

    Meyer, Barbara; Atherton, Helen; Sawmynaden, Prescilla; Car, Josip

    2012-08-15

    As medical care becomes more complex and the ability to test for conditions grows, pressure on healthcare providers to convey increasing volumes of test results to patients is driving investigation of alternative technological solutions for their delivery. This review addresses the use of email for communicating results of diagnostic medical investigations to patients. To assess the effects of using email for communicating results of diagnostic medical investigations to patients, compared to SMS/ text messaging, telephone communication or usual care, on outcomes, including harms, for health professionals, patients and caregivers, and health services. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies of interventions using email for communicating results of any diagnostic medical investigations to patients, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two review authors independently assessed the titles and abstracts of retrieved citations. No studies were identified for inclusion. Consequently, no data collection or analysis was possible. No studies met the inclusion criteria, therefore there are no results to report on the use of email for communicating results of diagnostic medical

  13. Composite Bonding to Stainless Steel Crowns Using a New Universal Bonding and Single-Bottle Systems

    Mohammad Ali Hattan; Sharat Chandra Pani; Mohammad AlOmari

    2013-01-01

    Aim. The aim of this study is to evaluate the shear bond strength of nanocomposite to stainless steel crowns using a new universal bonding system. Material and Methods. Eighty (80) stainless steel crowns (SSCs) were divided into four groups (20 each). Packable nanocomposite was bonded to the lingual surface of the crowns in the following methods: Group A without adhesive (control group), Group B using a new universal adhesive system (Scotchbond Universal Adhesive, 3M ESPE, Seefeld, Germany), ...

  14. INVESTIGATION OF E-MAIL TRAFFIC BY USING ZERO-INFLATED REGRESSION MODELS

    Yılmaz KAYA

    2012-06-01

    Full Text Available Based on count data obtained with a value of zero may be greater than anticipated. These types of data sets should be used to analyze by regression methods taking into account zero values. Zero- Inflated Poisson (ZIP, Zero-Inflated negative binomial (ZINB, Poisson Hurdle (PH, negative binomial Hurdle (NBH are more common approaches in modeling more zero value possessing dependent variables than expected. In the present study, the e-mail traffic of Yüzüncü Yıl University in 2009 spring semester was investigated. ZIP and ZINB, PH and NBH regression methods were applied on the data set because more zeros counting (78.9% were found in data set than expected. ZINB and NBH regression considered zero dispersion and overdispersion were found to be more accurate results due to overdispersion and zero dispersion in sending e-mail. ZINB is determined to be best model accordingto Vuong statistics and information criteria.

  15. Multi criteria evaluation for universal soil loss equation based on geographic information system

    Purwaamijaya, I. M.

    2018-05-01

    The purpose of this research were to produce(l) a conceptual, functional model designed and implementation for universal soil loss equation (usle), (2) standard operational procedure for multi criteria evaluation of universal soil loss equation (usle) using geographic information system, (3) overlay land cover, slope, soil and rain fall layers to gain universal soil loss equation (usle) using multi criteria evaluation, (4) thematic map of universal soil loss equation (usle) in watershed, (5) attribute table of universal soil loss equation (usle) in watershed. Descriptive and formal correlation methods are used for this research. Cikapundung Watershed, Bandung, West Java, Indonesia was study location. This research was conducted on January 2016 to May 2016. A spatial analysis is used to superimposed land cover, slope, soil and rain layers become universal soil loss equation (usle). Multi criteria evaluation for universal soil loss equation (usle) using geographic information system could be used for conservation program.

  16. Survey on university governance system in U.S.A. Case study in Stanford University; Beikoku ni okeru daigaku governance system no chosa. Stanford daigaku no case study

    NONE

    2001-03-01

    In order to provide reference for the university reformation policy of Japan, the features and strength of the U.S. university management and operation systems were put into order and analyzed through a case study in Stamford University in the United States. In the U.S. research universities, it is not only how high the quality is in the faculties and researchers, but also how far the structuring has been advanced in the systems to manage and operate them efficiently, which supports the infrastructures of research activities. The 'research management and operation staff' is knowledgeable in the system to manage the inside of a university and the system to procure research funds from the government and foundations. The staff enhances the productivity of research activities by professionally handling various operations taking place in research laboratories. In association with increase of the size of research projects, those who have been experienced in industries, or those who have acquired the doctor's degree exist in a large number in the projects as the research management staff. In Japanese universities, management staff posts with high specialty to undertake the research management do not exist. This facts results in young researchers consuming a great amount of time for this work. (NEDO)

  17. An Evaluation of the Informedia Digital Video Library System at the Open University.

    Kukulska-Hulme, Agnes; Van der Zwan, Robert; DiPaolo, Terry; Evers, Vanessa; Clarke, Sarah

    1999-01-01

    Reports on an Open University evaluation study of the Informedia Digital Video Library System developed at Carnegie Mellon University (CMU). Findings indicate that there is definite potential for using the system, provided that certain modifications can be made. Results also confirm findings of the Informedia team at CMU that the content of video…

  18. Views on the peer review system of biomedical journals: an online survey of academics from high-ranking universities

    2013-01-01

    Background Peer review is the major method used by biomedical journals for making the decision of publishing an article. This cross-sectional survey assesses views concerning the review system of biomedical journals among academics globally. Methods A total of 28,009 biomedical academics from high-ranking universities listed by the 2009 Times Higher Education Quacquarelli Symonds (THE-QS) World University Rankings were contacted by email between March 2010 and August 2010. 1,340 completed an online survey which focused on their academic background, negative experiences and views on biomedical journal peer review and the results were compared among basic scientists, clinicians and clinician scientists. Results Fewer than half of the respondents agreed that the peer review systems of biomedical journals were fair (48.4%), scientific (47.5%), or transparent (25.1%). Nevertheless, 58.2% of the respondents agreed that authors should remain anonymous and 64.4% agreed that reviewers should not be disclosed. Most, (67.7%) agreed to the establishment of an appeal system. The proportion of native English-speaking respondents who agreed that the “peer review system is fair” was significantly higher than for non-native respondents (p = 0.02). Similarly, the proportion of clinicians stating that the “peer review system is fair” was significantly higher than that for basic scientists and clinician-scientists (p = 0.004). For females, (β = −0.1, p = 0.03), the frequency of encountering personal attacks in reviewers’ comments (β = −0.1, p = 0.002) and the frequency of imposition of unnecessary references by reviewers (β = −0.06, p = 0.04) were independently and inversely associated with agreement that “the peer review system is fair”. Conclusion Academics are divided on the issue of whether the biomedical journal peer review system is fair, scientific and transparent. A majority of academics agreed with the double-blind peer

  19. Communicating with Parents of Children with Special Needs in Saudi Arabia: Parents' and Teachers' Perceptions of Using Email for Regular and Ongoing Communication

    Dubis, Snaa; Bernadowski, Carianne

    2015-01-01

    The purpose of this study, by Snaa Dubis from Salman Bin Abdu Aziz University, Saudi Arabia, and Robert Morris University, USA, and Carianne Bernadowski from Robert Morris University, was to investigate parents' and special education teachers' perceptions of using email as a component of parental involvement in the academic and/or behavioural…

  20. Chiral Tricritical Point: A New Universality Class in Dirac Systems

    Yin, Shuai; Jian, Shao-Kai; Yao, Hong

    2018-05-01

    Tricriticality, as a sister of criticality, is a fundamental and absorbing issue in condensed-matter physics. It has been verified that the bosonic Wilson-Fisher universality class can be changed by gapless fermionic modes at criticality. However, the counterpart phenomena at tricriticality have rarely been explored. In this Letter, we study a model in which a tricritical Ising model is coupled to massless Dirac fermions. We find that the massless Dirac fermions result in the emergence of a new tricritical point, which we refer to as the chiral tricritical point (CTP), at the phase boundary between the Dirac semimetal and the charge-density wave insulator. From functional renormalization group analysis of the effective action, we obtain the critical behaviors of the CTP, which are qualitatively distinct from both the tricritical Ising universality and the chiral Ising universality. We further extend the calculations of the chiral tricritical behaviors of Ising spins to the case of Heisenberg spins. The experimental relevance of the CTP in two-dimensional Dirac semimetals is also discussed.

  1. E-mail et Web : pour une navigation sans risque

    CERN. Geneva

    2010-01-01

    Présentation orale en français, support visuel en anglais. À travers des exemples concrets, vous consoliderez vos connaissances et pourrez ainsi réajuster vos habitudes concernant l’utilisation sécurisée de votre boîte e-mail et de votre navigateur Web.

  2. Communicative In-Betweens of E-mail Communication

    Hansen, Ejvind

    2009-01-01

    In this paper I seek to deconstruct internet-based communication. I highlight Derrida’s focus on the margins and in-betweens of communication, and relate it to the genre of e-mail. I argue (i) that the silence between the dialogic turns becomes more marked, while (ii) the separation of present an...

  3. Colleges Get out of E-Mail Business

    Carnevale, Dan

    2008-01-01

    Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like…

  4. E-Mail from Professor Enhances Student Motivation and Attitudes

    Legg, Angela M.; Wilson, Janie H.

    2009-01-01

    Traditionally, professors use the first day of class to build rapport. However, current technology allows professors to contact students prior to the first day of class. This study assessed how the receipt of a welcoming e-mail from a female professor 1 week before the first day of class affected student motivation and attitudes toward the…

  5. SPAM: Beware of e-mails asking for passwords

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake e-mails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake e-mail message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, but future cases may still occur. Users need to be vigilant regarding any requests for passwords or personal data. Fake e-mails should be immediately deleted. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN IT Department

  6. The Communicative Functions of Emoticons in Workplace E-Mails :-)

    Skovholt, Karianne; Grønning, Anette; Kankaanranta, Anne

    2014-01-01

    CMC research presents emoticons as visual representations of writers' emotions. We argue that the emoticons in authentic workplace e-mails do not primarily indicate writers' emotions. Rather, they provide information about how an utterance is supposed to be interpreted. We show that emoticons...

  7. Writing for Business Purposes: Elements of Email Etiquette

    Gabriela Dumbravă; Adriana Koronka

    2006-01-01

    Starting from the premise that electronic mail has experienced an explosive development throughout the world over the past few years, gaining substantial territory in the field of business communication, the paper focuses on the basic elements of email etiquette and on their importance in writing an effective and competitive electronic message. adapted to the context and purpose of professional writing.

  8. Orality and literacy, formality and informality in email communication

    Carmen Pérez Sabater

    2008-04-01

    Full Text Available Approaches to the linguistic characteristics of computer-mediated communication (CMC have highlighted the frequent oral traits involved in electronic mail along with features of written language. But email is today a new communication exchange medium in social, professional and academic settings, frequently used as a substitute for the traditional formal letter. The oral characterizations and linguistic formality involved in this use of emails are still in need of research. This paper explores the formal and informal features in emails based on a corpus of messages exchanged by academic institutions, and studies the similarities and differences on the basis of their mode of communication (one-to-one or one-to-many and the sender’s mother tongue (native or nonnative. The language samples collected were systematically analyzed for formality of greetings and farewells, use of contractions, politeness indicators and non-standard linguistic features. The findings provide new insights into traits of orality and formality in email communication and demonstrate the emergence of a new style in writing for even the most important, confidential and formal purposes which seems to be forming a new sub-genre of letter-writing.

  9. Advanced Email Risk Classification and Recipient Decision Assistance

    Estes, Aaron

    2016-01-01

    Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…

  10. The Use of Email to Coach Preservice Early Childhood Teachers

    Barton, Erin E.; Fuller, Elizabeth A.; Schnitz, Alana

    2016-01-01

    The purpose of this study was to examine the impact of performance feedback on preservice teachers' use of recommended practices within inclusive early childhood classrooms. A multiple baseline design across behaviors was used to examine the relation between performance feedback delivered via email and practicum students' use of target-recommended…

  11. Enhancing Distant Learning through Email Communication: A Case of BOU

    Rahman, K. M. Rezanur; Anwar, Sadat; Numan, Sharker Md.

    2008-01-01

    Today computer has replaced all means of traditional communication significantly. Many distant learning tools claim to be interactive, but few can offer two-way communication. Email is the most popular means of communication medium now-a-days. Therefore, it may be used as an educational tool for learning. In present socioeconomic condition of…

  12. Hesitative introduction of E-mail consultations in general practice.

    Verheij, R.; Ton, C.; Tates, K.

    2008-01-01

    Introduction: The Dutch Council for Public Health and Health Care reported in 2005 that 70% of internet users would want to have the opportunity to consult their own general practitioner by e-mail [1]. Since January 1, 2006, general practitioners in the Netherlands are reimbursed 4.50 euro for

  13. A Cross-Cultural Pragmatic Study of Rapport-Management Strategies in Chinese and English Academic Upward Request Emails

    Zhu, Wuhan

    2017-01-01

    This article discusses and compares how Chinese and English postgraduate students manage a harmonious relationship with university instructors by managing rapport and doing relational work in their academic request emails. The rapport-management strategies were explored and then further evaluated in relation to the taxonomies of relational work…

  14. The Educational Impact of E-Mail: Extraverted versus Introverted Students.

    Kunderewicz, Larisa; Michener, Stacey; Chambliss, Catherine

    College students (N=151) completed surveys assessing the relationship between e-mail use and extraversion. The variables studied included time spent on e-mail; the frequency of e-mail usage; and the purposes e-mail served for each student. The results suggest that extraverts use e-mail as a form of procrastination more than introverts, and that…

  15. An universal multi-parameter data acquisition system MOLDAS1

    Jiao Dunpang; Zhou Yanyen; Ge Wenxiu; Wang Yanyu; Yu Jusheng; Jing Lan

    1988-01-01

    MOLDAS1 is a data acquisition system to be used for data-taking from reactions induced by heavy-ion in IMP. Its configuration both on hardware and software, system control logic, data flow and functions are intraduced. System specification is discussed as well

  16. UNIVERSAL REGULAR AUTONOMOUS ASYNCHRONOUS SYSTEMS: ω-LIMIT SETS, INVARIANCE AND BASINS OF ATTRACTION

    Serban Vlad

    2011-07-01

    Full Text Available The asynchronous systems are the non-deterministic real timebinarymodels of the asynchronous circuits from electrical engineering.Autonomy means that the circuits and their models have no input.Regularity means analogies with the dynamical systems, thus such systems may be considered to be real time dynamical systems with a’vector field’, Universality refers to the case when the state space of the system is the greatest possible in the sense of theinclusion. The purpose of this paper is that of defining, by analogy with the dynamical systems theory, the omega-limit sets, the invariance and the basins of attraction of the universal regular autonomous asynchronous systems.

  17. A Comparative Analysis of University Information Systems within the Scope of the Information Security Risks

    Rustu Yilmaz

    2016-05-01

    Full Text Available Universities are the leading institutions that are the sources of educated human population who both produce information and ensure to develop new products and new services by using information effectively, and who are needed in every area. Therefore, universities are expected to be institutions where information and information management are used efficiently. In the present study, the topics such as infrastructure, operation, application, information, policy and human-based information security at universities were examined within the scope of the information security standards which are highly required and intended to be available at each university today, and then a comparative analysis was conducted specific to Turkey. Within the present study, the Microsoft Security Assessment Tool developed by Microsoft was used as the risk analysis tool. The analyses aim to enable the universities to compare their information systems with the information systems of other universities within the scope of the information security awareness, and to make suggestions in this regard.

  18. Canada's Industry-University Co-Op Education Accreditation System and Its Inspiration for the Evaluation of China's Industry-University-Institute Cooperative Education

    Qiubo, Yang; Shibin, Wang; Zha, Qiang

    2016-01-01

    The high degree of interest that higher education systems around the world have in employability has driven the profound development of industry-university cooperative education. Canada's industry-university co-op education system has served as a model for global cooperative education, and its accreditation system guarantees the high quality of…

  19. an enhanced iris recognition and authentication system using ...

    Biu et al.

    1Department of Mathematical Sciences, Kaduna State University, Kaduna – Nigeria. (E-mail: ..... localization, the iris is in a circulation fashion then lastly, the image is saved into .... Conference on Computer Engineering Systems. Cleve, K.

  20. Factors that impact nurses' use of electronic mail (e-mail).

    Hughes, J A; Pakieser, R A

    1999-01-01

    As electronic applications are used increasingly in healthcare, nurses are being challenged to adopt them. Electronic mail (e-mail) is an electronic tool with general as well as healthcare uses. E-mail use may be an opportunity to learn a tool that requires skills similar to those used in other applications. This study aimed to identify barriers and facilitators that impact nurses' use of e-mail in the workplace. Data for this study were gathered using focus group methodology. Content analysis identified and labeled factors into seven major categories. Specific factors identified were generally consistent with those previously described in the literature as affecting use of computers in general. However, there were several additional factors identified that were not reported in other previous studies: lack of face-to-face communication, individual writing skills, recency of any educational experience, volume of mail received, password integrity, and technical support. Findings from this study provide information for any individual involved in introducing or updating an e-mail system in a healthcare environment.

  1. Investigation of Science Faculty with Education Specialties within the Largest University System in the United States

    Bush, Seth D; Pelaez, Nancy; Rudd, James A, II; Stevens, Michael T; Tanner, Kimberly D; Williams, Kathy, PhD

    2011-01-01

    Efforts to improve science education include university science departments hiring Science Faculty with Education Specialties (SFES), scientists who take on specialized roles in science education within their discipline. Although these positions have existed for decades and may be growing more common, few reports have investigated the SFES approach to improving science education. We present comprehensive data on the SFES in the California State University (CSU) system, the largest university ...

  2. Positioning Mbeya University of Science and Technology in Tanzania in the Systems of Innovation Perspective

    Katambara, Zacharia

    2014-01-01

    The chronological development of universities ranges from the state at which universities are considered to be knowledge accumulators followed by knowledge factories and finally the knowledge hubs. The various national systems of innovations are aligned with the knowledge hubs and it involves substantial amount of research activities. The newly established Mbeya University of Science and Technology is recog- nised as a knowledge hub in some particular niches. However, there are a limited numb...

  3. A systemic framework for managing e-learning adoption in campus universities: individual strategies in context

    Carol Russell

    2009-12-01

    Full Text Available There are hopes that new learning technologies will help to transform university learning and teaching into a more engaging experience for twenty-first-century students. But since 2000 the changes in campus university teaching have been more limited than expected. I have drawn on ideas from organisational change management research to investigate why this is happening in one particular campus university context. My study examines the strategies of individual lecturers for adopting e-learning within their disciplinary, departmental and university work environments to develop a conceptual framework for analysing university learning and teaching as a complex adaptive system. This conceptual framework links the processes through which university teaching changes, the resulting forms of learning activity and the learning technologies used – all within the organisational context of the university. The framework suggests that systemic transformation of a university's learning and teaching requires coordinated change across activities that have traditionally been managed separately in campus universities. Without such coordination, established ways of organising learning and teaching will reassert themselves, as support staff and lecturers seek to optimise their own work locally. The conceptual framework could inform strategies for realising the full benefits of new learning technologies in other campus universities.

  4. University of Washington Nuclear Physics Data Collection System

    Green, K.C.

    1981-01-01

    During the past several years, a new data collection system has been developed, replacing a previous system based on an SDS-930 computer. The system is constructed about a PDP 11/60 and an MBD-11 controlled CAMAC crate. The hardware configuration as well as a locally written singles data collection code will be described in some detail. Multiparameter data is taken with an enhanced version of Fermilab Multi. Current capabilities and future plans are discussed

  5. Patient perceptions of text-messages, email, and video in dermatologic surgery patients.

    Hawkins, Spencer D; Barilla, Steven; Williford, Phillip Williford M; Feldman, Steven R; Pearce, Daniel J

    2017-04-14

    We developed dermatology patient education videos and a post-operative text message service that could be accessed universally via web based applications. A secondary outcome of the study was to assess patient opinions of text-messages, email, and video in the health care setting which is reported here. An investigator-blinded, randomized, controlled intervention was evaluated in 90 nonmelanoma MMS patients at Wake Forest Baptist Dermatology. Patients were randomized 1:1:1:1 for exposure to: 1) videos with text messages, 2) videos only, 3) text messages-only, or 4) standard of care. Assessment measures were obtained by the use of REDCap survey questions during the follow up visit. 1) 67% would like to receive an email with information about the procedure beforehand 2) 98% of patients reported they would like other doctors to use educational videos as a form of patient education 3) 88% of our patients think it is appropriate for physicians to communicate to patients via text message in certain situations. Nearly all patients desired physicians to use text-messages and video in their practice and the majority of patients preferred to receive an email with information about their procedure beforehand.

  6. Comparison of e-mail communication skills among first- and fourth-year dental students.

    Oakley, Marnie; Horvath, Zsuzsa; Weinberg, Seth M; Bhatt, Jaya; Spallek, Heiko

    2013-11-01

    As e-mail and other forms of electronic communication increase in popularity, it is important for dental schools to consider a curriculum that prepares their graduates to understand and apply effective electronic communication strategies to their patients. Reflecting this shift in communication behavior, the American Medical Association has developed specific e-mail communication guidelines. Some behavioral examples in these guidelines include protecting patients' protected health information (PHI), ensuring proper record keeping, and using professional, courteous, and understandable language. In this study, a sample of first- and fourth-year dental students (n=160) at the University of Pittsburgh School of Dental Medicine participated in an assignment assessing their patient-provider e-mail communication skills. A rubric was used to evaluate and compare the data between dental student classes. The results reveal a generalized lack of compliance with several of these guidelines by both classes (e.g., failure to protect PHI), despite efforts to expose students to these concepts in the curriculum. In an effort to train emerging dentists to function in a rapidly changing technological environment, these findings suggest a need for growth and development of curricula and perhaps guidelines/recommendations for behavioral competencies regarding dental students' use of electronic communication in the patient care environment.

  7. Closing Remarks of the Workshop OnGlobal University System & E-Learning

    Ali YAIZCI

    2007-01-01

    Full Text Available The Workshop on Global University System & E-Learning was held on the 19th of October, 2006 at TOBB Economics & Technology University. The workshop attracted around 40 people from the Ministry of Education, Turkish Satellite Corporation (TURKSAT, Anadolu University, and various academic staff from different universities in Ankara. All together, there were 8 presentations each followed by a discussion. Main contributors, their brief CV’s, and the workshop program are included in the preceding part of this document.Here, I would try to put together various important points and remarks made by the speakers according to the order in the program.The first talk was presented by Professor Tapio Varis, Acting President of GUS, about the Global University System (GUS. He started his talk by reviewing the trends of the 21st Century in terms of education and technology. He emphasized the need to humanize the globalization process by adding “solidarity”, “sprit of caring for”, and “sharing with others”. It was stated that, content development, especially for educational purposes, is a difficult issue in achieving this process. Professor Varis, declared “digital literacy” as being a right for all. He mentioned “phonetic alphabet” as a tool to alleviate the problems associated with the communication among different nationalities. He mentioned the need to exchange ideas, opinions and experience to create a successful working environment and stressed the importance of cultural issues such as quality assurance, translation and assessment. He also talked about open courseware, “education for all”, offered by MIT and UNESCO. Finally, Professor Varis summarized the mission of GUS as to offer a global quality education (described as a renaissance education program for developing countries and/or regions by taking into account cultural sensitivities.The second talk was presented by Professor Takeshi Utsumi about the Global Collaborative

  8. Influence of Different Etching Modes on Bond Strength to Enamel using Universal Adhesive Systems.

    Diniz, Ana Cs; Bandeca, Matheus C; Pinheiro, Larissa M; Dos Santosh Almeida, Lauber J; Torres, Carlos Rg; Borges, Alvaro H; Pinto, Shelon Cs; Tonetto, Mateus R; De Jesus Tavarez, Rudys R; Firoozmand, Leily M

    2016-10-01

    The adhesive systems and the techniques currently used are designed to provide a more effective adhesion with reduction of the protocol application. The objective of this study was to evaluate the bond strength of universal adhesive systems on enamel in different etching modes (self-etch and total etch). The mesial and distal halves of 52 bovine incisors, healthy, freshly extracted, were used and divided into seven experimental groups (n = 13). The enamel was treated in accordance with the following experimental conditions: FUE-Universal System - Futurabond U (VOCO) with etching; FUWE - Futurabond U (VOCO) without etching; SB-Total Etch System - Single Bond 2 (3M); SBUE-Universal System - Single Bond Universal (3M ESPE) with etching; SBUWE - Single Bond Universal (3M ESPE) without etching; CLE-Self-etch System - Clearfil SE Bond (Kuraray) was applied with etching; CLWE - Clearfil SE Bond (Kuraray) without etching. The specimens were made using the composite spectrum TPH (Dentsply) and stored in distilled water (37 ± 1°C) for 1 month. The microshear test was performed using the universal testing machine EMIC DL 2000 with the crosshead speed of 0.5 mm/minute. The bond strength values were analyzed using statistical tests (Kruskal-Wallis test and Mann-Whitney test) with Bonferroni correction. There was no statistically significant difference between groups (p adhesive interface revealed that most failures occurred between the interface composite resin and adhesive. The universal adhesive system used in dental enamel varies according to the trademark, and the previous enamel etching for universal systems and the self-etch both induced greater bond strength values. Selective enamel etching prior to the application of a universal adhesive system is a relevant strategy for better performance bonding.

  9. A Simulation Technique for Three-Dimensional Mechanical Systems Using Universal Software Systems of Analysis

    V. A. Trudonoshin

    2015-01-01

    Full Text Available The article proposes a technique to develop mathematical models (MM of elements of the three-dimensional (3D mechanical systems for universal simulation software systems that allow us automatically generate the MM of a system based on MM elements and their connections. The technique is based on the MM of 3 D body. Linear and angular velocities are used as the main phase variables (unknown in the MM of the system, linear and angular movements are used as the additional ones, the latter being defined by the normalized quaternions that have computational advantages over turning angles.The paper has considered equations of dynamics, formulas of transition from the global coordinate system to the local one and vice versa. A spherical movable joint is presented as an example of the interaction element between the bodies. The paper shows the MM equivalent circuits of a body and a spherical joint. Such a representation, as the equivalent circuit, automatically enables us to obtain topological equations of the system. Various options to build equations of the joint and advices for their practical use are given.

  10. Programming a massively parallel, computation universal system: static behavior

    Lapedes, A.; Farber, R.

    1986-01-01

    In previous work by the authors, the ''optimum finding'' properties of Hopfield neural nets were applied to the nets themselves to create a ''neural compiler.'' This was done in such a way that the problem of programming the attractors of one neural net (called the Slave net) was expressed as an optimization problem that was in turn solved by a second neural net (the Master net). In this series of papers that approach is extended to programming nets that contain interneurons (sometimes called ''hidden neurons''), and thus deals with nets capable of universal computation. 22 refs.

  11. Further results on universal properties in conservative dynamical systems

    Benettin, G [Padua Univ. (Italy). Ist. di Fisica; Galgani, L; Giorgilli, A [Milan Univ. (Italy). Ist. di Fisica; Milan Univ. (Italy). Ist. di Matematica)

    1980-10-11

    In conservative dynamical systems depending on a parameter, sequences of period-doubling bifurcations can be observed by varying the parameter, starting from a stable fixed point. These sequences are analogous to those already known for dissipative systems. The paper shows some new results obtained for two-dimensional conservative mappings.

  12. Statistics-based email communication security behavior recognition

    Yi, Junkai; Su, Yueyang; Zhao, Xianghui

    2017-08-01

    With the development of information technology, e-mail has become a popular communication medium. It has great significant to determine the relationship between the two sides of the communication. Firstly, this paper analysed and processed the content and attachment of e-mail using the skill of steganalysis and malware analysis. And it also conducts the following feature extracting and behaviour model establishing which based on Naive Bayesian theory. Then a behaviour analysis method was employed to calculate and evaluate the communication security. Finally, some experiments about the accuracy of the behavioural relationship of communication identifying has been carried out. The result shows that this method has a great effects and correctness as eighty-four percent.

  13. BEBAN JARINGAN SAAT MENGAKSES EMAIL DARI BEBERAPA MAIL SERVER

    Husni Thamrin

    2017-01-01

    Full Text Available Expensive internet facilities require prudent in its use both as a source of information and communication media. This paper discusses observations of the perceived burden of network bandwidth when accessing some of the mail server using a webmail application. Mail server in question consists of three commercial server and 2 non-commercial server. Data when it download home page, while logged in, open the email, and during idle logout recorded with sniffer Wireshark. Observations in various situations and scenarios indicate that access Yahoo email gives the network load is very high while the SquirrelMail gives the network load is very low than 5 other mail servers. For an institution, use a local mail server (institutional is highly recommended in the context of banddwidth savings.

  14. Evaluation of information technology impact on effective internal control in the University system

    Sanusi Fasilat, A., E-mail: Fasilat17@gmail.com; Hassan, Haslinda, E-mail: lynn@uum.edu.my [School of Accountancy, College of Business, Universiti Utara Malaysia, Sintok, Kedah (Malaysia)

    2015-12-11

    Information Technology (IT) plays a key role in internal control system in various organizations in terms of maintaining records and other internal services. Internal control system is defined as an efficient control procedures set up by firm to safeguard resources and to assure the reliability and accuracy of both financial and non-financial records in line with applicable governance and procedure to acquire the established goal and objectives. This paper focuses on the impact of IT on internal control system in the Nigerian universities. Data are collected from three different universities via questionnaire. Descriptive statistics is used to analyze the data; Chi-square is performed to test the hypothesis. The results of the hypothesis showed that IT has a positive relationship with the effective internal control activities in the University system. It is concluded that the adoption of IT will significantly improve the effectiveness of the internal control system operations in the University in terms of quality service delivery.

  15. Evaluation of information technology impact on effective internal control in the University system

    Sanusi Fasilat, A.; Hassan, Haslinda

    2015-01-01

    Information Technology (IT) plays a key role in internal control system in various organizations in terms of maintaining records and other internal services. Internal control system is defined as an efficient control procedures set up by firm to safeguard resources and to assure the reliability and accuracy of both financial and non-financial records in line with applicable governance and procedure to acquire the established goal and objectives. This paper focuses on the impact of IT on internal control system in the Nigerian universities. Data are collected from three different universities via questionnaire. Descriptive statistics is used to analyze the data; Chi-square is performed to test the hypothesis. The results of the hypothesis showed that IT has a positive relationship with the effective internal control activities in the University system. It is concluded that the adoption of IT will significantly improve the effectiveness of the internal control system operations in the University in terms of quality service delivery

  16. Evaluation of information technology impact on effective internal control in the University system

    Sanusi Fasilat, A.; Hassan, Haslinda

    2015-12-01

    Information Technology (IT) plays a key role in internal control system in various organizations in terms of maintaining records and other internal services. Internal control system is defined as an efficient control procedures set up by firm to safeguard resources and to assure the reliability and accuracy of both financial and non-financial records in line with applicable governance and procedure to acquire the established goal and objectives. This paper focuses on the impact of IT on internal control system in the Nigerian universities. Data are collected from three different universities via questionnaire. Descriptive statistics is used to analyze the data; Chi-square is performed to test the hypothesis. The results of the hypothesis showed that IT has a positive relationship with the effective internal control activities in the University system. It is concluded that the adoption of IT will significantly improve the effectiveness of the internal control system operations in the University in terms of quality service delivery.

  17. E-mail communication patterns and job burnout

    2018-01-01

    A considerable body of research has documented the negative effects of job burnout on employees and their organizations, emphasizing the importance of the identification of early signs of the phenomenon for the purposes of prevention and intervention. However, such timely identification is difficult due to the time and cost of assessing the burnout levels of all employees in an organization using established scales. In this paper, we propose an innovative way to identify employees at risk of job burnout by analyzing their e-mail communication patterns. Building on the Job Demands–Resources model, we theorize about the relationship between e-mail communication patterns and levels of employee exhaustion and disengagement (two dimensions of burnout). We analyzed 52,190 e-mails exchanged between 57 employees of a medium sized R&D company over a five-month period. We then related these employees’ communication patterns to their levels of burnout, collected using an established scale (the OLBI–Oldenburg Burnout Inventory). Our results provide support for the overall proposition of the paper, that e-mail communications can be used to identify individuals at risk of job burnout. Our models explain up to 34% of the variance of burnout and up to 37% and 19% respectively of the variance of exhaustion and disengagement. They also successfully distinguish between employees with a higher risk of burnout and those with lower levels of risk (F1 score of 84% with recall of 100% and 73% precision). We discuss the implications of our results and present suggestions for future research. PMID:29518128

  18. The Components of Communication Systems in Universities: Their Influence on Academic Work Life

    Uslu, Baris

    2018-01-01

    This research aimed to identify the components of communication systems in universities and to explore their influence on academic life. To collect data, interviews were carried out with academics from Australian universities. Thematic descriptive and content analyses were performed on the data-set. Analyses showed that the human relations unit,…

  19. Creating a University System for the 21st Century. Analysis of 2009-2011 Legislative Appropriation

    North Dakota University System, 2009

    2009-01-01

    The 2009-11 state general fund appropriation is $597.9 million for the eleven campuses, University of North Dakota (UND) School of Medicine and Health Sciences (SMHS), Forest Service and North Dakota University System Office, which is an increase of $153.4 million over the 2007-09 adjusted appropriation, less 07-09 one-time funding. This includes…

  20. Exploring the Multiple Roles of Lund University in Strengthening Scania's Regional Innovation System: Towards Institutional Learning?

    Benneworth, Paul Stephen; Coenen, Lars; Moodysson, Jerker; Asheim, Björn

    2009-01-01

    Universities are increasingly seen as potential contributors to regional innovative capacity by serving as local knowledge conduits, bringing global state-of-the-art science and technology into the region. In practice, however, more active university engagement with their regional innovation systems

  1. Interculturality from above and Below: Navigating Uneven Discourses in a Neoliberal University System

    Collins, Haynes

    2018-01-01

    This article draws on data from an ethnographic account of the institutionalisation of 'the intercultural' within a large British university. The study finds that although the term 'intercultural' is frequently used in multiple forms, it is often aligned with the dominant discourses of the neoliberal university system in order to become an…

  2. Effects of Mentioning the Incentive Prize in the Email Subject Line on Survey Response

    Robert Janke

    2014-03-01

    Full Text Available Objective – This study examined the effects that mentioning the survey incentive prize in the subject line of a reminder email had on the response rate and data quality. To date, manipulation of the subject line, specifically in terms of mentioning the incentive prize, has received limited attention in the survey design literature. Methods – The delivery of the survey invitation is discussed in terms of the timing of the launch and reminder emails. Particular emphasis is given to the design of the email subject line and justification of the format. Weekly response rates from four LibQUAL+TM surveys were compared. In addition, weekly responses for one year were analyzed using SPSS to investigate if there were any between means differences in terms of three elements of data quality. The three elements were: length of time it took to complete the survey, the number of core questions with an N/A response, and the number of illogical responses where minimum scores were higher than desired. Results – The response rates for the second week were grouped together based on the presence or absence of the subject line manipulation. There was a significant difference between these means (4.75%, p 0.033. There was no statistical difference in regards to the measures of data quality as determined by a one-way ANOVA test. Conclusions – Reminding survey participants with an email that mentions the incentive prize in the subject line appears to increase response rates with no deleterious effects on data quality. The results of this investigation are encouraging, and those running the LibQUAL+TM survey in their universities should consider implementing this method to increase response rates. Further research to replicate these findings in other contexts and using an experimental design would be beneficial.

  3. Ombuds' corner: Code of Conduct and e-mails

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Luke* holds a key position in the coordination of a large project. He is also a recognized expert in modeling complicated structures. Because of his expertise in the field, he receives a considerable number of e-mails every day which he has trouble responding to in addition to his responsibilities of management and development. Constantly interrupted, he tends to answer his emails quickly, sometimes even in an instinctive way, which leads to somewhat laconic messages. One day he receives an e-mail from Dave* challenging some of the decisions taken by the project’s management. Luke agrees with Dave’s remarks, which seem justified given his own expertise of the su...

  4. Classification of Phishing Email Using Random Forest Machine Learning Technique

    Andronicus A. Akinyelu

    2014-01-01

    Full Text Available Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals. In 2012, an online report put the loss due to phishing attack at about $1.5 billion. This global impact of phishing attacks will continue to be on the increase and thus requires more efficient phishing detection techniques to curb the menace. This paper investigates and reports the use of random forest machine learning algorithm in classification of phishing attacks, with the major objective of developing an improved phishing email classifier with better prediction accuracy and fewer numbers of features. From a dataset consisting of 2000 phishing and ham emails, a set of prominent phishing email features (identified from the literature were extracted and used by the machine learning algorithm with a resulting classification accuracy of 99.7% and low false negative (FN and false positive (FP rates.

  5. Decentralized or Centralized Systems for Colleges and Universities?

    Heydinger, Richard B.; Norris, Donald M.

    1979-01-01

    Arguments for and against decentralization of data management, analysis, and planning systems are presented. It is suggested that technological advances have encouraged decentralization. Caution in this direction is urged and the development of an articulated decentralization program is proposed. (SF)

  6. Demand for private healthcare in a universal public healthcare system: empirical evidence from Sri Lanka.

    Pallegedara, Asankha; Grimm, Michael

    2017-11-01

    This paper examines healthcare utilization behaviour in Sri Lanka with special emphasis on the choice between costly private and free public healthcare services. We use a data set that combines nationwide household survey data and district level healthcare supply data. Our findings suggest that even with universal public healthcare policy, richer people tend to use private sector healthcare services rather than public services. We also find significant regional and ethnic discrepancies in healthcare access bearing the risk of social tensions if these are further amplified. Latent class analysis shows in addition that the choice between private and public sector healthcare significantly differs between people with and without chronic diseases. We find in particular that chronically ill people rely for their day-to-day care on the public sector, but for their inpatient care they turn more often than non-chronically ill people to the private sector, implying an additional financial burden for the chronically ill. If the observed trend continues it may not only increase further the health-income gradient in Sri Lanka but also undermine the willingness of the middle class to pay taxes to finance public healthcare. © The Author 2017. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  7. EVALUATION OF UTILIZING SERVICE ORIENTED ARCHITECTURE AS A SUITABLE SOLUTION TO ALIGN UNIVERSITY MANAGEMENT INFORMATION SYSTEMS AND LEARNING MANAGEMENT SYSTEMS

    A. M. RIAD

    2009-10-01

    Full Text Available To help universities achieve their goals, it is important to align managerial functionalities side by side with educational aspects. Universities consume University Management Information Systems (UMIS to handle managerial aspects as they do with Learning Management Systems (LMS to achieve learning objectives. UMIS advances LMS by decades and has reached stable and mature consistency level. LMS is the newly acquired solution in Universities; compared to UMIS, and so adopting LMSs in universities can be achieved via three different deployment approaches. First approach believes in LMS ability to replace UMIS and performing its functionalities. Second approach presents the idea of extending UMIS to include LMS functionalities. Third approach arises from the shortages of the two proposed approaches and present integration between both as the appropriate deployment approach. Service Oriented Architecture (SOA is a design pattern that can be used as a suitable architectural solution to align UMIS and LMS. SOA can be utilized in universities to overcome some of information systems’ challenges like the integration between UMIS and LMS. This paper presents the current situation at Mansoura University; Egypt, presents integration as the most suitable solution, and evaluates three different implementation techniques: Dynamic Query, Stored Procedure, and Web services. Evaluation concludes that though SOA enhanced many different aspects of both UMIS and LMS; and consequently university overall. It is not recommended to adopt SOA via Web services as the building unit of the system, but as the interdisciplinary interface between systems.

  8. PHS terminal 'TEGACKY' dedicated to e-mailing; Mail senyo PHS tanmatsu 'TEGACKY

    NONE

    2000-03-01

    The e-mail utilization rate at mobile communication terminals is increasing at a remarkable rate, as if to grow above the rate of communication by voice. Under the circumstances, a PHS (Personal Handyphone System) terminal 'TEGACKY' (type name: PM-T101) has been developed, designed exclusively for use for e-mailing. 'TEGACKY' is characterized in that its icons may be activated with pen, that input may be made by handwriting, and that its large screen allows a 48-character message consisting of 4 lines of 12 characters to be displayed at one time despite its compact size. It can also perform communication directly with other terminals or e-mail via center, and is provided with an information service function. 'TEGACKY' having such distinguished features has created a new category of terminals which are at once e-mailing tools. (translated by NEDO)

  9. Office of university affairs management information system: Users guide and documentation

    Distin, J.; Goodwin, D.; Greene, W. A.

    1977-01-01

    Data on the NASA-University relationship are reported that encompass research in over 600 schools through several thousand grants and contracts. This user-driven system is capable of producing a variety of cyclical and query-type reports describing the total NASA-University profile. The capabilities, designed as part of the system, require a minimum of user maintenance in order to ensure system efficiency and data validity to meet the recurrent Statutory and Executive Branch information requirements as well as ad hoc inquiries from NASA general management, Congress, other Federal agencies, private sector organizations, universities and individuals. The data base contains information on each university, the individual projects and the financial details, current and historic, on all contracts and grants. Complete details are given on the system from its unique design features to the actual steps required for daily operation.

  10. Availability of thermodynamic system with multiple performance parameters based on vector-universal generating function

    Cai Qi; Shang Yanlong; Chen Lisheng; Zhao Yuguang

    2013-01-01

    Vector-universal generating function was presented to analyze the availability of thermodynamic system with multiple performance parameters. Vector-universal generating function of component's performance was defined, the arithmetic model based on vector-universal generating function was derived for the thermodynamic system, and the calculation method was given for state probability of multi-state component. With the stochastic simulation of the degeneration trend of the multiple factors, the system availability with multiple performance parameters was obtained under composite factors. It is shown by an example that the results of the availability obtained by the binary availability analysis method are somewhat conservative, and the results considering parameter failure based on vector-universal generating function reflect the operation characteristics of the thermodynamic system better. (authors)

  11. Innovation System Reform in Indonesia and Vietnam: A new Role for Universities?

    Erik Baark

    2016-07-01

    Full Text Available This paper introduces the importance of the role of universities in emerging economies such as Indonesia and Vietnam, underscoring the need for universities to contribute more extensively to the dynamic development of innovation systems. The theoretical approach is a functional analysis of innovation systems, identifying essential issues that call for recognition among policymakers and in society generally. Innovation systems in Indonesia and Vietnam share some weaknesses, particularly in comparison with innovation systems in more advanced countries. There is limited ability to mobilize the resources required for innovation, as the investment in research and development as percentage of GDP is relatively low and dominated by public funding with little contribution from private sources. Financial regulation for universities seriously hampers the development of university–industry linkages. It is essential that universities gain more autonomy in order to move beyond their current role in training of skilled human resources to providers of innovation.

  12. Study on Enterprise Education System for Undergraduates in Universities

    Zhang, Min

    2014-01-01

    This paper studies the higher school undergraduate entrepreneurship education system. Its architecture mainly includes five aspects of content: improve the students' entrepreneurial cognitive ability, adjust the teacher's education idea, carry out various kinds of entrepreneurship and entrepreneurial training, carry out flexible forms of team…

  13. Steps towards the universal direct current distribution system

    Mackay, L.J.

    2018-01-01

    The traditional ac power system is challenged by emerging distributed renewable energy sources and an increase in installed load capacity, e.g., electric vehicles. Most of these new resources use inherently dc as do more and more appliances. This poses the question, if they should still be connected

  14. Information System Governance in Moroccan Universities: Case of ...

    pc

    2018-03-05

    Mar 5, 2018 ... Abstract- Good governance of information systems is a guarantee of an ... that it meets the expectations of the various internal and external .... Information Technologies allows to orient and control the ... investment and its impact, due to training time and the effects ... student affairs, accounting services).

  15. Going Tobacco-Free on 24 New York City University Campuses: A Public Health Agency's Partnership with a Large Urban Public University System

    Bresnahan, Marie P.; Sacks, Rachel; Farley, Shannon M.; Mandel-Ricci, Jenna; Patterson, Ty; Lamberson, Patti

    2016-01-01

    The New York City Department of Health and Mental Hygiene partnered with the nation's largest university system, the City University of New York (CUNY), to provide technical assistance and resources to support the development and implementation of a system-wide tobacco-free policy. This effort formed one component of "Healthy CUNY"--a…

  16. AUTOMATED FLOWCHART SYSTEM FROM TEXAS A&M UNIVERSITY

    Woodford, W.

    1994-01-01

    An accurate flowchart is an important part of the documentation for any computer program. The flowchart offers the user an easy to follow overview of program operation and the maintenance programmer an effective debugging tool. The TAMU FLOWCHART System was developed to flowchart any program written in the FORTRAN language. It generates a line printer flowchart which is representative of the program logic. This flowchart provides the user with a detailed representation of the program action taken as each program statement is executed. The TAMU FLOWCHART System should prove to be a valuable aid to groups working with complex FORTRAN programs. Each statement in the program is displayed within a symbol which represents the program action during processing of the enclosed statement. Symbols available include: subroutine, function, and entry statements; arithmetic statements; input and output statements; arithmetical and logical IF statements; subroutine calls with or without argument list returns; computed and assigned GO TO statements; DO statements; STOP and RETURN statements; and CONTINUE and ASSIGN statements. Comment cards within the source program may be suppressed or displayed and associated with a succeeding source statement. Each symbol is annotated with a label (if present in the source code), a block number, and the statement sequence number. Program flow and options within the program are represented by line segments and direction indicators connecting symbols. The TAMU FLOWCHART System should be able to accurately flowchart any working FORTRAN program. This program is written in COBOL for batch execution and has been implemented on an IBM 370 series computer with an OS operating system and with a central memory requirement of approximately 380K of 8 bit bytes. The TAMU FLOWCHART System was developed in 1977.

  17. University of Rhode Island Regional Earth Systems Center

    Rothstein, Lewis [Univ. of Rhode Island, Kingston, RI (United States); Cornillon, P. [Univ. of Rhode Island, Kingston, RI (United States)

    2017-02-06

    The primary objective of this program was to establish the URI Regional Earth System Center (“Center”) that would enhance overall societal wellbeing (health, financial, environmental) by utilizing the best scientific information and technology to achieve optimal policy decisions with maximum stakeholder commitment for energy development, coastal environmental management, water resources protection and human health protection, while accelerating regional economic growth. The Center was to serve to integrate existing URI institutional strengths in energy, coastal environmental management, water resources, and human wellbeing. This integrated research, educational and public/private sector outreach Center was to focus on local, state and regional resources. The centerpiece activity of the Center was in the development and implementation of integrated assessment models (IAMs) that both ‘downscaled’ global observations and interpolated/extrapolated regional observations for analyzing the complexity of interactions among humans and the natural climate system to further our understanding and, ultimately, to predict the future state of our regional earth system. The Center was to begin by first ‘downscaling’ existing global earth systems management tools for studying the causes of local, state and regional climate change and potential social and environmental consequences, with a focus on the regional resources identified above. The Center would ultimately need to address the full feedbacks inherent in the nonlinear earth systems by quantifying the “upscaled” impacts of those regional changes on the global earth system. Through an interacting suite of computer simulations that are informed by observations from the nation’s evolving climate observatories, the Center activities integrates climate science, technology, economics, and social policy into forecasts that will inform solutions to pressing issues in regional climate change science,

  18. Essential Skills for System Dynamics Practitioners : A Delft University of Technology Perspective

    Meyers, W.K.; Slinger, J.H.; Pruyt, E.; Yucel, G.; Van Daalen, C.

    2010-01-01

    There is little consensus on the skills set required of a system dynamics practitioner. In this paper we use the teaching approach and learning goals of the system dynamics courses at the Delft University of Technology as a starting point to explore the development of system dynamics modeling

  19. Networking the Home and University: How Families Can Be Integrated into Proximate/Distant Computer Systems.

    Watson, J. Allen; And Others

    1989-01-01

    Describes study that was conducted to determine the feasibility of networking home microcomputers with a university mainframe system in order to investigate a new family process research paradigm, as well as the design and function of the microcomputer/mainframe system. Test instrumentation is described and systems' reliability and validity are…

  20. Defining the Symmetry of the Universal Semi-Regular Autonomous Asynchronous Systems

    Serban E. Vlad

    2012-02-01

    Full Text Available The regular autonomous asynchronous systems are the non-deterministic Boolean dynamical systems and universality means the greatest in the sense of the inclusion. The paper gives four definitions of symmetry of these systems in a slightly more general framework, called semi-regularity, and also many examples.

  1. North Dakota University System Annual Financial Report, Fiscal Year Ended June 30, 2007

    North Dakota University System, 2007

    2007-01-01

    This report provides financial data for the North Dakota University System (the "System") for the fiscal year ended June 30, 2007. The Management Discussion and Analysis; the Statement of Net Assets; the Statement of Revenues, Expenses, and Changes in Net Assets; and the Statement of Cash Flows provide information on the System as a…

  2. Universal phase diagram for high-piezoelectric perovskite systems

    Cox, D.E.; Noheda, B.; Shirane, G.; Uesu, Y.; Fujishiro, K.; Yamada, Y.

    2001-01-01

    Strong piezoelectricity in perovskite-type PbZn1-xTixO3 (PZT) and Pb(Zn1/3Nb2/3)O3–PbTiO3 (PZN–PT) systems is generally associated with the existence of a morphotropic phase boundary (MPB) separating regions with rhombohedral and tetragonal symmetry. An x-ray study of PZN–9% PT has revealed the

  3. Pengembangan Content Management System pada Admisi Online Binus University

    Karto Iskandar

    2012-12-01

    Full Text Available Technically registration form for new Binus institution must be regenerated and not dynamic. Therefore, this research is objected to simplify the creation of registration process for new Binus institution and provide solutions to the problem when Binus establish other new institutions. Methodology used is analysis and design of the database (database oriented. Analysis is done by asking the problems of existing systems in the IT Directorate, whereas the design uses UML diagram notation 2.0. The results obtained is front end and back end applications for the Content Management System of the registration form. The results of this design can be used to simplify the new student registration or in the many Binus institutions by grouping similar fields. With some changes in the front end and back end applications for content Management System, the addition of new online admission application form can be managed faster, where the creation of admision registration form is managed in the back end application. As suggestions for future development, online admission registration can be run in mobile version.

  4. Universality in low energy three-body systems

    Amorim, A.E.A.; Tomio, L; Frederico, T.

    1997-01-01

    The renormalizability of the quantum theory of non-relativistic three-body system with zero range interaction, warranties that all the low-energy three-body properties are well defined and the low-energy two-body and only one three-body physical information are known. Considering this observation, we have shown that the conditions for the occurrence of Efimov states can be easily reached with any model of short range potential where the three-body ground state and the corresponding binding energy of the subsystems are kept fixed. This approach was applied to the recently discovered halo nuclei. (author)

  5. Rapid response: email, immediacy, and medical humanitarianism in Aceh, Indonesia.

    Grayman, Jesse Hession

    2014-11-01

    After more than 20 years of sporadic separatist insurgency, the Free Aceh Movement and the Indonesian government signed an internationally brokered peace agreement in August 2005, just eight months after the Indian Ocean tsunami devastated Aceh's coastal communities. This article presents a medical humanitarian case study based on ethnographic data I collected while working for a large aid agency in post-conflict Aceh from 2005 to 2007. In December 2005, the agency faced the first test of its medical and negotiation capacities to provide psychiatric care to a recently amnestied political prisoner whose erratic behavior upon returning home led to his re-arrest and detention at a district police station. I juxtapose two methodological approaches-an ethnographic content analysis of the agency's email archive and field-based participant-observation-to recount contrasting narrative versions of the event. I use this contrast to illustrate and critique the immediacy of the humanitarian imperative that characterizes the industry. Immediacy is explored as both an urgent moral impulse to assist in a crisis and a form of mediation that seemingly projects neutral and transparent transmission of content. I argue that the sense of immediacy afforded by email enacts and amplifies the humanitarian imperative at the cost of abstracting elite humanitarian actors out of local and moral context. As a result, the management and mediation of this psychiatric case by email produced a bureaucratic model of care that failed to account for complex conditions of chronic political and medical instability on the ground. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Laboratory Performance of Universal Adhesive Systems for Luting CAD/CAM Restorative Materials.

    Siqueira, Fabiana; Cardenas, Andres Millan; Gutierrez, Mario Felipe; Malaquias, Pâmela; Hass, Viviane; Reis, Alessandra; Loguercio, Alessandro D; Perdigão, Jorge

    To evaluate the microshear bond strength (μSBS) of several universal adhesive systems applied on five different indirect restorative materials. Five CAD/CAM materials were selected: 1) indirect resin composite (LAV); 2) feldspathic glass ceramic (VTR); 3) leucite-reinforced glass-ceramic (EMP); 4) lithium disilicate ceramic (EMX); 5) yttrium-stabilized zirconium dioxide (CZI). For each material, 15 blocks were cut into 4 rectangular sections (6 × 6 × 6 mm) (n = 60 per group), and processed as recommended by the respective manufacturer. For each indirect material, the following adhesive systems were applied according to the respective manufacturer's instructions: 1) AdheSE Universal [ADU]; 2) All-Bond Universal (ABU); 3) Ambar Universal (AMB); 4) Clearfil Universal (CFU); 5) Futurabond U (FBU); 6) One Coat 7 Universal (OCU); 7) Peak Universal Bond (PUB); 8) Prime&Bond Elect (PBE); 9) Scotchbond Universal Adhesive (SBU); 10) Xeno Select (XEN, negative control). After the application of the adhesive system, cylinder-shaped transparent matrices were filled with a dual-curing resin cement (NX3) and light cured. Specimens were stored in water (37°C for 24 h) and tested in shear mode at 1.0 mm/min (mSBS). The failure pattern and μSBS were statistically evaluated (a = 0.05). LAV, VTR, and EMP showed a greater number of cohesive fractures than EMX and CZI (p materials. There was a wide variability in mean μSBS when different universal adhesives were applied to the several CAD/CAM indirect materials. Most universal adhesives bonded well to air-abraded zirconia.

  7. INTEGRATION CHALLENGES OF UNIVERSITY AND INFORMATION MANAGEMENT SYSTEM (UIMS TO MOODLE

    Jyldyzbek J. Jakshylykov

    2016-06-01

    Full Text Available Introduction: in 2006 an International Ataturk Ala-Too University (IAAU began to adopt internationally recognised Bologna system, which was initiated by the Ministry of Science and Education of Kyrgyz Republic because of problems of managerial and educational problems at universities in Kyrgyzstan. Consequently, IAAU had to improve its information and grading system and created University Information and Manage¬ment System (UIMS, which was developed by the university professional team including the author. At the same time, the university began to apply a Moodle software, which delivers open source management system programs, in order to appropriately manage teaching proc esses and manage courses online. Materials and Methods: the methodological basis of the research are descriptive method, analysis, and comparison. Results: however, the IAAU faced some challenged issues in the application of the two innovation, which was the integration challenges of those Moodle and UIMS. Hence, the main purpose of this study is to demonstrate benefits of Moodle and UIMS linking challenges. at first, this paper informs Moodle functions, features, advantages and disadvantages in a shortly manner and UIMS management features and primary functions, which included six fundamentally crucial processes with some graphical representations. In addition, the analysis and methodologies of two systems through identifying advantages and disadvantages for the possible integ ration. Discussion and Conclusions: at the end, some challenged issues were identified from analysis results, also Moodle and UIMS benefits were demonstrated in the International Ataturk Ala-Too University.

  8. Information Systems Audit for University Governance in Bucharest Academy of Economic Studies

    Ion Gh. ROSCA

    2010-01-01

    Full Text Available Today's successful audit leaders never lose sight of the importance of continually assessing and improving the organizations' university governance structure. Focusing on small and large mission, and using practical exercises and individual activities, the auditors will help gain the skills necessary to review and improve university governance structure, while developing techniques to assess risk management activities. Attendees will leave with an understanding of legal and regulatory guidelines as they pertain to university governance and discuss in-depth issues such as business ethics, transparency and disclosure, IT governance and university risks management. Identification, evaluation and management of university risks, is an important element of the university governance system. Today, the Bucharest Academy of Economic Studies is in a complex process to realize a university governance integrate information system. In context of this paperwork there are presented the main aspects for developing and implementing in actual phase information systems audit, to recognize the risks and establish the necessary measures to eliminate them.

  9. [Mobile-phone e-mail use, social networks, and loneliness among Japanese high school students].

    Ogata, Yasuko; Izumi, Yukiko; Kitaike, Tadashi

    2006-07-01

    The purposes of this study were to assess the loneliness of Japanese high school students who own and use a mobile phone, to clarify the relationships between students' loneliness and their social network and frequency of use of e-mail feature, and to demonstrate relationships with a student's social network and recognition of the benefits and drawbacks of mobile phone use. The participants were 227 students from two classes in each grade of a high school in the Kanto region of Japan. Participants answered a questionnaire covering the UCLA Loneliness Scale as well as questions pertaining to the circumstances of use of their mobile phones, their social networks (e.g., number of friends), and their perceptions of the benefits and drawbacks of mobile phone use. The questionnaires of students owning a mobile phone were analyzed. Total scores for the UCLA Loneliness Scale were calculated, and factor analysis was performed for the benefits and drawbacks. A total of 220 questionnaires were returned, for which 94.1 percent of respondents owned a mobile phone. The percentages of male and female respondents were 58% and 42%. Chronbach's alpha for the UCLA Loneliness Scale (total score) was 0.87, a result similar to previous studies with high school and university students. Factor analysis revealed five factors associated with the benefits and drawbacks of mobile phone use. Multiple-regression analysis showed that 42.9% of the variance in "frequency of e-mail use" was explained by grade level, frequency of mobile phone use, and two of the five factors from the benefits and drawbacks ("difficulty of communication," and "possible sleep loss due to nighttime e-mailing"). Stepwise multiple-regression analysis revealed that 24.4% of the variance in UCLA Loneliness Score was explained by gender, the frequency of e-mail use, the number of friends and the presence/absence of a girlfriend or boyfriend. Presence of an active social network and frequent e-mailing by mobile phone reduced

  10. Maintaining confidentiality in prospective studies: anonymous repeated measurements via email (ARME) procedure.

    Carli, Vladimir; Hadlaczky, Gergö; Wasserman, Camilla; Stingelin-Giles, Nicola; Reiter-Theil, Stella; Wasserman, Danuta

    2012-02-01

    Respecting and protecting the confidentiality of data and the privacy of individuals regarding the information that they have given as participants in a research project is a cornerstone of complying with accepted research standards. However, in longitudinal studies, establishing and maintaining privacy is often challenging because of the necessity of repeated contact with participants. A novel internet-based solution is introduced here, which maintains privacy while at the same time ensures linkage of data to individual participants in a repeated measures design. With the use of the anonymous repeated measurements via email (ARME) procedure, two separate one-way communication systems are established through ad hoc email accounts and a secure study website. Strengths and limitations of the approach are discussed.

  11. Universal features of localized eigenstates in disordered systems

    Ludlam, J J; Taraskin, S N; Elliott, S R; Drabold, D A

    2005-01-01

    Localization-delocalization transitions occur in problems ranging from semiconductor-device physics to propagation of disease in plants and viruses on the internet. Here, we report calculations of localized electronic and vibrational eigenstates for remarkably different, mostly realistic, disordered systems and point out similar characteristics in the cases studied. We show in each case that the eigenstates may be decomposed into exponentially localized islands which may appear in many different eigenstates. In all cases, the decay length of the islands increases only modestly near the localization-delocalization transition; the eigenstates become extended primarily by proliferation (growth in number) of islands near the transition. Recently, microphotoluminescence experiments (Guillet et al 2003 Phys. Rev. B 68 045319) have imaged exciton states in disordered quantum wires, and these bear a strong qualitative resemblance to the island structure of eigenstates that we have studied theoretically. (letter to the editor)

  12. ABOUT THE GENERAL CONCEPT OF THE UNIVERSAL STORAGE SYSTEM AND PRACTICE-ORIENTED DATA PROCESSING

    L. V. Rudikova

    2017-01-01

    Full Text Available Approaches evolution and concept of data accumulation in warehouse and subsequent Data Mining use is perspective due to the fact that, Belarusian segment of the same IT-developments is organizing. The article describes the general concept for creation a system of storage and practice-oriented data analysis, based on the data warehousing technology. The main aspect in universal system design on storage layer and working with data is approach uses extended data warehouse, based on universal platform of stored data, which grants access to storage and subsequent data analysis different structure and subject domains have compound’s points (nodes and extended functional with data structure choice option for data storage and subsequent intrasystem integration. Describe the universal system general architecture of storage and analysis practice-oriented data, structural elements. Main components of universal system for storage and processing practice-oriented data are: online data sources, ETL-process, data warehouse, subsystem of analysis, users. An important place in the system is analytical processing of data, information search, document’s storage and providing a software interface for accessing the functionality of the system from the outside. An universal system based on describing concept will allow collection information of different subject domains, get analytical summaries, do data processing and apply appropriate Data Mining methods and algorithms.

  13. SPONGY (SPam ONtoloGY: Email Classification Using Two-Level Dynamic Ontology

    Seongwook Youn

    2014-01-01

    Full Text Available Email is one of common communication methods between people on the Internet. However, the increase of email misuse/abuse has resulted in an increasing volume of spam emails over recent years. An experimental system has been designed and implemented with the hypothesis that this method would outperform existing techniques, and the experimental results showed that indeed the proposed ontology-based approach improves spam filtering accuracy significantly. In this paper, two levels of ontology spam filters were implemented: a first level global ontology filter and a second level user-customized ontology filter. The use of the global ontology filter showed about 91% of spam filtered, which is comparable with other methods. The user-customized ontology filter was created based on the specific user’s background as well as the filtering mechanism used in the global ontology filter creation. The main contributions of the paper are (1 to introduce an ontology-based multilevel filtering technique that uses both a global ontology and an individual filter for each user to increase spam filtering accuracy and (2 to create a spam filter in the form of ontology, which is user-customized, scalable, and modularized, so that it can be embedded to many other systems for better performance.

  14. SPONGY (SPam ONtoloGY): email classification using two-level dynamic ontology.

    Youn, Seongwook

    2014-01-01

    Email is one of common communication methods between people on the Internet. However, the increase of email misuse/abuse has resulted in an increasing volume of spam emails over recent years. An experimental system has been designed and implemented with the hypothesis that this method would outperform existing techniques, and the experimental results showed that indeed the proposed ontology-based approach improves spam filtering accuracy significantly. In this paper, two levels of ontology spam filters were implemented: a first level global ontology filter and a second level user-customized ontology filter. The use of the global ontology filter showed about 91% of spam filtered, which is comparable with other methods. The user-customized ontology filter was created based on the specific user's background as well as the filtering mechanism used in the global ontology filter creation. The main contributions of the paper are (1) to introduce an ontology-based multilevel filtering technique that uses both a global ontology and an individual filter for each user to increase spam filtering accuracy and (2) to create a spam filter in the form of ontology, which is user-customized, scalable, and modularized, so that it can be embedded to many other systems for better performance.

  15. SPONGY (SPam ONtoloGY): Email Classification Using Two-Level Dynamic Ontology

    2014-01-01

    Email is one of common communication methods between people on the Internet. However, the increase of email misuse/abuse has resulted in an increasing volume of spam emails over recent years. An experimental system has been designed and implemented with the hypothesis that this method would outperform existing techniques, and the experimental results showed that indeed the proposed ontology-based approach improves spam filtering accuracy significantly. In this paper, two levels of ontology spam filters were implemented: a first level global ontology filter and a second level user-customized ontology filter. The use of the global ontology filter showed about 91% of spam filtered, which is comparable with other methods. The user-customized ontology filter was created based on the specific user's background as well as the filtering mechanism used in the global ontology filter creation. The main contributions of the paper are (1) to introduce an ontology-based multilevel filtering technique that uses both a global ontology and an individual filter for each user to increase spam filtering accuracy and (2) to create a spam filter in the form of ontology, which is user-customized, scalable, and modularized, so that it can be embedded to many other systems for better performance. PMID:25254240

  16. Phishtest: Measuring the Impact of Email Headers on the Predictive Accuracy of Machine Learning Techniques

    Tout, Hicham

    2013-01-01

    The majority of documented phishing attacks have been carried by email, yet few studies have measured the impact of email headers on the predictive accuracy of machine learning techniques in detecting email phishing attacks. Research has shown that the inclusion of a limited subset of email headers as features in training machine learning…

  17. Email Related Crimes%电子邮件犯罪

    王小刚

    2006-01-01

    @@ Email has fast emerged as the world's most preferred form of communication. Billions of email messages traverse1 the globe daily. Like any other form of communication, email is also misused by criminal elements. The ease, speed and relative anonymity2 of email has made it a powerful tool for criminals.

  18. Measuring Future Worker Productivity via Business Email Message Creation: Implications for Education

    Hagler, Barbara E.; Erthal, Margaret; Walzer, Dona; Anderson, Marcia A.

    2009-01-01

    Objective: This research was conducted to determine if relationships exist among college students' business email message productivity score and (a) email message quality score, (b) text keying method used to create email message, and (c) self-reported college English grade. Background: Email is increasingly the communication channel preferred for…

  19. 36 CFR 1250.24 - Will you accept a FOIA request through email?

    2010-07-01

    ... request through email? 1250.24 Section 1250.24 Parks, Forests, and Public Property NATIONAL ARCHIVES AND... Access Records Under FOIA § 1250.24 Will you accept a FOIA request through email? Yes, send email FOIA... of your email message that you are sending a FOIA request. The body of the message must contain all...

  20. 36 CFR 1250.76 - May I email my FOIA appeal?

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false May I email my FOIA appeal... email my FOIA appeal? Yes, you may submit a FOIA appeal via email to http://www.archives.gov/global_pages/inquire_form.html. You must put the words “FOIA Appeal” in the subject line of your email message...

  1. ON EXPERIENCE OF THE COLLABORATION AND PROJECT MANAGEMENT INFORMATION SYSTEM PODIO IMPLEMENTATION IN THE MEDICAL UNIVERSITY

    Andrii V. Semenets

    2014-12-01

    Full Text Available The Information Technologies role in the medical university management is analyzed. The importance of the application of the electronic document management in the medical universities is shown. The implementation capabilities of the electronic document management system within a cloud services are shown. A Podio collaboration and project management cloud service features overview is presented. The methodology of the Podio capabilities usage to the medical university task management solving is developed. An approaches to the Podio Workspaces and Applications development for the faculties collaboration and project management in the departments of the medical universities are presented. The examples of the Podio features usage to the work-flow automation of the information-analytical and hardware and software support departments of the Ternopil State Medical University named after I. Ja. Horbachevsky are shown.

  2. AN AUTOMATED IMPLEMENTATION OF INDIAN UNIVERSITY ADMISSION SYSTEM USING ARTIFICIAL NEURAL NETWORKS

    B. Sankarasubramanian

    2014-04-01

    Full Text Available Indian University Admission is a complex phenomenon encompassing various factors both tangible and intangible. Apart from Merit - Caste, Community and Religion play a crucial role in getting admission to various courses offered by Universities. The Single Window Admission System followed by almost all Government Universities (for example: Anna University, Chennai is, so far, the best practice to offer Admission sought by student community. But, still, in Private Universities, the Admission process is done manually since number of students seeking a course is smaller in size. This manual process is fraught with some drawbacks: such as slower in time, cumbersome and costlier, bias by the Admission Officer, manual errors while processing, due to influence exercised by powerful people qualified students not getting their course of choice and unqualified students getting into their course of willingness and etc. This paper addresses these problems via neural network architecture based Admission system which will eliminate all the pitfalls and drawbacks inherent in the current system and offers a smooth, clearer, easier and cost effective way of student admission system implementation in Indian Universities.

  3. Partnership Opportunities In Earth System Science Education Between Historically Black and Historically White Universities: Elizabeth City State University and the University of New Hampshire

    Williams, J. E.; Hayden, L. B.; Wake, C. P.; Varner, R. K.; Graham, K.; Rock, B. N.; Hale, S.; Hurtt, G. C.; Porter, W.; Blackmon, R.; Bryce, J. G.; Branch, B. D.; Johnson, J. E.

    2009-12-01

    Federal efforts to promote the participation of underrepresented students in the science, technology, engineering and mathematics disciplines (STEM) in higher education have been in effect over several decades. The Science and Engineering Equal Opportunities Act of 1980 aimed to create equal opportunity in the STEM disciplines by promoting and broadening the participation of underrepresented talent in science and engineering. Since that time, federal agencies such as the National Science Foundation, NOAA and NASA, scientific organizations such as the American Geophysical Union, and other organizations such as the Educational Testing Service have created programs, diversity plans and cutting edge reports designed to further explicate the need to broaden the participation of underrepresented student talent in these disciplines. Despite increases in the degrees awarded to underrepresented students in the STEM disciplines, enhancing diversity in these disciplines continues to remain a significant challenge. This paper describes a strategic approach to this challenge via the development of a collaborative partnership model between two universities: the historically black Elizabeth City State University (ESCU) and the historically white University of New Hampshire (UNH). The alliance, built on a mutually-agreed upon set of partnership principles, strives to enhance opportunities for underrepresented students to pursue careers in STEM disciplines, specifically those in Earth system science and remote sensing. In examining the partnership, six promising practices that help advance its success come to the forefront. These practices include institutional commitment and faculty engagement, mutual respect and shared time commitment, identifying engaged leadership, engaging critical change agents, initiating difficult dialogues, and preparing for growth and evolution. Outcomes of the partnership to date include the successful submission and funding of four collaborative

  4. A universal piezo-driven ultrasonic cell microinjection system.

    Huang, Haibo; Mills, James K; Lu, Cong; Sun, Dong

    2011-08-01

    Over the past decade, the rapid development of biotechnologies such as gene injection, in-vitro fertilization, intracytoplasmic sperm injection (ICSI) and drug development have led to great demand for highly automated, high precision equipment for microinjection. Recently a new cell injection technology using piezo-driven pipettes with a very small mercury column was proposed and successfully applied in ICSI to a variety of mammal species. Although this technique significantly improves the survival rates of the ICSI process, shortcomings due to the toxicity of mercury and damage to the cell membrane due to large lateral tip oscillations of the injector pipette may limit its application. In this paper, a new cell injection system for automatic batch injection of suspended cells is developed. A new design of the piezo-driven cell injector is proposed for automated suspended cell injection. This new piezo-driven cell injector design relocates the piezo oscillation actuator to the injector pipette which eliminates the vibration effect on other parts of the micromanipulator. A small piezo stack is sufficient to perform the cell injection process. Harmful lateral tip oscillations of the injector pipette are reduced substantially without the use of a mercury column. Furthermore, ultrasonic vibration micro-dissection (UVM) theory is utilized to analyze the piezo-driven cell injection process, and the source of the lateral oscillations of the injector pipette is investigated. From preliminary experiments of cell injection of a large number of zebrafish embryos (n = 200), the injector pipette can easily pierce through the cell membrane at a low injection speed and almost no deformation of the cell wall, and with a high success rate(96%) and survival rate(80.7%) This new injection approach shows good potential for precision injection with less damage to the injected cells.

  5. Design and Implementation of Online Booking System of University Sports Venues

    Li Can

    2017-01-01

    Full Text Available To solve the imbalanced use of university sports venues, the online booking system of university sports venues based on the table tennis hall of Zhengzhou University is designed, combining the experience of the existing online booking systems, the main methods and the major ideal of building these systems both at home and aboard. The basic functions of the system are designed according to the general requirement analysis, including user’s registration and login, online venue booking, online payment, personal center, message board and database construction. The development of the system used Java programming language, JSP (a Web platform development technology, MySQL database processing technology, JDBC data access model, MyEclipse development platform and Tomcat server. The system has accomplished such functions as online booking, online payment and online message. The tests of the system are run in good conditions. The use of the system has made up for the current luck of sports venues management, solved the problems of the online booking function of university sports venues, improved the efficiency of the venues and meet the needs of efficient use of the venues. The system can be an experience of the management of the other college sports venues.

  6. [Using the concept of universal health coverage to promote the health system reform in China].

    Hu, S L

    2016-11-06

    The paper is systematically explained the definition, contents of universal health coverage (UHC). Universal health coverage calls for all people to have access to quality health services they need without facing undue financial burden. The relationship between five main attributes, i.e., quality, efficiency, equity, accountability and resilience, and their 15 action plans has been explained. The nature of UHC is belonged to the State and government. The core function is commitment with equality. The whole-of-system method is used to promoting the health system reform. In China, the universal health coverage has been reached to the preliminary achievements, which include universal coverage of social medical insurance, basic medical services, basic public health services, and the provision of essential medicines. China has completed millennium development goals (MDG) and is being stepped to the sustainable development goals (SDG).

  7. RELAP/SCDAPSIM Reactor System Simulator Development and Training for University and Reactor Applications

    Hohorst, J.K.; Allison, C.M.

    2010-01-01

    The RELAP/SCDAPSIM code, designed to predict the behaviour of reactor systems during normal and accident conditions, is being developed as part of an international nuclear technology development program called SDTP (SCDAP Development and Training Program). SDTP involves more than 60 organizations in 28 countries. One of the important applications of the code is for simulator training of university faculty and students, reactor analysts, and reactor operations and technical support staff. Examples of RELAP/SCDAPSIM-based system thermal hydraulic and severe accident simulator packages include the SAFSIM simulator developed by NECSA for the SAFARI research reactor in South Africa, university-developed simulators at the University of Mexico and Shanghai Jiao Tong University in China, and commercial VISA and RELSIM packages used for analyst and reactor operations staff training. This paper will briefly describe the different packages/facilities. (authors)

  8. RELAP/SCDAPSIM Reactor System Simulator Development and Training for University and Reactor Applications

    Hohorst, J.K.; Allison, C.M. [Innovative Systems Software, 1242 South Woodruff Avenue, Idaho Falls, Idaho 83404 (United States)

    2010-07-01

    The RELAP/SCDAPSIM code, designed to predict the behaviour of reactor systems during normal and accident conditions, is being developed as part of an international nuclear technology development program called SDTP (SCDAP Development and Training Program). SDTP involves more than 60 organizations in 28 countries. One of the important applications of the code is for simulator training of university faculty and students, reactor analysts, and reactor operations and technical support staff. Examples of RELAP/SCDAPSIM-based system thermal hydraulic and severe accident simulator packages include the SAFSIM simulator developed by NECSA for the SAFARI research reactor in South Africa, university-developed simulators at the University of Mexico and Shanghai Jiao Tong University in China, and commercial VISA and RELSIM packages used for analyst and reactor operations staff training. This paper will briefly describe the different packages/facilities. (authors)

  9. The Construction and Empirical Analysis of Financial Risk Early Warning System in Colleges and Universities

    Dai Jiaxu

    2017-03-01

    Full Text Available In recent years, China's higher education into the period of rapid development, high growth will inevitably bring high demand for financial support, but the government investment can not keep up with the pace of development of colleges and universities, so many colleges and universities choose bank loans, blind expansion will be out of control Resulting in college financial crisis. This paper proposes a method to construct the financial risk evaluation model of colleges and universities. The model is based on the specific risk index system, and uses the analytic hierarchy process and Delphi expert scoring method as the theoretical basis. The model can calculate the type and level of financial risk in colleges and universities, and provide support for the system decision-making.

  10. LA MUJER EN EL ÁMBITO UNIVERSITARIO / WOMEN IN THE UNIVERSITY SYSTEM

    María Teresa Pérez Vázquez

    2017-12-01

    Full Text Available The aim of the present paper is to describe and analyze the professional activity of women in the university system. An analysis of this sector of population will be performed in order to determine their position in both, figures and percentages, for those working in Spanish universities. Finally, the study focuses in female faculty members by bringing data related to their distribution by Autonomous Communities, positions, age range, areas of knowledge, difficulties and leadership patterns, as well as their contribution to their Institution’s development in directing and managing the different areas of the universities.

  11. E-LEARNING SYSTEM DEVELOPMENT IN ACCORDANCE WITH THE REQUIREMENTS OF EFQUEL: VYATKA STATE UNIVERSITY EXPERIENCE

    Elena Syrtsova

    2017-06-01

    Full Text Available The article is devoted to the study of various aspects of development and implementation of e-learning at higher education institutions. This system has been created according to the main approaches and criteria used by the European Foundation for quality assurance of e-learning (EFQUEL. The article presents the main results of the experiment on Vyatka State University's e-learning system development. The article reveals the feasibility of the development of e-learning in the region. The authors consider three main strategies of implementation of e-learning system at Vyatka State University. The authors substantiate the choice of the most effective and promising strategy of them based on the analysis and considering the peculiarities of the university and the region. In the article, the fundamental results of the experiment and description of the stages of the implementation of e-learning system are presented.

  12. Consultant's Playbook: A Survey of Pharmacy Consultant Experiences Among Hospitals In the University HealthSystem Consortium.

    Hicks, Dave; McCarthy, Bryan; Fanikos, John; Emamifar, Amir; Nedved, Andrea; Thompson, Bruce; Bender, Fred; McMahon, Patrick

    2013-10-01

    Our team surveyed a group of pharmacy directors to learn about their experiences with pharmacy consultants so that the directors might be able to use their consulting resources in a more effective manner. In May 2012, the University HealthSystem Consortium (UHC) Pharmacy Council Financial Performance Committee developed an electronic survey that collectively measured the characteristics, goals, and methodology of historical pharmacy consultant engagements and level of satisfaction. After e-mailing the initial electronic survey, we conducted follow-up telephone interviews with respondents from July through November 2012. These interviews were designed to include questions about expected outcomes, recommendations for evaluation processes, timelines for implementing the recommendations, consultants' expenses, and insights gained. A total of 23 pharmacy directors responded to the initial electronic survey; their organizations had engaged at least one consultant within the previous 5 years. Data were collected for 28 consultant engagements. Subsequent telephone interviews were conducted with 20 of the 23 pharmacy directors (87%) who completed the initial electronic survey, accounting for 25 of the 28 consultant engagements (89%). Cost reduction along with revenue enhancement was most often the focus of these engagements. These engagements were also mainly within the scope of an organization-wide effort initiated by the executive board or executive team. Consultant experiences varied greatly in terms of (1) the degree to which assistance was provided to the organization, (2) benchmarking methodologies and resources, and (3) timelines for implementing the consultants' recommendations. In general, most respondents rated their consultant experience as positive and were able to provide "pearls of wisdom" or lessons learned.

  13. Using Web Content Management Systems in University E-Commerce Courses

    Sanja Mohorovičić

    2010-03-01

    Full Text Available The aim of this paper is to elaborate and present the advantages of using Web Content Management Systems (primarily Joomla! in e-commerce courses at universities. E-commerce is taught to many non-IT students who possess various previous knowledge in IT, which can often cause problems. Content Management Systems can circumvent those problems by avoiding the need for teaching HTML, PHP, SQL etc, and enabling non-IT students to focus on content management which is crucial for e-commerce. Characteristics of Web Content Management Systems are explained, followed by brief explanation of Joomla!. Examples are presented, along with experiences from the university.

  14. Challenges of Utilizing E-Learning Systems in Public Universities in Jordan

    Muhannad Anwar Al-Shboul

    2010-06-01

    Full Text Available This research paper lists and discusses major challenges and barriers that may face faculty members at the public universities in Jordan in employing e-Learning systems authoring tools in their instructions. It also proposes several suggestions for the administrators in public universities in Jordan for what they could do to improve the utilization of e-Learning authoring tools at their campuses. E-Learning systems authoring tools allow instructors to easily create and deliver their e-contents and e-lectures. Furthermore, online course materials which uploaded by using such authoring tools could be viewed by any popular web browser system.

  15. Is thermodynamics of the universe bounded by event horizon a Bekenstein system?

    Chakraborty, Subenoy

    2012-01-01

    In this brief communication, we have studied the validity of the first law of thermodynamics for the universe bounded by event horizon with two examples. The key point is the appropriate choice of the temperature on the event horizon. Finally, we have concluded that universe bounded by the event horizon may be a Bekenstein system and Einstein's equations and the first law of thermodynamics on the event horizons are equivalent.

  16. Is thermodynamics of the universe bounded by event horizon a Bekenstein system?

    Chakraborty, Subenoy

    2012-01-01

    In this brief communication, we have studied the validity of the first law of thermodynamics for the universe bounded by event horizon with two examples. The key point is the appropriate choice of the temperature on the event horizon. Finally, we have concluded that universe bounded by the event horizon may be a Bekenstein system and the Einstein's equations and the first law of thermodynamics on the event horizons are equivalent.

  17. A commercial outcome prediction system for university technology transfer using neural networks

    Chu, Ling

    2007-01-01

    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 26/03/2007. This thesis presents a commercial outcome prediction system (CPS) capable of predicting the likely future monetary return that would be generated by an invention. The CPS is designed to be used by university technology transfer offices for invention assessment purposes, and is based on the data from their historical invention cases. It is aimed at improving technology transfer off...

  18. Regional Maritime University Journal - Vol 1 (2011)

    Human errors and system variability in safety investigations of maritime casualties: an expression of systemic concerns · EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT. KT Ghirxi, 10-22 ...

  19. Challenges in the Development of Environmental Management Systems on the Modern University Campus

    Bero, Bridget N.; Doerry, Eckehard; Middleton, Ryan; Meinhardt, Christian

    2012-01-01

    Purpose: The purpose of this paper is to describe challenges and lessons learned in the design and development of a comprehensive, flexible environmental management system (EMS) in a real university setting; also to inform development of similar systems elsewhere and provide a modular, extensible software architecture for such efforts.…

  20. The Belief Systems of University Supervisors in an Elementary Student-Teaching Program.

    Zeichner, Kenneth M.; Tabachnick, B. Robert

    1982-01-01

    A study was conducted to determine the range of supervisory belief systems that existed among nine university supervisors of elementary education student teachers. In interviews, three distinct belief systems emerged: (1) technical/instrumental; (2) personal growth centered; and (3) critical. (FG)

  1. The Impact of Framing Effect on Student Preferences for University Grading Systems

    Smith, Jeffrey K.; Smith, Lisa F.

    2009-01-01

    Kahneman and Tversky's (1979, 2000; Tversky & Kahneman, 1981) work in decision-making was applied to student preferences for grading practices. Undergraduate psychology students (n = 240) were randomly assigned to 1 of 3 framing conditions related to how a university course might be graded: a 100 point system, a percentage system, and an open…

  2. Managing Selection for Electronic Resources: Kent State University Develops a New System to Automate Selection

    Downey, Kay

    2012-01-01

    Kent State University has developed a centralized system that manages the communication and work related to the review and selection of commercially available electronic resources. It is an automated system that tracks the review process, provides selectors with price and trial information, and compiles reviewers' feedback about the resource. It…

  3. The Policy-Making Process of the State University System of Florida.

    Sullivan, Sandra M.

    The policy-making process of the State University System of Florida is described using David Easton's model of a political system as the conceptual framwork. Two models describing the policy-making process were developed from personal interviews with the primary participants in the governance structure and from three case studies of policy…

  4. Grading the Metrics: Performance-Based Funding in the Florida State University System

    Cornelius, Luke M.; Cavanaugh, Terence W.

    2016-01-01

    A policy analysis of Florida's 10-factor Performance-Based Funding system for state universities. The focus of the article is on the system of performance metrics developed by the state Board of Governors and their impact on institutions and their missions. The paper also discusses problems and issues with the metrics, their ongoing evolution, and…

  5. Strategic agency and institutional change: investigating the role of universities in regional innovation systems (RISs)

    Benneworth, Paul; Pinheiro, Rómulo; Karlsen, James

    2017-01-01

    Strategic agency and institutional change: investigating the role of universities in regional innovation systems (RISs). Regional Studies. Past analyses rooted in the thick description of regions successful in constructing regional innovation systems have given way to analyses more focused on the

  6. Understanding the Earth Systems: Expressions of Dynamic and Cyclic Thinking among University Students

    Batzri, Or; Ben Zvi Assaraf, Orit; Cohen, Carmit; Orion, Nir

    2015-01-01

    In this two-part study, we examine undergraduate university students' expression of two important system thinking characteristics--dynamic thinking and cyclic thinking--focusing particularly on students of geology. The study was conducted using an Earth systems questionnaire designed to elicit and reflect either dynamic or cyclic thinking. The…

  7. Compulsory registration of mail servers in order to accept e-mail from the Internet

    IT Department

    2008-01-01

    This announcement is intended only for administrators of a mail server (sendmail, postfix, etc.). It concerns e-mails sent from the Internet to addresses of the following type: somemailbox@somehost.cern.ch. Mail server managers are requested to register their servers so that they can accept e-mail from outside CERN. In future the CERN mail infrastructure will relay messages from outside CERN only to officially registered mail servers. This rule applies only to messages sent from the Internet. There will be NO change with respect to messages sent from inside CERN. If you are responsible for a mail server that accepts e-mails from outside CERN, please read the following page: http://cern.ch/mail/Help/?kbid=191090, where you can find information about the new rule and check if your host is already registered in the system. If you wish to register a mail server please send a message to: mailto:mail.support@cern.ch. This rule will be gradually enforced from 20 February 2008 onwards. Thank you for your cooperation...

  8. Nuclear medicine image and data interchange through e-mail

    Lyra, M; Skouroliakou, K; Perris, A; Georgossopoulos, C; Pappas, D [Radiology Department, Athens University, Athens (Greece); Stefanides, C [Pediatric Hospital, Aglaia Kyriakou, Athens (Greece)

    1999-12-31

    Prosperity of easy interchange in every day practice of Nuclear Medicine found its application through the INTERNET media. We use a simple and safe way to interchange images and diagnostic information between the scintigraphic acquisition and processing location and the clinical department in order to improve patient`s health care and young doctor`s education. images and patient reports are transferred and saved through dedicated software to a workstation that transforms y-camera scintigraphic images in a PC readable format. Diagnosis reports and scintigraphic images are incorporated to a database directory in hypertext form. Usual WWW connection gives the possibility of patients` examinations transfer by email attachments as well as interchange of relative comments towards both directions. Cost effective solution has been achieved using standard hard- and soft-ware. Furthermore, both educational files can be downloaded from our department ftp location, by a unique password. (authors) 7 refs., 3 figs.

  9. E-mail security: mail clients must use encrypted protocols

    2006-01-01

    In the coming weeks, users of mail clients other than Outlook (e.g. Pine, Mozilla, Mac Mail, etc.) may receive an e-mail from Mail-service@cern.ch with instructions to update the security settings of their mail client. The aim of this campaign is to enforce the use of encrypted and authenticated mail protocols in order to prevent the propagation of viruses and protect passwords from theft. As a first step, from 6 June 2006 onwards, access to mail servers from outside CERN will require a securely configured mail client as described in the help page http://cern.ch/mmmservices/Help/?kbid=191040. On this page most users will also find tools that will update their mail client settings automatically. Note that Outlook clients and WebMail access are not affected. The Mail Team

  10. Nuclear medicine image and data interchange through e-mail

    Lyra, M.; Skouroliakou, K.; Perris, A.; Georgossopoulos, C.; Pappas, D.; Stefanides, C.

    1998-01-01

    Prosperity of easy interchange in every day practice of Nuclear Medicine found its application through the INTERNET media. We use a simple and safe way to interchange images and diagnostic information between the scintigraphic acquisition and processing location and the clinical department in order to improve patient's health care and young doctor's education. images and patient reports are transferred and saved through dedicated software to a workstation that transforms y-camera scintigraphic images in a PC readable format. Diagnosis reports and scintigraphic images are incorporated to a database directory in hypertext form. Usual WWW connection gives the possibility of patients' examinations transfer by email attachments as well as interchange of relative comments towards both directions. Cost effective solution has been achieved using standard hard- and soft-ware. Furthermore, both educational files can be downloaded from our department ftp location, by a unique password. (authors)

  11. The New Italian Agency for the Evaluation of the University System (ANVUR): A Need for Governance or Legitimacy?

    Turri, Matteo

    2014-01-01

    After nearly 20 years of evaluation in Italian higher education, a new national agency for the evaluation of the university system (ANVUR) came into being in 2011. This article traces the history of evaluation in Italian universities, discussing the tasks assigned to the national evaluation bodies and their functions within the university system.…

  12. Composite Bonding to Stainless Steel Crowns Using a New Universal Bonding and Single-Bottle Systems

    Mohammad Ali Hattan

    2013-01-01

    Full Text Available Aim. The aim of this study is to evaluate the shear bond strength of nanocomposite to stainless steel crowns using a new universal bonding system. Material and Methods. Eighty (80 stainless steel crowns (SSCs were divided into four groups (20 each. Packable nanocomposite was bonded to the lingual surface of the crowns in the following methods: Group A without adhesive (control group, Group B using a new universal adhesive system (Scotchbond Universal Adhesive, 3M ESPE, Seefeld, Germany, and Group C and Group D using two different brands of single-bottle adhesive systems. Shear bond strengths were calculated and the types of failure also were recorded. Results. The shear strength of Group B was significantly greater than that of other groups. No significant differences were found between the shear bond strengths of Groups C and D. The control group had significantly lower shear bond strength ( to composite than the groups that utilized bonding agents. Conclusion. Composites bonding to stainless steel crowns using the new universal bonding agent (Scotchbond Universal Adhesive, 3M ESPE, Seefeld, Germany show significantly greater shear bond strengths and fewer adhesive failures when compared to traditional single-bottle systems.

  13. Composite bonding to stainless steel crowns using a new universal bonding and single-bottle systems.

    Hattan, Mohammad Ali; Pani, Sharat Chandra; Alomari, Mohammad

    2013-01-01

    Aim. The aim of this study is to evaluate the shear bond strength of nanocomposite to stainless steel crowns using a new universal bonding system. Material and Methods. Eighty (80) stainless steel crowns (SSCs) were divided into four groups (20 each). Packable nanocomposite was bonded to the lingual surface of the crowns in the following methods: Group A without adhesive (control group), Group B using a new universal adhesive system (Scotchbond Universal Adhesive, 3M ESPE, Seefeld, Germany), and Group C and Group D using two different brands of single-bottle adhesive systems. Shear bond strengths were calculated and the types of failure also were recorded. Results. The shear strength of Group B was significantly greater than that of other groups. No significant differences were found between the shear bond strengths of Groups C and D. The control group had significantly lower shear bond strength (P universal bonding agent (Scotchbond Universal Adhesive, 3M ESPE, Seefeld, Germany) show significantly greater shear bond strengths and fewer adhesive failures when compared to traditional single-bottle systems.

  14. Health-system reform and universal health coverage in Latin America.

    Atun, Rifat; de Andrade, Luiz Odorico Monteiro; Almeida, Gisele; Cotlear, Daniel; Dmytraczenko, T; Frenz, Patricia; Garcia, Patrícia; Gómez-Dantés, Octavio; Knaul, Felicia M; Muntaner, Carles; de Paula, Juliana Braga; Rígoli, Felix; Serrate, Pastor Castell-Florit; Wagstaff, Adam

    2015-03-28

    Starting in the late 1980s, many Latin American countries began social sector reforms to alleviate poverty, reduce socioeconomic inequalities, improve health outcomes, and provide financial risk protection. In particular, starting in the 1990s, reforms aimed at strengthening health systems to reduce inequalities in health access and outcomes focused on expansion of universal health coverage, especially for poor citizens. In Latin America, health-system reforms have produced a distinct approach to universal health coverage, underpinned by the principles of equity, solidarity, and collective action to overcome social inequalities. In most of the countries studied, government financing enabled the introduction of supply-side interventions to expand insurance coverage for uninsured citizens--with defined and enlarged benefits packages--and to scale up delivery of health services. Countries such as Brazil and Cuba introduced tax-financed universal health systems. These changes were combined with demand-side interventions aimed at alleviating poverty (targeting many social determinants of health) and improving access of the most disadvantaged populations. Hence, the distinguishing features of health-system strengthening for universal health coverage and lessons from the Latin American experience are relevant for countries advancing universal health coverage. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Promotion bureau warehouse system design. Case study in University of AA

    Parwati, N.; Qibtiyah, M.

    2017-12-01

    The warehouse becomes one of the important parts in an industry. By having a good warehousing system, an industry can improve the effectiveness of its performance, so that profits for the company can continue to increase. Meanwhile, if it has a poorly organized warehouse system, it is feared there will be a decrease in the level of effectiveness of the industry itself. In this research, the object was warehousing system in promotion bureau of University AA. To improve the effectiveness of warehousing system, warehouse layout design is done by specifying categories of goods based on the flow of goods in and out of warehouse with ABC analysis method. In addition, the design of information systems to assist in controlling the system to support all the demand for every burreau and department in the university.

  16. Solar energy system performance evaluation: Seasonal report for Elcam Tempe Arizona State University, Tempe, Arizona

    1980-01-01

    The solar system, Elcam-Tempe, was designed by Elcam Incorporated, Santa Barbara, California, to supply commercial domestic hot water heating systems to the Agriculture Department residence at Arizona State University. The building is a single story residence located at the agriculture experiment farm of the Arizona State University. The energy system's four modes of operation are described. Electrical energy savings at the site was a net of 5.54 million Btu after the 0.17 million Btu of operating energy required to operate collector loop circulating pump were subtracted. The energy savings due to solar was less than the system's potential. On an average, twice as much hot water could have been used with significant solar energy contribution. The system corrosion and deposits caused by using dissimilar metals in the collector loop was the only problem noted with the Elcam-Tempe system.

  17. Advantages and Disadvantages of Educational Email Alerts for Family Physicians: Viewpoint

    Badran, Hani; Grad, Roland

    2015-01-01

    Background Electronic knowledge resources constitute an important channel for accredited Continuing Medical Education (CME) activities. However, email usage for educational purposes is controversial. On the one hand, family physicians become aware of new information, confirm what they already know, and obtain reassurance by reading educational email alerts. Email alerts can also encourage physicians to search Web-based resources. On the other hand, technical difficulties and privacy issues are common obstacles. Objective The purpose of this discussion paper, informed by a literature review and a small qualitative study, was to understand family physicians’ knowledge, attitudes, and behavior in regard to email in general and educational emails in particular, and to explore the advantages and disadvantages of educational email alerts. In addition, we documented participants’ suggestions to improve email alert services for CME. Methods We conducted a qualitative descriptive study using the “Knowledge, Attitude, Behavior” model. We conducted semi-structured face-to-face interviews with 15 family physicians. We analyzed the collected data using inductive-deductive thematic qualitative data analysis. Results All 15 participants scanned and prioritized their email, and 13 of them checked their email daily. Participants mentioned (1) advantages of educational email alerts such as saving time, convenience and valid information, and (2) disadvantages such as an overwhelming number of emails and irrelevance. They offered suggestions to improve educational email. Conclusions The advantages of email alerts seem to compensate for their disadvantages. Suggestions proposed by family physicians can help to improve educational email alerts. PMID:25803184

  18. Advantages and disadvantages of educational email alerts for family physicians: viewpoint.

    Badran, Hani; Pluye, Pierre; Grad, Roland

    2015-02-27

    Electronic knowledge resources constitute an important channel for accredited Continuing Medical Education (CME) activities. However, email usage for educational purposes is controversial. On the one hand, family physicians become aware of new information, confirm what they already know, and obtain reassurance by reading educational email alerts. Email alerts can also encourage physicians to search Web-based resources. On the other hand, technical difficulties and privacy issues are common obstacles. The purpose of this discussion paper, informed by a literature review and a small qualitative study, was to understand family physicians' knowledge, attitudes, and behavior in regard to email in general and educational emails in particular, and to explore the advantages and disadvantages of educational email alerts. In addition, we documented participants' suggestions to improve email alert services for CME. We conducted a qualitative descriptive study using the "Knowledge, Attitude, Behavior" model. We conducted semi-structured face-to-face interviews with 15 family physicians. We analyzed the collected data using inductive-deductive thematic qualitative data analysis. All 15 participants scanned and prioritized their email, and 13 of them checked their email daily. Participants mentioned (1) advantages of educational email alerts such as saving time, convenience and valid information, and (2) disadvantages such as an overwhelming number of emails and irrelevance. They offered suggestions to improve educational email. The advantages of email alerts seem to compensate for their disadvantages. Suggestions proposed by family physicians can help to improve educational email alerts.

  19. UNIVERSITY TURBINE SYSTEMS RESEARCH-HIGH EFFICIENCY ENGINES AND TURBINES (UTSR-HEET)

    Lawrence P. Golan; Richard A. Wenglarz; William H. Day

    2003-03-01

    In 2002, the U S Department of Energy established a cooperative agreement for a program now designated as the University Turbine Systems (UTSR) Program. As stated in the cooperative agreement, the objective of the program is to support and facilitate development of advanced energy systems incorporating turbines through a university research environment. This document is the first annual, technical progress report for the UTSR Program. The Executive Summary describes activities for the year of the South Carolina Institute for Energy Studies (SCIES), which administers the UTSR Program. Included are descriptions of: Outline of program administrative activities; Award of the first 10 university research projects resulting from a year 2001 RFP; Year 2002 solicitation and proposal selection for awards in 2003; Three UTSR Workshops in Combustion, Aero/Heat Transfer, and Materials; SCIES participation in workshops and meetings to provide input on technical direction for the DOE HEET Program; Eight Industrial Internships awarded to higher level university students; Increased membership of Performing Member Universities to 105 institutions in 40 states; Summary of outreach activities; and a Summary table describing the ten newly awarded UTSR research projects. Attachment A gives more detail on SCIES activities by providing the monthly exceptions reports sent to the DOE during the year. Attachment B provides additional information on outreach activities for 2002. The remainder of this report describes in detail the technical approach, results, and conclusions to date for the UTSR university projects.

  20. Connecticut State University System Initiative for Nanotechnology-Related Equipment, Faculty Development and Curriculum Development

    Broadbridge, Christine C. [Southern Connecticut State University

    2013-03-28

    DOE grant used for partial fulfillment of necessary laboratory equipment for course enrichment and new graduate programs in nanotechnology at the four institutions of the Connecticut State University System (CSUS). Equipment in this initial phase included variable pressure scanning electron microscope with energy dispersive x-ray spectroscopy elemental analysis capability [at Southern Connecticut State University]; power x-ray diffractometer [at Central Connecticut State University]; a spectrophotometer and spectrofluorimeter [at Eastern Connecticut State University; and a Raman Spectrometer [at Western Connecticut State University]. DOE's funding was allocated for purchase and installation of this scientific equipment and instrumentation. Subsequently, DOE funding was allocated to fund the curriculum, faculty development and travel necessary to continue development and implementation of the System's Graduate Certificate in Nanotechnology (GCNT) program and the ConnSCU Nanotechnology Center (ConnSCU-NC) at Southern Connecticut State University. All of the established outcomes have been successfully achieved. The courses and structure of the GCNT program have been determined and the program will be completely implemented in the fall of 2013. The instrumentation has been purchased, installed and has been utilized at each campus for the implementation of the nanotechnology courses, CSUS GCNT and the ConnSCU-NC. Additional outcomes for this grant include curriculum development for non-majors as well as faculty and student research.

  1. ON EXPERIENCE OF THE ELECTRONIC DOCUMENT MANAGEMENT SYSTEM IMPLEMENTATION IN THE MEDICAL UNIVERSITY

    A. V. Semenets; V. Yu. Kovalok

    2015-01-01

    An importance of the application of the electronic document management to the Ukraine healthcare is shown. The electronic document management systems market overview is presented. Example of the usage of the open-source electronic document management system in the Ternopil State Medical University by I. Ya. Horbachevsky is shown. The implementation capabilities of the electronic document management system within a cloud services are shown. The electronic document management features of the Mi...

  2. Barriers to Participation in Learning Management Systems in Saudi Arabian Universities

    Abdullah Alenezi

    2018-01-01

    Full Text Available This study was designed to identify various barriers that have hindered the adoption of LMSs in Saudi Arabian universities. Learning management systems (LMSs have been adopted in many learning institutions because of their functionalities and applications to improve pedagogy. Universities have been encouraged to use LMSs to enhance the collaborative working environment among students and between the students and their instructors. This study was done by administering 150 questionnaires to students in three universities in Saudi Arabia. Findings from the study revealed that the main barriers to the use of LMSs were inadequate technical support by the universities, negative attitude toward technology, and inadequate training on the LMS platforms. Minor barriers identified include poor Internet access and networking, limited infrastructure to support the LMS, lack of hardware and software to run the LMS, and challenges in English language proficiency.

  3. Gaussian random-matrix process and universal parametric correlations in complex systems

    Attias, H.; Alhassid, Y.

    1995-01-01

    We introduce the framework of the Gaussian random-matrix process as an extension of Dyson's Gaussian ensembles and use it to discuss the statistical properties of complex quantum systems that depend on an external parameter. We classify the Gaussian processes according to the short-distance diffusive behavior of their energy levels and demonstrate that all parametric correlation functions become universal upon the appropriate scaling of the parameter. The class of differentiable Gaussian processes is identified as the relevant one for most physical systems. We reproduce the known spectral correlators and compute eigenfunction correlators in their universal form. Numerical evidence from both a chaotic model and weakly disordered model confirms our predictions

  4. College and University Earth System Science Education for the 21st Century (ESSE 21)

    Johnson, D. R.; Ruzek, M.; Schweizer, D.

    2002-12-01

    The NASA/USRA Cooperative University-based Program in Earth System Science Education (ESSE), initiated over a decade ago through NASA support, has led in the creation of a nationwide collaborative effort to bring Earth system science into the undergraduate classroom. Forty-five ESSE institutions now offer over 120 Earth system courses each year, reaching thousands of students annually with interdisciplinary content. Through the course offerings by faculty from different disciplines and the organizational infrastructure of colleges and universities emphasizing cross disciplinary curricula, programs, degrees and departments, the ESSE Program has led in systemic change in the offering of a holistic view of Earth system science in the classroom. Building on this successful experience and collaborative infrastructure within and among colleges, universities and NASA partners, an expanded program called ESSE 21 is being supported by NASA to extend the legacy established during the last decade. Through its expanded focus including partnerships with under represented colleges and universities, the Program seeks to further develop broadly based educational resources, including shared courses, electronic learning materials and degree programs that will extend Earth system science concepts in both undergraduate and graduate classrooms and laboratories. These resources emphasizing fundamentals of Earth system science advance the nation's broader agenda for improving science, technology, engineering and mathematics competency. Overall the thrust within the classrooms of colleges and universities is critical to extending and solidifying courses of study in Earth system and global change science. ESSE 21 solicits proposals from undergraduate institutions to create or adopt undergraduate and graduate level Earth system science content in courses, curricula and degree programs. The goal for all is to effect systemic change through developing Earth system science learning materials

  5. The relative efficacy of telephone and email reminders to elicit blood donation.

    Germain, M; Godin, G

    2016-04-01

    The aim of the study was to test the relative efficacy of telephone and email reminders to trigger blood donation. A sample of 3454 donors was randomized to one of three conditions: phone only (n = 1176), email only (n = 1091) and phone + email (n = 1187). There was a higher proportion of donors who registered to give blood in the phone + email condition (18·45%) compared to the other two conditions (phone: 15·73%, P email: 13·20%; P email conditions did not differ significantly (P = 0·16), suggesting equivalent efficacy. © 2015 International Society of Blood Transfusion.

  6. Health financing for universal coverage and health system performance: concepts and implications for policy.

    Kutzin, Joseph

    2013-08-01

    Unless the concept is clearly understood, "universal coverage" (or universal health coverage, UHC) can be used to justify practically any health financing reform or scheme. This paper unpacks the definition of health financing for universal coverage as used in the World Health Organization's World health report 2010 to show how UHC embodies specific health system goals and intermediate objectives and, broadly, how health financing reforms can influence these. All countries seek to improve equity in the use of health services, service quality and financial protection for their populations. Hence, the pursuit of UHC is relevant to every country. Health financing policy is an integral part of efforts to move towards UHC, but for health financing policy to be aligned with the pursuit of UHC, health system reforms need to be aimed explicitly at improving coverage and the intermediate objectives linked to it, namely, efficiency, equity in health resource distribution and transparency and accountability. The unit of analysis for goals and objectives must be the population and health system as a whole. What matters is not how a particular financing scheme affects its individual members, but rather, how it influences progress towards UHC at the population level. Concern only with specific schemes is incompatible with a universal coverage approach and may even undermine UHC, particularly in terms of equity. Conversely, if a scheme is fully oriented towards system-level goals and objectives, it can further progress towards UHC. Policy and policy analysis need to shift from the scheme to the system level.

  7. Writing a Recipe for Teaching Sustainable Food Systems: Lessons from Three University Courses

    Christy Anderson Brekken

    2018-06-01

    Full Text Available The sustainability of the food system is at the forefront of academic and policy discussions as we face the challenge of providing food security to a growing population amidst environmental uncertainty and depletion, social disruptions, and structural economic shocks and stresses. Crafting a sustainable and resilient food system requires us to go beyond disciplinary boundaries and broaden critical and creative thinking skills. Recent literature calls for examples of pedagogical transformations from food systems courses to identify successful practices and potential challenges. We offer a recipe for what to teach by framing systems thinking concepts, then discuss how to teach it with five learning activities: deductive case studies, experiential learning, reflective narrative learning, system dynamics simulations and scenarios, and inductive/open-ended case studies, implemented with collaborative group learning, inter/trans-disciplinarity, and instructor-modeled co-learning. Each learning activity is animated with concrete examples from our courses at Oregon State University, University of Minnesota, and University of Vermont, USA. We discuss opportunities and challenges implementing these strategies in light of student, instructor, and institutional expectations and constraints. But the challenge is worth the effort, because food system transformation requires active learners and systemic thinkers as engaged citizens, food system advocates, entrepreneurs, and policy makers.

  8. Characterization of hybrid lighting systems of the Electrical Engineering Building in the Industrial University of Santander

    Galvis, D.; Exposito, C.; Osma, G.; Amado, L.; Ordóñez, G.

    2016-07-01

    This paper presents an analysis of hybrid lighting systems of Electrical Engineering Building in the Industrial University of Santander, which is a pilot of green building for warm- tropical conditions. Analysis of lighting performance of inner spaces is based on lighting curves obtained from characterization of daylighting systems of these spaces. A computation tool was made in Excel-Visual Basic to simulate the behaviour of artificial lighting system considering artificial control system, user behaviour and solar condition. Also, this tool allows to estimate the electrical energy consumption of the lighting system for a day, a month and a year.

  9. Using an online quiz-based reinforcement system to teach healthcare quality and patient safety and care transitions at the University of California.

    Shaikh, Ulfat; Afsar-Manesh, Nasim; Amin, Alpesh N; Clay, Brian; Ranji, Sumant R

    2017-10-01

    Implementing quality improvement (QI) education during clinical training is challenging due to time constraints and inadequate faculty development in these areas. Quiz-based reinforcement systems show promise in fostering active engagement, collaboration, healthy competition and real-time formative feedback, although further research on their effectiveness is required. An online quiz-based reinforcement system to increase resident and faculty knowledge in QI, patient safety and care transitions. Experts in QI and educational assessment at the 5 University of California medical campuses developed a course comprised of 3 quizzes on Introduction to QI, Patient Safety and Care Transitions. Each quiz contained 20 questions and utilized an online educational quiz-based reinforcement system that leveraged spaced learning. Approximately 500 learners completed the course (completion rate 66-86%). Knowledge acquisition scores for all quizzes increased after completion: Introduction to QI (35-73%), Patient Safety (58-95%), and Care Transitions (66-90%). Learners reported that the quiz-based system was an effective teaching modality and preferred this type of education to classroom-based lectures. Suggestions for improvement included reducing frequency of presentation of questions and utilizing more questions that test learners on application of knowledge instead of knowledge acquisition. A multi-campus online quiz-based reinforcement system to train residents in QI, patient safety and care transitions was feasible, acceptable, and increased knowledge. The course may be best utilized to supplement classroom-based and experiential curricula, along with increased attention to optimizing frequency of presentation of questions and enhancing application skills. © The Author 2017. Published by Oxford University Press in association with the International Society for Quality in Health Care. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  10. An Elaboration of a Strategic Alignment Model of University Information Systems based on SAM Model

    S. Ahriz

    2018-02-01

    Full Text Available Information system is a guarantee of the universities' ability to anticipate the essential functions to their development and durability. The alignment of information system, one of the pillars of IT governance, has become a necessity. In this paper, we consider the problem of strategic alignment model implementation in Moroccan universities. Literature revealed that few studies have examined strategic alignment in the public sector, particularly in higher education institutions. Hence we opted for an exploratory approach that aims to better understanding the strategic alignment and to evaluate the degree of its use within Moroccan universities. The data gained primarily through interviews with top managers and IT managers reveal that the alignment is not formalized and that it would be appropriate to implement an alignment model. It is found that the implementation of our proposed model can help managers to maximize returns of IT investment and to increase their efficiency.

  11. Institutional Evaluation in Poles of the Open University System of Brazil

    Alexciano de Sousa Martins

    2018-03-01

    Full Text Available The study wanted to know the institutional evaluation in poles of distance education, of the Open University of Brazil (UAB system, analyzing the poles of the State of Ceará. The UAB system of the Brazilian Ministry of Education makes it possible to offer courses of higher level agreements with public universities. Ceará counts on UAB poles, since 2006, that form teachers and other professionals, even in regions lacking public higher education. The objective of this study was to discuss the importance of the institutional evaluation in the poles of the Open University of Brazil program through an exploratory and descriptive field research, showing that the institutional evaluation at the poles is minimal and out of line with the legislation in force. Suggestions on how to develop the evaluative practice.

  12. Should governments subsidize tuition at public universities? Assessing the benefits of tuition subsidies provided by the University of Minnesota and the Minnesota State Colleges and Universities system.

    Damon, Amy L.; Glewwe, Paul

    2008-01-01

    Chapter titles: Introduction; Higher education in Minnesota; Private benefits from a university education; Public benefits of university education-conceptual and practical issues; Distribution of private and public benefits; An assessment of the private and public benefits of subsidies of higher education in Minnesota; Conclusions and suggestions for further research; References.

  13. Primary health care and public health: foundations of universal health systems.

    White, Franklin

    2015-01-01

    The aim of this review is to advocate for more integrated and universally accessible health systems, built on a foundation of primary health care and public health. The perspective outlined identified health systems as the frame of reference, clarified terminology and examined complementary perspectives on health. It explored the prospects for universal and integrated health systems from a global perspective, the role of healthy public policy in achieving population health and the value of the social-ecological model in guiding how best to align the components of an integrated health service. The importance of an ethical private sector in partnership with the public sector is recognized. Most health systems around the world, still heavily focused on illness, are doing relatively little to optimize health and minimize illness burdens, especially for vulnerable groups. This failure to improve the underlying conditions for health is compounded by insufficient allocation of resources to address priority needs with equity (universality, accessibility and affordability). Finally, public health and primary health care are the cornerstones of sustainable health systems, and this should be reflected in the health policies and professional education systems of all nations wishing to achieve a health system that is effective, equitable, efficient and affordable. © 2015 S. Karger AG, Basel.

  14. Email solicitation for scholarly work--a single researcher's perspective.

    Bugeja, Justine; Grech, Victor

    2015-01-01

    Publishing is important for career progression. The traditional journal model results in subscribers bearing publication costs. The eagerness with which researchers seek journals for the publishing of their work, along with the internet, has resulted in the creation of a new model called open access (OA). Author/s or their institution/s pay an actual publication fee. This has in turn resulted in the creation of questionable journals which charge steep publishing fees. Emails soliciting publication to one of the authors (VG) were collected for the month of March 2015. Information collected included costs of OA publishing, and whether or not this information was readily available. The appropriateness of said solicitations was also assessed with regard to topics with which the targeted author was familiar. There was a total of 44 solicitations: 3 were duplicates. Out of 41 solicitations, 20 (49%) were appropriate. The open access fee was readily available in 27 out of 41 solicitations (66%). The open access fee averaged $475, ranging from $25 to $1500. The only journal which provided true OA was Medical Principles and Practice, with no fees charged whatsoever. Potential authors should carefully investigate OA journals prior to choosing journals wherein to submit their work.

  15. Systems for aiding operators at university-owned research reactors in Japan

    Nishihara, H.; Kimura, Y.; Shibata, T.

    1984-01-01

    University-owned research reactors are operated for various purposes, and small disturbances may arise from various experimental facilities. Also not uniform are the technical levels of operators who range from supervised-students to reactor physicists. Considerable efforts are therefore devoted to the preventive maintainance. With these boundary conditions imposed, systems for aiding operators are designed at these research reactor facilities. (author)

  16. Improving Student Retention through Evidence Based Proactive Systems at the Open University (UK)

    Gibbs, Graham; Regan, Peter; Simpson, Ormond

    2007-01-01

    The Open University has been undertaking an extended initiative to improve student retention through enhanced support for at-risk students. This initiative has evolved through a series of stages from ad hoc small scale local interventions relying largely on tutors and student self-referral, to an institution-wide pro-active system implemented by…

  17. Eastern Michigan University's Automated Storage and Retrieval System: 10 Years Later

    Bullard, Rita; Wrosch, Jackie

    2009-01-01

    Automated storage/retrieval systems (ASRSs) are playing an integral part in today's library operations and collections management. Eastern Michigan University installed an ASRS as part of the new Halle Library, which opened in May 1998, to provide "storage" for up to 800,000 items. Over the past 10 years our policies and procedures have…

  18. Improving Professional Development System through Quality Assurance Practices in the Universities of Pakistan

    Shabbir, Muhammad; Khalid, M. Ibrahim; Bakhsh, Khuda; Mohsin, Muhammad Naeem; Rasool, Shafqat; Mohsin, M. Saleem

    2016-01-01

    The rationalization of this research was to investigate about improving professional development system through Quality Assurance Practices (QAP) in the Universities of Pakistan pertaining to the opinions of students, teachers and Directors of Quality Enhancement Cells (QECs) and to differentiate the ideas of students, teachers and Directors of…

  19. Continuous Improvement: A Way of Integrating Student Enrollment, Advising, and Retention Systems in a Metropolitan University.

    Beeler, Karl J.; Moehl, Pamela J.

    1996-01-01

    The University of Missouri-St. Louis has discovered the value of continuous quality improvement methods in upgrading its core student-related administrative processes. As a result, it is increasing efficiency and personalizing a traditionally bureaucratic system of student service. Concurrent goals are to increase retention and decrease time to…

  20. Access to E-learning in the Nigerian university system (NUS): a case ...

    In developing countries, the application of electronic learning (e-learning) in the educational system is yet to gain much ground. This study therefore seeks to survey the extent to which elearning is applied in University of Calabar for effective teaching and learning processes. The purpose of this paper is to give a brief insight ...

  1. The Realization of the System Programme "Health Saving Education" in the Pedagogical University

    Nagovitsyn, Roman S.; Chigovskaya-Nazarova, Yanina A.; Miroshnichenko, Aleksey A.; Senator, Svetlana Y.

    2018-01-01

    The purpose of the article is to develop a system programme "Health saving education" on the basis of creating a structural model and model of management and ensuring health and preventive activities and experimentally prove the effectiveness of its implementation in the educational process of the university. The solution of research…

  2. North Dakota University System Five-Year Plan. Daring to Be Great: The NDUS Edge

    North Dakota University System, 2017

    2017-01-01

    This report presents the 2017-19 edition of the State Board of Higher Education's strategic narrative. Contents include: (1) North Dakota University System (NDUS) colleges and locations; (2) Board Chair Neset's report; (3) Five-year goals; (4) Deliver degrees that are the best value in the nation; (5) Provide programs people want; (6) Equip…

  3. The Influence of Academic Culture on Quality Management System ISO 9001 Maintenance within Malaysian Universities

    Basir, Siti Arni; Davies, John; Douglas, Jacqueline; Douglas, Alexander

    2017-01-01

    This study investigates the influence of the elements of academic culture on quality management system ISO 9001 maintenance within Malaysian universities. There is a dearth of empirical studies on maintaining ISO 9001, particularly in the higher education context. From the literature review, academic culture was classified according to four…

  4. Privatization of Public Universities: How the Budget System Affects the Decision-Making Strategy of Deans

    Volpatti, Mark Christopher

    2013-01-01

    In response to lower funding commitments, many public colleges and universities have elected to incorporate decentralized budgeting systems, one of which is Responsibility Center Management (RCM). As public institutions are becoming more dependent on tuition dollars because state appropriations are declining, deans have an increased responsibility…

  5. EFL Instructors' Perceptions of Blackboard Learning Management System (LMS) at University Level

    Tawalbeh, Thaer Issa

    2018-01-01

    The present paper aims to investigate EFL instructors' perceptions of Blackboard learning management system (LMS) at Taif University in Saudi Arabia. To achieve this purposes, the researcher attempted to answer two questions. The first question investigates EFL instructors' perceptions of Blackboard LMS. The second question aims to identify…

  6. Flexible System Integration and Advanced Hierarchical Control Architectures in the Microgrid Research Laboratory of Aalborg University

    Meng, Lexuan; Hernández, Adriana Carolina Luna; Diaz, Enrique Rodriguez

    2016-01-01

    This paper presents the system integration and hierarchical control implementation in an inverter-based microgrid research laboratory (MGRL) in Aalborg University, Denmark. MGRL aims to provide a flexible experimental platform for comprehensive studies of microgrids. The structure of the laborato...

  7. Knowledge Management Systems and Open Innovation in Second Tier UK Universities

    Chaston, Ian

    2012-01-01

    The purpose of this paper is to examine the performance of second tier UK universities in relation to the effectiveness of their knowledge management systems and involvement in open innovation. Data were acquired using a mail survey of academic staff in social science and business faculties in second tier institutions. The results indicate that…

  8. Continuous Improvement in the Industrial and Management Systems Engineering Programme at Kuwait University

    Aldowaisan, Tariq; Allahverdi, Ali

    2016-01-01

    This paper describes the process employed by the Industrial and Management Systems Engineering programme at Kuwait University to continuously improve the programme. Using a continuous improvement framework, the paper demonstrates how various qualitative and quantitative analyses methods, such as hypothesis testing and control charts, have been…

  9. Improving Educational Objectives of the Industrial and Management Systems Engineering Programme at Kuwait University

    Aldowaisan, Tariq; Allahverdi, Ali

    2016-01-01

    This paper describes the process of developing programme educational objectives (PEOs) for the Industrial and Management Systems Engineering programme at Kuwait University, and the process of deployment of these PEOs. Input of the four constituents of the programme, faculty, students, alumni, and employers, is incorporated in the development and…

  10. From Living Space to Cultural Space: How a Modern University Academy System Is Possible

    Zhang, Yingqiang; Fang, Hualiang

    2018-01-01

    The reforms on the modern university academy system that preserve certain elements of China's ancient traditional academies have currently encountered a series of difficulties. The crux of the problem is that living and educational spaces were integrated in the traditional academy, while modern school education institution has separated the two.…

  11. Challenges Faced by Undergraduate Military Students at American Public University System

    Machuca, Ana; Torres, Karin; Morris, Pamela; Whitley, William

    2014-01-01

    This paper will summarize some of challenges faced by military students enrolled in an associate and bachelors online program at American Public University System (APUS). The survey results on which the study is based exposed the following problems faced by military personnel: 48.7% had difficulties working around military obligations, 33.3%…

  12. Quality of service management efficient scheme for the universal mobile telecommunications system

    E. Zaleta–Alejandre

    2008-04-01

    Full Text Available This research work proposes a new Radio Resource Management (RRM scheme in order to accomplish the Quality of Service (QoS management for the Universal Mobile Telecommunications System (UMTS. The solution is based on UMTS standardization and a performance evaluation is presented to demonstrate its efficiency.

  13. An improvement of speed control performances of a two-mass system using a universal approximator

    Lee, Kyo Beum; Blåbjerg, Frede

    2007-01-01

    A new control scheme using a universal approximator based on a radial basis ti.tnction network (RBFN) is proposed and investigated for improving the control characteristics of the high-performance motion control system. This control method presents better performance in the corresponding speed vi...

  14. Monte Carlo Analysis of the Accelerator-Driven System at Kyoto University Research Reactor Institute

    Wonkyeong Kim

    2016-04-01

    Full Text Available An accelerator-driven system consists of a subcritical reactor and a controllable external neutron source. The reactor in an accelerator-driven system can sustain fission reactions in a subcritical state using an external neutron source, which is an intrinsic safety feature of the system. The system can provide efficient transmutations of nuclear wastes such as minor actinides and long-lived fission products and generate electricity. Recently at Kyoto University Research Reactor Institute (KURRI; Kyoto, Japan, a series of reactor physics experiments was conducted with the Kyoto University Critical Assembly and a Cockcroft–Walton type accelerator, which generates the external neutron source by deuterium–tritium reactions. In this paper, neutronic analyses of a series of experiments have been re-estimated by using the latest Monte Carlo code and nuclear data libraries. This feasibility study is presented through the comparison of Monte Carlo simulation results with measurements.

  15. Monte Carlo analysis of the accelerator-driven system at Kyoto University Research Reactor Institute

    Kim, Won Kyeong; Lee, Deok Jung [Nuclear Engineering Division, Ulsan National Institute of Science and Technology, Ulsan (Korea, Republic of); Lee, Hyun Chul [VHTR Technology Development Division, Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Pyeon, Cheol Ho [Nuclear Engineering Science Division, Kyoto University Research Reactor Institute, Osaka (Japan); Shin, Ho Cheol [Core and Fuel Analysis Group, Korea Hydro and Nuclear Power Central Research Institute, Daejeon (Korea, Republic of)

    2016-04-15

    An accelerator-driven system consists of a subcritical reactor and a controllable external neutron source. The reactor in an accelerator-driven system can sustain fission reactions in a subcritical state using an external neutron source, which is an intrinsic safety feature of the system. The system can provide efficient transmutations of nuclear wastes such as minor actinides and long-lived fission products and generate electricity. Recently at Kyoto University Research Reactor Institute (KURRI; Kyoto, Japan), a series of reactor physics experiments was conducted with the Kyoto University Critical Assembly and a Cockcroft-Walton type accelerator, which generates the external neutron source by deuterium-tritium reactions. In this paper, neutronic analyses of a series of experiments have been re-estimated by using the latest Monte Carlo code and nuclear data libraries. This feasibility study is presented through the comparison of Monte Carlo simulation results with measurements.

  16. Utilizing Health Information Technology to Support Universal Healthcare Delivery: Experience of a National Healthcare System.

    Syed-Abdul, Shabbir; Hsu, Min-Huei; Iqbal, Usman; Scholl, Jeremiah; Huang, Chih-Wei; Nguyen, Phung Anh; Lee, Peisan; García-Romero, Maria Teresa; Li, Yu-Chuan Jack; Jian, Wen-Shan

    2015-09-01

    Recent discussions have focused on using health information technology (HIT) to support goals related to universal healthcare delivery. These discussions have generally not reflected on the experience of countries with a large amount of experience using HIT to support universal healthcare on a national level. HIT was compared globally by using data from the Ministry of the Interior, Republic of China (Taiwan). Taiwan has been providing universal healthcare since 1995 and began to strategically implement HIT on a national level at that time. Today the national-level HIT system is more extensive in Taiwan than in many other countries and is used to aid administration, clinical care, and public health. The experience of Taiwan thus can provide an illustration of how HIT can be used to support universal healthcare delivery. In this article we present an overview of some key historical developments and successes in the adoption of HIT in Taiwan over a 17-year period, as well as some more recent developments. We use this experience to offer some strategic perspectives on how it can aid in the adoption of large-scale HIT systems and on how HIT can be used to support universal healthcare delivery.

  17. Newtonian self-gravitating system in a relativistic huge void universe model

    Nishikawa, Ryusuke; Nakao, Ken-ichi [Department of Mathematics and Physics, Graduate School of Science, Osaka City University, 3-3-138 Sugimoto, Sumiyoshi, Osaka 558-8585 (Japan); Yoo, Chul-Moon, E-mail: ryusuke@sci.osaka-cu.ac.jp, E-mail: knakao@sci.osaka-cu.ac.jp, E-mail: yoo@gravity.phys.nagoya-u.ac.jp [Division of Particle and Astrophysical Science, Graduate School of Science, Nagoya University, Furo-cho, Chikusa-ku, Nagoya 464-8602 (Japan)

    2016-12-01

    We consider a test of the Copernican Principle through observations of the large-scale structures, and for this purpose we study the self-gravitating system in a relativistic huge void universe model which does not invoke the Copernican Principle. If we focus on the the weakly self-gravitating and slowly evolving system whose spatial extent is much smaller than the scale of the cosmological horizon in the homogeneous and isotropic background universe model, the cosmological Newtonian approximation is available. Also in the huge void universe model, the same kind of approximation as the cosmological Newtonian approximation is available for the analysis of the perturbations contained in a region whose spatial size is much smaller than the scale of the huge void: the effects of the huge void are taken into account in a perturbative manner by using the Fermi-normal coordinates. By using this approximation, we derive the equations of motion for the weakly self-gravitating perturbations whose elements have relative velocities much smaller than the speed of light, and show the derived equations can be significantly different from those in the homogeneous and isotropic universe model, due to the anisotropic volume expansion in the huge void. We linearize the derived equations of motion and solve them. The solutions show that the behaviors of linear density perturbations are very different from those in the homogeneous and isotropic universe model.

  18. Improving email strategies to target stress and productivity in clinical practice.

    Armstrong, Melissa J

    2017-12-01

    Physician burnout is gaining increased attention in medicine and neurology and often relates to hours worked and insufficient time. One component of this is administrative burden, which relates to regulatory requirements and electronic health record tasks but may also involve increased time spent processing emails. Research in academic medical centers demonstrates that physicians face increasing inbox sizes related to mass distribution emails from various sources on top of emails required for patient care, research, and teaching. This commentary highlights the contribution of administrative tasks to physician burnout, research to date on email in medical contexts, and corporate strategies for reducing email burden that are applicable to neurology clinical practice. Increased productivity and decreased stress can be achieved by limiting the amount one accesses email, managing inbox size, and utilizing good email etiquette. Department and practice physician leaders have roles in decreasing email volume and modeling good practice.

  19. Impact of Quota System and Catchment Area Policy on the University Admissions in North Central Nigeria

    Joachim Chinweike Omeje

    2016-06-01

    Full Text Available The quota system and the catchment areas are federal government policies formulated to bridge the gap between the educationally developed states and the educationally less developed states. Sequel to the enactment of these policies, government established several universities across the country to create equal opportunity for all candidates. In spite of the astronomical growth of the universities in Nigeria, both the federal and the state governments have not been able to contend with the surging demand for the university education, hence the adoption of the quota system and catchment area policies. Serious concerns were expressed by relevant stakeholders on their perceived impact of the quota system and the catchment area on admissions into the federal and state universities in North Central Nigeria. This study therefore examined the impact of the quota system and catchment area policies on students’ admissions in North Central Nigeria. A research question and a null hypothesis guided the study. Descriptive survey design was adopted for the study. The population for the study was 14,347 staff in the federal and state universities in North Central Nigeria. A sample of 1,435 was drawn through stratified proportionate sampling technique. Data were collected using questionnaire and interviews. Mean scores and standard deviations were used to answer the research question, whereas t-test statistics were used to test the hypothesis at 0.05 level of significance. The findings of the results showed, among others, that the impact of the quota system and catchment area policies on students’ admission was to a high extent.

  20. Healthy universities: an example of a whole-system health-promoting setting.

    Newton, Joanne; Dooris, Mark; Wills, Jane

    2016-03-01

    The health-promoting settings approach is well established in health promotion, with organisational settings being understood as complex systems able to support human wellbeing and flourishing. Despite the reach and evident importance of higher education as a sector, 'healthy universities' has not received high-level international leadership comparable to many other settings programmes. This study explores how the concept of a healthy university is operationalised in two case study universities. Data collection methods included documentary analysis, observation field notes and semi-structured interviews with staff and students. Staff and students understood the characteristics of a healthy university to pertain to management processes relating to communication and to a respectful organisational ethos. Enhancers of health and wellbeing were feeling valued, being listened to, having skilled and supportive line managers and having a positive physical environment. Inhibitors of health and wellbeing were having a sense of powerlessness and a lack of care and concern. The concept of the healthy university has been slow to be adopted in contrast to initiatives such as healthy schools. In addition to challenges relating to lack of theorisation, paucity of evidence and difficulties in capturing the added value of whole-system working, this study suggests that this may be due to both their complex organisational structure and the diverse goals of higher education, which do not automatically privilege health and wellbeing. It also points to the need for a whole-university approach that pays attention to the complex interactions and interconnections between component parts and highlights how the organisation can function effectively as a social system. © The Author(s) 2015.

  1. ON EXPERIENCE OF THE ELECTRONIC DOCUMENT MANAGEMENT SYSTEM IMPLEMENTATION IN THE MEDICAL UNIVERSITY

    A. V. Semenets

    2015-05-01

    Full Text Available An importance of the application of the electronic document management to the Ukraine healthcare is shown. The electronic document management systems market overview is presented. Example of the usage of the open-source electronic document management system in the Ternopil State Medical University by I. Ya. Horbachevsky is shown. The implementation capabilities of the electronic document management system within a cloud services are shown. The electronic document management features of the Microsoft Office 365 and Google Apps For Education are compared. Some results of the usage of the Google Apps For Education inTSMUas electronic document management system are presented.

  2. An Interactive Computer-Based Circulation System for Northwestern University: The Library Puts It to Work

    Velma Veneziano

    1972-06-01

    Full Text Available Northwestern University Library's on-line circulation system has resulted in dramatic changes in practices and procedures in the Circulation Services Section. After a hectic period of implementation, the staff soon began to adjust to the system. Over the past year and a half, they have devised ways to use the system to maximum advantage, so that manual and machine systems now mesh in close harmony. Freed from time-consuming clerical chores, the staff have been challenged to use their released time to best advantage, with the result that the "service" in "Circulation Services" is much closer to being a reality.

  3. Preliminary cost analysis of a universal package concept in the spent fuel management system

    1984-09-01

    The purpose of this study is to provide a preliminary cost assessment of a universal spent fuel package concept as it applies to the backend of the once through nuclear fuel cycle; i.e., a package that would be qualified for spent fuel storage, transportation, and disposal. To provide this preliminary cost assessment, costs for each element of the spent fuel management system have been compiled for system scenarios employing the universal package, and these costs are compared against system costs for scenarios employing the universal package, and these costs are compared against system costs for scenarios employing other types of storage, transportation, and disposal packages. The system elements considered in this study are storage at the nuclear power plant, spent fuel transportation, a Monitored Retrievable Storage (MRS) facility, and a geologic repository. In accordance with the Nuclear Waste Policy Act, most of these system elements and associated functions will be the responsibility of the Department of Energy. 10 refs., 25 figs., 22 tabs

  4. 78 FR 45910 - Proposed Information Collection; Comment Request; Current Population Survey (CPS) Email Address...

    2013-07-30

    ... Population Survey (CPS) Email Address Collection Test Supplement AGENCY: U.S. Census Bureau, Commerce. ACTION... request clearance for the collection of data concerning the November 2013 Email Address Collection Test... tool to help increase response rates. We foresee that in the future, we could collect email addresses...

  5. Email use in elementary school: an analysis of exchange patterns and content

    van der Meij, Hans; Boersma, Kerst

    Email was embedded in a project in design and technology education in elementary school. During four lessons children worked in groups on building a flying object. These groups communicated through email with groups of children from another school. The analyses of the emails, as viewed from

  6. 49 CFR 551.63 - May a foreign manufacturer submit a designation by email or facsimile?

    2010-10-01

    ... email or facsimile? 551.63 Section 551.63 Transportation Other Regulations Relating to Transportation... foreign manufacturer submit a designation by email or facsimile? No, the statute requires designation... designation documents submitted via email or facsimile, as they do not satisfy this requirement. ...

  7. The Application of E-Mail to College English Teaching in China

    Wang, Guofeng

    2010-01-01

    With the development of information technology in the past 10 years, e-mail has been widely used in the field of English teaching. This paper, based on an analysis of the ways of using e-mail in college English teaching in China, probes the feasibility and the benefits of application of e-mail to college English teaching.

  8. STUDENTS WRITING EMAILS TO FACULTY: AN EXAMINATION OF E-POLITENESS AMONG NATIVE AND NON-NATIVE SPEAKERS OF ENGLISH

    Sigrun Biesenbach-Lucas

    2007-02-01

    Full Text Available This study combines interlanguage pragmatics and speech act research with computer-mediated communication and examines how native and non-native speakers of English formulate low- and high-imposition requests to faculty. While some research claims that email, due to absence of non-verbal cues, encourages informal language, other research has claimed the opposite. However, email technology also allows writers to plan and revise messages before sending them, thus affording the opportunity to edit not only for grammar and mechanics, but also for pragmatic clarity and politeness.The study examines email requests sent by native and non-native English speaking graduate students to faculty at a major American university over a period of several semesters and applies Blum-Kulka, House, and Kasper’s (1989 speech act analysis framework – quantitatively to distinguish levels of directness, i.e. pragmatic clarity; and qualitatively to compare syntactic and lexical politeness devices, the request perspectives, and the specific linguistic request realization patterns preferred by native and non-native speakers. Results show that far more requests are realized through direct strategies as well as hints than conventionally indirect strategies typically found in comparative speech act studies. Politeness conventions in email, a text-only medium with little guidance in the academic institutional hierarchy, appear to be a work in progress, and native speakers demonstrate greater resources in creating e-polite messages to their professors than non-native speakers. A possible avenue for pedagogical intervention with regard to instruction in and acquisition of politeness routines in hierarchically upward email communication is presented.

  9. Observation of structural universality in disordered systems using bulk diffusion measurement

    Papaioannou, Antonios; Novikov, Dmitry S.; Fieremans, Els; Boutis, Gregory S.

    2017-12-01

    We report on an experimental observation of classical diffusion distinguishing between structural universality classes of disordered systems in one dimension. Samples of hyperuniform and short-range disorder were designed, characterized by the statistics of the placement of micrometer-thin parallel permeable barriers, and the time-dependent diffusion coefficient was measured by NMR methods over three orders of magnitude in time. The relation between the structural exponent, characterizing disorder universality class, and the dynamical exponent of the diffusion coefficient is experimentally verified. The experimentally established relation between structure and transport exemplifies the hierarchical nature of structural complexity—dynamics are mainly determined by the universality class, whereas microscopic parameters affect the nonuniversal coefficients. These results open the way for noninvasive characterization of structural correlations in porous media, complex materials, and biological tissues via a bulk diffusion measurement.

  10. Teacher training in Chile: perceptions of teachers in the school system and university teachers

    Claudio H. Díaz Larenas

    2015-06-01

    Full Text Available This article presents the results of research on perceptions of teacher training. The study design is transactional and descriptive, for which an ad hoc survey of two groups was developed: the school sysrtem teachers and academics in the region of Bio Bio in Chile. Its aim is to analyze the perception of these groups on six themes: evaluation, learning, innovation, research, development and relationship university / school / community. The main results show a high evaluation of assessment practices, introducing innovations in the classroom and refinement. The reasearch is carried out by both teachers and university profressors in the school system, although at different frequencies. The university / school / community relations are considered relevant but are not consolidarted. Finally some thoughts arise that link the themes discussed in terms of improving teacher education.

  11. Study of college library appealing information system: A case of Longyan University

    Liao, Jin-Hui

    2014-10-01

    The complaints from the readers at university libraries mainly focus on the aspects of service attitude, quality of service, reading environment, the management system, etc. Librarians should realize that reader complaints can actually promote the role of the library service and communicate with readers who complain in a friendly manner. In addition, the Longyan University library should establish an internal management system, improve library hardware facilities, improve the quality of librarians and optimize the knowledge structure of librarians, so as to improve the quality of the service for readers and reduce complaints. Based on this point, we have designed an appealing information system in cryptography machine basis, to provide readers online, remote and anonymous complaint functions.

  12. A university system-wide qualitative investigation into student physical activity promotion conducted on college campuses.

    Milroy, Jeffrey J; Wyrick, David L; Bibeau, Daniel L; Strack, Robert W; Davis, Paul G

    2012-01-01

    This study aimed to examine college student physical activity promotion. A cross-sectional approach to qualitative research was used. Southeastern state university system. Fourteen of 15 (93%) universities recruited were included in this study; 22 university employees participated in a semistructured interview. Nonprobabilistic purposive and snowball sampling strategies were used to recruit individuals who were likely to be engaged in physical activity promotion efforts on their respective campuses. Thematic analyses lead to the identification of emerging themes that were coded and analyzed using NVivo software. Themes informed three main areas: key personnel responsible for promoting physical activity to students, actual physical activity promotion efforts implemented, and factors that influence student physical activity promotion. Results suggest that ecological approaches to promote physical activity on college campuses are underused, the targeting of mediators of physical activity in college students is limited, and values held by university administration influence campus physical activity promotion. Findings support recommendations for future research and practice. Practitioners should attempt to implement social ecological approaches that target scientifically established mediators of physical activity in college students. Replication of this study is needed to compare these findings with other types of universities, and to investigate the relationship between promotion activities (type and exposure) and physical activity behaviors of college students.

  13. EMAIL MARKETING CAMPAIGNS: THE EASIEST PATH FROM ORGANIZATIONS TO CONSUMERS – AN EXPLORATORY ASSESSMENT

    Pantea Carmen

    2010-07-01

    Full Text Available The email is a valuable marketing tool for conveying short, simple messages that call for action on behalf of the recipient. Usually companies develop email marketing campaigns for attracting new customers, persuading the existing customers to buy again, encourage customer loyalty, announce or remind about special offers or events. For an email marketing campaign to be efficient, it is wanted a greater number of responses from those in the target. The paper assesses in an exploratory manner the frequency in using the email accounts, the level of exposure to email marketing campaigns as well as the type of information wanted to be received by the Romanian users.

  14. Understanding Patient Experience Using Internet-based Email Surveys: A Feasibility Study at Mount Sinai Hospital.

    Morgan, Matthew; Lau, Davina; Jivraj, Tanaz; Principi, Tania; Dietrich, Sandra; Bell, Chaim M

    2015-01-01

    Email is becoming a widely accepted communication tool in healthcare settings. This study sought to test the feasibility of Internet-based email surveys of patient experience in the ambulatory setting. We conducted a study of email Internet-based surveys sent to patients in selected ambulatory clinics at Mount Sinai Hospital in Toronto, Canada. Our findings suggest that email links to Internet surveys are a feasible, timely and efficient method to solicit patient feedback about their experience. Further research is required to optimally leverage Internet-based email surveys as a tool to better understand the patient experience.

  15. University of Dar es Salaam Library Journal - Vol 9, No 1 (2007)

    Gender Analysis Of Electronic Information Resource Use: The Case Of The University Of Dar Es Salaam, Tanzania · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT DOWNLOAD FULL ... A Bibliometric Study Of Research On Dar Es Salaam Region: 1980 To 2003 · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  16. Developments of new generation nuclear microprobe systems at the University of Melbourne

    Rout, B.; Jamieson, D.N.; Hopt, R.; Hearne, S.; Szymaski, R.

    2002-01-01

    Full text: A review of the recent developments in fabricating a new generation nuclear microprobe systems at University of Melbourne, Melbourne, will be presented. These new generation systems present high spatial resolution (less than 1 micrometer) with increasing current density (in excess of 100 pA/micrometer 2 ) of the probing ion beam. Detectors with large solid angles and high brightness of the ion source of the accelerator increase the capabilities of these microprobes many fold. Some of the key ingredients of these microprobes are (i) novel magnetic quadrupole lens quintuplet probe forming system (ii) integrated fast data acquisition system to handle high count rates (excess of 100 KHz) due to increasing current density as well as large detector solid angles up to 4 detector stations. Full dead time corrected and charge normalised maps are also implemented to counter the problems normally associated with such high count rate systems. First version of these systems is presently under operation at CSIRO, Sydney. Another similar system is currently being installed at Dutch Institute for Nuclear and High Energy Physics, Amsterdam, Netherlands. A further optimised version of the CSIRO/MARC quintuplet probe forming systems is currently being fabricated at University of Melbourne. Some of the applications involve microelectronic materials, superconductors and geological samples. We will be presenting exciting results arising out of investigations into these materials. We will be demonstrating ultimate spatial resolution of the new microprobe being fabricated at Melbourne

  17. Model of environmental management system for environmentally sustainable universities training in Colombia

    Rivas Marin, Maria Isabel

    2011-01-01

    Sustainable campuses have become one of the main objectives of the Agendas University as a result of the impacts generated by the activities developed there and affect the environment. Given this, there are environmental management systems which are the set of practices, procedures, processes and resources needed to meet environmental regulations on business and are focused on reducing the impacts on the environment and the efficiency of processes. College- level companies still being considered, these systems do not work efficiently, it is necessary and urgent that the adequacy of a model environmental management system and that, through education and research, will help society to achieve the transition to sustainable lifestyles.

  18. Four Decades of Systems Science Teaching and Research in the USA at Portland State University

    Wayne Wakeland

    2014-04-01

    Full Text Available Systems science is defined in general fashion, and a brief background is provided that lists some of the systems science-related societies, conferences, journals, research institutes, and educational programs. The Systems Science Graduate Program at Portland State University in Portland, OR, USA, is described in detail, including its history, curriculum, students, faculty, and degrees granted. Dissertation topics are summarized via word diagrams created from dissertation titles over the years. MS degrees, student placement, and undergraduate courses are also mentioned, and future plans for the program are described including its support for sustainability education.

  19. Universal localizing bounds for compact invariant sets of natural polynomial Hamiltonian systems

    Starkov, Konstantin E.

    2008-01-01

    In this Letter we study the localization problem of compact invariant sets of natural Hamiltonian systems with a polynomial Hamiltonian. Our results are based on applying the first order extremum conditions. We compute universal localizing bounds for some domain containing all compact invariant sets of a Hamiltonian system by using one quadratic function of a simple form. These bounds depend on the value of the total energy of the system, degree and some coefficients of a potential and, in addition, some positive number got as a result of a solution of one maximization problem. Besides, under some quasihomogeneity condition(s) we generalize our construction of the localization set

  20. Universal localizing bounds for compact invariant sets of natural polynomial Hamiltonian systems

    Starkov, Konstantin E. [CITEDI-IPN, Av. del Parque 1310, Mesa de Otay, Tijuana, BC (Mexico)], E-mail: konst@citedi.mx

    2008-10-06

    In this Letter we study the localization problem of compact invariant sets of natural Hamiltonian systems with a polynomial Hamiltonian. Our results are based on applying the first order extremum conditions. We compute universal localizing bounds for some domain containing all compact invariant sets of a Hamiltonian system by using one quadratic function of a simple form. These bounds depend on the value of the total energy of the system, degree and some coefficients of a potential and, in addition, some positive number got as a result of a solution of one maximization problem. Besides, under some quasihomogeneity condition(s) we generalize our construction of the localization set.