The Key Roles in the Informal Organization: A Network Analysis Perspective
ERIC Educational Resources Information Center
de Toni, Alberto F.; Nonino, Fabio
2010-01-01
Purpose: The purpose of this paper is to identify the key roles embedded in the informal organizational structure (informal networks) and to outline their contribution in the companies' performance. A major objective of the research is to find and characterize a new key informal role that synthesises problem solving, expertise, and accessibility…
Fundamental finite key limits for one-way information reconciliation in quantum key distribution
NASA Astrophysics Data System (ADS)
Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David
2017-11-01
The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.
Logistic Map for Cancellable Biometrics
NASA Astrophysics Data System (ADS)
Supriya, V. G., Dr; Manjunatha, Ramachandra, Dr
2017-08-01
This paper presents design and implementation of secured biometric template protection system by transforming the biometric template using binary chaotic signals and 3 different key streams to obtain another form of template and demonstrating its efficiency by the results and investigating on its security through analysis including, key space analysis, information entropy and key sensitivity analysis.
ERIC Educational Resources Information Center
Pierce, Robert E.
2012-01-01
This research study reviewed relative literature on information security and information security culture within organizations to determine what factors potentially assist an organization in implementing, integrating, and maintaining a successful organizational information security culture. Based on this review of literature, five key factors were…
ERIC Educational Resources Information Center
Wittebols, James H.
2016-01-01
How well students conduct research online is an increasing concern for educators at all levels, especially higher education. This paper describes the evolution of a course that examines confirmation bias, information searching, and the political economy of information as keys to becoming more information and media literate. After a key assignment…
Raynor, David K; Dickinson, David
2009-04-01
Effective written consumer medicines information is essential to support safe and effective medicine taking, but the wording and layout of currently provided materials do not meet patients' needs. To identify principles from the wider discipline of information design for use by health professionals when developing or assessing written drug information for patients. Six experts in information design nominated texts on best practice in information design applicable to consumer medicines information. A content analysis identified key principles that were tabulated to bring out key themes. Six texts that met the inclusion criteria, were identified, and content analysis indentified 4 themes: words, type, lines, and layout. Within these main themes, there were 24 subthemes. Selected principles relating to these subthemes were: use short familiar words, short sentences, and short headings that stand out from the text; use a conversational tone of voice, addressing the reader as "you"; use a large type size while retaining sufficient white space; use bullet points to organize lists; use unjustified text (ragged right) and bold, lower-case text for emphasis. Pictures or graphics do not necessarily improve a document. Applying the good information design principles identified to written consumer medicines information could support health professionals when developing and assessing drug information for patients.
The comparison and analysis of extracting video key frame
NASA Astrophysics Data System (ADS)
Ouyang, S. Z.; Zhong, L.; Luo, R. Q.
2018-05-01
Video key frame extraction is an important part of the large data processing. Based on the previous work in key frame extraction, we summarized four important key frame extraction algorithms, and these methods are largely developed by comparing the differences between each of two frames. If the difference exceeds a threshold value, take the corresponding frame as two different keyframes. After the research, the key frame extraction based on the amount of mutual trust is proposed, the introduction of information entropy, by selecting the appropriate threshold values into the initial class, and finally take a similar mean mutual information as a candidate key frame. On this paper, several algorithms is used to extract the key frame of tunnel traffic videos. Then, with the analysis to the experimental results and comparisons between the pros and cons of these algorithms, the basis of practical applications is well provided.
NASA Astrophysics Data System (ADS)
Lee, M. J.; Oh, K. Y.; Joung-ho, L.
2016-12-01
Recently there are many research about analysing the interaction between entities by text-mining analysis in various fields. In this paper, we aimed to quantitatively analyse research-trends in the area of environmental research relating either spatial information or ICT (Information and Communications Technology) by Text-mining analysis. To do this, we applied low-dimensional embedding method, clustering analysis, and association rule to find meaningful associative patterns of key words frequently appeared in the articles. As the authors suppose that KCI (Korea Citation Index) articles reflect academic demands, total 1228 KCI articles that have been published from 1996 to 2015 were reviewed and analysed by Text-mining method. First, we derived KCI articles from NDSL(National Discovery for Science Leaders) site. And then we pre-processed their key-words elected from abstract and then classified those in separable sectors. We investigated the appearance rates and association rule of key-words for articles in the two fields: spatial-information and ICT. In order to detect historic trends, analysis was conducted separately for the four periods: 1996-2000, 2001-2005, 2006-2010, 2011-2015. These analysis were conducted with the usage of R-software. As a result, we conformed that environmental research relating spatial information mainly focused upon such fields as `GIS(35%)', `Remote-Sensing(25%)', `environmental theme map(15.7%)'. Next, `ICT technology(23.6%)', `ICT service(5.4%)', `mobile(24%)', `big data(10%)', `AI(7%)' are primarily emerging from environmental research relating ICT. Thus, from the analysis results, this paper asserts that research trends and academic progresses are well-structured to review recent spatial information and ICT technology and the outcomes of the analysis can be an adequate guidelines to establish environment policies and strategies. KEY WORDS: Big data, Test-mining, Environmental research, Spatial-information, ICT Acknowledgements: The authors appreciate the support that this study has received from `Building application frame of environmental issues, to respond to the latest ICT trends'.
Metals and Ceramics Information Center.
1981-07-01
Systems RESOURCE MANAGEMENT AND ECONOMIC ANALYSIS a Ordnance Technology a Space Systems and Applications a Biomass Resources 6 Business Planning • Economics ...r 19 KEY WORDS (Cwintince on reverse side 4 neressery and identify by block numnber) Technical Information Center Composites DoD Information Analysis ...The Metals and Ceramics Information Center (MCIC) is one of the technical Information Analysis Centers (IAC’s) chartered and sponsored by the
2012-09-01
Services FSD Federated Services Daemon I&A Identification and Authentication IKE Internet Key Exchange KPI Key Performance Indicator LAN Local Area...spection takes place in different processes in the server architecture. Key Performance Indica- tor ( KPI )s associated with the system need to be...application and risk analysis of security controls. Thus, measurement of the KPIs is needed before an informed tradeoff between the performance penalties
Novel Image Encryption Scheme Based on Chebyshev Polynomial and Duffing Map
2014-01-01
We present a novel image encryption algorithm using Chebyshev polynomial based on permutation and substitution and Duffing map based on substitution. Comprehensive security analysis has been performed on the designed scheme using key space analysis, visual testing, histogram analysis, information entropy calculation, correlation coefficient analysis, differential analysis, key sensitivity test, and speed test. The study demonstrates that the proposed image encryption algorithm shows advantages of more than 10113 key space and desirable level of security based on the good statistical results and theoretical arguments. PMID:25143970
Key Informants' Perspectives on Teacher Learning in Scotland
ERIC Educational Resources Information Center
Kennedy, Aileen; Christie, Donald; Fraser, Christine; Reid, Lesley; McKinney, Stephen; Welsh, Mary; Wilson, Alastair; Griffiths, Morwenna
2008-01-01
This article outlines the policy context for teachers' learning and continuing professional development in Scotland and considers this in relation to the perspectives of key informants gained through interview. The analysis draws on a triple-lens conceptual framework and points to some interesting contradictions between the policy text and the…
Telemedicine information analysis center.
Zajtchuk, Joan T; Zajtchuk, Russ; Petrovic, Joseph J; Gutz, Ryan P; Walrath, Benjamin D
2004-01-01
Congress mandated a pilot project to demonstrate the feasibility of establishing a Department of Defense (DoD) telemedicine information analysis center (TIAC). The project developed a medical information support system to show the core capabilities of a TIAC. The productivity and effectiveness of telemedicine researchers and clinical practitioners can be enhanced by the existence of an information analysis center (IACs) devoted to the collection, analysis, synthesis, and dissemination of worldwide scientific and technical information related to the field of telemedicine. The work conducted under the TIAC pilot project establishes the basic IAC functions and assesses the utility of the TIAC to the military medical departments. The pilot project capabilities are Web-based and include: (1) applying the science of classification (taxonomy) to telemedicine to identify key words; (2) creating a relational database of this taxonomy to a bibliographic database using these key words; (3) developing and disseminating information via a public TIAC Web site; (4) performing a specific baseline technical area task for the U.S. Army Medical Command; and (5) providing analyses by subject matter experts.
ERIC Educational Resources Information Center
Moore, Corey L.; Wang, Ningning; Davis, Dytisha; Aref, Fariborz; Manyibe, Edward O.; Washington, Andre L.; Johnson, Jean; Eugene-Cross, Kenyotta; Muhammad, Atashia; Jennings-Jones, Desiree
2017-01-01
Purpose: In the previous analysis of key informant perspectives on minority research leaders' career development factors, we identified individual and sociocultural, institutional, and federal research agency (i.e., National Institute on Disability, Independent Living, and Rehabilitation Research; National Institutes of Health; Agency for…
A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system
NASA Astrophysics Data System (ADS)
Wang, Zhen; Huang, Xia; Li, Yu-Xia; Song, Xiao-Na
2013-01-01
We propose a new image encryption algorithm on the basis of the fractional-order hyperchaotic Lorenz system. While in the process of generating a key stream, the system parameters and the derivative order are embedded in the proposed algorithm to enhance the security. Such an algorithm is detailed in terms of security analyses, including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. The experimental results demonstrate that the proposed image encryption scheme has the advantages of large key space and high security for practical image encryption.
Part II--Factors Associated with School Nurse Ratios: Key State Informants' Perceptions
ERIC Educational Resources Information Center
Maughan, Erin
2009-01-01
This paper is the second of a two-part series examining factors influencing school nurse to pupil staffing ratios. The paper reports data from a qualitative study exploring the social and political factors that potentially influence ratios. Interviews were conducted with 30 key state informants from these states. Content analysis of the data…
Nondestructive Testing Information Analysis Center, 1980.
1981-06-01
A.-A. 1 50 STHWEbf RESEARCH INST SAN ANTONIO TLX F/, 1*/ NONOESTRUCTIVE TESTING INFORMAtION ANALYSIS CENTER 19J8 SOT U)’JUN 81 R T SMITH OLA90U-T9-C...Feb ~81,J ’. Nondestructive Testing Information Analysis Center, 1980. ., I F l.15-56 7- . E T 7. AUTHORts) W. CNTRACTO--FFArNT NUMBER(s) - ) Richard T...ifdifferent from Report) 18 SUPPLEMENTARY NOTES 19. KEY WORDS (Continue on reverse side ifnecessary and identify bv block number) Information analysis centers
Optimal attacks on qubit-based Quantum Key Recycling
NASA Astrophysics Data System (ADS)
Leermakers, Daan; Škorić, Boris
2018-03-01
Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.
Enhancing security and improving interoperability in healthcare information systems.
Gritzalis, D A
1998-01-01
Security is a key issue in healthcare information systems, since most aspects of security become of considerable or even critical importance when handling healthcare information. In addition, the intense need for information exchange has revealed interoperability of systems and applications as another key issue. Standardization can play an important role towards both these issues. In this paper, relevant standardization activities are briefly presented, and existing and emerging healthcare information security standards are identified and critically analysed. The analysis is based on a framework which has been developed for this reason. Therefore, the identification of gaps and inconsistencies in current standardization, the description of the conflicts of standards with legislation, and the analysis of implications of these standards to user organizations, are the main results of this paper.
Model-driven meta-analyses for informing health care: a diabetes meta-analysis as an exemplar.
Brown, Sharon A; Becker, Betsy Jane; García, Alexandra A; Brown, Adama; Ramírez, Gilbert
2015-04-01
A relatively novel type of meta-analysis, a model-driven meta-analysis, involves the quantitative synthesis of descriptive, correlational data and is useful for identifying key predictors of health outcomes and informing clinical guidelines. Few such meta-analyses have been conducted and thus, large bodies of research remain unsynthesized and uninterpreted for application in health care. We describe the unique challenges of conducting a model-driven meta-analysis, focusing primarily on issues related to locating a sample of published and unpublished primary studies, extracting and verifying descriptive and correlational data, and conducting analyses. A current meta-analysis of the research on predictors of key health outcomes in diabetes is used to illustrate our main points. © The Author(s) 2014.
MODEL-DRIVEN META-ANALYSES FOR INFORMING HEALTH CARE: A DIABETES META-ANALYSIS AS AN EXEMPLAR
Brown, Sharon A.; Becker, Betsy Jane; García, Alexandra A.; Brown, Adama; Ramírez, Gilbert
2015-01-01
A relatively novel type of meta-analysis, a model-driven meta-analysis, involves the quantitative synthesis of descriptive, correlational data and is useful for identifying key predictors of health outcomes and informing clinical guidelines. Few such meta-analyses have been conducted and thus, large bodies of research remain unsynthesized and uninterpreted for application in health care. We describe the unique challenges of conducting a model-driven meta-analysis, focusing primarily on issues related to locating a sample of published and unpublished primary studies, extracting and verifying descriptive and correlational data, and conducting analyses. A current meta-analysis of the research on predictors of key health outcomes in diabetes is used to illustrate our main points. PMID:25142707
Public-key quantum digital signature scheme with one-time pad private-key
NASA Astrophysics Data System (ADS)
Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua
2018-01-01
A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.
A Statewide Key Informant Survey and Social Indicators Analysis.
ERIC Educational Resources Information Center
Fleischer, Mitchell
This needs assessment study of mental health needs of the elderly in Pennsylvania used a three-part approach. These parts were a review of existing data sources, an extensive key informant study, and a review of service delivery models. A recent study found a prevalence rate for mental illness in the elderly of 12.8%, more than 5% lower than the…
[Key informers. When and How?].
Martín González, R
2009-03-01
When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.
Image encryption based on a delayed fractional-order chaotic logistic system
NASA Astrophysics Data System (ADS)
Wang, Zhen; Huang, Xia; Li, Ning; Song, Xiao-Na
2012-05-01
A new image encryption scheme is proposed based on a delayed fractional-order chaotic logistic system. In the process of generating a key stream, the time-varying delay and fractional derivative are embedded in the proposed scheme to improve the security. Such a scheme is described in detail with security analyses including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. Experimental results show that the newly proposed image encryption scheme possesses high security.
Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H
2014-03-28
High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.
Study on the security of the authentication scheme with key recycling in QKD
NASA Astrophysics Data System (ADS)
Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu
2016-09-01
In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.
Strategic information systems planning for health service providers.
Moriarty, D D
1992-01-01
There is significant opportunity for health service providers to gain competitive advantage through the innovative use of strategic information systems. This analysis presents some key strategic information systems issues that will enable managers to identify opportunities within their organizations.
Evaluation of the Field Test of Project Information Packages: Volume III--Resource Cost Analysis.
ERIC Educational Resources Information Center
Al-Salam, Nabeel; And Others
The third of three volumes evaluating the first year field test of the Project Information Packages (PIPs) provides a cost analysis study as a key element in the total evaluation. The resource approach to cost analysis is explained and the specific resource methodology used in the main cost analysis of the 19 PIP field-test projects detailed. The…
A Decision Support Framework for Science-Based, Multi-Stakeholder Deliberation: A Coral Reef Example
NASA Astrophysics Data System (ADS)
Rehr, Amanda P.; Small, Mitchell J.; Bradley, Patricia; Fisher, William S.; Vega, Ann; Black, Kelly; Stockton, Tom
2012-12-01
We present a decision support framework for science-based assessment and multi-stakeholder deliberation. The framework consists of two parts: a DPSIR (Drivers-Pressures-States-Impacts-Responses) analysis to identify the important causal relationships among anthropogenic environmental stressors, processes, and outcomes; and a Decision Landscape analysis to depict the legal, social, and institutional dimensions of environmental decisions. The Decision Landscape incorporates interactions among government agencies, regulated businesses, non-government organizations, and other stakeholders. It also identifies where scientific information regarding environmental processes is collected and transmitted to improve knowledge about elements of the DPSIR and to improve the scientific basis for decisions. Our application of the decision support framework to coral reef protection and restoration in the Florida Keys focusing on anthropogenic stressors, such as wastewater, proved to be successful and offered several insights. Using information from a management plan, it was possible to capture the current state of the science with a DPSIR analysis as well as important decision options, decision makers and applicable laws with a the Decision Landscape analysis. A structured elicitation of values and beliefs conducted at a coral reef management workshop held in Key West, Florida provided a diversity of opinion and also indicated a prioritization of several environmental stressors affecting coral reef health. The integrated DPSIR/Decision landscape framework for the Florida Keys developed based on the elicited opinion and the DPSIR analysis can be used to inform management decisions, to reveal the role that further scientific information and research might play to populate the framework, and to facilitate better-informed agreement among participants.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sandford, M.T. II; Bradley, J.N.; Handel, T.G.
Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits,more » is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.« less
NASA Astrophysics Data System (ADS)
Sandford, Maxwell T., II; Bradley, Jonathan N.; Handel, Theodore G.
1996-01-01
Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in MicrosoftTM bitmap (BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed `steganography.' Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or `lossy' compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is derived from the original host data by an analysis algorithm.
NASA Astrophysics Data System (ADS)
Chen, Daqiang; Shen, Xiahong; Tong, Bing; Zhu, Xiaoxiao; Feng, Tao
With the increasing competition in logistics industry and promotion of lower logistics costs requirements, the construction of logistics information matching platform for highway transportation plays an important role, and the accuracy of platform design is the key to successful operation or not. Based on survey results of logistics service providers, customers and regulation authorities to access to information and in-depth information demand analysis of logistics information matching platform for highway transportation in Zhejiang province, a survey analysis for framework of logistics information matching platform for highway transportation is provided.
Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.
Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh
2018-01-01
Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.
Dellson, P; Nilbert, M; Bendahl, P-O; Malmström, P; Carlsson, C
2011-07-01
Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials. © 2010 Blackwell Publishing Ltd.
Key Planning Factors for Recovery from a Biological Terrorism Incident
2012-08-30
Goals, this document identifies key technical planning areas that may be used to inform subsequent FEMA response and recovery guidance documents. The...expressed herein do not necessarily state or reflect those of their respective organizations or the US Government. The modeling and analysis provided by...responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would
2014-05-13
the information needed to effectively (1) manage its assets, (2) assess program performance and make budget decisions , (3) make cost- effective ... decision making, including the information needed to effectively (1) manage its assets, (2) assess program performance and make budget decisions , (3...incorporating key elements of a comprehensive management approach , such as a complete analysis of the return on investment, quantitatively -defined goals
Leung, Leanne; de Lemos, Mário L; Kovacic, Laurel
2017-01-01
Background With the rising cost of new oncology treatments, it is no longer sustainable to base initial drug funding decisions primarily on prospective clinical trials as their performance in real-life populations are often difficult to determine. In British Columbia, an approach in evidence building is to retrospectively analyse patient outcomes using observational research on an ad hoc basis. Methods The deliberative framework was constructed in three stages: framework design, framework validation and treatment programme characterization, and key informant interview. Framework design was informed through a literature review and analyses of provincial and national decision-making processes. Treatment programmes funded between 2010 and 2013 were used for framework validation. A selection concordance rate of 80% amongst three reviewers was considered to be a validation of the framework. Key informant interviews were conducted to determine the utility of this deliberative framework. Results A multi-domain deliberative framework with 15 assessment parameters was developed. A selection concordance rate of 84.2% was achieved for content validation of the framework. Nine treatment programmes from five different tumour groups were selected for retrospective outcomes analysis. Five contributory factors to funding uncertainties were identified. Key informants agreed that the framework is a comprehensive tool that targets the key areas involved in the funding decision-making process. Conclusions The oncology-based deliberative framework can be routinely used to assess treatment programmes from the major tumour sites for retrospective outcomes analysis. Key informants indicate this is a value-added tool and will provide insight to the current prospective funding model.
Van Houdt, Sabine; Sermeus, Walter; Vanhaecht, Kris; De Lepeleire, Jan
2014-12-24
Strategies to improve care coordination between primary and hospital care do not always have the desired results. This is partly due to incomplete understanding of the key concepts of care coordination. An in-depth analysis of existing theoretical frameworks for the study of care coordination identified 14 interrelated key concepts. In another study, these 14 key concepts were further explored in patients' experiences. Additionally, "patient characteristics" was identified as a new key concept in patients' experiences and the previously identified key concept "quality of relationship" between healthcare professionals was extended to "quality of relationship" with the patient. Together, these 15 interrelated key concepts resulted in a new theoretical framework. The present study aimed at improving our understanding of the 15 previously identified key concepts and to explore potentially previous unidentified key concepts and the links between these by exploring how healthcare professionals experience care coordination. A qualitative design was used. Six focus groups were conducted including primary healthcare professionals involved in the care of patients who had breast cancer surgery at three hospitals in Belgium. Data were analyzed using constant comparative analysis. All 15 previously identified key concepts of care coordination were further explored in healthcare professionals' experiences. Links between these 15 concepts were identified, including 9 newly identified links. The concept "external factors" was linked with all 6 concepts relating to (inter)organizational mechanisms; "task characteristics", "structure", "knowledge and information technology", "administrative operational processes", "cultural factors" and "need for coordination". Five of these concepts related to 3 concepts of relational coordination; "roles", "quality of relationship" and "exchange of information". The concept of "task characteristics" was only linked with "roles" and "exchange of information". The concept "patient characteristics" related with the concepts "need for coordination" and "patient outcome". Outcome was influenced by "roles", "quality of relationship" and "exchange of information". External factors and the (inter)organizational mechanism should enhance "roles" and "quality of relationship" between healthcare professionals and with the patient as well as "exchange of information", and setting and sharing of common "goals" to improve care coordination and quality of care.
A Critical Analysis of Eight Informal Reading Inventories
ERIC Educational Resources Information Center
Nilsson, Nina L.
2008-01-01
For this content analysis study, the author examined and cross-compared the various ways in which eight informal reading inventories (IRIs) published from 2004 to 2008 address key issues relevant to new U.S. federal guidelines and the National Reading Panel's five critical components of reading instruction. Results suggest the IRIs range in…
Nano-enabled drug delivery: a research profile.
Zhou, Xiao; Porter, Alan L; Robinson, Douglas K R; Shim, Min Suk; Guo, Ying
2014-07-01
Nano-enabled drug delivery (NEDD) systems are rapidly emerging as a key area for nanotechnology application. Understanding the status and developmental prospects of this area around the world is important to determine research priorities, and to evaluate and direct progress. Global research publication and patent databases provide a reservoir of information that can be tapped to provide intelligence for such needs. Here, we present a process to allow for extraction of NEDD-related information from these databases by involving topical experts. This process incorporates in-depth analysis of NEDD literature review papers to identify key subsystems and major topics. We then use these to structure global analysis of NEDD research topical trends and collaborative patterns, inform future innovation directions. This paper describes the process of how to derive nano-enabled drug delivery-related information from global research and patent databases in an effort to perform comprehensive global analysis of research trends and directions, along with collaborative patterns. Copyright © 2014 Elsevier Inc. All rights reserved.
A Digital Ethnography of Medical Students who Use Twitter for Professional Development.
Chretien, Katherine C; Tuck, Matthew G; Simon, Michael; Singh, Lisa O; Kind, Terry
2015-11-01
While researchers have studied negative professional consequences of medical trainee social media use, little is known about how medical students informally use social media for education and career development. This knowledge may help future and current physicians succeed in the digital age. We aimed to explore how and why medical students use Twitter for professional development. This was a digital ethnography. Medical student "superusers" of Twitter participated in the study The postings ("tweets") of 31 medical student superusers were observed for 8 months (May-December 2013), and structured field notes recorded. Through purposive sampling, individual key informant interviews were conducted to explore Twitter use and values until thematic saturation was reached (ten students). Three faculty key informant interviews were also conducted. Ego network and subnetwork analysis of student key informants was performed. Qualitative analysis included inductive coding of field notes and interviews, triangulation of data, and analytic memos in an iterative process. Twitter served as a professional tool that supplemented the traditional medical school experience. Superusers approached their use of Twitter with purpose and were mindful of online professionalism as well as of being good Twitter citizens. Their tweets reflected a mix of personal and professional content. Student key informants had a high number of followers. The subnetwork of key informants was well-connected, showing evidence of a social network versus information network. Twitter provided value in two major domains: access and voice. Students gained access to information, to experts, to a variety of perspectives including patient and public perspectives, and to communities of support. They also gained a platform for advocacy, control of their digital footprint, and a sense of equalization within the medical hierarchy. Twitter can serve as a professional tool that supplements traditional education. Students' practices and guiding principles can serve as best practices for other students as well as faculty.
Analysis of counterfactual quantum key distribution using error-correcting theory
NASA Astrophysics Data System (ADS)
Li, Yan-Bing
2014-10-01
Counterfactual quantum key distribution is an interesting direction in quantum cryptography and has been realized by some researchers. However, it has been pointed that its insecure in information theory when it is used over a high lossy channel. In this paper, we retry its security from a error-correcting theory point of view. The analysis indicates that the security flaw comes from the reason that the error rate in the users' raw key pair is as high as that under the Eve's attack when the loss rate exceeds 50 %.
Galas, David J; Sakhanenko, Nikita A; Skupin, Alexander; Ignac, Tomasz
2014-02-01
Context dependence is central to the description of complexity. Keying on the pairwise definition of "set complexity," we use an information theory approach to formulate general measures of systems complexity. We examine the properties of multivariable dependency starting with the concept of interaction information. We then present a new measure for unbiased detection of multivariable dependency, "differential interaction information." This quantity for two variables reduces to the pairwise "set complexity" previously proposed as a context-dependent measure of information in biological systems. We generalize it here to an arbitrary number of variables. Critical limiting properties of the "differential interaction information" are key to the generalization. This measure extends previous ideas about biological information and provides a more sophisticated basis for the study of complexity. The properties of "differential interaction information" also suggest new approaches to data analysis. Given a data set of system measurements, differential interaction information can provide a measure of collective dependence, which can be represented in hypergraphs describing complex system interaction patterns. We investigate this kind of analysis using simulated data sets. The conjoining of a generalized set complexity measure, multivariable dependency analysis, and hypergraphs is our central result. While our focus is on complex biological systems, our results are applicable to any complex system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miranda, A.L.
1990-11-01
The market survey covers the water and wastewater pollution control systems market in the Philippines. The analysis contains statistical and narrative information on projected market demand, end-users; receptivity of Philippine consumers to U.S. products; the competitive situation, and market access (tariffs, non-tariff barriers, standards, taxes, distribution channels). It also contains key contact information.
Advancing team-based primary health care: a comparative analysis of policies in western Canada.
Suter, Esther; Mallinson, Sara; Misfeldt, Renee; Boakye, Omenaa; Nasmith, Louise; Wong, Sabrina T
2017-07-17
We analyzed and compared primary health care (PHC) policies in British Columbia, Alberta and Saskatchewan to understand how they inform the design and implementation of team-based primary health care service delivery. The goal was to develop policy imperatives that can advance team-based PHC in Canada. We conducted comparative case studies (n = 3). The policy analysis included: Context review: We reviewed relevant information (2007 to 2014) from databases and websites. Policy review and comparative analysis: We compared and contrasted publically available PHC policies. Key informant interviews: Key informants (n = 30) validated narratives prepared from the comparative analysis by offering contextual information on potential policy imperatives. Advisory group and roundtable: An expert advisory group guided this work and a key stakeholder roundtable event guided prioritization of policy imperatives. The concept of team-based PHC varies widely across and within the three provinces. We noted policy gaps related to team configuration, leadership, scope of practice, role clarity and financing of team-based care; few policies speak explicitly to monitoring and evaluation of team-based PHC. We prioritized four policy imperatives: (1) alignment of goals and policies at different system levels; (2) investment of resources for system change; (3) compensation models for all members of the team; and (4) accountability through collaborative practice metrics. Policies supporting team-based PHC have been slow to emerge, lacking a systematic and coordinated approach. Greater alignment with specific consideration of financing, reimbursement, implementation mechanisms and performance monitoring could accelerate systemic transformation by removing some well-known barriers to team-based care.
Spatial Paradigm for Information Retrieval and Exploration
DOE Office of Scientific and Technical Information (OSTI.GOV)
The SPIRE system consists of software for visual analysis of primarily text based information sources. This technology enables the content analysis of text documents without reading all the documents. It employs several algorithms for text and word proximity analysis. It identifies the key themes within the text documents. From this analysis, it projects the results onto a visual spatial proximity display (Galaxies or Themescape) where items (documents and/or themes) visually close to each other are known to have content which is close to each other. Innovative interaction techniques then allow for dynamic visual analysis of large text based information spaces.
SPIRE1.03. Spatial Paradigm for Information Retrieval and Exploration
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adams, K.J.; Bohn, S.; Crow, V.
The SPIRE system consists of software for visual analysis of primarily text based information sources. This technology enables the content analysis of text documents without reading all the documents. It employs several algorithms for text and word proximity analysis. It identifies the key themes within the text documents. From this analysis, it projects the results onto a visual spatial proximity display (Galaxies or Themescape) where items (documents and/or themes) visually close to each other are known to have content which is close to each other. Innovative interaction techniques then allow for dynamic visual analysis of large text based information spaces.
Reflections on Cyberspace as the New "Wired World of Education"
ERIC Educational Resources Information Center
Ward, Andrew; Prosser, Brian T.
2011-01-01
Developments in Information Technologies (ITs) like the Internet have transformed information exchange. Moreover, since information exchange and analysis are key aspects of the learning experience, these developments have had an important impact on education. Within this context, the important question concerns the sort of educational…
SLAR image interpretation keys for geographic analysis
NASA Technical Reports Server (NTRS)
Coiner, J. C.
1972-01-01
A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.
Key Health Information Technologies and Related Issues for Iran: A Qualitative Study
Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh
2018-01-01
Background and Objective: Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. Methods: This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. Results: The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. Conclusion: In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making. PMID:29854016
Gilmore, Kelly; Hoopes, Andrea J; Cady, Janet; Amies Oelschlager, Anne-Marie; Prager, Sarah; Vander Stoep, Ann
2015-06-01
The purpose of this study was to describe the implementation of a program that provides long-acting reversible contraception (LARC) services within school-based health centers (SBHCs) and to identify barriers and facilitators to implementation as reported by SBHC clinicians and administrators, public health officials, and community partners. We conducted 14 semistructured interviews with key informants involved in the implementation of LARC services. Key informants included SBHC clinicians and administrators, public health officials, and community partners. We used a content analysis approach to analyze interview transcripts for themes. We explored barriers to and facilitators of LARC service delivery across and within key informant groups. The most cited barriers across key informant groups were as follows: perceived lack of provider procedural skills and bias and negative attitudes about LARC methods. The most common facilitators identified across groups were as follows: clear communication strategies, contraceptive counseling practice changes, provider trainings, and stakeholder engagement. Two additional barriers emerged in specific key informant groups. Technical and logistical barriers to LARC service delivery were cited heavily by SBHC administrative staff, community partners, and public health officials. Expense and billing was a major barrier to SBHC administrative staff. LARC counseling and procedural services can be implemented in an SBHC setting to promote access to effective contraceptive options for adolescent women. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.
Authenticated multi-user quantum key distribution with single particles
NASA Astrophysics Data System (ADS)
Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen
2016-03-01
Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cannon, E.; Miranda, A.L.
1990-08-01
The market survey covers the renewable energy resources market in the Philippines. Sub-sectors covered include biomass, solar energy, photovoltaic cells, windmills, and mini-hydro systems. The analysis contains statistical and narrative information on projected market demand, end-users; receptivity of Philippine consumers to U.S. products; the competitive situation, and market access (tariffs, non-tariff barriers, standards, taxes, distribution channels). It also contains key contact information.
APNs taking the next step: disseminating practice information via effective poster presentations.
Bischof, Janet
2013-02-10
Advanced practice nurses (APNs) have a responsibility to share information from projects and research with other professionals. Poster presentations offer a way to visually share the information to a wide audience. Key elements include title, objective/purpose, data collection, results, analysis, implications for nursing, and appropriate references.
76 FR 17931 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-31
... workforce. The quantitative survey and the qualitative interviews and analysis will be used to provide a... survey and data collection is to gather information to guide the formation of effective national... Clinical Director Survey (also available in paper format) On-line Focus Groups Key Informant Telephone...
twzPEA: A Topology and Working Zone Based Pathway Enrichment Analysis Framework
USDA-ARS?s Scientific Manuscript database
Sensitive detection of involvement and adaptation of key signaling, regulatory, and metabolic pathways holds the key to deciphering molecular mechanisms such as those in the biomass-to-biofuel conversion process in yeast. Typical gene set enrichment analyses often do not use topology information in...
ERIC Educational Resources Information Center
Coben, Diana; Miller-Reilly, Barbara; Satherley, Paul; Earle, David
2016-01-01
The Programme for the International Assessment of Adult Competencies (PIAAC) assesses key information processing skills and collects information on how often people undertake a range of activities at work and in everyday life. We are exploring what secondary analysis of online anonymised PIAAC data can tell us about adults' numeracy practices. In…
A Comprehensive Analysis of the Quality of Online Health-Related Information regarding Schizophrenia
ERIC Educational Resources Information Center
Guada, Joseph; Venable, Victoria
2011-01-01
Social workers are major mental health providers and, thus, can be key players in guiding consumers and their families to accurate information regarding schizophrenia. The present study, using the WebMedQual scale, is a comprehensive analysis across a one-year period at two different time points of the top for-profit and nonprofit sites that…
Deaf community analysis for health education priorities.
Jones, Elaine G; Renger, Ralph; Firestone, Rob
2005-01-01
Deaf persons' access to health-related information is limited by barriers to spoken or written language: they cannot overhear information; they have limited access to television, radio, and other channels for public information; and the average reading level of Deaf adults is at a 3rd to 4th grade level. However, literature searches revealed no published reports of community analysis focusing specifically on health education priorities for Deaf communities. A seven-step community analysis was conducted to learn the health education priorities in Arizona Deaf communities and to inform development of culturally relevant health education interventions in Deaf communities. The word "Deaf" is capitalized to reflect the cultural perspective of the Deaf community. A 14-member Deaf Health Committee collected data using multimethods that included review of state census data, review of national health priorities, key informant interviews, discussions with key community groups, a mail survey (n = 20), and semistructured interviews conducted in sign language with 111 Deaf adults. The community diagnosis with highest priority for health education was vulnerability to cardiovascular disease (CVD). Following completion of the community analysis, a heart-health education intervention (The Deaf Heart Health Intervention) was developed using a train-the-trainer, community health worker model. If this model proves to be effective in addressing vulnerability to CVD, then a similar protocol could be employed to address other health concerns identified in the Deaf community analysis.
Translating Health Services Research into Practice in the Safety Net.
Moore, Susan L; Fischer, Ilana; Havranek, Edward P
2016-02-01
To summarize research relating to health services research translation in the safety net through analysis of the literature and case study of a safety net system. Literature review and key informant interviews at an integrated safety net hospital. This paper describes the results of a comprehensive literature review of translational science literature as applied to health care paired with qualitative analysis of five key informant interviews conducted with senior-level management at Denver Health and Hospital Authority. Results from the literature suggest that implementing innovation may be more difficult in the safety net due to multiple factors, including financial and organizational constraints. Results from key informant interviews confirmed the reality of financial barriers to innovation implementation but also implied that factors, including institutional respect for data, organizational attitudes, and leadership support, could compensate for disadvantages. Translating research into practice is of critical importance to safety net providers, which are under increased pressure to improve patient care and satisfaction. Results suggest that translational research done in the safety net can better illuminate the special challenges of this setting; more such research is needed. © Health Research and Educational Trust.
2012-11-05
key leadership of critical R4 cost analysis. The second objective is to equip DoD planners with the framework for solving retrograde dilemmas in...informing key leadership of critical R4 cost analysis. The second objective is to equip DoD planners with the framework for solving retrograde...replicate the same dedication to individuals in similar situations in years to come. To Captains Aaron Burciaga, Mario Solano, and Maro Enoka, as well
A Framework to Support Research on Informal Inferential Reasoning
ERIC Educational Resources Information Center
Zieffler, Andrew; Garfield, Joan; delMas, Robert; Reading, Chris
2008-01-01
Informal inferential reasoning is a relatively recent concept in the research literature. Several research studies have defined this type of cognitive process in slightly different ways. In this paper, a working definition of informal inferential reasoning based on an analysis of the key aspects of statistical inference, and on research from…
Image detection and compression for memory efficient system analysis
NASA Astrophysics Data System (ADS)
Bayraktar, Mustafa
2015-02-01
The advances in digital signal processing have been progressing towards efficient use of memory and processing. Both of these factors can be utilized efficiently by using feasible techniques of image storage by computing the minimum information of image which will enhance computation in later processes. Scale Invariant Feature Transform (SIFT) can be utilized to estimate and retrieve of an image. In computer vision, SIFT can be implemented to recognize the image by comparing its key features from SIFT saved key point descriptors. The main advantage of SIFT is that it doesn't only remove the redundant information from an image but also reduces the key points by matching their orientation and adding them together in different windows of image [1]. Another key property of this approach is that it works on highly contrasted images more efficiently because it`s design is based on collecting key points from the contrast shades of image.
Wolf, Lisa
2004-12-01
Women diagnosed with breast cancer treated by mastectomy can choose breast reconstruction. The information needs of women undergoing this procedure have only been addressed in the research literature to a limited extent. A qualitative approach was used to explore the experiences of women who had undergone breast reconstruction with a specific focus on their views on how they considered their information needs could best be met. A purposeful sample of eight women was recruited to participate in two focus groups, each lasting 2 hours. Framework analysis was used to develop an index of key themes and sub themes which transformed the data into a structured record which facilitated systematic analysis. This paper will present the emergent key themes regarding information giving and the content of information that women perceive as important when preparing for breast reconstruction. Process, delivery and patient factors are presented in the category of information giving. Several sub themes are discussed concerning the content of information considered to be relevant. Those involved in imparting information to women about such surgery should be aware of the type of information that is considered relevant, the manner in which it should be delivered and timing factors that implicate on the process.
Leadership Principles Leveraged from Key Civil War Battles
2017-05-15
primary research method utilized for this research paper. The purpose of the literature review was to find data and information regarding analysis of...review was the primary research method utilized for this research paper. The purpose of the literature review was to find data and information...data generation and analysis. Organizational Research Methods , 15 (2), 316-335. Becker, W.S. & Burke, M.J. (2014). Instructional staff
Data and Analysis Center for Software: An IAC in Transition.
1983-06-01
reviewed and is approved for publication. * APPROVEDt Proj ect Engineer . JOHN J. MARCINIAK, Colonel, USAF Chief, Command and Control Division . FOR THE CO...SUPPLEMENTARY NOTES RADC Project Engineer : John Palaimo (COEE) It. KEY WORDS (Conilnuo n rever*e aide if necessary and identify by block numober...Software Engineering Software Technology Information Analysis Center Database Scientific and Technical Information 20. ABSTRACT (Continue on reverse side It
Arshad, Hamed; Nikooghadam, Morteza
2014-12-01
Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.
A general methodology for population analysis
NASA Astrophysics Data System (ADS)
Lazov, Petar; Lazov, Igor
2014-12-01
For a given population with N - current and M - maximum number of entities, modeled by a Birth-Death Process (BDP) with size M+1, we introduce utilization parameter ρ, ratio of the primary birth and death rates in that BDP, which, physically, determines (equilibrium) macrostates of the population, and information parameter ν, which has an interpretation as population information stiffness. The BDP, modeling the population, is in the state n, n=0,1,…,M, if N=n. In presence of these two key metrics, applying continuity law, equilibrium balance equations concerning the probability distribution pn, n=0,1,…,M, of the quantity N, pn=Prob{N=n}, in equilibrium, and conservation law, and relying on the fundamental concepts population information and population entropy, we develop a general methodology for population analysis; thereto, by definition, population entropy is uncertainty, related to the population. In this approach, what is its essential contribution, the population information consists of three basic parts: elastic (Hooke's) or absorption/emission part, synchronization or inelastic part and null part; the first two parts, which determine uniquely the null part (the null part connects them), are the two basic components of the Information Spectrum of the population. Population entropy, as mean value of population information, follows this division of the information. A given population can function in information elastic, antielastic and inelastic regime. In an information linear population, the synchronization part of the information and entropy is absent. The population size, M+1, is the third key metric in this methodology. Namely, right supposing a population with infinite size, the most of the key quantities and results for populations with finite size, emerged in this methodology, vanish.
Analysis of Exposure-Dose Variation of Inhaled Particles in Adult Subjects.
Although internal dose is a key factor for determining the health risk of inhaled pollutant particles, available dose information is largely limited to young healthy adults under a few typical exposure conditions. Extrapolation of the limited dose information to different populat...
Glycopeptide Analysis, Recent Developments and Applications*
Desaire, Heather
2013-01-01
Glycopeptide-based analysis is used to inform researchers about the glycans on one or more proteins. The method's key attractive feature is its ability to link glycosylation information to exact locations (glycosylation sites) on proteins. Numerous applications for glycopeptide analysis are known, and several examples are described herein. The techniques used to characterize glycopeptides are still emerging, and recently, research focused on facilitating aspects of glycopeptide analysis has advanced significantly in the areas of sample preparation, MS fragmentation, and automation of data analysis. These recent developments, described herein, provide the foundation for the growth of glycopeptide analysis as a blossoming field. PMID:23389047
Investigating effects of communications modulation technique on targeting performance
NASA Astrophysics Data System (ADS)
Blasch, Erik; Eusebio, Gerald; Huling, Edward
2006-05-01
One of the key challenges facing the global war on terrorism (GWOT) and urban operations is the increased need for rapid and diverse information from distributed sources. For users to get adequate information on target types and movements, they would need reliable data. In order to facilitate reliable computational intelligence, we seek to explore the communication modulation tradeoffs affecting information distribution and accumulation. In this analysis, we explore the modulation techniques of Orthogonal Frequency Division Multiplexing (OFDM), Direct Sequence Spread Spectrum (DSSS), and statistical time-division multiple access (TDMA) as a function of the bit error rate and jitter that affect targeting performance. In the analysis, we simulate a Link 16 with a simple bandpass frequency shift keying (PSK) technique using different Signal-to-Noise ratios. The communications transfer delay and accuracy tradeoffs are assessed as to the effects incurred in targeting performance.
Identifying key hospital service quality factors in online health communities.
Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki
2015-04-07
The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. We defined social media-based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea's two biggest online portals were used to test the effectiveness of detection of social media-based key quality factors for hospitals. To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is 78% on average. Extraction and classification performance still has room for improvement, but the extraction results are applicable to more detailed analysis. Further analysis of the extracted information reveals that there are differences in the details of social media-based key quality factors for hospitals according to the regions in Korea, and the patterns of change seem to accurately reflect social events (eg, influenza epidemics). These findings could be used to provide timely information to caregivers, hospital officials, and medical officials for health care policies.
ERIC Educational Resources Information Center
Commission of the European Communities, Brussels (Belgium).
This report, the first volume in a three volume set, summarizes the results of a study performed by the DELTA (Developing European Learning through Technological Advance) Unit in parallel with the projects underway in the research and development Exploratory Action. The report identifies the key issues, associated requirements and options, and…
ERIC Educational Resources Information Center
Meyer, Robert S.; Rostvold, Gerhard N.
This study represents a market analysis of the needs, habits and desires of business firms concerning their acquisition and utilization of the information required in their work in order to improve public library services to business and industry through cooperative library action. The key recommendations were: the public library should be the…
Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.
Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping
2014-11-01
Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.
NASA Astrophysics Data System (ADS)
Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin
2016-10-01
Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.
Tsotsos, John K.
2017-01-01
Much has been written about how the biological brain might represent and process visual information, and how this might inspire and inform machine vision systems. Indeed, tremendous progress has been made, and especially during the last decade in the latter area. However, a key question seems too often, if not mostly, be ignored. This question is simply: do proposed solutions scale with the reality of the brain's resources? This scaling question applies equally to brain and to machine solutions. A number of papers have examined the inherent computational difficulty of visual information processing using theoretical and empirical methods. The main goal of this activity had three components: to understand the deep nature of the computational problem of visual information processing; to discover how well the computational difficulty of vision matches to the fixed resources of biological seeing systems; and, to abstract from the matching exercise the key principles that lead to the observed characteristics of biological visual performance. This set of components was termed complexity level analysis in Tsotsos (1987) and was proposed as an important complement to Marr's three levels of analysis. This paper revisits that work with the advantage that decades of hindsight can provide. PMID:28848458
Tsotsos, John K
2017-01-01
Much has been written about how the biological brain might represent and process visual information, and how this might inspire and inform machine vision systems. Indeed, tremendous progress has been made, and especially during the last decade in the latter area. However, a key question seems too often, if not mostly, be ignored. This question is simply: do proposed solutions scale with the reality of the brain's resources? This scaling question applies equally to brain and to machine solutions. A number of papers have examined the inherent computational difficulty of visual information processing using theoretical and empirical methods. The main goal of this activity had three components: to understand the deep nature of the computational problem of visual information processing; to discover how well the computational difficulty of vision matches to the fixed resources of biological seeing systems; and, to abstract from the matching exercise the key principles that lead to the observed characteristics of biological visual performance. This set of components was termed complexity level analysis in Tsotsos (1987) and was proposed as an important complement to Marr's three levels of analysis. This paper revisits that work with the advantage that decades of hindsight can provide.
The Value of Ellul's Analysis in Understanding Propaganda in the Helping Professions
ERIC Educational Resources Information Center
Gambrill, Eileen
2012-01-01
This article draws on Ellul's analysis of propaganda in understanding propaganda in the helping professions. Key in such an analysis is the interweaving of the psychological and sociological. Contrary to the discourse in mission statements of professional organizations and their codes of ethics calling for informed consent, competence of…
Quality Assurance in Higher Education in Zimbabwe
ERIC Educational Resources Information Center
Garwe, Evelyn Chiyevo
2014-01-01
The purpose of this paper is to furnish local and global stakeholders with detailed information regarding the development and current status of quality assurance in the Zimbabwean higher education sector. The study used document analysis, observation and interviews with key informants as sources of data. This paper addresses the dearth of…
Relative Influence of Professional Counseling Journals
ERIC Educational Resources Information Center
Fernando, Delini M.; Barrio Minton, Casey A.
2011-01-01
The authors used social network analysis of citation data to study the flow of information and relative influence of 17 professional counseling journals. Although the "Journal of Counseling & Development" ranked very highly in all measures of journal influence, several division journals emerged as key players in the flow of information within the…
Achieving Information Dominance: Unleashing the Ozone Widget Framework
2014-06-01
1 19 th ICCRTS “C2 Agility: Lessons Learned From Research and Operations” For the paper titled: Achieving Information Dominance : Unleashing...00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Achieving Information Dominance : Unleashing the Ozone Widget Framework 5a. CONTRACT NUMBER 5b...Abstract for Achieving Information Dominance : Unleashing the Ozone Widget Framework One of the key lessons learned from analysis of Joint operations
Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT
NASA Astrophysics Data System (ADS)
Mishra, D. C.; Sharma, R. K.; Kumar, Manish; Kumar, Kuldeep
2014-08-01
In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.
Dy, Sydney M; Purnell, Tanjala S
2012-02-01
High-quality provider-patient decision-making is key to quality care for complex conditions. We performed an analysis of key elements relevant to quality and complex, shared medical decision-making. Based on a search of electronic databases, including Medline and the Cochrane Library, as well as relevant articles' reference lists, reviews of tools, and annotated bibliographies, we developed a list of key concepts and applied them to a decision-making example. Key concepts identified included provider competence, trustworthiness, and cultural competence; communication with patients and families; information quality; patient/surrogate competence; and roles and involvement. We applied this concept list to a case example, shared decision-making for live donor kidney transplantation, and identified the likely most important concepts as provider and cultural competence, information quality, and communication with patients and families. This concept list may be useful for conceptualizing the quality of complex shared decision-making and in guiding research in this area. Copyright © 2011 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Li, Na; Zhang, Yu; Wen, Shuang; Li, Lei-lei; Li, Jian
2018-01-01
Noise is a problem that communication channels cannot avoid. It is, thus, beneficial to analyze the security of MDI-QKD in noisy environment. An analysis model for collective-rotation noise is introduced, and the information theory methods are used to analyze the security of the protocol. The maximum amount of information that Eve can eavesdrop is 50%, and the eavesdropping can always be detected if the noise level ɛ ≤ 0.68. Therefore, MDI-QKD protocol is secure as quantum key distribution protocol. The maximum probability that the relay outputs successful results is 16% when existing eavesdropping. Moreover, the probability that the relay outputs successful results when existing eavesdropping is higher than the situation without eavesdropping. The paper validates that MDI-QKD protocol has better robustness.
Review Of Internet Health Information Quality Initiatives
Dzenowagis, Joan
2001-01-01
Background The massive growth of health information on the Internet; the global nature of the Internet; the seismic shift taking place in the relationships of various actors in this arena, and the absence of real protection from harm for citizens who use the Internet for health purposes are seen to be real problems. One response to many of these problems has been the burgeoning output of codes of conduct by numerous organizations trying to address quality of health information. Objectives Review the major self-regulatory initiatives in the English-speaking world to develop quality and ethical standards for health information on the Internet. Compare and analyze the approaches taken by the different initiatives. Clarify the issues around the development and enforcement of standards. Methods Quality initiatives selected meet one or more of the following criteria: Self-regulatory. A reasonable constituency. Diversity (eg, of philosophy, approach and process)-to achieve balance and wide representation, and to illustrate and compare different approaches. Historic value. A wider reach than a national audience, except when its reach is a significant sector of the Internet health information industry. The initiatives were compared in 3 ways: (1) Analysis and comparison of: key concepts, mechanism, or approach. Analysis of: the obligations that a provider has to meet to comply with the given initiative, the intended beneficiaries of that initiative, and the burdens imposed on different actors. These burdens are described in terms of their effect on the long-term sustainability and maintenance of the initiative by its developers. Analysis of the enforcement mechanisms. (2) Analysis and comparison by type of sponsoring organization, the reach of the initiative, and the sources of funding of the initiative or the sponsoring organization. (3) How the various initiatives fall under 1 of 3 key mechanisms and comparison of the advantages and disadvantages of these key mechanisms. Results The issues that affect the initiatives and future work on the quality of health information on the Internet are identified and analyzed. These issues are: (a) Three key mechanisms used in the quality initiatives (b) Sustainability issues that affect the initiatives: Burdens placed on health information providers, citizens and others. Currency and maintenance issues of the initiatives. Funding. Cost. Acceptance. Market conditions. User indifference or ambivalence. (c) Enforcement issues surrounding the initiatives (d) Adequacy of approach, scope, reach, and enforcement provisions of the various quality initiatives (e) Gaps that need to be addressed to achieve good quality of health information on the internet Conclusions Ten conclusions are presented. A framework of action to be undertaken by the World Health Organization in the field of quality of health information on the Internet is recommended. PMID:11772543
A comparative analysis of the dissemination of best practice measures for key populations.
Lundy, Jennifer; Santangelo, Jennifer; Rogers, Patrick; Kuehn, Lynn; Christensen, Sharon; Bournique, Judy; Mekhjian, Hagop; Kamal, Jyoti
2008-11-06
In collaboration with the department of Quality and Operations Improvement, Clinical Applications and the Information Warehouse, we have leveraged available Information Warehouse data to build a Best Practice Compliance Measurement Dashboard. This tool combines information from our operating room charting system, our order entry system and coding information from the patient billing and management system to provide 'previous day', data on a patients current course of treatment.
2010-04-01
threats (also known as a SWOT analysis) is a very useful method in identifying potential issues, hidden agendas, and competing egos. • Defining a...comprehensive communications plan uses what’s been defined and informs (the second key component to DID) government and con - tractor teams of the essential...program execution strategies. Inform Inform means communicating to internal and external stake- holders what was defined, expected, discovered, con
ERIC Educational Resources Information Center
Carroll, Margaret Aby; Chandler, Yvonne J.
This study examines whether an analysis of characteristics of libraries or information centers and librarians in highly productive companies yields operational models and standards that can improve their efficiency and effectiveness and their parent organization's productivity. Data was collected using an e-mail survey instrument sent to 500 large…
Analytic Steering: Inserting Context into the Information Dialog
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bohn, Shawn J.; Calapristi, Augustin J.; Brown, Shyretha D.
2011-10-23
An analyst’s intrinsic domain knowledge is a primary asset in almost any analysis task. Unstructured text analysis systems that apply un-supervised content analysis approaches can be more effective if they can leverage this domain knowledge in a manner that augments the information discovery process without obfuscating new or unexpected content. Current unsupervised approaches rely upon the prowess of the analyst to submit the right queries or observe generalized document and term relationships from ranked or visual results. We propose a new approach which allows the user to control or steer the analytic view within the unsupervised space. This process ismore » controlled through the data characterization process via user supplied context in the form of a collection of key terms. We show that steering with an appropriate choice of key terms can provide better relevance to the analytic domain and still enable the analyst to uncover un-expected relationships; this paper discusses cases where various analytic steering approaches can provide enhanced analysis results and cases where analytic steering can have a negative impact on the analysis process.« less
ERIC Educational Resources Information Center
Chalupsky, Albert B.; And Others
This study was conducted in order to gain detailed information about teacher education programs related to the English and Australian conversions to the metric system of measurement. Information was gathered by review and analysis of relevant official and unofficial documents, and by intensive interviews of key persons involved in teacher…
Targeted Information Dissemination
2008-03-01
SETUP, RESULTS AND PERFORMANCE ANALYSIS .......................................... 36 APPENDIX C: TID API SPECIFICATION...are developed using FreePastry1. FreePastry provides an API for a structured P2P overlay network. Information Routing and address resolution is...the TID architecture to demonstrate its key features. TID interface API specifications are described in Appendix C. RSS feeds were used to obtain
Schneider, T; Sommerfeld, W; Möller, J
2003-06-01
The Medizinischer Dienst der Krankenversicherung (MDK) is a non-profit medical consulting organisation serving the German Healthcare Insurance System. Despite its uniform commission throughout Germany, organisation and structure differ considerably between Provincial States which is reflected by differing results. A common nationwide system of key figures and indicators aims at analysing results and learning from one another. Development of an audit concept for analysing key figures and indicators within the MDK aiming at quality improvement. Development of a system of key figures and indicators covering five spheres (products, staff, costs, data analysis, structure). Analysis by means of audits carried out across provincial state borders in five steps (audit manual, training of auditors, visitation, audit report, repetition audit). The system of key figures and indicators assures relevant and comparable data. Audit manual, training of auditors, visitation, and audit report meet the needs of all people and institutions involved. Preparation of auditors as well as openness, and flow of information within audited organisations offer areas for improvement. There is as yet no assessment of the cost-benefit ratio of audits. The concept presented in this article consists of two parts: A system of key figures and indicators as well as a concept for audits. The concept is suitable for a) generating and analysing relevant key figures and indicators for each MDK, and b) providing information for benchmarking between different MDK. Further development of the concept to a comprehensive management concept is necessary.
The PDS4 Metadata Management System
NASA Astrophysics Data System (ADS)
Raugh, A. C.; Hughes, J. S.
2018-04-01
We present the key features of the Planetary Data System (PDS) PDS4 Information Model as an extendable metadata management system for planetary metadata related to data structure, analysis/interpretation, and provenance.
Lunar Exploration Architecture Level Key Drivers and Sensitivities
NASA Technical Reports Server (NTRS)
Goodliff, Kandyce; Cirillo, William; Earle, Kevin; Reeves, J. D.; Shyface, Hilary; Andraschko, Mark; Merrill, R. Gabe; Stromgren, Chel; Cirillo, Christopher
2009-01-01
Strategic level analysis of the integrated behavior of lunar transportation and lunar surface systems architecture options is performed to assess the benefit, viability, affordability, and robustness of system design choices. This analysis employs both deterministic and probabilistic modeling techniques so that the extent of potential future uncertainties associated with each option are properly characterized. The results of these analyses are summarized in a predefined set of high-level Figures of Merit (FOMs) so as to provide senior NASA Constellation Program (CxP) and Exploration Systems Mission Directorate (ESMD) management with pertinent information to better inform strategic level decision making. The strategic level exploration architecture model is designed to perform analysis at as high a level as possible but still capture those details that have major impacts on system performance. The strategic analysis methodology focuses on integrated performance, affordability, and risk analysis, and captures the linkages and feedbacks between these three areas. Each of these results leads into the determination of the high-level FOMs. This strategic level analysis methodology has been previously applied to Space Shuttle and International Space Station assessments and is now being applied to the development of the Constellation Program point-of-departure lunar architecture. This paper provides an overview of the strategic analysis methodology and the lunar exploration architecture analyses to date. In studying these analysis results, the strategic analysis team has identified and characterized key drivers affecting the integrated architecture behavior. These key drivers include inclusion of a cargo lander, mission rate, mission location, fixed-versus- variable costs/return on investment, and the requirement for probabilistic analysis. Results of sensitivity analysis performed on lunar exploration architecture scenarios are also presented.
Implications of Contingency Planning Support for Weather and Icing Information
NASA Technical Reports Server (NTRS)
Vigeant-Langlois, Laurence; Hansman, R. John, Jr.
2003-01-01
A human-centered systems analysis was applied to the adverse aircraft weather encounter problem in order to identify desirable functions of weather and icing information. The importance of contingency planning was identified as emerging from a system safety design methodology as well as from results of other aviation decision-making studies. The relationship between contingency planning support and information on regions clear of adverse weather was investigated in a scenario- based analysis. A rapid prototype example of the key elements in the depiction of icing conditions was developed in a case study, and the implications for the components of the icing information system were articulated.
Requirements Analysis is Key to Realizing Increased Value from Remote Sensing
NASA Technical Reports Server (NTRS)
Ryan, Robert; Alexander, Timothy M.
2001-01-01
This note explores requirements analysis - one of the critical and very often overlooked activities that enable satellites to measure what is important and to translate observations into effective and affordable information. Recent experience at the Stennis Space Center is used to illuminate some approaches for improving requirements practice.
Performance analysis of quantum access network using code division multiple access model
NASA Astrophysics Data System (ADS)
Hu, Linxi; Yang, Can; He, Guangqiang
2017-06-01
Not Available Project supported by the National Natural Science Foundation of China (Grant Nos. 61475099 and 61102053), the Program of State Key Laboratory of Quantum Optics and Quantum Optics Devices (Grant No. KF201405), the Open Fund of IPOC (BUPT) (Grant No. IPOC2015B004), and the Program of State Key Laboratory of Information Security (Grant No. 2016-MS-05).
Xu, Xin; Zhu, Ping; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua; He, Lian
2014-01-01
In the field of the Telecare Medicine Information System, recent researches have focused on consummating more convenient and secure healthcare delivery services for patients. In order to protect the sensitive information, various attempts such as access control have been proposed to safeguard patients' privacy in this system. However, these schemes suffered from some certain security defects and had costly consumption, which were not suitable for the telecare medicine information system. In this paper, based on the elliptic curve cryptography, we propose a secure and efficient two-factor mutual authentication and key agreement scheme to reduce the computational cost. Such a scheme enables to provide the patient anonymity by employing the dynamic identity. Compared with other related protocols, the security analysis and performance evaluation show that our scheme overcomes some well-known attacks and has a better performance in the telecare medicine information system.
Social accountability and nursing education in South Africa.
Armstrong, Susan J; Rispel, Laetitia C
2015-01-01
There is global emphasis on transforming health workforce education in support of universal health coverage. This paper uses a social accountability framework, specifically the World Health Organization's six building blocks for transformative education, to explore key informants' perspectives on nursing education in South Africa. Using a snowballing sampling technique, 44 key informants were selected purposively on the basis of their expertise or knowledge of the research area. Semi-structured interviews were conducted with the key informants after informed consent had been obtained. The interviews were analysed using template analysis. South Africa has strategic plans on human resources for health and nursing education, training, and practice and has a well-established system of regulation and accreditation of nursing education through the South African Nursing Council (SANC). Key informants criticised the following: the lack of national staffing norms; sub-optimal governance by both the SANC and the Department of Health; outdated curricula that are unresponsive to population and health system needs; lack of preparedness of nurse educators; and the unsuitability of the majority of nursing students. These problems are exacerbated by a perceived lack of prioritisation of nursing, resource constraints in both the nursing education institutions and the health training facilities, and general implementation inertia. Social accountability, which is an essential component of transformative education, necessitates that attention be paid to the issues of governance, responsive curricula, educator preparedness, and appropriate student recruitment and selection.
Key features of an EU health information system: a concept mapping study.
Rosenkötter, Nicole; Achterberg, Peter W; van Bon-Martens, Marja J H; Michelsen, Kai; van Oers, Hans A M; Brand, Helmut
2016-02-01
Despite the acknowledged value of an EU health information system (EU-HISys) and the many achievements in this field, the landscape is still heavily fragmented and incomplete. Through a systematic analysis of the opinions and valuations of public health stakeholders, this study aims to conceptualize key features of an EU-HISys. Public health professionals and policymakers were invited to participate in a concept mapping procedure. First, participants (N = 34) formulated statements that reflected their vision of an EU-HISys. Second, participants (N = 28) rated the relative importance of each statement and grouped conceptually similar ones. Principal Component and cluster analyses were used to condense these results to EU-HISys key features in a concept map. The number of key features and the labelling of the concept map were determined by expert consensus. The concept map contains 10 key features that summarize 93 statements. The map consists of a horizontal axis that represents the relevance of an 'organizational strategy', which deals with the 'efforts' to design and develop an EU-HISys and the 'achievements' gained by a functioning EU-HISys. The vertical axis represents the 'professional orientation' of the EU-HISys, ranging from the 'scientific' through to the 'policy' perspective. The top ranking statement expressed the need to establish a system that is permanent and sustainable. The top ranking key feature focuses on data and information quality. This study provides insights into key features of an EU-HISys. The results can be used to guide future planning and to support the development of a health information system for Europe. © The Author 2015. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.
Mello, Michelle M; Abiola, Sara; Colgrove, James
2012-05-01
We sought to investigate roles that Merck & Co Inc played in state human papillomavirus (HPV) immunization policymaking, to elicit key stakeholders' perceptions of the appropriateness of these activities, and to explore implications for relationships between health policymakers and industry. We used a series of state case studies combining data from key informant interviews with analysis of media reports and archival materials. We interviewed 73 key informants in 6 states that were actively engaged in HPV vaccine policy deliberations. Merck promoted school-entry mandate legislation by serving as an information resource, lobbying legislators, drafting legislation, mobilizing female legislators and physician organizations, conducting consumer marketing campaigns, and filling gaps in access to the vaccine. Legislators relied heavily on Merck for scientific information. Most stakeholders found lobbying by vaccine manufacturers acceptable in principle, but perceived that Merck had acted too aggressively and nontransparently in this case. Although policymakers acknowledge the utility of manufacturers' involvement in vaccination policymaking, industry lobbying that is overly aggressive, not fully transparent, or not divorced from financial contributions to lawmakers risks undermining the prospects for legislation to foster uptake of new vaccines.
Tire Crumb Research Study Literature Review / Gap ...
In order to more fully understand data gaps in human exposure and toxicity to tire crumb materials, ATSDR, CPSC and EPA undertook a collaborative effort in the form of a scientific literature review and subsequent gaps analysis. The first objective of the Literature Review and Gap Analysis (LRGA) collaboration was to identify the existing body of literature related specifically to human exposure to tire crumb materials through the use of synthetic turf athletic fields and playgrounds. The second objective was to characterize and summarize the relevant data from the scientific literature. The final objective was to review the summary information and identify data gaps to build on the current understanding of the state-of-the-science and inform the development of specific research efforts that would be most impactful in the near-term. Because of the need for additional information, the U.S. Environmental Protection Agency (EPA), the Centers for Disease Control and Prevention/Agency for Toxic Substances and Disease Registry (ATSDR), and the U.S. Consumer Product Safety Commission (CPSC) launched a multi-agency action plan to study key environmental human health questions. The Federal Research Action Plan includes numerous activities, including research studies (U.S. EPA, 2016). A key objective of the Action Plan is to identify key knowledge gaps.
Identifying Key Hospital Service Quality Factors in Online Health Communities
Jung, Yuchul; Hur, Cinyoung; Jung, Dain
2015-01-01
Background The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. Objective As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. Methods We defined social media–based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea’s two biggest online portals were used to test the effectiveness of detection of social media–based key quality factors for hospitals. Results To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is 78% on average. Extraction and classification performance still has room for improvement, but the extraction results are applicable to more detailed analysis. Further analysis of the extracted information reveals that there are differences in the details of social media–based key quality factors for hospitals according to the regions in Korea, and the patterns of change seem to accurately reflect social events (eg, influenza epidemics). Conclusions These findings could be used to provide timely information to caregivers, hospital officials, and medical officials for health care policies. PMID:25855612
Rössler, Bernhard; Lahner, Daniel; Schebesta, Karl; Chiari, Astrid; Plöchl, Walter
2012-07-01
The Internet has become the largest, most up-to-date source for medical information. Besides enhancing patients' knowledge, the freely accessible audio-visual files have an impact on medical education. However little is known about their characteristics. In this manuscript the quality of lumbar puncture (LP) and spinal anaesthesia (SA) videos available on YouTube is assessed. This retrospective analysis was based on a search for LP and SA on YouTube. Videos were evaluated using essential key points (5 in SA, 4 in LP) and 3 safety indicators. Furthermore, violation of sterile working techniques and a rating whether the video must be regarded as dangerously misleading was performed. From 2321 hits matching the keywords, 38 videos were eligible for evaluation. In LP videos, 14% contained information on all, 4.5% on 3 and 4.5% on 2 key points, 59% on 1 and 18% on no key point. Regarding SA, no video contained information on all 5 key points, 56% on 2-4 and 25% on 1 key point, 19% did not contain any essential information. A sterility violation occurred in 11%, and 13% were classified as dangerously misleading. Even though high quality videos are available, the quality of video clips is generally low. The fraction of videos that were not performed in an aseptic manner is low, but these pose a substantial risk to patients. Consequently, more high-quality, institutional medical learning videos must be made available in the light of the increased utilization on the Internet. Copyright © 2012 Elsevier B.V. All rights reserved.
Information processing and dynamics in minimally cognitive agents.
Beer, Randall D; Williams, Paul L
2015-01-01
There has been considerable debate in the literature about the relative merits of information processing versus dynamical approaches to understanding cognitive processes. In this article, we explore the relationship between these two styles of explanation using a model agent evolved to solve a relational categorization task. Specifically, we separately analyze the operation of this agent using the mathematical tools of information theory and dynamical systems theory. Information-theoretic analysis reveals how task-relevant information flows through the system to be combined into a categorization decision. Dynamical analysis reveals the key geometrical and temporal interrelationships underlying the categorization decision. Finally, we propose a framework for directly relating these two different styles of explanation and discuss the possible implications of our analysis for some of the ongoing debates in cognitive science. Copyright © 2014 Cognitive Science Society, Inc.
A Holistic Approach to Networked Information Systems Design and Analysis
2016-04-15
attain quite substantial savings. 11. Optimal algorithms for energy harvesting in wireless networks. We use a Markov- decision-process (MDP) based...approach to obtain optimal policies for transmissions . The key advantage of our approach is that it holistically considers information and energy in a...Coding technique to minimize delays and the number of transmissions in Wireless Systems. As we approach an era of ubiquitous computing with information
Weir, Charlene R; Nebeker, Jonathan J R; Hicken, Bret L; Campo, Rebecca; Drews, Frank; Lebar, Beth
2007-01-01
Computerized Provider Order Entry (CPOE) with electronic documentation, and computerized decision support dramatically changes the information environment of the practicing clinician. Prior work patterns based on paper, verbal exchange, and manual methods are replaced with automated, computerized, and potentially less flexible systems. The objective of this study is to explore the information management strategies that clinicians use in the process of adapting to a CPOE system using cognitive task analysis techniques. Observation and semi-structured interviews were conducted with 88 primary-care clinicians at 10 Veterans Administration Medical Centers. Interviews were taped, transcribed, and extensively analyzed to identify key information management goals, strategies, and tasks. Tasks were aggregated into groups, common components across tasks were clarified, and underlying goals and strategies identified. Nearly half of the identified tasks were not fully supported by the available technology. Six core components of tasks were identified. Four meta-cognitive information management goals emerged: 1) Relevance Screening; 2) Ensuring Accuracy; 3) Minimizing memory load; and 4) Negotiating Responsibility. Strategies used to support these goals are presented. Users develop a wide array of information management strategies that allow them to successfully adapt to new technology. Supporting the ability of users to develop adaptive strategies to support meta-cognitive goals is a key component of a successful system.
Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin
2015-10-14
Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate.
Decision Trajectories in Dementia Care Networks: Decisions and Related Key Events.
Groen-van de Ven, Leontine; Smits, Carolien; Oldewarris, Karen; Span, Marijke; Jukema, Jan; Eefsting, Jan; Vernooij-Dassen, Myrra
2017-10-01
This prospective multiperspective study provides insight into the decision trajectories of people with dementia by studying the decisions made and related key events. This study includes three waves of interviews, conducted between July 2010 and July 2012, with 113 purposefully selected respondents (people with beginning to advanced stages of dementia and their informal and professional caregivers) completed in 12 months (285 interviews). Our multilayered qualitative analysis consists of content analysis, timeline methods, and constant comparison. Four decision themes emerged-managing daily life, arranging support, community living, and preparing for the future. Eight key events delineate the decision trajectories of people with dementia. Decisions and key events differ between people with dementia living alone and living with a caregiver. Our study clarifies that decisions relate not only to the disease but to living with the dementia. Individual differences in decision content and sequence may effect shared decision-making and advance care planning.
Analysis of a librarian-mediated literature search service.
Friesen, Carol; Lê, Mê-Linh; Cooke, Carol; Raynard, Melissa
2015-01-01
Librarian-mediated literature searching is a key service provided at medical libraries. This analysis outlines ten years of data on 19,248 literature searches and describes information on the volume and frequency of search requests, time spent per search, databases used, and professional designations of the patron requestors. Combined with information on best practices for expert searching and evaluations of similar services, these findings were used to form recommendations on the improvement and standardization of a literature search service at a large health library system.
ERIC Educational Resources Information Center
Bollinger, Sarah; Kreuter, Matthew W.
2012-01-01
In a randomized experiment using moment-to-moment audience analysis methods, we compared women's emotional responses with a narrative versus informational breast cancer video. Both videos communicated three key messages about breast cancer: (i) understand your breast cancer risk, (ii) talk openly about breast cancer and (iii) get regular…
ERIC Educational Resources Information Center
Kashima, Simone; de Castro, Fabiola Attie; de Castro Amarante, Maria Fernanda; Barbieri, Marisa Ramos; Covas, Dimas Tadeu
2008-01-01
Considering the fact that information on HIV/AIDS is a strategy for disease control, this project was planned to provide comprehensive information about HIV infection and AIDS to schoolteachers and their students. Previous analysis of adolescent students' knowledge of HIV/AIDS showed that they still have doubts about transmission, diagnosis, and…
Moat, K A; Abelson, J
2011-12-01
During the 2001 election campaign, President Yoweri Museveni announced he was abolishing user fees for health services in Uganda. No analysis has been carried out to explain how he was able to initiate such an important policy decision without encountering any immediate barriers. To explain this outcome through in-depth policy analysis driven by the application of key analytical frameworks. An explanatory case study informed by analytical frameworks from the institutionalism literature was undertaken. Multiple data sources were used including: academic literature, key government documents, grey literature, and a variety of print media. According to the analytical frameworks employed, several formal institutional constraints existed that would have reduced the prospects for the abolition of user fees. However, prevalent informal institutions such as "Big Man" presidentialism and clientelism that were both 'competing' and 'complementary' can be used to explain the policy outcome. The analysis suggests that these factors trumped the impact of more formal institutional structures in the Ugandan context. Consideration should be given to the interactions between formal and informal institutions in the analysis of health policy processes in Uganda, as they provide a more nuanced understanding of how each set of factors influence policy outcomes.
Ares-I-X Stability and Control Flight Test: Analysis and Plans
NASA Technical Reports Server (NTRS)
Brandon, Jay M.; Derry, Stephen D.; Heim, Eugene H.; Hueschen, Richard M.; Bacon, Barton J.
2008-01-01
The flight test of the Ares I-X vehicle provides a unique opportunity to reduce risk of the design of the Ares I vehicle and test out design, math modeling, and analysis methods. One of the key features of the Ares I design is the significant static aerodynamic instability coupled with the relatively flexible vehicle - potentially resulting in a challenging controls problem to provide adequate flight path performance while also providing adequate structural mode damping and preventing adverse control coupling to the flexible structural modes. Another challenge is to obtain enough data from the single flight to be able to conduct analysis showing the effectiveness of the controls solutions and have data to inform design decisions for Ares I. This paper will outline the modeling approaches and control system design to conduct this flight test, and also the system identification techniques developed to extract key information such as control system performance (gain/phase margins, for example), structural dynamics responses, and aerodynamic model estimations.
Chen, Stephanie C; Kim, Scott Y H
2016-01-01
Background/Aims Standard of care pragmatic clinical trials (SCPCTs) that compare treatments already in use could improve care and reduce cost but there is considerable debate about the research risks of SCPCTs and how to apply informed consent regulations to such trials. We sought to develop a framework integrating the insights from opposing sides of the debate. Methods We developed a formal risk-benefit analysis framework for SCPCTs and then applied it to key provisions of the U.S. federal regulations. Results Our formal framework for SCPCT risk-benefit analysis takes into account three key considerations: the ex ante estimates of risks and benefits of the treatments to be compared in a SCPCT, the allocation ratios of treatments inside and outside a SCPCT, and the significance of some participants receiving a different treatment inside a SCPCT than outside the trial. The framework provides practical guidance on how the research ethics regulations on informed consent should be applied to SCPCTs. Conclusions Our proposed formal model makes explicit the relationship between the concepts used by opposing sides of the debate about the research risks of SCPCTs and can be used to clarify the implications for informed consent. PMID:27365010
Operating Reserves and Wind Power Integration: An International Comparison; Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Milligan, M.; Donohoo, P.; Lew, D.
2010-10-01
This paper provides a high-level international comparison of methods and key results from both operating practice and integration analysis, based on an informal International Energy Agency Task 25: Large-scale Wind Integration.
75 FR 14140 - Federal Advisory Committee; Defense Business Board (DBB); Open Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-24
... Information Gap,'' (4) ``Global Economic Crisis: Effects on Key Allies' Defense Spending and Implications to... from four Task Groups: (1) ``Financial and Strategic Analysis to the Department of Defense (DoD...
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei
2016-05-01
This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.
Mirzoev, Tolib; Kane, Sumit
2018-01-01
Information from patient complaints - a widely accepted measure of patient satisfaction with services - can inform improvements in service quality, and contribute towards overall health systems performance. While analyses of data from patient complaints received much emphasis, there is limited published literature on key interventions to improve complaint management systems. The objectives are two-fold: first, to synthesise existing evidence and provide practical options to inform future policy and practice and, second, to identify key outstanding gaps in the existing literature to inform agenda for future research. We report results of review of the existing literature. Peer-reviewed published literature was searched in OVID Medline, OVID Global Health and PubMed. In addition, relevant citations from the reviewed articles were followed up, and we also report grey literature from the UK and the Netherlands. Effective interventions can improve collection of complaints (e.g. establishing easy-to-use channels and raising patients' awareness of these), analysis of complaint data (e.g. creating structures and spaces for analysis and learning from complaints data), and subsequent action (e.g. timely feedback to complainants and integrating learning from complaints into service quality improvement). No one single measure can be sufficient, and any intervention to improve patient complaint management system must include different components, which need to be feasible, effective, scalable, and sustainable within local context. Effective interventions to strengthen patient complaints systems need to be: comprehensive, integrated within existing systems, context-specific and cognizant of the information asymmetry and the unequal power relations between the key actors. Four gaps in the published literature represent an agenda for future research: limited understanding of contexts of effective interventions, absence of system-wide approaches, lack of evidence from low- and middle-income countries and absence of focused empirical assessments of behaviour of staff who manage patient complaints.
2018-01-01
ABSTRACT Background: Information from patient complaints – a widely accepted measure of patient satisfaction with services – can inform improvements in service quality, and contribute towards overall health systems performance. While analyses of data from patient complaints received much emphasis, there is limited published literature on key interventions to improve complaint management systems. Objectives: The objectives are two-fold: first, to synthesise existing evidence and provide practical options to inform future policy and practice and, second, to identify key outstanding gaps in the existing literature to inform agenda for future research. Methods: We report results of review of the existing literature. Peer-reviewed published literature was searched in OVID Medline, OVID Global Health and PubMed. In addition, relevant citations from the reviewed articles were followed up, and we also report grey literature from the UK and the Netherlands. Results: Effective interventions can improve collection of complaints (e.g. establishing easy-to-use channels and raising patients’ awareness of these), analysis of complaint data (e.g. creating structures and spaces for analysis and learning from complaints data), and subsequent action (e.g. timely feedback to complainants and integrating learning from complaints into service quality improvement). No one single measure can be sufficient, and any intervention to improve patient complaint management system must include different components, which need to be feasible, effective, scalable, and sustainable within local context. Conclusions: Effective interventions to strengthen patient complaints systems need to be: comprehensive, integrated within existing systems, context-specific and cognizant of the information asymmetry and the unequal power relations between the key actors. Four gaps in the published literature represent an agenda for future research: limited understanding of contexts of effective interventions, absence of system-wide approaches, lack of evidence from low- and middle-income countries and absence of focused empirical assessments of behaviour of staff who manage patient complaints. PMID:29658393
An Analysis of Risk and Function Information in Early Stage Design
NASA Technical Reports Server (NTRS)
Barrientos, Francesca; Tumer, Irem; Grantham, Katie; VanWie, Michael; Stone, Robert
2005-01-01
The concept of function offers a high potential for thinking and reasoning about designs as well as providing a common thread for relating together other design information. This paper focuses specifically on the relation between function and risk by examining how this information is addressed for a design team conducting early stage design for space missions. Risk information is decomposed into a set of key attributes which are then used to scrutinize the risk information using three approaches from the pragmatics sub-field of linguistics: i) Gricean, ii) Relevance Theory, and Functional Analysis. Results of this linguistics-based approach descriptively account for the context of designer communication with respect to function and risk, and offer prescriptive guidelines for improving designer communication.
NASA Astrophysics Data System (ADS)
Sasaki, Toshihiko; Koashi, Masato
2017-06-01
The round-robin differential phase shift (RRDPS) quantum key distribution (QKD) protocol is a unique QKD protocol whose security has not been understood through an information-disturbance trade-off relation, and a sufficient amount of privacy amplification was given independently of signal disturbance. Here, we discuss the security of the RRDPS protocol in the asymptotic regime when a good estimate of the bit error rate is available as a measure of signal disturbance. The uniqueness of the RRDPS protocol shows up as a peculiar form of information-disturbance trade-off curve. When the length of a block of pulses used for encoding and the signal disturbance are both small, it provides a significantly better key rate than that from the original security proof. On the other hand, when the block length is large, the use of the signal disturbance makes little improvement in the key rate. Our analysis will bridge a gap between the RRDPS protocol and the conventional QKD protocols.
Towards an automated intelligence product generation capability
NASA Astrophysics Data System (ADS)
Smith, Alison M.; Hawes, Timothy W.; Nolan, James J.
2015-05-01
Creating intelligence information products is a time consuming and difficult process for analysts faced with identifying key pieces of information relevant to a complex set of information requirements. Complicating matters, these key pieces of information exist in multiple modalities scattered across data stores, buried in huge volumes of data. This results in the current predicament analysts find themselves; information retrieval and management consumes huge amounts of time that could be better spent performing analysis. The persistent growth in data accumulation rates will only increase the amount of time spent on these tasks without a significant advance in automated solutions for information product generation. We present a product generation tool, Automated PrOduct Generation and Enrichment (APOGEE), which aims to automate the information product creation process in order to shift the bulk of the analysts' effort from data discovery and management to analysis. APOGEE discovers relevant text, imagery, video, and audio for inclusion in information products using semantic and statistical models of unstructured content. APOGEEs mixed-initiative interface, supported by highly responsive backend mechanisms, allows analysts to dynamically control the product generation process ensuring a maximally relevant result. The combination of these capabilities results in significant reductions in the time it takes analysts to produce information products while helping to increase the overall coverage. Through evaluation with a domain expert, APOGEE has been shown the potential to cut down the time for product generation by 20x. The result is a flexible end-to-end system that can be rapidly deployed in new operational settings.
Using Future Trends to Inform Planning/Marketing.
ERIC Educational Resources Information Center
Nichols, John V.
1995-01-01
Explores the reasons for incorporating trend analysis of librarianship into library planning and marketing. Key financial and technological issues are reviewed, and the techniques of environmental scanning and alternative scenario-building to incorporate future trends are discussed. (AEF)
NASA Astrophysics Data System (ADS)
Pu, Yang; Sordillo, Laura A.; Alfano, Robert R.
2015-03-01
Native fluorescence spectroscopy offers an important role in cancer discrimination. It is widely acknowledged that the emission spectrum of tissue is a superposition of spectra of various salient fluorophores. In this study, the native fluorescence spectra of human cancerous and normal breast tissues excited by selected wavelength of 300 nm are used to investigate the key building block fluorophores: tryptophan and reduced nicotinamide adenine dinucleotide (NADH). The basis spectra of these key fluorophores' contribution to the tissue emission spectra are obtained by nonnegative constraint analysis. The emission spectra of human cancerous and normal tissue samples are projected onto the fluorophore spectral subspace. Since previous studies indicate that tryptophan and NADH are key fluorophores related with tumor evolution, it is essential to obtain their information from tissue fluorescence but discard the redundancy. To evaluate the efficacy of for cancer detection, linear discriminant analysis (LDA) classifier is used to evaluate the sensitivity, and specificity. This research demonstrates that the native fluorescence spectroscopy measurements are effective to detect changes of fluorophores' compositions in tissues due to the development of cancer.
Heinrich, S; Laporte Uribe, F; Roes, M; Hoffmann, W; Thyrian, J R; Wolf-Ostermann, K; Holle, B
2016-02-01
Stakeholders involved in community dementia support services often work on their own and without coordination with other services. These circumstances can result in a lack of information and support for people with dementia and their family caregivers at home. To increase the coordination between existing support services, so-called 'Dementia Care Networks' (DCNs) have been established. Most of the tasks that are performed in DCNs are based on communication strategies. Therefore, knowledge management (KM) is a key process in these networks. However, few studies have focused on this topic. This study attempted to evaluate KM strategies in DCNs across Germany as part of the DemNet-D study. A qualitative interview study design was used. Qualitative data were collected during single and group interviews with key persons associated with thirteen DCNs. Interviews were audiotaped and transcribed, and a structured content analysis was conducted. The framework for the analysis was derived from a KM model. Information dissemination strategies for people with dementia and their informal caregivers based on actively established contacts appear to be more successful than passive strategies. General practitioners often play a key role as external gatekeepers in initiating contact between a network and a person affected by dementia. In this context, case managers can help integrate external stakeholders, such as general practitioners or pharmacists, into DCNs using different KM strategies. The systematic development of common objectives under an agency-neutral leadership seems to be an important aspect of successful KM within DCNs. The findings reported here can help DCNs optimize their KM strategies for generating tailored information and support services for people with dementia living at home and their family caregivers. In particular, the identified potential knowledge distribution barriers and facilitators will be of practical use to DCN stakeholders. Copyright © 2015 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
"ATLAS" Advanced Technology Life-cycle Analysis System
NASA Technical Reports Server (NTRS)
Lollar, Louis F.; Mankins, John C.; ONeil, Daniel A.
2004-01-01
Making good decisions concerning research and development portfolios-and concerning the best systems concepts to pursue - as early as possible in the life cycle of advanced technologies is a key goal of R&D management This goal depends upon the effective integration of information from a wide variety of sources as well as focused, high-level analyses intended to inform such decisions Life-cycle Analysis System (ATLAS) methodology and tool kit. ATLAS encompasses a wide range of methods and tools. A key foundation for ATLAS is the NASA-created Technology Readiness. The toolkit is largely spreadsheet based (as of August 2003). This product is being funded by the Human and Robotics The presentation provides a summary of the Advanced Technology Level (TRL) systems Technology Program Office, Office of Exploration Systems, NASA Headquarters, Washington D.C. and is being integrated by Dan O Neil of the Advanced Projects Office, NASA/MSFC, Huntsville, AL
Neutrality and Robustness in Evo-Devo: Emergence of Lateral Inhibition
Munteanu, Andreea; Solé, Ricard V.
2008-01-01
Embryonic development is defined by the hierarchical dynamical process that translates genetic information (genotype) into a spatial gene expression pattern (phenotype) providing the positional information for the correct unfolding of the organism. The nature and evolutionary implications of genotype–phenotype mapping still remain key topics in evolutionary developmental biology (evo-devo). We have explored here issues of neutrality, robustness, and diversity in evo-devo by means of a simple model of gene regulatory networks. The small size of the system allowed an exhaustive analysis of the entire fitness landscape and the extent of its neutrality. This analysis shows that evolution leads to a class of robust genetic networks with an expression pattern characteristic of lateral inhibition. This class is a repertoire of distinct implementations of this key developmental process, the diversity of which provides valuable clues about its underlying causal principles. PMID:19023404
Translations on USSR Science and Technology. Physical Sciences and Technology, No. 6
1977-02-01
Key Words and Document Analysis . USSR Aeronautics Astronomy Astrophysics Atmospheric Sciences Chemistry Computers Cybernetics Earth...publications include the Bulletin of Technoeconomic Information, the handbook Leading Experience in Agricultural Production, the abstract review...efficiency data of the activities of the information service of the Krivorog Metallurgical Plant imeni V. I. Lenin, obtained from the VDNKh (Exhibition of
Dynamics of social contagions with memory of nonredundant information
NASA Astrophysics Data System (ADS)
Wang, Wei; Tang, Ming; Zhang, Hai-Feng; Lai, Ying-Cheng
2015-07-01
A key ingredient in social contagion dynamics is reinforcement, as adopting a certain social behavior requires verification of its credibility and legitimacy. Memory of nonredundant information plays an important role in reinforcement, which so far has eluded theoretical analysis. We first propose a general social contagion model with reinforcement derived from nonredundant information memory. Then, we develop a unified edge-based compartmental theory to analyze this model, and a remarkable agreement with numerics is obtained on some specific models. We use a spreading threshold model as a specific example to understand the memory effect, in which each individual adopts a social behavior only when the cumulative pieces of information that the individual received from his or her neighbors exceeds an adoption threshold. Through analysis and numerical simulations, we find that the memory characteristic markedly affects the dynamics as quantified by the final adoption size. Strikingly, we uncover a transition phenomenon in which the dependence of the final adoption size on some key parameters, such as the transmission probability, can change from being discontinuous to being continuous. The transition can be triggered by proper parameters and structural perturbations to the system, such as decreasing individuals' adoption threshold, increasing initial seed size, or enhancing the network heterogeneity.
Mazza, Monica; Mariano, Melania; Peretti, Sara; Masedu, Francesco; Pino, Maria Chiara; Valenti, Marco
2017-05-01
Individuals with autism spectrum disorders (ASD) show significant impairments in social skills and theory of mind (ToM). The aim of this study was to evaluate ToM and social information processing abilities in 52 children with ASD compared to 55 typically developing (TD) children. A mediation analysis evaluated whether social information processing abilities can be mediated by ToM competences. In our results, children with autism showed a deficit in social skills and ToM components. The innovative results of our study applying mediation analysis demonstrate that ToM plays a key role in the development of social abilities, and the lack of ToM competences in children with autism impairs their competent social behavior.
Key management schemes using routing information frames in secure wireless sensor networks
NASA Astrophysics Data System (ADS)
Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.
2017-01-01
The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.
Kim, Jinyoung
2017-12-01
As it becomes common for Internet users to use hashtags when posting and searching information on social media, it is important to understand who builds a hashtag network and how information is circulated within the network. This article focused on unlocking the potential of the #AlphaGo hashtag network by addressing the following questions. First, the current study examined whether traditional opinion leadership (i.e., the influentials hypothesis) or grassroot participation by the public (i.e., the interpersonal hypothesis) drove dissemination of information in the hashtag network. Second, several unique patterns of information distribution by key users were identified. Finally, the association between attributes of key users who exerted great influence on information distribution (i.e., the number of followers and follows) and their central status in the network was tested. To answer the proffered research questions, a social network analysis was conducted using a large-scale hashtag network data set from Twitter (n = 21,870). The results showed that the leading actors in the network were actively receiving information from their followers rather than serving as intermediaries between the original information sources and the public. Moreover, the leading actors played several roles (i.e., conversation starters, influencers, and active engagers) in the network. Furthermore, the number of their follows and followers were significantly associated with their central status in the hashtag network. Based on the results, the current research explained how the information was exchanged in the hashtag network by proposing the reciprocal model of information flow.
Hayter, Mark
2007-05-01
This paper is a report of an analysis of the discourse about contraceptive efficacy and side effects used by nurses when prescribing contraception. All women seeking contraception should be informed of the efficacy and potential adverse effects of the particular method they are considering. This information facilitates an informed choice. Women also require this information in order to monitor for any side effects. Paradoxically, side effects are also a key factor in reducing adherence with contraceptive regimens. However, there is no literature that explores specifically how this issue is addressed in clinical consultations, or places these practices in a theoretical context. Forty-nine consultations between nurses and women in sexual health clinics were audio-recorded during 2002. Data were subject to a discourse analysis using Foucault's 'procedures of exclusion' to explore the discursive construction of contraceptive efficacy and side effects The nurses employed specific discursive strategies when discussing contraception. When addressing efficacy, discourse centred on medico-statistical facts, but side effects were described in lay terms that minimized their severity. Nurses contextualized contraceptive side effects within potential problems that women might experience in pregnancy, and also attempted to 'normalize' contraceptive-related problems. Discourse and its deployment play a key role in practitioner-client relationships that sexual health nurses need to become more aware of how they discuss clinical issues about contraception with women. Clinical data on contraceptive side-effects are present in the literature, and it is important that sexual health nurses use this to help women make truly informed decisions.
An improved scheme on decoy-state method for measurement-device-independent quantum key distribution
Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin
2015-01-01
Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate. PMID:26463580
Preferences of Young Adults Regarding Dissemination of Online Vitamin D Information.
Goodman, Samantha Erin; Sheeshka, Judy
2016-12-01
To explore strategies for disseminating online information about vitamin D to young adults. Participants were 50 males and females aged 18-25 years, living in Ontario, Canada. Eight focus groups (4 male; 4 female) were conducted; participants also completed a socio-demographic questionnaire. Audio files were transcribed verbatim; thematic analysis was used to identify key themes. Thematic analysis revealed that an effective educational intervention geared towards this population should be simple, brief, interesting, personally relevant, credible, and include incentives. Feedback regarding intervention methodology could be used to inform interventions aiming to increase intake of vitamin D or other nutrients among young adults.
Rajamani, Deepa; Bhasin, Manoj K
2016-05-03
Pancreatic cancer is an aggressive cancer with dismal prognosis, urgently necessitating better biomarkers to improve therapeutic options and early diagnosis. Traditional approaches of biomarker detection that consider only one aspect of the biological continuum like gene expression alone are limited in their scope and lack robustness in identifying the key regulators of the disease. We have adopted a multidimensional approach involving the cross-talk between the omics spaces to identify key regulators of disease progression. Multidimensional domain-specific disease signatures were obtained using rank-based meta-analysis of individual omics profiles (mRNA, miRNA, DNA methylation) related to pancreatic ductal adenocarcinoma (PDAC). These domain-specific PDAC signatures were integrated to identify genes that were affected across multiple dimensions of omics space in PDAC (genes under multiple regulatory controls, GMCs). To further pin down the regulators of PDAC pathophysiology, a systems-level network was generated from knowledge-based interaction information applied to the above identified GMCs. Key regulators were identified from the GMC network based on network statistics and their functional importance was validated using gene set enrichment analysis and survival analysis. Rank-based meta-analysis identified 5391 genes, 109 miRNAs and 2081 methylation-sites significantly differentially expressed in PDAC (false discovery rate ≤ 0.05). Bimodal integration of meta-analysis signatures revealed 1150 and 715 genes regulated by miRNAs and methylation, respectively. Further analysis identified 189 altered genes that are commonly regulated by miRNA and methylation, hence considered GMCs. Systems-level analysis of the scale-free GMCs network identified eight potential key regulator hubs, namely E2F3, HMGA2, RASA1, IRS1, NUAK1, ACTN1, SKI and DLL1, associated with important pathways driving cancer progression. Survival analysis on individual key regulators revealed that higher expression of IRS1 and DLL1 and lower expression of HMGA2, ACTN1 and SKI were associated with better survival probabilities. It is evident from the results that our hierarchical systems-level multidimensional analysis approach has been successful in isolating the converging regulatory modules and associated key regulatory molecules that are potential biomarkers for pancreatic cancer progression.
Washington’s forest resources: Forest Inventory and Analysis, 2002–2011
Justin Holgerson; Sharon Stanton; Karen Waddell; Marin Palmer; Olaf Kuegler; Glenn Christensen
2018-01-01
This report highlights key findings from data collected by the Forest Inventory and Analysis program across all forest land in the state of Washington from 2002 through 2011, updating previously published findings from data collected up to 2006. We summarize and interpret basic resource information such as forest area, composition, ownership, volume, biomass, and...
Oregon's forest resources, 2001-2005: five-year Forest Inventory and Analysis report.
Joseph Donnegan; Sally Campbell; Dave Azuma
2008-01-01
This report highlights key findings from the most recent (2001-2005) data collected by the Pacific Northwest Forest Inventory and Analysis (PNW-FIA) Program across all ownerships in Oregon. We present basic resource information such as forest area, land use change, ownership, volume, biomass, and carbon sequestration; structure and function topics such as biodiversity...
Washington’s forest resources, 2002–2006: five-year Forest Inventory and Analysis report
Sally Campbell; Karen Waddell; Andrew Gray
2010-01-01
This report highlights key findings from the most recent (2002-2006) data collected by the Forest Inventory and Analysis Program across all ownerships in Washington. We present basic resource information such as forest area, land use change, ownership, volume, biomass, and carbon sequestration; structure and function topics such as biodiversity, older forests, dead...
California's forest resources, 2001-2005: five-year Forest Inventory and Analysis Report.
Glenn A. Christensen; Sally J. Campbell; Jeremy S. Fried
2008-01-01
This report highlights key findings from the most recent (2001-2005) data collected by the Forest Inventory and Analysis Program across all forest land in California. We summarize and interpret basic resource information such as forest area, ownership, volume, biomass, and carbon stocks; structure and function topics such as biodiversity, forest age, dead wood, and...
California's forest resources: Forest Inventory and Analysis, 2001–2010
Glenn A. Christensen; Karen L. Waddell; Sharon M. Stanton; Olaf Kuegler
2016-01-01
This report highlights key findings from the most recent (2001â2010) data collected by the Forest Inventory and Analysis program across all forest land in California, updating previously published findings from data collected from 2001 through 2005 (Christensen et al. 2008). We summarize and interpret basic resource information such as forest area, ownership, volume,...
Lin, Chao; Shen, Xueju; Li, Baochen
2014-08-25
We demonstrate that all parameters of optical lightwave can be simultaneously designed as keys in security system. This multi-dimensional property of key can significantly enlarge the key space and further enhance the security level of the system. The single-shot off-axis digital holography with orthogonal polarized reference waves is employed to perform polarization state recording on object wave. Two pieces of polarization holograms are calculated and fabricated to be arranged in reference arms to generate random amplitude and phase distribution respectively. When reconstruction, original information which is represented with QR code can be retrieved using Fresnel diffraction with decryption keys and read out noise-free. Numerical simulation results for this cryptosystem are presented. An analysis on the key sensitivity and fault tolerance properties are also provided.
Assessment of the needs of vulnerable youth populations in post-conflict Liberia.
Levey, E J; Borba, C P; Harris, B L; Carney, J R; Dominguez, S; Wang, E K; Boxill, R; Henderson, D C
2013-09-01
The study examined key informants' perceptions of the emotional impact of traumatic events, major problems, functional limitations and appropriate treatment settings for children, adolescents, and young adults in post-conflict Liberia. This research is a based on cross-sectional survey conducted between March 30, 2009 and April 30, 2009 in Liberia with 171 local key Liberian informants. Analysis was conducted using mixed methods. The findings we will report were collected in the qualitative portion of the survey. We found that while different interventions were preferred for different types of young people, some interventions were mentioned for all youth and by all age and gender groups of key informants. These included counseling, education, and skills training. Also frequently chosen were housing, community reintegration, recreation, and medical care. In general, key informants reported similar concerns regardless of their ages or genders. Notable exceptions to this were in interventions for youth who joined fighting forces. Men over 50 were the only ones to recommend apology and reparations. Similarly, in recommendations for criminals and violent youth, a number of men mentioned prison, whereas the women did not. Our findings suggest that the needs of post-conflict Liberian youth span a variety of domains, including physical, emotional, medical, psychological, and educational. These findings can be used to guide the development of treatment programs for these young people.
Malcom, Jacob W; Webber, Whitney M; Li, Ya-Wei
2016-01-01
Managers of large, complex wildlife conservation programs need information on the conservation status of each of many species to help strategically allocate limited resources. Oversimplifying status data, however, runs the risk of missing information essential to strategic allocation. Conservation status consists of two components, the status of threats a species faces and the species' demographic status. Neither component alone is sufficient to characterize conservation status. Here we present a simple key for scoring threat and demographic changes for species using detailed information provided in free-form textual descriptions of conservation status. This key is easy to use (simple), captures the two components of conservation status without the cost of more detailed measures (sufficient), and can be applied by different personnel to any taxon (consistent). To evaluate the key's utility, we performed two analyses. First, we scored the threat and demographic status of 37 species recently recommended for reclassification under the Endangered Species Act (ESA) and 15 control species, then compared our scores to two metrics used for decision-making and reports to Congress. Second, we scored the threat and demographic status of all non-plant ESA-listed species from Florida (54 spp.), and evaluated scoring repeatability for a subset of those. While the metrics reported by the U.S. Fish and Wildlife Service (FWS) are often consistent with our scores in the first analysis, the results highlight two problems with the oversimplified metrics. First, we show that both metrics can mask underlying demographic declines or threat increases; for example, ∼40% of species not recommended for reclassification had changes in threats or demography. Second, we show that neither metric is consistent with either threats or demography alone, but conflates the two. The second analysis illustrates how the scoring key can be applied to a substantial set of species to understand overall patterns of ESA implementation. The scoring repeatability analysis shows promise, but indicates thorough training will be needed to ensure consistency. We propose that large conservation programs adopt our simple scoring system for threats and demography. By doing so, program administrators will have better information to monitor program effectiveness and guide their decisions.
Critical Information Protection on FPGAs through Unique Device Specific Keys
2011-09-01
63 Appendix B ...64 B .1 Analysis of Circuit DNA Entry Changes Across a Large Temperature Range ..... 64 Appendix C...71 x List of Figures Figure 1. (a) An ideal transistor design. ( b ) SEM image of Transistor
Measuring Integration of Cancer Services to Support Performance Improvement: The CSI Survey
Dobrow, Mark J.; Paszat, Lawrence; Golden, Brian; Brown, Adalsteinn D.; Holowaty, Eric; Orchard, Margo C.; Monga, Neerav; Sullivan, Terrence
2009-01-01
Objective: To develop a measure of cancer services integration (CSI) that can inform clinical and administrative decision-makers in their efforts to monitor and improve cancer system performance. Methods: We employed a systematic approach to measurement development, including review of existing cancer/health services integration measures, key-informant interviews and focus groups with cancer system leaders. The research team constructed a Web-based survey that was field- and pilot-tested, refined and then formally conducted on a sample of cancer care providers and administrators in Ontario, Canada. We then conducted exploratory factor analysis to identify key dimensions of CSI. Results: A total of 1,769 physicians, other clinicians and administrators participated in the survey, responding to a 67-item questionnaire. The exploratory factor analysis identified 12 factors that were linked to three broader dimensions: clinical, functional and vertical system integration. Conclusions: The CSI Survey provides important insights on a range of typically unmeasured aspects of the coordination and integration of cancer services, representing a new tool to inform performance improvement efforts. PMID:20676250
Abiola, Sara; Colgrove, James
2012-01-01
Objectives. We sought to investigate roles that Merck & Co Inc played in state human papillomavirus (HPV) immunization policymaking, to elicit key stakeholders’ perceptions of the appropriateness of these activities, and to explore implications for relationships between health policymakers and industry. Methods. We used a series of state case studies combining data from key informant interviews with analysis of media reports and archival materials. We interviewed 73 key informants in 6 states that were actively engaged in HPV vaccine policy deliberations. Results. Merck promoted school-entry mandate legislation by serving as an information resource, lobbying legislators, drafting legislation, mobilizing female legislators and physician organizations, conducting consumer marketing campaigns, and filling gaps in access to the vaccine. Legislators relied heavily on Merck for scientific information. Most stakeholders found lobbying by vaccine manufacturers acceptable in principle, but perceived that Merck had acted too aggressively and nontransparently in this case. Conclusions. Although policymakers acknowledge the utility of manufacturers’ involvement in vaccination policymaking, industry lobbying that is overly aggressive, not fully transparent, or not divorced from financial contributions to lawmakers risks undermining the prospects for legislation to foster uptake of new vaccines. PMID:22420796
Hynes, Denise M; Weddle, Timothy; Smith, Nina; Whittier, Erika; Atkins, David; Francis, Joseph
2010-01-01
As the Department of Veterans Affairs (VA) Health Services Research and Development Service's Quality Enhancement Research Initiative (QUERI) has progressed, health information technology (HIT) has occupied a crucial role in implementation research projects. We evaluated the role of HIT in VA QUERI implementation research, including HIT use and development, the contributions implementation research has made to HIT development, and HIT-related barriers and facilitators to implementation research. Key informants from nine disease-specific QUERI Centers. Documentation analysis of 86 implementation project abstracts followed up by semi-structured interviews with key informants from each of the nine QUERI centers. We used qualitative and descriptive analyses. We found: (1) HIT provided data and information to facilitate implementation research, (2) implementation research helped to further HIT development in a variety of uses including the development of clinical decision support systems (23 of 86 implementation research projects), and (3) common HIT barriers to implementation research existed but could be overcome by collaborations with clinical and administrative leadership. Our review of the implementation research progress in the VA revealed interdependency on an HIT infrastructure and research-based development. Collaboration with multiple stakeholders is a key factor in successful use and development of HIT in implementation research efforts and in advancing evidence-based practice.
Weir, Charlene R.; Nebeker, Jonathan J.R.; Hicken, Bret L.; Campo, Rebecca; Drews, Frank; LeBar, Beth
2007-01-01
Objective Computerized Provider Order Entry (CPOE) with electronic documentation, and computerized decision support dramatically changes the information environment of the practicing clinician. Prior work patterns based on paper, verbal exchange, and manual methods are replaced with automated, computerized, and potentially less flexible systems. The objective of this study is to explore the information management strategies that clinicians use in the process of adapting to a CPOE system using cognitive task analysis techniques. Design Observation and semi-structured interviews were conducted with 88 primary-care clinicians at 10 Veterans Administration Medical Centers. Measurements Interviews were taped, transcribed, and extensively analyzed to identify key information management goals, strategies, and tasks. Tasks were aggregated into groups, common components across tasks were clarified, and underlying goals and strategies identified. Results Nearly half of the identified tasks were not fully supported by the available technology. Six core components of tasks were identified. Four meta-cognitive information management goals emerged: 1) Relevance Screening; 2) Ensuring Accuracy; 3) Minimizing memory load; and 4) Negotiating Responsibility. Strategies used to support these goals are presented. Conclusion Users develop a wide array of information management strategies that allow them to successfully adapt to new technology. Supporting the ability of users to develop adaptive strategies to support meta-cognitive goals is a key component of a successful system. PMID:17068345
Biometrics encryption combining palmprint with two-layer error correction codes
NASA Astrophysics Data System (ADS)
Li, Hengjian; Qiu, Jian; Dong, Jiwen; Feng, Guang
2017-07-01
To bridge the gap between the fuzziness of biometrics and the exactitude of cryptography, based on combining palmprint with two-layer error correction codes, a novel biometrics encryption method is proposed. Firstly, the randomly generated original keys are encoded by convolutional and cyclic two-layer coding. The first layer uses a convolution code to correct burst errors. The second layer uses cyclic code to correct random errors. Then, the palmprint features are extracted from the palmprint images. Next, they are fused together by XORing operation. The information is stored in a smart card. Finally, the original keys extraction process is the information in the smart card XOR the user's palmprint features and then decoded with convolutional and cyclic two-layer code. The experimental results and security analysis show that it can recover the original keys completely. The proposed method is more secure than a single password factor, and has higher accuracy than a single biometric factor.
Dudal, Sherri; Staack, Roland F; Stoellner, Daniela; Fjording, Marianne Scheel; Vieser, Eva; Pascual, Marie-Hélène; Brudny-Kloeppel, Margarete; Golob, Michaela
2014-05-01
The bioanalytical scientist plays a key role in the project team for the drug development of biotherapeutics from the discovery to the marketing phase. Information from the project team members is required for assay development and sample analysis during the discovery, preclinical and clinical phases of the project and input is needed from the bioanalytical scientist to help data interpretation. The European Bioanalysis Forum target team 20 discussed many of the gaps in information and communication between the bioanalytical scientist and project team members as a base for providing a perspective on the bioanalytical scientist's role and interactions within the project team.
AOP: An R Package For Sufficient Causal Analysis in Pathway ...
Summary: How can I quickly find the key events in a pathway that I need to monitor to predict that a/an beneficial/adverse event/outcome will occur? This is a key question when using signaling pathways for drug/chemical screening in pharma-cology, toxicology and risk assessment. By identifying these sufficient causal key events, we have fewer events to monitor for a pathway, thereby decreasing assay costs and time, while maximizing the value of the information. I have developed the “aop” package which uses backdoor analysis of causal net-works to identify these minimal sets of key events that are suf-ficient for making causal predictions. Availability and Implementation: The source and binary are available online through the Bioconductor project (http://www.bioconductor.org/) as an R package titled “aop”. The R/Bioconductor package runs within the R statistical envi-ronment. The package has functions that can take pathways (as directed graphs) formatted as a Cytoscape JSON file as input, or pathways can be represented as directed graphs us-ing the R/Bioconductor “graph” package. The “aop” package has functions that can perform backdoor analysis to identify the minimal set of key events for making causal predictions.Contact: burgoon.lyle@epa.gov This paper describes an R/Bioconductor package that was developed to facilitate the identification of key events within an AOP that are the minimal set of sufficient key events that need to be tested/monit
The next 5 years of global HIV/AIDS policy: critical gaps and strategies for effective responses.
Szekeres, Greg
2008-08-01
The University of California, Los Angeles Program in Global Health performed a landscape analysis based on interviews conducted between November 2006 and February 2007 with 35 key informants from major international organizations conducting HIV/AIDS work. Institutions represented included multilateral organizations, foundations, and governmental and non-governmental organizations. The purpose of this analysis is to assist major foundations and other institutions to understand better the international HIV/AIDS policy landscape and to formulate research and development programmes that can make a significant contribution to moving important issues forward in the HIV/AIDS policy arena. Topics identified during the interviews were organized around the four major themes of the Ford Foundation's Global HIV/AIDS Initiative: leadership and leadership development; equity; accountability; and global partnerships. Key informants focused on the need for a visionary response to the HIV pandemic, the need to maintain momentum, ways to improve the scope of leadership development programmes, ideas for improving gender equity and addressing regional disparities and the needs of vulnerable populations, recommendations for strengthening accountability mechanisms among governments, foundations, and civil society and on calling for increased collaboration and partnership among key players in the global HIV/AIDS response.
Efficient Caption-Based Retrieval of Multimedia Information
1993-10-09
in the design of transportable natural language interfaces. Artifcial Intelligence , 32 (1987), 173-243. - 13- (101 Jones, M. and Eisner, J. A...systems for multimedia data . They exploit captions on the data and perform natural-language processing of them and English retrieval requests. Some...content analysis of the data is also performed to obtain additional descriptive information. The key to getting this approach to work is sufficiently
ERIC Educational Resources Information Center
Ramsey, Terry; And Others
This report presents a process for identifying emerging and significantly evolving occupations within key Texas industries. It explains findings of a research project that provided a current information resource to help job seekers make informed career and training choices. Chapter 1 is an introduction. Chapter 2 examines the projected mismatch…
Approach to spatial information security based on digital certificate
NASA Astrophysics Data System (ADS)
Cong, Shengri; Zhang, Kai; Chen, Baowen
2005-11-01
With the development of the online applications of geographic information systems (GIS) and the spatial information services, the spatial information security becomes more important. This work introduced digital certificates and authorization schemes into GIS to protect the crucial spatial information combining the techniques of the role-based access control (RBAC), the public key infrastructure (PKI) and the privilege management infrastructure (PMI). We investigated the spatial information granularity suited for sensitivity marking and digital certificate model that fits the need of GIS security based on the semantics analysis of spatial information. It implements a secure, flexible, fine-grained data access based on public technologies in GIS in the world.
Mooney, Ryan; Samhouri, Mahasen; Holton, Avery; Devine, Katie A; Kirchhoff, Anne C; Wright, Jennifer; Wu, Yelena P
2017-06-01
To explore adolescent and young adult (AYA) cancer survivors' internet use in seeking healthy lifestyle behavior (HLB) information on diet and exercise. Twenty-five AYA cancer survivors participated in focus groups or interviews. Data were analyzed using qualitative content analysis. Most survivors (92%) sought HLB information from internet sources. Key issues included the following: (1) too much information available, (2) information not meeting survivors' unique needs, and (3) concerns about trustworthiness of information. Although AYA cancer survivors use the internet to seek HLB information, internet resources could be modified to better meet the needs of AYA cancer survivors.
NASA Astrophysics Data System (ADS)
Farouk, Ahmed; Batle, J.; Elhoseny, M.; Naseri, Mosayeb; Lone, Muzaffar; Fedorov, Alex; Alkhambashi, Majid; Ahmed, Syed Hassan; Abdel-Aty, M.
2018-04-01
Quantum communication provides an enormous advantage over its classical counterpart: security of communications based on the very principles of quantum mechanics. Researchers have proposed several approaches for user identity authentication via entanglement. Unfortunately, these protocols fail because an attacker can capture some of the particles in a transmitted sequence and send what is left to the receiver through a quantum channel. Subsequently, the attacker can restore some of the confidential messages, giving rise to the possibility of information leakage. Here we present a new robust General N user authentication protocol based on N-particle Greenberger-Horne-Zeilinger (GHZ) states, which makes eavesdropping detection more effective and secure, as compared to some current authentication protocols. The security analysis of our protocol for various kinds of attacks verifies that it is unconditionally secure, and that an attacker will not obtain any information about the transmitted key. Moreover, as the number of transferred key bits N becomes larger, while the number of users for transmitting the information is increased, the probability of effectively obtaining the transmitted authentication keys is reduced to zero.
Beaulac, Julie; Westmacott, Robin; Walker, John R; Vardanyan, Gohar
2016-06-08
Decisions related to mental health are often complex, problems often remain undetected and untreated, information unavailable or not used, and treatment decisions frequently not informed by best practice or patient preferences. The objective of this paper was to obtain the opinions of health professionals working in primary health care settings about a Web-based information decision aid (IDA) for patients concerning treatment options for depression and the dissemination of the resources in primary care settings. Participants were recruited from primary care clinics in Winnipeg and Ottawa, Canada, and included 48 family physicians, nurses, and primary care staff. The study design was a qualitative framework analytic approach of 5 focus groups. Focus groups were conducted during regular staff meetings, were digitally recorded, and transcripts created. Analysis involved a content and theme analysis. Seven key themes emerged including the key role of the primary care provider, common questions about treatments, treatment barriers, sources of patient information, concern about quality and quantity of available information, positive opinions about the IDA, and disseminating the IDA. The most common questions mentioned were about medication and side effects and alternatives to medication. Patients have limited access to alternative treatment options owing to cost and availability. Practitioners evaluated the IDA positively. The resources were described as useful, supportive of providers' messages, and accessible for patients. There was unanimous consensus that information needs to be available electronically through the Internet.
Health information technology and implementation science: partners in progress in the VHA.
Hynes, Denise M; Whittier, Erika R; Owens, Arika
2013-03-01
The Department of Veterans Affairs (VA) Quality Enhancement Research Initiative (QUERI) has demonstrated how implementation science can enhance the quality of health care. During this time an increasing number of implementation research projects have developed or utilized health information technology (HIT) innovations to leverage the VA's electronic health record and information systems. To describe the HIT approaches used and to characterize the facilitators and barriers to progress within implementation research projects in the VA QUERI program. Nine case studies were selected from among 88 projects and represented 8 of 14 HIT categories identified. Each case study included key informants whose roles on the project were principal investigator, implementation science and informatics development. We conducted documentation analysis and semistructured in-person interviews with key informants for each of the 9 case studies. We used qualitative analysis software to identify and thematically code information and interview responses. : Thematic analyses revealed 3 domains or pathways critical to progression through the QUERI steps. These pathways addressed: (1) compliance and collaboration with information technology policies and procedures; (2) operating within organizational policies and building collaborations with end users, clinicians, and administrators; and (3) obtaining and maintaining research resources and approvals. Sustained efforts in HIT innovation and in implementation science in the Veterans Health Administration demonstrates the interdependencies of these initiatives and the critical pathways that can contribute to progress. Other health care quality improvement efforts that rely on HIT can learn from the Veterans Health Administration experience.
Chapman, Rachel; Smith, Lisa L; Bond, John W
2012-07-01
Car key burglary has recently become the focus of empirical investigation as offenders, no longer able to steal vehicles without first obtaining their keys, resort to "burgling" target properties. Research surrounding the modus operandi of these offenses is beginning to emerge; however, little attention has been paid to investigating the characteristics of car key burglary offenders. Challenging the assumption that car key burglary offenses are perpetrated by regular burglars, this study aims to differentiate between offenders. Logistic regression analysis of 110 car key and 110 regular burglary offenders revealed that car key burglars are more likely to have previous vehicle theft convictions and are also more likely to be detected on information supplied to the police than regular burglars. Regular burglars are more likely to have previous shoplifting convictions. It was concluded that car key burglars are a distinct sample of offenders and the implications of these findings are discussed. © 2012 American Academy of Forensic Sciences.
ERIC Educational Resources Information Center
Sánchez-Sánchez, Nuria; McGuinness, Seamus
2015-01-01
This article assesses the extent to which the impact of overeducation and overskilling on labour market outcomes such as earnings and job satisfaction relate to mismatches in particular competency areas. The analysis uses REFLEX data, which collects information about 19 key competence areas related to job performance. We find that the penalties to…
ERIC Educational Resources Information Center
Peace Corps, 2010
2010-01-01
This idea book addresses key concepts in two earlier Peace Corps' publications, "Participatory Analysis for Community Action (PACA) Manual" [ICE No. M0053], and the "Gender and Development Training Manual" [ICE No. M0054]. These previous resources were large training manuals that introduced PACA to staff and Volunteers in the context of the Peace…
Forest Inventory and Analysis National Data Quality Assessment Report for 2000 to 2003
James E. Pollard; James A. Westfall; Paul L. Patterson; David L. Gartner; Mark Hansen; Olaf Kuegler
2006-01-01
The Forest Inventory and Analysis program (FIA) is the key USDA Forest Service (USFS) program that provides the information needed to assess the status and trends in the environmental quality of the Nation's forests. The goal of the FIA Quality Assurance (QA) program is to provide a framework to assure the production of complete, accurate and unbiased forest...
Mining key elements for severe convection prediction based on CNN
NASA Astrophysics Data System (ADS)
Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng
2017-04-01
Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with the new machine-learning method via CNN models. Based on the analysis of those experimental results and case studies, the proposed new method have below benefits for the severe convection prediction: (1) helping forecasters to narrow down the scope of analysis and saves lead-time for those high-impact severe convection; (2) performing huge amount of weather big data by machine learning methods rather relying on traditional theory and knowledge, which provide new method to explore and quantify the severe convective weathers; (3) providing machine learning based end-to-end analysis and processing ability with considerable scalability on data volumes, and accomplishing the analysis work without human intervention.
An analytical approach to customer requirement information processing
NASA Astrophysics Data System (ADS)
Zhou, Zude; Xiao, Zheng; Liu, Quan; Ai, Qingsong
2013-11-01
'Customer requirements' (CRs) management is a key component of customer relationship management (CRM). By processing customer-focused information, CRs management plays an important role in enterprise systems (ESs). Although two main CRs analysis methods, quality function deployment (QFD) and Kano model, have been applied to many fields by many enterprises in the past several decades, the limitations such as complex processes and operations make them unsuitable for online businesses among small- and medium-sized enterprises (SMEs). Currently, most SMEs do not have the resources to implement QFD or Kano model. In this article, we propose a method named customer requirement information (CRI), which provides a simpler and easier way for SMEs to run CRs analysis. The proposed method analyses CRs from the perspective of information and applies mathematical methods to the analysis process. A detailed description of CRI's acquisition, classification and processing is provided.
Design and implementation of spatial knowledge grid for integrated spatial analysis
NASA Astrophysics Data System (ADS)
Liu, Xiangnan; Guan, Li; Wang, Ping
2006-10-01
Supported by spatial information grid(SIG), the spatial knowledge grid (SKG) for integrated spatial analysis utilizes the middleware technology in constructing the spatial information grid computation environment and spatial information service system, develops spatial entity oriented spatial data organization technology, carries out the profound computation of the spatial structure and spatial process pattern on the basis of Grid GIS infrastructure, spatial data grid and spatial information grid (specialized definition). At the same time, it realizes the complex spatial pattern expression and the spatial function process simulation by taking the spatial intelligent agent as the core to establish space initiative computation. Moreover through the establishment of virtual geographical environment with man-machine interactivity and blending, complex spatial modeling, network cooperation work and spatial community decision knowledge driven are achieved. The framework of SKG is discussed systematically in this paper. Its implement flow and the key technology with examples of overlay analysis are proposed as well.
Comparative analysis of dietary guidelines in the Spanish-Speaking Caribbean.
Fuster, Melissa
2016-03-01
Dietary guidelines are important education and policy tools to address local nutrition concerns. The current paper presents a comparative analysis of nutrition messages from three Spanish-speaking Caribbean countries (Cuba, Puerto Rico and Dominican Republic) to explore how these dietary guidelines address common public health nutrition concerns, contextualized in different changing food environments and food culture similarities. Qualitative, comparative analysis of current dietary guideline documents and key recommendations. Key recommendations were categorized into sixteen themes (two diet-based, ten food-based and four 'other'). Only the Cuban dietary guidelines included diet-based key recommendations. Of the ten food-based key recommendations, only four themes overlapped across the three dietary guidelines (the encouragement of fruits and vegetables, addressing protein sources and fat). Other overlaps were found between dietary guideline pairs, except between Cuba and Puerto Rico. Further analysis revealed differences in levels of specificity and acknowledgement of local dietary patterns and issues, as well as the need to revise the guidelines to account for current scientific advances. The present study underscored the importance of context in the framing of dietary advice and the influence of national socio-economic and political situations on nutrition policy and education efforts. The results contribute to inform efforts to improve nutrition communication in the region and among migrant communities.
Mbachu, Chinyere O; Onwujekwe, Obinna; Chikezie, Ifeanyi; Ezumah, Nkoli; Das, Mahua; Uzochukwu, Benjamin S C
2016-04-12
Evidence-informed policymaking has been promoted as a means of ensuring better outcomes. However, what counts as evidence in policymaking lies within a spectrum of expert knowledge and scientifically generated information. Since not all forms of evidence share an equal validity or weighting for policymakers, it is important to understand the key factors that influence their preferences for different types of evidence in policy and strategy development. A retrospective study was carried out at the national level in Nigeria using a case-study approach to examine the Nigerian Integrated Maternal Newborn and Child Health (IMNCH) strategy. Two frameworks were used for conceptualization and data analysis, namely (1) to analyse the role of evidence in policymaking and (2) the policy triangle. They were used to explore the key contextual and participatory influences on choice of evidence in developing the IMNCH strategy. Data was collected through review of relevant national documents and in-depth interviews of purposively selected key policy and strategic decision makers. Thematic analysis was applied to generate information from collected data. The breadth of evidence used was wide, ranging from expert opinions to systematic reviews. The choice of different types of evidence was found to overlap across actor categories. Key influences over actors' choice of evidence were: (1) perceived robustness of evidence - comprehensive, representative, recent, scientifically sound; (2) roles in evidence process, i.e. their degree and level of participation in evidence generation and dissemination, with regards to their role in the policy process; and (3) contextual factors such as global agenda and influence, timeline for strategy development, availability of resources for evidence generation, and lessons learnt from previous unsuccessful policies/plans. Actors' preferences for different types of evidence for policy are influenced not only by the characteristics of evidence itself, but on actors' roles in the evidence process, their power to influence the policy, and the context in which evidence is used.
Rose, K E
1999-01-01
This article discusses issues relating to information arising from a qualitative study of the experiences of informal carers of terminally ill cancer patients. Qualitative data analysis, drawing on methods of literary criticism, revealed that information was a key area in carers' experience. The findings are presented in the context of needing to provide individualized care to every family and deal with information needs relating to the illness and prognosis. The question of who is in possession of what information is raised, and the effect that this can have on couples is discussed, together with the issue of false information which carers may receive. The discussion centres on the complexity of understanding carers' information needs and considers how these are affected by the context within which carers operate. The work of Glaser and Strauss on awareness contexts is discussed in this respect. Finally, the importance of the nurse's role as a sensitive mediator of information is considered.
Rich Language Analysis for Counterterrorism
NASA Astrophysics Data System (ADS)
Guidère, Mathieu; Howard, Newton; Argamon, Shlomo
Accurate and relevant intelligence is critical for effective counterterrorism. Too much irrelevant information is as bad or worse than not enough information. Modern computational tools promise to provide better search and summarization capabilities to help analysts filter and select relevant and key information. However, to do this task effectively, such tools must have access to levels of meaning beyond the literal. Terrorists operating in context-rich cultures like fundamentalist Islam use messages with multiple levels of interpretation, which are easily misunderstood by non-insiders. This chapter discusses several kinds of such “encryption” used by terrorists and insurgents in the Arabic language, and how knowledge of such methods can be used to enhance computational text analysis techniques for use in counterterrorism.
Support of Herschel Key Programme Teams at the NASA Herschel Science Center
NASA Astrophysics Data System (ADS)
Shupe, David L.; Appleton, P. N.; Ardila, D.; Bhattacharya, B.; Mei, Y.; Morris, P.; Rector, J.; NHSC Team
2010-01-01
The first science data from the Herschel Space Observatory were distributed to Key Programme teams in September 2009. This poster describes a number of resources that have been developed by the NASA Herschel Science Center (NHSC) to support the first users of the observatory. The NHSC webpages and Helpdesk serve as the starting point for information and queries from the US community. Details about the use of the Herschel Common Science Software can be looked up in the Helpdesk Knowledgebase. The capability of real-time remote support through desktop sharing has been implemented. The NHSC continues to host workshops on data analysis and observation planning. Key Programme teams have been provided Wiki sites upon request for their team's private use and for sharing information with other teams. A secure data storage area is in place for troubleshooting purposes and for use by visitors. The NHSC draws upon close working relationships with Instrument Control Centers and the Herschel Science Center in Madrid in order to have the necessary expertise on hand to assist Herschel observers, including both Key Programme teams and respondents to upcoming open time proposal calls.
Physiologically based pharmacokinetic (PBPK) modeling considering methylated trivalent arsenicals
PBPK modeling provides a quantitative biologically-based framework to integrate diverse types of information for application to risk analysis. For example, genetic polymorphisms in arsenic metabolizing enzymes (AS3MT) can lead to differences in target tissue dosimetry for key tri...
Franco-Trigo, L; Hossain, L N; Durks, D; Fam, D; Inglis, S C; Benrimoj, S I; Sabater-Hernández, D
Participatory approaches involving stakeholders across the health care system can help enhance the development, implementation and evaluation of health services. These approaches may be particularly useful in planning community pharmacy services and so overcome challenges in their implementation into practice. Conducting a stakeholder analysis is a key first step since it allows relevant stakeholders to be identified, as well as providing planners a better understanding of the complexity of the health care system. The main aim of this study was to conduct a stakeholder analysis to identify those individuals and organizations that could be part of a leading planning group for the development of a community pharmacy service (CPS) to prevent cardiovascular disease (CVD) in Australia. An experienced facilitator conducted a workshop with 8 key informants of the Australian health care system. Two structured activities were undertaken. The first explored current needs and gaps in cardiovascular care and the role of community pharmacists. The second was a stakeholder analysis, using both ex-ante and ad-hoc approaches. Identified stakeholders were then classified into three groups according to their relative influence on the development of the pharmacy service. The information gathered was analyzed using qualitative content analysis. The key informants identified 46 stakeholders, including (1) patient/consumers and their representative organizations, (2) health care providers and their professional organizations and (3) institutions and organizations that do not directly interact with patients but organize and manage the health care system, develop and implement health policies, pay for health care, influence funding for health service research or promote new health initiatives. From the 46 stakeholders, a core group of 12 stakeholders was defined. These were considered crucial to the service's development because they held positions that could drive or inhibit progress. Secondary results of the workshop included: a list of needs and gaps in cardiovascular care (n = 6), a list of roles for community pharmacists in cardiovascular prevention (n = 12) and a list of potential factors (n = 7) that can hinder the integration of community pharmacy services into practice. This stakeholder analysis provided a detailed picture of the wide range of stakeholders across the entire health care system that have a stake in the development of a community pharmacy service aimed at preventing CVD. Of these, a core group of key stakeholders, with complementary roles, can then be approached for further planning of the service. The results of this analysis highlight the relevance of establishing multilevel stakeholder groups for CPS planning. Copyright © 2016 Elsevier Inc. All rights reserved.
Erasmus, Ermin; Lehmann, Uta; Agyepong, Irene Akua; Alwar, John; de Savigny, Don; Kamuzora, Peter; Mirzoev, Tolib; Nxumalo, Nonhlanhla; Tomson, Göran; Uzochukwu, Benjamin; Gilson, Lucy
2016-04-12
The last 5-10 years have seen significant international momentum build around the field of health policy and systems research and analysis (HPSR + A). Strengthening post-graduate teaching is seen as central to the further development of this field in low- and middle-income countries. However, thus far, there has been little reflection on and documentation of what is taught in this field, how teaching is carried out, educators' challenges and what future teaching might look like. Contributing to such reflection and documentation, this paper reports on a situation analysis and inventory of HPSR + A post-graduate teaching conducted among the 11 African and European partners of the Consortium for Health Policy and Systems Analysis in Africa (CHEPSAA), a capacity development collaboration. A first questionnaire completed by the partners collected information on organisational teaching contexts, while a second collected information on 104 individual courses (more in-depth information was subsequently collected on 17 of the courses). The questionnaires yielded a mix of qualitative and quantitative data, which were analysed through counts, cross-tabulations, and the inductive grouping of material into themes. In addition, this paper draws information from internal reports on CHEPSAA's activities, as well as its external evaluation. The analysis highlighted the fluid boundaries of HPSR + A and the range and variability of the courses addressing the field, the important, though not exclusive, role of schools of public health in teaching relevant material, large variations in the time investments required to complete courses, the diversity of student target audiences, the limited availability of distance and non-classroom learning activities, and the continued importance of old-fashioned teaching styles and activities. This paper argues that in order to improve post-graduate teaching and continue to build the field of HPSR + A, key questions need to be addressed around educational practice issues such as the time allocated for HPSR + A courses, teaching activities, and assessments, whether HPSR + A should be taught as a cross-cutting theme in post-graduate degrees or an area of specialisation, and the organisation of teaching given the multi-disciplinary nature of the field. It ends by describing some of CHEPSAA's key post-graduate teaching development activities and how these activities have addressed the key questions.
Factors affecting construction performance: exploratory factor analysis
NASA Astrophysics Data System (ADS)
Soewin, E.; Chinda, T.
2018-04-01
The present work attempts to develop a multidimensional performance evaluation framework for a construction company by considering all relevant measures of performance. Based on the previous studies, this study hypothesizes nine key factors, with a total of 57 associated items. The hypothesized factors, with their associated items, are then used to develop questionnaire survey to gather data. The exploratory factor analysis (EFA) was applied to the collected data which gave rise 10 factors with 57 items affecting construction performance. The findings further reveal that the items constituting ten key performance factors (KPIs) namely; 1) Time, 2) Cost, 3) Quality, 4) Safety & Health, 5) Internal Stakeholder, 6) External Stakeholder, 7) Client Satisfaction, 8) Financial Performance, 9) Environment, and 10) Information, Technology & Innovation. The analysis helps to develop multi-dimensional performance evaluation framework for an effective measurement of the construction performance. The 10 key performance factors can be broadly categorized into economic aspect, social aspect, environmental aspect, and technology aspects. It is important to understand a multi-dimension performance evaluation framework by including all key factors affecting the construction performance of a company, so that the management level can effectively plan to implement an effective performance development plan to match with the mission and vision of the company.
Hacking on decoy-state quantum key distribution system with partial phase randomization
NASA Astrophysics Data System (ADS)
Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei
2014-04-01
Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.
Hacking on decoy-state quantum key distribution system with partial phase randomization.
Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei
2014-04-23
Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.
Zimlichman, Eyal; Rozenblum, Ronen; Salzberg, Claudia A; Jang, Yeona; Tamblyn, Melissa; Tamblyn, Robyn; Bates, David W
2012-01-01
To summarize the Canadian health information technology (HIT) policy experience and impart lessons learned to the US as it determines its policy in this area. Qualitative analysis of interviews with identified key stakeholders followed by an electronic survey. We conducted semi-structured interviews with 29 key Canadian HIT policy and opinion leaders and used a grounded theory approach to analyze the results. The informant sample was chosen to provide views from different stakeholder groups including national representatives and regional representatives from three Canadian provinces. Canadian informants believed that much of the current US direction is positive, especially regarding incentives and meaningful use, but that there are key opportunities for the US to emphasize direct engagement with providers, define a clear business case for them, sponsor large scale evaluations to assess HIT impact in a broad array of settings, determine standards but also enable access to resources needed for mid-course corrections of standards when issues are identified, and, finally, leverage implementation of digital imaging systems. Not all stakeholder groups were included, such as providers or patients. In addition, as in all qualitative research, a selection bias could be present due to the relatively small sample size. Based on Canadian experience with HIT policy, stakeholders identified as lessons for the US the need to increase direct engagement with providers and the importance of defining the business case for HIT, which can be achieved through large scale evaluations, and of recognizing and leveraging successes as they emerge.
Social accountability and nursing education in South Africa
Armstrong, Susan J.; Rispel, Laetitia C.
2015-01-01
Background There is global emphasis on transforming health workforce education in support of universal health coverage. Objective This paper uses a social accountability framework, specifically the World Health Organization's six building blocks for transformative education, to explore key informants’ perspectives on nursing education in South Africa. Methods Using a snowballing sampling technique, 44 key informants were selected purposively on the basis of their expertise or knowledge of the research area. Semi-structured interviews were conducted with the key informants after informed consent had been obtained. The interviews were analysed using template analysis. Results South Africa has strategic plans on human resources for health and nursing education, training, and practice and has a well-established system of regulation and accreditation of nursing education through the South African Nursing Council (SANC). Key informants criticised the following: the lack of national staffing norms; sub-optimal governance by both the SANC and the Department of Health; outdated curricula that are unresponsive to population and health system needs; lack of preparedness of nurse educators; and the unsuitability of the majority of nursing students. These problems are exacerbated by a perceived lack of prioritisation of nursing, resource constraints in both the nursing education institutions and the health training facilities, and general implementation inertia. Conclusion Social accountability, which is an essential component of transformative education, necessitates that attention be paid to the issues of governance, responsive curricula, educator preparedness, and appropriate student recruitment and selection. PMID:25971402
Gannotti, Mary E; Handwerker, W Penn
2002-12-01
Validating the cultural context of health is important for obtaining accurate and useful information from standardized measures of child health adapted for cross-cultural applications. This paper describes the application of ethnographic triangulation for cultural validation of a measure of childhood disability, the Pediatric Evaluation of Disability Inventory (PEDI) for use with children living in Puerto Rico. The key concepts include macro-level forces such as geography, demography, and economics, specific activities children performed and their key social interactions, beliefs, attitudes, emotions, and patterns of behavior surrounding independence in children and childhood disability, as well as the definition of childhood disability. Methods utilize principal components analysis to establish the validity of cultural concepts and multiple regression analysis to identify intracultural variation. Findings suggest culturally specific modifications to the PEDI, provide contextual information for informed interpretation of test scores, and point to the need to re-standardize normative values for use with Puerto Rican children. Without this type of information, Puerto Rican children may appear more disabled than expected for their level of impairment or not to be making improvements in functional status. The methods also allow for cultural boundaries to be quantitatively established, rather than presupposed. Copyright 2002 Elsevier Science Ltd.
Customer privacy on UK healthcare websites.
Mundy, Darren P
2006-09-01
Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.
Security of quantum key distribution with iterative sifting
NASA Astrophysics Data System (ADS)
Tamaki, Kiyoshi; Lo, Hoi-Kwong; Mizutani, Akihiro; Kato, Go; Lim, Charles Ci Wen; Azuma, Koji; Curty, Marcos
2018-01-01
Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma’s inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security.
Hemrich, Günter
2005-06-01
This case study reviews the experience of the Somalia Food Security Assessment Unit (FSAU) of operating a food security information system in the context of a complex emergency. In particular, it explores the linkages between selected features of the protracted crisis environment in Somalia and conceptual and operational aspects of food security information work. The paper specifically examines the implications of context characteristics for the establishment and operations of the FSAU field monitoring component and for the interface with information users and their diverse information needs. It also analyses the scope for linking food security and nutrition analysis and looks at the role of conflict and gender analysis in food security assessment work. Background data on the food security situation in Somalia and an overview of some key features of the FSAU set the scene for the case study. The paper is targeted at those involved in designing, operating and funding food security information activities.
McPherson, K M; Kayes, N K; Moloczij, N; Cummins, C
2014-03-01
Reports about the impact of caring vary widely, but a consistent finding is that the role is influenced (for better or worse) by how formal services respond to, and work with informal carers and of course the cared for person. We aimed to explore the connection between informal and formal cares and identify how a positive connection or interface might be developed and maintained. We undertook a qualitative descriptive study with focus groups and individual interviews with informal carers, formal care service providers and representatives from carer advocacy groups. Content analysis was used to identify key factors impacting on the interface between informal and formal carers and propose specific recommendations for service development. Community setting including urban and rural areas of New Zealand. Seventy participants (the majority informal carers) took part in 13 focus groups and 22 individual interviews. Four key themes were derived: Quality of care for the care recipient; Knowledge exchange (valuing carer perspectives); One size does not fit all (creating flexible services); and A constant struggle (reducing the burden services add). An optimum interface to address these key areas was proposed. In addition to ensuring quality care for the care recipient, specific structures and processes to support a more positive interface appear warranted if informal carers and services are to work well together. An approach recognising the caring context and carer expertise may decrease the additional burden services contribute, and reduce conflicting information and resultant confusion and/or frustration many carers experience. Copyright © 2013 Elsevier Ltd. All rights reserved.
Ana and the Internet: a review of pro-anorexia websites.
Norris, Mark L; Boydell, Katherine M; Pinhas, Leora; Katzman, Debra K
2006-09-01
The purpose of this article is to describe the content of pro-anorexia websites, both qualitatively and quantitatively. An Internet search protocol was developed to identify pro-anorexia websites. A grounded theory approach was used to generate themes from Internet-based information. Basic descriptive analysis was employed to report on key website characteristics. Twenty pro-anorexia websites met inclusion criteria. Saturation of themes was achieved after review of 12 websites. Key website characteristics included purpose of website (75%), information about webmaster (67%), website disclaimers (58%), and information on "tips and tricks" (67%). Religious metaphors, lifestyle descriptions, and "thinspiration" (inspirational photo galleries and quotes that aim to serve as motivators for weight loss) were frequently present. A total of 10 themes were generated. The most prevalent themes included control, success, and perfection. Health-care providers and caregivers should be aware of pro-anorexia websites and their content, as these websites contain information that promote and support anorexia nervosa. Copyright (c) 2006 by Wiley Periodicals, Inc.
Lamas, Daniela; Panariello, Natalie; Henrich, Natalie; Hammes, Bernard; Hanson, Laura C; Meier, Diane E; Guinn, Nancy; Corrigan, Janet; Hubber, Sean; Luetke-Stahlman, Hannah; Block, Susan
2018-04-01
To develop a set of clinically relevant recommendations to improve the state of advance care planning (ACP) documentation in the electronic health record (EHR). Advance care planning (ACP) is a key process that supports goal-concordant care. For preferences to be honored, clinicians must be able to reliably record, find, and use ACP documentation. However, there are no standards to guide ACP documentation in the electronic health record (EHR). We interviewed 21 key informants to understand the strengths and weaknesses of EHR documentation systems for ACP and identify best practices. We analyzed these interviews using a qualitative content analysis approach and subsequently developed a preliminary set of recommendations. These recommendations were vetted and refined in a second round of input from a national panel of content experts. Informants identified six themes regarding current inadequacies in documentation and accessibility of ACP information and opportunities for improvement. We offer a set of concise, clinically relevant recommendations, informed by expert opinion, to improve the state of ACP documentation in the EHR.
A Survey of Workplace Violence Across 65 U.S. Emergency Departments
Kansagra, Susan M.; Rao, Sowmya R.; Sullivan, Ashley F.; Gordon, James A.; Magid, David J.; Kaushal, Rainu; Camargo, Carlos A.; Blumenthal, David
2012-01-01
Objectives Workplace violence is a concerning issue. Healthcare workers represent a significant portion of the victims, especially those who work in the emergency department (ED). The objective of this study was to examine ED workplace violence and staff perceptions of physical safety. Methods Data were obtained from the National Emergency Department Safety Study (NEDSS), which surveyed staff across 69 U.S. EDs including physicians, residents, nurses, nurse practitioners, and physician assistants. The authors also conducted surveys of key informants (one from each site) including ED chairs, medical directors, nurse managers, and administrators. The main outcome measures included physical attacks against staff, frequency of guns or knives in the ED, and staff perceptions of physical safety. Results A total of 5,695 staff surveys were distributed, and 3,518 surveys from 65 sites were included in the final analysis. One-fourth of surveyed ED staff reported feeling safe sometimes, rarely, or never. Key informants at the sampled EDs reported a total of 3,461 physical attacks (median of 11 attacks per ED) over the 5-year period. Key informants at 20% of EDs reported that guns or knives were brought to the ED on a daily or weekly basis. In multivariate analysis, nurses were less likely to feel safe “most of the time” or “always” when compared to other surveyed staff. Conclusions This study showed that violence and weapons in the ED are common, and nurses were less likely to feel safe than other ED staff. PMID:18976337
NASA Technical Reports Server (NTRS)
Stockwell, Alan E.; Cooper, Paul A.
1991-01-01
The Integrated Multidisciplinary Analysis Tool (IMAT) consists of a menu driven executive system coupled with a relational database which links commercial structures, structural dynamics and control codes. The IMAT graphics system, a key element of the software, provides a common interface for storing, retrieving, and displaying graphical information. The IMAT Graphics Manual shows users of commercial analysis codes (MATRIXx, MSC/NASTRAN and I-DEAS) how to use the IMAT graphics system to obtain high quality graphical output using familiar plotting procedures. The manual explains the key features of the IMAT graphics system, illustrates their use with simple step-by-step examples, and provides a reference for users who wish to take advantage of the flexibility of the software to customize their own applications.
NASA Technical Reports Server (NTRS)
1972-01-01
Information backing up the key features of the manipulator system concept and detailed technical information on the subsystems are presented. Space station assembly and shuttle cargo handling tasks are emphasized in the concept analysis because they involve shuttle berthing, transferring the manipulator boom between shuttle and station, station assembly, and cargo handling. Emphasis is also placed on maximizing commonality in the system areas of manipulator booms, general purpose end effectors, control and display, data processing, telemetry, dedicated computers, and control station design.
An annotation system for 3D fluid flow visualization
NASA Technical Reports Server (NTRS)
Loughlin, Maria M.; Hughes, John F.
1995-01-01
Annotation is a key activity of data analysis. However, current systems for data analysis focus almost exclusively on visualization. We propose a system which integrates annotations into a visualization system. Annotations are embedded in 3D data space, using the Post-it metaphor. This embedding allows contextual-based information storage and retrieval, and facilitates information sharing in collaborative environments. We provide a traditional database filter and a Magic Lens filter to create specialized views of the data. The system has been customized for fluid flow applications, with features which allow users to store parameters of visualization tools and sketch 3D volumes.
Qualitative analysis of the dynamics of policy design and implementation in hospital funding reform.
Palmer, Karen S; Brown, Adalsteinn D; Evans, Jenna M; Marani, Husayn; Russell, Kirstie K; Martin, Danielle; Ivers, Noah M
2018-01-01
As in many health care systems, some Canadian jurisdictions have begun shifting away from global hospital budgets. Payment for episodes of care has begun to be implemented. Starting in 2012, the Province of Ontario implemented hospital funding reforms comprising three elements: Global Budgets; Health Based Allocation Method (HBAM); and Quality-Based Procedures (QBP). This evaluation focuses on implementation of QBPs, a procedure/diagnosis-specific funding approach involving a pre-set price per episode of care coupled with best practice clinical pathways. We examined whether or not there was consensus in understanding of the program theory underpinning QBPs and how this may have influenced full and effective implementation of this innovative funding model. We undertook a formative evaluation of QBP implementation. We used an embedded case study method and in-depth, one-on-one, semi-structured, telephone interviews with key informants at three levels of the health care system: Designers (those who designed the QBP policy); Adoption Supporters (organizations and individuals supporting adoption of QBPs); and Hospital Implementers (those responsible for QBP implementation in hospitals). Thematic analysis involved an inductive approach, incorporating Framework analysis to generate descriptive and explanatory themes that emerged from the data. Five main findings emerged from our research: (1) Unbeknownst to most key informants, there was neither consistency nor clarity over time among QBP designers in their understanding of the original goal(s) for hospital funding reform; (2) Prior to implementation, the intended hospital funding mechanism transitioned from ABF to QBPs, but most key informants were either unaware of the transition or believe it was intentional; (3) Perception of the primary goal(s) of the policy reform continues to vary within and across all levels of key informants; (4) Four years into implementation, the QBP funding mechanism remains misunderstood; and (5) Ongoing differences in understanding of QBP goals and funding mechanism have created challenges with implementation and difficulties in measuring success. Policy drift and policy layering affected both the goal and the mechanism of action of hospital funding reform. Lack of early specification in both policy goals and hospital funding mechanism exposed the reform to reactive changes that did not reflect initial intentions. Several challenges further exacerbated implementation of complex hospital funding reforms, including a prolonged implementation schedule, turnover of key staff, and inconsistent messaging over time. These factors altered the trajectory of the hospital funding reforms and created confusion amongst those responsible for implementation. Enacting changes to hospital funding policy through a process that is transparent, collaborative, and intentional may increase the likelihood of achieving intended effects.
75 FR 17437 - NASA Advisory Council; Audit, Finance and Analysis Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-06
..., TX 77058. FOR FURTHER INFORMATION CONTACT: Ms. Charlene Williams, Office of the Chief Financial Officer, National Aeronautics and Space Administration Headquarters, Washington, DC 20546. Phone: 202-358... the key participants. Dated: March 31, 2010. P. Diane Rausch, Advisory Committee Management Officer...
Collaborative Research Partnerships for Knowledge Mobilisation
ERIC Educational Resources Information Center
Edelstein, Hilary
2016-01-01
This study examines elements of collaborative research partnerships (CRPs) between university researchers and organisations who engage in knowledge mobilisation activities in education. The study uses key informant interviews and document analysis from one type of partnership, and a survey of university-community partnerships across Canada to…
TxACOL workshop : Texas asphalt concrete overlay design and analysis system.
DOT National Transportation Integrated Search
2010-01-01
General Information: : -Two workshops were held respectively on Aug. 25 at Paris, Tx and on Oct. 6 at Austin, Tx, : -More than 30 representatives from TxDOT attended, : -Introduction of TxACOL software, key input parameters, and related lab and field...
The Supersites Program is a methods development and evaluation, measurements, modeling, and data analysis program designed to provide key stakeholders in the science, regulatory, and policy communities with information to support primarily implementation of National Ambient Air Q...
Tara M. Barrett; Glenn A. Christensen
2011-01-01
This report highlights key findings from the most recent (2004â2008) data collected by the Forest Inventory and Analysis program across all ownerships in southeast and south-central Alaska. We present basic resource information such as forest area, ownership, volume, biomass, carbon sequestration, growth, and mortality; structure and function topics such as vegetation...
Description of inpatient medication management using cognitive work analysis.
Pingenot, Alleene Anne; Shanteau, James; Sengstacke, L T C Daniel N
2009-01-01
The purpose of this article was to describe key elements of an inpatient medication system using the cognitive work analysis method of Rasmussen et al (Cognitive Systems Engineering. Wiley Series in Systems Engineering; 1994). The work of nurses and physicians were observed in routine care of inpatients on a medical-surgical unit and attached ICU. Interaction with pharmacists was included. Preoperative, postoperative, and medical care was observed. Personnel were interviewed to obtain information not easily observable during routine work. Communication between healthcare workers was projected onto an abstraction/decomposition hierarchy. Decision ladders and information flow charts were developed. Results suggest that decision making on an inpatient medical/surgical unit or ICU setting is a parallel, distributed process. Personnel are highly mobile and often are working on multiple issues concurrently. In this setting, communication is key to maintaining organization and synchronization for effective care. Implications for research approaches to system and interface designs and decision support for personnel involved in the process are discussed.
Data for Renewable Energy Planning, Policy, and Investment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cox, Sarah L
Reliable, robust, and validated data are critical for informed planning, policy development, and investment in the clean energy sector. The Renewable Energy (RE) Explorer was developed to support data-driven renewable energy analysis that can inform key renewable energy decisions globally. This document presents the types of geospatial and other data at the core of renewable energy analysis and decision making. Individual data sets used to inform decisions vary in relation to spatial and temporal resolution, quality, and overall usefulness. From Data to Decisions, a complementary geospatial data and analysis decision guide, provides an in-depth view of these and other considerationsmore » to enable data-driven planning, policymaking, and investment. Data support a wide variety of renewable energy analyses and decisions, including technical and economic potential assessment, renewable energy zone analysis, grid integration, risk and resiliency identification, electrification, and distributed solar photovoltaic potential. This fact sheet provides information on the types of data that are important for renewable energy decision making using the RE Data Explorer or similar types of geospatial analysis tools.« less
Fit for purpose: perspectives on rapid reviews from end-user interviews.
Hartling, Lisa; Guise, Jeanne-Marie; Hempel, Susanne; Featherstone, Robin; Mitchell, Matthew D; Motu'apuaka, Makalapua L; Robinson, Karen A; Schoelles, Karen; Totten, Annette; Whitlock, Evelyn; Wilt, Timothy J; Anderson, Johanna; Berliner, Elise; Gozu, Aysegul; Kato, Elisabeth; Paynter, Robin; Umscheid, Craig A
2017-02-17
There is increasing demand for rapid reviews and timely evidence synthesis. The goal of this project was to understand end-user perspectives on the utility and limitations of rapid products including evidence inventories, rapid responses, and rapid reviews. Interviews were conducted with key informants representing: guideline developers (n = 3), health care providers/health system organizations (n = 3), research funders (n = 1), and payers/health insurers (n = 1). We elicited perspectives on important characteristics of systematic reviews, acceptable methods to streamline reviews, and uses of rapid products. We analyzed content of the interview transcripts and identified themes and subthemes. Key informants identified the following as critical features of evidence reviews: (1) originating from a reliable source (i.e., conducted by experienced reviewers from an established research organization), (2) addressing clinically relevant questions, and (3) trusted relationship between the user and producer. Key informants expressed strong preference for the following review methods and characteristics: use of evidence tables, quality rating of studies, assessments of total evidence quality/strength, and use of summary tables for results and conclusions. Most acceptable trade-offs to increase efficiencies were limiting the literature search (e.g., limiting search dates or language) and performing single screening of citations and full texts for relevance. Key informants perceived rapid products (particularly evidence inventories and rapid responses) as useful interim products to inform downstream investigation (e.g., whether to proceed with a full review or guideline, direction for future research). Most key informants indicated that evidence analysis/synthesis and quality/strength of evidence assessments were important for decision-making. They reported that rapid reviews in particular were useful for guideline development on narrow topics, policy decisions when a quick turn-around is needed, decision-making for practicing clinicians in nuanced clinical settings, and decisions about coverage by payers/health insurers. Rapid reviews may be more relevant within specific clinical settings or health systems; whereas, broad/national guidelines often need a traditional systematic review. Key informants interviewed in our study indicated that evidence inventories, rapid responses, and rapid reviews have utility in specific decisions and contexts. They indicated that the credibility of the review producer, relevance of key questions, and close working relationship between the end-user and producer are critical for any rapid product. Our findings are limited by the sample size which may have been too small to reach saturation for the themes described.
Cheng, Gong; Huang, Lu-qi; Xue, Da-yuan; Zhang, Xiao-bo
2014-12-01
The survey of traditional knowledge related to Chinese materia medica resources is the important component and one of the innovative aspects of the fourth national survey of the Chinese materia medica resources. China has rich traditional knowledge of traditional Chinese medicine (TCM) and the comprehensive investigation of TCM traditional knowledge aims to promote conservation and sustainable use of Chinese materia medica resources. Building upon the field work of pilot investigations, this paper introduces the essential procedures and key methods for conducting the survey of traditional knowledge related to Chinese materia medica resources. The essential procedures are as follows. First is the preparation phrase. It is important to review all relevant literature and provide training to the survey teams so that they have clear understanding of the concept of traditional knowledge and master key survey methods. Second is the field investigation phrase. When conducting field investigations, survey teams should identify the traditional knowledge holders by using the 'snowball method', record the traditional knowledge after obtaining prior informed concerned from the traditional knowledge holders. Researchers should fill out the survey forms provided by the Technical Specification of the Fourth National Survey of Chinese Materia Medica Resources. Researchers should pay particular attention to the scope of traditional knowledge and the method of inheriting the knowledge, which are the key information for traditional knowledge holders and potential users to reach mutual agreed terms to achieve benefit sharing. Third is the data compilation and analysis phrase. Researchers should try to compile and edit the TCM traditional knowledge in accordance with intellectual property rights requirements so that the information collected through the national survey can serve as the basic data for the TCM traditional knowledge database. The key methods of the survey include regional division of Chinese materia medica resources, interview of key information holders and standardization of information.' In particular, using "snowball method" can effectively identify traditional knowledge holder in the targeted regions and ensuring traditional knowledge holders receiving prior informed concerned before sharing the information with researcher to make sure the rights of traditional knowledge holders are protected. Employing right survey methods is not only the key to obtain traditional knowledge related to Chinese materia medica resources, but also the pathway to fulfill the objectives of access and benefit sharing stipulated in Convention on Biological Resources. It will promote the legal protection of TCM traditional knowledge and conservation of TCM intangible, cultural heritage.
Mooney, Ryan; Samhouri, Mahasen; Holton, Avery; Devine, Katie A.; Kirchhoff, Anne C.; Wright, Jennifer
2017-01-01
Purpose: To explore adolescent and young adult (AYA) cancer survivors' internet use in seeking healthy lifestyle behavior (HLB) information on diet and exercise. Methods: Twenty-five AYA cancer survivors participated in focus groups or interviews. Data were analyzed using qualitative content analysis. Results: Most survivors (92%) sought HLB information from internet sources. Key issues included the following: (1) too much information available, (2) information not meeting survivors' unique needs, and (3) concerns about trustworthiness of information. Conclusion: Although AYA cancer survivors use the internet to seek HLB information, internet resources could be modified to better meet the needs of AYA cancer survivors. PMID:27845844
The dimensions of responsiveness of a health system: a Taiwanese perspective.
Hsu, Chih-Cheng; Chen, Likwang; Hu, Yu-Whuei; Yip, Winnie; Shu, Chen-Chun
2006-03-17
Responsiveness is an indicator used to measure how well a health system performs relative to non-health aspects. This study assessed whether seven dimensions proposed by the World Health Organization (WHO) to measure responsiveness (dignity, autonomy, confidentiality, prompt attention, social support, basic amenities, and choices of providers) are applicable in evaluating the health system of Taiwan. A key informant survey and focus group research were used in this study. The translated WHO proposed questionnaire was sent to 205 nominated key informants by mail, and 132 (64.4%) were returned. We used principal component analysis to extract factors. Linear regression analysis was used to assess the relationship between the total score and the extracted factors. A qualitative content analysis was also carried out in focus group research. Principal component analysis produced five factors (respect, access, confidentiality, basic amenities, and social support) that explained 63.5% of the total variances. These five factors demonstrated acceptable internal consistency and four of them (except social support) were significantly correlated with the total responsiveness score. The focus group interviews revealed health providers' communication ability and medical ethics were also highly appraised by Taiwanese. When the performance of a health system is to be evaluated, elements of responsiveness proposed by WHO may have to be tailored to fit different cultural backgrounds. Four key features illustrate the uniqueness of Taiwanese perspectives: the idea of autonomy may not be conceptualized, prompt attention and choice of providers are on the same track, social support during care is trivially correlated to the total responsiveness score, and accountability of health providers is deemed essential to a health system.
Thompson, Chad M.; Haws, Laurie C.; Harris, Mark A.; Gatto, Nicole M.; Proctor, Deborah M.
2011-01-01
Mode of action (MOA) analysis provides a systematic description of key events leading to adverse health effects in animal bioassays for the purpose of informing human health risk assessment. Uncertainties and data gaps identified in the MOA analysis may also be used to guide future research to improve understanding of the MOAs underlying a specific toxic response and foster development of toxicokinetic and toxicodynamic models. An MOA analysis, consistent with approaches outlined in the MOA Framework as described in the Guidelines for Carcinogen Risk Assessment, was conducted to evaluate small intestinal tumors observed in mice chronically exposed to relatively high concentrations of hexavalent chromium (Cr(VI)) in drinking water. Based on review of the literature, key events in the MOA are hypothesized to include saturation of the reductive capacity of the upper gastrointestinal tract, absorption of Cr(VI) into the intestinal epithelium, oxidative stress and inflammation, cell proliferation, direct and/or indirect DNA modification, and mutagenesis. Although available data generally support the plausibility of these key events, several unresolved questions and data gaps were identified, highlighting the need for obtaining critical toxicokinetic and toxicodynamic data in the target tissue and in the low-dose range. Experimental assays that can address these data gaps are discussed along with strategies for comparisons between responsive and nonresponsive tissues and species. This analysis provides a practical application of MOA Framework guidance and is instructive for the design of studies to improve upon the information available for quantitative risk assessment. PMID:20947717
STS-1 operational flight profile. Volume 6: Abort analysis
NASA Technical Reports Server (NTRS)
1980-01-01
The abort analysis for the cycle 3 Operational Flight Profile (OFP) for the Space Transportation System 1 Flight (STS-1) is defined, superseding the abort analysis previously presented. Included are the flight description, abort analysis summary, flight design groundrules and constraints, initialization information, general abort description and results, abort solid rocket booster and external tank separation and disposal results, abort monitoring displays and discussion on both ground and onboard trajectory monitoring, abort initialization load summary for the onboard computer, list of the key abort powered flight dispersion analysis.
Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru
2016-10-01
Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security verification of our scheme using the widely accepted AVISPA tool. High security and extra functionality features allow our proposed scheme to be applicable for telecare medicine information systems which is used for e-health care medical applications. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
[A functional analysis of healthcare auditors' skills in Venezuela, 2008].
Chirinos-Muñoz, Mónica S
2010-10-01
Using functional analysis for identifying the basic, working, specific and generic skills and values which a health service auditor must have. Implementing the functional analysis technique with 10 experts, identifying specific, basic, generic skills and values by means of deductive logic. A functional map was obtained which started by establishing a key purpose based on improving healthcare and service quality from which three key functions emerged. The main functions and skills' units were then broken down into the competitive elements defining what a health service auditor is able to do. This functional map (following functional analysis methodology) shows in detail the simple and complex tasks which a healthcare auditor should apply in the workplace, adopting a forward management approach for improving healthcare and health service quality. This methodology, expressing logical-deductive awareness raising, provides expert consensual information validating each element regarding overall skills.
A rhetorical approach to environmental information sharing
NASA Astrophysics Data System (ADS)
Woolf, Andrew
2014-05-01
`Faceted search' has recently been widely adopted as a powerful information discovery framework, enabling users to navigate a complex landscape of information by successive refinement along key dimensions. The compelling user experience that results has seen adoption of faceted search by online retailers, media outlets, and encyclopedic publishers. A key challenge with faceted browse is the choice of suitable search dimensions, or facets. Conventional facet analysis adopts principles of exclusivity and exhaustiveness; identifying facets on their relevance to the subject and discrimination ability (Spiteri, 1998). The rhetoricians of ancient Greece defined seven dimensions (`circumstances') of analytical enquiry: who, what, when, where, why, in what way, by what means. These provide a broadly applicable framework that may be seen in Ranganathan's classic (`PMEST') scheme for facet analysis. The utility of the `Five Ws' is also manifest through their adoption in daily discourse and pedagogical frameworks. If we apply the `Five Ws' to environmental information, we arrive at a model very close to the `O&M' (ISO 19156) conceptual model for standardised exchange of environmental observation and measurements data: * who: metadata * what: observed property * when: time of observation * where: feature of interest * why: metadata * how: procedure Thus, we adopt an approach for distributed environmental information sharing which factors the architecture into components aligned with the `Five Ws' (or O&M). We give an overview of this architecture and its information classes, components, interfaces and standards. We also describe how it extends the classic SDI architecture to provide additional specific benefit for environmental information. Finally, we offer a perspective on the architecture which may be seen as a `brokering' overlay to environmental information resources, enabling an O&M-conformant view. The approach to be presented is being adopted by the Australian Bureau of Meteorology as the basis for a National Environmental Information Infrastructure.
1992 NASA Life Support Systems Analysis workshop
NASA Technical Reports Server (NTRS)
Evanich, Peggy L.; Crabb, Thomas M.; Gartrell, Charles F.
1992-01-01
The 1992 Life Support Systems Analysis Workshop was sponsored by NASA's Office of Aeronautics and Space Technology (OAST) to integrate the inputs from, disseminate information to, and foster communication among NASA, industry, and academic specialists. The workshop continued discussion and definition of key issues identified in the 1991 workshop, including: (1) modeling and experimental validation; (2) definition of systems analysis evaluation criteria; (3) integration of modeling at multiple levels; and (4) assessment of process control modeling approaches. Through both the 1991 and 1992 workshops, NASA has continued to seek input from industry and university chemical process modeling and analysis experts, and to introduce and apply new systems analysis approaches to life support systems. The workshop included technical presentations, discussions, and interactive planning, with sufficient time allocated for discussion of both technology status and technology development recommendations. Key personnel currently involved with life support technology developments from NASA, industry, and academia provided input to the status and priorities of current and future systems analysis methods and requirements.
Fadyl, Joanna K; Channon, Alexis; Theadom, Alice; McPherson, Kathryn M
2017-04-01
Knowledge about aspects that influence recovery and adaptation in the postacute phase of disabling health events is key to understanding how best to provide appropriate rehabilitation and health services. Qualitative longitudinal research makes it possible to look for patterns, key time points and critical moments that could be vital for interventions and supports. However, strategies that support robust data management and analysis for longitudinal qualitative research in health-care are not well documented in the literature. This article reviews three challenges encountered in a large longitudinal qualitative descriptive study about experiences of recovery and adaptation after traumatic brain injury in New Zealand, and the strategies and technologies used to address them. These were (i) tracking coding and analysis decisions during an extended analysis period; (ii) navigating interpretations over time and in response to new data; and (iii) exploiting data volume and complexity. Concept mapping during coding review, a considered combination of information technologies, employing both cross-sectional and narrative analysis, and an expectation that subanalyses would be required for key topics helped us manage the study in a way that facilitated useful and novel insights. These strategies could be applied in other qualitative longitudinal studies in healthcare inquiry to optimise data analysis and stimulate important insights. © 2016 John Wiley & Sons Ltd.
Multi-party quantum key agreement with five-qubit brown states
NASA Astrophysics Data System (ADS)
Cai, Tao; Jiang, Min; Cao, Gang
2018-05-01
In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.
2013-01-01
Background Immunoassays that employ multiplexed bead arrays produce high information content per sample. Such assays are now frequently used to evaluate humoral responses in clinical trials. Integrated software is needed for the analysis, quality control, and secure sharing of the high volume of data produced by such multiplexed assays. Software that facilitates data exchange and provides flexibility to perform customized analyses (including multiple curve fits and visualizations of assay performance over time) could increase scientists’ capacity to use these immunoassays to evaluate human clinical trials. Results The HIV Vaccine Trials Network and the Statistical Center for HIV/AIDS Research and Prevention collaborated with LabKey Software to enhance the open source LabKey Server platform to facilitate workflows for multiplexed bead assays. This system now supports the management, analysis, quality control, and secure sharing of data from multiplexed immunoassays that leverage Luminex xMAP® technology. These assays may be custom or kit-based. Newly added features enable labs to: (i) import run data from spreadsheets output by Bio-Plex Manager™ software; (ii) customize data processing, curve fits, and algorithms through scripts written in common languages, such as R; (iii) select script-defined calculation options through a graphical user interface; (iv) collect custom metadata for each titration, analyte, run and batch of runs; (v) calculate dose–response curves for titrations; (vi) interpolate unknown concentrations from curves for titrated standards; (vii) flag run data for exclusion from analysis; (viii) track quality control metrics across runs using Levey-Jennings plots; and (ix) automatically flag outliers based on expected values. Existing system features allow researchers to analyze, integrate, visualize, export and securely share their data, as well as to construct custom user interfaces and workflows. Conclusions Unlike other tools tailored for Luminex immunoassays, LabKey Server allows labs to customize their Luminex analyses using scripting while still presenting users with a single, graphical interface for processing and analyzing data. The LabKey Server system also stands out among Luminex tools for enabling smooth, secure transfer of data, quality control information, and analyses between collaborators. LabKey Server and its Luminex features are freely available as open source software at http://www.labkey.com under the Apache 2.0 license. PMID:23631706
Eckels, Josh; Nathe, Cory; Nelson, Elizabeth K; Shoemaker, Sara G; Nostrand, Elizabeth Van; Yates, Nicole L; Ashley, Vicki C; Harris, Linda J; Bollenbeck, Mark; Fong, Youyi; Tomaras, Georgia D; Piehler, Britt
2013-04-30
Immunoassays that employ multiplexed bead arrays produce high information content per sample. Such assays are now frequently used to evaluate humoral responses in clinical trials. Integrated software is needed for the analysis, quality control, and secure sharing of the high volume of data produced by such multiplexed assays. Software that facilitates data exchange and provides flexibility to perform customized analyses (including multiple curve fits and visualizations of assay performance over time) could increase scientists' capacity to use these immunoassays to evaluate human clinical trials. The HIV Vaccine Trials Network and the Statistical Center for HIV/AIDS Research and Prevention collaborated with LabKey Software to enhance the open source LabKey Server platform to facilitate workflows for multiplexed bead assays. This system now supports the management, analysis, quality control, and secure sharing of data from multiplexed immunoassays that leverage Luminex xMAP® technology. These assays may be custom or kit-based. Newly added features enable labs to: (i) import run data from spreadsheets output by Bio-Plex Manager™ software; (ii) customize data processing, curve fits, and algorithms through scripts written in common languages, such as R; (iii) select script-defined calculation options through a graphical user interface; (iv) collect custom metadata for each titration, analyte, run and batch of runs; (v) calculate dose-response curves for titrations; (vi) interpolate unknown concentrations from curves for titrated standards; (vii) flag run data for exclusion from analysis; (viii) track quality control metrics across runs using Levey-Jennings plots; and (ix) automatically flag outliers based on expected values. Existing system features allow researchers to analyze, integrate, visualize, export and securely share their data, as well as to construct custom user interfaces and workflows. Unlike other tools tailored for Luminex immunoassays, LabKey Server allows labs to customize their Luminex analyses using scripting while still presenting users with a single, graphical interface for processing and analyzing data. The LabKey Server system also stands out among Luminex tools for enabling smooth, secure transfer of data, quality control information, and analyses between collaborators. LabKey Server and its Luminex features are freely available as open source software at http://www.labkey.com under the Apache 2.0 license.
Rule-Based Expert Systems in the Command Estimate: An Operational Perspective
1990-06-01
control measures. 5. Prepare COA statement(s) and sketch(es). The key inputs for developing courses of action are the DFD process of IPB, data stores...mission, or a change of information provides new direction to this process for that particular operation." Formal scientific analysis of the command...30 5. Delivery of outside news . This feature contributes to the commanders insatiable need for current information. Artificial intelligence ana rule
For Better or Worse? The Marriage of Key Skills Development and On-line Learning.
ERIC Educational Resources Information Center
Jones, Norah; Fitzgibbon, Karen
2002-01-01
Analysis of the University of Glamorgan's electronic learning module on employability and professional development demonstrates the feasibility of teaching transferable, "soft" skills online. Advantages compared with face-to-face include transparency, flexibility, development of information technology skills, openness, and teamwork;…
[Transcriptome analysis of Dunaliella viridis].
Zhu, Shuai-qi; Gong, Yi-fu; Hang, Yu-qing; Liu, Hao; Wang, He-yu
2015-08-01
In order to understand the gene information, function, haloduric pathway (glycerolipid metabolism) and related key genes for Dunaliella viridis, we used Illumina HiSeqTM 2000 high-throughput sequencing technology to sequence its transcriptome. Trinity soft was used to assemble the data to form transcripts. Based on the Clusters of Orthologous Groups (COG), Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG ) databases, we carried out functional annotation and classification, pathway annotation, and the opening reading fragment (ORF) sequence prediction of transcripts. The key genes in the glycerolipid metabolism were analyzed. The results suggested that 81,593 transcripts were found, and 77,117 ORF sequences were predicted, accounting for 94.50% of all transcripts. COG classification results showed that 16,569 transcripts were assigned to 24 categories. GO classification annotated 76,436 transcripts. The number of transcripts for biologcial processes was 30,678, accounting for 40.14% of all transcripts. KEGG pathway analysis showed that 26,428 transcripts were annotated to 317 pathways, and 131 pathways were related to metabolism, accounting for 41.32% of all annotated pathways. Only one transcript was annotated as coding the key enzyme dihydroxyacetone kinase involved in the glycerolipid pathway. This enzyme could be related to glycerol biosynthesis under salt stress. This study further improved the gene information and laid the foundation of metabolic pathway research for Dunaliella viridis.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anderson, David M.; Hoffman, Michael G.; Niemeyer, Jackie M.
This report examines the information and communications technology (ICT) services industry in response to an inquiry by the Department of Energy’s (DOE’s) Office of Energy Policy and Systems Analysis. The report answers several key questions: •How has the reliance on ICT services evolved in recent years for key infrastructure services such as air travel, freight transport, electricity and natural gas distribution, financial services, and critical health care, and for the household sector? •What ICT industry trends explain continued strong linkage to and reliance upon ICT? •What is the ICT industry’s reliance on grid-supplied power, uninterruptible power supplies, emergency generators andmore » back-up energy storage technologies? •What are the observed direct effects of ICT disruptions induced by electrical system failures in recent history and how resilient are the components of the ICT industry?« less
Arheiam, Arheiam; Brown, Stephen L; Higham, Susan M; Albadri, Sondos; Harris, Rebecca V
2016-12-01
Diet diaries are recommended for dentists to monitor children's sugar consumption. Diaries provide multifaceted dietary information, but patients respond better to simpler advice. We explore how dentists integrate information from diet diaries to deliver useable advice to patients. As part of a questionnaire study of general dental practitioners (GDPs) in Northwest England, we asked dentists to specify the advice they would give a hypothetical patient based upon a diet diary case vignette. A sequential mixed method approach was used for data analysis: an initial inductive content analysis (ICA) to develop coding system to capture the complexity of dietary assessment and delivered advice. Using these codes, a quantitative analysis was conducted to examine correspondences between identified dietary problems and advice given. From these correspondences, we inferred how dentists reduced problems to give simple advice. A total of 229 dentists' responses were analysed. ICA on 40 questionnaires identified two distinctive approaches of developing diet advice: a summative (summary of issues into an all-encompassing message) and a selective approach (selection of a main message approach). In the quantitative analysis of all responses, raw frequencies indicated that dentists saw more problems than they advised on and provided highly specific advice on a restricted number of problems (e.g. not eating sugars before bedtime 50.7% or harmful items 42.4%, rather than simply reducing the amount of sugar 9.2%). Binary logistic regression models indicate that dentists provided specific advice that was tailored to the key problems that they identified. Dentists provided specific recommendations to address what they felt were key problems, whilst not intervening to address other problems that they may have felt less pressing. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
2014-01-01
The Compassionate Care Benefit was implemented in Canada in 2004 to support employed informal caregivers, the majority of which we know are women given the gendered nature of caregiving. In order to examine how this policy might evolve over time, we examine the evolution of a similar employment insurance program, Canada’s Maternity Leave Benefit. National media articles were reviewed (n = 2,698) and, based on explicit criteria, were analyzed using content analysis. Through the application of Kingdon’s policy agenda-setting framework, the results define key recommendations for the Compassionate Care Benefit, as informed by the developmental trajectory of the Maternity Leave Benefit. Recommendations for revising the Compassionate Care Benefit are made. PMID:24758563
Dykeman, Sarah; Williams, Allison M
2014-04-24
The Compassionate Care Benefit was implemented in Canada in 2004 to support employed informal caregivers, the majority of which we know are women given the gendered nature of caregiving. In order to examine how this policy might evolve over time, we examine the evolution of a similar employment insurance program, Canada's Maternity Leave Benefit. National media articles were reviewed (n = 2,698) and, based on explicit criteria, were analyzed using content analysis. Through the application of Kingdon's policy agenda-setting framework, the results define key recommendations for the Compassionate Care Benefit, as informed by the developmental trajectory of the Maternity Leave Benefit. Recommendations for revising the Compassionate Care Benefit are made.
Beyond mind-reading: multi-voxel pattern analysis of fMRI data.
Norman, Kenneth A; Polyn, Sean M; Detre, Greg J; Haxby, James V
2006-09-01
A key challenge for cognitive neuroscience is determining how mental representations map onto patterns of neural activity. Recently, researchers have started to address this question by applying sophisticated pattern-classification algorithms to distributed (multi-voxel) patterns of functional MRI data, with the goal of decoding the information that is represented in the subject's brain at a particular point in time. This multi-voxel pattern analysis (MVPA) approach has led to several impressive feats of mind reading. More importantly, MVPA methods constitute a useful new tool for advancing our understanding of neural information processing. We review how researchers are using MVPA methods to characterize neural coding and information processing in domains ranging from visual perception to memory search.
Chen, Stephanie C; Kim, Scott Yh
2016-12-01
Standard of care pragmatic clinical trials that compare treatments already in use could improve care and reduce costs, but there is considerable debate about the research risks of standard of care pragmatic clinical trials and how to apply informed consent regulations to such trials. We sought to develop a framework integrating the insights from opposing sides of the debate. We developed a formal risk-benefit analysis framework for standard of care pragmatic clinical trials and then applied it to key provisions of the US federal regulations. Our formal framework for standard of care pragmatic clinical trial risk-benefit analysis takes into account three key considerations: the ex ante estimates of risks and benefits of the treatments to be compared in a standard of care pragmatic clinical trial, the allocation ratios of treatments inside and outside such a trial, and the significance of some participants receiving a different treatment inside a trial than outside the trial. The framework provides practical guidance on how the research ethics regulations on informed consent should be applied to standard of care pragmatic clinical trials. Our proposed formal model makes explicit the relationship between the concepts used by opposing sides of the debate about the research risks of standard of care pragmatic clinical trials and can be used to clarify the implications for informed consent. © The Author(s) 2016.
Genome sequence and analysis of Lactobacillus helveticus
Cremonesi, Paola; Chessa, Stefania; Castiglioni, Bianca
2013-01-01
The microbiological characterization of lactobacilli is historically well developed, but the genomic analysis is recent. Because of the widespread use of Lactobacillus helveticus in cheese technology, information concerning the heterogeneity in this species is accumulating rapidly. Recently, the genome of five L. helveticus strains was sequenced to completion and compared with other genomically characterized lactobacilli. The genomic analysis of the first sequenced strain, L. helveticus DPC 4571, isolated from cheese and selected for its characteristics of rapid lysis and high proteolytic activity, has revealed a plethora of genes with industrial potential including those responsible for key metabolic functions such as proteolysis, lipolysis, and cell lysis. These genes and their derived enzymes can facilitate the production of cheese and cheese derivatives with potential for use as ingredients in consumer foods. In addition, L. helveticus has the potential to produce peptides with a biological function, such as angiotensin converting enzyme (ACE) inhibitory activity, in fermented dairy products, demonstrating the therapeutic value of this species. A most intriguing feature of the genome of L. helveticus is the remarkable similarity in gene content with many intestinal lactobacilli. Comparative genomics has allowed the identification of key gene sets that facilitate a variety of lifestyles including adaptation to food matrices or the gastrointestinal tract. As genome sequence and functional genomic information continues to explode, key features of the genomes of L. helveticus strains continue to be discovered, answering many questions but also raising many new ones. PMID:23335916
Clinical and Business Intelligence: Why It's Important to Your Pharmacy.
Pinto, Brian; Fox, Brent I
2016-07-01
According to the Healthcare Information Management and Systems Society, "Clinical & Business Intelligence (C&BI) is the use and analysis of data captured in the healthcare setting to directly inform decision-making" (http://www.himss.org/library/clinical-business-intelligence). Some say that it is the right information given to the right person at the right time in the right way. No matter how you define it, the fact remains that timely access, synthesis, and visualization of clinical data have become key to how health professionals make patient care decisions and improve care delivery.
Informed consent comprehension in African research settings.
Afolabi, Muhammed O; Okebe, Joseph U; McGrath, Nuala; Larson, Heidi J; Bojang, Kalifa; Chandramohan, Daniel
2014-06-01
Previous reviews on participants' comprehension of informed consent information have focused on developed countries. Experience has shown that ethical standards developed on Western values may not be appropriate for African settings where research concepts are unfamiliar. We undertook this review to describe how informed consent comprehension is defined and measured in African research settings. We conducted a comprehensive search involving five electronic databases: Medline, Embase, Global Health, EthxWeb and Bioethics Literature Database (BELIT). We also examined African Index Medicus and Google Scholar for relevant publications on informed consent comprehension in clinical studies conducted in sub-Saharan Africa. 29 studies satisfied the inclusion criteria; meta-analysis was possible in 21 studies. We further conducted a direct comparison of participants' comprehension on domains of informed consent in all eligible studies. Comprehension of key concepts of informed consent varies considerably from country to country and depends on the nature and complexity of the study. Meta-analysis showed that 47% of a total of 1633 participants across four studies demonstrated comprehension about randomisation (95% CI 13.9-80.9%). Similarly, 48% of 3946 participants in six studies had understanding about placebo (95% CI 19.0-77.5%), while only 30% of 753 participants in five studies understood the concept of therapeutic misconception (95% CI 4.6-66.7%). Measurement tools for informed consent comprehension were developed with little or no validation. Assessment of comprehension was carried out at variable times after disclosure of study information. No uniform definition of informed consent comprehension exists to form the basis for development of an appropriate tool to measure comprehension in African participants. Comprehension of key concepts of informed consent is poor among study participants across Africa. There is a vital need to develop a uniform definition for informed consent comprehension in low literacy research settings in Africa. This will be an essential step towards developing appropriate tools that can adequately measure informed consent comprehension. This may consequently suggest adequate measures to improve the informed consent procedure. © 2014 John Wiley & Sons Ltd.
Post-disaster Gulf Coast Recovery Using Telehealth
Kim, Thomas J.; Eastburn, Sasha L.; Icenogle, Marjorie L.; Slagle, Michelle; Nuriddin, Azizeh H.; Brantley, Katrina M.; Foreman, Rachel D.; Buckner, Ayanna V.
2013-01-01
Abstract Objective: The Gulf Coast continues to struggle with service need far outpacing available resources. Since 2005, the Regional Coordinating Center for Hurricane Response (RCC) at Morehouse School of Medicine, Atlanta, GA, has supported telehealth solutions designed to meet high service needs (e.g., psychiatry) within primary care and other healthcare organizations. The overall RCC vision is to support autonomous, useful, and sustainable telehealth programs towards mitigating unmet disaster-related needs. Subjects and Methods: To assess Gulf Coast telehealth experiences, we conducted semistructured interviews with both regional key informants and national organizations with Gulf Coast recovery interests. Using qualitative-descriptive analysis, interview transcripts were analyzed to identify shared development themes. Results: Thirty-eight key informants were interviewed, representing a 77.6% participation rate among organizations engaged by the RCC. Seven elements critical to telehealth success were identified: Funding, Regulatory, Workflow, Attitudes, Personnel, Technology, and Evaluation. These key informant accounts reveal shared insights with telehealth regarding successes, challenges, and recommendations. Conclusions: The seven elements critical to telehealth success both confirm and organize development principles from a diverse collective of healthcare stakeholders. The structured nature of these insights suggests a generalizable framework upon which other organizations might develop telehealth strategies toward addressing high service needs with limited resources. PMID:23427981
Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.
Zheng, Ran; Yao, Chuanwei; Jin, Hai; Zhu, Lei; Zhang, Qin; Deng, Wei
2015-01-01
Surveillance video service (SVS) is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units) to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.
Research on the architecture and key technologies of SIG
NASA Astrophysics Data System (ADS)
Fu, Zhongliang; Meng, Qingxiang; Huang, Yan; Liu, Shufan
2007-06-01
Along with the development of computer network, Grid has become one of the hottest issues of researches on sharing and cooperation of Internet resources throughout the world. This paper illustrates a new architecture of SIG-a five-hierarchy architecture (including Data Collecting Layer, Grid Layer, Service Layer, Application Layer and Client Layer) of SIG from the traditional three hierarchies (only including resource layer, service layer and client layer). In the paper, the author proposes a new mixed network mode of Spatial Information Grid which integrates CAG (Certificate Authority of Grid) and P2P (Peer to Peer) in the Grid Layer, besides, the author discusses some key technologies of SIG and analysis the functions of these key technologies.
ERIC Educational Resources Information Center
Croft, Michael; de Berg, Kevin
2014-01-01
This paper selects six key alternative conceptions identified in the literature on student understandings of chemical bonding and illustrates how a historical analysis and a textbook analysis can inform these conceptions and lead to recommendations for improving the teaching and learning of chemical bonding at the secondary school level. The…
Ahuja, S; Mirzoev, T; Lund, C; Ofori-Atta, A; Skeen, S; Kufuor, A
2016-01-01
Strengthening of mental health information systems (MHIS) is essential to monitor and evaluate mental health services in low and middle-income countries. While research exists assessing wider health management information systems, there is limited published evidence exploring the design and implementation of MHIS in these settings. This paper aims to identify and assess the key factors affecting the design and implementation of MHIS, as perceived by the key stakeholders in Ghana and South Africa. We report findings from the Mental Health and Poverty Project, a 5-year research programme implemented within four African countries. The MHIS strengthening in South Africa and Ghana included two related components: intervention and research. The intervention component aimed to strengthen MHIS in the two countries, and the research component aimed to document interventions in each country, including the key influences. Data were collected using semi structured interviews with key stakeholders and reviews of key documents and secondary data from the improved MHIS. We analyzed the qualitative data using a framework approach. Key components of the MHIS intervention involved the introduction of a redesigned patient registration form, entry into computers for analysis every 2 months by clinical managerial staff, and utilization of data in hospital management meetings in three psychiatric hospitals in Ghana; and the introduction of a new set of mental health indicators and related forms and tally sheets at primary care clinics and district hospitals in five districts in the KwaZulu-Natal and Northern Cape provinces in South Africa. Overall, the key stakeholders perceived the MHIS strengthening as an effective intervention in both countries with an enhanced set of indicators in South Africa and introduction of a computerized system in Ghana. Influences on the design and implementation of MHIS interventions in Ghana and South Africa relate to resources, working approaches (including degree of consultations during the design stage and communication during implementation stage) and the low priority of mental health. Although the influencing factors represent similar categories, more influences were identified on MHIS implementation, compared with the design stage. Different influences appear to be related within, and across, the MHIS design and implementation and may reinforce or negate each other thus leading to the multiplier or minimization effects. The wider context, similar to other studies, is important in ensuring the success of such interventions. Future MHIS strengthening interventions can consider three policy implications which emerged from our analysis and experience: enhancing consultations during the intervention design, better consideration of implementation challenges during design, and better recognition of relations between different influences.
Characterization Of Dissolved Organic Mattter In The Florida Keys Ecosystem
NASA Astrophysics Data System (ADS)
Adams, D. G.; Shank, G. C.
2009-12-01
Over the past few decades, Scleractinian coral populations in the Florida Keys have increasingly experienced mortality due to bleaching events as well as microbial mediated illnesses such as black band and white band disease. Such pathologies seem to be most correlated with elevated sea surface temperatures, increased UV exposures, and shifts in the microbial community living on the coral itself. Recent studies indicate that corals’ exposure to UV in the Florida Keys is primarily controlled by the concentration of CDOM (Chromophoric Dissolved Organic Matter) in the water column. Further, microbial community alterations may be linked to changes in concentration and chemical composition of the larger DOM (Dissolved Organic Matter) pool. Our research characterized the spatial and temporal properties of DOM in Florida Bay and along the Keys ecosystems using DOC analyses, in-situ water column optical measurements, and spectral analyses including absorbance and fluorescence measurements. We analyzed DOM characteristics along transects running from the mouth of the Shark River at the southwest base of the Everglades, through Florida Bay, and along near-shore Keys coastal waters. Two 12 hour time-series samplings were also performed at the Seven-Mile Bridge, the primary Florida Bay discharge channel to the lower Keys region. Photo-bleaching experiments showed that the chemical characteristics of the DOM pool are altered by exposure to solar radiation. Results also show that DOC (~0.8-5.8 mg C/L) and CDOM (~0.5-16.5 absorbance coefficient at 305nm) concentrations exhibit seasonal fluctuations in our study region. EEM analyses suggest seasonal transitions between primarily marine (summer) and terrestrial (winter) sources along the Keys. We are currently combining EEM-PARAFAC analysis with in-situ optical measurements to model changes in the spectral properties of DOM in the water column. Additionally, we are using stable δ13C isotopic analysis to further characterize DOM sources. Information generated by our study will provide a valuable data set for better understanding DOM bio-geochemical dynamics along the Florida Keys ecosystem and information for future studies linking DOM and the coral community.
A quality function deployment framework for the service quality of health information websites.
Chang, Hyejung; Kim, Dohoon
2010-03-01
This research was conducted to identify both the users' service requirements on health information websites (HIWs) and the key functional elements for running HIWs. With the quality function deployment framework, the derived service attributes (SAs) are mapped into the suppliers' functional characteristics (FCs) to derive the most critical FCs for the users' satisfaction. Using the survey data from 228 respondents, the SAs, FCs and their relationships were analyzed using various multivariate statistical methods such as principal component factor analysis, discriminant analysis, correlation analysis, etc. Simple and compound FC priorities were derived by matrix calculation. Nine factors of SAs and five key features of FCs were identified, and these served as the basis for the house of quality model. Based on the compound FC priorities, the functional elements pertaining to security and privacy, and usage support should receive top priority in the course of enhancing HIWs. The quality function deployment framework can improve the FCs of the HIWs in an effective, structured manner, and it can also be utilized for critical success factors together with their strategic implications for enhancing the service quality of HIWs. Therefore, website managers could efficiently improve website operations by considering this study's results.
The making of evidence-informed health policy in Cambodia: knowledge, institutions and processes.
Liverani, Marco; Chheng, Kannarath; Parkhurst, Justin
2018-01-01
In global health discussions, there have been widespread calls for health policy and programme implementation to be informed by the best available evidence. However, recommendations in the literature on knowledge translation are often decontextualised, with little attention to the local systems of institutions, structures and practices which can direct the production of evidence and shape whether or how it informs health decisions. This article explores these issues in the country setting of Cambodia, where the Ministry of Health has explicitly championed the language of evidence-based approaches to policy and planning. Research for this paper combined multiple sources and material, including in-depth interviews with key informants in Phnom Penh and the analysis of documentary material and publications. Data collection and analysis focused on two key domains in evidence advisory systems: domestic capacities to generate health policy-relevant evidence and institutional mechanisms to monitor, evaluate and incorporate evidence in the policy process. We identified a number of structural arrangements that may increasingly work to facilitate the supply of health-related data and information, and their use to inform policy and planning. However, other trends and features appear to be more problematic, including gaps between research and public health priorities in the country, the fragmented nature of research activities and information systems, the lack of a national policy to support and guide the production and use of evidence for health policy, and challenges to the use of evidence for intersectoral policy-making. In Cambodia, as in other low/middle-income countries, continued investments to increase the supply and quality of health data and information are needed, but greater attention should be paid to the enabling institutional environment to ensure relevance of health research products and effective knowledge management.
Mapping and analysis of phosphorylation sites: a quick guide for cell biologists
Dephoure, Noah; Gould, Kathleen L.; Gygi, Steven P.; Kellogg, Douglas R.
2013-01-01
A mechanistic understanding of signaling networks requires identification and analysis of phosphorylation sites. Mass spectrometry offers a rapid and highly sensitive approach to mapping phosphorylation sites. However, mass spectrometry has significant limitations that must be considered when planning to carry out phosphorylation-site mapping. Here we provide an overview of key information that should be taken into consideration before beginning phosphorylation-site analysis, as well as a step-by-step guide for carrying out successful experiments. PMID:23447708
Nanotechnology in Mexico: Key Findings Based on OECD Criteria
ERIC Educational Resources Information Center
Foladori, Guillermo; Arteaga Figueroa, Edgar; Záyago Lau, Edgar; Appelbaum, Richard; Robles-Belmont, Eduardo; Villa, Liliana; Parker, Rachel; Leos, Vanessa
2015-01-01
This analysis of Mexico's nanotechnology policies utilizes indicators developed by the Organization for Economic Co-operation and Development, which in 2008 conducted a pilot survey comparing the nanotechnology policies of 24 countries. In this paper, we apply the same questionnaire to the Mexican case, adding business information derived from the…
Preventing Mother-to-Child HIV Transmission among South African Adolescents
ERIC Educational Resources Information Center
Varga, Christine; Brookes, Heather
2008-01-01
Although prevention of mother-to-child HIV transmission (PMTCT) programs are predicated on maternal behavior change, little is known about sociocultural factors affecting maternal-child care practices in this arena. The authors used narrative methods (key informant workshops, questionnaires, focus groups, and case study analysis) to explore how…
Predicting Student Engagement in Online High Schools
ERIC Educational Resources Information Center
Vieira, Christopher James
2013-01-01
The purpose of this study was to analyze student engagement in online high schools based on demographic information of high school students using a mixed methods research design. Key findings through a multiple regression analysis and Pearson correlation coefficient suggest that although the majority of participants in the study are highly engaged…
Challenges Facing Principals in the First Year at Their Schools
ERIC Educational Resources Information Center
Bayar, Adem
2016-01-01
The aim of this study is to identify key challenges of practice that principals face. In line with this purpose, the researcher has employed a qualitative research methodology, interviewing principals working in Amasya district, over and above doing document analysis to collect detailed information concerning leadership and administration…
ERIC Educational Resources Information Center
O'Reilly, Erin N.
2016-01-01
As access to information and communication technology grows, educators have increasing opportunities to experiment with and to adapt both hardware and software to their current practice. Technology's integration, however, can vary widely between teachers within the same program for numerous reasons. Understanding the challenges practitioners face…
Quality Assurance Strategies in Higher Education: The Case of Ghanaian Polytechnics
ERIC Educational Resources Information Center
Swanzy, Patrick; Potts, Anthony
2017-01-01
This study investigated the internal quality assurance strategies Ghanaian polytechnics enacted in order to improve graduate outcomes. A qualitative methodological approach via in-depth interviewing of twenty key informants and document analysis was used to establish how polytechnics in Ghana addressed problematic situations in quality assurance.…
Education with ICT in South Korea and Chile
ERIC Educational Resources Information Center
Sanchez, Jaime; Salinas, Alvaro; Harris, Jordan
2011-01-01
This article presents a linear-analytical case study on the development of ICT within the educational systems of Chile and South Korea. Through a comprehensive meta-data analysis and bibliographic review, we collected information on both educational systems and their ICT adoption policies. Key differences necessary to understand how both countries…
NASA Astrophysics Data System (ADS)
Tignanelli, H. L.; Vazquez, R. A.; Mostaccio, C.; Gordillo, S.; Plastino, A.
1990-11-01
RESUMEN. Presentamos una metodologia de analisis de la homogeneidad a partir de la Teoria de la Informaci6n, aplicable a muestras de datos observacionales. ABSTRACT:Standard concepts that underlie Information Theory are employed in order design a methodology that enables one to analyze the homogeneity of a given data sample. Key : DATA ANALYSIS
Value of community pharmacy residency programs: college of pharmacy and practice site perspectives.
Schommer, Jon C; Bonnarens, Joseph K; Brown, Lawrence M; Goode, Jean-Venable Kelly R
2010-01-01
To describe and compare perceptions of key informants representing U.S. colleges/schools of pharmacy and community pharmacy practice sites regarding (1) value associated with community pharmacy residency programs (CPRPs) and (2) barriers to offering CPRPs . Descriptive, non-experimental, cross-sectional study. United States, June 13, 2009, through July 13, 2009. 554 respondents to a Web-based survey. Key informants representing the following four organizational groups were surveyed: (1) colleges/schools of pharmacy participating in CPRPs, (2) colleges/schools of pharmacy not participating in CPRPs, (3) CPRP community pharmacy practice sites, and (4) non-CPRP community pharmacy practice sites. Value of CPRPs to participating pharmacies, value of CPRPs to participating colleges/schools of pharmacy, and barriers to offering CPRPs. Overall, 267 key informants from colleges/schools of pharmacy and 287 key informants from pharmacy practice sites responded to the survey (n = 554 total respondents). Of these, 334 responders provided data that were usable for analysis. The most important types of value to the respondents were altruistic in nature (e.g., pharmacy education development, pharmacy profession development, community engagement). However, barriers to offering CPRPs were more practical and included challenges related to accreditation and operational issues. Further, evidence indicated that (1) lack of leadership, (2) lack of revenue generated from such programs, and (3) the cost of reimbursement for residents may be fundamental, multidimensional barriers to implementing CPRPs. Guidelines for starting and continuing CPRPs, "industry norms" that would require CPRP training for certain types of employment, and creation of models for patient care revenue would help develop and position CPRPs in the future.
Corr, Lara; Davis, Elise; Cook, Kay; Waters, Elizabeth; LaMontagne, Anthony D
2014-11-25
High quality child care is a population health investment that relies on the capacity of providers. The mental health and wellbeing of child care educators is fundamental to care quality and turnover, yet sector views on the relationship between working conditions and mental health and wellbeing are scarce. This paper examines child care educators' and sector key informants' perspectives on how working in family day care influences educator's mental health and wellbeing. Semi-structured telephone interviews were conducted with Australian family day care educators (n = 16) and key informants (n = 18) comprised of representatives from family day care schemes, government and other relevant organisations regarding the relationship between working conditions and educator mental health. Thematic analysis referenced the assumptions and concepts of critical inquiry and used social exchange theory. Educators and key informants reported that educators' mental health was affected by the quality of their relationships with government, family day care schemes, and the parents and children using their services. These social relationships created and contributed to working conditions that were believed to promote or diminish educators' mental health. High quality relationships featured fair exchanges of educator work for key resources of social support and respect; adequate income; professional services; and information. Crucially, how exchanges influenced educator wellbeing was largely contingent on government policies that reflect the values and inequities present in society. Making policies and relationships between educators, government and family day care schemes fairer would contribute strongly to the protection and promotion of educator mental health and wellbeing, and in turn contribute to workforce stability and care quality.
Security of a single-state semi-quantum key distribution protocol
NASA Astrophysics Data System (ADS)
Zhang, Wei; Qiu, Daowen; Mateus, Paulo
2018-06-01
Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.
Risk management of key issues of FPSO
NASA Astrophysics Data System (ADS)
Sun, Liping; Sun, Hai
2012-12-01
Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offloading system and fire accidents were analyzed based on the floating production, storage and offloading (FPSO) features. Fault tree analysis (FTA), and failure modes and effects analysis (FMEA) methods were examined based on information already researched on modules of relex reliability studio (RRS). Equipment failures were also analyzed qualitatively by establishing a fault tree and Boolean structure function based on the shortage of failure cases, statistical data, and risk control measures examined. Failure modes of fire accident were classified according to the different areas of fire occurrences during the FMEA process, using risk priority number (RPN) methods to evaluate their severity rank. The qualitative analysis of FTA gave the basic insight of forming the failure modes of FPSO offloading, and the fire FMEA gave the priorities and suggested processes. The research has practical importance for the security analysis problems of FPSO.
A Novel Multiple-Access Correlation-Delay-Shift-Keying
NASA Astrophysics Data System (ADS)
Duan, J. Y.; Jiang, G. P.; Yang, H.
In Correlation-Delay-Shift-Keying (CDSK), the reference signal and the information-bearing signal are added together during a certain time delay. Because the reference signal is not strictly orthogonal to the information-bearing signal, the cross-correlation between the adjacent chaotic signal (Intra-signal Interference, ISI) will be introduced into the demodulation at the receiver. Therefore, the Bit-Error Ratio (BER) of CDSK is higher than that of Differential-Chaos-Shift-Keying (DCSK). To avoid the ISI component and enhance the BER performance of CDSK in multiuser scenario, Multiple-Access CDSK with No Intra-signal Interference (MA-CDSK-NII) is proposed. By constructing the repeated chaotic generator and applying the Walsh code sequence to modulate the reference signal, in MA-CDSK-NII, the ISI component will be eliminated during the demodulation. Gaussian approximation method is adopted here to obtain the exact performance analysis of MA-CDSK-NII over additive white Gaussian noise (AWGN) channel and Rayleigh multipath fading channels. Results show that, due to no ISI component and lower transmitting power, the BER performance of MA-CDSK-NII can be better than that of multiple-access CDSK and Code-Shifted Differential-Chaos-Shift-Keying (CS-DCSK).
A review of second law techniques applicable to basic thermal science research
NASA Astrophysics Data System (ADS)
Drost, M. Kevin; Zamorski, Joseph R.
1988-11-01
This paper reports the results of a review of second law analysis techniques which can contribute to basic research in the thermal sciences. The review demonstrated that second law analysis has a role in basic thermal science research. Unlike traditional techniques, second law analysis accurately identifies the sources and location of thermodynamic losses. This allows the development of innovative solutions to thermal science problems by directing research to the key technical issues. Two classes of second law techniques were identified as being particularly useful. First, system and component investigations can provide information of the source and nature of irreversibilities on a macroscopic scale. This information will help to identify new research topics and will support the evaluation of current research efforts. Second, the differential approach can provide information on the causes and spatial and temporal distribution of local irreversibilities. This information enhances the understanding of fluid mechanics, thermodynamics, and heat and mass transfer, and may suggest innovative methods for reducing irreversibilities.
Dwairy, Mai N.; Kendall, Nicholas
2002-01-01
Objectives: The objective is to study how the staff who purchase health care services for a large national government accident-compensation system seek information on treatment effectiveness, how they assess the quality of that information, whether they question the information sources they choose, and how familiar they are with the key concepts of evidence-based health care (EBHC). Method: Staff (22 out of 34) of the health purchasing division of the New Zealand Accident Compensation Corporation (NZ ACC) were interviewed using eight preformatted questions to which they could provide open and multiple answers. Responses were subsequently codified into typologies for quantitative analysis. Results: Most respondents report that they assess the effectiveness of a treatment by accessing published information (nonhuman sources), by consulting others (human sources), or by both means. They assess the quality of information mostly by consulting others, and the second-highest proportion of responses state that they do not know how to evaluate the quality of information. No clear preference emerges with respect to the types of information needed to determine the effectiveness of treatments. The majority of the staff believes they can access information needed to determine treatment effectiveness through the Internet or information databases such as MEDLINE. Although most said they understand the key concepts of EBHC, only five out of twenty-two were able to accurately describe them. Conclusions: The findings suggest that there is a low level of awareness among the staff of the NZ ACC regarding the use of evidence and understanding of the key concepts of EBHC. Many surveyed staff members lack the skills or training to directly question information about effectiveness of a treatment. They have little idea of the information required to determine the effectiveness of a treatment, and the majority appears to lack the skills to evaluate the health care literature. PMID:11999181
Document co-citation analysis to enhance transdisciplinary research
Trujillo, Caleb M.; Long, Tammy M.
2018-01-01
Specialized and emerging fields of research infrequently cross disciplinary boundaries and would benefit from frameworks, methods, and materials informed by other fields. Document co-citation analysis, a method developed by bibliometric research, is demonstrated as a way to help identify key literature for cross-disciplinary ideas. To illustrate the method in a useful context, we mapped peer-recognized scholarship related to systems thinking. In addition, three procedures for validation of co-citation networks are proposed and implemented. This method may be useful for strategically selecting information that can build consilience about ideas and constructs that are relevant across a range of disciplines. PMID:29308433
LEEBENS-MACK, JIM; VISION, TODD; BRENNER, ERIC; BOWERS, JOHN E.; CANNON, STEVEN; CLEMENT, MARK J.; CUNNINGHAM, CLIFFORD W.; dePAMPHILIS, CLAUDE; deSALLE, ROB; DOYLE, JEFF J.; EISEN, JONATHAN A.; GU, XUN; HARSHMAN, JOHN; JANSEN, ROBERT K.; KELLOGG, ELIZABETH A.; KOONIN, EUGENE V.; MISHLER, BRENT D.; PHILIPPE, HERVÉ; PIRES, J. CHRIS; QIU, YIN-LONG; RHEE, SEUNG Y.; SJÖLANDER, KIMMEN; SOLTIS, DOUGLAS E.; SOLTIS, PAMELA S.; STEVENSON, DENNIS W.; WALL, KERR; WARNOW, TANDY; ZMASEK, CHRISTIAN
2011-01-01
In the eight years since phylogenomics was introduced as the intersection of genomics and phylogenetics, the field has provided fundamental insights into gene function, genome history and organismal relationships. The utility of phylogenomics is growing with the increase in the number and diversity of taxa for which whole genome and large transcriptome sequence sets are being generated. We assert that the synergy between genomic and phylogenetic perspectives in comparative biology would be enhanced by the development and refinement of minimal reporting standards for phylogenetic analyses. Encouraged by the development of the Minimum Information About a Microarray Experiment (MIAME) standard, we propose a similar roadmap for the development of a Minimal Information About a Phylogenetic Analysis (MIAPA) standard. Key in the successful development and implementation of such a standard will be broad participation by developers of phylogenetic analysis software, phylogenetic database developers, practitioners of phylogenomics, and journal editors. PMID:16901231
Hunger mapping: food insecurity and vulnerability information.
1997-12-01
Save the Children Foundation (SCF), a nongovernmental organization (NGO), developed the "household food economy analysis" to assess the needs of an area or population facing acute food insecurity. This method considers all of the ways people secure access to food and illustrates the distribution of various food supplies in pie charts that allow comparison of the percentage contribution of each option during a normal year and a "bad" year. Data are gathered through the use of key informants, and the analysis permits identification of ways to support local initiatives and to target assistance. As a result of this work, SCF and another NGO, Helen Keller International, attended a March 1997 expert consultation organized by the UN Food and Agriculture Organization (FAO) to create a workplan for the Food Insecurity and Vulnerability Information and Mapping System (FIVIMS) called for in the World Food Summit Plan of Action. The consultation adopted use of the FAO's food and balance sheet approach, despite its limitations, and determined that indicators should be location- and time-specific as well as 1) simple and reliable, 2) readily available, 3) social and anthropometric, and 4) found at all levels. The consultation also recommended combination of the key informant and the indicator approach to data collection. Finally, the consultation identified appropriate actions that should be accomplished before the 1998 meeting of the FAO's Committee on World Food Security.
Pumar-Méndez, María J; Mujika, Agurtzane; Regaira, Elena; Vassilev, Ivaylo; Portillo, Mari Carmen; Foss, Christina; Todorova, Elka; Roukova, Poli; Ruud Knutsen, Ingrid A; Serrano, Manuel; Lionis, Christos; Wensing, Michel; Rogers, Anne
2017-06-01
The spread of self-care holds the promise of containing chronic illness burden. Falling within the framework of a FP7 collaborative research project, this paper reports the views of key informants from six countries regarding who the main stakeholders are at different levels in the support system for self-care for patients with chronic illness (SSSC) and how they accomplish their role and collaborate. 90 Interviews with purposefully selected key informants from Bulgaria, Greece, the Netherlands, Norway, Spain and United Kingdom were conducted. Interviews involved government and local authorities, politicians, academics, health professionals and private sector representatives. Interviewers followed an expert opinion-based guide. Analysis involved a cross-country examination with thematic analysis and framework method techniques. Key informants described the ideal SSSC as inclusive, interdependent and patient-centred. The following main stakeholders in SSSC were identified: patients, governments, health-care professionals, associations, private companies and the media. In the current SSSCs, collaboration among stakeholders within and across different levels was said to be lacking. Patients were seen as playing a passive subordinate role based on the following: their own attitudes; the paternalistic and medicalized attitudes of the health-care professionals; their misrepresentation by patient associations; and their exposure to the damaging influences of media and industries. Making SSSC patient-centred constitutes the greatest challenge for European authorities. Strategies must be revised for promoting patient participation. They should undergo changes so as to promote industry and media social responsibility and patient association advocacy capacity. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.
A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.
Ali, Aftab; Khan, Farrukh Aslam
2014-05-01
Information and communication technologies have thrived over the last few years. Healthcare systems have also benefited from this progression. A wireless body area network (WBAN) consists of small, low-power sensors used to monitor human physiological values remotely, which enables physicians to remotely monitor the health of patients. Communication security in WBANs is essential because it involves human physiological data. Key agreement and authentication are the primary issues in the security of WBANs. To agree upon a common key, the nodes exchange information with each other using wireless communication. This information exchange process must be secure enough or the information exchange should be minimized to a certain level so that if information leak occurs, it does not affect the overall system. Most of the existing solutions for this problem exchange too much information for the sake of key agreement; getting this information is sufficient for an attacker to reproduce the key. Set reconciliation is a technique used to reconcile two similar sets held by two different hosts with minimal communication complexity. This paper presents a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The proposed scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from the electrocardiogram (EKG) feature set of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Because of the limited information exchange, if an attacker gets the information in any way, he/she will not be able to reproduce the key. The proposed scheme mitigates replay, selective forwarding, and denial of service attacks using a challenge-response authentication mechanism. The simulation results show that the proposed scheme has a great deal of adoptability in terms of security, communication overhead, and running time complexity, as compared to the existing EKG-based key agreement scheme.
Addressing critical issues in the development of an Oncology Information System.
Urda, D; Ribelles, N; Subirats, J L; Franco, L; Alba, E; Jerez, J M
2013-05-01
This paper presents the experience on the design and implementation of a user-centered Oncology Information System developed for the Medical Oncology Department at the "Hospital Universitario Virgen de la Victoria", in Málaga, Spain. The project focused on the aspects considered in the literature as critical factors for a successful deployment and usage of a health information system. System usability, adequate technology, integration of clinical routines, real-time statistical analysis of data, information confidentiality and standard protocol-based external interconnection were the key aspects considered. The developed system is based on a web application with a modular and layered architecture accounting for usability, ease of maintenance and further system development. Evaluation of system usability was carried at three and fifteen months after system deployment to analyze the advantages/disadvantages experienced by the end-users. A thorough prior analysis of clinical activities and workflows, the use of the adequate technology, and the availability of data analysis tools will almost guarantee success in the deployment of an Oncology Information System. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Principles and tools for collaborative entity-based intelligence analysis.
Bier, Eric A; Card, Stuart K; Bodnar, John W
2010-01-01
Software tools that make it easier for analysts to collaborate as a natural part of their work will lead to better analysis that is informed by more perspectives. We are interested to know if software tools can be designed that support collaboration even as they allow analysts to find documents and organize information (including evidence, schemas, and hypotheses). We have modified the Entity Workspace system, described previously, to test such designs. We have evaluated the resulting design in both a laboratory study and a study where it is situated with an analysis team. In both cases, effects on collaboration appear to be positive. Key aspects of the design include an evidence notebook optimized for organizing entities (rather than text characters), information structures that can be collapsed and expanded, visualization of evidence that emphasizes events and documents (rather than emphasizing the entity graph), and a notification system that finds entities of mutual interest to multiple analysts. Long-term tests suggest that this approach can support both top-down and bottom-up styles of analysis.
Kananura, Rornald Muhumuza; Ekirapa-Kiracho, Elizabeth; Paina, Ligia; Bumba, Ahmed; Mulekwa, Godfrey; Nakiganda-Busiku, Dinah; Oo, Htet Nay Lin; Kiwanuka, Suzanne Namusoke; George, Asha; Peters, David H
2017-12-28
The use of participatory monitoring and evaluation (M&E) approaches is important for guiding local decision-making, promoting the implementation of effective interventions and addressing emerging issues in the course of implementation. In this article, we explore how participatory M&E approaches helped to identify key design and implementation issues and how they influenced stakeholders' decision-making in eastern Uganda. The data for this paper is drawn from a retrospective reflection of various M&E approaches used in a maternal and newborn health project that was implemented in three districts in eastern Uganda. The methods included qualitative and quantitative M&E techniques such as key informant interviews, formal surveys and supportive supervision, as well as participatory approaches, notably participatory impact pathway analysis. At the design stage, the M&E approaches were useful for identifying key local problems and feasible local solutions and informing the activities that were subsequently implemented. During the implementation phase, the M&E approaches provided evidence that informed decision-making and helped identify emerging issues, such as weak implementation by some village health teams, health facility constraints such as poor use of standard guidelines, lack of placenta disposal pits, inadequate fuel for the ambulance at some facilities, and poor care for low birth weight infants. Sharing this information with key stakeholders prompted them to take appropriate actions. For example, the sub-county leadership constructed placenta disposal pits, the district health officer provided fuel for ambulances, and health workers received refresher training and mentorship on how to care for newborns. Diverse sources of information and perspectives can help researchers and decision-makers understand and adapt evidence to contexts for more effective interventions. Supporting districts to have crosscutting, routine information generating and sharing platforms that bring together stakeholders from different sectors is therefore crucial for the successful implementation of complex development interventions.
Biocuration at the Saccharomyces genome database.
Skrzypek, Marek S; Nash, Robert S
2015-08-01
Saccharomyces Genome Database is an online resource dedicated to managing information about the biology and genetics of the model organism, yeast (Saccharomyces cerevisiae). This information is derived primarily from scientific publications through a process of human curation that involves manual extraction of data and their organization into a comprehensive system of knowledge. This system provides a foundation for further analysis of experimental data coming from research on yeast as well as other organisms. In this review we will demonstrate how biocuration and biocurators add a key component, the biological context, to our understanding of how genes, proteins, genomes and cells function and interact. We will explain the role biocurators play in sifting through the wealth of biological data to incorporate and connect key information. We will also discuss the many ways we assist researchers with their various research needs. We hope to convince the reader that manual curation is vital in converting the flood of data into organized and interconnected knowledge, and that biocurators play an essential role in the integration of scientific information into a coherent model of the cell. © 2015 Wiley Periodicals, Inc.
Biocuration at the Saccharomyces Genome Database
Skrzypek, Marek S.; Nash, Robert S.
2015-01-01
Saccharomyces Genome Database is an online resource dedicated to managing information about the biology and genetics of the model organism, yeast (Saccharomyces cerevisiae). This information is derived primarily from scientific publications through a process of human curation that involves manual extraction of data and their organization into a comprehensive system of knowledge. This system provides a foundation for further analysis of experimental data coming from research on yeast as well as other organisms. In this review we will demonstrate how biocuration and biocurators add a key component, the biological context, to our understanding of how genes, proteins, genomes and cells function and interact. We will explain the role biocurators play in sifting through the wealth of biological data to incorporate and connect key information. We will also discuss the many ways we assist researchers with their various research needs. We hope to convince the reader that manual curation is vital in converting the flood of data into organized and interconnected knowledge, and that biocurators play an essential role in the integration of scientific information into a coherent model of the cell. PMID:25997651
Facilitating factors and barriers to malaria research utilization for policy development in Malawi.
Mwendera, Chikondi A; de Jager, Christiaan; Longwe, Herbert; Phiri, Kamija; Hongoro, Charles; Mutero, Clifford M
2016-10-19
Research on various determinants of health is key in providing evidence for policy development, thereby leading to successful interventions. Utilization of research is an intricate process requiring an understanding of contextual factors. The study was conducted to assess enhancing factors and barriers of research utilization for malaria policy development in Malawi. Qualitative research approach was used through in-depth interviews with 39 key informants that included malaria researchers, policy makers, programme managers, and key stakeholders. Purposive sampling and snowballing techniques were used in identifying key informants. Interview transcripts were entered in QSR Nvivo 11 software for coding and analysis. Respondents identified global efforts as key in advancing knowledge translation, while local political will has been conducive for research utilization. Other factors were availability of research, availability of diverse local researchers and stakeholders supporting knowledge translation. While barriers included: lack of platforms for researcher-public engagement, politics, researchers' lack of communication skills, lack of research collaborations, funder driven research, unknown World Health Organization policy position, and the lack of a malaria research repository. Overall, the study identified facilitating factors to malaria research utilization for policy development in Malawi. These factors need to be systematically coordinated to address the identified barriers and improve on malaria research utilization in policy development. Malaria research can be key in the implementation of evidence-based interventions to reduce the malaria burden and assist in the paradigm shift from malaria control to elimination in Malawi.
A New Color Image Encryption Scheme Using CML and a Fractional-Order Chaotic System
Wu, Xiangjun; Li, Yang; Kurths, Jürgen
2015-01-01
The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML) and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. The key space analysis, various statistical analysis, information entropy analysis, differential analysis and key sensitivity analysis are introduced to test the security of the new image encryption algorithm. The cryptosystem speed is analyzed and tested as well. Experimental results confirm that, in comparison to other image encryption schemes, the new algorithm has higher security and is fast for practical image encryption. Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique. Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks. PMID:25826602
Qualitative analysis of the dynamics of policy design and implementation in hospital funding reform
Brown, Adalsteinn D.; Evans, Jenna M.; Marani, Husayn; Russell, Kirstie K.; Martin, Danielle; Ivers, Noah M.
2018-01-01
Background As in many health care systems, some Canadian jurisdictions have begun shifting away from global hospital budgets. Payment for episodes of care has begun to be implemented. Starting in 2012, the Province of Ontario implemented hospital funding reforms comprising three elements: Global Budgets; Health Based Allocation Method (HBAM); and Quality-Based Procedures (QBP). This evaluation focuses on implementation of QBPs, a procedure/diagnosis-specific funding approach involving a pre-set price per episode of care coupled with best practice clinical pathways. We examined whether or not there was consensus in understanding of the program theory underpinning QBPs and how this may have influenced full and effective implementation of this innovative funding model. Methods We undertook a formative evaluation of QBP implementation. We used an embedded case study method and in-depth, one-on-one, semi-structured, telephone interviews with key informants at three levels of the health care system: Designers (those who designed the QBP policy); Adoption Supporters (organizations and individuals supporting adoption of QBPs); and Hospital Implementers (those responsible for QBP implementation in hospitals). Thematic analysis involved an inductive approach, incorporating Framework analysis to generate descriptive and explanatory themes that emerged from the data. Results Five main findings emerged from our research: (1) Unbeknownst to most key informants, there was neither consistency nor clarity over time among QBP designers in their understanding of the original goal(s) for hospital funding reform; (2) Prior to implementation, the intended hospital funding mechanism transitioned from ABF to QBPs, but most key informants were either unaware of the transition or believe it was intentional; (3) Perception of the primary goal(s) of the policy reform continues to vary within and across all levels of key informants; (4) Four years into implementation, the QBP funding mechanism remains misunderstood; and (5) Ongoing differences in understanding of QBP goals and funding mechanism have created challenges with implementation and difficulties in measuring success. Conclusions Policy drift and policy layering affected both the goal and the mechanism of action of hospital funding reform. Lack of early specification in both policy goals and hospital funding mechanism exposed the reform to reactive changes that did not reflect initial intentions. Several challenges further exacerbated implementation of complex hospital funding reforms, including a prolonged implementation schedule, turnover of key staff, and inconsistent messaging over time. These factors altered the trajectory of the hospital funding reforms and created confusion amongst those responsible for implementation. Enacting changes to hospital funding policy through a process that is transparent, collaborative, and intentional may increase the likelihood of achieving intended effects. PMID:29373587
Using wind plant data to increase reliability.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peters, Valerie A.; Ogilvie, Alistair B.; McKenney, Bridget L.
2011-01-01
Operators interested in improving reliability should begin with a focus on the performance of the wind plant as a whole. To then understand the factors which drive individual turbine performance, which together comprise the plant performance, it is necessary to track a number of key indicators. Analysis of these key indicators can reveal the type, frequency, and cause of failures and will also identify their contributions to overall plant performance. The ideal approach to using data to drive good decisions includes first determining which critical decisions can be based on data. When those required decisions are understood, then the analysismore » required to inform those decisions can be identified, and finally the data to be collected in support of those analyses can be determined. Once equipped with high-quality data and analysis capabilities, the key steps to data-based decision making for reliability improvements are to isolate possible improvements, select the improvements with largest return on investment (ROI), implement the selected improvements, and finally to track their impact.« less
Initial sequencing and comparative analysis of the mouse genome
DOE Office of Scientific and Technical Information (OSTI.GOV)
Waterston, Robert H.; Lindblad-Toh, Kerstin; Birney, Ewan
2002-12-15
The sequence of the mouse genome is a key informational tool for understanding the contents of the human genome and a key experimental tool for biomedical research. Here, we report the results of an international collaboration to produce a high-quality draft sequence of the mouse genome. We also present an initial comparative analysis of the mouse and human genomes, describing some of the insights that can be gleaned from the two sequences. We discuss topics including the analysis of the evolutionary forces shaping the size, structure and sequence of the genomes; the conservation of large-scale synteny across most of themore » genomes; the much lower extent of sequence orthology covering less than half of the genomes; the proportions of the genomes under selection; the number of protein-coding genes; the expansion of gene families related to reproduction and immunity; the evolution of proteins; and the identification of intraspecies polymorphism.« less
Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current
NASA Astrophysics Data System (ADS)
Hayashi, Yu-Ichi; Homma, Naofumi; Mizuki, Takaaki; Sugawara, Takeshi; Kayano, Yoshiki; Aoki, Takafumi; Minegishi, Shigeki; Satoh, Akashi; Sone, Hideaki; Inoue, Hiroshi
This paper presents a possibility of Electromagnetic (EM) analysis against cryptographic modules outside their security boundaries. The mechanism behind the information leakage is explained from the view point of Electromagnetic Compatibility: electric fluctuation released from cryptographic modules can conduct to peripheral circuits based on ground bounce, resulting in radiation. We demonstrate the consequence of the mechanism through experiments where the ISO/IEC standard block cipher AES (Advanced Encryption Standard) is implemented on an FPGA board and EM radiations from power and communication cables are measured. Correlation Electromagnetic Analysis (CEMA) is conducted in order to evaluate the information leakage. The experimental results show that secret keys are revealed even though there are various disturbing factors such as voltage regulators and AC/DC converters between the target module and the measurement points. We also discuss information-suppression techniques as electrical-level countermeasures against such CEMAs.
What Makes for Good Workplace Learning? At a Glance.
ERIC Educational Resources Information Center
National Centre for Vocational Education Research, Leabrook (Australia).
Workplace learning, both formal and informal, is taking on an increasingly important role in the education and training of the workforce. Based on an analysis of recent research on workplace learning in Australia, in an 'ideal' workplace learning situation enterprises would have in place the elements outlined in the following key findings: (1)…
NASA Astrophysics Data System (ADS)
Fei, Jia-Rui; Huang, Yong-Qing; Liu, You-Xin; Liu, Kai; Duan, Xiao-Feng; Ren, Xiao-Min
2017-11-01
Not Available Supported by the National Natural Science Foundation of China under Grant Nos 61574019, 61674018 and 61674020, the Fund of State Key Laboratory of Information Photonics and Optical Communications, and the Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No 20130005130001.
Equivalent Expressions Using CAS and Paper-and-Pencil Techniques
ERIC Educational Resources Information Center
Fonger, Nicole L.
2014-01-01
How can the key concept of equivalent expressions be addressed so that students strengthen their representational fluency with symbols, graphs, and numbers? How can research inform the synergistic use of both paper-and-pencil analysis and computer algebra systems (CAS) in a classroom learning environment? These and other related questions have…
ERIC Educational Resources Information Center
Fretwell, David H.; Lewis, Morgan V.; Deij, Arjen
The key issues, alternatives, and implications for developing countries to consider when designing systems to define occupational standards, related training standards, and assessments were analyzed. The analysis focused on the following issues: the rationale for development of standards; clarification of definitions, terminology, and assumptions;…
Starting Strong 2017: Key OECD Indicators on Early Childhood Education and Care
ERIC Educational Resources Information Center
OECD Publishing, 2017
2017-01-01
Early childhood education and care (ECEC) can help lay the foundations for future skills development, well-being and learning. Having timely, reliable and comparable international information is essential to help countries improve their ECEC services and systems. For over 15 years, the OECD has been conducting policy analysis and gathering new…
What Do People Know about Key Environmental Issues? A Review of Environmental Knowledge Surveys
ERIC Educational Resources Information Center
Robelia, Beth; Murphy, Tony
2012-01-01
This paper presents results from 15 little publicized state and national environmental surveys in the US that used similar questions. Our analysis reveals trends in adult understanding of environmental issues. These trends indicate that many may have difficulty making informed decisions about environmental policy as citizens, voters, and…
Time Is Precious: Variable- and Event-Centred Approaches to Process Analysis in CSCL Research
ERIC Educational Resources Information Center
Reimann, Peter
2009-01-01
Although temporality is a key characteristic of the core concepts of CSCL--interaction, communication, learning, knowledge building, technology use--and although CSCL researchers have privileged access to process data, the theoretical constructs and methods employed in research practice frequently neglect to make full use of information relating…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-20
... Social Security number, date of birth, driver's license number or other state identification number or... information such as costs, sales statistics, inventories, formulas, patterns, devices, manufacturing processes... consumer credit. It also requires that if any finance charge is advertised, the rate be stated as an...
Promoting College Students' Problem Understanding Using Schema-Emphasizing Worked Examples
ERIC Educational Resources Information Center
Yan, Jie; Lavigne, Nancy C.
2014-01-01
Statistics learners often bypass the critical step of understanding a problem before executing solutions. Worked-out examples that identify problem information (e.g., data type, number of groups, purpose of analysis) key to determining a solution (e.g., "t" test, chi-square, correlation) can address this concern. The authors examined the…
Embedding Enterprise: A Business School Undergraduate Course with an Enterprise Focus
ERIC Educational Resources Information Center
Jones, Paul; Jones, Amanda; Skinner, Heather; Packham, Gary
2013-01-01
This study profiles, through a case study of an undergraduate business programme, how a business school has embedded the theme of enterprise in its core undergraduate programme. Key participants in the development of the strategy and programme tutors and students were interviewed, to provide information for an analysis of the principle objectives…
ERIC Educational Resources Information Center
Kemp, Matthew W.; Molloy, Timothy J.; Pajic, Marina; Chapman, Elaine
2013-01-01
Little attention has been paid to the scholarship of doctoral education in the biomedical sciences, hindering the formulation of research-informed improvements to this important area of higher education. We present an analysis of interview data from Australian PhD students and suggest that relationships between students and their…
DOT National Transportation Integrated Search
1978-03-01
The role of suppliers to the auto industry in promoting innovation is explored. Thirty-two innovations are investigated, and information on their success/failure, area of impact, and key decision points is generated. Based on this data base, barriers...
A Survey and Analysis of Access Control Architectures for XML Data
2006-03-01
13 4. XML Query Engines ...castle and the drawbridge over the moat. Extending beyond the visual analogy, there are many key components to the protection of information and...technology. While XML’s original intent was to enable large-scale electronic publishing over the internet, its functionality is firmly rooted in its
Physical Space and the Resource-Based View of the College
ERIC Educational Resources Information Center
Fugazzotto, Sam J.
2010-01-01
Space serves as a key resource for colleges and universities, and institutions exchange information about it with each other and with prospective students. Using content analysis to examine several widely circulated publications, this study looked for differences in the value attributed to space when institutional leaders present it to students…
Introducing a Personal Learning Environment in Higher Education. An Analysis of Connectivity
ERIC Educational Resources Information Center
Saz, Alexandra; Engel, Anna; Coll, César
2016-01-01
Universities have a key role to play in the progress and development of the Knowledge Society. They should lead the way in the design of teaching strategies that promote knowledge building. Personal learning environments (PLE) represent a groundbreaking new development in educational practices through the incorporation of Information and…
ERIC Educational Resources Information Center
Carver, Rebecca Bruu; Wiese, Eline Fatima; Breivik, Jarle
2014-01-01
After completion of formal education, the mass media represent people's primary source of scientific information. Besides the traditional attention to scientific knowledge, national curricula are therefore increasingly emphasizing critical and reflexive engagement with media content as a key objective of science education. Despite this curricular…
A Holistic Approach to Scoring in Complex Mobile Learning Scenarios
ERIC Educational Resources Information Center
Gebbe, Marcel; Teine, Matthias; Beutner, Marc
2016-01-01
Interactive dialogues are key elements for designing authentic and motivating learning situations, and in combination with learning analysis they provide educators and users with the opportunity to track information related to professional competences, but mind-sets as well. This paper offers exemplary insights into the project NetEnquiry that is…
ERIC Educational Resources Information Center
Su, C. Y.; Wang, T. I.
2010-01-01
The rapid advance of information and communication technologies (ICT) has important impacts on teaching and learning, as well as on the educational assessment. Teachers may create assessments utilizing some developed assessment software or test authoring tools. However, problems could occur, such as neglecting key concepts in the curriculum or…
Family Involvement in Creative Teaching Practices for All in Small Rural Schools
ERIC Educational Resources Information Center
Vigo Arrazola, Begoña; Soriano Bozalongo, Juana
2015-01-01
Parental involvement is interpreted as a key form of support that can contribute to the establishment of inclusive practices in schools, but this can be difficult in sparsely populated areas. Using ethnographic methods of participant observation, informal conversations and document analysis, this article therefore focuses on family involvement…
GenoBase: comprehensive resource database of Escherichia coli K-12
Otsuka, Yuta; Muto, Ai; Takeuchi, Rikiya; Okada, Chihiro; Ishikawa, Motokazu; Nakamura, Koichiro; Yamamoto, Natsuko; Dose, Hitomi; Nakahigashi, Kenji; Tanishima, Shigeki; Suharnan, Sivasundaram; Nomura, Wataru; Nakayashiki, Toru; Aref, Walid G.; Bochner, Barry R.; Conway, Tyrrell; Gribskov, Michael; Kihara, Daisuke; Rudd, Kenneth E.; Tohsato, Yukako; Wanner, Barry L.; Mori, Hirotada
2015-01-01
Comprehensive experimental resources, such as ORFeome clone libraries and deletion mutant collections, are fundamental tools for elucidation of gene function. Data sets by omics analysis using these resources provide key information for functional analysis, modeling and simulation both in individual and systematic approaches. With the long-term goal of complete understanding of a cell, we have over the past decade created a variety of clone and mutant sets for functional genomics studies of Escherichia coli K-12. We have made these experimental resources freely available to the academic community worldwide. Accordingly, these resources have now been used in numerous investigations of a multitude of cell processes. Quality control is extremely important for evaluating results generated by these resources. Because the annotation has been changed since 2005, which we originally used for the construction, we have updated these genomic resources accordingly. Here, we describe GenoBase (http://ecoli.naist.jp/GB/), which contains key information about comprehensive experimental resources of E. coli K-12, their quality control and several omics data sets generated using these resources. PMID:25399415
Chen, Si; Weddell, Jared; Gupta, Pavan; Conard, Grace; Parkin, James; Imoukhuede, Princess I
2017-01-01
Nanosensor-based detection of biomarkers can improve medical diagnosis; however, a critical factor in nanosensor development is deciding which biomarker to target, as most diseases present several biomarkers. Biomarker-targeting decisions can be informed via an understanding of biomarker expression. Currently, immunohistochemistry (IHC) is the accepted standard for profiling biomarker expression. While IHC provides a relative mapping of biomarker expression, it does not provide cell-by-cell readouts of biomarker expression or absolute biomarker quantification. Flow cytometry overcomes both these IHC challenges by offering biomarker expression on a cell-by-cell basis, and when combined with calibration standards, providing quantitation of biomarker concentrations: this is known as qFlow cytometry. Here, we outline the key components for applying qFlow cytometry to detect biomarkers within the angiogenic vascular endothelial growth factor receptor family. The key aspects of the qFlow cytometry methodology include: antibody specificity testing, immunofluorescent cell labeling, saturation analysis, fluorescent microsphere calibration, and quantitative analysis of both ensemble and cell-by-cell data. Together, these methods enable high-throughput quantification of biomarker expression.
Understanding small business engagement in workplace violence prevention programs.
Bruening, Rebecca A; Strazza, Karen; Nocera, Maryalice; Peek-Asa, Corinne; Casteel, Carri
2015-01-01
Worksite wellness, safety, and violence prevention programs have low penetration among small, independent businesses. This study examined barriers and strategies influencing small business participation in workplace violence prevention programs (WVPPs). A semistructured interview guide was used in 32 telephone interviews. The study took place at the University of North Carolina Injury Prevention Research Center. Participating were a purposive sample of 32 representatives of small business-serving organizations (e.g., business membership organizations, regulatory agencies, and economic development organizations) selected for their experience with small businesses. This study was designed to inform improved dissemination of Crime Free Business (CFB), a WVPP for small, independent retail businesses. Thematic qualitative data analysis was used to identify key barriers and strategies for promoting programs and services to small businesses. Three key factors that influence small business engagement emerged from the analysis: (1) small businesses' limited time and resources, (2) low salience of workplace violence, (3) influence of informal networks and source credibility. Identified strategies include designing low-cost and convenient programs, crafting effective messages, partnering with influential organizations and individuals, and conducting outreach through informal networks. Workplace violence prevention and public health practitioners may increase small business participation in programs by reducing time and resource demands, addressing small business concerns, enlisting support from influential individuals and groups, and emphasizing business benefits of participating in the program.
Automatic generation of pictorial transcripts of video programs
NASA Astrophysics Data System (ADS)
Shahraray, Behzad; Gibbon, David C.
1995-03-01
An automatic authoring system for the generation of pictorial transcripts of video programs which are accompanied by closed caption information is presented. A number of key frames, each of which represents the visual information in a segment of the video (i.e., a scene), are selected automatically by performing a content-based sampling of the video program. The textual information is recovered from the closed caption signal and is initially segmented based on its implied temporal relationship with the video segments. The text segmentation boundaries are then adjusted, based on lexical analysis and/or caption control information, to account for synchronization errors due to possible delays in the detection of scene boundaries or the transmission of the caption information. The closed caption text is further refined through linguistic processing for conversion to lower- case with correct capitalization. The key frames and the related text generate a compact multimedia presentation of the contents of the video program which lends itself to efficient storage and transmission. This compact representation can be viewed on a computer screen, or used to generate the input to a commercial text processing package to generate a printed version of the program.
Nelson, Victoria; Nelson, Victoria Ruth; Li, Fiona; Green, Susan; Tamura, Tomoyoshi; Liu, Jun-Min; Class, Margaret
2008-11-06
The Walter Reed National Surgical Quality Improvement Program Data Transfer web module integrates with medical and surgical information systems, and leverages outside standards, such as the National Library of Medicine's RxNorm, to process surgical and risk assessment data. Key components of the project included a needs assessment with nurse reviewers and a data analysis for federated (standards were locally controlled) data sources. The resulting interface streamlines nurse reviewer workflow by integrating related tasks and data.
Computational Astrophysics Towards Exascale Computing and Big Data
NASA Astrophysics Data System (ADS)
Astsatryan, H. V.; Knyazyan, A. V.; Mickaelian, A. M.
2016-06-01
Traditionally, Armenia has a leading position both within the computer science and Information Technology and Astronomy and Astrophysics sectors in the South Caucasus region and beyond. For instance recent years Information Technology (IT) became one of the fastest growing industries of the Armenian economy (EIF 2013). The main objective of this article is to highlight the key activities that will spur Armenia to strengthen its computational astrophysics capacity thanks to the analysis made of the current trends of e-Infrastructures worldwide.
Bach, Laura E; Shelton, Sarah C; Moreland-Russell, Sarah; Israel, Kendre
2013-01-01
To assess the key components of smoke-free campaigns that may have influenced voting outcomes in three communities. Community case studies with content analysis of tobacco-related newspaper articles. Three semiurban Missouri communities. One hundred eighty-one articles referencing tobacco published during the campaigns and five key informant interviews. Articles were coded for type, community referenced, tobacco control position, source of quotations, use of evidence, and frame. Semistructured interviews with key informants collected additional information. Descriptive statistics were utilized to examine media coverage in each community. Key themes and events for each campaign were identified from qualitative interviews. The only community that failed to pass its initiative had the highest proportion of letters to the editor (81.1%), anti-tobacco control articles (34.2%), use of a rights frame (28.8%), no evidence used (36.9%), no neighboring communities with policies, strong Tea Party presence, and no support from the chamber of commerce. Across all communities, more articles incorporating health frames were pro-tobacco control (70.7%) and more articles with a rights frame were anti-tobacco control (62.0%), compared to other positions. Several factors can influence the policy process. Tobacco control policy advocates facing strong opposition should consider the many factors (demographics, proximity to other adopting localities, politics) driving the debate and use media as an avenue to influence the discussion, connect with the public and policymakers, and mobilize proponents.
Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne
2016-01-01
Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication. The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become critical for the inclusion of a publication or a database in a bibliometric analysis.
Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne
2016-01-01
Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication. The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become critical for the inclusion of a publication or a database in a bibliometric analysis. PMID:27635223
Webber, Whitney M.; Li, Ya-Wei
2016-01-01
Managers of large, complex wildlife conservation programs need information on the conservation status of each of many species to help strategically allocate limited resources. Oversimplifying status data, however, runs the risk of missing information essential to strategic allocation. Conservation status consists of two components, the status of threats a species faces and the species’ demographic status. Neither component alone is sufficient to characterize conservation status. Here we present a simple key for scoring threat and demographic changes for species using detailed information provided in free-form textual descriptions of conservation status. This key is easy to use (simple), captures the two components of conservation status without the cost of more detailed measures (sufficient), and can be applied by different personnel to any taxon (consistent). To evaluate the key’s utility, we performed two analyses. First, we scored the threat and demographic status of 37 species recently recommended for reclassification under the Endangered Species Act (ESA) and 15 control species, then compared our scores to two metrics used for decision-making and reports to Congress. Second, we scored the threat and demographic status of all non-plant ESA-listed species from Florida (54 spp.), and evaluated scoring repeatability for a subset of those. While the metrics reported by the U.S. Fish and Wildlife Service (FWS) are often consistent with our scores in the first analysis, the results highlight two problems with the oversimplified metrics. First, we show that both metrics can mask underlying demographic declines or threat increases; for example, ∼40% of species not recommended for reclassification had changes in threats or demography. Second, we show that neither metric is consistent with either threats or demography alone, but conflates the two. The second analysis illustrates how the scoring key can be applied to a substantial set of species to understand overall patterns of ESA implementation. The scoring repeatability analysis shows promise, but indicates thorough training will be needed to ensure consistency. We propose that large conservation programs adopt our simple scoring system for threats and demography. By doing so, program administrators will have better information to monitor program effectiveness and guide their decisions. PMID:27478713
Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung
2015-05-01
Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.
Fernandez, Paz; Delgado, Expectación; Lopez-Alonso, Mónica; Poyatos, José Manuel
2018-02-01
This article presents analyses of soil and environmental information for the Darro River basin (Granada-Spain) preliminary to its hydrological and forestry restoration. These analyses were carried out using a geographical information system (GIS) and employing a new procedure that adapts hydrological forest-restoration methods. The complete analysis encompasses morphological conditions, soil and climate characteristics as well as vegetation and land use. The study investigates soil erosion in the basin by using Universal Soil Loss Equation (USLE) and by mapping erosion fragility units. The results are presented in a set of maps and their analysis, providing the starting point for river basin management and the hydrological and forestry-restoration project that was approved at the end of 2015. The presence of soft substrates (e.g. gravel and sand) indicates that the area is susceptible to erosion, particularly the areas that are dominated by human activity and have little soil protection. Finally, land use and vegetation cover were identified as key factors in the soil erosion in the basin. According to the results, river authorities have included several measures in the restoration project aimed at reducing the erosion and helping to recover the environmental value of this river basin and to include it in recreation possibilities for the community of Granada. The presented analytical approach, designed by the authors, would be useful as a tool for environmental restoration in other small Mediterranean river basins. Copyright © 2017 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Hou, W. Z.; Li, Z. Q.; Zheng, F. X.; Qie, L. L.
2018-04-01
This paper evaluates the information content for the retrieval of key aerosol microphysical and surface properties for multispectral single-viewing satellite polarimetric measurements cantered at 410, 443, 555, 670, 865, 1610 and 2250 nm over bright land. To conduct the information content analysis, the synthetic data are simulated by the Unified Linearized Vector Radiative Transfer Model (UNLVTM) with the intensity and polarization together over bare soil surface for various scenarios. Following the optimal estimation theory, a principal component analysis method is employed to reconstruct the multispectral surface reflectance from 410 nm to 2250 nm, and then integrated with a linear one-parametric BPDF model to represent the contribution of polarized surface reflectance, thus further to decouple the surface-atmosphere contribution from the TOA measurements. Focusing on two different aerosol models with the aerosol optical depth equal to 0.8 at 550 nm, the total DFS and DFS component of each retrieval aerosol and surface parameter are analysed. The DFS results show that the key aerosol microphysical properties, such as the fine- and coarse-mode columnar volume concentration, the effective radius and the real part of complex refractive index at 550 nm, could be well retrieved with the surface parameters simultaneously over bare soil surface type. The findings of this study can provide the guidance to the inversion algorithm development over bright surface land by taking full use of the single-viewing satellite polarimetric measurements.
Dotson, G Scott; Hudson, Naomi L; Maier, Andrew
2015-01-01
Emergency Management and Operations (EMO) personnel are in need of resources and tools to assist in understanding the health risks associated with dermal exposures during chemical incidents. This article reviews available resources and presents a conceptual framework for a decision support system (DSS) that assists in characterizing and managing risk during chemical emergencies involving dermal exposures. The framework merges principles of three decision-making techniques: 1) scenario planning, 2) risk analysis, and 3) multicriteria decision analysis (MCDA). This DSS facilitates dynamic decision making during each of the distinct life cycle phases of an emergency incident (ie, preparedness, response, or recovery) and identifies EMO needs. A checklist tool provides key questions intended to guide users through the complexities of conducting a dermal risk assessment. The questions define the scope of the framework for resource identification and application to support decision-making needs. The framework consists of three primary modules: 1) resource compilation, 2) prioritization, and 3) decision. The modules systematically identify, organize, and rank relevant information resources relating to the hazards of dermal exposures to chemicals and risk management strategies. Each module is subdivided into critical elements designed to further delineate the resources based on relevant incident phase and type of information. The DSS framework provides a much needed structure based on contemporary decision analysis principles for 1) documenting key questions for EMO problem formulation and 2) a method for systematically organizing, screening, and prioritizing information resources on dermal hazards, exposures, risk characterization, and management.
Dotson, G. Scott; Hudson, Naomi L.; Maier, Andrew
2016-01-01
Emergency Management and Operations (EMO) personnel are in need of resources and tools to assist in understanding the health risks associated with dermal exposures during chemical incidents. This article reviews available resources and presents a conceptual framework for a decision support system (DSS) that assists in characterizing and managing risk during chemical emergencies involving dermal exposures. The framework merges principles of three decision-making techniques: 1) scenario planning, 2) risk analysis, and 3) multicriteria decision analysis (MCDA). This DSS facilitates dynamic decision making during each of the distinct life cycle phases of an emergency incident (ie, preparedness, response, or recovery) and identifies EMO needs. A checklist tool provides key questions intended to guide users through the complexities of conducting a dermal risk assessment. The questions define the scope of the framework for resource identification and application to support decision-making needs. The framework consists of three primary modules: 1) resource compilation, 2) prioritization, and 3) decision. The modules systematically identify, organize, and rank relevant information resources relating to the hazards of dermal exposures to chemicals and risk management strategies. Each module is subdivided into critical elements designed to further delineate the resources based on relevant incident phase and type of information. The DSS framework provides a much needed structure based on contemporary decision analysis principles for 1) documenting key questions for EMO problem formulation and 2) a method for systematically organizing, screening, and prioritizing information resources on dermal hazards, exposures, risk characterization, and management. PMID:26312660
Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming
2016-01-01
With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.
2017-01-01
Background Capacity building of the national HIV strategic information system is a core component of the response to the HIV epidemic as it enables understanding of the evolving nature of the epidemic, which is critical for program planning and identification of the gaps and deficiencies in HIV programs. Objective The study aims to describe the results of the assessment of the needs for further development of capacities in HIV strategic information systems in the non-European Union (EU) countries in the World Health Organization European Region (EUR). Methods Self-administered questionnaires were distributed to national AIDS programs. The first questionnaire was sent to all countries (N=18) to find out, among other issues, the priority level for strengthening a range of HIV surveillance areas and their key gaps and weaknesses. The second questionnaire was sent to 15 countries to more specifically determine capacities for the analysis of the HIV care cascade. Results Responses to the first questionnaire were received from 10 countries, whereas 13 countries responded to the second questionnaire. Areas that were most frequently marked as being of high to moderate priority for strengthening were national electronic patient monitoring systems, evaluation of HIV interventions and impact analysis, implementation science, and data analysis. Key weaknesseses were lack of electronic reporting of HIV cases, problems with timeliness and completeness of reporting in HIV cases, under-estimates of the reported number of HIV-related deaths, and limited CD4 count testing at the time of HIV diagnosis. Migrant populations, internally displaced persons, and refugees were most commonly mentioned as groups not covered by surveillance, followed by clients of sex workers and men who have sex with men. The majority of countries reported that they were able to provide the number of people diagnosed with HIV who know their HIV status, which is important for the analysis of cross-sectional and longitudinal HIV care cascades. Ability to report on some of the key impact indicators of HIV programs—viral load suppression and mortality—should be considerably strengthened. Conclusions The assessment found a substantial need to invest in surveillance capacities, which is a cornerstone in the development of an evidence-informed response to HIV epidemics. PMID:28645888
DNA based random key generation and management for OTP encryption.
Zhang, Yunpeng; Liu, Xin; Sun, Manhui
2017-09-01
One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.
Vesselinova, Neda; Alexandrov, Boian; Wall, Michael E.
2016-11-08
We present a dynamical model of drug accumulation in bacteria. The model captures key features in experimental time courses on ofloxacin accumulation: initial uptake; two-phase response; and long-term acclimation. In combination with experimental data, the model provides estimates of import and export rates in each phase, the time of entry into the second phase, and the decrease of internal drug during acclimation. Global sensitivity analysis, local sensitivity analysis, and Bayesian sensitivity analysis of the model provide information about the robustness of these estimates, and about the relative importance of different parameters in determining the features of the accumulation time coursesmore » in three different bacterial species: Escherichia coli, Staphylococcus aureus, and Pseudomonas aeruginosa. The results lead to experimentally testable predictions of the effects of membrane permeability, drug efflux and trapping (e.g., by DNA binding) on drug accumulation. A key prediction is that a sudden increase in ofloxacin accumulation in both E. coli and S. aureus is accompanied by a decrease in membrane permeability.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vesselinova, Neda; Alexandrov, Boian; Wall, Michael E.
We present a dynamical model of drug accumulation in bacteria. The model captures key features in experimental time courses on ofloxacin accumulation: initial uptake; two-phase response; and long-term acclimation. In combination with experimental data, the model provides estimates of import and export rates in each phase, the time of entry into the second phase, and the decrease of internal drug during acclimation. Global sensitivity analysis, local sensitivity analysis, and Bayesian sensitivity analysis of the model provide information about the robustness of these estimates, and about the relative importance of different parameters in determining the features of the accumulation time coursesmore » in three different bacterial species: Escherichia coli, Staphylococcus aureus, and Pseudomonas aeruginosa. The results lead to experimentally testable predictions of the effects of membrane permeability, drug efflux and trapping (e.g., by DNA binding) on drug accumulation. A key prediction is that a sudden increase in ofloxacin accumulation in both E. coli and S. aureus is accompanied by a decrease in membrane permeability.« less
Zhang, Yang; Shen, Jing; Li, Yu
2018-01-01
Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the Beijing-Tianjin-Hebei (BTH) region with spatial and temporal comparisons. The elaboration of the relationships between atmospheric environment vulnerability and indices of exposure, sensitivity, and adaptive capacity supports enable analysis of the atmospheric environment vulnerability. Our findings indicate that the atmospheric environment vulnerability of 13 cities in the BTH region exhibits obvious spatial heterogeneity, which is caused by regional diversity in exposure, sensitivity, and adaptive capacity indices. The results of atmospheric environment vulnerability assessment and the cause analysis can provide guidance to pick out key control regions and recognize vulnerable indicators for study sites. The framework developed in this paper can also be replicated at different spatial and temporal scales using context-specific datasets to support environmental management. PMID:29342852
Zhang, Yang; Shen, Jing; Li, Yu
2018-01-13
Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the Beijing-Tianjin-Hebei (BTH) region with spatial and temporal comparisons. The elaboration of the relationships between atmospheric environment vulnerability and indices of exposure, sensitivity, and adaptive capacity supports enable analysis of the atmospheric environment vulnerability. Our findings indicate that the atmospheric environment vulnerability of 13 cities in the BTH region exhibits obvious spatial heterogeneity, which is caused by regional diversity in exposure, sensitivity, and adaptive capacity indices. The results of atmospheric environment vulnerability assessment and the cause analysis can provide guidance to pick out key control regions and recognize vulnerable indicators for study sites. The framework developed in this paper can also be replicated at different spatial and temporal scales using context-specific datasets to support environmental management.
Zida, Andre; Lavis, John N; Sewankambo, Nelson K; Kouyate, Bocar; Moat, Kaelan; Shearer, Jessica
2017-02-13
Burkina Faso has made a number of health system policy decisions to improve performance on health indicators and strengthen responsiveness to health-related challenges. These included the creation of a General Directorate of Health Information and Statistics (DGISS) and a technical unit to coordinate performance-based financing (CT-FBR). We analysed the policymaking processes associated with the establishment of these units, and documented the factors that influenced this process. We used a multiple-case study design based on Kingdon's agenda-setting model to investigate the DGISS and CT-FBR policymaking processes. Data were collected from interviews with key informants (n = 28), published literature, policy documents (including two strategic and 230 action plans), and 55 legal/regulatory texts. Interviews were analysed using thematic qualitative analysis. Data from the documentary analysis were triangulated with the qualitative interview data. Key factors influencing the policymaking processes associated with the two units involved the 'problem' (problem identification), 'policy' (formation of policy proposals), and 'politics' (political climate/change) streams, which came together in a way that resulted in proposals being placed on the decision agenda. A number of problems with Burkina Faso's health information and financing systems were identified. Policy proposals for the DGISS and CT-FBR units were developed in response to these problems, emerging from several sources including development partners. Changes in political and public service administrations (specifically the 2008 appointment of a new Minister of Health and the establishment of a new budget allocation system), with corresponding changes in the actors and interests involved, appeared key in elevating the proposals to the decision agenda. Efforts to improve performance on health indicators and strengthen responsiveness to health-related challenges need focus on the need for a compelling problem, a viable policy, and conducive politics in order to make it to the decision agenda.
NASA Astrophysics Data System (ADS)
Gallo, J.; Sylak-Glassman, E.
2017-12-01
We will present a method for assessing interdependencies between heterogeneous Earth observation (EO) systems when applied to key Federal objectives. Using data from the National Earth Observation Assessment (EOA), we present a case study that examines the frequency that measurements from each of the Landsat 8 sensors are used in conjunction with heterogeneous measurements from other Earth observation sensors to develop data and information products. This EOA data allows us to map the most frequent interactions between Landsat measurements and measurements from other sensors, identify high-impact data and information products where these interdependencies occur, and identify where these combined measurements contribute most to meeting a key Federal objective within one of the 13 Societal Benefit Areas used in the EOA study. Using a value-tree framework to trace the application of data from EO systems to weighted key Federal objectives within the EOA study, we are able to estimate relative contribution of individual EO systems to meeting those objectives, as well as the interdependencies between measurements from all EO systems within the EOA study. The analysis relies on a modified Delphi method to elicit relative levels of reliance on individual measurements from EO systems, including combinations of measurements, from subject matter experts. This results in the identification of a representative portfolio of all EO systems used to meet key Federal objectives. Understanding the interdependencies among a heterogeneous set of measurements that modify the impact of any one individual measurement on meeting a key Federal objective, especially if the measurements originate from multiple agencies or state/local/tribal, international, academic, and commercial sources, can impact agency decision-making regarding mission requirements and inform understanding of user needs.
Considerations for the design, analysis and presentation of in vivo studies.
Ranstam, J; Cook, J A
2017-03-01
To describe, explain and give practical suggestions regarding important principles and key methodological challenges in the study design, statistical analysis, and reporting of results from in vivo studies. Pre-specifying endpoints and analysis, recognizing the common underlying assumption of statistically independent observations, performing sample size calculations, and addressing multiplicity issues are important parts of an in vivo study. A clear reporting of results and informative graphical presentations of data are other important parts. Copyright © 2016 Osteoarthritis Research Society International. Published by Elsevier Ltd. All rights reserved.
Infusing Reliability Techniques into Software Safety Analysis
NASA Technical Reports Server (NTRS)
Shi, Ying
2015-01-01
Software safety analysis for a large software intensive system is always a challenge. Software safety practitioners need to ensure that software related hazards are completely identified, controlled, and tracked. This paper discusses in detail how to incorporate the traditional reliability techniques into the entire software safety analysis process. In addition, this paper addresses how information can be effectively shared between the various practitioners involved in the software safety analyses. The author has successfully applied the approach to several aerospace applications. Examples are provided to illustrate the key steps of the proposed approach.
Key challenges in the development and implementation of telehealth projects.
Joseph, Victor; West, Robert M; Shickle, Darren; Keen, Justin; Clamp, Susan
2011-01-01
A literature review was carried out to identify the key challenges in the implementation of telehealth. This was followed by a survey of organisations in England involved in telehealth projects in order to understand the challenges they faced. Ten of the 13 health or local authority organisations surveyed had telehealth projects and three were at the planning stage. The analysis revealed seven key challenges facing implementers of telehealth in England. Based on the findings from the literature review and the survey, a model was constructed and a checklist drawn up. The model contained the following elements: identifying issues, needs and partners; producing a strategy; securing funding; implementing changes; and monitoring and evaluating a telehealth project. The checklist was validated by using key informants from the organisations originally surveyed. The checklist may be useful to guide telehealth development and implementation in the future.
Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B
2014-09-15
Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.
service line analytics in the new era.
Spence, Jay; Seargeant, Dan
2015-08-01
To succeed under the value-based business model, hospitals and health systems require effective service line analytics that combine inpatient and outpatient data and that incorporate quality metrics for evaluating clinical operations. When developing a framework for collection, analysis, and dissemination of service line data, healthcare organizations should focus on five key aspects of effective service line analytics: Updated service line definitions. Ability to analyze and trend service line net patient revenues by payment source. Access to accurate service line cost information across multiple dimensions with drill-through capabilities. Ability to redesign key reports based on changing requirements. Clear assignment of accountability.
Arctic melt ponds and bifurcations in the climate system
NASA Astrophysics Data System (ADS)
Sudakov, I.; Vakulenko, S. A.; Golden, K. M.
2015-05-01
Understanding how sea ice melts is critical to climate projections. In the Arctic, melt ponds that develop on the surface of sea ice floes during the late spring and summer largely determine their albedo - a key parameter in climate modeling. Here we explore the possibility of a conceptual sea ice climate model passing through a bifurcation point - an irreversible critical threshold as the system warms, by incorporating geometric information about melt pond evolution. This study is based on a bifurcation analysis of the energy balance climate model with ice-albedo feedback as the key mechanism driving the system to bifurcation points.
The Evaluation of Vehicle Mass Reduction and Material ...
Developments in the realm of lightweight materials for automotive use continue to be announced by the industry and by academia. This session will provide new and updated information on new generation of materials. Additionally, this session will focus on the key topics involved in Life-Cycle-Analysis of light-weight materials including practices and developments in material recyclability. This presentation will review key findings from recent LCAs for vehicle mass reduction. Presentation for panel session on advanced materials/lightweighting for light duty vehicles at the Society of Automotive Engineers (SAE) Government/Industry Meeting, Washington, DC (January 25, 2017)
Parameter as a Switch Between Dynamical States of a Network in Population Decoding.
Yu, Jiali; Mao, Hua; Yi, Zhang
2017-04-01
Population coding is a method to represent stimuli using the collective activities of a number of neurons. Nevertheless, it is difficult to extract information from these population codes with the noise inherent in neuronal responses. Moreover, it is a challenge to identify the right parameter of the decoding model, which plays a key role for convergence. To address the problem, a population decoding model is proposed for parameter selection. Our method successfully identified the key conditions for a nonzero continuous attractor. Both the theoretical analysis and the application studies demonstrate the correctness and effectiveness of this strategy.
Network analysis to detect common strategies in Italian foreign direct investment
NASA Astrophysics Data System (ADS)
De Masi, G.; Giovannetti, G.; Ricchiuti, G.
2013-03-01
In this paper we reconstruct and discuss the network of Italian firms investing abroad, exploiting information from complex network analysis. This method, detecting the key nodes of the system (both in terms of firms and countries of destination), allows us to single out the linkages among firms without ex-ante priors. Moreover, through the examination of affiliates’ economic activity, it allows us to highlight different internationalization strategies of “leaders” in different manufacturing sectors.
H. Ken Cordell; John C. Bergstrom; Lawrence A. Hartmann; Donald B. K. English
1990-01-01
The Analysis of the Outdoor Recreation and Wilderness Situation in the United States is intended to build upon past studies and to establish a new and better information base on outdoor recreation and wilderness demand and supply. Also, this assessment answers several key questions which will help identify ways to meet demand through the year 2040. Specifically, it is...
NASA Astrophysics Data System (ADS)
Iubatti, Daniela; Masciarelli, Francesca; Simboli, Alberto
This chapter aims to explore how the information-processing capabilities that emerge from a network structure affect the diffusion of innovation in a multidivisional organization. In particular, this study analyzes the role of firm investments in ICT to facilitate communication and knowledge diffusion. Using a qualitative approach, we investigate the behavior of an Italian multinational firm, Engineering S.p.A., analyzing our data using a content analysis procedure. Our results show the limited role of ICT in favoring knowledge exchange both inside and outside the firm's divisions: traditional communication patterns are generally preferred over the use of technologies for information sharing. Additionally, we find that key individuals who play a central role in the firm's communication network are unable to use ICTs for knowledge transfer. We conclude that this is the result of a strategic decision to keep top management practically unchanged since the firm was established. Therefore, key individuals act as filters to knowledge flows. Knowledge, in particular tacit knowledge, is transferred from key individuals to other actors through face-to-face contacts, thereby creating a diseconomy for the organization.
The carrot and the stick? Strategies to improve compliance with college campus tobacco policies
Fallin-Bennett, Amanda; Roditis, Maria; Glantz, Stanton A.
2017-01-01
Objective Tobacco-free policies are being rapidly adopted nationwide, yet compliance with these policies remains a challenge. This study explored college campus key informants’ experiences with tobacco policies, and their perceived benefits, drawbacks, and outcomes. Participants The sample for this study was 68 key informants representing 16 different California universities with varying tobacco policies (no smoking indoors and within 20 feet of entrances, designated smoking areas, 100% smoke-free, and 100% tobacco-free). Methods Qualitative, descriptive study. Semistructured interviews were transcribed verbatim and analyzed using content analysis. Results Strategies to improve compliance ranged from a social approach to a heavy focus on punitive enforcement. Key informants from campuses using a social approach alone reported barriers to improving compliance, including a perceived lack of efficacy of the approach. However, these campuses found it challenging to incorporate enforcement through campus police or security. Conclusions College campus decision makers should explore using a combined approach (social approach as well as formal enforcement), with enforcement primarily the responsibility of nonpolice university channels (eg, Student Affairs, employee supervisors). PMID:27869568
Human resources for health in six healthcare arenas under stress: a qualitative study.
Durham, Jo; Pavignani, Enrico; Beesley, Mark; Hill, Peter S
2015-03-29
Research on "human resources for health" (HRH) typically focuses on the public health subsector, despite the World Health Organization's inclusive definition to the contrary. This qualitative research examines the profile of HRH in six conflict-affected contexts where the public health subsector does not dominate healthcare service provision and HRH is a less coherent and cohesive entity: Afghanistan, the Central African Republic (CAR), the Democratic Republic of Congo (DR Congo), Haiti, the Occupied Palestinian Territories and Somalia. The study uses a multiple-country qualitative research design including documentary analysis and key informant interviews undertaken between 2010 and 2012. The documentary analysis included peer-reviewed articles, books, unpublished research and evaluations and donor and non-government organisation reviews. A common thematic guide, informed by this analysis, was used to undertake key informant interviews. Informants thought able to provide some insight into the research questions were identified from ministry of health organograms, and from listings of donors and non-government organisations. Local informants outside the familiar structures were also contacted. In CAR, 74 were interviewed; in Somalia 25; . in Haiti, 45; in Afghanistan, 41; in DR Congo, 32; and in the Occupied Palestinian Territories, 30. In addition, peer review was sought on the initial country reports. The study discovered, in each healthcare arena investigated, a crowded HRH space with a wide range of public, private, formal and informal providers of varying levels of competence and a diverse richness of initiatives, shaped by the easy commodification of health and an unregulated market. The weak regulatory framework and capacity to regulate, combined with limited information regarding those not on the state payroll, allowed non-state providers to flourish, if not materially then at least numerically. When examining HRH, a reliance on information provided by the state health sector can only provide a partial and inadequate representation of reality. For policy-makers and planners in disrupted contexts to begin to appreciate fully current and potential HRH, there is a need to study the workforce using conceptual tools that reflect the situation on the ground, rather than idealised patterns generated by incomplete inventories and unrealistic standards.
Baladrón, Carlos; Khrennikov, Andrei
2016-12-01
The similarities between biological and physical systems as respectively defined in quantum information biology (QIB) and in a Darwinian approach to quantum mechanics (DAQM) have been analysed. In both theories the processing of information is a central feature characterising the systems. The analysis highlights a mutual support on the thesis contended by each theory. On the one hand, DAQM provides a physical basis that might explain the key role played by quantum information at the macroscopic level for bio-systems in QIB. On the other hand, QIB offers the possibility, acting as a macroscopic testing ground, to analyse the emergence of quantumness from classicality in the terms held by DAQM. As an added result of the comparison, a tentative definition of quantum information in terms of classical information flows has been proposed. The quantum formalism would appear from this comparative analysis between QIB and DAQM as an optimal information scheme that would maximise the stability of biological and physical systems at any scale. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Norri-Sederholm, Teija; Paakkonen, Heikki; Kurola, Jouni; Saranto, Kaija
2015-01-16
In prehospital emergency medical services, one of the key factors in the successful delivery of appropriate care is the efficient management and supervision of the area's emergency medical services units. Paramedic field supervisors have an important role in this task. One of the key factors in the daily work of paramedic field supervisors is ensuring that they have enough of the right type of information when co-operating with other authorities and making decisions. However, a gap in information sharing still exists especially due to information overload. The aim of this study was to find out what type of critical information paramedic field supervisors need during multi-authority missions in order to manage their emergency medical services area successfully. The study also investigated both the flow of information, and interactions with the paramedic field supervisors and the differences that occur depending on the incident type. Ten paramedic field supervisors from four Finnish rescue departments participated in the study in January-March 2012. The data were collected using semi-structured interviews based on three progressive real-life scenarios and a questionnaire. Data were analysed using deductive content analysis. Data management and analysis were performed using Atlas.ti 7 software. Five critical information categories were formulated: Incident data, Mission status, Area status, Safety at work, and Tactics. Each category's importance varied depending on the incident and on whether it was about information needed or information delivered by the paramedic field supervisors. The main communication equipment used to receive information was the authority radio network (TETRA). However, when delivering information, mobile phones and TETRA were of equal importance. Paramedic field supervisors needed more information relating to area status. Paramedic field supervisors communicate actively with EMS units and other authorities such as Emergency Medical Dispatch, police, and rescue services during the multi-authority incidents. This study provides knowledge about the critical information categories when receiving and sharing the information to obtain and maintain situational awareness. However, further research is needed to examine more the information flow in prehospital emergency care to enable a better understanding of required communication in situational awareness formation.
Petri net-based method for the analysis of the dynamics of signal propagation in signaling pathways.
Hardy, Simon; Robillard, Pierre N
2008-01-15
Cellular signaling networks are dynamic systems that propagate and process information, and, ultimately, cause phenotypical responses. Understanding the circuitry of the information flow in cells is one of the keys to understanding complex cellular processes. The development of computational quantitative models is a promising avenue for attaining this goal. Not only does the analysis of the simulation data based on the concentration variations of biological compounds yields information about systemic state changes, but it is also very helpful for obtaining information about the dynamics of signal propagation. This article introduces a new method for analyzing the dynamics of signal propagation in signaling pathways using Petri net theory. The method is demonstrated with the Ca(2+)/calmodulin-dependent protein kinase II (CaMKII) regulation network. The results constitute temporal information about signal propagation in the network, a simplified graphical representation of the network and of the signal propagation dynamics and a characterization of some signaling routes as regulation motifs.
[Myocardial perfusion scintigraphy - short form of the German guideline].
Lindner, O; Burchert, W; Hacker, M; Schaefer, W; Schmidt, M; Schober, O; Schwaiger, M; vom Dahl, J; Zimmermann, R; Schäfers, M
2013-01-01
This guideline is a short summary of the guideline for myocardial perfusion scintigraphy published by the Association of the Scientific Medical Societies in Ger-many (AWMF). The purpose of this guideline is to provide practical assistance for indication and examination procedures as well as image analysis and to present the state-of-the-art of myocardial-perfusion-scintigraphy. After a short introduction on the fundamentals of imaging, precise and detailed information is given on the indications, patient preparation, stress testing, radiopharmaceuticals, examination protocols and techniques, radiation exposure, data reconstruction as well as information on visual and quantitative image analysis and interpretation. In addition possible pitfalls, artefacts and key elements of reporting are described.
de Groot, Florentine P; Robertson, Narelle M; Swinburn, Boyd A; de Silva-Sanigorski, Andrea M
2010-08-31
Obesity is a major public health issue; however, only limited evidence is available about effective ways to prevent obesity, particularly in early childhood. Romp & Chomp was a community-wide obesity prevention intervention conducted in Geelong Australia with a target group of 12,000 children aged 0-5 years. The intervention had an environmental and capacity building focus and we have recently demonstrated that the prevalence of overweight/obesity was lower in intervention children, post-intervention. Capacity building is defined as the development of knowledge, skills, commitment, structures, systems and leadership to enable effective health promotion and the aim of this study was to determine if the capacity of the Geelong community, represented by key stakeholder organisations, to support healthy eating and physical activity for young children was increased after Romp & Chomp. A mixed methods evaluation with three data sources was utilised. 1) Document analysis comprised assessment of the documented formative and intervention activities against a capacity building framework (five domains: Partnerships, Leadership, Resource Allocation, Workforce Development, and Organisational Development); 2) Thematic analysis of key informant interviews (n = 16); and 3) the quantitative Community Capacity Index Survey. Document analysis showed that the majority of the capacity building activities addressed the Partnerships, Resource Allocation and Organisational Development domains of capacity building, with a lack of activity in the Leadership and Workforce Development domains. The thematic analysis revealed the establishment of sustainable partnerships, use of specialist advice, and integration of activities into ongoing formal training for early childhood workers. Complex issues also emerged from the key informant interviews regarding the challenges of limited funding, high staff turnover, changing governance structures, lack of high level leadership and unclear communication strategies. The Community Capacity Index provided further evidence that the project implementation network achieved a moderate level of capacity. Romp & Chomp increased the capacity of organisations, settings and services in the Geelong community to support healthy eating and physical activity for young children. Despite this success there are important learnings from this mixed methods evaluation that should inform current and future community-based public health and health promotion initiatives. ANZCTRN12607000374460.
A Quality Function Deployment Framework for the Service Quality of Health Information Websites
Kim, Dohoon
2010-01-01
Objectives This research was conducted to identify both the users' service requirements on health information websites (HIWs) and the key functional elements for running HIWs. With the quality function deployment framework, the derived service attributes (SAs) are mapped into the suppliers' functional characteristics (FCs) to derive the most critical FCs for the users' satisfaction. Methods Using the survey data from 228 respondents, the SAs, FCs and their relationships were analyzed using various multivariate statistical methods such as principal component factor analysis, discriminant analysis, correlation analysis, etc. Simple and compound FC priorities were derived by matrix calculation. Results Nine factors of SAs and five key features of FCs were identified, and these served as the basis for the house of quality model. Based on the compound FC priorities, the functional elements pertaining to security and privacy, and usage support should receive top priority in the course of enhancing HIWs. Conclusions The quality function deployment framework can improve the FCs of the HIWs in an effective, structured manner, and it can also be utilized for critical success factors together with their strategic implications for enhancing the service quality of HIWs. Therefore, website managers could efficiently improve website operations by considering this study's results. PMID:21818418
NASA Astrophysics Data System (ADS)
Falconer, Ruth E.; Gilmour, Daniel; Duffy, Alison; Isaacs, John; Stojanovic, Vladeta; O'Keeffe, Juliette; Blackwood, David
2015-04-01
The value of Scotland's water and sewerage market is projected to grow to £1.24bn by 2016/17. Developing future opportunities must take place alongside maintaining current service provision; however the demand on water and waste water services is constantly evolving. An integrated approach to water management requires an understanding of complex interactions that exist between key actors in the sector to allow water management strategies to exploit inter-sectorial links. Successful integrated analysis of the water sector in Scotland will support management activities key to responding to the Hydro Nation themes of 1) Governance and international development 2) Environmental protection 3) Economic opportunities 4) Research development. In order to deliver on these objectives an approach is required to capture and communicate the scope and scale of the water sector and its interconnectedness. The methodology required to determine scope, scale and interconnectedness of water sector involved the identification and application of an appropriate range of techniques from the Information and Knowledge Management disciplines combined with the Information Visualisation field. Scope and scale of the water sector was identified by a desk based study and this data was visualized using a geographic map. Sector interconnectedness was determined by interviewing key actors. The interviews identified the stakeholders associated with information flows, and the purpose of the information transfer through Reporting/Managing (R/M), Influence and Information sharing (I) or Control (C) activities. Primary information flows were also scored with respect to importance against the 4 key Hydro Nation agenda themes. Many organisations were identified who interact within Scotland's water sector including the Scottish Government and Ministers, the Regulators (WICS, DWQR, SEPA), Scottish Water (core and non-core functions), plus many other stakeholders ranging from research institutions to private sector businesses. This data was used in a water wheel visualisation where connections between stakeholders are shown as links and the width of the link represents the importance of the information exchage. Both maps will be used by the Scottish Government and its stakeholders to support decision making and illustrate the management and control aspects of the water sector.
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-01-01
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-03-21
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.
Dickmann, P; Wittgens, K; Keeping, S; Mischler, D; Heudorf, U
2016-02-01
Multidrug resistant organisms (MDRO), including Meticillin-resistant Staphylococcus aureus (MRSA), and health care associated infections (HCAIs) are pressing issues for health care systems across the world. Information and communication are considered key tools for the prevention and management of infectious diseases. Public Health Authorities (PHA) are in a unique position to communicate with health care professionals, patients and the public regarding the health risks. We used PHA helpdesk interaction data to first ascertain the information requirements of those getting in contact with the service, and secondly to examine the communicative behaviour of the PHA, with a view to improving the quality of communication strategies. Data on helpdesk interactions between 2010 and 2012 were obtained from a MDRO network of nine German PHAs. 501 recordings were coded and descriptive statistics generated for further qualitative thematic analysis. Our analysis revealed a similar pattern of questions among different groups. Key areas of need for information were around eradication, cleaning and isolation measures. Reported problems were a lack of expert knowledge and continuity of treatment. The helpdesk response was mainly a conversation offering scientific advice, but also included other communication services that went beyond the provision of scientific facts, such as follow-up calls, referral suggestions and consultations on behalf of the caller. These social communication activities seem to have an important impact on the acceptability of public health recommendations and use of the helpdesk. Our findings support a broader discussion about the role of information in the communication process and underline the importance of social elements in the communication process, such as relationship and trust building. Copyright © 2015 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
Depressed Mothers as Informants on Child Behavior: Methodological Issues
Ordway, Monica Roosa
2011-01-01
Mothers with depressive symptoms more frequently report behavioral problems among their children than non-depressed mothers leading to a debate regarding the accuracy of depressed mothers as informants of children’s behavior. The purpose of this integrative review was to identify methodological challenges in research related to the debate. Data were extracted from 43 papers (6 theoretical, 36 research reports, and 1 instrument scoring manual). The analysis focused on the methodologies considered when using depressed mothers as informants. Nine key themes were identified and I concluded that researchers should incorporate multiple informants, identify the characteristics of maternal depression, and incorporate advanced statistical methodology. The use of a conceptual framework to understand informant discrepancies within child behavior evaluations is suggested for future research. PMID:21964958
Seeing voices of health disparity: evaluating arts projects as influence processes.
Parsons, Janet; Heus, Lineke; Moravac, Catherine
2013-02-01
Arts-informed approaches are increasingly popular as vehicles for research, knowledge translation and for engaging key stakeholders on topics of health and health care. This paper describes an evaluation of a multimedia art installation intended to promote awareness of health disparities as experienced by homeless persons living in Toronto (Canada). The objective of the evaluation was to determine whether the installation had an impact on audience members, and if so, to understand its influence on viewers' perspectives on homelessness and the health concerns of homeless persons. Key themes were identified through the analysis of direct observational data of viewer interactions with the exhibit and qualitative interviews with different audience members after the exhibit. The four key themes were: (1) Promoting recognition of common humanity between viewers and viewed (challenging previously held assumptions and stereotypes, narrowing perceived social distance); (2) functions fulfilled (or potentially fulfilled) by the exhibit: raising awareness, educational applications, and potential pathways by which the exhibit could serve as a call to social action; (3) stories that prompt more stories: the stories within the exhibit (coupled with the interview questions) prompted further sharing of stories amongst the evaluation respondents, highlighting the iterative nature of such approaches. Respondents told of recognizing similarities in the experiences recounted in the exhibit with their own interactions with homeless persons; (4) strengths and weaknesses identified: including aesthetic features, issues of audience 'reach' and the importance of suitable venues for exhibition. Theoretically informed by narrative analysis and visual anthropology, this evaluation demonstrates that arts-informed 'interventions' are highly complex and work in subtle ways on viewers, allowing them to re-imagine the lives of others and identify points of common interest. It also problematizes our assumptions about which outcomes matter and why. Copyright © 2012 Elsevier Ltd. All rights reserved.
The Value of Information from a GRACE-Enhanced Drought Severity Index
NASA Astrophysics Data System (ADS)
Kuwayama, Y.; Bernknopf, R.; Macauley, M.; Brookshire, D.; Zaitchik, B. F.; Rodell, M.
2013-12-01
Water storage anomalies derived from the Gravity Recovery and Climate Experiment Data Assimilation System (GRACE-DAS) have been used to enhance the information contained in drought indicators. The potential value of this information is to inform local and regional decisions to improve economic welfare in the face of drought. Based on a characterization of current drought evaluations, a modeling framework has been structured to analyze the contributed value of the Earth observations in the assessment of the onset and duration of droughts and their regional impacts. The analysis focuses on (1) characterizing how GRACE-DAS provides Earth observation information for a drought warning, (2) assessing how a GRACE-DAS-enhanced U.S. Drought Monitor would improve economic outcomes in a region, and (3) applying this enhancement process in a decision framework to illustrate the potential role of GRACE data products in a recent drought and response scenario for a value-of-information (VOI) analysis. The VOI analysis quantifies the relative contribution of enhanced understanding and communication of the societal benefits associated with GRACE Earth observation science. Our emphasis is to illustrate the role of an enhanced National Integrated Drought Information System outlook on three key societal outcomes: effects on particular economic sectors, changes in land management decisions, and reductions in damages to ecosystem services.
Zhang, Liping; Zhu, Shaohui
2015-05-01
To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.
PACSY, a relational database management system for protein structure and chemical shift analysis.
Lee, Woonghee; Yu, Wookyung; Kim, Suhkmann; Chang, Iksoo; Lee, Weontae; Markley, John L
2012-10-01
PACSY (Protein structure And Chemical Shift NMR spectroscopY) is a relational database management system that integrates information from the Protein Data Bank, the Biological Magnetic Resonance Data Bank, and the Structural Classification of Proteins database. PACSY provides three-dimensional coordinates and chemical shifts of atoms along with derived information such as torsion angles, solvent accessible surface areas, and hydrophobicity scales. PACSY consists of six relational table types linked to one another for coherence by key identification numbers. Database queries are enabled by advanced search functions supported by an RDBMS server such as MySQL or PostgreSQL. PACSY enables users to search for combinations of information from different database sources in support of their research. Two software packages, PACSY Maker for database creation and PACSY Analyzer for database analysis, are available from http://pacsy.nmrfam.wisc.edu.
A new patent-based approach for technology mapping in the pharmaceutical domain.
Russo, Davide; Montecchi, Tiziano; Carrara, Paolo
2013-09-01
The key factor in decision-making is the quality of information collected and processed in the problem analysis. In most cases, patents represent a very important source of information. The main problem is how to extract such information from the huge corpus of documents with a high recall and precision, and in a short time. This article demonstrates a patent search and classification method, called Knowledge Organizing Module, which consists of creating, almost automatically, a pool of patents based on polysemy expansion and homonymy disambiguation. Since the pool is done, an automatic patent technology landscaping is provided for fixing the state of the art of our product, and exploring competing alternative treatments and/or possible technological opportunities. An exemplary case study is provided, it deals with a patent analysis in the field of verruca treatments.
Program on State Agency Remote Sensing Data Management (SARSDM). [missouri
NASA Technical Reports Server (NTRS)
Eastwood, L. F., Jr.; Gotway, E. O.
1978-01-01
A planning study for developing a Missouri natural resources information system (NRIS) that combines satellite-derived data and other information to assist in carrying out key state tasks was conducted. Four focal applications -- dam safety, ground water supply monitoring, municipal water supply monitoring, and Missouri River basin modeling were identified. Major contributions of the study are: (1) a systematic choice and analysis of a high priority application (water resources) for a Missouri, LANDSAT-based information system; (2) a system design and implementation plan, based on Missouri, but useful for many other states; (3) an analysis of system costs, component and personnel requirements, and scheduling; and (4) an assessment of deterrents to successful technological innovation of this type in state government, and a system management plan, based on this assessment, for overcoming these obstacles in Missouri.
The Perceived and Real Value of Health Information Exchange in Public Health Surveillance
ERIC Educational Resources Information Center
Dixon, Brian Edward
2011-01-01
Public health agencies protect the health and safety of populations. A key function of public health agencies is surveillance or the ongoing, systematic collection, analysis, interpretation, and dissemination of data about health-related events. Recent public health events, such as the H1N1 outbreak, have triggered increased funding for and…
Ethical or Unethical Persuasion? The Rhetoric of Offers to Participate in Clinical Trials
ERIC Educational Resources Information Center
Barton, Ellen; Eggly, Susan
2009-01-01
Based on a sample of 22 oncology encounters, this article presents a discourse analysis of positive, neutral, or negative valence in the presentation of three elements of informed consent--purpose, benefits, and risks--in offers to participate in clinical trials. It is found that physicians regularly present these key elements of consent with a…
Two Decades of E-Learning Policy Evolution at EU Level: Motivations, Institutions and Instruments
ERIC Educational Resources Information Center
Salajan, Florin D.; Roumell, Elizabeth A.
2016-01-01
This article records and documents the historical development of e-learning policies at EU level by conducting a discourse and content analysis of four key e-learning policy documents drafted and implemented by the European Commission over the past 20 years: "Learning in the Information Society: Action Plan for a European Education…
Interactive Computer Based Assessment Tasks: How Problem-Solving Process Data Can Inform Instruction
ERIC Educational Resources Information Center
Zoanetti, Nathan
2010-01-01
This article presents key steps in the design and analysis of a computer based problem-solving assessment featuring interactive tasks. The purpose of the assessment is to support targeted instruction for students by diagnosing strengths and weaknesses at different stages of problem-solving. The first focus of this article is the task piloting…
Gap Analysis of Zalora Online Application: Indonesian Users' Perspectives
ERIC Educational Resources Information Center
Pradna, Mahir; Novitasari, Fransiska
2017-01-01
In a time where firms tend to transform themselves to become the most innovative, information and communication technologies (ICT) have the ability to help firms expanding to new markets and trigger their customer's loyalty. Online application has been proven to be the key for companies in marketing their products. One e-commerce that follows this…
William H. McWilliams; Carol L. Alerich; William A. Bechtold; Mark Hansen; Christopher M. Oswalt; Mike Thompson; Jeff Turner
2012-01-01
The U.S. Department of Agriculture, Forest Service, Forest Inventory and Analysis (FIA) program maintains the National Information Management System (NIMS) that provides the computational framework for the annual forest inventory of the United States. Questions regarding the impact of key elements of programming logic, processing criteria, and estimation procedures...
Orbital transfer vehicle studies overview
NASA Technical Reports Server (NTRS)
Perkinson, Don
1987-01-01
An overview is given in viewgraph form of orbital transfer vehicle concept definition and systems analysis studies. Project development flow charts are shown for key milestones from 1985 until 1997. Diagrams of vehicles are given. Information is presented in outline form on technology requirements, cooling of propellant tanks, cryogenic fluid management, quick connect/disconnect fluid interfaces and propellant mass transfer.
Assets and Life Satisfaction Patterns among Korean Older Adults: Latent Class Analysis
ERIC Educational Resources Information Center
Han, Chang-Keun; Hong, Song-Iee
2011-01-01
This study aims to examine the association of assets with life satisfaction patterns among Korean older adults aged 50 and above. This study used the first two panel data sets (2005 and 2007) from the Korean Retirement and Income Study, which collected information from a nationally representative sample. Key independent variables include financial…
Models of the Behavior of People Searching the Internet: A Petri Net Approach.
ERIC Educational Resources Information Center
Kantor, Paul B.; Nordlie, Ragnar
1999-01-01
Illustrates how various key abstractions of information finding, such as document relevance, a desired number of relevant documents, discouragement, exhaustion, and satisfaction can be modeled using the Petri Net framework. Shows that this model leads naturally to a new approach to collection of user data, and to analysis of transaction logs.…
ERIC Educational Resources Information Center
Jang, Michael; Lee, Evelyn; Woo, Kent
1998-01-01
The effects of income, language, and citizenship on the use of health-care services by Chinese Americans is examined (N=1808). Focus groups, a telephone survey, and key informant interviews were conducted. Data analysis included an acculturation index, demographic profile, and logistical regression. Health insurance and social factors are…
ERIC Educational Resources Information Center
Hodis, Flaviu A.; Hodis, Georgeta M.
2017-01-01
Measuring human motivation requires understanding the outcomes individuals value and the strategies they prefer to employ to attain them. Knowledge of promotion and prevention, two pivotal motivation orientations, provide key information regarding these aspects. The Regulatory Focus Questionnaire, which measures these two independent constructs,…
NASA Astrophysics Data System (ADS)
Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu
2014-07-01
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
Enterprise architecture availability analysis using fault trees and stakeholder interviews
NASA Astrophysics Data System (ADS)
Närman, Per; Franke, Ulrik; König, Johan; Buschle, Markus; Ekstedt, Mathias
2014-01-01
The availability of enterprise information systems is a key concern for many organisations. This article describes a method for availability analysis based on Fault Tree Analysis and constructs from the ArchiMate enterprise architecture (EA) language. To test the quality of the method, several case-studies within the banking and electrical utility industries were performed. Input data were collected through stakeholder interviews. The results from the case studies were compared with availability of log data to determine the accuracy of the method's predictions. In the five cases where accurate log data were available, the yearly downtime estimates were within eight hours from the actual downtimes. The cost of performing the analysis was low; no case study required more than 20 man-hours of work, making the method ideal for practitioners with an interest in obtaining rapid availability estimates of their enterprise information systems.
Creating an advance-care-planning decision aid for high-risk surgery: a qualitative study
2014-01-01
Background High-risk surgery patients may lose decision-making capacity as a result of surgical complications. Advance care planning prior to surgery may be beneficial, but remains controversial and is hindered by a lack of appropriate decision aids. This study sought to examine stakeholders’ views on the appropriateness of using decision aids, in general, to support advance care planning among high-risk surgery populations and the design of such a decision aid. Methods Key informants were recruited through purposive and snowball sampling. Semi-structured interviews were conducted by phone until data collected reached theoretical saturation. Key informants were asked to discuss their thoughts about advance care planning and interventions to support advance care planning, particularly for this population. Researchers took de-identified notes that were analyzed for emerging concordant, discordant, and recurrent themes using interpretative phenomenological analysis. Results Key informants described the importance of initiating advance care planning preoperatively, despite potential challenges present in surgical settings. In general, decision aids were viewed as an appropriate approach to support advance care planning for this population. A recipe emerged from the data that outlines tools, ingredients, and tips for success that are needed to design an advance care planning decision aid for high-risk surgical settings. Conclusions Stakeholders supported incorporating advance care planning in high-risk surgical settings and endorsed the appropriateness of using decision aids to do so. Findings will inform the next stages of developing the first advance care planning decision aid for high-risk surgery patients. PMID:25067908
Creating an advance-care-planning decision aid for high-risk surgery: a qualitative study.
Schuster, Anne Lr; Aslakson, Rebecca A; Bridges, John Fp
2014-01-01
High-risk surgery patients may lose decision-making capacity as a result of surgical complications. Advance care planning prior to surgery may be beneficial, but remains controversial and is hindered by a lack of appropriate decision aids. This study sought to examine stakeholders' views on the appropriateness of using decision aids, in general, to support advance care planning among high-risk surgery populations and the design of such a decision aid. Key informants were recruited through purposive and snowball sampling. Semi-structured interviews were conducted by phone until data collected reached theoretical saturation. Key informants were asked to discuss their thoughts about advance care planning and interventions to support advance care planning, particularly for this population. Researchers took de-identified notes that were analyzed for emerging concordant, discordant, and recurrent themes using interpretative phenomenological analysis. Key informants described the importance of initiating advance care planning preoperatively, despite potential challenges present in surgical settings. In general, decision aids were viewed as an appropriate approach to support advance care planning for this population. A recipe emerged from the data that outlines tools, ingredients, and tips for success that are needed to design an advance care planning decision aid for high-risk surgical settings. Stakeholders supported incorporating advance care planning in high-risk surgical settings and endorsed the appropriateness of using decision aids to do so. Findings will inform the next stages of developing the first advance care planning decision aid for high-risk surgery patients.
Brief educational intervention improves content of intern handovers.
Shaughnessy, Erin E; Ginsbach, Kimberly; Groeschl, Nicole; Bragg, Dawn; Weisgerber, Michael
2013-03-01
The Accreditation Council for Graduate Medical Education requires residency programs to ensure safe patient handovers and to document resident competency in handover communication, yet there are few evidence-based curricula teaching resident handover skills. We assessed the immediate and sustained impact of a brief educational intervention on pediatrics intern handover skills. Interns at a freestanding children's hospital participated in an intervention that included a 1-hour educational workshop on components of high-quality handovers, as well as implementation of a standardized handover format. The format, SAFETIPS, includes patient information, current diagnosis and assessment, patient acuity, a focused plan, a baseline exam, a to-do list, anticipatory guidance, and potential pointers and pitfalls. Important communication behaviors, such as paraphrasing key information, were addressed. Quality of intern handovers was evaluated using a simulated encounter 2 weeks before, 2 weeks after, and 7 months after the workshop. Two trained, blinded, independent observers scored the videotaped encounters. All 27 interns rotating at the Children's Hospital consented to participate in the study, and 20 attended the workshop. We included all participant data in the analysis, regardless of workshop attendance. Following the intervention, intern reporting of patient acuity improved from 13% to 92% (P < .001), and gains were maintained 7 months later. Rates of key communication behaviors, such as paraphrasing critical information, did not improve. A brief educational workshop promoting standardized handovers improved the inclusion of essential information during intern handovers, and these improvements were sustained over time. The intervention did not improve key communication behaviors.
Authenticated Quantum Key Distribution with Collective Detection using Single Photons
NASA Astrophysics Data System (ADS)
Huang, Wei; Xu, Bing-Jie; Duan, Ji-Tong; Liu, Bin; Su, Qi; He, Yuan-Hang; Jia, Heng-Yue
2016-10-01
We present two authenticated quantum key distribution (AQKD) protocols by utilizing the idea of collective (eavesdropping) detection. One is a two-party AQKD protocol, the other is a multiparty AQKD protocol with star network topology. In these protocols, the classical channels need not be assumed to be authenticated and the single photons are used as the quantum information carriers. To achieve mutual identity authentication and establish a random key in each of the proposed protocols, only one participant should be capable of preparing and measuring single photons, and the main quantum ability that the rest of the participants should have is just performing certain unitary operations. Security analysis shows that these protocols are free from various kinds of attacks, especially the impersonation attack and the man-in-the-middle (MITM) attack.
Key Parameters for Operator Diagnosis of BWR Plant Condition during a Severe Accident
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clayton, Dwight A.; Poore, III, Willis P.
2015-01-01
The objective of this research is to examine the key information needed from nuclear power plant instrumentation to guide severe accident management and mitigation for boiling water reactor (BWR) designs (specifically, a BWR/4-Mark I), estimate environmental conditions that the instrumentation will experience during a severe accident, and identify potential gaps in existing instrumentation that may require further research and development. This report notes the key parameters that instrumentation needs to measure to help operators respond to severe accidents. A follow-up report will assess severe accident environmental conditions as estimated by severe accident simulation model analysis for a specific US BWR/4-Markmore » I plant for those instrumentation systems considered most important for accident management purposes.« less
da Silva, Marcus Vinicius Pereira; de Araújo, Kizi Mendonça; Sampaio, Ricardo Barros; Moraes, Milton Ozório
2017-01-01
Collaborative networks are of great value for science and technology (S&T) institutions as a way of sharing, generating and disseminating new knowledge that could ultimately lead to innovations. Driven by the need to assess the contribution and effectiveness of these networks in informing S&T management, we explored the evolution and dynamics of tuberculosis scientific networks involving the Oswaldo Cruz Foundation (Fiocruz), the major public health S&T Institution in Brazil. Social network analysis (SNA) was used to produce a 10-year (2005–2009, 2010–2014) retrospective longitudinal mapping of Brazilian tuberculosis research networks within the country and internationally, highlighting Fiocruz collaborations. Co-authorship analysis showed a significant expansion of collaboration in Brazil and the role of Fiocruz and other leading national institutions in maintaining connectivity, facilitating knowledge exchange and reducing network vulnerability. It also identified influential researchers that can act as information leaders and support strategic decisions. When we focused on networks inside the institution, the analysis showed a clear discontinuation between the clinical and the public health research areas, which needs specific internal policies to improve collaborations since outcomes in TB are expected to provide better diagnostic tools and more effective treatments. The approach provides evidence to support S&T management by pinpointing: key central institutions maintaining network connectivity; most influential researchers that can act as advisors/experts for investment and induction policies; key Fiocruz researchers that could improve information exchange, systems integration and innovation within the institution; opportunities for synergy between internal research groups working in complementary areas. In summary, we observed that SNA parameters proved to be a valuable tool that, along with other indicators, can strengthen knowledge platforms to support S&T management efforts. PMID:28792514
Greenberg, Daphne; Nightingale, Elena; Moodie, Chelsea
2016-01-01
This paper presents data from the Program for the International Assessment of Adult Competencies with a focus on the interrelationships among health information seeking behavior (HISB), and health status or use of preventive health measures for U.S. adults both with and without a high school diploma. Key results of ordinal and binary logistic regression analyses indicated that, after controlling for demographic factors, (1) adults with a high school diploma use more text-based health information sources while adults without a high school diploma use more oral sources, (2) using the Internet as a source of health information is more strongly related to reporting excellent/very good health status than having a high school diploma, (3) those without a high school diploma who use the Internet report the largest increase in health status over any other health information source, and (4) for those with learning disability or vision problem, a high facility in reading English is an important predictor of whether the Internet is used as a health information source. The Internet appears to play a key role in both enhancing health status and enabling use of preventive measures for those with and without a high school diploma; although, individuals without a high school diploma who use the Internet for health information derive substantial benefit in health status. PMID:26882339
Feinberg, Iris; Frijters, Jan; Johnson-Lawrence, Vicki; Greenberg, Daphne; Nightingale, Elena; Moodie, Chelsea
2016-01-01
This paper presents data from the Program for the International Assessment of Adult Competencies with a focus on the interrelationships among health information seeking behavior (HISB), and health status or use of preventive health measures for U.S. adults both with and without a high school diploma. Key results of ordinal and binary logistic regression analyses indicated that, after controlling for demographic factors, (1) adults with a high school diploma use more text-based health information sources while adults without a high school diploma use more oral sources, (2) using the Internet as a source of health information is more strongly related to reporting excellent/very good health status than having a high school diploma, (3) those without a high school diploma who use the Internet report the largest increase in health status over any other health information source, and (4) for those with learning disability or vision problem, a high facility in reading English is an important predictor of whether the Internet is used as a health information source. The Internet appears to play a key role in both enhancing health status and enabling use of preventive measures for those with and without a high school diploma; although, individuals without a high school diploma who use the Internet for health information derive substantial benefit in health status.
Predicting Key Events in the Popularity Evolution of Online Information.
Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen
2017-01-01
The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.
Kim, Heejin; Kwon, Sunghyuk; Heo, Jiyoon; Lee, Hojin; Chung, Min K
2014-05-01
Investigating the effect of touch-key size on usability of In-Vehicle Information Systems (IVISs) is one of the most important research issues since it is closely related to safety issues besides its usability. This study investigated the effects of the touch-key size of IVISs with respect to safety issues (the standard deviation of lane position, the speed variation, the total glance time, the mean glance time, the mean time between glances, and the mean number of glances) and the usability of IVISs (the task completion time, error rate, subjective preference, and NASA-TLX) through a driving simulation. A total of 30 drivers participated in the task of entering 5-digit numbers with various touch-key sizes while performing simulated driving. The size of the touch-key was 7.5 mm, 12.5 mm, 17.5 mm, 22.5 mm and 27.5 mm, and the speed of driving was set to 0 km/h (stationary state), 50 km/h and 100 km/h. As a result, both the driving safety and the usability of the IVISs increased as the touch-key size increased up to a certain size (17.5 mm in this study), at which they reached asymptotes. We performed Fitts' law analysis of our data, and this revealed that the data from the dual task experiment did not follow Fitts' law. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Predicting Key Events in the Popularity Evolution of Online Information
Fu, Shushen; Fang, Mingzhe; Xu, Wenwen
2017-01-01
The popularity of online information generally experiences a rising and falling evolution. This paper considers the “burst”, “peak”, and “fade” key events together as a representative summary of popularity evolution. We propose a novel prediction task—predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify “burst”, “peak”, and “fade” in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution. PMID:28046121
McMurray, Josephine; McNeil, Heather; Lafortune, Claire; Black, Samantha; Prorok, Jeanette; Stolee, Paul
2016-01-01
To identify key dimensions of patients' experience across the rehabilitative care system and to recommend a framework to develop survey items that measure the rehabilitative care experience. Data were sourced from a literature review that searched MEDLINE (PubMed), CINAHL (Ebsco), and PsycINFO (APA PsycNET) databases from 2004 to 2014, the reference lists of the final accepted articles, and hand searches of relevant journals. Four reviewers performed the screening process on 2472 articles; 33 were included for analysis. Interrater reliability was confirmed through 2 rounds of title review and 1 round of abstract review, with an average κ score of .69. The final sample of 33 accepted articles was imported into a qualitative data analysis software application. Multiple levels of coding and a constant comparative methodology generated 6 themes. There were 502 discreet survey questions measuring patient experience that were categorized using the following dimensions: rehabilitative care ecosystem, client and informal caregiver engagement, patient and health care provider relation, pain and functional status, group and individual identity, and open ended. The most common survey questions examine the care delivery ecosystem (37%), the engagement of clients and their informal caregivers (24.9%), and the quality of relations between providers and patients (21.7%). Examination of patient's functional status and management of pain yielded (15.3%) of the instruments' questions. Currently available instruments and questions that measure patients' experience in rehabilitative care are unable to assess the performance of rehabilitative delivery systems that aspire to integrate care across the continuum. However, question panels derived from our 6 key themes may measure the key concepts that define rehabilitative care and facilitate measurement of patient experience at the system level. Copyright © 2016 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.
Lee, Tian-Fu
2013-12-01
A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.
PANTHER. Pattern ANalytics To support High-performance Exploitation and Reasoning.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Czuchlewski, Kristina Rodriguez; Hart, William E.
Sandia has approached the analysis of big datasets with an integrated methodology that uses computer science, image processing, and human factors to exploit critical patterns and relationships in large datasets despite the variety and rapidity of information. The work is part of a three-year LDRD Grand Challenge called PANTHER (Pattern ANalytics To support High-performance Exploitation and Reasoning). To maximize data analysis capability, Sandia pursued scientific advances across three key technical domains: (1) geospatial-temporal feature extraction via image segmentation and classification; (2) geospatial-temporal analysis capabilities tailored to identify and process new signatures more efficiently; and (3) domain- relevant models of humanmore » perception and cognition informing the design of analytic systems. Our integrated results include advances in geographical information systems (GIS) in which we discover activity patterns in noisy, spatial-temporal datasets using geospatial-temporal semantic graphs. We employed computational geometry and machine learning to allow us to extract and predict spatial-temporal patterns and outliers from large aircraft and maritime trajectory datasets. We automatically extracted static and ephemeral features from real, noisy synthetic aperture radar imagery for ingestion into a geospatial-temporal semantic graph. We worked with analysts and investigated analytic workflows to (1) determine how experiential knowledge evolves and is deployed in high-demand, high-throughput visual search workflows, and (2) better understand visual search performance and attention. Through PANTHER, Sandia's fundamental rethinking of key aspects of geospatial data analysis permits the extraction of much richer information from large amounts of data. The project results enable analysts to examine mountains of historical and current data that would otherwise go untouched, while also gaining meaningful, measurable, and defensible insights into overlooked relationships and patterns. The capability is directly relevant to the nation's nonproliferation remote-sensing activities and has broad national security applications for military and intelligence- gathering organizations.« less
Staccini, P; Quaranta, J F; Staccini-Myx, A; Veyres, P; Jambou, P
2003-09-01
Nowadays, information system is recognised as one of the key points of the management strategy. An information system is regarded conceptualised as a mean to link 3 aspects of a firm (structure, organisation rules and staff). Its design and implementation have to meet the objectives of medical and economical evaluation, especially risk management objectives. In order to identify, analyse, reduce and prevent the occurrence of adverse events, and also to measure the efficacy and efficiency of the production of care services, the design of information systems should be based on a process analysis in order to describe and classify all the working practices within the hospital. According to various methodologies (usually top-down analysis), each process can be divided into activities. Each activity (especially each care activity) can be described according to its potential risks and expected results. For care professionals performing a task, the access to official or internal guidelines and the adverse events reporting forms has also to be defined. Putting together all the elements of such a process analysis will contribute to integrate, into daily practice, the management of risks, supported by the information system.
2007-03-01
information dominance , Joint Network Operations (NETOPS) organizations need to be strategically aligned. As result, to enhance the capabilities-based effects of NETOPS and reduce our NETOP infrastructures susceptibility to compromise. Once the key organizations were identified, their strategic plans were analyzed using a structured content analysis framework. The results illustrated that the strategic plans were aligned with the community of interests tasking to conduct NETOPS. Further research is required into the strategic alignment beyond the strategic
NASA/Howard University Large Space Structures Institute
NASA Technical Reports Server (NTRS)
Broome, T. H., Jr.
1984-01-01
Basic research on the engineering behavior of large space structures is presented. Methods of structural analysis, control, and optimization of large flexible systems are examined. Topics of investigation include the Load Correction Method (LCM) modeling technique, stabilization of flexible bodies by feedback control, mathematical refinement of analysis equations, optimization of the design of structural components, deployment dynamics, and the use of microprocessors in attitude and shape control of large space structures. Information on key personnel, budgeting, support plans and conferences is included.
DOE Office of Scientific and Technical Information (OSTI.GOV)
The Benchmarks of Global Clean Energy Manufacturing will help policymakers and industry gain deeper understanding of global manufacturing of clean energy technologies. Increased knowledge of the product supply chains can inform decisions related to manufacturing facilities for extracting and processing raw materials, making the array of required subcomponents, and assembling and shipping the final product. This brochure summarized key findings from the analysis and includes important figures from the report. The report was prepared by the Clean Energy Manufacturing Analysis Center (CEMAC) analysts at the U.S. Department of Energy's National Renewable Energy Laboratory.
Van Lange, Paul A M; Balliet, Daniel P; IJzerman, Hans
2012-02-01
This commentary seeks to clarify the potential discrepancy between lab-based and field data in the use and effectiveness of punishment to promote cooperation by recommending theory that outlines key differences between the lab and field, such as the shadow of the future and degree of information availability. We also discuss a recent meta-analysis (Balliet et al. 2011) that does not support all conclusions outlined in Guala's target article.
Moorthy, A; Alkadhimi, A F; Stassen, Leo F; Duncan, H F
2016-01-01
Concerns were expressed that postoperative written instructions following endodontic treatment are not available in the Dublin Dental University Hospital. Data was collected in three phases: retrospective analysis of clinical notes for evidence of the delivery of postoperative instructions; a randomly distributed questionnaire to patients undergoing root canal treatment prior to the introduction of a written postoperative advice sheet; and, another survey following introduction of the advice sheet. Some 56% of patients' charts documented that postoperative advice was given. Analysis of phase two revealed that patients were not consistently informed of any key postoperative messages. In phase 3 analysis, the proposed benchmarks were met in four out of six categories. Postoperative advice after root canal treatment in the DDUH is both poorly recorded and inconsistently delivered. A combination of oral postoperative instructions and written postoperative advice provided the most effective delivery of patient information.
Part II--Factors associated with school nurse ratios: key state informants' perceptions.
Maughan, Erin
2009-08-01
This paper is the second of a two-part series examining factors influencing school nurse to pupil staffing ratios. The paper reports data from a qualitative study exploring the social and political factors that potentially influence ratios. Interviews were conducted with 30 key state informants from these states. Content analysis of the data identified common themes. Positive factors reported to influence ratios included: the approach taken to effect change, value placed upon school nurses, local support (from both educators and parents) and community buy-in, fear of litigation, and dynamic leadership. Barriers to improving ratios included: lack of funding and misunderstanding of the role of the school nurse. Philosophical beliefs and state geography were "swing" factors that influenced staffing positively or negatively. This study adds to our knowledge of the factors influencing staffing and highlights important social and political factors that school nurses can target to improve nurse to pupil ratios.
Quantum Secure Group Communication.
Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M
2018-03-01
We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.
Li, Wen-Jie; Zhang, Shi-Huang; Wang, Hui-Min
2011-12-01
Ecosystem services evaluation is a hot topic in current ecosystem management, and has a close link with human beings welfare. This paper summarized the research progress on the evaluation of ecosystem services based on geographic information system (GIS) and remote sensing (RS) technology, which could be reduced to the following three characters, i. e., ecological economics theory is widely applied as a key method in quantifying ecosystem services, GIS and RS technology play a key role in multi-source data acquisition, spatiotemporal analysis, and integrated platform, and ecosystem mechanism model becomes a powerful tool for understanding the relationships between natural phenomena and human activities. Aiming at the present research status and its inadequacies, this paper put forward an "Assembly Line" framework, which was a distributed one with scalable characteristics, and discussed the future development trend of the integration research on ecosystem services evaluation based on GIS and RS technologies.
Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming
2016-01-01
With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606
Reducing data friction through site-based data curation
NASA Astrophysics Data System (ADS)
Thomer, A.; Palmer, C. L.
2017-12-01
Much of geoscience research takes place at "scientifically significant sites": localities which have attracted a critical mass of scientific interest, and thereby merit protection by government bodies, as well as the preservation of specimen and data collections and the development of site-specific permitting requirements for access to the site and its associated collections. However, many data standards and knowledge organization schemas do not adequately describe key characteristics of the sites, despite their centrality to research projects. Through work conducted as part of the IMLS-funded Site-Based Data Curation (SBDC) project, we developed a Minimum Information Framework (MIF) for site-based science, in which "information about a site's structure" is considered a core class of information. Here we present our empirically-derived information framework, as well as the methods used to create it. We believe these approaches will lead to the development of more effective data repositories and tools, and thereby will reduce "data friction" in interdisciplinary, yet site-based, geoscience workflows. The Minimum Information Framework for Site-based Research was developed through work at two scientifically significant sites: the hot springs at Yellowstone National Park, which are key to geobiology research; and the La Brea Tar Pits, an important paleontology locality in Southern California. We employed diverse methods of participatory engagement, in which key stakeholders at our sites (e.g. curators, collections managers, researchers, permit officers) were consulted through workshops, focus groups, interviews, action research methods, and collaborative information modeling and systems analysis. These participatory approaches were highly effective in fostering on-going partnership among a diverse team of domain scientists, information scientists, and software developers. The MIF developed in this work may be viewed as a "proto-standard" that can inform future repository development and data standards. Further, the approaches used to develop the MIF represent an important step toward systematic methods of developing geoscience data standards. Finally, we argue that organizing data around aspects of a site makes data collections more accessible to a range of scientific communities.
Williams, Emily C; Achtmeyer, Carol E; Young, Jessica P; Rittmueller, Stacey E; Ludman, Evette J; Lapham, Gwen T; Lee, Amy K; Chavez, Laura J; Berger, Douglas; Bradley, Katharine A
2016-01-01
Population-based alcohol screening, followed by brief intervention for patients who screen positive for unhealthy alcohol use, is widely recommended for primary care settings and considered a top prevention priority, but is challenging to implement. However, new policy initiatives in the U.S., including the Affordable Care Act, may help launch widespread implementation. While the nationwide Veterans Health Administration (VA) has achieved high rates of documented alcohol screening and brief intervention, research has identified quality problems with both. We conducted a qualitative key informant study to describe local implementation of alcohol screening and brief intervention from the perspectives of frontline adopters in VA primary care in order to understand the process of implementation and factors underlying quality problems. A purposive snowball sampling method was used to identify and recruit key informants from 5 VA primary care clinics in the northwestern U.S. Key informants completed 20-30 minute semi-structured interviews, which were recorded, transcribed, and qualitatively analyzed using template analysis. Key informants (N=32) included: clinical staff (n=14), providers (n=14), and administrative informants (n=4) with varying participation in implementation of and responsibility for alcohol screening and brief intervention at the medical center. Ten inter-related themes (5 a priori and 5 emergent) were identified and grouped into 3 applicable domains of Greenhalgh's conceptual framework for dissemination of innovations, including values of adopters (theme 1), processes of implementation (themes 2 and 3), and post-implementation consequences in care processes (themes 4-10). While key informants believed alcohol use was relevant to health and important to address, the process of implementation (in which no training was provided and electronic clinical reminders "just showed up") did not address critical training and infrastructure needs. Key informants lacked understanding of the goals of screening and brief intervention, believed referral to specialty addictions treatment (as opposed to offering brief intervention) was the only option for following up on a positive screen, reported concern regarding limited availability of treatment resources, and lacked optimism regarding patients' interest in seeking help. Findings suggest that the local process of implementing alcohol screening and brief intervention may have inadequately addressed important adopter needs and thus may have ultimately undermined, instead of capitalized on, staff and providers' belief in the importance of addressing alcohol use as part of primary care. Additional implementation strategies, such as training or academic detailing, may address some unmet needs and help improve the quality of both screening and brief intervention. However, these strategies may be resource-intensive and insufficient for comprehensively addressing implementation barriers. Published by Elsevier Inc.
Community Member and Stakeholder Perspectives on a Healthy Environment Initiative in North Carolina.
Carter-Edwards, Lori; Lowe-Wilson, Abby; Mouw, Mary Sherwyn; Jeon, Janet Yewon; Baber, Ceola Ross; Vu, Maihan B; Bethell, Monique
2015-08-13
The North Carolina Community Transformation Grant Project (NC-CTG) aimed to implement policy, system, and environmental strategies to promote healthy eating, active living, tobacco-free living, and clinical and community preventive services to advance health equity and reduce health disparities for the state's most vulnerable communities. This article presents findings from the Health Equity Collaborative Evaluation and Implementation Project, which assessed community and stakeholder perceptions of health equity for 3 NC-CTG strategies: farmers markets, shared use, and smoke-free multiunit housing. In a triangulated qualitative evaluation, 6 photo elicitation (PE) sessions among 45 community members in 1 urban and 3 rural counties and key informant interviews among 22 stakeholders were conducted. Nine participants from the PE sessions and key informant interviews in the urban county subsequently participated in a stakeholder power analysis and mapping session (SPA) to discuss and identify people and organizations in their community perceived to be influential in addressing health equity-related issues. Evaluations of the PE sessions and key informant interviews indicated that access (convenience, cost, safety, and awareness of products and services) and community fit (community-defined quality, safety, values, and norms) were important constructs across the strategies. The SPA identified specific community- and faith-based organizations, health care organizations, and local government agencies as key stakeholders for future efforts. Both community fit and access are essential constructs for promoting health equity. Findings demonstrate the feasibility of and need for formative research that engages community members and local stakeholders to shape context-specific, culturally relevant health promotion strategies.
Community Member and Stakeholder Perspectives on a Healthy Environment Initiative in North Carolina
Lowe-Wilson, Abby; Mouw, Mary Sherwyn; Jeon, Janet Yewon; Baber, Ceola Ross; Vu, Maihan B.; Bethell, Monique
2015-01-01
Introduction The North Carolina Community Transformation Grant Project (NC-CTG) aimed to implement policy, system, and environmental strategies to promote healthy eating, active living, tobacco-free living, and clinical and community preventive services to advance health equity and reduce health disparities for the state’s most vulnerable communities. This article presents findings from the Health Equity Collaborative Evaluation and Implementation Project, which assessed community and stakeholder perceptions of health equity for 3 NC-CTG strategies: farmers markets, shared use, and smoke-free multiunit housing. Methods In a triangulated qualitative evaluation, 6 photo elicitation (PE) sessions among 45 community members in 1 urban and 3 rural counties and key informant interviews among 22 stakeholders were conducted. Nine participants from the PE sessions and key informant interviews in the urban county subsequently participated in a stakeholder power analysis and mapping session (SPA) to discuss and identify people and organizations in their community perceived to be influential in addressing health equity–related issues. Results Evaluations of the PE sessions and key informant interviews indicated that access (convenience, cost, safety, and awareness of products and services) and community fit (community-defined quality, safety, values, and norms) were important constructs across the strategies. The SPA identified specific community- and faith-based organizations, health care organizations, and local government agencies as key stakeholders for future efforts. Conclusions Both community fit and access are essential constructs for promoting health equity. Findings demonstrate the feasibility of and need for formative research that engages community members and local stakeholders to shape context-specific, culturally relevant health promotion strategies. PMID:26270741
Investigating accident causation through information network modelling.
Griffin, T G C; Young, M S; Stanton, N A
2010-02-01
Management of risk in complex domains such as aviation relies heavily on post-event investigations, requiring complex approaches to fully understand the integration of multi-causal, multi-agent and multi-linear accident sequences. The Event Analysis of Systemic Teamwork methodology (EAST; Stanton et al. 2008) offers such an approach based on network models. In this paper, we apply EAST to a well-known aviation accident case study, highlighting communication between agents as a central theme and investigating the potential for finding agents who were key to the accident. Ultimately, this work aims to develop a new model based on distributed situation awareness (DSA) to demonstrate that the risk inherent in a complex system is dependent on the information flowing within it. By identifying key agents and information elements, we can propose proactive design strategies to optimize the flow of information and help work towards avoiding aviation accidents. Statement of Relevance: This paper introduces a novel application of an holistic methodology for understanding aviation accidents. Furthermore, it introduces an ongoing project developing a nonlinear and prospective method that centralises distributed situation awareness and communication as themes. The relevance of findings are discussed in the context of current ergonomic and aviation issues of design, training and human-system interaction.
What Factors Do Allied Health Take Into Account When Making Resource Allocation Decisions?
Lane, Haylee; Sturgess, Tamica; Philip, Kathleen; Markham, Donna; Martin, Jennifer; Walsh, Jill; Hubbard, Wendy; Haines, Terry
2018-01-01
Background: Allied health comprises multiple professional groups including dietetics, medical radiation practitioners, occupational therapists, optometrists and psychologists. Different to medical and nursing, Allied health are often organized in discipline specific departments and allocate budgets within these to provide services to a range of clinical areas. Little is known of how managers of allied health go about allocating these resources, the factors they consider when making these decisions, and the sources of information they rely upon. The purpose of this study was to identify the key factors that allied health consider when making resource allocation decisions and the sources of information they are based upon. Methods: Four forums were conducted each consisting of case studies, a large group discussion and two hypothetical scenarios to elicit data. A thematic content analysis commenced during post-forum discussions of key factors by forum facilitators. These factors were then presented to an expert working party for further discussion and refinement. Transcripts were generated of all data recordings and a detailed thematic analysis was undertaken by one author to ensure coded data matched the initial thematic analysis. Results: Twelve factors affecting the decision-making of allied health managers and clinicians were identified. One of these factors was disendorsed by the expert working party. The 11 remaining factors can be considered to be key decision-making principles that should be consistently applied to resource allocation. These principles were clustered into three overarching themes of readiness, impact and appropriateness. Conclusion: Understanding these principles now means further research can be completed to more effectively integrate research evidence into health policy and service delivery, create partnerships among policy-makers, managers, service providers and researchers, and to provide support to answer difficult questions that policy-makers, managers and service providers face. PMID:29764105
Quantum Private Comparison Protocol with Linear Optics
NASA Astrophysics Data System (ADS)
Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu
2016-12-01
In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.
Hydrogen Fueling Station in Honolulu, Hawaii Feasibility Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Porter Hill; Michael Penev
2014-08-01
The Department of Energy Hydrogen & Fuel Cells Program Plan (September 2011) identifies the use of hydrogen for government and fleet electric vehicles as a key step for achieving “reduced greenhouse gas emissions; reduced oil consumption; expanded use of renewable power …; highly efficient energy conversion; fuel flexibility …; reduced air pollution; and highly reliable grid-support.” This report synthesizes several pieces of existing information that can inform a decision regarding the viability of deploying a hydrogen (H2) fueling station at the Fort Armstrong site in Honolulu, Hawaii.
Quality: performance improvement, teamwork, information technology and protocols.
Coleman, Nana E; Pon, Steven
2013-04-01
Using the Institute of Medicine framework that outlines the domains of quality, this article considers four key aspects of health care delivery which have the potential to significantly affect the quality of health care within the pediatric intensive care unit. The discussion covers: performance improvement and how existing methods for reporting, review, and analysis of medical error relate to patient care; team composition and workflow; and the impact of information technologies on clinical practice. Also considered is how protocol-driven and standardized practice affects both patients and the fiscal interests of the health care system.
Simple group password-based authenticated key agreements for the integrated EPR information system.
Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng
2013-04-01
The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.
A computational framework for modeling targets as complex adaptive systems
NASA Astrophysics Data System (ADS)
Santos, Eugene; Santos, Eunice E.; Korah, John; Murugappan, Vairavan; Subramanian, Suresh
2017-05-01
Modeling large military targets is a challenge as they can be complex systems encompassing myriad combinations of human, technological, and social elements that interact, leading to complex behaviors. Moreover, such targets have multiple components and structures, extending across multiple spatial and temporal scales, and are in a state of change, either in response to events in the environment or changes within the system. Complex adaptive system (CAS) theory can help in capturing the dynamism, interactions, and more importantly various emergent behaviors, displayed by the targets. However, a key stumbling block is incorporating information from various intelligence, surveillance and reconnaissance (ISR) sources, while dealing with the inherent uncertainty, incompleteness and time criticality of real world information. To overcome these challenges, we present a probabilistic reasoning network based framework called complex adaptive Bayesian Knowledge Base (caBKB). caBKB is a rigorous, overarching and axiomatic framework that models two key processes, namely information aggregation and information composition. While information aggregation deals with the union, merger and concatenation of information and takes into account issues such as source reliability and information inconsistencies, information composition focuses on combining information components where such components may have well defined operations. Since caBKBs can explicitly model the relationships between information pieces at various scales, it provides unique capabilities such as the ability to de-aggregate and de-compose information for detailed analysis. Using a scenario from the Network Centric Operations (NCO) domain, we will describe how our framework can be used for modeling targets with a focus on methodologies for quantifying NCO performance metrics.
SwissPalm: Protein Palmitoylation database.
Blanc, Mathieu; David, Fabrice; Abrami, Laurence; Migliozzi, Daniel; Armand, Florence; Bürgi, Jérôme; van der Goot, Françoise Gisou
2015-01-01
Protein S-palmitoylation is a reversible post-translational modification that regulates many key biological processes, although the full extent and functions of protein S-palmitoylation remain largely unexplored. Recent developments of new chemical methods have allowed the establishment of palmitoyl-proteomes of a variety of cell lines and tissues from different species. As the amount of information generated by these high-throughput studies is increasing, the field requires centralization and comparison of this information. Here we present SwissPalm ( http://swisspalm.epfl.ch), our open, comprehensive, manually curated resource to study protein S-palmitoylation. It currently encompasses more than 5000 S-palmitoylated protein hits from seven species, and contains more than 500 specific sites of S-palmitoylation. SwissPalm also provides curated information and filters that increase the confidence in true positive hits, and integrates predictions of S-palmitoylated cysteine scores, orthologs and isoform multiple alignments. Systems analysis of the palmitoyl-proteome screens indicate that 10% or more of the human proteome is susceptible to S-palmitoylation. Moreover, ontology and pathway analyses of the human palmitoyl-proteome reveal that key biological functions involve this reversible lipid modification. Comparative analysis finally shows a strong crosstalk between S-palmitoylation and other post-translational modifications. Through the compilation of data and continuous updates, SwissPalm will provide a powerful tool to unravel the global importance of protein S-palmitoylation.
SwissPalm: Protein Palmitoylation database
Abrami, Laurence; Migliozzi, Daniel; Armand, Florence; Bürgi, Jérôme; van der Goot, Françoise Gisou
2015-01-01
Protein S-palmitoylation is a reversible post-translational modification that regulates many key biological processes, although the full extent and functions of protein S-palmitoylation remain largely unexplored. Recent developments of new chemical methods have allowed the establishment of palmitoyl-proteomes of a variety of cell lines and tissues from different species. As the amount of information generated by these high-throughput studies is increasing, the field requires centralization and comparison of this information. Here we present SwissPalm ( http://swisspalm.epfl.ch), our open, comprehensive, manually curated resource to study protein S-palmitoylation. It currently encompasses more than 5000 S-palmitoylated protein hits from seven species, and contains more than 500 specific sites of S-palmitoylation. SwissPalm also provides curated information and filters that increase the confidence in true positive hits, and integrates predictions of S-palmitoylated cysteine scores, orthologs and isoform multiple alignments. Systems analysis of the palmitoyl-proteome screens indicate that 10% or more of the human proteome is susceptible to S-palmitoylation. Moreover, ontology and pathway analyses of the human palmitoyl-proteome reveal that key biological functions involve this reversible lipid modification. Comparative analysis finally shows a strong crosstalk between S-palmitoylation and other post-translational modifications. Through the compilation of data and continuous updates, SwissPalm will provide a powerful tool to unravel the global importance of protein S-palmitoylation. PMID:26339475
Mining Social Media and Web Searches For Disease Detection
Yang, Y. Tony; Horneffer, Michael; DiLisio, Nicole
2013-01-01
Web-based social media is increasingly being used across different settings in the health care industry. The increased frequency in the use of the Internet via computer or mobile devices provides an opportunity for social media to be the medium through which people can be provided with valuable health information quickly and directly. While traditional methods of detection relied predominately on hierarchical or bureaucratic lines of communication, these often failed to yield timely and accurate epidemiological intelligence. New web-based platforms promise increased opportunities for a more timely and accurate spreading of information and analysis. This article aims to provide an overview and discussion of the availability of timely and accurate information. It is especially useful for the rapid identification of an outbreak of an infectious disease that is necessary to promptly and effectively develop public health responses. These web-based platforms include search queries, data mining of web and social media, process and analysis of blogs containing epidemic key words, text mining, and geographical information system data analyses. These new sources of analysis and information are intended to complement traditional sources of epidemic intelligence. Despite the attractiveness of these new approaches, further study is needed to determine the accuracy of blogger statements, as increases in public participation may not necessarily mean the information provided is more accurate. PMID:25170475
Mining social media and web searches for disease detection.
Yang, Y Tony; Horneffer, Michael; DiLisio, Nicole
2013-04-28
Web-based social media is increasingly being used across different settings in the health care industry. The increased frequency in the use of the Internet via computer or mobile devices provides an opportunity for social media to be the medium through which people can be provided with valuable health information quickly and directly. While traditional methods of detection relied predominately on hierarchical or bureaucratic lines of communication, these often failed to yield timely and accurate epidemiological intelligence. New web-based platforms promise increased opportunities for a more timely and accurate spreading of information and analysis. This article aims to provide an overview and discussion of the availability of timely and accurate information. It is especially useful for the rapid identification of an outbreak of an infectious disease that is necessary to promptly and effectively develop public health responses. These web-based platforms include search queries, data mining of web and social media, process and analysis of blogs containing epidemic key words, text mining, and geographical information system data analyses. These new sources of analysis and information are intended to complement traditional sources of epidemic intelligence. Despite the attractiveness of these new approaches, further study is needed to determine the accuracy of blogger statements, as increases in public participation may not necessarily mean the information provided is more accurate.
NASA Astrophysics Data System (ADS)
Peng, Xiang; Zhang, Peng; Cai, Lilong
In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.
NASA Astrophysics Data System (ADS)
Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato
2017-07-01
An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.
Micro-Raman spectroscopy: The analysis of micrometer and submicrometer atmospheric aerosols
NASA Technical Reports Server (NTRS)
Klainer, S. M.; Milanovich, F. P.
1985-01-01
A nondestructive method of molecular analysis which is required to fully utilize the information contained within a collected particle is discussed. Upper atmosphere reaction mechanisms are assessed when the chemical compounds, the use of micro-Raman spectrometric techniques to perform micron and submicron particle analysis was evaluated. The results are favorable and it is concluded that micron and submicron particles can be analyzed by the micron-Raman approach. Completely automatic analysis should be possible to 0.3 micro m. No problems are anticipated with photo or thermal decomposition. Sample and impurity fluorescence are the key source of background as they cannot be completely eliminated.
Foundations to the unified psycho-cognitive engine.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bernard, Michael Lewis; Bier, Asmeret Brooke; Backus, George A.
This document outlines the key features of the SNL psychological engine. The engine is designed to be a generic presentation of cognitive entities interacting among themselves and with the external world. The engine combines the most accepted theories of behavioral psychology with those of behavioral economics to produce a unified simulation of human response from stimuli through executed behavior. The engine explicitly recognizes emotive and reasoned contributions to behavior and simulates the dynamics associated with cue processing, learning, and choice selection. Most importantly, the model parameterization can come from available media or survey information, as well subject-matter-expert information. The frameworkmore » design allows the use of uncertainty quantification and sensitivity analysis to manage confidence in using the analysis results for intervention decisions.« less
Rogers, Claire; Earnest, Jaya
2014-01-01
This study conducted in Brisbane, Australia, was undertaken with a cross-section of Sudanese and Eritrean mothers and daughters. We explored and documented the women's intergenerational experiences and knowledge of reproductive health and contraception. Underpinned by a qualitative approach, focus group discussions were undertaken along with key informant interviews with health and multicultural sector professionals. Through examination of knowledge shared, the analysis distilled key aspects of intergenerational fears, cultural safety, and health. Participants proposed recommendations on how refugee and migrant women in Australia and resettled countries globally can more effectively and holistically exercise their sexual and reproductive health rights.
Duke, Karen; Herring, Rachel; Thickett, Anthony; Thom, Betsy
2013-08-01
Based on documentary analyses and interviews with twenty key informants in 2012, this paper analyses the shift in British drugs policy towards "recovery" from the perspectives of major stakeholders. The processes involved in reopening the debate surrounding the role of substitution treatment and its re-emergence on to the policy agenda are examined. Drawing on Kingdon's work on agenda-setting, the ways in which methadone maintenance was challenged and defended by key stakeholders in the initial phase of policy development and the negotiation of a "recovery" focus as the organizing concept for British drugs policy are explored. Study limitations are noted.
Determinants for the success of regional ICT ventures: a close examination of South Korea.
Park, Eunil; Kim, Ki Joon; Kwon, Sang Jib; Ohm, Jay Y; Del Pobil, Angel P; Yoo, Kyeongsik
2016-01-01
This study identifies the key motivational factors in enhancing economic performance and increasing new job opportunities for information and communication technology ventures (ICTVs) in South Korea and examines their potential causal relationships through structural equation modeling analysis on data collected from over 200 ICTVs located in Daedeok Innopolis. The results indicate that the economic performance of ICTVs is determined mainly by government support, innovation effort, and private equity and support. Government support and innovation effort are also positively associated with new job opportunities. The theoretical, industrial implications of the key findings, and recommendations for the Korean government are discussed.
ERIC Educational Resources Information Center
Algesheimer, René; Bagozzi, Richard P.; Dholakia, Utpal M.
2018-01-01
We offer a new conceptualization and measurement models for constructs at the group-level of analysis in small group research. The conceptualization starts with classical notions of group behavior proposed by Tönnies, Simmel, and Weber and then draws upon plural subject theory by philosophers Gilbert and Tuomela to frame a new perspective…
ERIC Educational Resources Information Center
Gao, Jian; Hallar, Brittan; Hartmann, Tracey A.
2014-01-01
This report examines the 21st Century Community Learning Center (CCLC) programs evaluated by Research for Action (RFA) and presents an aggregate analysis of key findings to inform broader discussions about OST programs. The report addresses the following questions: (1) Who participated in the 21st CCLC programs and how frequently did they…
ERIC Educational Resources Information Center
Whitehead, Michele L.; Gutierrez, Laura; Miller, Melody
2014-01-01
The purpose of this study is to gain an understanding of current academic medical library circulation polices and examine methods libraries utilize to meet patron needs. Key informants were selected from five states. Statistics regarding financial practices, users, services, space access, and circulation practices were collected via survey…
Religious Views on Suicide among the Baganda, Uganda: A Qualitative Study
ERIC Educational Resources Information Center
Mugisha, James; Hjelmeland, Heidi; Kinyanda, Eugene; Knizek, Birthe Loa
2013-01-01
Relatively little research has been conducted on religion and suicide in Africa, yet religion has a lot of influence on people's way of life in Africa. To study religious views on suicide among the Baganda, Uganda, we used grounded theory and discourse analysis on a total of 28 focus groups and 30 key informant interviews. Suicide is largely seen…
Long-Term Outcome from a Medium Secure Service for People with Intellectual Disability
ERIC Educational Resources Information Center
Alexander, R. T.; Crouch, K.; Halstead, S.; Piachaud, J.
2006-01-01
Background: The purpose of this paper is to describe long-term outcomes for patients discharged over a 12-year period from a medium secure service for people with intellectual disabilities (ID). Methods: A cohort study using case-notes analysis and a structured interview of current key informants. Results: Eleven per cent of the sample was…
ERIC Educational Resources Information Center
Bradford, Deborah J.
2010-01-01
The purpose of the study was to understand and appreciate the methodologies and procedures used in determining the extent to which an information technology (IT) organization within the eleven member State University Systems (SUS) of Florida planned, implemented, and diffused emerging educational technologies. Key findings found how critical it…
ERIC Educational Resources Information Center
Wei, Tie; Ford, Julie
2015-01-01
This article provides information about the integration of innovative hands-on activities within a sophomore-level Fluid Mechanics course at New Mexico Tech. The course introduces students to the fundamentals of fluid mechanics with emphasis on teaching key equations and methods of analysis for solving real-world problems. Strategies and examples…
Office of Strategic Programs FY 2017 Budget At-A-Glance
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2016-03-01
The Office of Strategic Programs (OSP) increases the overall effectiveness and impact of all EERE activities through key cross-cutting initiatives and strategic analysis, communications, and technology-to-market activities. OSP’s work directly contributes to EERE’s mission, facilitates and amplifies the successes of EERE technology offices, and soundly and consistently informs the Assistant Secretary’s decisions.
Stakeholder understandings of wildfire mitigation: A case of shared and contested meanings
Joseph G. Champ; Jeffrey J. Brooks; Daniel R. Williams
2012-01-01
This article identifies and compares meanings of wildfire risk mitigation for stakeholders in the Front Range of Colorado, USA. We examine the case of a collaborative partnership sponsored by government agencies and directed to decrease hazardous fuels in interface areas. Data were collected by way of key informant interviews and focus groups. The analysis is guided by...
Treating first episode psychosis--the service users' perspective: a focus group evaluation.
O'Toole, M S; Ohlsen, R I; Taylor, T M; Purvis, R; Walters, J; Pilowsky, L S
2004-06-01
UK national guidance has prioritized developing specialist services for first episode psychosis. Such services are in the early stages of development and a definitive treatment model has yet to be established. The aim of this study was to explore service users' experiences of a first episode intervention designed along evidence-based 'best practice' guidelines and to establish specific elements seen as effective to help inform future service planning and provision. Twelve users of a specialist first episode service participated in focus groups. These were then analyzed using Interpretative Phenomenological Analysis, a specialized form of content analysis. Key elements identified by the service users included the 'human' approach as a key to the recovery process, being involved in treatment decisions, flexibility of appointments, high nurse to patient ratio, reduction in psychotic symptoms, increased confidence and independence and the provision of daily structure. To our knowledge, this is the first systematic qualitative evaluation of users' experience of a specialist first episode treatment intervention. Our findings indicate that adherence to best practice guidelines was appreciated. Regular focus groups provide a continuous audit cycle incorporating service improvements in line with government recommendations, centrally informed by the service users' and caregivers' perspective.
GenoBase: comprehensive resource database of Escherichia coli K-12.
Otsuka, Yuta; Muto, Ai; Takeuchi, Rikiya; Okada, Chihiro; Ishikawa, Motokazu; Nakamura, Koichiro; Yamamoto, Natsuko; Dose, Hitomi; Nakahigashi, Kenji; Tanishima, Shigeki; Suharnan, Sivasundaram; Nomura, Wataru; Nakayashiki, Toru; Aref, Walid G; Bochner, Barry R; Conway, Tyrrell; Gribskov, Michael; Kihara, Daisuke; Rudd, Kenneth E; Tohsato, Yukako; Wanner, Barry L; Mori, Hirotada
2015-01-01
Comprehensive experimental resources, such as ORFeome clone libraries and deletion mutant collections, are fundamental tools for elucidation of gene function. Data sets by omics analysis using these resources provide key information for functional analysis, modeling and simulation both in individual and systematic approaches. With the long-term goal of complete understanding of a cell, we have over the past decade created a variety of clone and mutant sets for functional genomics studies of Escherichia coli K-12. We have made these experimental resources freely available to the academic community worldwide. Accordingly, these resources have now been used in numerous investigations of a multitude of cell processes. Quality control is extremely important for evaluating results generated by these resources. Because the annotation has been changed since 2005, which we originally used for the construction, we have updated these genomic resources accordingly. Here, we describe GenoBase (http://ecoli.naist.jp/GB/), which contains key information about comprehensive experimental resources of E. coli K-12, their quality control and several omics data sets generated using these resources. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.
Maaitah, Rowaida Al; AbuAlRub, Raeda Fawzi
2017-01-01
ABSTRACT Objective: to explore priority actions for strengthening the role of Advanced Practice Nurses (APNs) towards the achievement of Universal Health Converge (UHC) as perceived by health key informants in Jordan. Methods: an exploratory qualitative design, using a semi-structured survey, was utilized. A purposive sample of seventeen key informants from various nursing and health care sectors was recruited for the purpose of the study. Content analysis utilizing the five-stage framework approach was used for data analysis. Results: the findings revealed that policy and regulation, nursing education, research, and workforce were identified as the main elements that influence the role of APNs in contributing to the achievement of UHC. Priority actions were identified by the participants for the main four elements. Conclusion: study findings confirm the need to strengthen the role of APNs to achieve UHC through a major transformation in nursing education, practice, research, leadership, and regulatory system. Nurses should unite to come up with solid nursing competencies related to APNs, PHC, UHC, leadership and policy making to strengthen their position as main actors in influencing the health care system and evidence creation. PMID:28146176
Code of Federal Regulations, 2011 CFR
2011-01-01
... INFORMATION AND RESTRICTED DATA Physical Security § 95.18 Key personnel. The senior management official and... Clearance. Other key management officials, as determined by the CSA, must be granted an access authorization... organization's policies or practices in the performance of activities involving classified information. This...
Transportation key facts 2002 : useful information about transportation in Oregon
DOT National Transportation Integrated Search
2002-01-01
The Oregon Department of Transportation 2002 edition of Key Facts summarizes information related to transportation in Oregon. Key Facts can be used for a variety of planning and budget purposes, and it is intended to provide: : an introduction to tra...
Wyoming Landscape Conservation Initiative Science Workshop Proceedings, May 15-17, 2007
D'Erchia, Frank
2008-01-01
The U.S. Geological Survey (USGS) hosted a Wyoming Landscape Conservation Initiative (WLCI) Science Workshop at the University of Wyoming on May 15, 16, and 17, 2007. The goal of the workshop was to gather information from stakeholders about research needs and existing data resources to help develop the USGS WLCI science plan. The workshop focused on six research and management needs identified by WLCI partners prior to the workshop: *evaluate the cumulative effects of development activities; *identify key drivers of change; *identify condition and distribution of key wildlife species, habitat, and species habitat requirements; *evaluate wildlife and livestock responses to development; *develop an integrated inventory and monitoring strategy; and *develop a data clearinghouse and an information-management framework. These topics correlated to six plenary panels and discussions and six breakout sessions. Several collective needs were identified: *create a long-term, accessible information database; *identify key habitats, indicator species; *collect and research missing critical baseline data; *begin on-the-ground projects as soon as possible; and *implement a monitoring program to assist with adaptive management techniques. Several concerns were expressed repeatedly: *secure adequate and long-term funding; *meeting the WLCI workload with agencies that are already understaffed; *assess cumulative effects as an analysis approach; *perform offsite mitigation in a way that is valuable and effective; *focus all research on providing practical applications; and *involve the public in WLCI proceedings.
Stang, Jamie; Bonilla, Zobeida
2017-09-29
To determine preferred policies and programs to prevent obesity and diabetes as identified by parents and caregivers of 3- to 5-year-old Latino children. Constructs from the Social Ecological Model were used to develop 10 focus group and key informant interview questions. Community venues and schools in St Paul, MN. A total of 64 parents and caregivers and 20 key informants provided comments. Community-based participatory research methods were used to gather opinions regarding appropriate and preferred methods to prevent obesity and diabetes among Latino youth. Native Spanish-speaking investigators who were members of the community conducted 7 focus groups (60-90 minutes each) and 20 key informant interviews. Themes and subthemes of preferences based on participant comments. Transcript-based, long-table qualitative analysis. Five themes were identified: (1) cultural beliefs and practices are inconsistent with obesity prevention; (2) cost and convenience; (3) positive parenting practices; (4) we want to learn more about being healthy; and (5) gardens, parks, gyms, and school meals. At least 1 theme fell within each of the social ecological model domains. Our results suggest that parents of young Hispanic children prefer that obesity and diabetes prevention programs address multiple levels of influence. Copyright © 2017 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.
NASA Langley Systems Analysis & Concepts Directorate Technology Assessment/Portfolio Analysis
NASA Technical Reports Server (NTRS)
Cavanaugh, Stephen; Chytka, Trina; Arcara, Phil; Jones, Sharon; Stanley, Doug; Wilhite, Alan W.
2006-01-01
Systems analysis develops and documents candidate mission and architectures, associated system concepts, enabling capabilities and investment strategies to achieve NASA s strategic objectives. The technology assessment process connects the mission and architectures to the investment strategies. In order to successfully implement a technology assessment, there is a need to collect, manipulate, analyze, document, and disseminate technology-related information. Information must be collected and organized on the wide variety of potentially applicable technologies, including: previous research results, key technical parameters and characteristics, technology readiness levels, relationships to other technologies, costs, and potential barriers and risks. This information must be manipulated to facilitate planning and documentation. An assessment is included of the programmatic and technical risks associated with each technology task as well as potential risk mitigation plans. Risks are assessed and tracked in terms of likelihood of the risk occurring and consequences of the risk if it does occur. The risk assessments take into account cost, schedule, and technical risk dimensions. Assessment data must be simplified for presentation to decision makers. The Systems Analysis and Concepts Directorate (SACD) at NASA Langley Research Center has a wealth of experience in performing Technology Assessment and Portfolio Analysis as this has been a business line since 1978.
[Business intelligence in radiology. Challenges and opportunities].
Escher, A; Boll, D
2015-10-01
Due to economic pressures and need for higher transparency, a ubiquitous availability of administrative information is needed. Therefore radiology managers should consider implementing business intelligence (BI) solutions. BI is defined as a systemic approach to support decision-making in business administration. It is an important part of the overall strategy of an organization. Implementation and operation is initially associated with costs and for a successful launch important prerequisites must be fulfilled. First, a suitable product must be selected, followed by the technical and organizational implementation. After consideration of the type of data to be collected and a system of key performance indicators must be established. BI replaces classic retrospective business reporting with multidimensional and multifactorial analyses, real-time monitoring, and predictive analyses. The benefits of BI include the rapid availability of important information and the depth of possible data analysis. The simple and intuitive use of modern BI applications by the users themselves (!) combined with a continuous availability of information is the key to success. Professional BI will be an important part of management in radiology in the future.
Feller, Tara T; Doucette, William R; Witry, Matthew J
2016-06-25
Objective. To summarize student pharmacist leadership development opportunities delivered by pharmacy programs, to describe selected opportunities, and to assess how these opportunities meet leadership development competencies. Methods. A multi-method study was conducted that comprised a systematic content analysis of pharmacy education journals, pharmacy program websites, and telephone interviews with key informants, which included open-ended questions and scaled responses. Results. Review of six articles, 37 American Association of Colleges of Pharmacy (AACP) Annual Meeting abstracts, and 138 websites resulted in the identification of 191 leadership development opportunities. These consisted of courses, projects/programs, and events/speaker series. Interviews with 12 key informants detailed unique events that developed leadership competencies. Formal assessments of student leadership development were limited and primarily focused on informal feedback and course evaluations. Conclusion. Most US pharmacy programs offer their students an array of opportunities to develop leadership abilities. Pharmacy programs should consider expanding opportunities beyond elective courses, learn from the successes of others to implement new leadership development opportunities, and bolster the assessment of student leadership competencies and outcomes.
Feller, Tara T.; Witry, Matthew J.
2016-01-01
Objective. To summarize student pharmacist leadership development opportunities delivered by pharmacy programs, to describe selected opportunities, and to assess how these opportunities meet leadership development competencies. Methods. A multi-method study was conducted that comprised a systematic content analysis of pharmacy education journals, pharmacy program websites, and telephone interviews with key informants, which included open-ended questions and scaled responses. Results. Review of six articles, 37 American Association of Colleges of Pharmacy (AACP) Annual Meeting abstracts, and 138 websites resulted in the identification of 191 leadership development opportunities. These consisted of courses, projects/programs, and events/speaker series. Interviews with 12 key informants detailed unique events that developed leadership competencies. Formal assessments of student leadership development were limited and primarily focused on informal feedback and course evaluations. Conclusion. Most US pharmacy programs offer their students an array of opportunities to develop leadership abilities. Pharmacy programs should consider expanding opportunities beyond elective courses, learn from the successes of others to implement new leadership development opportunities, and bolster the assessment of student leadership competencies and outcomes. PMID:27402982
Stakeholder attitudes and needs regarding cell-free fetal DNA testing.
Hill, Melissa; Lewis, Celine; Chitty, Lyn S
2016-04-01
To explore stakeholder views on cell-free DNA testing and highlight findings important for successful implementation and the provision of best practice in counseling. Noninvasive tests based on the analysis of cell-free fetal DNA are now widely available in clinical practice and applications are expanding rapidly. It is essential that stakeholder views are considered in order to identify and address any ethical and social issues. We provide an overview of stakeholder viewpoints and then focus on the key issues of informed decision making, test uptake, service delivery and information sources. Stakeholders are positive about the introduction of cell-free fetal DNA testing into clinical practice. They describe both practical and psychological benefits arising from tests that are safe and can potentially be performed earlier in pregnancy. Key concerns, which include the potential for these tests to have a negative impact on informed decision making and increased societal pressure to have testing, can be addressed through careful parent-directed counseling. As applications for these tests expand it is increasingly important to develop innovative approaches to facilitate good understanding for parents who are offered noninvasive prenatal testing.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dowell, Larry Jonathan
Disclosed is a method and device for aligning at least two digital images. An embodiment may use frequency-domain transforms of small tiles created from each image to identify substantially similar, "distinguishing" features within each of the images, and then align the images together based on the location of the distinguishing features. To accomplish this, an embodiment may create equal sized tile sub-images for each image. A "key" for each tile may be created by performing a frequency-domain transform calculation on each tile. A information-distance difference between each possible pair of tiles on each image may be calculated to identify distinguishingmore » features. From analysis of the information-distance differences of the pairs of tiles, a subset of tiles with high discrimination metrics in relation to other tiles may be located for each image. The subset of distinguishing tiles for each image may then be compared to locate tiles with substantially similar keys and/or information-distance metrics to other tiles of other images. Once similar tiles are located for each image, the images may be aligned in relation to the identified similar tiles.« less
NASA Astrophysics Data System (ADS)
Montero-Lorenzo, José-María; Larraz-Iribas, Beatriz; Páez, Antonio
2009-12-01
A vast majority of the recent literature on spatial hedonic analysis has been concerned with residential property values, with only very few examples of studies focused on commercial property prices. The dearth of studies can be attributed to some of the challenges faced in the analysis of commercial properties, in particular the scarcity of information compared to residential transactions. In order to address this issue, in this paper we propose the use of cokriging and housing prices as ancillary information to estimate commercial property prices. Cokriging takes into account the spatial autocorrelation structure of property prices, and the use of more abundant information on housing prices helps to improve the accuracy of property value estimates. A case study of Toledo in Spain, a city for which commercial activity stemming from tourism is one of the key elements of the economy in the city, demonstrates that substantial accuracy and precision gains can be obtained from the use of cokriging.
NASA Astrophysics Data System (ADS)
Gupta, Mousumi; Chatterjee, Somenath
2018-04-01
Surface texture is an important issue to realize the nature (crest and trough) of surfaces. Atomic force microscopy (AFM) image is a key analysis for surface topography. However, in nano-scale, the nature (i.e., deflection or crack) as well as quantification (i.e., height or depth) of deposited layers is essential information for material scientist. In this paper, a gradient-based K-means algorithm is used to differentiate the layered surfaces depending on their color contrast of as-obtained from AFM images. A transformation using wavelet decomposition is initiated to extract the information about deflection or crack on the material surfaces from the same images. Z-axis depth analysis from wavelet coefficients provides information about the crack present in the material. Using the above method corresponding surface information for the material is obtained. In addition, the Gaussian filter is applied to remove the unwanted lines, which occurred during AFM scanning. Few known samples are taken as input, and validity of the above approaches is shown.
User Interaction with the CNPC Link
NASA Technical Reports Server (NTRS)
Hobbs, Alan; Lyall, Elizabeth A.
2014-01-01
As part of NASAs UAS in the NAS project, human factor guidelines are being developed for the ground control station of unmanned aircraft systems. A critical task for the pilot of a UAS is the management and control of the terrestrial radio links used to provide control of the vehicle and relay communications with air traffic control. An analysis of the task of the UAS pilot has been conducted to identify areas where guidelines are required. This analysis has identified a set of information requirements that must be supported by the radio equipment used to provide Control and Non-payload Communication (CNPC). Key requirements include the need for an alert when the link is lost, information on the current quality and latency of the link, and information to enable the future quality of the link to be anticipated as the aircraft changes location. These identified requirements can assist in the development of minimum operational performance standards for CNPC equipment.
PACSY, a relational database management system for protein structure and chemical shift analysis
Lee, Woonghee; Yu, Wookyung; Kim, Suhkmann; Chang, Iksoo
2012-01-01
PACSY (Protein structure And Chemical Shift NMR spectroscopY) is a relational database management system that integrates information from the Protein Data Bank, the Biological Magnetic Resonance Data Bank, and the Structural Classification of Proteins database. PACSY provides three-dimensional coordinates and chemical shifts of atoms along with derived information such as torsion angles, solvent accessible surface areas, and hydrophobicity scales. PACSY consists of six relational table types linked to one another for coherence by key identification numbers. Database queries are enabled by advanced search functions supported by an RDBMS server such as MySQL or PostgreSQL. PACSY enables users to search for combinations of information from different database sources in support of their research. Two software packages, PACSY Maker for database creation and PACSY Analyzer for database analysis, are available from http://pacsy.nmrfam.wisc.edu. PMID:22903636
NASA Technical Reports Server (NTRS)
Noll, Carey E.; Torrence, Mark H.; Pollack, Nathan H.; Tyahla, Lori J.
2013-01-01
The ILRS website, http://ilrs.gsfc.nasa.gov, is the central source of information for all aspects of the service. The website provides information on the organization and operation of the ILRS and descriptions of ILRS components data, and products. Furthermore, the website provides an entry point to the archive of these data products available through the data centers. Links are provided to extensive information on the ILRS network stations including performance assesments and data quality evaluations. Descriptions of suported satellite missions (current, future, and past) are provided to aid in station acquisition and data analysis. The website was reently redesigned. Content was reviewed during the update process, ensuring information is current and useful. This poster will provide specific examples of key sections, applicaitons, and webpages.
DOT National Transportation Integrated Search
2004-01-28
This document presents the detailed plan to conduct the Key Informants Interviews Test, one of several test activities to be conducted as part of the national evaluation of the regional, multi-modal 511 Traveler Information System Model Deployment. T...
Distinguishability of quantum states and shannon complexity in quantum cryptography
NASA Astrophysics Data System (ADS)
Arbekov, I. M.; Molotkov, S. N.
2017-07-01
The proof of the security of quantum key distribution is a rather complex problem. Security is defined in terms different from the requirements imposed on keys in classical cryptography. In quantum cryptography, the security of keys is expressed in terms of the closeness of the quantum state of an eavesdropper after key distribution to an ideal quantum state that is uncorrelated to the key of legitimate users. A metric of closeness between two quantum states is given by the trace metric. In classical cryptography, the security of keys is understood in terms of, say, the complexity of key search in the presence of side information. In quantum cryptography, side information for the eavesdropper is given by the whole volume of information on keys obtained from both quantum and classical channels. The fact that the mathematical apparatuses used in the proof of key security in classical and quantum cryptography are essentially different leads to misunderstanding and emotional discussions [1]. Therefore, one should be able to answer the question of how different cryptographic robustness criteria are related to each other. In the present study, it is shown that there is a direct relationship between the security criterion in quantum cryptography, which is based on the trace distance determining the distinguishability of quantum states, and the criterion in classical cryptography, which uses guesswork on the determination of a key in the presence of side information.
McAlearney, Ann Scheck; Walker, Daniel; Moss, Alexandra DeNardis; Bickell, Nina A.
2015-01-01
Background Qualitative Comparative Analysis (QCA) is a methodology created to address causal complexity in social sciences research by preserving the objectivity of quantitative data analysis without losing detail inherent in qualitative research. However, its use in health services research (HSR) is limited, and questions remain about its application in this context. Objective To explore the strengths and weaknesses of using QCA for HSR. Research Design Using data from semi-structured interviews conducted as part of a multiple case study about adjuvant treatment underuse among underserved breast cancer patients, findings were compared using qualitative approaches with and without QCA to identify strengths, challenges, and opportunities presented by QCA. Subjects Ninety administrative and clinical key informants interviewed across ten NYC area safety net hospitals. Measures Transcribed interviews were coded by three investigators using an iterative and interactive approach. Codes were calibrated for QCA, as well as examined using qualitative analysis without QCA. Results Relative to traditional qualitative analysis, QCA strengths include: (1) addressing causal complexity, (2) results presentation as pathways as opposed to a list, (3) identification of necessary conditions, (4) the option of fuzzy-set calibrations, and (5) QCA-specific parameters of fit that allow researchers to compare outcome pathways. Weaknesses include: (1) few guidelines and examples exist for calibrating interview data, (2) not designed to create predictive models, and (3) unidirectionality. Conclusions Through its presentation of results as pathways, QCA can highlight factors most important for production of an outcome. This strength can yield unique benefits for HSR not available through other methods. PMID:26908085
McAlearney, Ann Scheck; Walker, Daniel; Moss, Alexandra D; Bickell, Nina A
2016-04-01
Qualitative comparative analysis (QCA) is a methodology created to address causal complexity in social sciences research by preserving the objectivity of quantitative data analysis without losing detail inherent in qualitative research. However, its use in health services research (HSR) is limited, and questions remain about its application in this context. To explore the strengths and weaknesses of using QCA for HSR. Using data from semistructured interviews conducted as part of a multiple case study about adjuvant treatment underuse among underserved breast cancer patients, findings were compared using qualitative approaches with and without QCA to identify strengths, challenges, and opportunities presented by QCA. Ninety administrative and clinical key informants interviewed across 10 NYC area safety net hospitals. Transcribed interviews were coded by 3 investigators using an iterative and interactive approach. Codes were calibrated for QCA, as well as examined using qualitative analysis without QCA. Relative to traditional qualitative analysis, QCA strengths include: (1) addressing causal complexity, (2) results presentation as pathways as opposed to a list, (3) identification of necessary conditions, (4) the option of fuzzy-set calibrations, and (5) QCA-specific parameters of fit that allow researchers to compare outcome pathways. Weaknesses include: (1) few guidelines and examples exist for calibrating interview data, (2) not designed to create predictive models, and (3) unidirectionality. Through its presentation of results as pathways, QCA can highlight factors most important for production of an outcome. This strength can yield unique benefits for HSR not available through other methods.
Improving informed consent: Stakeholder views
Anderson, Emily E.; Newman, Susan B.; Matthews, Alicia K.
2017-01-01
Purpose Innovation will be required to improve the informed consent process in research. We aimed to obtain input from key stakeholders—research participants and those responsible for obtaining informed consent—to inform potential development of a multimedia informed consent “app.” Methods This descriptive study used a mixed-methods approach. Five 90-minute focus groups were conducted with volunteer samples of former research participants and researchers/research staff responsible for obtaining informed consent. Participants also completed a brief survey that measured background information and knowledge and attitudes regarding research and the use of technology. Established qualitative methods were used to conduct the focus groups and data analysis. Results We conducted five focus groups with 41 total participants: three groups with former research participants (total n = 22), and two groups with researchers and research coordinators (total n = 19). Overall, individuals who had previously participated in research had positive views regarding their experiences. However, further discussion elicited that the informed consent process often did not meet its intended objectives. Findings from both groups are presented according to three primary themes: content of consent forms, experience of the informed consent process, and the potential of technology to improve the informed consent process. A fourth theme, need for lay input on informed consent, emerged from the researcher groups. Conclusions Our findings add to previous research that suggests that the use of interactive technology has the potential to improve the process of informed consent. However, our focus-group findings provide additional insight that technology cannot replace the human connection that is central to the informed consent process. More research that incorporates the views of key stakeholders is needed to ensure that multimedia consent processes do not repeat the mistakes of paper-based consent forms. PMID:28949896
Improving informed consent: Stakeholder views.
Anderson, Emily E; Newman, Susan B; Matthews, Alicia K
2017-01-01
Innovation will be required to improve the informed consent process in research. We aimed to obtain input from key stakeholders-research participants and those responsible for obtaining informed consent-to inform potential development of a multimedia informed consent "app." This descriptive study used a mixed-methods approach. Five 90-minute focus groups were conducted with volunteer samples of former research participants and researchers/research staff responsible for obtaining informed consent. Participants also completed a brief survey that measured background information and knowledge and attitudes regarding research and the use of technology. Established qualitative methods were used to conduct the focus groups and data analysis. We conducted five focus groups with 41 total participants: three groups with former research participants (total n = 22), and two groups with researchers and research coordinators (total n = 19). Overall, individuals who had previously participated in research had positive views regarding their experiences. However, further discussion elicited that the informed consent process often did not meet its intended objectives. Findings from both groups are presented according to three primary themes: content of consent forms, experience of the informed consent process, and the potential of technology to improve the informed consent process. A fourth theme, need for lay input on informed consent, emerged from the researcher groups. Our findings add to previous research that suggests that the use of interactive technology has the potential to improve the process of informed consent. However, our focus-group findings provide additional insight that technology cannot replace the human connection that is central to the informed consent process. More research that incorporates the views of key stakeholders is needed to ensure that multimedia consent processes do not repeat the mistakes of paper-based consent forms.
Information gathering, management and transfering for geospacial intelligence
NASA Astrophysics Data System (ADS)
Nunes, Paulo; Correia, Anacleto; Teodoro, M. Filomena
2017-07-01
Information is a key subject in modern organization operations. The success of joint and combined operations with organizations partners depends on the accurate information and knowledge flow concerning the operations theatre: provision of resources, environment evolution, markets location, where and when an event occurred. As in the past and nowadays we cannot conceive modern operations without maps and geo-spatial information (GI). Information and knowledge management is fundamental to the success of organizational decisions in an uncertainty environment. The georeferenced information management is a process of knowledge management, it begins in the raw data and ends on generating knowledge. GI and intelligence systems allow us to integrate all other forms of intelligence and can be a main platform to process and display geo-spatial-time referenced events. Combining explicit knowledge with peoples know-how to generate a continuous learning cycle that supports real time decisions mitigates the influences of fog of everyday competition and provides the knowledge supremacy. Extending the preliminary analysis done in [1], this work applies the exploratory factor analysis to a questionnaire about the GI and intelligence management in an organization company allowing to identify future lines of action to improve information process sharing and exploration of all the potential of this important resource.
Practical Quantum Cryptography for Secure Free-Space Communications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.
1999-02-01
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less
FREE-SPACE QUANTUM CRYPTOGRAPHY IN DAYLIGHT
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, R.J.; Buttler, W.T.
2000-01-01
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less
ERIC Educational Resources Information Center
Barefoot, Helen; Oliver, Martin; Mellar, Harvey
2016-01-01
This paper explores the ways in which information about course pedagogy has been represented to potential students through national descriptors and specifications such as the United Kingdom's Key Information Set. It examines the extent to which such descriptors provide helpful information about pedagogy, for example innovative uses of technology.…
Strachan, Clare; Wharton–Smith, Alexandra; Sinyangwe, Chomba; Mubiru, Denis; Ssekitooleko, James; Meier, Joslyn; Gbanya, Miatta; Tibenderana, James K.; Counihan, Helen
2014-01-01
Numerous studies highlight the effectiveness of an integrated approach for the management of malaria, pneumonia and diarrhoea at the community level. There has however been little study on lessons learnt from implementation in practice and stakeholder experiences which could inform future programmatic planning and evaluation frameworks. A participatory, qualitative evaluation was conducted in the three varied settings of South Sudan, Uganda and Zambia, which have seen the scale up of integrated community case management (iCCM) over the last five years. All key in–country stakeholders were consulted on study design, with a particular focus on scope and methodology. Data collection methods included stakeholder consultations (key informant interviews, focus group discussions), and a review of project and Ministry of Health documentation. Data analysis followed the Framework Approach. Results suggest that iCCM implementation generally followed national pre–agreed guidelines. Overarching key programmatic recommendations included: collaboration with implementing partners in planning stages to positively impact on community acceptance and ownership; adoption of participatory training methods adapted to low literacy populations; development of alternative support supervision methods such as peer support groups; full integration of community level data into the health management information system and emphasizing data analysis, use and feedback at all levels; strengthened supply chains through improved quantification and procurement of commodities in conjunction with the national distribution network; community engagement to establish a support system for community health workers to increase their motivation; enhanced sensitisation and behaviour change communication to raise awareness and usage of appropriate health services; and advocacy at the national level for funding and logistical support for the continuation and integration of iCCM. This qualitative study is a valuable contribution in understanding the ‘hows’ of iCCM implementation with key insights for improved feasibility and acceptability. Main findings show how community support to iCCM and community health workers is necessary for sustained health benefits coupled with a focus on strengthening and ‘enabling’ the public health system. The participatory study design and methodologies used enabled the scope of the research enquiry to effectively capture various stakeholder perspectives. PMID:25520794
Gorham, Jonathan C; Clark, David R; Bresette, Michael J; Bagley, Dean A; Keske, Carrie L; Traxler, Steve L; Witherington, Blair E; Shamblin, Brian M; Nairn, Campbell J
2014-01-01
In order to provide information to better inform management decisions and direct further research, vessel-based visual transects, snorkel transects, and in-water capture techniques were used to characterize hawksbill sea turtles in the shallow marine habitats of a Marine Protected Area (MPA), the Key West National Wildlife Refuge in the Florida Keys. Hawksbills were found in hardbottom and seagrass dominated habitats throughout the Refuge, and on man-made rubble structures in the Northwest Channel near Cottrell Key. Hawksbills captured (N = 82) were exclusively juveniles and subadults with a straight standard carapace length (SSCL) ranging from 21.4 to 69.0cm with a mean of 44.1 cm (SD = 10.8). Somatic growth rates were calculated from 15 recaptured turtles with periods at large ranging from 51 to 1188 days. Mean SSCL growth rate was 7.7 cm/year (SD = 4.6). Juvenile hawksbills (<50 cm SSCL) showed a significantly higher growth rate (9.2 cm/year, SD = 4.5, N = 11) than subadult hawksbills (50-70 cm SSCL, 3.6 cm/year, SD = 0.9, N = 4). Analysis of 740 base pair mitochondrial control region sequences from 50 sampled turtles yielded 12 haplotypes. Haplotype frequencies were significantly different compared to four other Caribbean juvenile foraging aggregations, including one off the Atlantic coast of Florida. Many-to-one mixed stock analysis indicated Mexico as the primary source of juveniles in the region and also suggested that the Refuge may serve as important developmental habitat for the Cuban nesting aggregation. Serum testosterone radioimmunoassay results from 33 individuals indicated a female biased sex ratio of 3.3 females: 1 male for hawksbills in the Refuge. This assemblage of hawksbills is near the northern limit of the species range, and is one of only two such assemblages described in the waters of the continental United States. Since this assemblage resides in an MPA with intensive human use, basic information on the assemblage is vital to resource managers charged with conservation and species protection in the MPA.
Gorham, Jonathan C.; Clark, David R.; Bresette, Michael J.; Bagley, Dean A.; Keske, Carrie L.; Traxler, Steve L.; Witherington, Blair E.; Shamblin, Brian M.; Nairn, Campbell J.
2014-01-01
In order to provide information to better inform management decisions and direct further research, vessel-based visual transects, snorkel transects, and in-water capture techniques were used to characterize hawksbill sea turtles in the shallow marine habitats of a Marine Protected Area (MPA), the Key West National Wildlife Refuge in the Florida Keys. Hawksbills were found in hardbottom and seagrass dominated habitats throughout the Refuge, and on man-made rubble structures in the Northwest Channel near Cottrell Key. Hawksbills captured (N = 82) were exclusively juveniles and subadults with a straight standard carapace length (SSCL) ranging from 21.4 to 69.0cm with a mean of 44.1 cm (SD = 10.8). Somatic growth rates were calculated from 15 recaptured turtles with periods at large ranging from 51 to 1188 days. Mean SSCL growth rate was 7.7 cm/year (SD = 4.6). Juvenile hawksbills (<50 cm SSCL) showed a significantly higher growth rate (9.2 cm/year, SD = 4.5, N = 11) than subadult hawksbills (50–70 cm SSCL, 3.6 cm/year, SD = 0.9, N = 4). Analysis of 740 base pair mitochondrial control region sequences from 50 sampled turtles yielded 12 haplotypes. Haplotype frequencies were significantly different compared to four other Caribbean juvenile foraging aggregations, including one off the Atlantic coast of Florida. Many-to-one mixed stock analysis indicated Mexico as the primary source of juveniles in the region and also suggested that the Refuge may serve as important developmental habitat for the Cuban nesting aggregation. Serum testosterone radioimmunoassay results from 33 individuals indicated a female biased sex ratio of 3.3 females: 1 male for hawksbills in the Refuge. This assemblage of hawksbills is near the northern limit of the species range, and is one of only two such assemblages described in the waters of the continental United States. Since this assemblage resides in an MPA with intensive human use, basic information on the assemblage is vital to resource managers charged with conservation and species protection in the MPA. PMID:25517946
New Roles for Medical Assistants in Innovative Primary Care Practices.
Chapman, Susan A; Blash, Lisel K
2017-02-01
To identify and describe new roles for medical assistants (MAs) in innovative care models that improve care while providing training and career advancement opportunities for MAs. Primary data collected at 15 case study sites; 173 key informant interviews and de-identified secondary data on staffing, wages, patient satisfaction, and health outcomes. Researchers used snowball sampling and screening calls to identify 15 organizations using MAs in new roles. Conducted site visits from 2010 to 2012 and updated information in 2014. Thematic analysis explored key topics: factors driving MA role innovation, role description, training required, and wage gains. Categorized outcome data in patient and staff satisfaction, quality of care, and efficiency. New MA roles included health coach, medical scribe, dual role translator, health navigator, panel manager, cross-trained flexible role, and supervisor. Implementation of new roles required extensive training. MA incentives and enhanced compensation varied by role type. New MA roles are part of a larger attempt to reform workflow and relieve primary care providers. Despite some evidence of success, spread has been limited. Key challenges to adoption included leadership and provider resistance to change, cost of additional MA training, and lack of reimbursement for nonbillable services. © Health Research and Educational Trust.
Twelve tips for creating trigger images for problem-based learning cases.
Azer, Samy A
2007-03-01
A trigger is the starting point of problem-based learning (PBL) cases. It is usually in the form of 5-6 text lines that provide the key information about the main character (usually the patient), including 3-4 of patient's presenting problems. In addition to the trigger text, most programs using PBL include a visual trigger. This might be in the form of a single image, a series of images, a video clip, a cartoon, or even one of the patient's investigation results (e.g. chest X-ray, pathology report, or urine sample analysis). The main educational objectives of the trigger image are as follows: (1) to introduce the patient to the students; (2) to enhance students' observation skills; (3) to provide them with new information to add to the cues obtained from the trigger text; and (4) to stimulate students to ask questions as they develop their enquiry plan. When planned and delivered effectively, trigger images should be engaging and stimulate group discussion. Understanding the educational objectives of using trigger images and choosing appropriate images are the keys for constructing successful PBL cases. These twelve tips highlight the key steps in the successful creation of trigger images.
Contingency management: perspectives of Australian service providers.
Cameron, Jacqui; Ritter, Alison
2007-03-01
Given the very positive and extensive research evidence demonstrating efficacy and effectiveness of contingency management, it is important that Australia explore whether contingency management has a role to play in our own treatment context. Qualitative interviews were conducted with 30 experienced alcohol and drug practitioners, service managers and policy-makers in Victoria. Interviewees were selected to represent the range of drug treatment services types and included rural representation. A semi-structured interview schedule, covering their perceptions and practices of contingency management was used. All interviews were transcribed verbatim and analysed using N2 qualitative data analysis program. The majority of key informants were positively inclined toward contingency management, notwithstanding some concerns about the philosophical underpinnings. Concerns were raised in relation to the use of monetary rewards. Examples of the use of contingency management provided by key informants demonstrated an over-inclusive definition: all the examples did not adhere to the key principles of contingency management. This may create problems if a structured contingency management were to be introduced in Australia. Contingency management is an important adjunctive treatment intervention and its use in Australia has the potential to enhance treatment outcomes. No unmanageable barriers were identified in this study.
Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.
Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075
Informal Recyclers' Health Inequities in Vancouver, BC.
Wittmer, Josie; Parizeau, Kate
2018-01-01
We explore informal recyclers' perceptions and experiences of the social determinants of health in Vancouver, Canada, and investigate the factors that contribute to the environmental health inequities they experience. Based on in-depth interviews with 40 informal recyclers and 7 key informants, we used a social determinants of health framework to detail the health threats that informal recyclers associated with their work and the factors that influenced their access to health-related resources and services. Our analysis reveals that the structural factors influencing environmental health inequities included insufficient government resources for low-income urbanites; the potential for stigma, clientization, and discrimination at some health and social service providers; and the legal marginalization of informal recycling and associated activities. We conclude that Vancouver's informal recyclers experience inequitable access to health-related resources and services, and they are knowledgeable observers of the factors that influence their own health and well-being.
Zhang, Liping; Zhu, Shaohui; Tang, Shanyu
2017-03-01
Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.
Summary of ADTT Website Functionality and Features
NASA Technical Reports Server (NTRS)
Hawke, Veronica; Duong, Trang; Liang, Lawrence; Gage, Peter; Lawrence, Scott (Technical Monitor)
2001-01-01
This report summarizes development of the ADTT web-based design environment by the ELORET team in 2000. The Advanced Design Technology Testbed had been in development for several years, with demonstration applications restricted to aerodynamic analyses of subsonic aircraft. The key changes achieved this year were improvements in Web-based accessibility, evaluation of collaborative visualization, remote invocation of geometry updates and performance analysis, and application to aerospace system analysis. Significant effort was also devoted to post-processing of data, chiefly through comparison of similar data for alternative vehicle concepts. Such comparison is an essential requirement for designers to make informed choices between alternatives. The next section of this report provides more discussion of the goals for ADTT development. Section 3 provides screen shots from a sample session in the ADTT environment, including Login and navigation to the project of interest, data inspection, analysis execution and output evaluation. The following section provides discussion of implementation details and recommendations for future development of the software and information technologies that provide the key functionality of the ADTT system. Section 5 discusses the integration architecture for the system, which links machines running different operating systems and provides unified access to data stored in distributed locations. Security is a significant issue for this system, especially for remote access to NAS machines, so Section 6 discusses several architectural considerations with respect to security. Additional details of some aspects of ADTT development are included in Appendices.
Green, Ruth H; Evans, Val; MacLeod, Sheona; Barratt, Jonathan
2018-02-01
Major changes in the design and delivery of clinical academic training in the United Kingdom have occurred yet there has been little exploration of the perceptions of integrated clinic academic trainees or educators. We obtained the views of a range of key stakeholders involved in clinical academic training in the East Midlands. A qualitative study with inductive iterative thematic content analysis of findings from trainee surveys and facilitated focus groups. The East Midlands School of Clinical Academic Training. Integrated Clinical Academic Trainees, clinical and academic educators involved in clinical academic training. The experience, opinions and beliefs of key stakeholders about barriers and enablers in the delivery of clinical academic training. We identified key themes many shared by both trainees and educators. These highlighted issues in the systems and process of the integrated academic pathways, career pathways, supervision and support, the assessment process and the balance between clinical and academic training. Our findings help inform the future development of integrated academic training programmes.
NASA Astrophysics Data System (ADS)
Wang, Lian; Zhou, Yuan-yuan; Zhou, Xue-jun; Chen, Xiao
2018-03-01
Based on the orbital angular momentum and pulse position modulation, we present a novel passive measurement-device-independent quantum key distribution (MDI-QKD) scheme with the two-mode source. Combining with the tight bounds of the yield and error rate of single-photon pairs given in our paper, we conduct performance analysis on the scheme with heralded single-photon source. The numerical simulations show that the performance of our scheme is significantly superior to the traditional MDI-QKD in the error rate, key generation rate and secure transmission distance, since the application of orbital angular momentum and pulse position modulation can exclude the basis-dependent flaw and increase the information content for each single photon. Moreover, the performance is improved with the rise of the frame length. Therefore, our scheme, without intensity modulation, avoids the source side channels and enhances the key generation rate. It has greatly utility value in the MDI-QKD setups.
A New Quantum Gray-Scale Image Encoding Scheme
NASA Astrophysics Data System (ADS)
Naseri, Mosayeb; Abdolmaleky, Mona; Parandin, Fariborz; Fatahi, Negin; Farouk, Ahmed; Nazari, Reza
2018-02-01
In this paper, a new quantum images encoding scheme is proposed. The proposed scheme mainly consists of four different encoding algorithms. The idea behind of the scheme is a binary key generated randomly for each pixel of the original image. Afterwards, the employed encoding algorithm is selected corresponding to the qubit pair of the generated randomized binary key. The security analysis of the proposed scheme proved its enhancement through both randomization of the generated binary image key and altering the gray-scale value of the image pixels using the qubits of randomized binary key. The simulation of the proposed scheme assures that the final encoded image could not be recognized visually. Moreover, the histogram diagram of encoded image is flatter than the original one. The Shannon entropies of the final encoded images are significantly higher than the original one, which indicates that the attacker can not gain any information about the encoded images. Supported by Kermanshah Branch, Islamic Azad University, Kermanshah, IRAN
Li, Jinqing; Qi, Hui; Cong, Ligang; Yang, Huamin
2017-01-01
Both symmetric and asymmetric color image encryption have advantages and disadvantages. In order to combine their advantages and try to overcome their disadvantages, chaos synchronization is used to avoid the key transmission for the proposed semi-symmetric image encryption scheme. Our scheme is a hybrid chaotic encryption algorithm, and it consists of a scrambling stage and a diffusion stage. The control law and the update rule of function projective synchronization between the 3-cell quantum cellular neural networks (QCNN) response system and the 6th-order cellular neural network (CNN) drive system are formulated. Since the function projective synchronization is used to synchronize the response system and drive system, Alice and Bob got the key by two different chaotic systems independently and avoid the key transmission by some extra security links, which prevents security key leakage during the transmission. Both numerical simulations and security analyses such as information entropy analysis, differential attack are conducted to verify the feasibility, security, and efficiency of the proposed scheme. PMID:28910349
Designing Iranian Model to Assess the Level of Health System Responsiveness.
Askari, Roohollah; Arab, Mohammad; Rashidian, Arash; Akbari-Sari, Ali; Hosseini, Seyed Mostafa; Gharaee, Hojat
2016-03-01
Given the rapid pace of changes in community health needs and the mission of healthcare organizations to provide and promote the community's health, the growing need to increase health system responsiveness to people as a key element of observance and fulfillment of justice is felt more than ever. This study was aimed at designing the native model of responsiveness for Iran and to validate the aspects of the proposed model. Our study had a cross-sectional design and was a validation study performed in 2014. In order to define and identify responsiveness model aspects, the first phase recorded the views of 200 key informants from 19 provinces of Iran. Snowball sampling was used to select experts (based on WHO guideline). Then, the opinions of 18 comments were received from service recipients in the form of three focus group discussions and were analyzed by the frame framework analysis (interviewed recipients were selected using the purposive sampling method). Finally, in order to confirm the model's efficacy, a responsiveness questionnaire with 7 aspects (domains) and 52 indicators (items) obtained from the initial proposed model was answered by 600 members of the selected families in the two provinces of Fars and Yazd. A multi-stage cluster sampling approach was used for the household survey. The results were analyzed by the Confirmatory Factor Analysis (CFA) test and through the use of Lisrel software. Confirmatory Factor Analysis, based on the results of the key informant survey and group discussions, showed that according to quantities of GFI = 0.91, CFI = 0.93, NFI = 0.91, RMSEA = 0.074, SRMR = 0.061 and Hoelter (CN) = 178.54 in outpatient services and where GFI = 0.89, CFI = 0.91, NFI = 0.86, RMSEA = 0.064, SRMR = 0.053 and Hoelter (CN) = 158.93 for inpatient services, seven factors (F) (dignity, informed choice, confidentiality, patient training and informing, access to services, quality of basic amenities, and access to social support) are the main determinants of the responsiveness model and proposed model validity. Given the comprehensiveness of presented aspects and indicators in this proposed model and its validity test, the aforementioned responsiveness model can be considered a suitable model to use when assessing the levels of health system responsiveness in Iran.
Frontiers in Ecosystem Science: Energizing the Research Agenda
NASA Astrophysics Data System (ADS)
Weathers, K. C.; Groffman, P. M.; VanDolah, E.
2014-12-01
Ecosystem science has a long history as a core component of the discipline of Ecology, and although topics of research have fluctuated over the years, it retains a clear identity and continues to be a vital field. As science is becoming more interdisciplinary, particularly the science of global environmental change, ecosystem scientists are addressing new and important questions at the interface of multiple disciplines. Over the last two years, we organized a series of workshops and discussion groups at multiple scientific-society meetings, including AGU to identify frontiers in ecosystem research. The workshops featured short "soapbox" presentations where speakers highlighted key questions in ecosystem science. The presentations were recorded (video and audio) and subjected to qualitative text analysis for identification of frontier themes, attendees completed surveys, and a dozen additional "key informants" were interviewed about their views about frontiers of the discipline. Our effort produced 253 survey participants; the two largest groups of participants were full professors (24%) and graduate students (24%); no other specific group was > 10%. Formal text analysis of the soapbox presentations produced three major themes; "frontiers," "capacity building," and "barriers to implementation" with four or five sub-themes within each major theme. Key "frontiers" included; 1) better understanding of the drivers of ecosystem change, 2) better understanding of ecosystem process and function, 3) human dimensions of ecosystem science, and 4) problem-solving/applied research. Under "capacity building," key topics included: holistic approaches, cross-disciplinary collaboration, public support for research, data, training, and technology investment. Under "barriers" key topics included: limitations in theoretical thinking, insufficient funding/support, fragmentation across discipline, data access and data synthesis. In-depth interviews with 13 experts validated findings from analysis of soapbox presentations and surveys and also resulted in a conceptual model for understanding disciplinary frontiers.
du Toit, Rènée; Courtright, Paul; Lewallen, Susan
2017-06-01
An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.
Farmer, Anna P; Nikolopoulos, Hara; McCargar, Linda; Berry, Tanya; Mager, Diana
2015-06-01
The objective of the present study was to gain an understanding of the organizational characteristics and processes in two child-care centres that may influence adoption of the Alberta Nutrition Guidelines for Children and Youth (ANGCY). In-depth qualitative case studies. Data were collected through direct observations, key informant interviews and field notes. Diffusion of Innovations theory guided the evaluation and intrinsic case analysis. Two urban child-care centres in Edmonton, Alberta, Canada identified as exemplary early adopter cases. Ten key informants comprised of directors, junior and senior staff members participated in interviews. Organizational processes such as leadership, networking and knowledge brokering, health champions and organizational culture positively influenced adoption behaviour in child-care centres. A key determinant influencing organizational behaviour within both centres was the directors' strong leadership. Acceptance of and adherence to the guidelines were facilitated by organizational factors, such as degree of centralization, formalization and complexity, level of staff training and education. Knowledge brokering by directors was important for transferring and exchanging information across the centre. All child-care staff embraced their informal role as health champions as essential to supporting guideline adherence and encouraging healthy food and eating environments. Organizational processes and characteristics such as leadership, knowledge brokering and networking, organizational culture and health champions played an important role in the adoption of nutrition guidelines in child-care centres. The complex interplay of decision making, organization of work and specialization of roles influenced the extent to which nutrition guidelines were adopted.
Short, V; Atkinson, C; Ness, A R; Thomas, S; Burden, S; Sutton, E
2016-02-01
Nutrition is an important element of the Enhanced Recovery After Surgery (ERAS) programme. Patients have previously indicated that nutrition is a key component of ERAS that requires improvement. Our aim was to explore the perioperative nutrition experiences of colorectal surgical patients to identify barriers and facilitators to the integration of nutrition within ERAS. Sixteen individuals undergoing colorectal surgery participated in a semi-structured interview between postoperative day three and hospital discharge. The topic guide was developed iteratively throughout the study; topics included preoperative counselling, carbohydrate loading, fasting and postoperative nutrition. A constant comparison technique was employed during coding, and an inductive thematic analysis was used. Validity was ensured by double coding a sample of transcripts. Findings are presented in the context of the following clinical themes: preoperative information, preoperative fasting, carbohydrate loading and nutritional drinks, postoperative diet and discharge. Individuals received too much general information which was repetitive, contradictory and not disease specific; this formed a key barrier affecting nutrition. Other barriers were negative experiences of nutritional drinks, stoma management, nausea and vomiting, and challenges from the hospital environment. Facilitators included interactions with staff, food accessibility and choice, and motivation for discharge. The key barrier to adherence of perioperative nutrition protocols was poor provision of information. Targeted information regarding postoperative diet, stoma management and coping with nausea and vomiting would be beneficial for colorectal surgical patients. Easily accessible food provided by ward staff was considered a facilitator. © 2015 The Authors. Colorectal Disease published by John Wiley & Sons Ltd on behalf of Association of Coloproctology of Great Britain and Ireland.
Protheroe, Joanne; Rogers, Anne; Kennedy, Anne P; Macdonald, Wendy; Lee, Victoria
2008-10-13
Patient information has been viewed as a key component of self-management. However, little attention has been given to methods of dissemination or implementation of effective information strategies. Previous problems identified with the use and implementation of patient information point to the need to explore the way in which patients engage with and use information to support self-management for chronic conditions. Four published qualitative studies from a programme of research about self-management were analysed as a group; these included studies of the management of inflammatory bowel disease (IBD); self-help in anxiety and depression (SHADE); menorrhagia, treatment, information, and preference (MENTIP) study; and self-help for irritable bowel syndrome (IBS). For the analysis, we used an adapted meta-ethnographic approach to the synthesis of qualitative data in order to develop an evidence base. The ontological status and experience of the condition in everyday life was the most dominant theme to emerge from this synthesis. This, coupled with access to and experience of traditional health services responses, shaped the engagement with and use of information to support self-management. Five key elements were found which were likely to influence this: the perception and awareness of alternative self-management possibilities; the prior extent and nature of engagement with information; the extent of and ability to self-manage; opportunities for use of the information and the stage of the illness career; and congruence and synergy with the professional role. People with chronic conditions need support from providers in both supply and engagement with information, in a way which gives legitimacy to the person's own self-management strategies and possible alternatives. Thus, a link could usefully be made between information offered, as well as patients' past experiences of self-management and engagement with services for their condition. The timeliness of the information should be considered, both in terms of the illness career and the type of condition (i.e., before depression gets too bad or time to reflect on existing knowledge about a condition and how it is to be managed) and in terms of the pre-existing relationship with services (i.e., options explored and tried). More considered use of information (how it is provided, by whom, and at what point it should be introduced) is key to facilitating patients' engagement with and therefore use of information to support self-management.
Network meta-analysis: an introduction for pharmacists.
Xu, Yina; Amiche, Mohamed Amine; Tadrous, Mina
2018-05-21
Network meta-analysis is a new tool used to summarize and compare studies for multiple interventions, irrespective of whether these interventions have been directly evaluated against each other. Network meta-analysis is quickly becoming the standard in conducting therapeutic reviews and clinical guideline development. However, little guidance is available to help pharmacists review network meta-analysis studies in their practice. Major institutions such as the Cochrane Collaboration, Agency for Healthcare Research and Quality, Canadian Agency for Drugs and Technologies in Health, and National Institute for Health and Care Excellence Decision Support Unit have endorsed utilizing network meta-analysis to establish therapeutic evidence and inform decision making. Our objective is to introduce this novel technique to pharmacy practitioners, and highlight key assumptions behind network meta-analysis studies.
atBioNet--an integrated network analysis tool for genomics and biomarker discovery.
Ding, Yijun; Chen, Minjun; Liu, Zhichao; Ding, Don; Ye, Yanbin; Zhang, Min; Kelly, Reagan; Guo, Li; Su, Zhenqiang; Harris, Stephen C; Qian, Feng; Ge, Weigong; Fang, Hong; Xu, Xiaowei; Tong, Weida
2012-07-20
Large amounts of mammalian protein-protein interaction (PPI) data have been generated and are available for public use. From a systems biology perspective, Proteins/genes interactions encode the key mechanisms distinguishing disease and health, and such mechanisms can be uncovered through network analysis. An effective network analysis tool should integrate different content-specific PPI databases into a comprehensive network format with a user-friendly platform to identify key functional modules/pathways and the underlying mechanisms of disease and toxicity. atBioNet integrates seven publicly available PPI databases into a network-specific knowledge base. Knowledge expansion is achieved by expanding a user supplied proteins/genes list with interactions from its integrated PPI network. The statistically significant functional modules are determined by applying a fast network-clustering algorithm (SCAN: a Structural Clustering Algorithm for Networks). The functional modules can be visualized either separately or together in the context of the whole network. Integration of pathway information enables enrichment analysis and assessment of the biological function of modules. Three case studies are presented using publicly available disease gene signatures as a basis to discover new biomarkers for acute leukemia, systemic lupus erythematosus, and breast cancer. The results demonstrated that atBioNet can not only identify functional modules and pathways related to the studied diseases, but this information can also be used to hypothesize novel biomarkers for future analysis. atBioNet is a free web-based network analysis tool that provides a systematic insight into proteins/genes interactions through examining significant functional modules. The identified functional modules are useful for determining underlying mechanisms of disease and biomarker discovery. It can be accessed at: http://www.fda.gov/ScienceResearch/BioinformaticsTools/ucm285284.htm.
Information Security Scheme Based on Computational Temporal Ghost Imaging.
Jiang, Shan; Wang, Yurong; Long, Tao; Meng, Xiangfeng; Yang, Xiulun; Shu, Rong; Sun, Baoqing
2017-08-09
An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.
Meta-analysis of magnitudes, differences and variation in evolutionary parameters.
Morrissey, M B
2016-10-01
Meta-analysis is increasingly used to synthesize major patterns in the large literatures within ecology and evolution. Meta-analytic methods that do not account for the process of observing data, which we may refer to as 'informal meta-analyses', may have undesirable properties. In some cases, informal meta-analyses may produce results that are unbiased, but do not necessarily make the best possible use of available data. In other cases, unbiased statistical noise in individual reports in the literature can potentially be converted into severe systematic biases in informal meta-analyses. I first present a general description of how failure to account for noise in individual inferences should be expected to lead to biases in some kinds of meta-analysis. In particular, informal meta-analyses of quantities that reflect the dispersion of parameters in nature, for example, the mean absolute value of a quantity, are likely to be generally highly misleading. I then re-analyse three previously published informal meta-analyses, where key inferences were of aspects of the dispersion of values in nature, for example, the mean absolute value of selection gradients. Major biological conclusions in each original informal meta-analysis closely match those that could arise as artefacts due to statistical noise. I present alternative mixed-model-based analyses that are specifically tailored to each situation, but where all analyses may be implemented with widely available open-source software. In each example meta-re-analysis, major conclusions change substantially. © 2016 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2016 European Society For Evolutionary Biology.
Information Extraction from Unstructured Text for the Biodefense Knowledge Center
DOE Office of Scientific and Technical Information (OSTI.GOV)
Samatova, N F; Park, B; Krishnamurthy, R
2005-04-29
The Bio-Encyclopedia at the Biodefense Knowledge Center (BKC) is being constructed to allow an early detection of emerging biological threats to homeland security. It requires highly structured information extracted from variety of data sources. However, the quantity of new and vital information available from every day sources cannot be assimilated by hand, and therefore reliable high-throughput information extraction techniques are much anticipated. In support of the BKC, Lawrence Livermore National Laboratory and Oak Ridge National Laboratory, together with the University of Utah, are developing an information extraction system built around the bioterrorism domain. This paper reports two important pieces ofmore » our effort integrated in the system: key phrase extraction and semantic tagging. Whereas two key phrase extraction technologies developed during the course of project help identify relevant texts, our state-of-the-art semantic tagging system can pinpoint phrases related to emerging biological threats. Also we are enhancing and tailoring the Bio-Encyclopedia by augmenting semantic dictionaries and extracting details of important events, such as suspected disease outbreaks. Some of these technologies have already been applied to large corpora of free text sources vital to the BKC mission, including ProMED-mail, PubMed abstracts, and the DHS's Information Analysis and Infrastructure Protection (IAIP) news clippings. In order to address the challenges involved in incorporating such large amounts of unstructured text, the overall system is focused on precise extraction of the most relevant information for inclusion in the BKC.« less
2010-01-01
Background In Ontario, local public health inspectors play an important frontline role in protecting the public from foodborne illness. This study was an in-depth exploration of public health inspectors' perceptions of the key food safety issues in public health, and their opinions and needs with regards to food safety information resources. Methods Four focus group discussions were conducted with public health inspectors from the Central West region of Ontario, Canada during June and July, 2008. A questioning route was used to standardize qualitative data collection. Audio recordings of sessions were transcribed verbatim and data-driven content analysis was performed. Results A total of 23 public health inspectors participated in four focus group discussions. Five themes emerged as key food safety issues: time-temperature abuse, inadequate handwashing, cross-contamination, the lack of food safety knowledge by food handlers and food premise operators, and the lack of food safety information and knowledge about specialty foods (i.e., foods from different cultures). In general, participants reported confidence with their current knowledge of food safety issues and foodborne pathogens. Participants highlighted the need for a central source for food safety information, access to up-to-date food safety information, resources in different languages, and additional food safety information on specialty foods. Conclusions The information gathered from these focus groups can provide a basis for the development of resources that will meet the specific needs of public health inspectors involved in protecting and promoting food safety. PMID:20553592
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments
Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.
Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.
Health system decentralisation in Nepal: identifying the issues.
Collins, Charles; Omar, Mayeh; Adhikari, Damodar; Dhakal, Ramji; Emmel, Nick; Dhakal, Megha Raj; Chand, Padam; Thapa, Druba; Singh, Arjun B
2007-01-01
The purpose of this paper is to describe and discuss policy analysis in Nepal and review the wide range of choices feasible in decentralisation decision making. In this paper an iterative qualitative method was developed and used in the research, which consisted of focus group interviews, key informant interviews, document analysis, including descriptive statistics, and analysis of the policy context. Participants in the research reflected the urban/rural mix of districts and the geography of Nepal. Analysis combined transcribed interviews with findings from document searches and analysis of the policy context. Coding was pre-determined during the training workshop and further codes were generated during and after the fieldwork. The paper finds that Nepal is in the process of decentralising public services from the central level to the local level, particularly to local bodies: District Development Committees (DDCs), Village Development Committees (VDCs) and Municipalities. Key contextual factors referred to are the overall structure of decentralisation, the social context of poverty and the political instability leading to a fluid political situation characterised by political tension, armed conflict, controversies and agreements while carrying out the research. The key issues identified and discussed in the paper are the policy process leading to decentralisation, the organisational structure and tension in the proposed system, the systems of resource generation, allocation, planning and management and lastly the forms of accountability, participation, public-private relations and collaborative strategies. The paper discusses the challenges faced in conducting such a policy analysis, the broad ranging and unremitting nature of the decentralisation process, and the contextual setting of the process of change.
Schilbach, Leonhard; Müller, Veronika I; Hoffstaedter, Felix; Clos, Mareike; Goya-Maldonado, Roberto; Gruber, Oliver; Eickhoff, Simon B
2014-01-01
Alterations of social cognition and dysfunctional interpersonal expectations are thought to play an important role in the etiology of depression and have, thus, become a key target of psychotherapeutic interventions. The underlying neurobiology, however, remains elusive. Based upon the idea of a close link between affective and introspective processes relevant for social interactions and alterations thereof in states of depression, we used a meta-analytically informed network analysis to investigate resting-state functional connectivity in an introspective socio-affective (ISA) network in individuals with and without depression. Results of our analysis demonstrate significant differences between the groups with depressed individuals showing hyperconnectivity of the ISA network. These findings demonstrate that neurofunctional alterations exist in individuals with depression in a neural network relevant for introspection and socio-affective processing, which may contribute to the interpersonal difficulties that are linked to depressive symptomatology.
Schilbach, Leonhard; Müller, Veronika I.; Hoffstaedter, Felix; Clos, Mareike; Goya-Maldonado, Roberto
2014-01-01
Alterations of social cognition and dysfunctional interpersonal expectations are thought to play an important role in the etiology of depression and have, thus, become a key target of psychotherapeutic interventions. The underlying neurobiology, however, remains elusive. Based upon the idea of a close link between affective and introspective processes relevant for social interactions and alterations thereof in states of depression, we used a meta-analytically informed network analysis to investigate resting-state functional connectivity in an introspective socio-affective (ISA) network in individuals with and without depression. Results of our analysis demonstrate significant differences between the groups with depressed individuals showing hyperconnectivity of the ISA network. These findings demonstrate that neurofunctional alterations exist in individuals with depression in a neural network relevant for introspection and socio-affective processing, which may contribute to the interpersonal difficulties that are linked to depressive symptomatology. PMID:24759619
Integration, warehousing, and analysis strategies of Omics data.
Gedela, Srinubabu
2011-01-01
"-Omics" is a current suffix for numerous types of large-scale biological data generation procedures, which naturally demand the development of novel algorithms for data storage and analysis. With next generation genome sequencing burgeoning, it is pivotal to decipher a coding site on the genome, a gene's function, and information on transcripts next to the pure availability of sequence information. To explore a genome and downstream molecular processes, we need umpteen results at the various levels of cellular organization by utilizing different experimental designs, data analysis strategies and methodologies. Here comes the need for controlled vocabularies and data integration to annotate, store, and update the flow of experimental data. This chapter explores key methodologies to merge Omics data by semantic data carriers, discusses controlled vocabularies as eXtensible Markup Languages (XML), and provides practical guidance, databases, and software links supporting the integration of Omics data.
Key Facts about Higher Education in Washington: 2009-10
ERIC Educational Resources Information Center
Washington Higher Education Coordinating Board, 2010
2010-01-01
First published in 2002, "Key Facts about Higher Education in Washington" provides valuable information on the ways higher education serves the state and its people. The most current data and information available is presented throughout this report to highlight the "Key Facts" about Washington's postsecondary institutions,…
2016-08-01
prioritization of key information technology limits management’s ability to focus audit readiness efforts on the systems with the highest risk...corrective actions for the higher-risk systems first. For an audit readiness plan for key information technology systems, the Navy provided a schedule...prioritization of key information technology systems used in the FBWT process limits management’s ability to focus audit readiness efforts on the most
Using cognitive work analysis to explore activity allocation within military domains.
Jenkins, D P; Stanton, N A; Salmon, P M; Walker, G H; Young, M S
2008-06-01
Cognitive work analysis (CWA) is frequently advocated as an approach for the analysis of complex socio-technical systems. Much of the current CWA literature within the military domain pays particular attention to its initial phases; work domain analysis and contextual task analysis. Comparably, the analysis of the social and organisational constraints receives much less attention. Through the study of a helicopter mission planning system software tool, this paper describes an approach for investigating the constraints affecting the distribution of work. The paper uses this model to evaluate the potential benefits of the social and organisational analysis phase within a military context. The analysis shows that, through its focus on constraints, the approach provides a unique description of the factors influencing the social organisation within a complex domain. This approach appears to be compatible with existing approaches and serves as a validation of more established social analysis techniques. As part of the ergonomic design of mission planning systems, the social organisation and cooperation analysis phase of CWA provides a constraint-based description informing allocation of function between key actor groups. This approach is useful because it poses questions related to the transfer of information and optimum working practices.
The ECAR Study of Undergraduate Students and Information Technology, 2010. Key Findings
ERIC Educational Resources Information Center
Smith, Shannon D.; Caruso, Judith Borreson
2010-01-01
This document presents the key findings from "The ECAR Study of Undergraduate Students and Information Technology, 2010". Since 2004, the annual ECAR (EDUCAUSE Center for Applied Research) study of undergraduate students and information technology has sought to shed light on how information technology affects the college experience. We…
Combining information from multiple flood projections in a hierarchical Bayesian framework
NASA Astrophysics Data System (ADS)
Le Vine, Nataliya
2016-04-01
This study demonstrates, in the context of flood frequency analysis, the potential of a recently proposed hierarchical Bayesian approach to combine information from multiple models. The approach explicitly accommodates shared multimodel discrepancy as well as the probabilistic nature of the flood estimates, and treats the available models as a sample from a hypothetical complete (but unobserved) set of models. The methodology is applied to flood estimates from multiple hydrological projections (the Future Flows Hydrology data set) for 135 catchments in the UK. The advantages of the approach are shown to be: (1) to ensure adequate "baseline" with which to compare future changes; (2) to reduce flood estimate uncertainty; (3) to maximize use of statistical information in circumstances where multiple weak predictions individually lack power, but collectively provide meaningful information; (4) to diminish the importance of model consistency when model biases are large; and (5) to explicitly consider the influence of the (model performance) stationarity assumption. Moreover, the analysis indicates that reducing shared model discrepancy is the key to further reduction of uncertainty in the flood frequency analysis. The findings are of value regarding how conclusions about changing exposure to flooding are drawn, and to flood frequency change attribution studies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Canon, P.
1980-06-01
The overview statement of the socio-economic effects of developing geothermal energy in the State of Hawaii is presented. The following functions are presented: (1) identification of key social and economic issues, (2) inventory of all available pertinent data, (3) analysis and assessment of available data, and (4) identification of what additional information is required for adequate assessment.
John Bussey; Mae A. Davenport; Marla R. Emery; Clint Carroll
2016-01-01
This article explores the generation, transmission, and nature of ecological knowledge used by tribal and nontribal natural resource management agency personnel who collectively manage a 666,542-acre forest in northern Minnesota. Using key informant interviews and an adapted grounded theory analysis, we documented the forms of knowledge participants expressed in their...
ERIC Educational Resources Information Center
Watt, Michael
2016-01-01
The purpose of this study was to inform the deliberations of a policymakers' working group by investigating what key actors in the materials' marketplace are doing to align digital and print-based materials with the Australian Curriculum and what steps need to be taken to deliver aligned materials to schools. Content analysis method was used to…
ERIC Educational Resources Information Center
Menashy, Francine; Read, Robyn
2016-01-01
As a leading mobilizer of international development and educational knowledge, the World Bank has been critiqued in two key areas: (1) the dominance of economic thinking in its policies, and (2) its Northern-generated knowledge which informs its work in the Global South. In this paper, we investigate the disciplinary foundation of Bank knowledge,…
Limiting Regret: Building the Army We Will Need
2015-08-01
burden for the collection of information is estimated to average 1 hour per response , including the time for reviewing instructions, searching existing...NUMBER OF PAGES 23 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298...Army’s ability to help execute the national defense strategy against key threats. The documentation for this analysis was funded by philanthropic
Planning a Library Leadership Retreat on the Cheap: Case Study and Analysis
ERIC Educational Resources Information Center
Brower, Stewart
2016-01-01
Staying ahead of the pitch: an old baseball metaphor that means to anticipate where the ball is going to go so that the batter can score a hit. But to anticipate changes in a field as robust and challenging as information sciences, reflection and contemplation are often key to good planning. With simple day-to-day management of libraries already…
ERIC Educational Resources Information Center
Borgos, Jill E.
2013-01-01
This article applies the theoretical framework of principal-agent theory in order to better understand the complex organisational relationships emerging between entities invested in the establishment and monitoring of cross-border international branch campus medical schools. Using the key constructs of principal-agent theory, information asymmetry…
Smart Extraction and Analysis System for Clinical Research.
Afzal, Muhammad; Hussain, Maqbool; Khan, Wajahat Ali; Ali, Taqdir; Jamshed, Arif; Lee, Sungyoung
2017-05-01
With the increasing use of electronic health records (EHRs), there is a growing need to expand the utilization of EHR data to support clinical research. The key challenge in achieving this goal is the unavailability of smart systems and methods to overcome the issue of data preparation, structuring, and sharing for smooth clinical research. We developed a robust analysis system called the smart extraction and analysis system (SEAS) that consists of two subsystems: (1) the information extraction system (IES), for extracting information from clinical documents, and (2) the survival analysis system (SAS), for a descriptive and predictive analysis to compile the survival statistics and predict the future chance of survivability. The IES subsystem is based on a novel permutation-based pattern recognition method that extracts information from unstructured clinical documents. Similarly, the SAS subsystem is based on a classification and regression tree (CART)-based prediction model for survival analysis. SEAS is evaluated and validated on a real-world case study of head and neck cancer. The overall information extraction accuracy of the system for semistructured text is recorded at 99%, while that for unstructured text is 97%. Furthermore, the automated, unstructured information extraction has reduced the average time spent on manual data entry by 75%, without compromising the accuracy of the system. Moreover, around 88% of patients are found in a terminal or dead state for the highest clinical stage of disease (level IV). Similarly, there is an ∼36% probability of a patient being alive if at least one of the lifestyle risk factors was positive. We presented our work on the development of SEAS to replace costly and time-consuming manual methods with smart automatic extraction of information and survival prediction methods. SEAS has reduced the time and energy of human resources spent unnecessarily on manual tasks.
Print News Coverage of School-Based HPV Vaccine Mandate
Casciotti, Dana; Smith, Katherine C.; Andon, Lindsay; Vernick, Jon; Tsui, Amy; Klassen, Ann C.
2015-01-01
BACKGROUND In 2007, legislation was proposed in 24 states and the District of Columbia for school-based HPV vaccine mandates, and mandates were enacted in Texas, Virginia, and the District of Columbia. Media coverage of these events was extensive, and media messages both reflected and contributed to controversy surrounding these legislative activities. Messages communicated through the media are an important influence on adolescent and parent understanding of school-based vaccine mandates. METHODS We conducted structured text analysis of newspaper coverage, including quantitative analysis of 169 articles published in mandate jurisdictions from 2005-2009, and qualitative analysis of 63 articles from 2007. Our structured analysis identified topics, key stakeholders and sources, tone, and the presence of conflict. Qualitative thematic analysis identified key messages and issues. RESULTS Media coverage was often incomplete, providing little context about cervical cancer or screening. Skepticism and autonomy concerns were common. Messages reflected conflict and distrust of government activities, which could negatively impact this and other youth-focused public health initiatives. CONCLUSIONS If school health professionals are aware of the potential issues raised in media coverage of school-based health mandates, they will be more able to convey appropriate health education messages, and promote informed decision-making by parents and students. PMID:25099421
NASA Astrophysics Data System (ADS)
Juszczyk, Michał; Leśniak, Agnieszka; Zima, Krzysztof
2013-06-01
Conceptual cost estimation is important for construction projects. Either underestimation or overestimation of building raising cost may lead to failure of a project. In the paper authors present application of a multicriteria comparative analysis (MCA) in order to select factors influencing residential building raising cost. The aim of the analysis is to indicate key factors useful in conceptual cost estimation in the early design stage. Key factors are being investigated on basis of the elementary information about the function, form and structure of the building, and primary assumptions of technological and organizational solutions applied in construction process. The mentioned factors are considered as variables of the model which aim is to make possible conceptual cost estimation fast and with satisfying accuracy. The whole analysis included three steps: preliminary research, choice of a set of potential variables and reduction of this set to select the final set of variables. Multicriteria comparative analysis is applied in problem solution. Performed analysis allowed to select group of factors, defined well enough at the conceptual stage of the design process, to be used as a describing variables of the model.
Cook, David A; Sorensen, Kristi J; Wilkinson, John M; Berger, Richard A
2013-11-25
Answering clinical questions affects patient-care decisions and is important to continuous professional development. The process of point-of-care learning is incompletely understood. To understand what barriers and enabling factors influence physician point-of-care learning and what decisions physicians face during this process. Focus groups with grounded theory analysis. Focus group discussions were transcribed and then analyzed using a constant comparative approach to identify barriers, enabling factors, and key decisions related to physician information-seeking activities. Academic medical center and outlying community sites. Purposive sample of 50 primary care and subspecialist internal medicine and family medicine physicians, interviewed in 11 focus groups. Insufficient time was the main barrier to point-of-care learning. Other barriers included the patient comorbidities and contexts, the volume of available information, not knowing which resource to search, doubt that the search would yield an answer, difficulty remembering questions for later study, and inconvenient access to computers. Key decisions were whether to search (reasons to search included infrequently seen conditions, practice updates, complex questions, and patient education), when to search (before, during, or after the clinical encounter), where to search (with the patient present or in a separate room), what type of resource to use (colleague or computer), what specific resource to use (influenced first by efficiency and second by credibility), and when to stop. Participants noted that key features of efficiency (completeness, brevity, and searchability) are often in conflict. Physicians perceive that insufficient time is the greatest barrier to point-of-care learning, and efficiency is the most important determinant in selecting an information source. Designing knowledge resources and systems to target key decisions may improve learning and patient care.
Yousefi-Nooraie, Reza; Dobbins, Maureen; Brouwers, Melissa; Wakefield, Patricia
2012-05-16
Social network analysis is an approach to study the interactions and exchange of resources among people. It can help understanding the underlying structural and behavioral complexities that influence the process of capacity building towards evidence-informed decision making. A social network analysis was conducted to understand if and how the staff of a public health department in Ontario turn to peers to get help incorporating research evidence into practice. The staff were invited to respond to an online questionnaire inquiring about information seeking behavior, identification of colleague expertise, and friendship status. Three networks were developed based on the 170 participants. Overall shape, key indices, the most central people and brokers, and their characteristics were identified. The network analysis showed a low density and localized information-seeking network. Inter-personal connections were mainly clustered by organizational divisions; and people tended to limit information-seeking connections to a handful of peers in their division. However, recognition of expertise and friendship networks showed more cross-divisional connections. Members of the office of the Medical Officer of Health were located at the heart of the department, bridging across divisions. A small group of professional consultants and middle managers were the most-central staff in the network, also connecting their divisions to the center of the information-seeking network. In each division, there were some locally central staff, mainly practitioners, who connected their neighboring peers; but they were not necessarily connected to other experts or managers. The methods of social network analysis were useful in providing a systems approach to understand how knowledge might flow in an organization. The findings of this study can be used to identify early adopters of knowledge translation interventions, forming Communities of Practice, and potential internal knowledge brokers.
NASA Astrophysics Data System (ADS)
Norros, Veera; Laine, Marko; Lignell, Risto; Thingstad, Frede
2017-10-01
Methods for extracting empirically and theoretically sound parameter values are urgently needed in aquatic ecosystem modelling to describe key flows and their variation in the system. Here, we compare three Bayesian formulations for mechanistic model parameterization that differ in their assumptions about the variation in parameter values between various datasets: 1) global analysis - no variation, 2) separate analysis - independent variation and 3) hierarchical analysis - variation arising from a shared distribution defined by hyperparameters. We tested these methods, using computer-generated and empirical data, coupled with simplified and reasonably realistic plankton food web models, respectively. While all methods were adequate, the simulated example demonstrated that a well-designed hierarchical analysis can result in the most accurate and precise parameter estimates and predictions, due to its ability to combine information across datasets. However, our results also highlighted sensitivity to hyperparameter prior distributions as an important caveat of hierarchical analysis. In the more complex empirical example, hierarchical analysis was able to combine precise identification of parameter values with reasonably good predictive performance, although the ranking of the methods was less straightforward. We conclude that hierarchical Bayesian analysis is a promising tool for identifying key ecosystem-functioning parameters and their variation from empirical datasets.
An imprecise probability approach for squeal instability analysis based on evidence theory
NASA Astrophysics Data System (ADS)
Lü, Hui; Shangguan, Wen-Bin; Yu, Dejie
2017-01-01
An imprecise probability approach based on evidence theory is proposed for squeal instability analysis of uncertain disc brakes in this paper. First, the squeal instability of the finite element (FE) model of a disc brake is investigated and its dominant unstable eigenvalue is detected by running two typical numerical simulations, i.e., complex eigenvalue analysis (CEA) and transient dynamical analysis. Next, the uncertainty mainly caused by contact and friction is taken into account and some key parameters of the brake are described as uncertain parameters. All these uncertain parameters are usually involved with imprecise data such as incomplete information and conflict information. Finally, a squeal instability analysis model considering imprecise uncertainty is established by integrating evidence theory, Taylor expansion, subinterval analysis and surrogate model. In the proposed analysis model, the uncertain parameters with imprecise data are treated as evidence variables, and the belief measure and plausibility measure are employed to evaluate system squeal instability. The effectiveness of the proposed approach is demonstrated by numerical examples and some interesting observations and conclusions are summarized from the analyses and discussions. The proposed approach is generally limited to the squeal problems without too many investigated parameters. It can be considered as a potential method for squeal instability analysis, which will act as the first step to reduce squeal noise of uncertain brakes with imprecise information.
Synergistic Information Processing Encrypts Strategic Reasoning in Poker.
Frey, Seth; Albino, Dominic K; Williams, Paul L
2018-06-14
There is a tendency in decision-making research to treat uncertainty only as a problem to be overcome. But it is also a feature that can be leveraged, particularly in social interaction. Comparing the behavior of profitable and unprofitable poker players, we reveal a strategic use of information processing that keeps decision makers unpredictable. To win at poker, a player must exploit public signals from others. But using public inputs makes it easier for an observer to reconstruct that player's strategy and predict his or her behavior. How should players trade off between exploiting profitable opportunities and remaining unexploitable themselves? Using a recent multivariate approach to information theoretic data analysis and 1.75 million hands of online two-player No-Limit Texas Hold'em, we find that the important difference between winning and losing players is not in the amount of information they process, but how they process it. In particular, winning players are better at integrative information processing-creating new information from the interaction between their cards and their opponents' signals. We argue that integrative information processing does not just produce better decisions, it makes decision-making harder for others to reverse engineer, as an expert poker player's cards act like the private key in public-key cryptography. Poker players encrypt their reasoning with the way they process information. The encryption function of integrative information processing makes it possible for players to exploit others while remaining unexploitable. By recognizing the act of information processing as a strategic behavior in its own right, we offer a detailed account of how experts use endemic uncertainty to conceal their intentions in high-stakes competitive environments, and we highlight new opportunities between cognitive science, information theory, and game theory. Copyright © 2018 Cognitive Science Society, Inc.
NASA Technical Reports Server (NTRS)
Cruse, T. A.
1987-01-01
The objective is the development of several modular structural analysis packages capable of predicting the probabilistic response distribution for key structural variables such as maximum stress, natural frequencies, transient response, etc. The structural analysis packages are to include stochastic modeling of loads, material properties, geometry (tolerances), and boundary conditions. The solution is to be in terms of the cumulative probability of exceedance distribution (CDF) and confidence bounds. Two methods of probability modeling are to be included as well as three types of structural models - probabilistic finite-element method (PFEM); probabilistic approximate analysis methods (PAAM); and probabilistic boundary element methods (PBEM). The purpose in doing probabilistic structural analysis is to provide the designer with a more realistic ability to assess the importance of uncertainty in the response of a high performance structure. Probabilistic Structural Analysis Method (PSAM) tools will estimate structural safety and reliability, while providing the engineer with information on the confidence that should be given to the predicted behavior. Perhaps most critically, the PSAM results will directly provide information on the sensitivity of the design response to those variables which are seen to be uncertain.
NASA Technical Reports Server (NTRS)
Cruse, T. A.; Burnside, O. H.; Wu, Y.-T.; Polch, E. Z.; Dias, J. B.
1988-01-01
The objective is the development of several modular structural analysis packages capable of predicting the probabilistic response distribution for key structural variables such as maximum stress, natural frequencies, transient response, etc. The structural analysis packages are to include stochastic modeling of loads, material properties, geometry (tolerances), and boundary conditions. The solution is to be in terms of the cumulative probability of exceedance distribution (CDF) and confidence bounds. Two methods of probability modeling are to be included as well as three types of structural models - probabilistic finite-element method (PFEM); probabilistic approximate analysis methods (PAAM); and probabilistic boundary element methods (PBEM). The purpose in doing probabilistic structural analysis is to provide the designer with a more realistic ability to assess the importance of uncertainty in the response of a high performance structure. Probabilistic Structural Analysis Method (PSAM) tools will estimate structural safety and reliability, while providing the engineer with information on the confidence that should be given to the predicted behavior. Perhaps most critically, the PSAM results will directly provide information on the sensitivity of the design response to those variables which are seen to be uncertain.
Winfield, Jessica M.; Payne, Geoffrey S.; Weller, Alex; deSouza, Nandita M.
2016-01-01
Abstract Multi-parametric magnetic resonance imaging (mpMRI) offers a unique insight into tumor biology by combining functional MRI techniques that inform on cellularity (diffusion-weighted MRI), vascular properties (dynamic contrast-enhanced MRI), and metabolites (magnetic resonance spectroscopy) and has scope to provide valuable information for prognostication and response assessment. Challenges in the application of mpMRI in the clinic include the technical considerations in acquiring good quality functional MRI data, development of robust techniques for analysis, and clinical interpretation of the results. This article summarizes the technical challenges in acquisition and analysis of multi-parametric MRI data before reviewing the key applications of multi-parametric MRI in clinical research and practice. PMID:27748710
Scalable Visual Analytics of Massive Textual Datasets
DOE Office of Scientific and Technical Information (OSTI.GOV)
Krishnan, Manoj Kumar; Bohn, Shawn J.; Cowley, Wendy E.
2007-04-01
This paper describes the first scalable implementation of text processing engine used in Visual Analytics tools. These tools aid information analysts in interacting with and understanding large textual information content through visual interfaces. By developing parallel implementation of the text processing engine, we enabled visual analytics tools to exploit cluster architectures and handle massive dataset. The paper describes key elements of our parallelization approach and demonstrates virtually linear scaling when processing multi-gigabyte data sets such as Pubmed. This approach enables interactive analysis of large datasets beyond capabilities of existing state-of-the art visual analytics tools.
Information driving force and its application in agent-based modeling
NASA Astrophysics Data System (ADS)
Chen, Ting-Ting; Zheng, Bo; Li, Yan; Jiang, Xiong-Fei
2018-04-01
Exploring the scientific impact of online big-data has attracted much attention of researchers from different fields in recent years. Complex financial systems are typical open systems profoundly influenced by the external information. Based on the large-scale data in the public media and stock markets, we first define an information driving force, and analyze how it affects the complex financial system. The information driving force is observed to be asymmetric in the bull and bear market states. As an application, we then propose an agent-based model driven by the information driving force. Especially, all the key parameters are determined from the empirical analysis rather than from statistical fitting of the simulation results. With our model, both the stationary properties and non-stationary dynamic behaviors are simulated. Considering the mean-field effect of the external information, we also propose a few-body model to simulate the financial market in the laboratory.
An examination of electronic health information privacy in older adults.
Le, Thai; Thompson, Hilaire; Demiris, George
2013-01-01
Older adults are the quickest growing demographic group and are key consumers of health services. As the United States health system transitions to electronic health records, it is important to understand older adult perceptions of privacy and security. We performed a secondary analysis of the Health Information National Trends Survey (2012, Cycle 1), to examine differences in perceptions of electronic health information privacy between older adults and the general population. We found differences in the level of importance placed on access to electronic health information (older adults placed greater emphasis on provider as opposed to personal access) and tendency to withhold information out of concerns for privacy and security (older adults were less likely to withhold information). We provide recommendations to alleviate some of these privacy concerns. This may facilitate greater use of electronic health communication between patient and provider, while promoting shared decision making.
Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo
2017-12-03
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.
Martínez-Bellver, Sergio; Cervera-Ferri, Ana; Luque-García, Aina; Martínez-Ricós, Joana; Valverde-Navarro, Alfonso; Bataller, Manuel; Guerrero, Juan; Teruel-Marti, Vicent
2017-03-01
The nucleus incertus is a key node of the brainstem circuitry involved in hippocampal theta rhythmicity. Synchronisation exists between the nucleus incertus and hippocampal activities during theta periods. By the Granger causality analysis, we demonstrated a directional information flow between theta rhythmical neurons in the nucleus incertus and the hippocampus in theta-on states. The electrical stimulation of the nucleus incertus is also able to evoke a phase reset of the hippocampal theta wave. Our data suggest that the nucleus incertus is a key node of theta generation and the modulation network. In recent years, a body of evidence has shown that the nucleus incertus (NI), in the dorsal tegmental pons, is a key node of the brainstem circuitry involved in hippocampal theta rhythmicity. Ascending reticular brainstem system activation evokes hippocampal theta rhythm with coupled neuronal activity in the NI. In a recent paper, we showed three populations of neurons in the NI with differential firing during hippocampal theta activation. The objective of this work was to better evaluate the causal relationship between the activity of NI neurons and the hippocampus during theta activation in order to further understand the role of the NI in the theta network. A Granger causality analysis was run to determine whether hippocampal theta activity with sensory-evoked theta depends on the neuronal activity of the NI, or vice versa. The analysis showed causal interdependence between the NI and the hippocampus during theta activity, whose directional flow depended on the different neuronal assemblies of the NI. Whereas type I and II NI neurons mainly acted as receptors of hippocampal information, type III neuronal activity was the predominant source of flow between the NI and the hippocampus in theta states. We further determined that the electrical activation of the NI was able to reset hippocampal waves with enhanced theta-band power, depending on the septal area. Collectively, these data suggest that hippocampal theta oscillations after sensory activation show dependence on NI neuron activity, which could play a key role in establishing optimal conditions for memory encoding. © 2016 The Authors. The Journal of Physiology © 2016 The Physiological Society.
Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit
2015-09-01
The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.
Recent Advances in Clinical Natural Language Processing in Support of Semantic Analysis.
Velupillai, S; Mowery, D; South, B R; Kvist, M; Dalianis, H
2015-08-13
We present a review of recent advances in clinical Natural Language Processing (NLP), with a focus on semantic analysis and key subtasks that support such analysis. We conducted a literature review of clinical NLP research from 2008 to 2014, emphasizing recent publications (2012-2014), based on PubMed and ACL proceedings as well as relevant referenced publications from the included papers. Significant articles published within this time-span were included and are discussed from the perspective of semantic analysis. Three key clinical NLP subtasks that enable such analysis were identified: 1) developing more efficient methods for corpus creation (annotation and de-identification), 2) generating building blocks for extracting meaning (morphological, syntactic, and semantic subtasks), and 3) leveraging NLP for clinical utility (NLP applications and infrastructure for clinical use cases). Finally, we provide a reflection upon most recent developments and potential areas of future NLP development and applications. There has been an increase of advances within key NLP subtasks that support semantic analysis. Performance of NLP semantic analysis is, in many cases, close to that of agreement between humans. The creation and release of corpora annotated with complex semantic information models has greatly supported the development of new tools and approaches. Research on non-English languages is continuously growing. NLP methods have sometimes been successfully employed in real-world clinical tasks. However, there is still a gap between the development of advanced resources and their utilization in clinical settings. A plethora of new clinical use cases are emerging due to established health care initiatives and additional patient-generated sources through the extensive use of social media and other devices.