Sample records for background information key

  1. [Key informers. When and How?].

    PubMed

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  2. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study

    PubMed Central

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Background and Objective: Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. Methods: This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. Results: The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. Conclusion: In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making. PMID:29854016

  3. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  4. Effects of background stimulation upon eye-movement information.

    PubMed

    Nakamura, S

    1996-04-01

    To investigate the effects of background stimulation upon eye-movement information (EMI), the perceived deceleration of the target motion during pursuit eye movement (Aubert-Fleishl paradox) was analyzed. In the experiment, a striped pattern was used as a background stimulus with various brightness contrasts and spatial frequencies for serially manipulating the attributions of the background stimulus. Analysis showed that the retinal-image motion of the background stimulus (optic flow) affected eye-movement information and that the effects of optic flow became stronger when high contrast and low spatial frequency stripes were presented as the background stimulus. In conclusion, optic flow is one source of eye-movement information in determining real object motion, and the effectiveness of optic flow depends on the attributes of the background stimulus.

  5. Effects of background motion on eye-movement information.

    PubMed

    Nakamura, S

    1997-02-01

    The effect of background stimulus on eye-movement information was investigated by analyzing the underestimation of the target velocity during pursuit eye movement (Aubert-Fleishl paradox). In the experiment, a striped pattern with various brightness contrasts and spatial frequencies was used as a background stimulus, which was moved at various velocities. Analysis showed that the perceived velocity of the pursuit target, which indicated the magnitudes of eye-movement information, decreased when the background stripes moved in the same direction as eye movement at higher velocities and increased when the background moved in the opposite direction. The results suggest that the eye-movement information varied as a linear function of the velocity of the motion of the background retinal image (optic flow). In addition, the effectiveness of optic flow on eye-movement information was determined by the attributes of the background stimulus such as the brightness contrast or the spatial frequency of the striped pattern.

  6. Exploring Encoding and Retrieval Effects of Background Information on Text Memory

    ERIC Educational Resources Information Center

    Rawson, Katherine A.; Kintsch, Walter

    2004-01-01

    Two experiments were conducted (a) to evaluate how providing background information at test may benefit retrieval and (b) to further examine how providing background information prior to study influences encoding. Half of the participants read background information prior to study, and the other half did not. In each group, half were presented…

  7. Employment and Training Legislation-1968; Background Information.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Committee on Labor and Public Welfare.

    This volume supplied background information for employment and training legislation for the Committee on Labor and Public Welfare of the United States Senate for 1968. It includes: (1) excerpts from reports and recommendations of national committees and commissions on civil disorders, rural poverty, technology and automation, food and fiber, and…

  8. Key management schemes using routing information frames in secure wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  9. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kiktenko, Evgeniy O.; Trushechkin, Anton S.; Lim, Charles Ci Wen

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration ofmore » results of unsuccessful belief-propagation decodings.« less

  10. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    DOE PAGES

    Kiktenko, Evgeniy O.; Trushechkin, Anton S.; Lim, Charles Ci Wen; ...

    2017-10-27

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration ofmore » results of unsuccessful belief-propagation decodings.« less

  11. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Kiktenko, E. O.; Trushechkin, A. S.; Lim, C. C. W.; Kurochkin, Y. V.; Fedorov, A. K.

    2017-10-01

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. The proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.

  12. The Institute of American Indian Arts Background Information (Task One of the Transition Evaluation). Background Paper.

    ERIC Educational Resources Information Center

    Tippeconnic, John W., Jr.

    The paper, prepared as Task One of the Institute of American Indian Arts Transition Evaluation, provides pertinent background information about the Institute of American Indian Arts in Santa Fe, New Mexico. A brief history of the Institute is given, with information about its philosophy and purpose; objectives; organization and administration; the…

  13. Socioeconomic status, family background and other key factors influence the management of head lice in Norway.

    PubMed

    Rukke, Bjørn Arne; Soleng, Arnulf; Lindstedt, Heidi Heggen; Ottesen, Preben; Birkemoe, Tone

    2014-05-01

    How head lice infestations are managed by households is an important but generally neglected issue in head lice research. In the present study, we investigate actions taken against head lice by Norwegian households in association with socioeconomic status, family background, school-related variables and other key factors. Repeat questionnaires distributed to caretakers of the same elementary school children during a 2-year period enabled us to study both previous head lice management and any changes in this management through time. Households from 12 schools spanning the main socioeconomic variation found in Norway participated in the study. All students with active head lice infestation were treated in the four investigated periods. Most caretakers used a thorough head lice checking technique and informed others of own infestation. Checking frequency was low as most children were inspected less than monthly. The best determinant of increased checking frequency and thoroughness was personal experience with head lice. The increased awareness, however, seemed to be somewhat short-lived, as there was a decrease in checking frequency and thoroughness within 1 year after infestation. Personal experience with head lice also increased general knowledge related to the parasite. Parents born in developing countries checked their children for head lice more frequently, although less thoroughly, informed fewer contacts when infested, used pediculicides preventively more often and knew less about head lice than parents born in developed countries. Households with highly educated mothers had a lower checking frequency, but their knowledge and willingness to inform others was high. Single parents were more concerned about economic costs and kept children home from school longer while infested than other parents. As head lice management varied among socioeconomic groups and with parental background, differentiated advice should be considered in the control of head lice. The

  14. The Key Roles in the Informal Organization: A Network Analysis Perspective

    ERIC Educational Resources Information Center

    de Toni, Alberto F.; Nonino, Fabio

    2010-01-01

    Purpose: The purpose of this paper is to identify the key roles embedded in the informal organizational structure (informal networks) and to outline their contribution in the companies' performance. A major objective of the research is to find and characterize a new key informal role that synthesises problem solving, expertise, and accessibility…

  15. Compressed Secret Key Agreement:Maximizing Multivariate Mutual Information per Bit

    NASA Astrophysics Data System (ADS)

    Chan, Chung

    2017-10-01

    The multiterminal secret key agreement problem by public discussion is formulated with an additional source compression step where, prior to the public discussion phase, users independently compress their private sources to filter out strongly correlated components for generating a common secret key. The objective is to maximize the achievable key rate as a function of the joint entropy of the compressed sources. Since the maximum achievable key rate captures the total amount of information mutual to the compressed sources, an optimal compression scheme essentially maximizes the multivariate mutual information per bit of randomness of the private sources, and can therefore be viewed more generally as a dimension reduction technique. Single-letter lower and upper bounds on the maximum achievable key rate are derived for the general source model, and an explicit polynomial-time computable formula is obtained for the pairwise independent network model. In particular, the converse results and the upper bounds are obtained from those of the related secret key agreement problem with rate-limited discussion. A precise duality is shown for the two-user case with one-way discussion, and such duality is extended to obtain the desired converse results in the multi-user case. In addition to posing new challenges in information processing and dimension reduction, the compressed secret key agreement problem helps shed new light on resolving the difficult problem of secret key agreement with rate-limited discussion, by offering a more structured achieving scheme and some simpler conjectures to prove.

  16. Chroma key without color restrictions based on asynchronous amplitude modulation of background illumination on retroreflective screens

    NASA Astrophysics Data System (ADS)

    Vidal, Borja; Lafuente, Juan A.

    2016-03-01

    A simple technique to avoid color limitations in image capture systems based on chroma key video composition using retroreflective screens and light-emitting diodes (LED) rings is proposed and demonstrated. The combination of an asynchronous temporal modulation onto the background illumination and simple image processing removes the usual restrictions on foreground colors in the scene. The technique removes technical constraints in stage composition, allowing its design to be purely based on artistic grounds. Since it only requires adding a very simple electronic circuit to widely used chroma keying hardware based on retroreflective screens, the technique is easily applicable to TV and filming studios.

  17. 29 CFR Appendix A to §§ 1605.2 and... - Background Information

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Background Information A Appendix A to §§ 1605.2 and 1605... §§ 1605.2 and 1605.3—Background Information In 1966, the Commission adopted guidelines on religious... of Trans World Airlines' business, and would therefore, exceed the duty to accommodate Hardison. In...

  18. 29 CFR Appendix A to §§ 1605.2 and... - Background Information

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 4 2011-07-01 2011-07-01 false Background Information A Appendix A to §§ 1605.2 and 1605... §§ 1605.2 and 1605.3—Background Information In 1966, the Commission adopted guidelines on religious... of Trans World Airlines' business, and would therefore, exceed the duty to accommodate Hardison. In...

  19. Transportation key facts 2002 : useful information about transportation in Oregon

    DOT National Transportation Integrated Search

    2002-01-01

    The Oregon Department of Transportation 2002 edition of Key Facts summarizes information related to transportation in Oregon. Key Facts can be used for a variety of planning and budget purposes, and it is intended to provide: : an introduction to tra...

  20. Nephrology key information for internists

    PubMed Central

    Salim, Sohail Abdul; Medaura, Juan A.; Malhotra, Bharat; Garla, Vishnu; Ahuja, Shradha; Lawson, Nicki; Pamarthy, Amaleswari; Sonani, Hardik; Kovvuru, Karthik; Palabindala, Venkataraman

    2017-01-01

    ABSTRACT Hospitalists and primary care physicians encounter renal disease daily. Although most cases of acute kidney injury (AKI) are secondary to dehydration and resolve by giving fluids, many cases of AKI are due to not uncommon but unfamiliar causes needing nephrology evaluation. Common indications to consult a nephrologist on an emergency basis include hyperkalemia or volume overload in end stage renal disease patients (ESRD). Other causes of immediate consultation are cresenteric glomerulonephritis / rapidly progressive glomerulonephritis in which renal prognosis of the patient depends on timely intervention. The following evidence-based key information could improve patient care and outcomes. Abbreviations: AKI: Acute kidney injury ESRD: End stage renal disease patients PMID:28638567

  1. Number Theory and Public-Key Cryptography.

    ERIC Educational Resources Information Center

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  2. Patron Banning in the Nightlife Entertainment Districts: A Key Informant Perspective.

    PubMed

    Miller, Peter; Curtis, Ashlee; Palmer, Darren; Warren, Ian; McFarlane, Emma

    2016-07-01

    Alcohol-related harm in and around licensed venues is associated with substantial costs. Many interventions have been introduced in an effort to combat these harms, and one such intervention is known as patron banning. Patron banning involves prohibiting patrons who have been violent or disorderly in a licensed venue in an attempt to reduce alcohol-related harm. It can be implemented by the venue, by members of police, or by liquor accords. This study aimed to obtain key informant perspectives on the benefits of patron banning as well as on the effectiveness of patron banning in reducing alcohol-related harm. Thirty-six key informants provided perspectives on patron banning through in-depth interviews that were part of a larger study. Key informants were supportive of patron banning for reducing alcohol-related harm, noting that it had many benefits including increased venue safety, general risk management, and deterrence of antisocial behavior. Although processes for banning were not always consistent, identification scanners were generally recognized as a way to ensure that patron banning was enforced. Key informants viewed patron banning as an effective measure for increasing patron safety and reducing alcohol-related harms.

  3. Synthetic fiber production facilities: Background information for proposed standards

    NASA Astrophysics Data System (ADS)

    Goodwin, D. R.

    1982-10-01

    Standards of performance to control emissions of volatile organic compounds (VOC) from new, modified, and reconstructed synthetic fiber production facilities are being proposed under section III of the Clean Air Act. This document contains information on the background and authority, regulatory alternatives considered, and environmental and economic impacts of the regulatory alternatives.

  4. World Key Information Service System Designed For EPCOT Center

    NASA Astrophysics Data System (ADS)

    Kelsey, J. A.

    1984-03-01

    An advanced Bell Laboratories and Western Electric designed electronic information retrieval system utilizing the latest Information Age technologies, and a fiber optic transmission system is featured at the Walt Disney World Resort's newest theme park - The Experimental Prototype Community of Tomorrow (EPCOT Center). The project is an interactive audio, video and text information system that is deployed at key locations within the park. The touch sensitive terminals utilizing the ARIEL (Automatic Retrieval of Information Electronically) System is interconnected by a Western Electric designed and manufactured lightwave transmission system.

  5. Separation of foreground and background from light field using gradient information.

    PubMed

    Lee, Jae Young; Park, Rae-Hong

    2017-02-01

    Studies of computer vision or machine vision applications using a light field camera have been increasing in recent years. However, the abilities that the light field camera has are not fully used in these applications. In this paper, we propose a method for direct separation of foreground and background that uses the gradient information and can be used in various applications such as pre-processing. From an optical phenomenon whereby the bundles of rays from the background are flipped, we derive that the disparity sign of the background in the captured three-dimensional scene has the opposite disparity sign of the foreground. Using the majority-weighted voting algorithm based on the gradient information with the Lambertian assumption and the gradient constraint, the foreground and background can be separated at each pixel. In regard to pre-processing, the proposed method can be used for various applications such as occlusion and saliency detection, disparity estimation, and so on. Experimental results with the EPFL light field dataset and Stanford Lytro light field dataset show that the proposed method achieves better performance in terms of the occlusion detection, and thus can be effectively used in pre-processing for saliency detection and disparity estimation.

  6. Freedom of Information Act Requests: Six Keys to Handling Them

    DTIC Science & Technology

    2016-01-01

    Defense AT&L: January–February 2016 50 Freedom of Information Act Requests Six Keys to Handling Them Michael A. Rodgers Rodgers is a professor of...crucial mission tasks. Understanding and using the six steps and keys provided above will free you from FOIA-induced distractions. The author can be contacted at michael.rodgers@dau.mil.

  7. The Effects of Background Information on Standarized Test Scores.

    ERIC Educational Resources Information Center

    Feeley, Joan T.; Wepner, Shelley B.

    A study was conducted to determine the effects of exposure to the topics included on the comprehension subtest of the Nelson-Denny Reading Test (ND), Form F, on college freshmen's performance on the test. In addition, the study investigated whether those students with background information would indicate their awareness of this knowledge on a…

  8. Aerosol typing - key information from aerosol studies

    NASA Astrophysics Data System (ADS)

    Mona, Lucia; Kahn, Ralph; Papagiannopoulos, Nikolaos; Holzer-Popp, Thomas; Pappalardo, Gelsomina

    2016-04-01

    Aerosol typing is a key source of aerosol information from ground-based and satellite-borne instruments. Depending on the specific measurement technique, aerosol typing can be used as input for retrievals or represents an output for other applications. Typically aerosol retrievals require some a priori or external aerosol type information. The accuracy of the derived aerosol products strongly depends on the reliability of these assumptions. Different sensors can make use of different aerosol type inputs. A critical review and harmonization of these procedures could significantly reduce related uncertainties. On the other hand, satellite measurements in recent years are providing valuable information about the global distribution of aerosol types, showing for example the main source regions and typical transport paths. Climatological studies of aerosol load at global and regional scales often rely on inferred aerosol type. There is still a high degree of inhomogeneity among satellite aerosol typing schemes, which makes the use different sensor datasets in a consistent way difficult. Knowledge of the 4d aerosol type distribution at these scales is essential for understanding the impact of different aerosol sources on climate, precipitation and air quality. All this information is needed for planning upcoming aerosol emissions policies. The exchange of expertise and the communication among satellite and ground-based measurement communities is fundamental for improving long-term dataset consistency, and for reducing aerosol type distribution uncertainties. Aerosol typing has been recognized as one of its high-priority activities of the AEROSAT (International Satellite Aerosol Science Network, http://aero-sat.org/) initiative. In the AEROSAT framework, a first critical review of aerosol typing procedures has been carried out. The review underlines the high heterogeneity in many aspects: approach, nomenclature, assumed number of components and parameters used for the

  9. Key Informants' Perspectives on Teacher Learning in Scotland

    ERIC Educational Resources Information Center

    Kennedy, Aileen; Christie, Donald; Fraser, Christine; Reid, Lesley; McKinney, Stephen; Welsh, Mary; Wilson, Alastair; Griffiths, Morwenna

    2008-01-01

    This article outlines the policy context for teachers' learning and continuing professional development in Scotland and considers this in relation to the perspectives of key informants gained through interview. The analysis draws on a triple-lens conceptual framework and points to some interesting contradictions between the policy text and the…

  10. Key principles to guide development of consumer medicine information--content analysis of information design texts.

    PubMed

    Raynor, David K; Dickinson, David

    2009-04-01

    Effective written consumer medicines information is essential to support safe and effective medicine taking, but the wording and layout of currently provided materials do not meet patients' needs. To identify principles from the wider discipline of information design for use by health professionals when developing or assessing written drug information for patients. Six experts in information design nominated texts on best practice in information design applicable to consumer medicines information. A content analysis identified key principles that were tabulated to bring out key themes. Six texts that met the inclusion criteria, were identified, and content analysis indentified 4 themes: words, type, lines, and layout. Within these main themes, there were 24 subthemes. Selected principles relating to these subthemes were: use short familiar words, short sentences, and short headings that stand out from the text; use a conversational tone of voice, addressing the reader as "you"; use a large type size while retaining sufficient white space; use bullet points to organize lists; use unjustified text (ragged right) and bold, lower-case text for emphasis. Pictures or graphics do not necessarily improve a document. Applying the good information design principles identified to written consumer medicines information could support health professionals when developing and assessing drug information for patients.

  11. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  12. 76 FR 69287 - National Instant Criminal Background Check System Section Agency Information Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-08

    ... System Section Agency Information Collection Activities: Existing collection, comments requested the Voluntary Appeal File (VAF) Brochure ACTION: 60-Day Notice of Information Collection Under Review. The... Criminal Background Check System (NICS) Section has submitted the following information collection request...

  13. Informed Choice? How the United Kingdom's Key Information Set Fails to Represent Pedagogy to Potential Students

    ERIC Educational Resources Information Center

    Barefoot, Helen; Oliver, Martin; Mellar, Harvey

    2016-01-01

    This paper explores the ways in which information about course pedagogy has been represented to potential students through national descriptors and specifications such as the United Kingdom's Key Information Set. It examines the extent to which such descriptors provide helpful information about pedagogy, for example innovative uses of technology.…

  14. The information content of cosmic microwave background anisotropies

    NASA Astrophysics Data System (ADS)

    Scott, Douglas; Contreras, Dagoberto; Narimani, Ali; Ma, Yin-Zhe

    2016-06-01

    The cosmic microwave background (CMB) contains perturbations that are close to Gaussian and isotropic. This means that its information content, in the sense of the ability to constrain cosmological models, is closely related to the number of modes probed in CMB power spectra. Rather than making forecasts for specific experimental setups, here we take a more pedagogical approach and ask how much information we can extract from the CMB if we are only limited by sample variance. We show that, compared with temperature measurements, the addition of E-mode polarization doubles the number of modes available out to a fixed maximum multipole, provided that all of the TT, TE, and EE power spectra are measured. However, the situation in terms of constraints on particular parameters is more complicated, as we explain and illustrate graphically. We also discuss the enhancements in information that can come from adding B-mode polarization and gravitational lensing. We show how well one could ever determine the basic cosmological parameters from CMB data compared with what has been achieved with Planck, which has already probed a substantial fraction of the TT information. Lastly, we look at constraints on neutrino mass as a specific example of how lensing information improves future prospects beyond the current 6-parameter model.

  15. Key informant interviews test plan : model deployment of a regional, multi-modal 511 traveler information system

    DOT National Transportation Integrated Search

    2004-01-28

    This document presents the detailed plan to conduct the Key Informants Interviews Test, one of several test activities to be conducted as part of the national evaluation of the regional, multi-modal 511 Traveler Information System Model Deployment. T...

  16. Information security system based on virtual-optics imaging methodology and public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  17. Students Seeking Access to Four-Year Institutions: Community College Transfers [Background Information].

    ERIC Educational Resources Information Center

    Moore, Jamillah

    This publication provides background information for a hearing by the California Senate Select Committee on Higher Education and Outreach on December 3, 1997. The Introduction presents the Committee announcement, press release, agenda, information about transfer efforts in California, facts and figures about the community colleges, and the text of…

  18. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.

    PubMed

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.

  19. The information content of cosmic microwave background anisotropies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scott, Douglas; Contreras, Dagoberto; Narimani, Ali

    The cosmic microwave background (CMB) contains perturbations that are close to Gaussian and isotropic. This means that its information content, in the sense of the ability to constrain cosmological models, is closely related to the number of modes probed in CMB power spectra. Rather than making forecasts for specific experimental setups, here we take a more pedagogical approach and ask how much information we can extract from the CMB if we are only limited by sample variance. We show that, compared with temperature measurements, the addition of E -mode polarization doubles the number of modes available out to a fixedmore » maximum multipole, provided that all of the TT , TE , and EE power spectra are measured. However, the situation in terms of constraints on particular parameters is more complicated, as we explain and illustrate graphically. We also discuss the enhancements in information that can come from adding B -mode polarization and gravitational lensing. We show how well one could ever determine the basic cosmological parameters from CMB data compared with what has been achieved with Planck , which has already probed a substantial fraction of the TT information. Lastly, we look at constraints on neutrino mass as a specific example of how lensing information improves future prospects beyond the current 6-parameter model.« less

  20. Information gains from cosmic microwave background experiments

    NASA Astrophysics Data System (ADS)

    Seehars, Sebastian; Amara, Adam; Refregier, Alexandre; Paranjape, Aseem; Akeret, Joël

    2014-07-01

    To shed light on the fundamental problems posed by dark energy and dark matter, a large number of experiments have been performed and combined to constrain cosmological models. We propose a novel way of quantifying the information gained by updates on the parameter constraints from a series of experiments which can either complement earlier measurements or replace them. For this purpose, we use the Kullback-Leibler divergence or relative entropy from information theory to measure differences in the posterior distributions in model parameter space from a pair of experiments. We apply this formalism to a historical series of cosmic microwave background experiments ranging from Boomerang to WMAP, SPT, and Planck. Considering different combinations of these experiments, we thus estimate the information gain in units of bits and distinguish contributions from the reduction of statistical errors and the "surprise" corresponding to a significant shift of the parameters' central values. For this experiment series, we find individual relative entropy gains ranging from about 1 to 30 bits. In some cases, e.g. when comparing WMAP and Planck results, we find that the gains are dominated by the surprise rather than by improvements in statistical precision. We discuss how this technique provides a useful tool for both quantifying the constraining power of data from cosmological probes and detecting the tensions between experiments.

  1. An overview of key silvicultural information for ponderosa pine

    Treesearch

    John Fiske; John Tappeiner

    2005-01-01

    This paper provides a selected list of classical references for the important silvicultural findings for ponderosa pine, and categorizes some of the key current literature, as well as some of the older, lesser known but important literature. The paper also provides some history of scientific developments, and sources of further information.

  2. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    PubMed

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.

  3. The ECAR Study of Undergraduate Students and Information Technology, 2010. Key Findings

    ERIC Educational Resources Information Center

    Smith, Shannon D.; Caruso, Judith Borreson

    2010-01-01

    This document presents the key findings from "The ECAR Study of Undergraduate Students and Information Technology, 2010". Since 2004, the annual ECAR (EDUCAUSE Center for Applied Research) study of undergraduate students and information technology has sought to shed light on how information technology affects the college experience. We…

  4. Staffing Preschools: Background Information.

    ERIC Educational Resources Information Center

    Katz, Lilian G.; Weir, Mary K.

    This report explores background variables related to preschool teaching, and emphasizes that statistics fluctuate in early childhood education. The increase for preprimary enrollment of 3- and 4-year-olds was 26 percent from 1966 to 1967. Accurate figures on preschool teaching personnel are not available, but a large proportion of Head Start…

  5. Virtual-optical information security system based on public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  6. Key features of an EU health information system: a concept mapping study.

    PubMed

    Rosenkötter, Nicole; Achterberg, Peter W; van Bon-Martens, Marja J H; Michelsen, Kai; van Oers, Hans A M; Brand, Helmut

    2016-02-01

    Despite the acknowledged value of an EU health information system (EU-HISys) and the many achievements in this field, the landscape is still heavily fragmented and incomplete. Through a systematic analysis of the opinions and valuations of public health stakeholders, this study aims to conceptualize key features of an EU-HISys. Public health professionals and policymakers were invited to participate in a concept mapping procedure. First, participants (N = 34) formulated statements that reflected their vision of an EU-HISys. Second, participants (N = 28) rated the relative importance of each statement and grouped conceptually similar ones. Principal Component and cluster analyses were used to condense these results to EU-HISys key features in a concept map. The number of key features and the labelling of the concept map were determined by expert consensus. The concept map contains 10 key features that summarize 93 statements. The map consists of a horizontal axis that represents the relevance of an 'organizational strategy', which deals with the 'efforts' to design and develop an EU-HISys and the 'achievements' gained by a functioning EU-HISys. The vertical axis represents the 'professional orientation' of the EU-HISys, ranging from the 'scientific' through to the 'policy' perspective. The top ranking statement expressed the need to establish a system that is permanent and sustainable. The top ranking key feature focuses on data and information quality. This study provides insights into key features of an EU-HISys. The results can be used to guide future planning and to support the development of a health information system for Europe. © The Author 2015. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  7. Acadia National Park ITS field operational test : key informant interviews

    DOT National Transportation Integrated Search

    2003-03-01

    This document reflects the ideas and opinions of a group of key informants and stakeholders involved in the Field Operational Test of ITS components in and around Acadia National Park from 1999 through 2002. The stakeholders were involved in the plan...

  8. The cosmic microwave background radiation power spectrum as a random bit generator for symmetric- and asymmetric-key cryptography.

    PubMed

    Lee, Jeffrey S; Cleaver, Gerald B

    2017-10-01

    In this note, the Cosmic Microwave Background (CMB) Radiation is shown to be capable of functioning as a Random Bit Generator, and constitutes an effectively infinite supply of truly random one-time pad values of arbitrary length. It is further argued that the CMB power spectrum potentially conforms to the FIPS 140-2 standard. Additionally, its applicability to the generation of a (n × n) random key matrix for a Vernam cipher is established.

  9. A Statewide Key Informant Survey and Social Indicators Analysis.

    ERIC Educational Resources Information Center

    Fleischer, Mitchell

    This needs assessment study of mental health needs of the elderly in Pennsylvania used a three-part approach. These parts were a review of existing data sources, an extensive key informant study, and a review of service delivery models. A recent study found a prevalence rate for mental illness in the elderly of 12.8%, more than 5% lower than the…

  10. Acquisition of background and technical information and class trip planning

    NASA Technical Reports Server (NTRS)

    Mackinnon, R. M.; Wake, W. H.

    1981-01-01

    Instructors who are very familiar with a study area, as well as those who are not, find the field trip information acquisition and planning process speeded and made more effective by organizing it in stages. The stage follow a deductive progression: from the associated context region, to the study area, to the specific sample window sites, and from generalized background information on the study region to specific technical data on the environmental and human use systems to be interpreted at each site. On the class trip and in the follow up laboratory, the learning/interpretive process are at first deductive in applying previously learned information and skills to analysis of the study site, then inductive in reading and interpreting the landscape, imagery, and maps of the site, correlating them with information of other samples sites and building valid generalizations about the larger study area, its context region, and other (similar and/or contrasting) regions.

  11. Developing information literacy: a key to evidence-based nursing.

    PubMed

    Shorten, A; Wallace, M C; Crookes, P A

    2001-06-01

    This report describes the evaluation of a curriculum-integrated programme designed to help students develop an awareness of the nursing literature, the skills to locate and retrieve it, and skills required in its evaluation; in other words'information literacy'. Positive changes in student performance on objective measures of information-literacy skills were revealed as well as a significant increase in the levels of confidence of the student in performing those skills. Students who had undertaken the information-literacy programme ('programme' students) performed better on a range of objective measures of information literacy, as well as reporting higher levels of confidence in these skills, than students who had not participated in the programme ('non-programme' students). Evaluation of this programme provides evidence of the potential usefulness of a curriculum-integrated approach for the development of information-literacy skills within nursing education. With these underlying skills, students will be better equipped to consolidate and extend their key information-literacy skills to include research appreciation and application. These are vital for effective lifelong learning and a prerequisite to evidence-based practice.

  12. [Effects of exposure frequency and background information on preferences for photographs of cars in different locations].

    PubMed

    Matsuda, Ken; Kusumi, Takashi; Hosomi, Naohiro; Osa, Atsushi; Miike, Hidetoshi

    2014-08-01

    This study examined the influence of familiarity and novelty on the mere exposure effect while manipulating the presentation of background information. We selected presentation stimuli that integrated cars and backgrounds based on the results of pilot studies. During the exposure phase, we displayed the stimuli successively for 3 seconds, manipulating the background information (same or different backgrounds with each presentation) and exposure frequency (3, 6, and 9 times). In the judgment phase, 18 participants judged the cars in terms of preference, familiarity, and novelty on a 7-point scale. As the number of stimulus presentations increased, the preference for the cars increased during the different background condition and decreased during the same background condition. This increased preference may be due to the increase in familiarity caused by the higher exposure frequency and novelty resulting from the background changes per exposure session. The rise in preference judgments was not seen when cars and backgrounds were presented independently. Therefore, the addition of novel features to each exposure session facilitated the mere exposure effect.

  13. Understanding Barriers and Facilitators to Breast and Cervical Cancer Screening among Muslim Women in New York City: Perspectives from Key Informants

    PubMed Central

    Islam, Nadia; Patel, Shilpa; Brooks-Griffin, Quanza; Kemp, Patrice; Raveis, Victoria; Riley, Lindsey; Gummi, Sindhura; Nur, Potrirankamanis Queano; Ravenell, Joseph; Cole, Helen; Kwon, Simona

    2017-01-01

    Background Muslims are one of the fastest growing religious groups in the US. However, little is known about their health disparities, and how their unique cultural, religious, and social beliefs and practices affect health behaviors and outcomes. Studies demonstrate Muslim women may have lower rates of breast and cervical cancer screening compared to the overall population. Methods The purpose of this study was to: 1) conduct key-informant interviews with Muslim community leaders in New York City (NYC), to understand contextual factors that impact Muslim women’s beliefs and practices regarding breast and cervical cancer screening; and 2) inform the development and implementation of a research study on breast and cervical cancer screening among Muslims. Twelve key-informant interviews were conducted. The sample included imams, female religious leaders, physicians, community-based organization leaders, and social service representatives. The interview guide assessed: 1) unique healthcare barriers faced by Muslim women; 2) cultural and social considerations in conducting research; 3) potential strategies for increasing screening in this population; and 4) content and venues for culturally tailored programming and messaging. Results Key informants noted structure and culture as barriers and religion as a facilitator to breast and cervical cancer screening. Themes regarding the development of targeted health campaigns to increase screening included the importance of educational and in-language materials and messaging, and engaging mosques and religious leaders for dissemination. Conclusion Although Muslim women face a number of barriers to screening, religious beliefs and support structures can be leveraged to facilitate screening and enhance the dissemination and promotion of screening. PMID:29629435

  14. Information hiding based on double random-phase encoding and public-key cryptography.

    PubMed

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  15. Distinguishing vegetation from soil background information. [by gray mapping of Landsat MSS data

    NASA Technical Reports Server (NTRS)

    Richardson, A. J.; Wiegand, C. L.

    1977-01-01

    In aircraft and satellite multispectral scanner data, soil background signals are superimposed on or intermingled with information about vegetation. A procedure which accounts for soil background would, therefore, make a considerable contribution to an operational use of Landsat and other spectral data for monitoring the productivity of range, forest, and crop lands. A description is presented of an investigation which was conducted to obtain information for the development of such a procedure. The investigation included a study of the soil reflectance that supplies the background signal of vegetated surfaces. Landsat data as recorded on computer compatible tapes were used in the study. The results of the investigation are discussed, taking into account a study reported by Kauth and Thomas (1976). Attention is given to the determination of Kauth's plane of soils, sun angle effects, vegetation index modeling, and the evaluation of vegetation indexes. Graphs are presented which show the results obtained with a gray mapping technique. The technique makes it possible to display plant, soil, water, and cloud conditions for any Landsat overpass.

  16. Eight Key Issues for the White House Conference on Library and Information Services.

    ERIC Educational Resources Information Center

    American Society for Information Science, Washington, DC.

    Presented as a public service in anticipation of the October 1979 White House Conference on Library and Information Services, the eight papers in this booklet call attention to the key issues which the American Society for Information Science (ASIS) believes have developed from proliferating information and for technological advances. Each of the…

  17. Possibilities and Expectations for mHealth in the Pacific Islands: Insights From Key Informants

    PubMed Central

    McCool, Judith; Whittaker, Robyn

    2016-01-01

    Background The increase in mobile phone use across the globe is creating mounting interest for its application in addressing health system constraints. Although still limited, there is growing evidence of success in using mobile phones for health (mHealth) in low- and middle- income countries. The promise of mHealth to address key health system issues presents a huge potential for the Pacific Island countries where mobile use has radically increased. Current projections indicate an improved information and communications technology (ICT) environment to support greater access to mobile and digital devices in the Pacific region. Objective The objective of the study was to explore key stakeholder perspectives on the potential for mHealth in the Pacific region. Methods A series of in-depth interviews were conducted either face-to-face, via Skype or by email, with a series of key informants from the Pacific Rim region. Interviews were audio-recorded and later transcribed for detailed thematic analysis. Results We found widespread support for the potential to use mobile phones as a mechanism to facilitate improved health service delivery in the region. Essential elements for the successful development and implementation of mHealth were identified by these stakeholders. These included: developing an understanding of the local context and the problems that may be usefully addressed by the addition of mHealth to existing strategies and services; consideration of local infrastructure, capability, policy, mobile literacy and engagement; learning from others, particularly other low- and middle-income countries (LMICs); the importance of building supportive environments and of evaluation to provide evidence of impact and total cost. Conclusions The rapid growth of mobile phone use in the region presents a unique juxtaposition of opportunity and promise. Though the region lags behind other LMICs in the adoption of mHealth technologies, this offers the convenience of learning

  18. A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory

    NASA Astrophysics Data System (ADS)

    Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu

    2014-07-01

    Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.

  19. Empirical Study of Family Background and Higher Education: Relationship to Acceptance Opportunities and Trends--Based on Surveys at a Key Beijing University from 2007 to 2012

    ERIC Educational Resources Information Center

    Silin, Huang; Ziqiang, Xin; Jiawei, Hou

    2015-01-01

    Which family had a child that was accepted at a key university? To investigate the relationship between family background and children obtaining higher education opportunities and developing trends, the authors analyze survey data from 2007 to 2012 at a key university in Beijing. The results show there is a clear trend of enlargement of the…

  20. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  1. Management of CAD/CAM information: Key to improved manufacturing productivity

    NASA Technical Reports Server (NTRS)

    Fulton, R. E.; Brainin, J.

    1984-01-01

    A key element to improved industry productivity is effective management of CAD/CAM information. To stimulate advancements in this area, a joint NASA/Navy/industry project designated Intergrated Programs for Aerospace-Vehicle Design (IPAD) is underway with the goal of raising aerospace industry productivity through advancement of technology to integrate and manage information involved in the design and manufacturing process. The project complements traditional NASA/DOD research to develop aerospace design technology and the Air Force's Integrated Computer-Aided Manufacturing (ICAM) program to advance CAM technology. IPAD research is guided by an Industry Technical Advisory Board (ITAB) composed of over 100 representatives from aerospace and computer companies.

  2. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    NASA Astrophysics Data System (ADS)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  3. Predicting Key Events in the Popularity Evolution of Online Information.

    PubMed

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  4. Smart cards--the key to trustworthy health information systems.

    PubMed Central

    Neame, R.

    1997-01-01

    Some 20 years after they were first developed, "smart cards" are set to play a crucial part in healthcare systems. Last year about a billion were supplied, mainly for use in the financial sector, but their special features make them of particular strategic importance for the health sector, where they offer a ready made solution to some key problems of security and confidentiality. This article outlines what smart cards are and why they are so important in managing health information. I discuss some of the unique features of smart cards that are of special importance in the development of secure and trustworthy health information systems. Smart cards would enable individuals' identities to be authenticated and communications to be secured and would provide the mechanisms for implementing strong security, differential access to data, and definitive audit trails. Patient cards can also with complete security carry personal details, data on current health problems and medications, emergency care data, and pointers to where medical records for the patient can be found. Provider cards can in addition carry authorisations and information on computer set up. PMID:9055719

  5. The construction of a public key infrastructure for healthcare information networks in Japan.

    PubMed

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  6. New maps, new information: Coral reefs of the Florida keys

    USGS Publications Warehouse

    Lidz, B.H.; Reich, C.D.; Peterson, R.L.; Shinn, E.A.

    2006-01-01

    A highly detailed digitized map depicts 22 benthic habitats in 3140.5 km2 of the Florida Keys National Marine Sanctuary. Dominant are a seagrass/lime-mud zone (map area 27.5%) throughout Hawk Channel and seagrass/carbonate-sand (18.7%) and bare carbonate-sand (17.3%) zones on the outer shelf and in The Quicksands. A lime-mud/seagrass-covered muddy carbonate-sand zone (9.6%) abuts the keys. Hardbottom communities (13.2%) consist of bare Pleistocene coralline and oolitic limestone, coral rubble, and senile coral reefs. Smaller terrestrial (4.0%) and marine habitats, including those of live coral (patch reefs, 0.7%), account for the rest (13.7%) of the area. Derived from aerial photomosaics, the seabed dataset fits precisely when transposed onto a newly developed National Geophysical Data Center hydrographic-bathymetry map. Combined, the maps point to new information on unstudied seabed morphologies, among them an erosional nearshore rock ledge bordering the seaward side of the Florida Keys and thousands of patch-reef clusters aligned in mid-Hawk Channel. Preliminary indications are that the ledge may represent the seaward extent of the 125-ka Key Largo and Miami Limestone that form the keys, and the patch reefs colonized landward edges of two noncoralline, non-dune-ridge topographic troughs. The troughs, their substrate, and inner-shelf location along the seaward side of the Hawk Channel bedrock depression are the first of that type of nuclei to be recognized in the Florida reef record. Together, the map datasets establish the efficacy and accuracy of using aerial photographs to define in extraordinary detail the seabed features and habitats in a shallow-reef setting.

  7. Predicting Key Events in the Popularity Evolution of Online Information

    PubMed Central

    Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the “burst”, “peak”, and “fade” key events together as a representative summary of popularity evolution. We propose a novel prediction task—predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify “burst”, “peak”, and “fade” in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution. PMID:28046121

  8. A neural mechanism for background information-gated learning based on axonal-dendritic overlaps.

    PubMed

    Mainetti, Matteo; Ascoli, Giorgio A

    2015-03-01

    Experiencing certain events triggers the acquisition of new memories. Although necessary, however, actual experience is not sufficient for memory formation. One-trial learning is also gated by knowledge of appropriate background information to make sense of the experienced occurrence. Strong neurobiological evidence suggests that long-term memory storage involves formation of new synapses. On the short time scale, this form of structural plasticity requires that the axon of the pre-synaptic neuron be physically proximal to the dendrite of the post-synaptic neuron. We surmise that such "axonal-dendritic overlap" (ADO) constitutes the neural correlate of background information-gated (BIG) learning. The hypothesis is based on a fundamental neuroanatomical constraint: an axon must pass close to the dendrites that are near other neurons it contacts. The topographic organization of the mammalian cortex ensures that nearby neurons encode related information. Using neural network simulations, we demonstrate that ADO is a suitable mechanism for BIG learning. We model knowledge as associations between terms, concepts or indivisible units of thought via directed graphs. The simplest instantiation encodes each concept by single neurons. Results are then generalized to cell assemblies. The proposed mechanism results in learning real associations better than spurious co-occurrences, providing definitive cognitive advantages.

  9. A Neural Mechanism for Background Information-Gated Learning Based on Axonal-Dendritic Overlaps

    PubMed Central

    Mainetti, Matteo; Ascoli, Giorgio A.

    2015-01-01

    Experiencing certain events triggers the acquisition of new memories. Although necessary, however, actual experience is not sufficient for memory formation. One-trial learning is also gated by knowledge of appropriate background information to make sense of the experienced occurrence. Strong neurobiological evidence suggests that long-term memory storage involves formation of new synapses. On the short time scale, this form of structural plasticity requires that the axon of the pre-synaptic neuron be physically proximal to the dendrite of the post-synaptic neuron. We surmise that such “axonal-dendritic overlap” (ADO) constitutes the neural correlate of background information-gated (BIG) learning. The hypothesis is based on a fundamental neuroanatomical constraint: an axon must pass close to the dendrites that are near other neurons it contacts. The topographic organization of the mammalian cortex ensures that nearby neurons encode related information. Using neural network simulations, we demonstrate that ADO is a suitable mechanism for BIG learning. We model knowledge as associations between terms, concepts or indivisible units of thought via directed graphs. The simplest instantiation encodes each concept by single neurons. Results are then generalized to cell assemblies. The proposed mechanism results in learning real associations better than spurious co-occurrences, providing definitive cognitive advantages. PMID:25767887

  10. Measuring Sexual Behavior Stigma to Inform Effective HIV Prevention and Treatment Programs for Key Populations

    PubMed Central

    Hargreaves, James R; Sprague, Laurel; Stangl, Anne L; Baral, Stefan D

    2017-01-01

    Background The levels of coverage of human immunodeficiency virus (HIV) treatment and prevention services needed to change the trajectory of the HIV epidemic among key populations, including gay men and other men who have sex with men (MSM) and sex workers, have consistently been shown to be limited by stigma. Objective The aim of this study was to propose an agenda for the goals and approaches of a sexual behavior stigma surveillance effort for key populations, with a focus on collecting surveillance data from 4 groups: (1) members of key population groups themselves (regardless of HIV status), (2) people living with HIV (PLHIV) who are also members of key populations, (3) members of nonkey populations, and (4) health workers. Methods We discuss strengths and weaknesses of measuring multiple different types of stigma including perceived, anticipated, experienced, perpetrated, internalized, and intersecting stigma as measured among key populations themselves, as well as attitudes or beliefs about key populations as measured among other groups. Results With the increasing recognition of the importance of stigma, consistent and validated stigma metrics for key populations are needed to monitor trends and guide immediate action. Evidence-based stigma interventions may ultimately be the key to overcoming the barriers to coverage and retention in life-saving antiretroviral-based HIV prevention and treatment programs for key populations. Conclusions Moving forward necessitates the integration of validated stigma scales in routine HIV surveillance efforts, as well as HIV epidemiologic and intervention studies focused on key populations, as a means of tracking progress toward a more efficient and impactful HIV response. PMID:28446420

  11. Tools for community-oriented primary care: use of key informant trees in eleven practices.

    PubMed Central

    Williams, R. L.; Jaén, C. R.

    2000-01-01

    Physicians increasingly need information about their communities to use in care of the individual patient. Busy practitioners need feasible methods for collecting this information before they can begin to gather and use it, however. Our objective was to study key informant trees as a practical approach for practice-based gathering of qualitative data from a community. Following a standard protocol, key informant trees were set up in 11 different practices to study the costs, advantages, and problems with their use for this purpose. Time studies showed that each tree took 7 to 11 hours of physician time and 7 hours of clerical time to organize and conduct. The technique appeared to be best suited for two qualitative informational needs: idea generation and explanatory data gathering. Trees appeared most productive where there was stability of physician staff in the practice, where the practice had been present in the community for some years, and where community residents were relatively stable. Response and selection biases are important considerations in use of this technique. PMID:10976171

  12. Reappraising Abstract Paintings after Exposure to Background Information

    PubMed Central

    Park, Seongmin A.; Yun, Kyongsik; Jeong, Jaeseung

    2015-01-01

    Can knowledge help viewers when they appreciate an artwork? Experts’ judgments of the aesthetic value of a painting often differ from the estimates of naïve viewers, and this phenomenon is especially pronounced in the aesthetic judgment of abstract paintings. We compared the changes in aesthetic judgments of naïve viewers while they were progressively exposed to five pieces of background information. The participants were asked to report their aesthetic judgments of a given painting after each piece of information was presented. We found that commentaries by the artist and a critic significantly increased the subjective aesthetic ratings. Does knowledge enable experts to attend to the visual features in a painting and to link it to the evaluative conventions, thus potentially causing different aesthetic judgments? To investigate whether a specific pattern of attention is essential for the knowledge-based appreciation, we tracked the eye movements of subjects while viewing a painting with a commentary by the artist and with a commentary by a critic. We observed that critics’ commentaries directed the viewers’ attention to the visual components that were highly relevant to the presented commentary. However, attention to specific features of a painting was not necessary for increasing the subjective aesthetic judgment when the artists’ commentary was presented. Our results suggest that at least two different cognitive mechanisms may be involved in knowledge- guided aesthetic judgments while viewers reappraise a painting. PMID:25945789

  13. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  14. Management of CAD/CAM information: Key to improved manufacturing productivity

    NASA Technical Reports Server (NTRS)

    Fulton, R. E.; Brainin, J.

    1984-01-01

    A key element to improved industry productivity is effective management of CAD/CAM information. To stimulate advancements in this area, a joint NASA/Navy/Industry project designated Integrated Programs for Aerospace-Vehicle Design (IPAD) is underway with the goal of raising aerospace industry productivity through advancement of technology to integrate and manage information involved in the design and manufacturing process. The project complements traditional NASA/DOD research to develop aerospace design technology and the Air Force's Integrated Computer-Aided Manufacturing (ICAM) program to advance CAM technology. IPAD research is guided by an Industry Technical Advisory Board (ITAB) composed of over 100 repesentatives from aerospace and computer companies. The IPAD accomplishments to date in development of requirements and prototype software for various levels of company-wide CAD/CAM data management are summarized and plans for development of technology for management of distributed CAD/CAM data and information required to control future knowledge-based CAD/CAM systems are discussed.

  15. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  16. E-Mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    ERIC Educational Resources Information Center

    Nazari, Behzad; Ninknejad, Sahar

    2015-01-01

    The present study highly supported the effective role of providing background information via email by the teacher to write e-mail by the students in learners' writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of…

  17. Stakeholder engagement: a key component of integrating genomic information into electronic health records

    PubMed Central

    Hartzler, Andrea; McCarty, Catherine A.; Rasmussen, Luke V.; Williams, Marc S.; Brilliant, Murray; Bowton, Erica A.; Clayton, Ellen Wright; Faucett, William A.; Ferryman, Kadija; Field, Julie R.; Fullerton, Stephanie M.; Horowitz, Carol R.; Koenig, Barbara A.; McCormick, Jennifer B.; Ralston, James D.; Sanderson, Saskia C.; Smith, Maureen E.; Trinidad, Susan Brown

    2014-01-01

    Integrating genomic information into clinical care and the electronic health record can facilitate personalized medicine through genetically guided clinical decision support. Stakeholder involvement is critical to the success of these implementation efforts. Prior work on implementation of clinical information systems provides broad guidance to inform effective engagement strategies. We add to this evidence-based recommendations that are specific to issues at the intersection of genomics and the electronic health record. We describe stakeholder engagement strategies employed by the Electronic Medical Records and Genomics Network, a national consortium of US research institutions funded by the National Human Genome Research Institute to develop, disseminate, and apply approaches that combine genomic and electronic health record data. Through select examples drawn from sites of the Electronic Medical Records and Genomics Network, we illustrate a continuum of engagement strategies to inform genomic integration into commercial and homegrown electronic health records across a range of health-care settings. We frame engagement as activities to consult, involve, and partner with key stakeholder groups throughout specific phases of health information technology implementation. Our aim is to provide insights into engagement strategies to guide genomic integration based on our unique network experiences and lessons learned within the broader context of implementation research in biomedical informatics. On the basis of our collective experience, we describe key stakeholder practices, challenges, and considerations for successful genomic integration to support personalized medicine. PMID:24030437

  18. Part II--Factors Associated with School Nurse Ratios: Key State Informants' Perceptions

    ERIC Educational Resources Information Center

    Maughan, Erin

    2009-01-01

    This paper is the second of a two-part series examining factors influencing school nurse to pupil staffing ratios. The paper reports data from a qualitative study exploring the social and political factors that potentially influence ratios. Interviews were conducted with 30 key state informants from these states. Content analysis of the data…

  19. The politics of agenda setting at the global level: key informant interviews regarding the International Labour Organization Decent Work Agenda

    PubMed Central

    2014-01-01

    Background Global labour markets continue to undergo significant transformations resulting from socio-political instability combined with rises in structural inequality, employment insecurity, and poor working conditions. Confronted by these challenges, global institutions are providing policy guidance to protect and promote the health and well-being of workers. This article provides an account of how the International Labour Organization’s Decent Work Agenda contributes to the work policy agendas of the World Health Organization and the World Bank. Methods This qualitative study involved semi-structured interviews with representatives from three global institutions – the International Labour Organization (ILO), the World Health Organization and the World Bank. Of the 25 key informants invited to participate, 16 took part in the study. Analysis for key themes was followed by interpretation using selected agenda setting theories. Results Interviews indicated that through the Decent Work Agenda, the International Labour Organization is shaping the global policy narrative about work among UN agencies, and that the pursuit of decent work and the Agenda were perceived as important goals with the potential to promote just policies. The Agenda was closely linked to the World Health Organization’s conception of health as a human right. However, decent work was consistently identified by World Bank informants as ILO terminology in contrast to terms such as job creation and job access. The limited evidence base and its conceptual nature were offered as partial explanations for why the Agenda has yet to fully influence other global institutions. Catalytic events such as the economic crisis were identified as creating the enabling conditions to influence global work policy agendas. Conclusions Our evidence aids our understanding of how an issue like decent work enters and stays on the policy agendas of global institutions, using the Decent Work Agenda as an illustrative

  20. Secret information reconciliation based on punctured low-density parity-check codes for continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Jiang, Xue-Qin; Huang, Peng; Huang, Duan; Lin, Dakai; Zeng, Guihua

    2017-02-01

    Achieving information theoretic security with practical complexity is of great interest to continuous-variable quantum key distribution in the postprocessing procedure. In this paper, we propose a reconciliation scheme based on the punctured low-density parity-check (LDPC) codes. Compared to the well-known multidimensional reconciliation scheme, the present scheme has lower time complexity. Especially when the chosen punctured LDPC code achieves the Shannon capacity, the proposed reconciliation scheme can remove the information that has been leaked to an eavesdropper in the quantum transmission phase. Therefore, there is no information leaked to the eavesdropper after the reconciliation stage. This indicates that the privacy amplification algorithm of the postprocessing procedure is no more needed after the reconciliation process. These features lead to a higher secret key rate, optimal performance, and availability for the involved quantum key distribution scheme.

  1. Strategies for Supporting Physician-Scientists in Faculty Roles: A Narrative Review With Key Informant Consultations.

    PubMed

    Lingard, Lorelei; Zhang, Peter; Strong, Michael; Steele, Margaret; Yoo, John; Lewis, James

    2017-10-01

    Physician-scientists are a population in decline globally. Solutions to reverse this decline often have focused on the training pipeline. Less attention has been paid to reducing attrition post training, when physician-scientists take up faculty roles. However, this period is a known time of vulnerability because of the pressures of clinical duties and the long timeline to securing independent research funding. This narrative review explored existing knowledge regarding how best to support physician-scientists for success in their faculty roles. The authors searched the Medline, Embase, ERIC, and Cochrane Library databases for articles published from 2000 to 2016 on this topic and interviewed key informants in 2015 to solicit their input on the review results. The authors reviewed 78 articles and interviewed 16 key informants. From the literature, they developed a framework of organizational (facilitate mentorship, foster community, value the physician-scientist role, minimize financial barriers) and individual (develop professional and research skills) strategies for supporting physician-scientists. They also outlined key knowledge gaps representing topics either rarely or never addressed in the reviewed articles (percent research time, structural hypocrisy, objective assessment, group metrics, professional identity). The key informants confirmed the identified strategies and discussed how the gaps were particularly important and impactful. This framework offers a basis for assessing an organization's existing support strategies, identifying outstanding needs, and developing targeted programming. The identified gaps require attention, as they threaten to undermine the benefits of existing support strategies.

  2. Italian: Area Background Information.

    ERIC Educational Resources Information Center

    Defense Language Inst., Washington, DC.

    This booklet has been assembled in order to provide students of Italian with a compact source of cultural information on their target area. Chapters include discussion of: (1) introduction to Italian; (2) origins of the Italian population; (3) geography; (4) history including the Roman Era, the Middle Ages, the Renaissance, the "Risorgimento," and…

  3. Perspectives on impacts of water quality on agriculture and community well-being-a key informant study from Sri Lanka.

    PubMed

    Thoradeniya, Bhadranie; Pinto, Uthpala; Maheshwari, Basant

    2017-11-04

    Integrated management of water quality is critical for sustaining food production and achieving overall well-being of a community. Further, understanding people's perceptions and engagement can play an important role in achieving water and food security. The main aim of this study was to investigate the perspectives of community and other stakeholders as to how water quality impacts on agriculture, livelihood and community well-being within rural farming communities of two dry zone districts of Sri Lanka. The study adopted 'key informant interviews' as the methodology to investigate community and other stakeholder perspectives to collect primary data over a period of four months. The interview contents were then examined using a frequency matrix and graphed using an Excel graphing tool. The raw text was also analysed to understand the broader patterns in the text. A fuzzy logic cognitive map (FCM) was developed using the relationships between various concepts and linkages provided by the key informants. All key informants were concerned with the quality of drinking water they consume and the water used for their food preparation. Key informants representing the farming community indicated that the use of poor quality groundwater with higher levels of hardness has made growing crops difficult in the region. The key informants also identified extensive and ongoing use of agro-chemicals and fertilisers as a major source of pollution in water bodies in both spatio-temporal scale. Based on key informant interviews, possible initiatives that can help improve surface water and groundwater qualities for both drinking and agricultural use in the dry zone of Sri Lanka can be categorised into four broader themes, viz., provision of filtering/treatment systems, reduction in the use of agro-chemical and fertilisers, education of community stakeholders and support of alternative options for portable water supplies. The study indicates that in the key informants' view of

  4. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates.

    PubMed

    Dellson, P; Nilbert, M; Bendahl, P-O; Malmström, P; Carlsson, C

    2011-07-01

    Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials. © 2010 Blackwell Publishing Ltd.

  5. Disaster Emergency Rapid Assessment Based on Remote Sensing and Background Data

    NASA Astrophysics Data System (ADS)

    Han, X.; Wu, J.

    2018-04-01

    The period from starting to the stable conditions is an important stage of disaster development. In addition to collecting and reporting information on disaster situations, remote sensing images by satellites and drones and monitoring results from disaster-stricken areas should be obtained. Fusion of multi-source background data such as population, geography and topography, and remote sensing monitoring information can be used in geographic information system analysis to quickly and objectively assess the disaster information. According to the characteristics of different hazards, the models and methods driven by the rapid assessment of mission requirements are tested and screened. Based on remote sensing images, the features of exposures quickly determine disaster-affected areas and intensity levels, and extract key disaster information about affected hospitals and schools as well as cultivated land and crops, and make decisions after emergency response with visual assessment results.

  6. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  7. Understanding Price Elasticities to Inform Public Health Research and Intervention Studies: Key Issues

    PubMed Central

    Nghiem, Nhung; Genç, Murat; Blakely, Tony

    2013-01-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies. PMID:24028228

  8. Career Development Factors for Minority Disability and Health Research Leaders: A Key Informant Study

    ERIC Educational Resources Information Center

    Manyibe, Edward O.; Moore, Corey L.; Wang, Ningning; Davis, Dytisha; Aref, Fariborz; Washington, Andre L.; Johnson, Jean; Eugene-Cross, Kenyotta; Muhammad, Atashia; Lewis, Allen

    2017-01-01

    Purpose: This study examined and documented minority disability and health research leaders' experiences and perspectives on career development challenges and success strategies. Methods: A sample of 15 African American, American Indian or Alaskan Native, Latino, and Asian research leaders as key informants participated in the inquiry. Research…

  9. Chemical Source Localization Fusing Concentration Information in the Presence of Chemical Background Noise.

    PubMed

    Pomareda, Víctor; Magrans, Rudys; Jiménez-Soto, Juan M; Martínez, Dani; Tresánchez, Marcel; Burgués, Javier; Palacín, Jordi; Marco, Santiago

    2017-04-20

    We present the estimation of a likelihood map for the location of the source of a chemical plume dispersed under atmospheric turbulence under uniform wind conditions. The main contribution of this work is to extend previous proposals based on Bayesian inference with binary detections to the use of concentration information while at the same time being robust against the presence of background chemical noise. For that, the algorithm builds a background model with robust statistics measurements to assess the posterior probability that a given chemical concentration reading comes from the background or from a source emitting at a distance with a specific release rate. In addition, our algorithm allows multiple mobile gas sensors to be used. Ten realistic simulations and ten real data experiments are used for evaluation purposes. For the simulations, we have supposed that sensors are mounted on cars which do not have among its main tasks navigating toward the source. To collect the real dataset, a special arena with induced wind is built, and an autonomous vehicle equipped with several sensors, including a photo ionization detector (PID) for sensing chemical concentration, is used. Simulation results show that our algorithm, provides a better estimation of the source location even for a low background level that benefits the performance of binary version. The improvement is clear for the synthetic data while for real data the estimation is only slightly better, probably because our exploration arena is not able to provide uniform wind conditions. Finally, an estimation of the computational cost of the algorithmic proposal is presented.

  10. Backgrounds in Language.

    ERIC Educational Resources Information Center

    Maxwell, John C.; Long, Barbara K.

    "Backgrounds in Language," a field-tested inservice course designed for use by groups of 15 or 25 language arts teachers, provides the subject matter background teachers need to make informed decisions about what curriculum materials to use in what way, at what time, and with which students. The course is comprised of eight 2-hour sessions,…

  11. The use of mode of action information in risk assessment: quantitative key events/dose-response framework for modeling the dose-response for key events.

    PubMed

    Simon, Ted W; Simons, S Stoney; Preston, R Julian; Boobis, Alan R; Cohen, Samuel M; Doerrer, Nancy G; Fenner-Crisp, Penelope A; McMullin, Tami S; McQueen, Charlene A; Rowlands, J Craig

    2014-08-01

    The HESI RISK21 project formed the Dose-Response/Mode-of-Action Subteam to develop strategies for using all available data (in vitro, in vivo, and in silico) to advance the next-generation of chemical risk assessments. A goal of the Subteam is to enhance the existing Mode of Action/Human Relevance Framework and Key Events/Dose Response Framework (KEDRF) to make the best use of quantitative dose-response and timing information for Key Events (KEs). The resulting Quantitative Key Events/Dose-Response Framework (Q-KEDRF) provides a structured quantitative approach for systematic examination of the dose-response and timing of KEs resulting from a dose of a bioactive agent that causes a potential adverse outcome. Two concepts are described as aids to increasing the understanding of mode of action-Associative Events and Modulating Factors. These concepts are illustrated in two case studies; 1) cholinesterase inhibition by the pesticide chlorpyrifos, which illustrates the necessity of considering quantitative dose-response information when assessing the effect of a Modulating Factor, that is, enzyme polymorphisms in humans, and 2) estrogen-induced uterotrophic responses in rodents, which demonstrate how quantitative dose-response modeling for KE, the understanding of temporal relationships between KEs and a counterfactual examination of hypothesized KEs can determine whether they are Associative Events or true KEs.

  12. Short Review on Quantum Key Distribution Protocols.

    PubMed

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  13. Key Factors in the Success of an Organization's Information Security Culture: A Quantitative Study and Analysis

    ERIC Educational Resources Information Center

    Pierce, Robert E.

    2012-01-01

    This research study reviewed relative literature on information security and information security culture within organizations to determine what factors potentially assist an organization in implementing, integrating, and maintaining a successful organizational information security culture. Based on this review of literature, five key factors were…

  14. Developing a Strategic Program for Chilean Health Information Technology: Environmental Scan and Key Informant Interviews.

    PubMed

    Taylor, Erin Audrey; Fischer, Shira H; Gracner, Tadeja; Tejeda, Ivo; Kim, Alice; Chavez-Herrerias, Emilio; de la Guardia, Fernando Hoces

    2016-06-20

    As part of an effort to assist Chile in developing a strategic program to foster the development of the health information technology (health IT) sector over the next five to ten years, this study assesses the current state of health IT adoption and implementation in Chile, as well as the challenges and opportunities facing the sector over the coming years. The authors conducted an environmental scan and ten key informant interviews and found that there are a number of successful health IT projects and strategies for further development currently underway in Chile, but that the successful projects are generally localized within specific health care providers and lack integration. These and other challenges suggest significant potential for the Ministry of Economy and other stakeholders to take specific actions designed to encourage further development of the health IT sector in Chile over the coming years. The next phase of this effort will use the results from this study to develop a roadmap for the Ministry of Economy to encourage health IT development in Chile over the short, medium, and long terms.

  15. An improved authenticated key agreement protocol for telecare medicine information system.

    PubMed

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  16. Vocational bias: a potential pitfall in the use of key informant interviews in pediatric community needs assessments.

    PubMed

    Northrip, Kimberly; Chen, Candice; Marsh, Jennifer

    2008-04-29

    Key informants are individuals with insight into a community or a problem of interest. Our objective was to evaluate the effect of the employment type of key informants on the outcome of a pediatric needs assessment for an urban community. Twenty-one interviews were conducted during the course of a pediatric community needs assessment. As part of the interview, informants were asked to list the top three problems facing children in their community. We analyzed their answers to determine if informant responses differed by employment type. Key informants were divided into four employment types: health care setting, social service, business, and infrastructure. Responses were coded as being primarily one of three types: medical, social, or resource. Our results showed that those informants who worked in a health care setting listed medical problems more often than those who did not (p < 0.04). Those who worked in social services listed resource problems more often than those who did not (p < 0.05). Those in business and infrastructure positions listed more social problems (p < 0.37). No difference was observed in response type between those who had lived in the community at some point and those who had not. This study lends support to the hypothesis that informants' reporting of community problems is biased by their vocation. Clinicians often focus their needs assessments on health care workers. This study suggests, however, that we need to take into consideration the bias this presents and to seek to interview people with diverse work experiences. By limiting the process to health care workers, clinicians are likely to get a skewed perspective of a community's needs and wants.

  17. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  18. Experiences with nutrition-related information during antenatal care of pregnant women of different ethnic backgrounds residing in the area of Oslo, Norway.

    PubMed

    Garnweidner, Lisa M; Sverre Pettersen, Kjell; Mosdøl, Annhild

    2013-12-01

    to explore experiences with nutrition-related information during routine antenatal care among women of different ethnical backgrounds. individual interviews with seventeen participants were conducted twice during pregnancy. Data collection and analysis were inspired by an interpretative phenomenological approach. participants were purposively recruited at eight Mother and Child Health Centres in the area of Oslo, Norway, where they received antenatal care. participants had either immigrant backgrounds from African and Asian countries (n=12) or were ethnic Norwegian (n=5). Participants were pregnant with their first child and had a pre-pregnancy Body Mass Index above 25 kg/m(2). participants experienced that they were provided with little nutrition-related information in antenatal care. The information was perceived as presented in very general terms and focused on food safety. Weight management and the long-term prevention of diet-related chronic diseases had hardly been discussed. Participants with immigrant backgrounds appeared to be confused about information given by the midwife which was incongruent with their original food culture. The participants were actively seeking for nutrition-related information and had to navigate between various sources of information. the midwife is considered a trustworthy source of nutrition-related information. Therefore, antenatal care may have considerable potential to promote a healthy diet to pregnant women. Findings suggest that nutrition communication in antenatal care should be more tailored towards women's dietary habits and cultural background, nutritional knowledge as well as level of nutrition literacy. Copyright © 2012 Elsevier Ltd. All rights reserved.

  19. Implementation of eMental Health care: viewpoints from key informants from organizations and agencies with eHealth mandates.

    PubMed

    Wozney, Lori; Newton, Amanda S; Gehring, Nicole D; Bennett, Kathryn; Huguet, Anna; Hartling, Lisa; Dyson, Michele P; McGrath, Patrick

    2017-06-02

    The use of technology such as computers, tablets, and smartphones to improve access to and the delivery of mental health care (eMental Health care) is growing worldwide. However, despite the rapidly expanding evidence base demonstrating the efficacy of eMental Health care, its implementation in clinical practice and health care systems remains fragmented. To date, no peer-reviewed, key-informant studies have reported on the perspectives of decision-makers concerned with whether and how to implement eMental Health care. From September to November 2015, we conducted 31 interviews with key informants responsible for leadership, policy, research, and/ or information technology in organizations influential in the adoption of technology for eMental Health care. Deductive and inductive thematic analyses of transcripts were conducted using the Behavior Change Wheel as an organizing framework. Frequency and intensity effect sizes were calculated for emerging themes to further explore patterns within the data. Key informant responses (n = 31) representing 6 developed countries and multiple organizations showed consensus on common factors impacting implementation: individual and organizational capacities (e.g., computer literacy skills [patients and providers], knowledge gaps about cyber security, limited knowledge of available services); motivational drivers of technology-based care (e.g., extending care, data analytics); and opportunities for health systems to advance eMental Health care implementation (e.g., intersectoral research, rapid testing cycles, sustainable funding). Frequency effect sizes showed strong associations between implementation and credibility, knowledge, workflow, patient empowerment, electronic medical record (EMR) integration, sustained funding and intersectoral networks. Intensity effect sizes showed the highest concentration of statements (>10% of all comments) related to funding, credibility, knowledge gaps, and patient empowerment. This study

  20. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  1. Honeybees Learn Odour Mixtures via a Selection of Key Odorants

    PubMed Central

    Reinhard, Judith; Sinclair, Michael; Srinivasan, Mandyam V.; Claudianos, Charles

    2010-01-01

    Background The honeybee has to detect, process and learn numerous complex odours from her natural environment on a daily basis. Most of these odours are floral scents, which are mixtures of dozens of different odorants. To date, it is still unclear how the bee brain unravels the complex information contained in scent mixtures. Methodology/Principal Findings This study investigates learning of complex odour mixtures in honeybees using a simple olfactory conditioning procedure, the Proboscis-Extension-Reflex (PER) paradigm. Restrained honeybees were trained to three scent mixtures composed of 14 floral odorants each, and then tested with the individual odorants of each mixture. Bees did not respond to all odorants of a mixture equally: They responded well to a selection of key odorants, which were unique for each of the three scent mixtures. Bees showed less or very little response to the other odorants of the mixtures. The bees' response to mixtures composed of only the key odorants was as good as to the original mixtures of 14 odorants. A mixture composed of the other, non-key-odorants elicited a significantly lower response. Neither an odorant's volatility or molecular structure, nor learning efficiencies for individual odorants affected whether an odorant became a key odorant for a particular mixture. Odorant concentration had a positive effect, with odorants at high concentration likely to become key odorants. Conclusions/Significance Our study suggests that the brain processes complex scent mixtures by predominantly learning information from selected key odorants. Our observations on key odorant learning lend significant support to previous work on olfactory learning and mixture processing in honeybees. PMID:20161714

  2. Combining rules, background knowledge and change patterns to maintain semantic annotations.

    PubMed

    Cardoso, Silvio Domingos; Chantal, Reynaud-Delaître; Da Silveira, Marcos; Pruski, Cédric

    2017-01-01

    Knowledge Organization Systems (KOS) play a key role in enriching biomedical information in order to make it machine-understandable and shareable. This is done by annotating medical documents, or more specifically, associating concept labels from KOS with pieces of digital information, e.g., images or texts. However, the dynamic nature of KOS may impact the annotations, thus creating a mismatch between the evolved concept and the associated information. To solve this problem, methods to maintain the quality of the annotations are required. In this paper, we define a framework based on rules, background knowledge and change patterns to drive the annotation adaption process. We evaluate experimentally the proposed approach in realistic cases-studies and demonstrate the overall performance of our approach in different KOS considering the precision, recall, F1-score and AUC value of the system.

  3. Combining rules, background knowledge and change patterns to maintain semantic annotations

    PubMed Central

    Cardoso, Silvio Domingos; Chantal, Reynaud-Delaître; Da Silveira, Marcos; Pruski, Cédric

    2017-01-01

    Knowledge Organization Systems (KOS) play a key role in enriching biomedical information in order to make it machine-understandable and shareable. This is done by annotating medical documents, or more specifically, associating concept labels from KOS with pieces of digital information, e.g., images or texts. However, the dynamic nature of KOS may impact the annotations, thus creating a mismatch between the evolved concept and the associated information. To solve this problem, methods to maintain the quality of the annotations are required. In this paper, we define a framework based on rules, background knowledge and change patterns to drive the annotation adaption process. We evaluate experimentally the proposed approach in realistic cases-studies and demonstrate the overall performance of our approach in different KOS considering the precision, recall, F1-score and AUC value of the system. PMID:29854115

  4. Key parameters design of an aerial target detection system on a space-based platform

    NASA Astrophysics Data System (ADS)

    Zhu, Hanlu; Li, Yejin; Hu, Tingliang; Rao, Peng

    2018-02-01

    To ensure flight safety of an aerial aircraft and avoid recurrence of aircraft collisions, a method of multi-information fusion is proposed to design the key parameter to realize aircraft target detection on a space-based platform. The key parameters of a detection wave band and spatial resolution using the target-background absolute contrast, target-background relative contrast, and signal-to-clutter ratio were determined. This study also presented the signal-to-interference ratio for analyzing system performance. Key parameters are obtained through the simulation of a specific aircraft. And the simulation results show that the boundary ground sampling distance is 30 and 35 m in the mid- wavelength infrared (MWIR) and long-wavelength infrared (LWIR) bands for most aircraft detection, and the most reasonable detection wavebands is 3.4 to 4.2 μm and 4.35 to 4.5 μm in the MWIR bands, and 9.2 to 9.8 μm in the LWIR bands. We also found that the direction of detection has a great impact on the detection efficiency, especially in MWIR bands.

  5. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    DTIC Science & Technology

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  6. Understanding key tradeoffs for cost-effective deployment of surveillance to support advanced traveler information systems (ATIS)

    DOT National Transportation Integrated Search

    2004-04-01

    This paper presents the authors' understanding of a key tradeoff in ATIS investment planning: investment in expanding surveillance coverage to additional miles of roadway vs. improving the accuracy of the information provided on roadways already cove...

  7. Childhood disability in Malawi: a population based assessment using the key informant method.

    PubMed

    Tataryn, Myroslava; Polack, Sarah; Chokotho, Linda; Mulwafu, Wakisa; Kayange, Petros; Banks, Lena Morgon; Noe, Christiane; Lavy, Chris; Kuper, Hannah

    2017-11-28

    Epidemiological data on childhood disability are lacking in Low and Middle Income countries (LMICs) such as Malawi, hampering effective service planning and advocacy. The Key Informant Method (KIM) is an innovative, cost-effective method for generating population data on the prevalence and causes of impairment in children. The aim of this study was to use the Key Informant Method to estimate the prevalence of moderate/severe, hearing, vision and physical impairments, intellectual impairments and epilepsy in children in two districts in Malawi and to estimate the associated need for rehabilitation and other services. Five hundred key informants (KIs) were trained to identify children in their communities who may have the impairment types included in this study. Identified children were invited to attend a screening camp where they underwent assessment by medical professionals for moderate/severe hearing, vision and physical impairments, intellectual impairments and epilepsy. Approximately 15,000 children were identified by KIs as potentially having an impairment of whom 7220 (48%) attended a screening camp. The estimated prevalence of impairments/epilepsy was 17.3/1000 children (95% CI: 16.9-17.7). Physical impairment (39%) was the commonest impairment type followed by hearing impairment (27%), intellectual impairment (26%), epilepsy (22%) and vision impairment (4%). Approximately 2100 children per million population could benefit from physiotherapy and occupational therapy and 300 per million are in need of a wheelchair. An estimated 1800 children per million population have hearing impairment caused by conditions that could be prevented or treated through basic primary ear care. Corneal opacity was the leading cause of vision impairment. Only 50% of children with suspected epilepsy were receiving medication. The majority (73%) of children were attending school, but attendance varied by impairment type and was lowest among children with multiple impairments (38

  8. Optical key system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  9. Effect of display update interval, update type, and background on perception of aircraft separation on a cockpit display on traffic information

    NASA Technical Reports Server (NTRS)

    Jago, S.; Baty, D.; Oconnor, S.; Palmer, E.

    1981-01-01

    The concept of a cockpit display of traffic information (CDTI) includes the integration of air traffic, navigation, and other pertinent information in a single electronic display in the cockpit. Concise display symbology was developed for use in later full-mission simulator evaluations of the CDTI concept. Experimental variables used included the update interval motion of the aircraft, the update type, (that is, whether the two aircraft were updated at the same update interval or not), the background (grid pattern or no background), and encounter type (straight or curved). Only the type of encounter affected performance.

  10. Key issues concerning environmental enrichment for laboratory-held fish species.

    PubMed

    Williams, T D; Readman, G D; Owen, S F

    2009-04-01

    An improved knowledge and understanding of the fundamental biological requirements is needed for many of the species of fish held in captivity and, without this knowledge it is difficult to determine the optimal conditions for laboratory culture. The aim of this paper is to review the key issues concerning environmental enrichment for laboratory-held fish species and identify where improvements are required. It provides background information on environmental enrichment, describes enrichment techniques currently used in aquatic ecotoxicology studies, identifies potential restrictions in their use and discusses why more detailed and species-specific guidance is needed.

  11. Taiwan: Background Notes Series.

    ERIC Educational Resources Information Center

    Reams, Joanne Reppert

    Concise background information on Taiwan is provided. The publication begins with a profile of Taiwan, discussing the people, geography, political establishment, and economy. A map of the country is provided. The bulk of the publication then provides more detailed information on Taiwan's people, geography, history, administration, political…

  12. 47 CFR 215.1 - Background.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Background. 215.1 Section 215.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL FEDERAL GOVERNMENT FOCAL POINT FOR ELECTROMAGNETIC PULSE (EMP) INFORMATION § 215.1 Background. (a) The nuclear electromagnetic...

  13. 47 CFR 215.1 - Background.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Background. 215.1 Section 215.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL FEDERAL GOVERNMENT FOCAL POINT FOR ELECTROMAGNETIC PULSE (EMP) INFORMATION § 215.1 Background. (a) The nuclear electromagnetic...

  14. 47 CFR 215.1 - Background.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Background. 215.1 Section 215.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL FEDERAL GOVERNMENT FOCAL POINT FOR ELECTROMAGNETIC PULSE (EMP) INFORMATION § 215.1 Background. (a) The nuclear electromagnetic...

  15. 47 CFR 215.1 - Background.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Background. 215.1 Section 215.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL FEDERAL GOVERNMENT FOCAL POINT FOR ELECTROMAGNETIC PULSE (EMP) INFORMATION § 215.1 Background. (a) The nuclear electromagnetic...

  16. 47 CFR 215.1 - Background.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Background. 215.1 Section 215.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL FEDERAL GOVERNMENT FOCAL POINT FOR ELECTROMAGNETIC PULSE (EMP) INFORMATION § 215.1 Background. (a) The nuclear electromagnetic...

  17. Participation rate or informed choice? Rethinking the European key performance indicators for mammography screening.

    PubMed

    Strech, Daniel

    2014-03-01

    Despite the intensive controversies about the likelihood of benefits and harms of mammography screening almost all experts conclude that the choice to screen or not to screen needs to be made by the individual patient who is adequately informed. However, the "European guideline for quality assurance in breast cancer screening and diagnosis" specifies a participation rate of 70% as the key performance indicator for mammography screening. This paper argues that neither the existing evidence on benefits and harms, nor survey research with women, nor compliance rates in clinical trials, nor cost-effectiveness ratios justify participation rates as a reasonable performance indicator for preference-sensitive condition such as mammography screening. In contrast, an informed choice rate would be more reasonable. Further research needs to address the practical challenges in assessing informed choice rates. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  18. Information processing in bacteria: memory, computation, and statistical physics: a key issues review

    NASA Astrophysics Data System (ADS)

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  19. Information processing in bacteria: memory, computation, and statistical physics: a key issues review.

    PubMed

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  20. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan

    2015-08-01

    Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

  1. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    ERIC Educational Resources Information Center

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  2. Key performance indicators to benchmark hospital information systems - a delphi study.

    PubMed

    Hübner-Bloder, G; Ammenwerth, E

    2009-01-01

    To identify the key performance indicators for hospital information systems (HIS) that can be used for HIS benchmarking. A Delphi survey with one qualitative and two quantitative rounds. Forty-four HIS experts from health care IT practice and academia participated in all three rounds. Seventy-seven performance indicators were identified and organized into eight categories: technical quality, software quality, architecture and interface quality, IT vendor quality, IT support and IT department quality, workflow support quality, IT outcome quality, and IT costs. The highest ranked indicators are related to clinical workflow support and user satisfaction. Isolated technical indicators or cost indicators were not seen as useful. The experts favored an interdisciplinary group of all the stakeholders, led by hospital management, to conduct the HIS benchmarking. They proposed benchmarking activities both in regular (annual) intervals as well as at defined events (for example after IT introduction). Most of the experts stated that in their institutions no HIS benchmarking activities are being performed at the moment. In the context of IT governance, IT benchmarking is gaining importance in the healthcare area. The found indicators reflect the view of health care IT professionals and researchers. Research is needed to further validate and operationalize key performance indicators, to provide an IT benchmarking framework, and to provide open repositories for a comparison of the HIS benchmarks of different hospitals.

  3. Current Chinese Leadership: Background, Associations, and Issues for Selected Key Military Leaders

    DTIC Science & Technology

    1985-09-01

    58 years old). Key leaders classified as conservative, such as Ye Jianying and Xu Xiangqian, lost their influential positions in September 1985...Cmte, CCP-CC (since Oct 83); VC, Central Greening Cmte (since Feb 82) Name;Jiang Xianchen Position; Deputy Chief, PLA GSD (since Mar 85) Name; Li ...Guang Position; Dir, Weapons & Equipment Dept, PLA GSD (since Nov 82) Name; Li Jing Position; Dep Cdr, PLA Navy (since Jul 83) Name; Li Jiulong

  4. Online Information Exchanges for Parents of Children With a Rare Health Condition: Key Findings From an Online Support Community

    PubMed Central

    Campo, Shelly; Lowe, John; Andsager, Julie; Morcuende, Jose A

    2013-01-01

    Background The Internet provides new opportunities for parents of children with difficult illnesses and disabilities to find information and support. The Internet is particularly important for caregivers of children with special needs due to numerous health-related decisions they face. For at-risk populations, online support communities can become key settings and channels for health promotion and communication. Objective This study is an initial exploration of the information-seeking and information-provision processes present in an online support community, which is an area of opportunity and interest for Internet-based medical research and practice. The aim of this study was to explore and describe information-related processes of uncertainty management in relationship to clubfoot. Specifically, the study explored interpersonal communication (information seeking and provision) in an online support community serving the needs of parents of children with clubfoot. Methods The study population consisted of messages posted to an online community by caregivers (parents) of children with clubfoot. The theoretical framework informing the study was the Uncertainty Management Theory (UMT). The study used content analysis to explore and categorize the content of 775 messages. Results Women authored 664 of 775 messages (86%) and men authored 47 messages (6%). Caregivers managed uncertainty through information seeking and provision behaviors that were dynamic and multilayered. The ratio of information-seeking messages to information-provision responses was 1 to 4. All five types of information-seeking behaviors proposed by Brashers’ schema were identified, most of them being correlated. Information seeking using direct questions was found to be positively correlated to self-disclosure (r=.538), offering of a candidate answer (r=.318), and passive information seeking (r=.253). Self-disclosure was found to be positively correlated to provision of a candidate answer (r=.324

  5. An ICU Preanesthesia Evaluation Form Reduces Missing Preoperative Key Information.

    PubMed

    Chuy, Katherine; Yan, Zhe; Fleisher, Lee; Liu, Renyu

    2012-09-28

    A comprehensive preoperative evaluation is critical for providing anesthetic care for patients from the intensive care unit (ICU). There has been no preoperative evaluation form specific for ICU patients that allows for a rapid and focused evaluation by anesthesia providers, including junior residents. In this study, a specific preoperative form was designed for ICU patients and evaluated to allow residents to perform the most relevant and important preoperative evaluations efficiently. The following steps were utilized for developing the preoperative evaluation form: 1) designed a new preoperative form specific for ICU patients; 2) had the form reviewed by attending physicians and residents, followed by multiple revisions; 3) conducted test releases and revisions; 4) released the final version and conducted a survey; 5) compared data collection from new ICU form with that from a previously used generic form. Each piece of information on the forms was assigned a score, and the score for the total missing information was determined. The score for each form was presented as mean ± standard deviation (SD), and compared by unpaired t test. A P value < 0.05 was considered statistically significant. Of 52 anesthesiologists (19 attending physicians, 33 residents) responding to the survey, 90% preferred the final new form; and 56% thought the new form would reduce perioperative risk for ICU patients. Forty percent were unsure whether the form would reduce perioperative risk. Over a three month period, we randomly collected 32 generic forms and 25 new forms. The average score for missing data was 23 ± 10 for the generic form and 8 ± 4 for the new form (P = 2.58E-11). A preoperative evaluation form designed specifically for ICU patients is well accepted by anesthesia providers and helped to reduce missing key preoperative information. Such an approach is important for perioperative patient safety.

  6. Academic Primer Series: Five Key Papers for Consulting Clinician Educators.

    PubMed

    Chan, Teresa M; Gottlieb, Michael; Quinn, Antonia; London, Kory; Conlon, Lauren W; Ankel, Felix

    2017-02-01

    Clinician educators are often asked to perform consultations for colleagues. Invitations to consult and advise others on local problems can help foster great collaborations between centers, and allows for an exchange of ideas between programs. In this article, the authors identify and summarize several key papers to assist emerging clinician educators with the consultation process. A consensus-building process was used to generate a list of key papers that describe the importance and significance of educational consulting, informed by social media sources. A three-round voting methodology, akin to a Delphi study, determined the most impactful papers from the larger list. Summaries of the five most highly rated papers on education consultation are presented in this paper. These papers were determined by a mixed group of junior and senior faculty members, who have summarized these papers with respect to their relevance for their peer groups. Five key papers on the educational consultation process are presented in this paper. These papers offer background and perspective to help junior faculty gain a grasp of consultation processes.

  7. Information management and information technologies: keys to professional and business success.

    PubMed

    Otten, K W

    1984-01-01

    Personal computers, spreadsheets, decision support software, electronic mail and video disks are just a few of the innovations of information technology which attract the attention of information professionals and managers alike: they are all concerned with the rapidly changing face of information technology and how to cope with a changing competitive environment, personally, and for the benefit of their companies. This paper is the first in a monthly series which tries to illuminate some of the factors and changes which shape our future as professionals and managers. In so doing, it guides and motivates the reader to become "information literate," a prerequisite for personal advancement in an information-based economy. This first paper outlines the relationship between technological innovations, use of information tools and information management and what to consider in order to benefit from the information revolution. It explains the risks of becoming professionally obsolete and alerts the reader to get personally involved to remain or become "information and computer literate."

  8. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  9. Illuminating the Background: Topics in Cosmic Microwave Background Polarization Research

    NASA Astrophysics Data System (ADS)

    Miller, Nathan J.

    The cosmic microwave background provides a wealth of information about the origin and history of the universe. The statistics of the anisotropy and the polarization of the cosmic microwave background, among other things, can tell us about the distribution of matter, the redshift of reionization, and the nature of the primordial uctuations. From the lensing of cosmic microwave background due to intervening matter, we can extract information about neutrinos and the equation of state of dark energy. A measurement of the large angular scale B-mode polarization has been called the "smoking gun" of in ation, a theory that describes a possible early rapid expansion of the universe. The focus of current experiments is to measure this B-mode polarization, while several experiments, such as POLARBEAR, are also looking to measure the lensing of the cosmic microwave background. This dissertation will discuss several different topics in cosmic microwave background polarization research. I will make predictions for future experiments and I will also show analysis for two current experiments, POLARBEAR and BICEP. I will show how beam systematics affect the measurement of cosmological parameters and how well we must limit these systematics in order to get unbiased constraints on cosmological parameters for future experiments. I will discuss a novel way of using the temperature-polarization cross correlation to constrain the amount of inflationary gravitational waves. Through Markov Chain Monte Carlo methods, I will determine how well future experiments will be able to constrain the neutrino masses and their degeneracy parameters. I will show results from current data analysis and calibration being done on the Cedar Flat deployment for the POLARBEAR experiment which is currently being constructed in the Atacama desert in Chile. Finally, I will analyze the claim of detection of cosmological birefringence in the BICEP data and show that there is reason to believe it is due to

  10. 10 CFR 95.18 - Key personnel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INFORMATION AND RESTRICTED DATA Physical Security § 95.18 Key personnel. The senior management official and... Clearance. Other key management officials, as determined by the CSA, must be granted an access authorization... organization's policies or practices in the performance of activities involving classified information. This...

  11. [Organization, functioning and expectations of organizations representing patients. Survey of key informants].

    PubMed

    García-Sempere, Aníbal; Artells, Juan José

    2005-01-01

    To explore patient organizations and their scope in terms of patient and user participation in decisions affecting their health. Semi-structured questionnaire survey of key informants from 21 patient organizations. Most of the patient organizations were regional or national private organizations. Their main objectives include improving quality of life and representing the interests of patients and their families, developing information triage and dissemination activities, and providing additional services not offered by the public health service. The main methods of communicating with members were electronic mail, open meetings and forums. Most patient organizations considered health professionals to be the most important group of stakeholders. The sources of funding most frequently quoted were membership fees, public grants and contributions from the pharmaceutical industry. The most important factor for enhancing patient co-responsibility was considered to be involving patients in health care as a way to improve the quality of the heath services. The proposed future scenario that received the most support was the creation of a legal forum in which the patient's voice could be heard and demonstrably taken into account. Patient organizations can play an important role in providing patients and health professionals with information, promoting self care and improving the effectiveness of health care. These features require visible commitment by the health authorities to facilitate opportunities for patient decisions and choice within the system.

  12. Developing Written Information for Cancer Survivors from Culturally and Linguistically Diverse Backgrounds: Lessons Learnt.

    PubMed

    Wiley, Georgina; Piper, Amanda; Phyllis Butow, A M; Schofield, Penny; Douglas, Fiona; Roy, Jane; Nolte, Linda; Jefford, Michael

    2018-01-01

    Australia is a multicultural nation with a large migrant population. Migrants with cancer report inferior quality of life and the need for more information in their own language. This paper describes lessons learnt from developing culturally appropriate written information resources with and for Arabic, Italian, and Vietnamese cancer survivors and carers. The information needs of survivors from these language groups as well as guidelines for the development of written resources for culturally diverse populations were identified through literature review. Community consultation was undertaken with focus groups. The content was developed and tested with health professionals who spoke the appropriate language and focus group participants, ensuring relevance and appropriateness. Resource design and dissemination were informed through community consultation. A number of key tasks for developing resources were identified as follows: (1) community engagement and consultation; (2) culturally sensitive data collection; (3) focus group facilitators (recruitment and training); (4) content development; (5) translation and review process; (6) design; and (7) sustainability. This project reinforced literature review findings on the importance of cultural sensitivity in the development of resources. Engaging with community groups and incorporating culturally appropriate recruitment strategies optimises recruitment to focus groups and facilitates content development. Stakeholders and lay persons from the intended ethnic-minority communities should be involved in the development and formative evaluation of resources to ensure appropriateness and relevance and in the dissemination strategy to optimize penetration. We believe the lessons we have learnt will be relevant to any group intending to develop health information for culturally and linguistic diverse groups.

  13. Developing Written Information for Cancer Survivors from Culturally and Linguistically Diverse Backgrounds: Lessons Learnt

    PubMed Central

    Wiley, Georgina; Piper, Amanda; Phyllis Butow, AM; Schofield, Penny; Douglas, Fiona; Roy, Jane; Nolte, Linda; Jefford, Michael

    2018-01-01

    Australia is a multicultural nation with a large migrant population. Migrants with cancer report inferior quality of life and the need for more information in their own language. This paper describes lessons learnt from developing culturally appropriate written information resources with and for Arabic, Italian, and Vietnamese cancer survivors and carers. The information needs of survivors from these language groups as well as guidelines for the development of written resources for culturally diverse populations were identified through literature review. Community consultation was undertaken with focus groups. The content was developed and tested with health professionals who spoke the appropriate language and focus group participants, ensuring relevance and appropriateness. Resource design and dissemination were informed through community consultation. A number of key tasks for developing resources were identified as follows: (1) community engagement and consultation; (2) culturally sensitive data collection; (3) focus group facilitators (recruitment and training); (4) content development; (5) translation and review process; (6) design; and (7) sustainability. This project reinforced literature review findings on the importance of cultural sensitivity in the development of resources. Engaging with community groups and incorporating culturally appropriate recruitment strategies optimises recruitment to focus groups and facilitates content development. Stakeholders and lay persons from the intended ethnic-minority communities should be involved in the development and formative evaluation of resources to ensure appropriateness and relevance and in the dissemination strategy to optimize penetration. We believe the lessons we have learnt will be relevant to any group intending to develop health information for culturally and linguistic diverse groups. PMID:29379844

  14. Automatic background updating for video-based vehicle detection

    NASA Astrophysics Data System (ADS)

    Hu, Chunhai; Li, Dongmei; Liu, Jichuan

    2008-03-01

    Video-based vehicle detection is one of the most valuable techniques for the Intelligent Transportation System (ITS). The widely used video-based vehicle detection technique is the background subtraction method. The key problem of this method is how to subtract and update the background effectively. In this paper an efficient background updating scheme based on Zone-Distribution for vehicle detection is proposed to resolve the problems caused by sudden camera perturbation, sudden or gradual illumination change and the sleeping person problem. The proposed scheme is robust and fast enough to satisfy the real-time constraints of vehicle detection.

  15. Lessons from the Canadian national health information technology plan for the United States: opinions of key Canadian experts.

    PubMed

    Zimlichman, Eyal; Rozenblum, Ronen; Salzberg, Claudia A; Jang, Yeona; Tamblyn, Melissa; Tamblyn, Robyn; Bates, David W

    2012-01-01

    To summarize the Canadian health information technology (HIT) policy experience and impart lessons learned to the US as it determines its policy in this area. Qualitative analysis of interviews with identified key stakeholders followed by an electronic survey. We conducted semi-structured interviews with 29 key Canadian HIT policy and opinion leaders and used a grounded theory approach to analyze the results. The informant sample was chosen to provide views from different stakeholder groups including national representatives and regional representatives from three Canadian provinces. Canadian informants believed that much of the current US direction is positive, especially regarding incentives and meaningful use, but that there are key opportunities for the US to emphasize direct engagement with providers, define a clear business case for them, sponsor large scale evaluations to assess HIT impact in a broad array of settings, determine standards but also enable access to resources needed for mid-course corrections of standards when issues are identified, and, finally, leverage implementation of digital imaging systems. Not all stakeholder groups were included, such as providers or patients. In addition, as in all qualitative research, a selection bias could be present due to the relatively small sample size. Based on Canadian experience with HIT policy, stakeholders identified as lessons for the US the need to increase direct engagement with providers and the importance of defining the business case for HIT, which can be achieved through large scale evaluations, and of recognizing and leveraging successes as they emerge.

  16. The NASA John C. Stennis Environmental Geographic Information System

    NASA Technical Reports Server (NTRS)

    Cohan, Tyrus

    2002-01-01

    Contents include the following: 1. Introduction: Background information. Initial applications of the SSC EGIS. Ongoing projects. 2.Scope of SSC EGIS. 3. Data layers. 4. Onsite operations. 5. Landcover classifications. 6. Current activities. 7. GIS/Key. 8. Infrastructure base map - development. 9. Infrastructure base map - application. 10. Incorrected layer. 11. Corrected layer. 12. Emergency environmental response tool. 13. Future directions. 14. Bridging the gaps. 15. Environmental geographical information system.

  17. Do We Speak the Same Language? A Study of Faculty Perceptions of Information Literacy

    ERIC Educational Resources Information Center

    Cope, Jonathan; Sanabria, Jesús E.

    2014-01-01

    The authors analyze twenty in-depth interviews with faculty members about how they perceive information literacy (IL) to examine two key factors: how disciplinary background influences conceptions of IL among faculty members in academic departments and how the instructors' perception of information literacy differs from that of professionals in…

  18. Introduction of the identification, situation, background, assessment, recommendations tool to improve the quality of information transfer during medical handover in intensive care.

    PubMed

    Ramasubbu, Benjamin; Stewart, Emma; Spiritoso, Rosalba

    2017-02-01

    To audit the quality and safety of the current doctor-to-doctor handover of patient information in our Cardiothoracic Intensive Care Unit. If deficient, to implement a validated handover tool to improve the quality of the handover process. In Cycle 1 we observed the verbal handover and reviewed the written handover information transferred for 50 consecutive patients in St George's Hospital Cardiothoracic Intensive Care Unit. For each patient's handover, we assessed whether each section of the Identification, Situation, Background, Assessment, Recommendations tool was used on a scale of 0-2. Zero if no information in that category was transferred, one if the information was partially transferred and two if all relevant information was transferred. Each patient's handover received a score from 0 to 10 and thus, each cycle a total score of 0-500. Following the implementation of the Identification, Situation, Background, Assessment, Recommendations handover tool in our Intensive Care Unit in Cycle 2, we re-observed the handover process for another 50 consecutive patients hence, completing the audit cycle. There was a significant difference between the total scores from Cycle 1 and 2 (263/500 versus 457/500, p < 0.001). The median handover score for Cycle 1 was 5/10 (interquartile range 4-6). The median handover score for Cycle 2 was 9/10 (interquartile range 9-10). Patient handover scores increased significantly between Cycle 1 and 2, U = 13.5, p < 0.001. The introduction of a standardised handover template (Identification, Situation, Background, Assessment, Recommendations tool) has improved the quality and safety of the doctor-to-doctor handover of patient information in our Intensive Care Unit.

  19. Neighborhood Information Service Centers. Public Library "Information and Referral" Provides Significant New Personal Service to the Individual Library User. A Background Paper for the White House Conference on Library and Information Services.

    ERIC Educational Resources Information Center

    Layne, Elizabeth N.

    This booklet, one of a series of background papers for the White House Conference, presents information and referral services as one of the ways libraries are developing programs to discharge their responsibilities to the public they serve. It details the determination of a woman librarian in Detroit to develop the first comprehensive I&R…

  20. Health inequalities among workers with a foreign background in Sweden: do working conditions matter?

    PubMed

    Dunlavy, Andrea C; Rostila, Mikael

    2013-07-10

    Employment and working conditions are key social determinants of health, yet current information is lacking regarding relationships between foreign background status, working conditions and health among workers in Sweden. This study utilized cross-sectional data from the 2010 Swedish Level of Living Survey (LNU) and the Level of Living Survey for Foreign Born Persons and their Children (LNU-UFB) to assess whether or not health inequalities exist between native Swedish and foreign background workers and if exposure to adverse psychosocial and physical working conditions contributes to the risk for poor health among foreign background workers. A sub-sample of 4,021 employed individuals aged 18-65 was analyzed using logistic regression. Eastern European, Latin American and Other Non-Western workers had an increased risk of both poor self-rated health and mental distress compared to native Swedish workers. Exposure to adverse working conditions only minimally influenced the risk of poor health. Further research should examine workers who are less integrated or who have less secure labor market attachments and also investigate how additional working conditions may influence associations between health and foreign background status.

  1. Health Inequalities among Workers with a Foreign Background in Sweden: Do Working Conditions Matter?

    PubMed Central

    Dunlavy, Andrea C.; Rostila, Mikael

    2013-01-01

    Employment and working conditions are key social determinants of health, yet current information is lacking regarding relationships between foreign background status, working conditions and health among workers in Sweden. This study utilized cross-sectional data from the 2010 Swedish Level of Living Survey (LNU) and the Level of Living Survey for Foreign Born Persons and their Children (LNU-UFB) to assess whether or not health inequalities exist between native Swedish and foreign background workers and if exposure to adverse psychosocial and physical working conditions contributes to the risk for poor health among foreign background workers. A sub-sample of 4,021 employed individuals aged 18–65 was analyzed using logistic regression. Eastern European, Latin American and Other Non-Western workers had an increased risk of both poor self-rated health and mental distress compared to native Swedish workers. Exposure to adverse working conditions only minimally influenced the risk of poor health. Further research should examine workers who are less integrated or who have less secure labor market attachments and also investigate how additional working conditions may influence associations between health and foreign background status. PMID:23846669

  2. Key Informant Perspectives on Federal Research Agency Policy and Systems and Scientific Workforce Diversity Development: A Companion Study

    ERIC Educational Resources Information Center

    Moore, Corey L.; Wang, Ningning; Davis, Dytisha; Aref, Fariborz; Manyibe, Edward O.; Washington, Andre L.; Johnson, Jean; Eugene-Cross, Kenyotta; Muhammad, Atashia; Jennings-Jones, Desiree

    2017-01-01

    Purpose: In the previous analysis of key informant perspectives on minority research leaders' career development factors, we identified individual and sociocultural, institutional, and federal research agency (i.e., National Institute on Disability, Independent Living, and Rehabilitation Research; National Institutes of Health; Agency for…

  3. The development of selected data base applications for the crustal dynamics data information system

    NASA Technical Reports Server (NTRS)

    Noll, C. E.

    1981-01-01

    The development of a data base and its accompanying software for the data information system of crustal dynamics project is described. Background information concerning this project, and a definition of the techniques used in the implementation of an operational data base, are presented. Examples of key applications are included and interpreted.

  4. Combining the Best of Two Worlds: A Conceptual Proposal for Evidence-Informed School Improvement

    ERIC Educational Resources Information Center

    Brown, Chris; Schildkamp, Kim; Hubers, Mireille D.

    2017-01-01

    Background: Data-based decision-making (DBDM) and research-informed teaching practice (RITP) are key to teacher and school improvement. Currently, however, DBDM and RITP represent two distinct approaches to developing evidence-informed practice (EIP) and do not correspond to the all-encompassing notion of EIP envisaged by many academics and…

  5. A Study on Mutil-Scale Background Error Covariances in 3D-Var Data Assimilation

    NASA Astrophysics Data System (ADS)

    Zhang, Xubin; Tan, Zhe-Min

    2017-04-01

    The construction of background error covariances is a key component of three-dimensional variational data assimilation. There are different scale background errors and interactions among them in the numerical weather Prediction. However, the influence of these errors and their interactions cannot be represented in the background error covariances statistics when estimated by the leading methods. So, it is necessary to construct background error covariances influenced by multi-scale interactions among errors. With the NMC method, this article firstly estimates the background error covariances at given model-resolution scales. And then the information of errors whose scales are larger and smaller than the given ones is introduced respectively, using different nesting techniques, to estimate the corresponding covariances. The comparisons of three background error covariances statistics influenced by information of errors at different scales reveal that, the background error variances enhance particularly at large scales and higher levels when introducing the information of larger-scale errors by the lateral boundary condition provided by a lower-resolution model. On the other hand, the variances reduce at medium scales at the higher levels, while those show slight improvement at lower levels in the nested domain, especially at medium and small scales, when introducing the information of smaller-scale errors by nesting a higher-resolution model. In addition, the introduction of information of larger- (smaller-) scale errors leads to larger (smaller) horizontal and vertical correlation scales of background errors. Considering the multivariate correlations, the Ekman coupling increases (decreases) with the information of larger- (smaller-) scale errors included, whereas the geostrophic coupling in free atmosphere weakens in both situations. The three covariances obtained in above work are used in a data assimilation and model forecast system respectively, and then the

  6. Foregrounding the Background.

    ERIC Educational Resources Information Center

    Robbins, Bruce

    1998-01-01

    Argues that when introductory activities to the classics begin with background information, it can upstage or confine the life of the story, and shows little faith in the students as readers or in the literature itself. Suggests sometimes letting the literature begin, and then helping students make sense of it. Discusses examples from "To Kill a…

  7. The Efficacy of Key Performance Indicators in Ontario Universities as Perceived by Key Informants

    ERIC Educational Resources Information Center

    Chan, Vivian

    2015-01-01

    The Ontario Ministry of Education and Training's Task Force on University Accountability first proposed key performance indicators (KPIs) for colleges and universities in Ontario in the early 1990s. The three main KPIs for Ontario universities are the rates of (1) graduation, (2) employment, and (3) Ontario Student Assistance Program loan default.…

  8. Performance of device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Zhu; Zhao, Qi; Ma, Xiongfeng

    2016-07-01

    Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .

  9. 76 FR 79565 - Management Contracts-Background Investigations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-22

    ... Management Contracts--Background Investigations AGENCY: National Indian Gaming Commission. ACTION: Notice of... investigation process required for management contracts. The proposed revision may reduce duplication of efforts... to clarify that a management contractor should be required to submit background information when the...

  10. X-Ray Background Survey Spectrometer (XBSS)

    NASA Technical Reports Server (NTRS)

    Sanders, W. T. (Principal Investigator); Paulos, R. J.

    1996-01-01

    The objective of this investigation was to perform a spectral survey of the low energy diffuse X-ray background using the X-ray Background Survey Spectrometer (XBSS) on board the Space Station Freedom (SSF). XBSS obtains spectra of the X-ray diffuse background in the 11-24 A and 44-84 A wavelength intervals over the entire sky with 15 deg spatial resolution. These X-rays are almost certainly from a very hot (10(exp 6) K) component of the interstellar medium that is contained in regions occupying a large fraction of the interstellar volume near the Sun. Astrophysical plasmas near 10(exp 6) K are rich in emission lines, and the relative strengths of these lines, besides providing information about the physical conditions of the emitting gas, also provide information about its history and heating mechanisms.

  11. FOCUS AREA 4 BACKGROUND PAPER: AQUATIC ECOTOXICITY ASSESSMENT

    EPA Science Inventory

    In parallel with a growing literature on the presence of Active Pharmaceutical Ingredients (APIs) in effluents and surface waters, recent years have witnessed a steady increase in published studies on the ecotoxicity of APIs to aquatic organisms. Against this background, key issu...

  12. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.

    PubMed

    Zhang, Liping; Zhu, Shaohui

    2015-05-01

    To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.

  13. 14 CFR 1203.200 - Background and discussion.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 1203.200 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.200 Background and discussion. (a) In establishing a... public inspection of that information that is classified to protect the national security. (b) In...

  14. 14 CFR 1203.200 - Background and discussion.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 1203.200 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.200 Background and discussion. (a) In establishing a... public inspection of that information that is classified to protect the national security. (b) In...

  15. Facing the Maze: Young Cancer Survivors' Return to Education and Work-A Professional Expert Key Informant Study.

    PubMed

    Pedersen, Kaspar Jessen; Boisen, Kirsten Arntz; Midtgaard, Julie; Elsbernd, Abbey; Larsen, Hanne Baekgaard

    2018-03-13

    An insufficient transition to normal life after cancer treatment in adolescent and young adults (AYAs) may lead to decreased occupational and educational opportunities throughout a survivor's lifespan. Key informant interviews were used to access unique knowledge of the healthcare, educational, and social systems. We used key informant interviews with professionals representing disciplines from healthcare, educational, and social systems (n = 15). Informants were recruited through purposive sampling and snowball sampling. Interviews were analyzed thematically using Malterud's Systematic Text Condensation and verified by member checking. We found four major themes: the impact of late effects, navigating the system, social reintegration, and the drive of youth. Although legal frameworks are often in place to assist AYA cancer survivors, navigating the public, educational, and social systems is a complex task and many AYAs do not have the required skill set or energy. Furthermore, AYA survivors often feel different from their peers and misunderstood by their surroundings, which may hinder reintegration into normal social life. In Scandinavia, healthcare and education are free of charge with equal access for all, primarily funded by government taxes. Therefore, insurance status and tuition fees should not constitute barriers for returning to education and work. However, this study finds that the public and educational systems are complex to navigate, and that AYAs face trouble mobilizing the energy to receive needed support.

  16. A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems.

    PubMed

    Xu, Xin; Zhu, Ping; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua; He, Lian

    2014-01-01

    In the field of the Telecare Medicine Information System, recent researches have focused on consummating more convenient and secure healthcare delivery services for patients. In order to protect the sensitive information, various attempts such as access control have been proposed to safeguard patients' privacy in this system. However, these schemes suffered from some certain security defects and had costly consumption, which were not suitable for the telecare medicine information system. In this paper, based on the elliptic curve cryptography, we propose a secure and efficient two-factor mutual authentication and key agreement scheme to reduce the computational cost. Such a scheme enables to provide the patient anonymity by employing the dynamic identity. Compared with other related protocols, the security analysis and performance evaluation show that our scheme overcomes some well-known attacks and has a better performance in the telecare medicine information system.

  17. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  18. Key influences in the design and implementation of mental health information systems in Ghana and South Africa.

    PubMed

    Ahuja, S; Mirzoev, T; Lund, C; Ofori-Atta, A; Skeen, S; Kufuor, A

    2016-01-01

    Strengthening of mental health information systems (MHIS) is essential to monitor and evaluate mental health services in low and middle-income countries. While research exists assessing wider health management information systems, there is limited published evidence exploring the design and implementation of MHIS in these settings. This paper aims to identify and assess the key factors affecting the design and implementation of MHIS, as perceived by the key stakeholders in Ghana and South Africa. We report findings from the Mental Health and Poverty Project, a 5-year research programme implemented within four African countries. The MHIS strengthening in South Africa and Ghana included two related components: intervention and research. The intervention component aimed to strengthen MHIS in the two countries, and the research component aimed to document interventions in each country, including the key influences. Data were collected using semi structured interviews with key stakeholders and reviews of key documents and secondary data from the improved MHIS. We analyzed the qualitative data using a framework approach. Key components of the MHIS intervention involved the introduction of a redesigned patient registration form, entry into computers for analysis every 2 months by clinical managerial staff, and utilization of data in hospital management meetings in three psychiatric hospitals in Ghana; and the introduction of a new set of mental health indicators and related forms and tally sheets at primary care clinics and district hospitals in five districts in the KwaZulu-Natal and Northern Cape provinces in South Africa. Overall, the key stakeholders perceived the MHIS strengthening as an effective intervention in both countries with an enhanced set of indicators in South Africa and introduction of a computerized system in Ghana. Influences on the design and implementation of MHIS interventions in Ghana and South Africa relate to resources, working approaches

  19. Environmental Influences on Physical Activity among Rural Adults in Montana, United States: Views from Built Environment Audits, Resident Focus Groups, and Key Informant Interviews.

    PubMed

    Lo, Brian K; Morgan, Emily H; Folta, Sara C; Graham, Meredith L; Paul, Lynn C; Nelson, Miriam E; Jew, Nicolette V; Moffat, Laurel F; Seguin, Rebecca A

    2017-10-04

    Rural populations in the United States have lower physical activity levels and are at a higher risk of being overweight and suffering from obesity than their urban counterparts. This paper aimed to understand the environmental factors that influence physical activity among rural adults in Montana. Eight built environment audits, 15 resident focus groups, and 24 key informant interviews were conducted between August and December 2014. Themes were triangulated and summarized into five categories of environmental factors: built, social, organizational, policy, and natural environments. Although the existence of active living features was documented by environmental audits, residents and key informants agreed that additional indoor recreation facilities and more well-maintained and conveniently located options were needed. Residents and key informants also agreed on the importance of age-specific, well-promoted, and structured physical activity programs, offered in socially supportive environments, as facilitators to physical activity. Key informants, however, noted that funding constraints and limited political will were barriers to developing these opportunities. Since building new recreational facilities and structures to support active transportation pose resource challenges, especially for rural communities, our results suggest that enhancing existing features, making small improvements, and involving stakeholders in the city planning process would be more fruitful to build momentum towards larger changes.

  20. Possibilities and Expectations for mHealth in the Pacific Islands: Insights From Key Informants.

    PubMed

    Umali, Elaine; McCool, Judith; Whittaker, Robyn

    2016-01-20

    The increase in mobile phone use across the globe is creating mounting interest for its application in addressing health system constraints. Although still limited, there is growing evidence of success in using mobile phones for health (mHealth) in low- and middle- income countries. The promise of mHealth to address key health system issues presents a huge potential for the Pacific Island countries where mobile use has radically increased. Current projections indicate an improved information and communications technology (ICT) environment to support greater access to mobile and digital devices in the Pacific region. The objective of the study was to explore key stakeholder perspectives on the potential for mHealth in the Pacific region. A series of in-depth interviews were conducted either face-to-face, via Skype or by email, with a series of key informants from the Pacific Rim region. Interviews were audio-recorded and later transcribed for detailed thematic analysis. We found widespread support for the potential to use mobile phones as a mechanism to facilitate improved health service delivery in the region. Essential elements for the successful development and implementation of mHealth were identified by these stakeholders. These included: developing an understanding of the local context and the problems that may be usefully addressed by the addition of mHealth to existing strategies and services; consideration of local infrastructure, capability, policy, mobile literacy and engagement; learning from others, particularly other low- and middle-income countries (LMICs); the importance of building supportive environments and of evaluation to provide evidence of impact and total cost. The rapid growth of mobile phone use in the region presents a unique juxtaposition of opportunity and promise. Though the region lags behind other LMICs in the adoption of mHealth technologies, this offers the convenience of learning from past mHealth interventions and applying these

  1. China: Background Notes Series.

    ERIC Educational Resources Information Center

    Reams, Joanne Reppert

    Concise background information on the People's Republic of China is provided. The publication begins with a profile of the country, outlining the people, geography, economy, and membership in international organizations. The bulk of the document then discusses in more detail China's people, geography, history, government, education, economy, and…

  2. Background recovery via motion-based robust principal component analysis with matrix factorization

    NASA Astrophysics Data System (ADS)

    Pan, Peng; Wang, Yongli; Zhou, Mingyuan; Sun, Zhipeng; He, Guoping

    2018-03-01

    Background recovery is a key technique in video analysis, but it still suffers from many challenges, such as camouflage, lighting changes, and diverse types of image noise. Robust principal component analysis (RPCA), which aims to recover a low-rank matrix and a sparse matrix, is a general framework for background recovery. The nuclear norm is widely used as a convex surrogate for the rank function in RPCA, which requires computing the singular value decomposition (SVD), a task that is increasingly costly as matrix sizes and ranks increase. However, matrix factorization greatly reduces the dimension of the matrix for which the SVD must be computed. Motion information has been shown to improve low-rank matrix recovery in RPCA, but this method still finds it difficult to handle original video data sets because of its batch-mode formulation and implementation. Hence, in this paper, we propose a motion-assisted RPCA model with matrix factorization (FM-RPCA) for background recovery. Moreover, an efficient linear alternating direction method of multipliers with a matrix factorization (FL-ADM) algorithm is designed for solving the proposed FM-RPCA model. Experimental results illustrate that the method provides stable results and is more efficient than the current state-of-the-art algorithms.

  3. Feasibility of satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bonato, C.; Tomaello, A.; Da Deppo, V.; Naletto, G.; Villoresi, P.

    2009-04-01

    In this paper, we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected error-rate due to imperfect polarization compensation in the channel. Finally, we calculate the expected key generation rate of a secure key for different configurations (uplink, downlink) and for different protocols (BB84 with and without decoy states, entanglement-based Ekert91 protocol).

  4. Part II--Factors associated with school nurse ratios: key state informants' perceptions.

    PubMed

    Maughan, Erin

    2009-08-01

    This paper is the second of a two-part series examining factors influencing school nurse to pupil staffing ratios. The paper reports data from a qualitative study exploring the social and political factors that potentially influence ratios. Interviews were conducted with 30 key state informants from these states. Content analysis of the data identified common themes. Positive factors reported to influence ratios included: the approach taken to effect change, value placed upon school nurses, local support (from both educators and parents) and community buy-in, fear of litigation, and dynamic leadership. Barriers to improving ratios included: lack of funding and misunderstanding of the role of the school nurse. Philosophical beliefs and state geography were "swing" factors that influenced staffing positively or negatively. This study adds to our knowledge of the factors influencing staffing and highlights important social and political factors that school nurses can target to improve nurse to pupil ratios.

  5. The Future of the National Technical Information Service: Issues and Options.

    ERIC Educational Resources Information Center

    McClure, Charles R.

    In recent years there has been considerable debate about the appropriate role, management structure, and activities for the National Technical Information Service (NTIS). This background paper identifies key issues that require attention by Congress and by NTIS itself to increase the effectiveness of NTIS in the collection and dissemination of…

  6. Scheme of Optical Image Encryption with Digital Information Input and Dynamic Encryption Key based on Two LC SLMs

    NASA Astrophysics Data System (ADS)

    Bondareva, A. P.; Cheremkhin, P. A.; Evtikhiev, N. N.; Krasnov, V. V.; Starikov, S. N.

    Scheme of optical image encryption with digital information input and dynamic encryption key based on two liquid crystal spatial light modulators and operating with spatially-incoherent monochromatic illumination is experimentally implemented. Results of experiments on images optical encryption and numerical decryption are presented. Satisfactory decryption error of 0.20÷0.27 is achieved.

  7. Child Care: State Requirements for Background Checks.

    ERIC Educational Resources Information Center

    Fagnoni, Cynthia

    Background checks involve gathering information from state and federal databases to determine if child care providers have a history of child abuse or other criminal convictions that would make them unacceptable for working with children. Background checks include state criminal history checks, state child abuse registry checks, and Federal Bureau…

  8. Key messages for communicating information about BRCA1 and BRCA2 to women with breast or ovarian cancer: Consensus across health professionals and service users.

    PubMed

    Jacobs, Chris; Pichert, Gabriella; Harris, Jackie; Tucker, Kathy; Michie, Susan

    2017-11-01

    Genetic testing of cancer predisposing genes will increasingly be needed in oncology clinics to target cancer treatment. This Delphi study aimed to identify areas of agreement and disagreement between genetics and oncology health professionals and service users about the key messages required by women with breast/ovarian cancer who undergo BRCA1/BRCA2 genetic testing and the optimal timing of communicating key messages. Participants were 16 expert health professionals specialising in oncology/genetics and 16 service users with breast/ovarian cancer and a pathogenic BRCA1/BRCA2 variant. Online questionnaires containing 53 inductively developed information messages were circulated to the groups separately. Participants rated each message as key/not key on a Likert scale and suggested additional messages. Questionnaires were modified according to the feedback and up to 3 rounds were circulated. Consensus was reached when there was ≥75% agreement. Thirty key messages were agreed by both groups with 7 of the key messages agreed by ≥95% of participants: dominant inheritance, the availability of predictive testing, the importance of pretest discussion, increased risk of breast and ovarian cancer, and the option of risk-reducing mastectomy and bilateral salpingo-oophorectomy. Both groups agreed that key messages should be communicated before genetic testing and once a pathogenic variant has been identified. There was a high level of agreement within and between the groups about the information requirements of women with breast/ovarian cancer about BRCA1/BRCA2. These key messages will be helpful in developing new approaches to the delivery of information as genetic testing becomes further integrated into mainstream oncology services. Copyright © 2017 John Wiley & Sons, Ltd.

  9. The Effect of Cancer Information Seeking on Perceptions of Cancer Risks, Fatalism, and Worry among a U.S. National Sample

    ERIC Educational Resources Information Center

    Amuta, Ann Oyare; Chen, Xuewei; Mkuu, Rahma

    2017-01-01

    Background: Information seeking is crucial in the health behavior context. Cancer information seeking may play a key role in individuals' perceptions and subsequent health behaviors. Purpose: The purpose of this study is to investigate the influence of cancer information seeking on perceptions of cancer worry, fatalism and risk. Methods: Data from…

  10. Understanding Barriers and Facilitators to Breast and Cervical Cancer Screening among Muslim Women in New York City: Perspectives from Key Informants.

    PubMed

    Islam, Nadia; Patel, Shilpa; Brooks-Griffin, Quanza; Kemp, Patrice; Raveis, Victoria; Riley, Lindsey; Gummi, Sindhura; Nur, Potrirankamanis Queano; Ravenell, Joseph; Cole, Helen; Kwon, Simona

    2017-01-01

    Muslims are one of the fastest growing religious groups in the US. However, little is known about their health disparities, and how their unique cultural, religious, and social beliefs and practices affect health behaviors and outcomes. Studies demonstrate Muslim women may have lower rates of breast and cervical cancer screening compared to the overall population. The purpose of this study was to: 1) conduct key-informant interviews with Muslim community leaders in New York City (NYC), to understand contextual factors that impact Muslim women's beliefs and practices regarding breast and cervical cancer screening; and 2) inform the development and implementation of a research study on breast and cervical cancer screening among Muslims. Twelve key-informant interviews were conducted. The sample included imams, female religious leaders, physicians, community-based organization leaders, and social service representatives. The interview guide assessed: 1) unique healthcare barriers faced by Muslim women; 2) cultural and social considerations in conducting research; 3) potential strategies for increasing screening in this population; and 4) content and venues for culturally tailored programming and messaging. Key informants noted structure and culture as barriers and religion as a facilitator to breast and cervical cancer screening. Themes regarding the development of targeted health campaigns to increase screening included the importance of educational and in-language materials and messaging, and engaging mosques and religious leaders for dissemination. Although Muslim women face a number of barriers to screening, religious beliefs and support structures can be leveraged to facilitate screening and enhance the dissemination and promotion of screening.

  11. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  12. 77 FR 10508 - Agency Information Collection Activities; Proposed Collection; Comment Request; Background Checks...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-22

    ... Activities; Proposed Collection; Comment Request; Background Checks for Contractor Employees (Renewal) AGENCY... the electronic docket, go to www.regulations.gov . Title: Background Checks for Contractor Employees... consolidated in 40 CFR part 9. Abstract: The EPA uses contractors to perform services throughout the nation...

  13. Multi-talker background and semantic priming effect

    PubMed Central

    Dekerle, Marie; Boulenger, Véronique; Hoen, Michel; Meunier, Fanny

    2014-01-01

    The reported studies have aimed to investigate whether informational masking in a multi-talker background relies on semantic interference between the background and target using an adapted semantic priming paradigm. In 3 experiments, participants were required to perform a lexical decision task on a target item embedded in backgrounds composed of 1–4 voices. These voices were Semantically Consistent (SC) voices (i.e., pronouncing words sharing semantic features with the target) or Semantically Inconsistent (SI) voices (i.e., pronouncing words semantically unrelated to each other and to the target). In the first experiment, backgrounds consisted of 1 or 2 SC voices. One and 2 SI voices were added in Experiments 2 and 3, respectively. The results showed a semantic priming effect only in the conditions where the number of SC voices was greater than the number of SI voices, suggesting that semantic priming depended on prime intelligibility and strategic processes. However, even if backgrounds were composed of 3 or 4 voices, reducing intelligibility, participants were able to recognize words from these backgrounds, although no semantic priming effect on the targets was observed. Overall this finding suggests that informational masking can occur at a semantic level if intelligibility is sufficient. Based on the Effortfulness Hypothesis, we also suggest that when there is an increased difficulty in extracting target signals (caused by a relatively high number of voices in the background), more cognitive resources were allocated to formal processes (i.e., acoustic and phonological), leading to a decrease in available resources for deeper semantic processing of background words, therefore preventing semantic priming from occurring. PMID:25400572

  14. Internal combustion engines for alcohol motor fuels: a compilation of background technical information

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blaser, Richard

    1980-11-01

    This compilation, a draft training manual containing technical background information on internal combustion engines and alcohol motor fuel technologies, is presented in 3 parts. The first is a compilation of facts from the state of the art on internal combustion engine fuels and their characteristics and requisites and provides an overview of fuel sources, fuels technology and future projections for availability and alternatives. Part two compiles facts about alcohol chemistry, alcohol identification, production, and use, examines ethanol as spirit and as fuel, and provides an overview of modern evaluation of alcohols as motor fuels and of the characteristics of alcoholmore » fuels. The final section compiles cross references on the handling and combustion of fuels for I.C. engines, presents basic evaluations of events leading to the use of alcohols as motor fuels, reviews current applications of alcohols as motor fuels, describes the formulation of alcohol fuels for engines and engine and fuel handling hardware modifications for using alcohol fuels, and introduces the multifuel engines concept. (LCL)« less

  15. The Cosmic Microwave Background Anisotropy

    NASA Astrophysics Data System (ADS)

    Bennett, C. L.

    1994-12-01

    The properties of the cosmic microwave background radiation provide unique constraints on the history and evolution of the universe. The first detection of anisotropy of the microwave radiation was reported by the COBE Team in 1992, based on the first year of flight data. The latest analyses of the first two years of COBE data are reviewed in this talk, including the amplitude of the microwave anisotropy as a function of angular scale and the statistical nature of the fluctuations. The two-year results are generally consistent with the earlier first year results, but the additional data allow for a better determination of the key cosmological parameters. In this talk the COBE results are compared with other observational anisotropy results and directions for future cosmic microwave anisotropy observations will be discussed. The National Aeronautics and Space Administration/Goddard Space Flight Center (NASA/GSFC) is responsible for the design, development, and operation of the Cosmic Background Explorer (COBE). Scientific guidance is provided by the COBE Science Working Group.

  16. Lewis Information Network (LINK): Background and overview

    NASA Technical Reports Server (NTRS)

    Schulte, Roger R.

    1987-01-01

    The NASA Lewis Research Center supports many research facilities with many isolated buildings, including wind tunnels, test cells, and research laboratories. These facilities are all located on a 350 acre campus adjacent to the Cleveland Hopkins Airport. The function of NASA-Lewis is to do basic and applied research in all areas of aeronautics, fluid mechanics, materials and structures, space propulsion, and energy systems. These functions require a great variety of remote high speed, high volume data communications for computing and interactive graphic capabilities. In addition, new requirements for local distribution of intercenter video teleconferencing and data communications via satellite have developed. To address these and future communications requirements for the next 15 yrs, a project team was organized to design and implement a new high speed communication system that would handle both data and video information in a common lab-wide Local Area Network. The project team selected cable television broadband coaxial cable technology as the communications medium and first installation of in-ground cable began in the summer of 1980. The Lewis Information Network (LINK) became operational in August 1982 and has become the backbone of all data communications and video.

  17. Photo interpretation key to Michigan land cover/use

    NASA Technical Reports Server (NTRS)

    Enslin, W. R.; Hudson, W. D.; Lusch, D. P.

    1983-01-01

    A set of photo interpretation keys is presented to provide a structured approach to the identification of land cover/use categories as specified in the Michigan Resource Inventory Act. The designated categories are urban and; built up lands; agricultural lands; forest land; nonforested land; water bodies; wetlands; and barren land. The keys were developed for use with medium scale (1:20,000 to 1:24,000) color infrared aerial photography. Although each key is generalized in that it relies only upon the most distinguishing photo characteristics in separating the various land cover/use categories, additional interpretation characteristics, distinguishing features and background material are given.

  18. A compact free space quantum key distribution system capable of daylight operation

    NASA Astrophysics Data System (ADS)

    Benton, David M.; Gorman, Phillip M.; Tapster, Paul R.; Taylor, David M.

    2010-06-01

    A free space quantum key distribution system has been demonstrated. Consideration has been given to factors such as field of view and spectral width, to cut down the deleterious effect from background light levels. Suitable optical sources such as lasers and RCLEDs have been investigated as well as optimal wavelength choices, always with a view to building a compact and robust system. The implementation of background reduction measures resulted in a system capable of operating in daylight conditions. An autonomous system was left running and generating shared key material continuously for over 7 days.

  19. KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer on Smartphones

    DTIC Science & Technology

    2011-05-01

    format data to exchange because contact information can be exported to V- Cards using existing APIs. For these reasons it was chosen as the medium to... Card format allows customization of this field. The service provider field serves to identify the app the key is for and the username field stores the...public key data. A sample V- Card field looks like Listing 1 below. IMPP;TextSecure

  20. Identifying Key Hospital Service Quality Factors in Online Health Communities

    PubMed Central

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain

    2015-01-01

    Background The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. Objective As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. Methods We defined social media–based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea’s two biggest online portals were used to test the effectiveness of detection of social media–based key quality factors for hospitals. Results To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is

  1. Portuguese Coaches' Perceptions of and Preferences for Knowledge Sources Related to their Professional Background.

    PubMed

    Mesquita, Isabel; Isidro, Sofia; Rosado, António

    2010-01-01

    The purpose of this study was to analyse Portuguese coaches' perceptions of, and preferences for, knowledge sources as related to professional background; namely academic education level, coach education level and coaching experience. The study's participants comprised 336 Portuguese coaches from twenty-two sports. A questionnaire was used to identify coaches' demographic characteristics and representations about their preferred sources of coaching knowledge. MANOVA using Tukey's HSD test was used to compare groups. The results highlighted that coaches perceived that coaching knowledge is built from a broad range of sources from personal coaching and playing experiences to more explicit formal, informal and non-formal learning situations. Results indicated that the coaches ascribed more importance to experiential sources such as working with experts, learning by doing, interacting with peer coaches and attending informal seminars and clinics, than to the formal learning situations provided by the national coaching certification programs. Differences, however, were found in that coaches who had a greater background within higher education (physical) and sport valued informal and non-formal learning sources more than did coaches who were defined as not coming from an academic background. The findings point to the importance of developing new learning, experientially-based, opportunities within the Portuguese context, where curricula content continues to be delivered via didactic means. Key pointsCoaches recognized that learning is obtained from a broad range of sources of coaching knowledge and each source has a particular role in the development of a coach.Experiential guided sources reached more importance to coaches as working with experts, learning by doing, attending seminars/clinics outside of the formal system and interaction with peers were the most acknowledged.The only source that is related to formal learning, national certification programs, was

  2. Portuguese Coaches’ Perceptions of and Preferences for Knowledge Sources Related to their Professional Background

    PubMed Central

    Mesquita, Isabel; Isidro, Sofia; Rosado, António

    2010-01-01

    The purpose of this study was to analyse Portuguese coaches’ perceptions of, and preferences for, knowledge sources as related to professional background; namely academic education level, coach education level and coaching experience. The study’s participants comprised 336 Portuguese coaches from twenty-two sports. A questionnaire was used to identify coaches’ demographic characteristics and representations about their preferred sources of coaching knowledge. MANOVA using Tukey’s HSD test was used to compare groups. The results highlighted that coaches perceived that coaching knowledge is built from a broad range of sources from personal coaching and playing experiences to more explicit formal, informal and non-formal learning situations. Results indicated that the coaches ascribed more importance to experiential sources such as working with experts, learning by doing, interacting with peer coaches and attending informal seminars and clinics, than to the formal learning situations provided by the national coaching certification programs. Differences, however, were found in that coaches who had a greater background within higher education (physical) and sport valued informal and non-formal learning sources more than did coaches who were defined as not coming from an academic background. The findings point to the importance of developing new learning, experientially-based, opportunities within the Portuguese context, where curricula content continues to be delivered via didactic means. Key points Coaches recognized that learning is obtained from a broad range of sources of coaching knowledge and each source has a particular role in the development of a coach. Experiential guided sources reached more importance to coaches as working with experts, learning by doing, attending seminars/clinics outside of the formal system and interaction with peers were the most acknowledged. The only source that is related to formal learning, national certification programs

  3. 14 CFR 91.1051 - Pilot safety background check.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 2 2011-01-01 2011-01-01 false Pilot safety background check. 91.1051... Operations Program Management § 91.1051 Pilot safety background check. Within 90 days of an individual beginning service as a pilot, the program manager must request the following information: (a) FAA records...

  4. SLAR image interpretation keys for geographic analysis

    NASA Technical Reports Server (NTRS)

    Coiner, J. C.

    1972-01-01

    A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.

  5. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis

    PubMed Central

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    Background This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Methodology/Principal Findings Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006–2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006–2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including “natural products and polymers” with nine key technical points, “fermentation industry” with twelve ones, “electrical medical equipment” with four ones, and “diagnosis, surgery” with four ones. Conclusions/Significance The results of this study could provide guidance on the development

  6. Accessibility and Integrity of Networked Information Collections. Background Paper.

    ERIC Educational Resources Information Center

    Lynch, Clifford A.

    This paper considers questions related to the integrity and accessibility of new electronic information resources. It begins with a review of recent developments in networked information resources and the tools to identify, navigate, and use such resources. An overview is then given of the issues involved in access and integrity questions. Links…

  7. 32 CFR 701.40 - Background.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... OFFICIAL RECORDS AVAILABILITY OF DEPARTMENT OF THE NAVY RECORDS AND PUBLICATION OF DEPARTMENT OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC FOIA Fees § 701.40 Background. (a) The DON follows the uniform fee schedule... Freedom of Information Act Fee Schedule and Guidelines. (b) Fees reflect direct costs for search; review...

  8. Planning Lessons for Refugee-Background Students: Challenges and Strategies

    ERIC Educational Resources Information Center

    Miller, Jennifer; Windle, Joel Austin; Yazdanpanah, Lilly K.

    2014-01-01

    This article examines the ways teachers plan lessons for English as an Additional Language (EAL) students from refugee backgrounds in secondary school transition programs. Based on a study of teachers working with students in three Victorian schools, we identify the key challenges teachers face in planning and the strategies they adopt to confront…

  9. Key Facts about Higher Education in Washington: 2009-10

    ERIC Educational Resources Information Center

    Washington Higher Education Coordinating Board, 2010

    2010-01-01

    First published in 2002, "Key Facts about Higher Education in Washington" provides valuable information on the ways higher education serves the state and its people. The most current data and information available is presented throughout this report to highlight the "Key Facts" about Washington's postsecondary institutions,…

  10. A mental health needs assessment of children and adolescents in post-conflict Liberia: results from a quantitative key-informant survey

    PubMed Central

    Borba, Christina P.C.; Ng, Lauren C.; Stevenson, Anne; Vesga-Lopez, Oriana; Harris, Benjamin L.; Parnarouskis, Lindsey; Gray, Deborah A.; Carney, Julia R.; Domínguez, Silvia; Wang, Edward K.S.; Boxill, Ryan; Song, Suzan J.; Henderson, David C.

    2016-01-01

    Between 1989 and 2004, Liberia experienced a devastating civil war that resulted in widespread trauma with almost no mental health infrastructure to help citizens cope. In 2009, the Liberian Ministry of Health and Social Welfare collaborated with researchers from Massachusetts General Hospital to conduct a rapid needs assessment survey in Liberia with local key informants (n = 171) to examine the impact of war and post-war events on emotional and behavioral problems of, functional limitations of, and appropriate treatment settings for Liberian youth aged 5–22. War exposure and post-conflict sexual violence, poverty, infectious disease and parental death negatively impacted youth mental health. Key informants perceived that youth displayed internalizing and externalizing symptoms and mental health-related functional impairment at home, school, work and in relationships. Medical clinics were identified as the most appropriate setting for mental health services. Youth in Liberia continue to endure the harsh social, economic and material conditions of everyday life in a protracted post-conflict state, and have significant mental health needs. Their observed functional impairment due to mental health issues further limited their access to protective factors such as education, employment and positive social relationships. Results from this study informed Liberia's first post-conflict mental health policy. PMID:26807147

  11. A mental health needs assessment of children and adolescents in post-conflict Liberia: results from a quantitative key-informant survey.

    PubMed

    Borba, Christina P C; Ng, Lauren C; Stevenson, Anne; Vesga-Lopez, Oriana; Harris, Benjamin L; Parnarouskis, Lindsey; Gray, Deborah A; Carney, Julia R; Domínguez, Silvia; Wang, Edward K S; Boxill, Ryan; Song, Suzan J; Henderson, David C

    2016-01-02

    Between 1989 and 2004, Liberia experienced a devastating civil war that resulted in widespread trauma with almost no mental health infrastructure to help citizens cope. In 2009, the Liberian Ministry of Health and Social Welfare collaborated with researchers from Massachusetts General Hospital to conduct a rapid needs assessment survey in Liberia with local key informants ( n = 171) to examine the impact of war and post-war events on emotional and behavioral problems of, functional limitations of, and appropriate treatment settings for Liberian youth aged 5-22. War exposure and post-conflict sexual violence, poverty, infectious disease and parental death negatively impacted youth mental health. Key informants perceived that youth displayed internalizing and externalizing symptoms and mental health-related functional impairment at home, school, work and in relationships. Medical clinics were identified as the most appropriate setting for mental health services. Youth in Liberia continue to endure the harsh social, economic and material conditions of everyday life in a protracted post-conflict state, and have significant mental health needs. Their observed functional impairment due to mental health issues further limited their access to protective factors such as education, employment and positive social relationships. Results from this study informed Liberia's first post-conflict mental health policy.

  12. The Use of Key Informant Method for Identifying Children with Blindness and Severe Visual Impairment in Developing Countries.

    PubMed

    du Toit, Rènée; Courtright, Paul; Lewallen, Susan

    2017-06-01

    An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.

  13. Academic Primer Series: Five Key Papers Fostering Educational Scholarship in Junior Academic Faculty.

    PubMed

    Chan, Teresa M; Gottlieb, Michael; Fant, Abra L; Messman, Anne; Robinson, Daniel W; Cooney, Robert R; Papanagnou, Dimitrios; Yarris, Lalena M

    2016-09-01

    Scholarship is an essential part of academic success. Junior faculty members are often unfamiliar with the grounding literature that defines educational scholarship. In this article, the authors aim to summarize five key papers which outline education scholarship in the setting of academic contributions for emerging clinician educators. The authors conducted a consensus-building process to generate a list of key papers that describe the importance and significance of academic scholarship, informed by social media sources. They then used a three-round voting methodology, akin to a Delphi study, to determine the most useful papers. A summary of the five most important papers on the topic of academic scholarship, as determined by this mixed group of junior faculty members and faculty developers, is presented in this paper. These authors subsequently wrote a summary of these five papers and discussed their relevance to both junior faculty members and faculty developers. Five papers on education scholarship, deemed essential by the authors' consensus process, are presented in this paper. These papers may help provide the foundational background to help junior faculty members gain a grasp of the academic scholarly environment. This list may also inform senior faculty and faculty developers on the needs of junior educators in the nascent stages of their careers.

  14. Academic Primer Series: Five Key Papers Fostering Educational Scholarship in Junior Academic Faculty

    PubMed Central

    Chan, Teresa M.; Gottlieb, Michael; Fant, Abra L.; Messman, Anne; Robinson, Daniel W.; Cooney, Robert R.; Papanagnou, Dimitrios; Yarris, Lalena M.

    2016-01-01

    Introduction Scholarship is an essential part of academic success. Junior faculty members are often unfamiliar with the grounding literature that defines educational scholarship. In this article, the authors aim to summarize five key papers which outline education scholarship in the setting of academic contributions for emerging clinician educators. Methods The authors conducted a consensus-building process to generate a list of key papers that describe the importance and significance of academic scholarship, informed by social media sources. They then used a three-round voting methodology, akin to a Delphi study, to determine the most useful papers. Results A summary of the five most important papers on the topic of academic scholarship, as determined by this mixed group of junior faculty members and faculty developers, is presented in this paper. These authors subsequently wrote a summary of these five papers and discussed their relevance to both junior faculty members and faculty developers. Conclusion Five papers on education scholarship, deemed essential by the authors’ consensus process, are presented in this paper. These papers may help provide the foundational background to help junior faculty members gain a grasp of the academic scholarly environment. This list may also inform senior faculty and faculty developers on the needs of junior educators in the nascent stages of their careers. PMID:27625714

  15. Dissemination and implementation of comparative effectiveness evidence: key informant interviews with Clinical and Translational Science Award institutions.

    PubMed

    Morrato, Elaine H; Concannon, Thomas W; Meissner, Paul; Shah, Nilay D; Turner, Barbara J

    2013-03-01

    To identify ongoing practices and opportunities for improving national comparative effectiveness research (CER) translation through dissemination and implementation (D&I) via NIH-funded Clinical and Translational Science Award (CTSA) institutions. Key informant interviews were conducted with 18 CTSA grantees sampled to represent a range of D&I efforts. The institutional representatives endorsed fostering CER translation nationally via the CTSA Consortium. However, five themes emerged from the interviews as barriers to CER D&I: lack of institutional awareness, insufficient capacity, lack of established D&I methods, confusion among stakeholders about what CER actually is and limited funding opportunities. Interviewees offered two key recommendations to improve CER translation: development of a centralized clearing house to facilitate the diffusion of CER D&I resources and methods across CTSA institutions; and formalization of the national CTSA network to leverage existing community engagement relationships and resources for the purpose of adapting and disseminating robust CER evidence locally with providers, patients and healthcare systems.

  16. Dissemination and implementation of comparative effectiveness evidence: key informant interviews with Clinical and Translational Science Award institutions

    PubMed Central

    Morrato, Elaine H; Concannon, Thomas W; Meissner, Paul; Shah, Nilay D; Turner, Barbara J

    2014-01-01

    Aim To identify ongoing practices and opportunities for improving national comparative effectiveness research (CER) translation through dissemination and implementation (D&I) via NIH-funded Clinical and Translational Science Award (CTSA) institutions. Materials & methods Key informant interviews were conducted with 18 CTSA grantees sampled to represent a range of D&I efforts. Results & conclusions The institutional representatives endorsed fostering CER translation nationally via the CTSA Consortium. However, five themes emerged from the interviews as barriers to CER D&I: lack of institutional awareness, insufficient capacity, lack of established D&I methods, confusion among stakeholders about what CER actually is and limited funding opportunities. Interviewees offered two key recommendations to improve CER translation: development of a centralized clearing house to facilitate the diffusion of CER D&I resources and methods across CTSA institutions; and formalization of the national CTSA network to leverage existing community engagement relationships and resources for the purpose of adapting and disseminating robust CER evidence locally with providers, patients and healthcare systems. PMID:24236560

  17. Improving informed consent: Stakeholder views

    PubMed Central

    Anderson, Emily E.; Newman, Susan B.; Matthews, Alicia K.

    2017-01-01

    Purpose Innovation will be required to improve the informed consent process in research. We aimed to obtain input from key stakeholders—research participants and those responsible for obtaining informed consent—to inform potential development of a multimedia informed consent “app.” Methods This descriptive study used a mixed-methods approach. Five 90-minute focus groups were conducted with volunteer samples of former research participants and researchers/research staff responsible for obtaining informed consent. Participants also completed a brief survey that measured background information and knowledge and attitudes regarding research and the use of technology. Established qualitative methods were used to conduct the focus groups and data analysis. Results We conducted five focus groups with 41 total participants: three groups with former research participants (total n = 22), and two groups with researchers and research coordinators (total n = 19). Overall, individuals who had previously participated in research had positive views regarding their experiences. However, further discussion elicited that the informed consent process often did not meet its intended objectives. Findings from both groups are presented according to three primary themes: content of consent forms, experience of the informed consent process, and the potential of technology to improve the informed consent process. A fourth theme, need for lay input on informed consent, emerged from the researcher groups. Conclusions Our findings add to previous research that suggests that the use of interactive technology has the potential to improve the process of informed consent. However, our focus-group findings provide additional insight that technology cannot replace the human connection that is central to the informed consent process. More research that incorporates the views of key stakeholders is needed to ensure that multimedia consent processes do not repeat the mistakes of paper

  18. Improving informed consent: Stakeholder views.

    PubMed

    Anderson, Emily E; Newman, Susan B; Matthews, Alicia K

    2017-01-01

    Innovation will be required to improve the informed consent process in research. We aimed to obtain input from key stakeholders-research participants and those responsible for obtaining informed consent-to inform potential development of a multimedia informed consent "app." This descriptive study used a mixed-methods approach. Five 90-minute focus groups were conducted with volunteer samples of former research participants and researchers/research staff responsible for obtaining informed consent. Participants also completed a brief survey that measured background information and knowledge and attitudes regarding research and the use of technology. Established qualitative methods were used to conduct the focus groups and data analysis. We conducted five focus groups with 41 total participants: three groups with former research participants (total n = 22), and two groups with researchers and research coordinators (total n = 19). Overall, individuals who had previously participated in research had positive views regarding their experiences. However, further discussion elicited that the informed consent process often did not meet its intended objectives. Findings from both groups are presented according to three primary themes: content of consent forms, experience of the informed consent process, and the potential of technology to improve the informed consent process. A fourth theme, need for lay input on informed consent, emerged from the researcher groups. Our findings add to previous research that suggests that the use of interactive technology has the potential to improve the process of informed consent. However, our focus-group findings provide additional insight that technology cannot replace the human connection that is central to the informed consent process. More research that incorporates the views of key stakeholders is needed to ensure that multimedia consent processes do not repeat the mistakes of paper-based consent forms.

  19. 78 FR 5276 - Tribal Background Investigations and Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-25

    ... industry generally, including ownership interests in those businesses; (7) The name and address of any... temporary and permanent gaming licenses. DATES: Effective Date: February 25, 2013. FOR FURTHER INFORMATION.... Telephone: 202-632-7009. SUPPLEMENTARY INFORMATION: I. Background The Indian Gaming Regulatory Act (IGRA or...

  20. Studying extragalactic background fluctuations with the Cosmic Infrared Background ExpeRiment 2 (CIBER-2)

    NASA Astrophysics Data System (ADS)

    Lanz, Alicia; Arai, Toshiaki; Battle, John; Bock, James; Cooray, Asantha; Hristov, Viktor; Korngut, Phillip; Lee, Dae Hee; Mason, Peter; Matsumoto, Toshio; Matsuura, Shuji; Morford, Tracy; Onishi, Yosuke; Shirahata, Mai; Tsumura, Kohji; Wada, Takehiko; Zemcov, Michael

    2014-08-01

    Fluctuations in the extragalactic background light trace emission from the history of galaxy formation, including the emission from the earliest sources from the epoch of reionization. A number of recent near-infrared measure- ments show excess spatial power at large angular scales inconsistent with models of z < 5 emission from galaxies. These measurements have been interpreted as arising from either redshifted stellar and quasar emission from the epoch of reionization, or the combined intra-halo light from stars thrown out of galaxies during merging activity at lower redshifts. Though astrophysically distinct, both interpretations arise from faint, low surface brightness source populations that are difficult to detect except by statistical approaches using careful observations with suitable instruments. The key to determining the source of these background anisotropies will be wide-field imaging measurements spanning multiple bands from the optical to the near-infrared. The Cosmic Infrared Background ExpeRiment 2 (CIBER-2) will measure spatial anisotropies in the extra- galactic infrared background caused by cosmological structure using six broad spectral bands. The experiment uses three 2048 x 2048 Hawaii-2RG near-infrared arrays in three cameras coupled to a single 28.5 cm telescope housed in a reusable sounding rocket-borne payload. A small portion of each array will also be combined with a linear-variable filter to make absolute measurements of the spectrum of the extragalactic background with high spatial resolution for deep subtraction of Galactic starlight. The large field of view and multiple spectral bands make CIBER-2 unique in its sensitivity to fluctuations predicted by models of lower limits on the luminosity of the first stars and galaxies and in its ability to distinguish between primordial and foreground anisotropies. In this paper the scientific motivation for CIBER-2 and details of its first flight instrumentation will be discussed, including

  1. Key Management Infrastructure Increment 2 (KMI Inc 2)

    DTIC Science & Technology

    2016-03-01

    2016 Major Automated Information System Annual Report Key Management Infrastructure Increment 2 (KMI Inc 2) Defense Acquisition Management...PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then...Assigned: April 6, 2015 Program Information Program Name Key Management Infrastructure Increment 2 (KMI Inc 2) DoD Component DoD The acquiring DoD

  2. Daylight operation of a free space, entanglement-based quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Peloso, Matthew P.; Gerhardt, Ilja; Ho, Caleb; Lamas-Linares, Antía; Kurtsiefer, Christian

    2009-04-01

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from the background light. Here, we present a lean entanglement-based QKD system overcoming that limitation. By implementing spectral, spatial and temporal filtering techniques, we establish a secure key continuously over several days under varying light and weather conditions.

  3. Opportunities for Enhanced Strategic Use of Surveys, Medical Records, and Program Data for HIV Surveillance of Key Populations: Scoping Review

    PubMed Central

    Baral, Stefan D; Edwards, Jessie K; Zadrozny, Sabrina; Hargreaves, James; Zhao, Jinkou; Sabin, Keith

    2018-01-01

    Background Normative guidelines from the World Health Organization recommend tracking strategic information indicators among key populations. Monitoring progress in the global response to the HIV epidemic uses indicators put forward by the Joint United Nations Programme on HIV/AIDS. These include the 90-90-90 targets that require a realignment of surveillance data, routinely collected program data, and medical record data, which historically have developed separately. Objective The aim of this study was to describe current challenges for monitoring HIV-related strategic information indicators among key populations ((men who have sex with men [MSM], people in prisons and other closed settings, people who inject drugs, sex workers, and transgender people) and identify future opportunities to enhance the use of surveillance data, programmatic data, and medical record data to describe the HIV epidemic among key populations and measure the coverage of HIV prevention, care, and treatment programs. Methods To provide a historical perspective, we completed a scoping review of the expansion of HIV surveillance among key populations over the past three decades. To describe current efforts, we conducted a review of the literature to identify published examples of SI indicator estimates among key populations. To describe anticipated challenges and future opportunities to improve measurement of strategic information indicators, particularly from routine program and health data, we consulted participants of the Third Global HIV Surveillance Meeting in Bangkok, where the 2015 World Health Organization strategic information guidelines were launched. Results There remains suboptimal alignment of surveillance and programmatic data, as well as routinely collected medical records to facilitate the reporting of the 90-90-90 indicators for HIV among key populations. Studies (n=3) with estimates of all three 90-90-90 indicators rely on cross-sectional survey data. Programmatic data and

  4. Prevalence and causes of severe visual impairment and blindness among children in the lorestan province of iran, using the key informant method.

    PubMed

    Razavi, Hessom; Kuper, Hannah; Rezvan, Farhad; Amelie, Khatere; Mahboobi-Pur, Hassan; Oladi, Mohammad Reza; Muhit, Mohammad; Hashemi, Hassan

    2010-03-01

    To estimate the prevalence and causes of severe visual impairment and blindness among children in Lorestan province of Iran, and to assess the feasibility of the Key Informant Method in this setting. Potential cases were identified using the Key Informant Method, in 3 counties of Lorestan province during June through August 2008, and referred for examination. Causes of severe visual impairment/blindness were determined and categorized using standard World Health Organization methods. Of 123 children referred for examination, 27 children were confirmed to have severe visual impairment/blindness or blindness. The median age was11 years (interquartile range 6-13), and 59% were girls. After adjusting for non-attenders, the estimated prevalence of severe visual impairment/blindness was 0.04% (0.03-0.05). The main site of abnormality was retina (44%), followed by disorders of the whole eye (33%). The majority of causes had a hereditary etiology (70%), which was associated with a family history of blindness (P = 0.002). Potentially avoidable causes of severe visual impairment/blindness were found in 14 children (52%). Almost all children with severe visual impairment/blindness had a history of parental consanguinity (93%). Our findings suggest a moderate prevalence of childhood blindness in the Lorestan province of Iran, a high proportion of which may be avoidable, given improved access to ophthalmic and genetic counselling services in rural areas. The Key Informant Method is feasible in Iran; future research is discussed.

  5. Scientific information and the Tongass land management plan: key findings derived from the scientific literature, species assessments, resource analyses, workshops, and risk assessment panels.

    Treesearch

    Douglas N. Swanston; Charles G. Shaw; Winston P. Smith; Kent R. Julin; Guy A. Cellier; Fred H. Everest

    1996-01-01

    This document highlights key items of information obtained from the published literature and from specific assessments, workshops, resource analyses, and various risk assessment panels conducted as part of the Tongass land management planning process. None of this information dictates any particular decision; however, it is important to consider during decisionmaking...

  6. Strategic development of medicines information: Expanding key global initiatives.

    PubMed

    Hämeen-Anttila, Katri

    2016-01-01

    Medicines information (MI) is a broad concept that includes information targeted to health care professionals as well as to patients. It may be in written, electronic or verbal forms. The internet is becoming more widely used as a source for MI, even though research shows that health care professionals and patient information leaflets are still the most common sources for medicine users. As patients are increasingly looking for the information they need themselves, the role of health care professionals in providing information is evolving, and there exists a need for greater health literacy skills among the patients. Medicines information as a concept is often defined and understood differently. Furthermore, it is such an integral part of pharmacy practice that it is rarely discussed as a separate entity. However, there is a growing recognition of a need to discuss MI in a broader sense and consider national strategies to meet consumer needs for medicines information. It also has been recognized that provision of MI should be a shared responsibility of all stakeholders in health care. This commentary gives an example of national level strategic development of MI, and calls for international collaboration. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. DOA-informed source extraction in the presence of competing talkers and background noise

    NASA Astrophysics Data System (ADS)

    Taseska, Maja; Habets, Emanuël A. P.

    2017-12-01

    A desired speech signal in hands-free communication systems is often degraded by noise and interfering speech. Even though the number and locations of the interferers are often unknown in practice, it is justified to assume in certain applications that the direction-of-arrival (DOA) of the desired source is approximately known. Using the known DOA, fixed spatial filters such as the delay-and-sum beamformer can be steered to extract the desired source. However, it is well-known that fixed data-independent spatial filters do not provide sufficient reduction of directional interferers. Instead, the DOA information can be used to estimate the statistics of the desired and the undesired signals and to compute optimal data-dependent spatial filters. One way the DOA is exploited for optimal spatial filtering in the literature, is by designing DOA-based narrowband detectors to determine whether a desired or an undesired signal is dominant at each time-frequency (TF) bin. Subsequently, the statistics of the desired and the undesired signals can be estimated during the TF bins where the respective signal is dominant. In a similar manner, a Gaussian signal model-based detector which does not incorporate DOA information has been used in scenarios where the undesired signal consists of stationary background noise. However, when the undesired signal is non-stationary, resulting for example from interfering speakers, such a Gaussian signal model-based detector is unable to robustly distinguish desired from undesired speech. To this end, we propose a DOA model-based detector to determine the dominant source at each TF bin and estimate the desired and undesired signal statistics. We demonstrate that data-dependent spatial filters that use the statistics estimated by the proposed framework achieve very good undesired signal reduction, even when using only three microphones.

  8. What is eHealth (6)? Development of a Conceptual Model for eHealth: Qualitative Study with Key Informants

    PubMed Central

    Janssen, Anna; Barnet, Stewart

    2017-01-01

    Background Despite rapid growth in eHealth research, there remains a lack of consistency in defining and using terms related to eHealth. More widely cited definitions provide broad understanding of eHealth but lack sufficient conceptual clarity to operationalize eHealth and enable its implementation in health care practice, research, education, and policy. Definitions that are more detailed are often context or discipline specific, limiting ease of translation of these definitions across the breadth of eHealth perspectives and situations. A conceptual model of eHealth that adequately captures its complexity and potential overlaps is required. This model must also be sufficiently detailed to enable eHealth operationalization and hypothesis testing. Objective This study aimed to develop a conceptual practice-based model of eHealth to support health professionals in applying eHealth to their particular professional or discipline contexts. Methods We conducted semistructured interviews with key informants (N=25) from organizations involved in health care delivery, research, education, practice, governance, and policy to explore their perspectives on and experiences with eHealth. We used purposeful sampling for maximum diversity. Interviews were coded and thematically analyzed for emergent domains. Results Thematic analyses revealed 3 prominent but overlapping domains of eHealth: (1) health in our hands (using eHealth technologies to monitor, track, and inform health), (2) interacting for health (using digital technologies to enable health communication among practitioners and between health professionals and clients or patients), and (3) data enabling health (collecting, managing, and using health data). These domains formed a model of eHealth that addresses the need for clear definitions and a taxonomy of eHealth while acknowledging the fluidity of this area and the strengths of initiatives that span multiple eHealth domains. Conclusions This model extends current

  9. Cleaning procedure for improved photothermal background of toroidal optical microresonators

    NASA Astrophysics Data System (ADS)

    Horak, Erik H.; Knapper, Kassandra A.; Heylman, Kevin D.; Goldsmith, Randall H.

    2016-09-01

    High Q-factors and small mode volumes have made toroidal optical microresonators exquisite sensors to small shifts in the effective refractive index of the WGM modes. Eliminating contaminants and improving quality factors is key for many different sensing techniques, and is particularly important for photothermal imaging as contaminants add photothermal background obscuring objects of interest. Several different cleaning procedures including wet- and dry-chemical procedures are tested for their effect on Q-factors and photothermal background. RCA cleaning was shown to be successful in contrast to previously described acid cleaning procedures, most likely due to the different surface reactivity of the acid reagents used. UV-ozone cleaning was shown to be vastly superior to O2 plasma cleaning procedures, significantly reducing the photothermal background of the resonator.

  10. Background modeling for the GERDA experiment

    NASA Astrophysics Data System (ADS)

    Becerici-Schmidt, N.; Gerda Collaboration

    2013-08-01

    The neutrinoless double beta (0νββ) decay experiment GERDA at the LNGS of INFN has started physics data taking in November 2011. This paper presents an analysis aimed at understanding and modeling the observed background energy spectrum, which plays an essential role in searches for a rare signal like 0νββ decay. A very promising preliminary model has been obtained, with the systematic uncertainties still under study. Important information can be deduced from the model such as the expected background and its decomposition in the signal region. According to the model the main background contributions around Qββ come from 214Bi, 228Th, 42K, 60Co and α emitting isotopes in the 226Ra decay chain, with a fraction depending on the assumed source positions.

  11. Multimodal cues provide redundant information for bumblebees when the stimulus is visually salient, but facilitate red target detection in a naturalistic background

    PubMed Central

    Corcobado, Guadalupe; Trillo, Alejandro

    2017-01-01

    Our understanding of how floral visitors integrate visual and olfactory cues when seeking food, and how background complexity affects flower detection is limited. Here, we aimed to understand the use of visual and olfactory information for bumblebees (Bombus terrestris terrestris L.) when seeking flowers in a visually complex background. To explore this issue, we first evaluated the effect of flower colour (red and blue), size (8, 16 and 32 mm), scent (presence or absence) and the amount of training on the foraging strategy of bumblebees (accuracy, search time and flight behaviour), considering the visual complexity of our background, to later explore whether experienced bumblebees, previously trained in the presence of scent, can recall and make use of odour information when foraging in the presence of novel visual stimuli carrying a familiar scent. Of all the variables analysed, flower colour had the strongest effect on the foraging strategy. Bumblebees searching for blue flowers were more accurate, flew faster, followed more direct paths between flowers and needed less time to find them, than bumblebees searching for red flowers. In turn, training and the presence of odour helped bees to find inconspicuous (red) flowers. When bees foraged on red flowers, search time increased with flower size; but search time was independent of flower size when bees foraged on blue flowers. Previous experience with floral scent enhances the capacity of detection of a novel colour carrying a familiar scent, probably by elemental association influencing attention. PMID:28898287

  12. Probing Inflation via Cosmic Microwave Background Polarimetry

    NASA Technical Reports Server (NTRS)

    Chuss, David T.

    2008-01-01

    The Cosmic Microwave Background (CMB) has been a rich source of information about the early Universe. Detailed measurements of its spectrum and spatial distribution have helped solidify the Standard Model of Cosmology. However, many questions still remain. Standard Cosmology does not explain why the early Universe is geometrically flat, expanding, homogenous across the horizon, and riddled with a small anisotropy that provides the seed for structure formation. Inflation has been proposed as a mechanism that naturally solves these problems. In addition to solving these problems, inflation is expected to produce a spectrum of gravitational waves that will create a particular polarization pattern on the CMB. Detection of this polarized signal is a key test of inflation and will give a direct measurement of the energy scale at which inflation takes place. This polarized signature of inflation is expected to be -9 orders of magnitude below the 2.7 K monopole level of the CMB. This measurement will require good control of systematic errors, an array of many detectors having the requisite sensitivity, and a reliable method for removing polarized foregrounds, and nearly complete sky coverage. Ultimately, this measurement is likely to require a space mission. To this effect, technology and mission concept development are currently underway.

  13. Can one measure the Cosmic Neutrino Background?

    NASA Astrophysics Data System (ADS)

    Faessler, Amand; Hodák, Rastislav; Kovalenko, Sergey; Šimkovic, Fedor

    The Cosmic Microwave Background (CMB) yields information about our Universe at around 380,000 years after the Big Bang (BB). Due to the weak interaction of the neutrinos with matter, the Cosmic Neutrino Background (CNB) should give information about a much earlier time of our Universe, around one second after the BB. Probably, the most promising method to “see” the CNB is the capture of the electron neutrinos from the Background by Tritium, which then decays into 3He and an electron with the energy of the the Q-value = 18.562keV plus the electron neutrino rest mass. The “KArlsruhe TRItium Neutrino” (KATRIN) experiment, which is in preparation, seems presently the most sensitive proposed method for measuring the electron antineutrino mass. At the same time, KATRIN can also look by the reaction νe(˜ 1.95K) +3H →3He + e-(Q = 18.6keV + m νec2). The capture of the Cosmic Background Neutrinos (CNB) should show in the electron spectrum as a peak by the electron neutrino rest mass above Q. Here, the possibility to see the CNB with KATRIN is studied. A detection of the CNB by KATRIN seems not to be possible at the moment. But KATRIN should be able to determine an upper limit for the local electron neutrino density of the CNB.

  14. Can one measure the Cosmic Neutrino Background?

    NASA Astrophysics Data System (ADS)

    Faessler, Amand; Hodák, Rastislav; Kovalenko, Sergey; Šimkovic, Fedor

    The Cosmic Microwave Background (CMB) yields information about our Universe at around 380,000 years after the Big Bang (BB). Due to the weak interaction of the neutrinos with matter, the Cosmic Neutrino Background (CNB) should give information about a much earlier time of our Universe, around one second after the BB. Probably, the most promising method to "see" the CNB is the capture of the electron neutrinos from the Background by Tritium, which then decays into 3He and an electron with the energy of the the Q-value = 18.562 keV plus the electron neutrino rest mass. The "KArlsruhe TRItium Neutrino" (KATRIN) experiment, which is in preparation, seems presently the most sensitive proposed method for measuring the electron antineutrino mass. At the same time, KATRIN can also look by the reaction νe(˜1.95K) + 3H → 3He + e-(Q = 18.6keV + mνec2). The capture of the Cosmic Background Neutrinos (CNB) should show in the electron spectrum as a peak by the electron neutrino rest mass above Q. Here, the possibility to see the CNB with KATRIN is studied. A detection of the CNB by KATRIN seems not to be possible at the moment. But KATRIN should be able to determine an upper limit for the local electron neutrino density of the CNB.

  15. The comparison and analysis of extracting video key frame

    NASA Astrophysics Data System (ADS)

    Ouyang, S. Z.; Zhong, L.; Luo, R. Q.

    2018-05-01

    Video key frame extraction is an important part of the large data processing. Based on the previous work in key frame extraction, we summarized four important key frame extraction algorithms, and these methods are largely developed by comparing the differences between each of two frames. If the difference exceeds a threshold value, take the corresponding frame as two different keyframes. After the research, the key frame extraction based on the amount of mutual trust is proposed, the introduction of information entropy, by selecting the appropriate threshold values into the initial class, and finally take a similar mean mutual information as a candidate key frame. On this paper, several algorithms is used to extract the key frame of tunnel traffic videos. Then, with the analysis to the experimental results and comparisons between the pros and cons of these algorithms, the basis of practical applications is well provided.

  16. 10 CFR 37.25 - Background investigations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... investigation; and attempt to obtain the information from an alternate source. (b) Grandfathering. (1... 10 Energy 1 2014-01-01 2014-01-01 false Background investigations. 37.25 Section 37.25 Energy NUCLEAR REGULATORY COMMISSION PHYSICAL PROTECTION OF CATEGORY 1 AND CATEGORY 2 QUANTITIES OF RADIOACTIVE...

  17. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    PubMed

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security

  18. NREL Makes Key Appointments

    Science.gov Websites

    Makes Key Appointments Staffing for Distributed Energy and Tech Management Announced For more information contact: Gary Schmitz, 303-275-4050 email: Gary Schmitz Golden, Colo., Feb. 28, 2001 - Two reorganized Planning and Technology Management Division. Anthony Schaffhauser has been selected to become

  19. Academic Primer Series: Five Key Papers about Team Collaboration Relevant to Emergency Medicine.

    PubMed

    Gottlieb, Michael; Grossman, Catherine; Rose, Emily; Sanderson, William; Ankel, Felix; Swaminathan, Anand; Chan, Teresa M

    2017-02-01

    Team collaboration is an essential for success both within academics and the clinical environment. Often, team collaboration is not explicitly taught during medical school or even residency, and must be learned during one's early career. In this article, we aim to summarize five key papers about team collaboration for early career clinician educators. We conducted a consensus-building process among the writing team to generate a list of key papers that describe the importance or significance of team collaboration, seeking input from social media sources. The authors then used a three-round voting methodology akin to a Delphi study to determine the most important papers from the initially generated list. The five most important papers on the topic of team collaboration, as determined by this mixed group of junior faculty members and faculty developers, are presented in this paper. For each included publication, a summary was provided along with its relevance to junior faculty members and faculty developers. Five key papers about team collaboration are presented in this publication. These papers provide a foundational background to help junior faculty members with collaborating in teams both clinically and academically. This list may also inform senior faculty and faculty developers about the needs of junior faculty members.

  20. General Aviation in Nebraska: Nebraska SATS Project Background Paper No. 1

    NASA Technical Reports Server (NTRS)

    Smith, Russell; Wachal, Jocelyn

    2000-01-01

    The Nebraska SATS project is a state-level component of NASA's Small Aircraft Transportation System (SATS). During the next several years the project will examine several different factors affecting SATS implementation in Nebraska. These include economic and taxation issues, public policy issues, airport planning processes, information dissemination strategies, and systemic change factors. This background paper profiles the general aviation system in Nebraska. It is written to provide information about the "context" within which SATS will be pursued. The primary focus is thus on describing and providing background information about the current situation. A secondary focus is on drawing general conclusions about the ability of the current system to incorporate the types of changes implied by SATS. First, some brief information on the U.S. aviation system is provided. The next two sections profile the current general aviation aircraft and pilot base. Nebraska's system of general aviation airports is then described. Within this section of the paper, information is provided on the different types of general aviation airports in Nebraska, airport activity levels and current infrastructure. The fourth major section of the background paper looks at Nebraska's local airport authorities. These special purpose local governments oversee the majority of the general aviation airports in the state. Among the items examined are total expenditures, capital expenditures and planning activities. Next, the paper provides background information on the Nebraska Department of Aeronautics (NDA) and recent Federal funding for general aviation in Nebraska. The final section presents summary conclusions.

  1. Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2004-05-01

    Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.

  2. 16 CFR § 1404.2 - Background.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... INSULATION § 1404.2 Background. Based on available fire incident information, engineering analysis of the... fires can occur where cellulose insulation is improperly installed too close to the sides or over the top of recessed electrical light fixtures, or installed too close to the exhaust flues from heat...

  3. VNIR hyperspectral background characterization methods in adverse weather conditions

    NASA Astrophysics Data System (ADS)

    Romano, João M.; Rosario, Dalton; Roth, Luz

    2009-05-01

    Hyperspectral technology is currently being used by the military to detect regions of interest where potential targets may be located. Weather variability, however, may affect the ability for an algorithm to discriminate possible targets from background clutter. Nonetheless, different background characterization approaches may facilitate the ability for an algorithm to discriminate potential targets over a variety of weather conditions. In a previous paper, we introduced a new autonomous target size invariant background characterization process, the Autonomous Background Characterization (ABC) or also known as the Parallel Random Sampling (PRS) method, features a random sampling stage, a parallel process to mitigate the inclusion by chance of target samples into clutter background classes during random sampling; and a fusion of results at the end. In this paper, we will demonstrate how different background characterization approaches are able to improve performance of algorithms over a variety of challenging weather conditions. By using the Mahalanobis distance as the standard algorithm for this study, we compare the performance of different characterization methods such as: the global information, 2 stage global information, and our proposed method, ABC, using data that was collected under a variety of adverse weather conditions. For this study, we used ARDEC's Hyperspectral VNIR Adverse Weather data collection comprised of heavy, light, and transitional fog, light and heavy rain, and low light conditions.

  4. Exploring Measures to Control Road Traffic Injuries in Iran: Key Informants Points of View

    PubMed Central

    SALARI, Hedayat; MOTEVALIAN, Seyed Abbas; ARAB, Mohammad; ESFANDIARI, Atefeh; AKBARI SARI, Ali

    2017-01-01

    Background: Injuries and fatalities from road traffic Injuries are global public health concerns, and a major problem in the Iran. This study aimed to explore strategies to control road traffic Injuries (RTI) in Iran. Methods: We conducted a qualitative study to explore possible ways to reduce the occurrence of road traffic Injuries in Iran in 2016. Interviewees were purposively sampled from various sectors due to multidisciplinary nature of RTIs. Participants were mainly representatives from the police, Ministry of Road, Municipal, emergency services and Ministry of Health. Besides, public health authorities, researchers, and university professors were interviewed. We conducted in-depth interviews using generic guides. Data was analyzed using MAXQDA 10 software. Through content analysis, we interpreted core themes relevant to the accomplishment of our study objectives. Results: Themes that emerged from our study include; road traffic management, governance, education, improving accident database, enforcement, driving license restrictions, and construction of pedestrian overpass. Conclusion: This study revealed key informants’ views regarding available and affordable solutions to reduce RTIs in Iran. Many applicable strategies are identified in the control of RTIs in Iran. Although some solutions such as highway construction and/or expanding rail transportation have been suggested as effective measures for reducing accident, but they are costly and may not be fully applied in developing countries like Iran. PMID:28560198

  5. The effect of touch-key size on the usability of In-Vehicle Information Systems and driving safety during simulated driving.

    PubMed

    Kim, Heejin; Kwon, Sunghyuk; Heo, Jiyoon; Lee, Hojin; Chung, Min K

    2014-05-01

    Investigating the effect of touch-key size on usability of In-Vehicle Information Systems (IVISs) is one of the most important research issues since it is closely related to safety issues besides its usability. This study investigated the effects of the touch-key size of IVISs with respect to safety issues (the standard deviation of lane position, the speed variation, the total glance time, the mean glance time, the mean time between glances, and the mean number of glances) and the usability of IVISs (the task completion time, error rate, subjective preference, and NASA-TLX) through a driving simulation. A total of 30 drivers participated in the task of entering 5-digit numbers with various touch-key sizes while performing simulated driving. The size of the touch-key was 7.5 mm, 12.5 mm, 17.5 mm, 22.5 mm and 27.5 mm, and the speed of driving was set to 0 km/h (stationary state), 50 km/h and 100 km/h. As a result, both the driving safety and the usability of the IVISs increased as the touch-key size increased up to a certain size (17.5 mm in this study), at which they reached asymptotes. We performed Fitts' law analysis of our data, and this revealed that the data from the dual task experiment did not follow Fitts' law. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  6. Orientations in adolescent use of information and communication technology: a digital divide by sociodemographic background, educational career, and health.

    PubMed

    Koivusilta, Leena K; Lintonen, Tomi P; Rimpelä, Arja H

    2007-01-01

    The role of information and communication technology (ICT) in adolescents' lives was studied, with emphasis on whether there exists a digital divide based on sociodemographic background, educational career, and health. The assumption was that some groups of adolescents use ICT more so that their information utilization skills improve (computer use), while others use it primarily for entertainment (digital gaming, contacting friends by mobile phone). Data were collected by mailed survey from a nationally representative sample of 12- to 18-year-olds (n=7,292; response 70%) in 2001 and analysed using ANOVA. Computer use was most frequent among adolescents whose fathers had higher education or socioeconomic status, who came from nuclear families, and who continued studies after compulsory education. Digital gaming was associated with poor school achievement and attending vocational rather than upper secondary school. Mobile phone use was frequent among adolescents whose fathers had lower education or socioeconomic status, who came from non-nuclear families, and whose educational prospects were poor. Intensive use of each ICT form, especially of mobile phones, was associated with health problems. High social position, nuclear family, and a successful educational career signified good health in general, independently of the diverse usage of ICT. There exists a digital divide among adolescents: orientation to computer use is more common in educated well-off families while digital gaming and mobile phone use accumulate at the opposite end of the spectrum. Poorest health was reported by mobile phone users. High social background and success at school signify better health, independently of the ways of using ICT.

  7. Server-Controlled Identity-Based Authenticated Key Exchange

    NASA Astrophysics Data System (ADS)

    Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun

    We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.

  8. Lean Information Management: Criteria For Selecting Key Performance Indicators At Shop Floor

    NASA Astrophysics Data System (ADS)

    Iuga, Maria Virginia; Kifor, Claudiu Vasile; Rosca, Liviu-Ion

    2015-07-01

    Most successful organizations worldwide use key performance indicators as an important part of their corporate strategy in order to forecast, measure and plan their businesses. Performance metrics vary in their purpose, definition and content. Therefore, the way organizations select what they think are the optimal indicators for their businesses varies from company to company, sometimes even from department to department. This study aims to answer the question of what is the most suitable way to define and select key performance indicators. More than that, it identifies the right criteria to select key performance indicators at shop floor level. This paper contributes to prior research by analysing and comparing previously researched selection criteria and proposes an original six-criteria-model, which caters towards choosing the most adequate KPIs. Furthermore, the authors take the research a step further by further steps to closed research gaps within this field of study.

  9. Background Error Covariance Estimation Using Information from a Single Model Trajectory with Application to Ocean Data Assimilation

    NASA Technical Reports Server (NTRS)

    Keppenne, Christian L.; Rienecker, Michele; Kovach, Robin M.; Vernieres, Guillaume

    2014-01-01

    An attractive property of ensemble data assimilation methods is that they provide flow dependent background error covariance estimates which can be used to update fields of observed variables as well as fields of unobserved model variables. Two methods to estimate background error covariances are introduced which share the above property with ensemble data assimilation methods but do not involve the integration of multiple model trajectories. Instead, all the necessary covariance information is obtained from a single model integration. The Space Adaptive Forecast error Estimation (SAFE) algorithm estimates error covariances from the spatial distribution of model variables within a single state vector. The Flow Adaptive error Statistics from a Time series (FAST) method constructs an ensemble sampled from a moving window along a model trajectory.SAFE and FAST are applied to the assimilation of Argo temperature profiles into version 4.1 of the Modular Ocean Model (MOM4.1) coupled to the GEOS-5 atmospheric model and to the CICE sea ice model. The results are validated against unassimilated Argo salinity data. They show that SAFE and FAST are competitive with the ensemble optimal interpolation (EnOI) used by the Global Modeling and Assimilation Office (GMAO) to produce its ocean analysis. Because of their reduced cost, SAFE and FAST hold promise for high-resolution data assimilation applications.

  10. Postmastectomy Information Needs and Information-seeking Motives for Women with Breast Cancer

    PubMed Central

    Latifi, Masoome; Salimi, Sohrab; Barahmand, Nilofar; Fahimnia, Fateme; Allahbakhshian Farsani, Leili

    2018-01-01

    Background: Health information-seeking behavior is a key concept in the empowerment of women with breast cancer after mastectomy for self-care management. Thus, a real understanding of their information needs and their information-seeking behavior may open up new opportunities for their postsurgery cares. The current research was conducted to identify the information needs and information-seeking motives of women with breast cancer after mastectomy. Materials and Methods: This is an applied qualitative research. Samples included 17 women with breast cancer after mastectomy selected from two hospitals of Shahid Mohammadi and Persian Gulf and Omid Central Chemotherapy in Bandar Abbas. Data were collected using semi-structured interview on winter 2014 and analyzed using qualitative content analysis method. Results: Three basic contents were extracted including information needs related to mental health, physical health related to disease and personal daily activities along with their subcategories, and representing common experience and perception of mastectomized women seeking for health information. Furthermore, hope, self-esteem, return to life, and available social support resources were expressed as the main information-seeking motives. Conclusion: Considering research findings, mastectomized women need to receive information in wide range of health and thus pursue purposeful behavior. Hence, it is necessary that required actions and measures are taken by health-care authorities, especially institutions responsible for women health, to support and meet information needs of the patients considering their information-seeking motives. PMID:29862224

  11. The politics of agenda setting at the global level: key informant interviews regarding the International Labour Organization Decent Work Agenda.

    PubMed

    Di Ruggiero, Erica; Cohen, Joanna E; Cole, Donald C

    2014-07-01

    Global labour markets continue to undergo significant transformations resulting from socio-political instability combined with rises in structural inequality, employment insecurity, and poor working conditions. Confronted by these challenges, global institutions are providing policy guidance to protect and promote the health and well-being of workers. This article provides an account of how the International Labour Organization's Decent Work Agenda contributes to the work policy agendas of the World Health Organization and the World Bank. This qualitative study involved semi-structured interviews with representatives from three global institutions--the International Labour Organization (ILO), the World Health Organization and the World Bank. Of the 25 key informants invited to participate, 16 took part in the study. Analysis for key themes was followed by interpretation using selected agenda setting theories. Interviews indicated that through the Decent Work Agenda, the International Labour Organization is shaping the global policy narrative about work among UN agencies, and that the pursuit of decent work and the Agenda were perceived as important goals with the potential to promote just policies. The Agenda was closely linked to the World Health Organization's conception of health as a human right. However, decent work was consistently identified by World Bank informants as ILO terminology in contrast to terms such as job creation and job access. The limited evidence base and its conceptual nature were offered as partial explanations for why the Agenda has yet to fully influence other global institutions. Catalytic events such as the economic crisis were identified as creating the enabling conditions to influence global work policy agendas. Our evidence aids our understanding of how an issue like decent work enters and stays on the policy agendas of global institutions, using the Decent Work Agenda as an illustrative example. Catalytic events and policy

  12. Key Informants' Perceptions on the Implementation of a National Program for Improving Nutritional Status of Children in Iran.

    PubMed

    Ghodsi, Delaram; Omidvar, Nasrin; Rashidian, Arash; Raghfar, Hossein; Eini-Zinab, Hassan; Ebrahimi, Marziyeh

    2016-01-01

    Childhood malnutrition is a major public health issue. Multidisciplinary approach for Improvement of Nutritional Status of Children in Iran was implemented in order to reduce malnutrition among children. This study aimed to evaluate the implementation aspect of the program and to explore key informants' perceptions and experience regarding the factors affected its implementation. Data were collected through the review of secondary data and semistructured interviews at national, province, and local levels. Four layers of key informants were selected purposefully for interviewing, including policymakers, senior nutrition officers, head of Hygiene, Remedy and Insurance Affairs in Imam Khomeini Relief Foundation, and community health workers. Qualitative content analysis was carried out based on Supporting the Use of Research Evidence framework and Tailored Implementation for Chronic Diseases' checklist to interpret the viewpoints of the study participants. Results showed that the program had successes in improving mother's knowledge on health, nutrition, and child care through health system and increased families' access to food, but there were some aspects that affected program's implementation. Some of these factors are the lack of clarity in the program's protocol and indicators, human shortage and inadequate financial resources, poor facilities, inattention to staff motivation, insufficient commitment among different sections, poor communication and supervision among different executive sections, and program protocols designing regardless of practical condition. Based on the results, top-down approach in policymaking and inadequate financial and human resources were responsible for most of the challenges encountered in the implementation.

  13. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-02-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem (Q P K C) based on the Bell states. By H o l e v o's theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack (C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  14. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  15. Human Health Effects of Biphenyl: Key Findings and Scientific Issues

    PubMed Central

    Li, Zheng; Hogan, Karen A.; Cai, Christine; Rieth, Susan

    2015-01-01

    Background: In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) has evaluated the human health hazards of biphenyl exposure. Objectives: We review key findings and scientific issues regarding expected human health effects of biphenyl. Methods: Scientific literature from 1926 through September 2012 was critically evaluated to identify potential human health hazards associated with biphenyl exposure. Key issues related to the carcinogenicity and noncancer health hazards of biphenyl were examined based on evidence from experimental animal bioassays and mechanistic studies. Discussion: Systematic consideration of experimental animal studies of oral biphenyl exposure took into account the variety of study designs (e.g., study sizes, exposure levels, and exposure durations) to reconcile differing reported results. The available mechanistic and toxicokinetic evidence supports the hypothesis that male rat urinary bladder tumors arise through urinary bladder calculi formation but is insufficient to hypothesize a mode of action for liver tumors in female mice. Biphenyl and its metabolites may induce genetic damage, but a role for genotoxicity in biphenyl-induced carcinogenicity has not been established. Conclusions: The available health effects data for biphenyl provides suggestive evidence for carcinogenicity in humans, based on increased incidences of male rat urinary bladder tumors at high exposure levels and on female mouse liver tumors. Kidney toxicity is also a potential human health hazard of biphenyl exposure. Citation: Li Z, Hogan KA, Cai C, Rieth S. 2016. Human health effects of biphenyl: key findings and scientific issues. Environ Health Perspect 124:703–712; http://dx.doi.org/10.1289/ehp.1509730 PMID:26529796

  16. Human Health Effects of Trichloroethylene: Key Findings and Scientific Issues

    PubMed Central

    Jinot, Jennifer; Scott, Cheryl Siegel; Makris, Susan L.; Cooper, Glinda S.; Dzubow, Rebecca C.; Bale, Ambuja S.; Evans, Marina V.; Guyton, Kathryn Z.; Keshava, Nagalakshmi; Lipscomb, John C.; Barone, Stanley; Fox, John F.; Gwinn, Maureen R.; Schaum, John; Caldwell, Jane C.

    2012-01-01

    Background: In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) completed a toxicological review of trichloroethylene (TCE) in September 2011, which was the result of an effort spanning > 20 years. Objectives: We summarized the key findings and scientific issues regarding the human health effects of TCE in the U.S. EPA’s toxicological review. Methods: In this assessment we synthesized and characterized thousands of epidemiologic, experimental animal, and mechanistic studies, and addressed several key scientific issues through modeling of TCE toxicokinetics, meta-analyses of epidemiologic studies, and analyses of mechanistic data. Discussion: Toxicokinetic modeling aided in characterizing the toxicological role of the complex metabolism and multiple metabolites of TCE. Meta-analyses of the epidemiologic data strongly supported the conclusions that TCE causes kidney cancer in humans and that TCE may also cause liver cancer and non-Hodgkin lymphoma. Mechanistic analyses support a key role for mutagenicity in TCE-induced kidney carcinogenicity. Recent evidence from studies in both humans and experimental animals point to the involvement of TCE exposure in autoimmune disease and hypersensitivity. Recent avian and in vitro mechanistic studies provided biological plausibility that TCE plays a role in developmental cardiac toxicity, the subject of substantial debate due to mixed results from epidemiologic and rodent studies. Conclusions: TCE is carcinogenic to humans by all routes of exposure and poses a potential human health hazard for noncancer toxicity to the central nervous system, kidney, liver, immune system, male reproductive system, and the developing embryo/fetus. PMID:23249866

  17. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.

    PubMed

    Zhang, Liping; Zhu, Shaohui; Tang, Shanyu

    2017-03-01

    Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.

  18. Three-party authenticated key agreements for optimal communication

    PubMed Central

    Lee, Tian-Fu; Hwang, Tzonelih

    2017-01-01

    Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253

  19. Gamma-Ray Background Variability in Mobile Detectors

    NASA Astrophysics Data System (ADS)

    Aucott, Timothy John

    Gamma-ray background radiation significantly reduces detection sensitivity when searching for radioactive sources in the field, such as in wide-area searches for homeland security applications. Mobile detector systems in particular must contend with a variable background that is not necessarily known or even measurable a priori. This work will present measurements of the spatial and temporal variability of the background, with the goal of merging gamma-ray detection, spectroscopy, and imaging with contextual information--a "nuclear street view" of the ubiquitous background radiation. The gamma-ray background originates from a variety of sources, both natural and anthropogenic. The dominant sources in the field are the primordial isotopes potassium-40, uranium-238, and thorium-232, as well as their decay daughters. In addition to the natural background, many artificially-created isotopes are used for industrial or medical purposes, and contamination from fission products can be found in many environments. Regardless of origin, these backgrounds will reduce detection sensitivity by adding both statistical as well as systematic uncertainty. In particular, large detector arrays will be limited by the systematic uncertainty in the background and will suffer from a high rate of false alarms. The goal of this work is to provide a comprehensive characterization of the gamma-ray background and its variability in order to improve detection sensitivity and evaluate the performance of mobile detectors in the field. Large quantities of data are measured in order to study their performance at very low false alarm rates. Two different approaches, spectroscopy and imaging, are compared in a controlled study in the presence of this measured background. Furthermore, there is additional information that can be gained by correlating the gamma-ray data with contextual data streams (such as cameras and global positioning systems) in order to reduce the variability in the background

  20. Image use in field guides and identification keys: review and recommendations

    PubMed Central

    Leggett, Roxanne; Kirchoff, Bruce K.

    2011-01-01

    Background and aims Although illustrations have played an important role in identification keys and guides since the 18th century, their use has varied widely. Some keys lack all illustrations, while others are heavily illustrated. Even within illustrated guides, the way in which images are used varies considerably. Here, we review image use in paper and electronic guides, and establish a set of best practices for image use in illustrated keys and guides. Scope Our review covers image use in both paper and electronic guides, though we only briefly cover apps for mobile devices. With this one exception, we cover the full range of guides, from those that consist only of species descriptions with no keys, to lavishly illustrated technical keys. Emphasis is placed on how images are used, not on the operation of the guides and key, which has been reviewed by others. We only deal with operation when it impacts image use. Main points Few illustrated keys or guides use images in optimal ways. Most include too few images to show taxonomic variation or variation in characters and character states. The use of multiple images allows easier taxon identification and facilitates the understanding of characters. Most images are usually not standardized, making comparison between images difficult. Although some electronic guides allow images to be enlarged, many do not. Conclusions The best keys and guides use standardized images, displayed at sizes that are easy to see and arranged in a standardized manner so that similar images can be compared across species. Illustrated keys and glossaries should contain multiple images for each character state so that the user can judge variation in the state. Photographic backgrounds should not distract from the subject and, where possible, should be of a standard colour. When used, drawings should be prepared by professional botanical illustrators, and clearly labelled. Electronic keys and guides should allow images to be enlarged so that

  1. Using Key Informant Method to Determine the Prevalence and Causes of Childhood Blindness in South-Eastern Nigeria.

    PubMed

    Aghaji, Ada E; Ezegwui, Ifeoma R; Shiweobi, Jude O; Mamah, Cyril C; Okoloagu, Mary N; Onwasigwe, Ernest N

    2017-12-01

    To determine the prevalence and causes of childhood blindness in an underserved community in south-eastern Nigeria using the key informant method. This was a descriptive cross-sectional study. Key informants (KI) appointed by their respective communities received 1-day training on identification of blind children in their communities. Two weeks later, the research team visited the agreed sites within the community and examined the identified children. The World Health Organization eye examination record for blind children was used for data collection. Data entry and analysis were done with the Statistical Package for Social Sciences (SPSS) version 17.0. Fifteen blind or severely visually impaired children (age range 3 months to 15 years) were identified in this community; nine of these were brought by the KIs. The prevalence of childhood blindness/severe visual impairment (BL/SVI) was 0.12 per 1000 children. By anatomical classification, operable cataract in 6 (40.0%) was the leading cause of BL/SVI in the series; followed by optic nerve lesions (atrophy/hypoplasia) in 3 (20.0%). The etiology of BL/SVI is unknown for the majority of the children (66.7%). It was presumed hereditary in four children (26.7%). Sixty percent of the blindness was judged avoidable. Only three children (20.0%) were enrolled in the Special Education Centre for the Blind. The prevalence of childhood BL/SVI in our study population is low but over half of the blindness is avoidable. There may be a significant backlog of operable childhood cataract in south-eastern Nigeria. The KI method is a practical method for case finding of blind children in rural communities.

  2. WIS Implementation Study Report. Volume 3. Background Information.

    DTIC Science & Technology

    1983-10-01

    similar representations so that a single schema interpreter can serve in either environment. Examples of schema intepreters exist in all databases...Unfortunately, programs expect ing ;L VSA M file caninot accept a similar, non-VSAM file instead. In practice, a tile written using any of tire 6 film ...Thomas Kaczmarek USC/Information Sciences Institute 4676 Admiralty Way Marina del Rey, CA 90292 14 September 1983 247 PAiIECDIG PAMI &~A -NOT FILM

  3. Raman background photobleaching as a possible method of cancer diagnostics

    NASA Astrophysics Data System (ADS)

    Brandt, Nikolai N.; Brandt, Nikolai B.; Chikishev, Andrey Y.; Gangardt, Mihail G.; Karyakina, Nina F.

    2001-06-01

    Kinetics of photobleaching of background in Raman spectra of aqueous solutions of plant toxins ricin and ricin agglutinin, ricin binding subunit, and normal and malignant human blood serum were measured. For the excitation of the spectra cw and pulsed laser radiation were used. The spectra of Raman background change upon laser irradiation. Background intensity is lower for the samples with small molecular weight. The cyclization of amino acid residues in the toxin molecules as well as in human blood serum can be a reason of the Raman background. The model of the background photobleaching is proposed. The differences in photobleaching kinetics in the cases of cw and pulsed laser radiation are discussed. It is shown that Raman background photobleaching can be very informative for cancer diagnostics.

  4. Key Odorants Regulate Food Attraction in Drosophila melanogaster

    PubMed Central

    Giang, Thomas; He, Jianzheng; Belaidi, Safaa; Scholz, Henrike

    2017-01-01

    In insects, the search for food is highly dependent on olfactory sensory input. Here, we investigated whether a single key odorant within an odor blend or the complexity of the odor blend influences the attraction of Drosophila melanogaster to a food source. A key odorant is defined as an odorant that elicits a difference in the behavioral response when two similar complex odor blends are offered. To validate that the observed behavioral responses were elicited by olfactory stimuli, we used olfactory co-receptor Orco mutants. We show that within a food odor blend, ethanol functions as a key odorant. In addition to ethanol other odorants might serve as key odorants at specific concentrations. However, not all odorants are key odorants. The intensity of the odor background influences the attractiveness of the key odorants. Increased complexity is only more attractive in a concentration-dependent range for single compounds in a blend. Orco is necessary to discriminate between two similarly attractive odorants when offered as single odorants and in food odor blends, supporting the importance of single odorant recognition in odor blends. These data strongly indicate that flies use more than one strategy to navigate to a food odor source, depending on the availability of key odorants in the odor blend and the alternative odor offered. PMID:28928642

  5. Quantum key distribution with prepare-and-measure Bell test

    PubMed Central

    Tan, Yong-gang

    2016-01-01

    The prepare-and-measure quantum key distribution (QKD) has the merits of fast speed, high key generation rate, and easy implementation. However, the detector side channel attacks greatly undermine the security of the key bits. The eavesdropper, Eve, exploits the flaws of the detectors to obtain illegal information without violating quantum principles. It means that she can intervene in the communication without being detected. A prepare-and-measure Bell test protocol will be proposed. By randomly carrying out Bell test at the side of the information receiver, Bob, Eve’s illegal information gain within the detector side channel attack can be well bounded. This protocol does not require any improvement on the detectors used in available prepare-and-measure QKD. Though we only illustrate its application in the BB84 protocol, it is applicable for any prepare-and-measure QKD. PMID:27733771

  6. High-efficiency reconciliation for continuous variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bai, Zengliang; Yang, Shenshen; Li, Yongmin

    2017-04-01

    Quantum key distribution (QKD) is the most mature application of quantum information technology. Information reconciliation is a crucial step in QKD and significantly affects the final secret key rates shared between two legitimate parties. We analyze and compare various construction methods of low-density parity-check (LDPC) codes and design high-performance irregular LDPC codes with a block length of 106. Starting from these good codes and exploiting the slice reconciliation technique based on multilevel coding and multistage decoding, we realize high-efficiency Gaussian key reconciliation with efficiency higher than 95% for signal-to-noise ratios above 1. Our demonstrated method can be readily applied in continuous variable QKD.

  7. Background oriented schlieren in a density stratified fluid.

    PubMed

    Verso, Lilly; Liberzon, Alex

    2015-10-01

    Non-intrusive quantitative fluid density measurement methods are essential in the stratified flow experiments. Digital imaging leads to synthetic schlieren methods in which the variations of the index of refraction are reconstructed computationally. In this study, an extension to one of these methods, called background oriented schlieren, is proposed. The extension enables an accurate reconstruction of the density field in stratified liquid experiments. Typically, the experiments are performed by the light source, background pattern, and the camera positioned on the opposite sides of a transparent vessel. The multimedia imaging through air-glass-water-glass-air leads to an additional aberration that destroys the reconstruction. A two-step calibration and image remapping transform are the key components that correct the images through the stratified media and provide a non-intrusive full-field density measurements of transparent liquids.

  8. Beyond scene gist: Objects guide search more than scene background.

    PubMed

    Koehler, Kathryn; Eckstein, Miguel P

    2017-06-01

    Although the facilitation of visual search by contextual information is well established, there is little understanding of the independent contributions of different types of contextual cues in scenes. Here we manipulated 3 types of contextual information: object co-occurrence, multiple object configurations, and background category. We isolated the benefits of each contextual cue to target detectability, its impact on decision bias, confidence, and the guidance of eye movements. We find that object-based information guides eye movements and facilitates perceptual judgments more than scene background. The degree of guidance and facilitation of each contextual cue can be related to its inherent informativeness about the target spatial location as measured by human explicit judgments about likely target locations. Our results improve the understanding of the contributions of distinct contextual scene components to search and suggest that the brain's utilization of cues to guide eye movements is linked to the cue's informativeness about the target's location. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  9. The Teaching Profession against the Background of Educationalisation: An Exploratory Study

    ERIC Educational Resources Information Center

    Hooge, Edith Helena; Honingh, Marlies Elisabeth; Langelaan, Berber Nadia

    2011-01-01

    This article focuses on the teaching profession against the background of educationalisation in the Netherlands in the sense that Dutch schools are increasingly regarded as focal points at which to address and solve social issues. Our research project concentrated on the extent to which teachers, being key figures in the school organisation,…

  10. Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Rasoolzadegan, Abbas

    2016-11-01

    Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.

  11. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    NASA Astrophysics Data System (ADS)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  12. Music performance and the perception of key.

    PubMed

    Thompson, W F; Cuddy, L L

    1997-02-01

    The effect of music performance on perceived key movement was examined. Listeners judged key movement in sequences presented without performance expression (mechanical) in Experiment 1 and with performance expression in Experiment 2. Modulation distance varied. Judgments corresponded to predictions based on the cycle of fifths and toroidal models of key relatedness, with the highest correspondence for performed versions with the toroidal model. In Experiment 3, listeners compared mechanical sequences with either performed sequences or modifications of performed sequences. Modifications preserved expressive differences between chords, but not between voices. Predictions from Experiments 1 and 2 held only for performed sequences, suggesting that differences between voices are informative of key movement. Experiment 4 confirmed that modifications did not disrupt musicality. Analyses of performances further suggested a link between performance expression and key.

  13. Key Words in Instruction. The Student Information Scientist, Part I

    ERIC Educational Resources Information Center

    Callison, Daniel

    2005-01-01

    Information literacy standards for student learning, indicators for student performance, and hundreds of collaborative lesson plans around the country give some indication of the skills students are expected to master as effective and efficient users of information. Hopefully the goal is that all involved in information literacy education become…

  14. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.

    PubMed

    Ali, Aftab; Khan, Farrukh Aslam

    2014-05-01

    Information and communication technologies have thrived over the last few years. Healthcare systems have also benefited from this progression. A wireless body area network (WBAN) consists of small, low-power sensors used to monitor human physiological values remotely, which enables physicians to remotely monitor the health of patients. Communication security in WBANs is essential because it involves human physiological data. Key agreement and authentication are the primary issues in the security of WBANs. To agree upon a common key, the nodes exchange information with each other using wireless communication. This information exchange process must be secure enough or the information exchange should be minimized to a certain level so that if information leak occurs, it does not affect the overall system. Most of the existing solutions for this problem exchange too much information for the sake of key agreement; getting this information is sufficient for an attacker to reproduce the key. Set reconciliation is a technique used to reconcile two similar sets held by two different hosts with minimal communication complexity. This paper presents a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The proposed scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from the electrocardiogram (EKG) feature set of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Because of the limited information exchange, if an attacker gets the information in any way, he/she will not be able to reproduce the key. The proposed scheme mitigates replay, selective forwarding, and denial of service attacks using a challenge-response authentication mechanism. The simulation results show that the proposed scheme has a great deal of

  15. Unexploded ordnance issues at Aberdeen Proving Ground: Background information

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rosenblatt, D.H.

    1996-11-01

    This document summarizes currently available information about the presence and significance of unexploded ordnance (UXO) in the two main areas of Aberdeen Proving Ground: Aberdeen Area and Edgewood Area. Known UXO in the land ranges of the Aberdeen Area consists entirely of conventional munitions. The Edgewood Area contains, in addition to conventional munitions, a significant quantity of chemical-munition UXO, which is reflected in the presence of chemical agent decomposition products in Edgewood Area ground-water samples. It may be concluded from current information that the UXO at Aberdeen Proving Ground has not adversely affected the environment through release of toxic substancesmore » to the public domain, especially not by water pathways, and is not likely to do so in the near future. Nevertheless, modest but periodic monitoring of groundwater and nearby surface waters would be a prudent policy.« less

  16. Putting Information on the Corporate Agenda as a Key Resource.

    ERIC Educational Resources Information Center

    Piggott, Sylvia E. A.

    To help understand the trends, strategies, structure, and new skills that will be required by the information professional in this changing global environment, this paper examines the future of the library and information profession and the impact that information technology is having on the discipline. The paper focuses on the online delivery of…

  17. Information and professional support: key factors in the provision of family-centred early childhood intervention services.

    PubMed

    Fordham, L; Gibson, F; Bowes, J

    2012-09-01

    Much has been written on the principles of family-centred practice and on the service delivery methods and skills required of its practitioners. Far less has been written from the perspective of families whose children have a disability. The aims of this study were twofold: firstly to understand families' experiences of family-centred early childhood intervention services and secondly to explore other factors that might impact on these experiences. One hundred and thirty families attending two established early childhood intervention services in New South Wales, Australia completed a survey incorporating the Measure of Processes of Care-56, the Family Empowerment Scale, the Family Support Scale and the Parenting Daily Hassles Scale. Consistent with previous research using the Measure of Processes of Care-56, 'respectful and supportive care' was the domain of care families rated to occur most and 'provision of general information' was the domain they rated to occur least. Significant positive relationships existed between families' ratings of family-centred care and feelings of empowerment. Being provided with general information was strongly correlated with family empowerment. Families' social support networks played an important role but support from professionals was most strongly correlated with families' experiences of family-centred care. Finally, families whose children's early intervention services were co-ordinated by a professional experienced significantly better care. The provision of general information and professional support are key components of family-centred early childhood intervention services. © 2011 Blackwell Publishing Ltd.

  18. Interactive QR code beautification with full background image embedding

    NASA Astrophysics Data System (ADS)

    Lin, Lijian; Wu, Song; Liu, Sijiang; Jiang, Bo

    2017-06-01

    QR (Quick Response) code is a kind of two dimensional barcode that was first developed in automotive industry. Nowadays, QR code has been widely used in commercial applications like product promotion, mobile payment, product information management, etc. Traditional QR codes in accordance with the international standard are reliable and fast to decode, but are lack of aesthetic appearance to demonstrate visual information to customers. In this work, we present a novel interactive method to generate aesthetic QR code. By given information to be encoded and an image to be decorated as full QR code background, our method accepts interactive user's strokes as hints to remove undesired parts of QR code modules based on the support of QR code error correction mechanism and background color thresholds. Compared to previous approaches, our method follows the intention of the QR code designer, thus can achieve more user pleasant result, while keeping high machine readability.

  19. Authenticated multi-user quantum key distribution with single particles

    NASA Astrophysics Data System (ADS)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  20. Public School Accountability. Background Paper 95-14.

    ERIC Educational Resources Information Center

    Sturm, H. Pepper

    This paper describes the background of various accountability systems, discusses policy issues related to the use of educational accountability information, and offers a history of the school-accountability law in Nevada. The paper concludes that because policymakers continue to express concerns about uniform measurements and comparability, it is…

  1. Identifying the Key Concerns of Irish Persons with Intellectual Disability

    ERIC Educational Resources Information Center

    García Iriarte, Edurne; O'Brien, Patricia; McConkey, Roy; Wolfe, Marie; O'Doherty, Siobhain

    2014-01-01

    Background: Internationally, people with intellectual disability are socially marginalized, and their rights under the United Nations Convention for the Rights of Persons with Disabilities (CRPD) are often ignored. Aims: This paper aims to define the key concerns of adults with an intellectual disability in relation to their participation in…

  2. Fundamental quantitative security in quantum key generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yuen, Horace P.

    2010-12-15

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographicmore » context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.« less

  3. Optimizing Requirements Decisions with KEYS

    NASA Technical Reports Server (NTRS)

    Jalali, Omid; Menzies, Tim; Feather, Martin

    2008-01-01

    Recent work with NASA's Jet Propulsion Laboratory has allowed for external access to five of JPL's real-world requirements models, anonymized to conceal proprietary information, but retaining their computational nature. Experimentation with these models, reported herein, demonstrates a dramatic speedup in the computations performed on them. These models have a well defined goal: select mitigations that retire risks which, in turn, increases the number of attainable requirements. Such a non-linear optimization is a well-studied problem. However identification of not only (a) the optimal solution(s) but also (b) the key factors leading to them is less well studied. Our technique, called KEYS, shows a rapid way of simultaneously identifying the solutions and their key factors. KEYS improves on prior work by several orders of magnitude. Prior experiments with simulated annealing or treatment learning took tens of minutes to hours to terminate. KEYS runs much faster than that; e.g for one model, KEYS ran 13,000 times faster than treatment learning (40 minutes versus 0.18 seconds). Processing these JPL models is a non-linear optimization problem: the fewest mitigations must be selected while achieving the most requirements. Non-linear optimization is a well studied problem. With this paper, we challenge other members of the PROMISE community to improve on our results with other techniques.

  4. Background suppression of infrared small target image based on inter-frame registration

    NASA Astrophysics Data System (ADS)

    Ye, Xiubo; Xue, Bindang

    2018-04-01

    We propose a multi-frame background suppression method for remote infrared small target detection. Inter-frame information is necessary when the heavy background clutters make it difficult to distinguish real targets and false alarms. A registration procedure based on points matching in image patches is used to compensate the local deformation of background. Then the target can be separated by background subtraction. Experiments show our method serves as an effective preliminary of target detection.

  5. In-Home Respite Care Program Development. Background. Coordinator's Manual. Training Manual.

    ERIC Educational Resources Information Center

    Parham, J. D.; And Others

    This volume consists of a background discussion, coordinator's manual, and training manual dealing with developing programs for the in-home respite care (IHRC) of the developmentally disabled. Addressed in the background information unit are the nature of developmental disabilities; program variables, planning, and funding; and practical…

  6. Evaluation of background radiation dose contributions in the United Arab Emirates.

    PubMed

    Goddard, Braden; Bosc, Emmanuel; Al Hasani, Sarra; Lloyd, Cody

    2018-09-01

    The natural background radiation consists of three main components; cosmic, terrestrial, and skyshine. Although there are currently methods available to measure the total dose rate from background radiation, no established methods exist that allow for the measurement of each component the background radiation. This analysis consists of a unique methodology in which the dose rate contribution from each component of the natural background radiation is measured and calculated. This project evaluates the natural background dose rate in the Abu Dhabi City region from all three of these components using the developed methodology. Evaluating and understanding the different components of background radiation provides a baseline allowing for the detection, and possibly attribution, of elevated radiation levels. Measurements using a high-pressure ion chamber with different shielding configurations and two offshore measurements provided dose rate information that were attributed to the different components of the background radiation. Additional spectral information was obtained using an HPGe detector to verify and quantify the presence of terrestrial radionuclides. By evaluating the dose rates of the different shielding configurations the comic, terrestrial, and skyshine contribution in the Abu Dhabi City region were determined to be 33.0 ± 1.7, 15.7 ± 2.5, and 2.4 ± 2.1 nSv/h, respectively. Copyright © 2018. Published by Elsevier Ltd.

  7. Backgrounds, radiation damage, and spacecraft orbits

    NASA Astrophysics Data System (ADS)

    Grant, Catherine E.; Miller, Eric D.; Bautz, Mark W.

    2017-08-01

    The scientific utility of any space-based observatory can be limited by the on-orbit charged particle background and the radiation-induced damage. All existing and proposed missions have had to make choices about orbit selection, trading off the radiation environment against other factors. We present simulations from ESA’s SPace ENVironment Information System (SPENVIS) of the radiation environment for spacecraft in a variety of orbits, from Low Earth Orbit (LEO) at multiple inclinations to High Earth Orbit (HEO) to Earth-Sun L2 orbit. We summarize how different orbits change the charged particle background and the radiation damage to the instrument. We also discuss the limitations of SPENVIS simulations, particularly outside the Earth’s trapped radiation and point to new resources attempting to address those limitations.

  8. Key Working for Families with Young Disabled Children

    PubMed Central

    Carter, Bernie; Thomas, Megan

    2011-01-01

    For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop). Data were collected from 43 participants (parents, key workers, and other stakeholders). All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals, and other

  9. 25 CFR 558.3 - Procedures for forwarding applications and reports for key employees and primary management...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... INDIAN GAMING COMMISSION, DEPARTMENT OF THE INTERIOR GAMING LICENSES AND BACKGROUND INVESTIGATIONS FOR KEY EMPLOYEES AND PRIMARY MANAGEMENT OFFICIALS GAMING LICENSES FOR KEY EMPLOYEES AND PRIMARY... at a gaming operation, a tribe shall: (1) Forward to the Commission a completed application for...

  10. Establishing security of quantum key distribution without monitoring disturbance

    NASA Astrophysics Data System (ADS)

    Koashi, Masato

    2015-10-01

    In conventional quantum key distribution (QKD) protocols, the information leak to an eavesdropper is estimated through the basic principle of quantum mechanics dictated in the original version of Heisenberg's uncertainty principle. The amount of leaked information on a shared sifted key is bounded from above essentially by using information-disturbance trade-off relations, based on the amount of signal disturbance measured via randomly sampled or inserted probe signals. Here we discuss an entirely different avenue toward the private communication, which does not rely on the information disturbance trade-off relations and hence does not require a monitoring of signal disturbance. The independence of the amount of privacy amplification from that of disturbance tends to give it a high tolerance on the channel noises. The lifting of the burden of precise statistical estimation of disturbance leads to a favorable finite-key-size effect. A protocol based on the novel principle can be implemented by only using photon detectors and classical optics tools: a laser, a phase modulator, and an interferometer. The protocol resembles the differential-phase-shift QKD protocol in that both share a simple binary phase shift keying on a coherent train of weak pulses from a laser. The difference lies in the use of a variable-delay interferometer in the new protocol, which randomly changes the combination of pulse pairs to be superposed. This extra randomness has turned out to be enough to upper-bound the information extracted by the eavesdropper, regardless of how they have disturbed the quantum signal.

  11. Measurement-device-independent semiquantum key distribution

    NASA Astrophysics Data System (ADS)

    He, Jinjun; Li, Qin; Wu, Chunhui; Chan, Wai Hong; Zhang, Shengyu

    Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited quantum capability. Almost all existing SQKD protocols have been proved to be robust in theory, namely that if an eavesdropper tries to gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist in reality and their imperfection may result in side-channel attacks, which can be used by an adversary to get some information on the secret key string. In this paper, we design a measurement-device-independent SQKD protocol for the first time, which can remove the threat of all detector side-channel attacks and show that it is also robust. In addition, we discuss the possible use of the proposed protocol in real-world applications and in QKD networks.

  12. The Cosmic Infrared Background Experiment (CIBER): A Sounding Rocket Payload to Study the near Infrared Extragalactic Background Light

    NASA Astrophysics Data System (ADS)

    Zemcov, M.; Arai, T.; Battle, J.; Bock, J.; Cooray, A.; Hristov, V.; Keating, B.; Kim, M. G.; Lee, D. H.; Levenson, L. R.; Mason, P.; Matsumoto, T.; Matsuura, S.; Nam, U. W.; Renbarger, T.; Sullivan, I.; Suzuki, K.; Tsumura, K.; Wada, T.

    2013-08-01

    The Cosmic Infrared Background Experiment (CIBER) is a suite of four instruments designed to study the near infrared (IR) background light from above the Earth's atmosphere. The instrument package comprises two imaging telescopes designed to characterize spatial anisotropy in the extragalactic IR background caused by cosmological structure during the epoch of reionization, a low resolution spectrometer to measure the absolute spectrum of the extragalactic IR background, and a narrow band spectrometer optimized to measure the absolute brightness of the zodiacal light foreground. In this paper we describe the design and characterization of the CIBER payload. The detailed mechanical, cryogenic, and electrical design of the system are presented, including all system components common to the four instruments. We present the methods and equipment used to characterize the instruments before and after flight, and give a detailed description of CIBER's flight profile and configurations. CIBER is designed to be recoverable and has flown four times, with modifications to the payload having been informed by analysis of the first flight data. All four instruments performed to specifications during the subsequent flights, and the scientific data from these flights are currently being analyzed.

  13. THE COSMIC INFRARED BACKGROUND EXPERIMENT (CIBER): A SOUNDING ROCKET PAYLOAD TO STUDY THE NEAR INFRARED EXTRAGALACTIC BACKGROUND LIGHT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zemcov, M.; Bock, J.; Hristov, V.

    2013-08-15

    The Cosmic Infrared Background Experiment (CIBER) is a suite of four instruments designed to study the near infrared (IR) background light from above the Earth's atmosphere. The instrument package comprises two imaging telescopes designed to characterize spatial anisotropy in the extragalactic IR background caused by cosmological structure during the epoch of reionization, a low resolution spectrometer to measure the absolute spectrum of the extragalactic IR background, and a narrow band spectrometer optimized to measure the absolute brightness of the zodiacal light foreground. In this paper we describe the design and characterization of the CIBER payload. The detailed mechanical, cryogenic, andmore » electrical design of the system are presented, including all system components common to the four instruments. We present the methods and equipment used to characterize the instruments before and after flight, and give a detailed description of CIBER's flight profile and configurations. CIBER is designed to be recoverable and has flown four times, with modifications to the payload having been informed by analysis of the first flight data. All four instruments performed to specifications during the subsequent flights, and the scientific data from these flights are currently being analyzed.« less

  14. Psychologists as Witnesses: Background and Good Practice in the Delivery of Evidence

    ERIC Educational Resources Information Center

    Ireland, Jane L.

    2008-01-01

    An outline of the background to the provision of psychological evidence within legal settings will be provided, with attention to formal and quasi-court settings (e.g., tribunals). Key points of relevance to psychologists and to educational psychologists in particular will be illustrated, including guidelines for defendable written and oral…

  15. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2016-03-10

    Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing 2 | P a g e Approved for public release; distribution is...we have continued work calculating the key rates achievable parametrically with receiver performance. In addition, we describe the initial designs

  16. Egypt: Background and U.S. Relations

    DTIC Science & Technology

    2009-05-12

    contributions from Germany , Japan, and Switzerland. For more information on the MFO, see http://www.mfo.org/Default.asp?bhcp=1. Egypt: Background and...2008 Report, Egypt’s pace of business reforms and deregulation between 2006 and 2007 ranked first worldwide. In recent years, the state has...reinvigorated its privatization program by divesting shares in the state-dominated banking and insurance sectors. Additionally, the government removed import

  17. Eavesdropping on counterfactual quantum key distribution with finite resources

    NASA Astrophysics Data System (ADS)

    Liu, Xingtong; Zhang, Bo; Wang, Jian; Tang, Chaojing; Zhao, Jingjing; Zhang, Sheng

    2014-08-01

    A striking scheme called "counterfactual quantum cryptography" gives a conceptually new approach to accomplish the task of key distribution. It allows two legitimate parties to share a secret even though a particle carrying secret information is not, in fact, transmitted through the quantum channel. Since an eavesdropper cannot directly access the entire quantum system of each signal particle, the protocol seems to provide practical security advantages. However, here we propose an eavesdropping method which works on the scheme in a finite key scenario. We show that, for practical systems only generating a finite number of keys, the eavesdropping can obtain all of the secret information without being detected. We also present a improved protocol as a countermeasure against this attack.

  18. Optimal attacks on qubit-based Quantum Key Recycling

    NASA Astrophysics Data System (ADS)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  19. From Cleanup to Stewardship. A companion report to Accelerating Cleanup: Paths to Closure and background information to support the scoping process required for the 1998 PEIS Settlement Study

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    1999-10-01

    Long-term stewardship is expected to be needed at more than 100 DOE sites after DOE's Environmental Management program completes disposal, stabilization, and restoration operations to address waste and contamination resulting from nuclear research and nuclear weapons production conducted over the past 50 years. From Cleanup to stewardship provides background information on the Department of Energy (DOE) long-term stewardship obligations and activities. This document begins to examine the transition from cleanup to long-term stewardship, and it fulfills the Secretary's commitment to the President in the 1999 Performance Agreement to provide a companion report to the Department's Accelerating Cleanup: Paths to Closuremore » report. It also provides background information to support the scoping process required for a study on long-term stewardship required by a 1998 Settlement Agreement.« less

  20. Genetic Background is a Key Determinant of Glomerular Extracellular Matrix Composition and Organization.

    PubMed

    Randles, Michael J; Woolf, Adrian S; Huang, Jennifer L; Byron, Adam; Humphries, Jonathan D; Price, Karen L; Kolatsi-Joannou, Maria; Collinson, Sophie; Denny, Thomas; Knight, David; Mironov, Aleksandr; Starborg, Toby; Korstanje, Ron; Humphries, Martin J; Long, David A; Lennon, Rachel

    2015-12-01

    Glomerular disease often features altered histologic patterns of extracellular matrix (ECM). Despite this, the potential complexities of the glomerular ECM in both health and disease are poorly understood. To explore whether genetic background and sex determine glomerular ECM composition, we investigated two mouse strains, FVB and B6, using RNA microarrays of isolated glomeruli combined with proteomic glomerular ECM analyses. These studies, undertaken in healthy young adult animals, revealed unique strain- and sex-dependent glomerular ECM signatures, which correlated with variations in levels of albuminuria and known predisposition to progressive nephropathy. Among the variation, we observed changes in netrin 4, fibroblast growth factor 2, tenascin C, collagen 1, meprin 1-α, and meprin 1-β. Differences in protein abundance were validated by quantitative immunohistochemistry and Western blot analysis, and the collective differences were not explained by mutations in known ECM or glomerular disease genes. Within the distinct signatures, we discovered a core set of structural ECM proteins that form multiple protein-protein interactions and are conserved from mouse to man. Furthermore, we found striking ultrastructural changes in glomerular basement membranes in FVB mice. Pathway analysis of merged transcriptomic and proteomic datasets identified potential ECM regulatory pathways involving inhibition of matrix metalloproteases, liver X receptor/retinoid X receptor, nuclear factor erythroid 2-related factor 2, notch, and cyclin-dependent kinase 5. These pathways may therefore alter ECM and confer susceptibility to disease. Copyright © 2015 by the American Society of Nephrology.

  1. Genetic Background is a Key Determinant of Glomerular Extracellular Matrix Composition and Organization

    PubMed Central

    Randles, Michael J.; Woolf, Adrian S.; Huang, Jennifer L.; Byron, Adam; Humphries, Jonathan D.; Price, Karen L.; Kolatsi-Joannou, Maria; Collinson, Sophie; Denny, Thomas; Knight, David; Mironov, Aleksandr; Starborg, Toby; Korstanje, Ron; Humphries, Martin J.; Long, David A.

    2015-01-01

    Glomerular disease often features altered histologic patterns of extracellular matrix (ECM). Despite this, the potential complexities of the glomerular ECM in both health and disease are poorly understood. To explore whether genetic background and sex determine glomerular ECM composition, we investigated two mouse strains, FVB and B6, using RNA microarrays of isolated glomeruli combined with proteomic glomerular ECM analyses. These studies, undertaken in healthy young adult animals, revealed unique strain- and sex-dependent glomerular ECM signatures, which correlated with variations in levels of albuminuria and known predisposition to progressive nephropathy. Among the variation, we observed changes in netrin 4, fibroblast growth factor 2, tenascin C, collagen 1, meprin 1-α, and meprin 1-β. Differences in protein abundance were validated by quantitative immunohistochemistry and Western blot analysis, and the collective differences were not explained by mutations in known ECM or glomerular disease genes. Within the distinct signatures, we discovered a core set of structural ECM proteins that form multiple protein–protein interactions and are conserved from mouse to man. Furthermore, we found striking ultrastructural changes in glomerular basement membranes in FVB mice. Pathway analysis of merged transcriptomic and proteomic datasets identified potential ECM regulatory pathways involving inhibition of matrix metalloproteases, liver X receptor/retinoid X receptor, nuclear factor erythroid 2-related factor 2, notch, and cyclin-dependent kinase 5. These pathways may therefore alter ECM and confer susceptibility to disease. PMID:25896609

  2. Quantum-locked key distribution at nearly the classical capacity rate.

    PubMed

    Lupo, Cosmo; Lloyd, Seth

    2014-10-17

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  3. Low background screening capability in the UK

    NASA Astrophysics Data System (ADS)

    Ghag, Chamkaur

    2015-08-01

    Low background rare event searches in underground laboratories seeking observation of direct dark matter interactions or neutrino-less double beta decay have the potential to profoundly advance our understanding of the physical universe. Successful results from these experiments depend critically on construction from extremely radiologically clean materials and accurate knowledge of subsequent low levels of expected background. The experiments must conduct comprehensive screening campaigns to reduce radioactivity from detector components, and these measurements also inform detailed characterisation and quantification of background sources and their impact, necessary to assign statistical significance to any potential discovery. To provide requisite sensitivity for material screening and characterisation in the UK to support our rare event search activities, we have re-developed our infrastructure to add ultra-low background capability across a range of complementary techniques that collectively allow complete radioactivity measurements. Ultra-low background HPGe and BEGe detectors have been installed at the Boulby Underground Laboratory, itself undergoing substantial facility re-furbishment, to provide high sensitivity gamma spectroscopy in particular for measuring the uranium and thorium decay series products. Dedicated low-activity mass spectrometry instrumentation has been developed at UCL for part per trillion level contaminant identification to complement underground screening with direct U and Th measurements, and meet throughput demands. Finally, radon emanation screening at UCL measures radon background inaccessible to gamma or mass spectrometry techniques. With this new capability the UK is delivering half of the radioactivity screening for the LZ dark matter search experiment.

  4. Cephalopod dynamic camouflage: bridging the continuum between background matching and disruptive coloration

    PubMed Central

    Hanlon, R.T.; Chiao, C.-C.; Mäthger, L.M.; Barbosa, A.; Buresch, K.C.; Chubb, C.

    2008-01-01

    Individual cuttlefish, octopus and squid have the versatile capability to use body patterns for background matching and disruptive coloration. We define—qualitatively and quantitatively—the chief characteristics of the three major body pattern types used for camouflage by cephalopods: uniform and mottle patterns for background matching, and disruptive patterns that primarily enhance disruptiveness but aid background matching as well. There is great variation within each of the three body pattern types, but by defining their chief characteristics we lay the groundwork to test camouflage concepts by correlating background statistics with those of the body pattern. We describe at least three ways in which background matching can be achieved in cephalopods. Disruptive patterns in cuttlefish possess all four of the basic components of ‘disruptiveness’, supporting Cott's hypotheses, and we provide field examples of disruptive coloration in which the body pattern contrast exceeds that of the immediate surrounds. Based upon laboratory testing as well as thousands of images of camouflaged cephalopods in the field (a sample is provided on a web archive), we note that size, contrast and edges of background objects are key visual cues that guide cephalopod camouflage patterning. Mottle and disruptive patterns are frequently mixed, suggesting that background matching and disruptive mechanisms are often used in the same pattern. PMID:19008200

  5. Background factors related to and/or influencing occupation in mentally disordered offenders.

    PubMed

    Lindstedt, Helena; Ivarsson, Ann-Britt; Söderlund, Anne

    2006-09-01

    Knowledge of background and occupational related factors of mentally disordered offenders are missing. It is essential to understand these issues when planning discharge from forensic psychiatric hospital care to enable community dwelling. One aim was to investigate mentally disordered offenders' background factors, confidence in and how they value occupations. Another aim was to investigate MDOs background factors' in relation to and the influences on Occupational Performance and Social Participation. Data was collected with an explorative, correlative design after informed consent, from 74 mentally disordered offenders (mean age 34,2) cared for in forensic psychiatric hospitals. Assessments were Allen Cognitive Level Screen, Capability to Perform Daily Occupations, Interview Schedule of Social Interaction, Manchester Short Assessment of Quality of Life, Self-efficacy Scale and Importance scale. Eight background factors were assembled from the individual forensic psychiatric investigation. Most of the investigated background factors relate to and half of them influence occupational performance, particular the cognitive aspect of occupational performance. The influences on occupation originate from adulthood, such as suffering from schizophrenia, psycho/social problems, and having performed violent crimes. These findings indicate that staff in forensic hospital care should initiate rehabilitation with knowledge about MDOs' complex daily occupations. For avoiding information bias, information gathering preceding treatment planning should be performed in collaboration between caring staff and mentally disordered offenders.

  6. Lessons Learned from Research about Informal Reading Inventories: Keys to Data-Driven Instructional Recommendations

    ERIC Educational Resources Information Center

    L'Allier, Susan K.

    2013-01-01

    This study examined how effectively candidates in an MSEd in literacy education with a focus on reading program used the results from the Basic Reading Inventory to develop key instructional recommendations. The results indicated that, overall, candidates made about two thirds of the key recommendations suggested by an expert in the area of…

  7. 76 FR 67182 - Agency Information Collection Activities; Proposed Collection; Comment Request; Background Checks...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-31

    ... Employees (Renewal) and Drug Testing for Contract Employees (Renewal) AGENCY: Environmental Protection...: EPA-HQ-OARM-2-11-0804, Drug Testing for Contractor Employees. Hand Delivery: EPA Docket Center... provide qualified personnel that meet the background check and drug testing requirements developed by EPA...

  8. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2015-05-27

    Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...2016 4. TITLE AND SUBTITLE Seaworthy Quantum Key Distribution Design and Validation (SEAKEY) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM

  9. Counterfactual attack on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wnang, Jian; Tang, Chao Jing

    2012-05-01

    It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.

  10. Information systems: the key to evidence-based health practice.

    PubMed Central

    Rodrigues, R. J.

    2000-01-01

    Increasing prominence is being given to the use of best current evidence in clinical practice and health services and programme management decision-making. The role of information in evidence-based practice (EBP) is discussed, together with questions of how advanced information systems and technology (IS&T) can contribute to the establishment of a broader perspective for EBP. The author examines the development, validation and use of a variety of sources of evidence and knowledge that go beyond the well-established paradigm of research, clinical trials, and systematic literature review. Opportunities and challenges in the implementation and use of IS&T and knowledge management tools are examined for six application areas: reference databases, contextual data, clinical data repositories, administrative data repositories, decision support software, and Internet-based interactive health information and communication. Computerized and telecommunications applications that support EBP follow a hierarchy in which systems, tasks and complexity range from reference retrieval and the processing of relatively routine transactions, to complex "data mining" and rule-driven decision support systems. PMID:11143195

  11. An Iterative Information-Reduced Quadriphase-Shift-Keyed Carrier Synchronization Scheme Using Decision Feedback for Low Signal-to-Noise Ratio Applications

    NASA Technical Reports Server (NTRS)

    Simon, M.; Tkacenko, A.

    2006-01-01

    In a previous publication [1], an iterative closed-loop carrier synchronization scheme for binary phase-shift keyed (BPSK) modulation was proposed that was based on feeding back data decisions to the input of the loop, the purpose being to remove the modulation prior to carrier synchronization as opposed to the more conventional decision-feedback schemes that incorporate such feedback inside the loop. The idea there was that, with sufficient independence between the received data and the decisions on it that are fed back (as would occur in an error-correction coding environment with sufficient decoding delay), a pure tone in the presence of noise would ultimately be produced (after sufficient iteration and low enough error probability) and thus could be tracked without any squaring loss. This article demonstrates that, with some modification, the same idea of iterative information reduction through decision feedback can be applied to quadrature phase-shift keyed (QPSK) modulation, something that was mentioned in the previous publication but never pursued.

  12. Background Materials for Chairman's Workshop. 5th Edition.

    ERIC Educational Resources Information Center

    Kimble, Gregory A.

    Information for newly appointed heads of graduate departments of psychology is presented as background material for the 1974 Chairman's Workshop. Topics include the following: the budgetary situation, pressures for increased teaching loads, effects upon recruiting faculty, faculty morale, graduate and undergraduate student morale, the intellectual…

  13. Triple symmetric key cryptosystem for data security

    NASA Astrophysics Data System (ADS)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  14. Precise predictions for V+jets dark matter backgrounds

    NASA Astrophysics Data System (ADS)

    Lindert, J. M.; Pozzorini, S.; Boughezal, R.; Campbell, J. M.; Denner, A.; Dittmaier, S.; Gehrmann-De Ridder, A.; Gehrmann, T.; Glover, N.; Huss, A.; Kallweit, S.; Maierhöfer, P.; Mangano, M. L.; Morgan, T. A.; Mück, A.; Petriello, F.; Salam, G. P.; Schönherr, M.; Williams, C.

    2017-12-01

    High-energy jets recoiling against missing transverse energy (MET) are powerful probes of dark matter at the LHC. Searches based on large MET signatures require a precise control of the Z(ν {\\bar{ν }})+ jet background in the signal region. This can be achieved by taking accurate data in control regions dominated by Z(ℓ ^+ℓ ^-)+ jet, W(ℓ ν )+ jet and γ + jet production, and extrapolating to the Z(ν {\\bar{ν }})+ jet background by means of precise theoretical predictions. In this context, recent advances in perturbative calculations open the door to significant sensitivity improvements in dark matter searches. In this spirit, we present a combination of state-of-the-art calculations for all relevant V+ jets processes, including throughout NNLO QCD corrections and NLO electroweak corrections supplemented by Sudakov logarithms at two loops. Predictions at parton level are provided together with detailed recommendations for their usage in experimental analyses based on the reweighting of Monte Carlo samples. Particular attention is devoted to the estimate of theoretical uncertainties in the framework of dark matter searches, where subtle aspects such as correlations across different V+ jet processes play a key role. The anticipated theoretical uncertainty in the Z(ν {\\bar{ν }})+ jet background is at the few percent level up to the TeV range.

  15. Ten Keys to the Portal

    ERIC Educational Resources Information Center

    Schaffhauser, Dian

    2011-01-01

    Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…

  16. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  17. Why background colour matters to bees and flowers.

    PubMed

    Bukovac, Zoë; Shrestha, Mani; Garcia, Jair E; Burd, Martin; Dorin, Alan; Dyer, Adrian G

    2017-05-01

    Flowers are often viewed by bee pollinators against a variety of different backgrounds. On the Australian continent, backgrounds are very diverse and include surface examples of all major geological stages of the Earth's history, which have been present during the entire evolutionary period of Angiosperms. Flower signals in Australia are also representative of typical worldwide evolutionary spectral adaptations that enable successful pollination. We measured the spectral properties of 581 natural surfaces, including rocks, sand, green leaves, and dry plant materials, sampled from tropical Cairns through to the southern tip of mainland Australia. We modelled in a hexagon colour space, how interactions between background spectra and flower-like colour stimuli affect reliable discrimination and detection in bee pollinators. We calculated the extent to which a given locus would be conflated with the loci of a different flower-colour stimulus using empirically determined colour discrimination regions for bee vision. Our results reveal that whilst colour signals are robust in homogeneous background viewing conditions, there could be significant pressure on plant flowers to evolve saliently-different colours to overcome background spectral noise. We thus show that perceptual noise has a large influence on how colour information can be used in natural conditions.

  18. Key strategies to improve systems for managing patient complaints within health facilities – what can we learn from the existing literature?

    PubMed Central

    2018-01-01

    ABSTRACT Background: Information from patient complaints – a widely accepted measure of patient satisfaction with services – can inform improvements in service quality, and contribute towards overall health systems performance. While analyses of data from patient complaints received much emphasis, there is limited published literature on key interventions to improve complaint management systems. Objectives: The objectives are two-fold: first, to synthesise existing evidence and provide practical options to inform future policy and practice and, second, to identify key outstanding gaps in the existing literature to inform agenda for future research. Methods: We report results of review of the existing literature. Peer-reviewed published literature was searched in OVID Medline, OVID Global Health and PubMed. In addition, relevant citations from the reviewed articles were followed up, and we also report grey literature from the UK and the Netherlands. Results: Effective interventions can improve collection of complaints (e.g. establishing easy-to-use channels and raising patients’ awareness of these), analysis of complaint data (e.g. creating structures and spaces for analysis and learning from complaints data), and subsequent action (e.g. timely feedback to complainants and integrating learning from complaints into service quality improvement). No one single measure can be sufficient, and any intervention to improve patient complaint management system must include different components, which need to be feasible, effective, scalable, and sustainable within local context. Conclusions: Effective interventions to strengthen patient complaints systems need to be: comprehensive, integrated within existing systems, context-specific and cognizant of the information asymmetry and the unequal power relations between the key actors. Four gaps in the published literature represent an agenda for future research: limited understanding of contexts of effective interventions

  19. High key rate continuous-variable quantum key distribution with a real local oscillator.

    PubMed

    Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Ma, Hongxin; Wang, Shiyu; Zeng, Guihua

    2018-02-05

    Continuous-variable quantum key distribution (CVQKD) with a real local oscillator (LO) has been extensively studied recently due to its security and simplicity. In this paper, we propose a novel implementation of a high-key-rate CVQKD with a real LO. Particularly, with the help of the simultaneously generated reference pulse, the phase drift of the signal is tracked in real time and then compensated. By utilizing the time and polarization multiplexing techniques to isolate the reference pulse and controlling the intensity of it, not only the contamination from it is suppressed, but also a high accuracy of the phase compensation can be guaranteed. Besides, we employ homodyne detection on the signal to ensure the high quantum efficiency and heterodyne detection on the reference pulse to acquire the complete phase information of it. In order to suppress the excess noise, a theoretical noise model for our scheme is established. According to this model, the impact of the modulation variance and the intensity of the reference pulse are both analysed theoretically and then optimized according to the experimental data. By measuring the excess noise in the 25km optical fiber transmission system, a 3.14Mbps key rate in the asymptotic regime proves to be achievable. This work verifies the feasibility of the high-key-rate CVQKD with a real LO within the metropolitan area.

  20. Roles and responsibilities of pharmacists with respect to natural health products: key informant interviews.

    PubMed

    Olatunde, Shade; Boon, Heather; Hirschkorn, Kristine; Welsh, Sandy; Bajcar, Jana

    2010-03-01

    Although many pharmacies sell natural health products (NHPs), there is no clear definition as to the roles and responsibilities (if any) of pharmacists with respect to these products. The purpose of this study was to explore pharmacy and stakeholder leaders' perceptions of pharmacists' professional NHP roles and responsibilities. Semi-structured key informant interviews were conducted with pharmacy leaders (n=17) and stakeholder (n=18) leaders representing consumers, complementary and alternative medicine practitioners, conventional health care practitioners, and industry across Canada. All participants believed a main NHP responsibility for pharmacists was in safety monitoring, although a one challenge identified in the interviews was pharmacists' general lack of NHP knowledge; however, stakeholder leaders did not expect pharmacists to be experts, but should have a basic level of knowledge about NHPs. Participants described pharmacists' professional roles and responsibilities for NHPs as similar to those for over-the-counter drugs; more awareness of existing NHP-related pharmacy policies is needed, and pharmacy owners/managers should provide additional training to ensure front-line pharmacists have appropriate knowledge of NHPs sold in the pharmacy. Copyright 2010 Elsevier Inc. All rights reserved.

  1. Development of Performance Dashboards in Healthcare Sector: Key Practical Issues

    PubMed Central

    Ghazisaeidi, Marjan; Safdari, Reza; Torabi, Mashallah; Mirzaee, Mahboobeh; Farzi, Jebraeil; Goodini, Azadeh

    2015-01-01

    Background: Static nature of performance reporting systems in health care sector has resulted in inconsistent, incomparable, time consuming, and static performance reports that are not able to transparently reflect a round picture of performance and effectively support healthcare managers’ decision makings. So, the healthcare sector needs interactive performance management tools such as performance dashboards to measure, monitor, and manage performance more effectively. The aim of this article was to identify key issues that need to be addressed for developing high-quality performance dashboards in healthcare sector. Methods: A literature review was established to search electronic research databases, e-journals collections, and printed journals, books, dissertations, and theses for relevant articles. The search strategy interchangeably used the terms of “dashboard”, “performance measurement system”, and “executive information system” with the term of “design” combined with operator “AND”. Search results (n=250) were adjusted for duplications, screened based on their abstract relevancy and full-text availability (n=147) and then assessed for eligibility (n=40). Eligible articles were included if they had explicitly focused on dashboards, performance measurement systems or executive information systems design. Finally, 28 relevant articles included in the study. Results: Creating high-quality performance dashboards requires addressing both performance measurement and executive information systems design issues. Covering these two fields, identified contents were categorized to four main domains: KPIs development, Data Sources and data generation, Integration of dashboards to source systems, and Information presentation issues. Conclusion: This study implies the main steps to develop dashboards for the purpose of performance management. Performance dashboards developed on performance measurement and executive information systems principles and

  2. Detecting the Stochastic Gravitational-Wave Background

    NASA Astrophysics Data System (ADS)

    Colacino, Carlo Nicola

    2017-12-01

    The stochastic gravitational-wave background (SGWB) is by far the most difficult source of gravitational radiation detect. At the same time, it is the most interesting and intriguing one. This book describes the initial detection of the SGWB and describes the underlying mathematics behind one of the most amazing discoveries of the 21st century. On the experimental side it would mean that interferometric gravitational wave detectors work even better than expected. On the observational side, such a detection could give us information about the very early Universe, information that could not be obtained otherwise. Even negative results and improved upper bounds could put constraints on many cosmological and particle physics models.

  3. Trustworthiness of detectors in quantum key distribution with untrusted detectors

    DOE PAGES

    Qi, Bing

    2015-02-25

    Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been demonstrated as a viable solution to detector side-channel attacks. One of the main advantages of MDI-QKD is that the security can be proved without making any assumptions about how the measurement device works. The price to pay is the relatively low secure key rate comparing with conventional quantum key distribution (QKD), such as the decoy-state BB84 protocol. Recently a new QKD protocol, aiming at bridging the strong security of MDI-QKD with the high e ciency of conventional QKD, has been proposed. In this protocol, the legitimate receiver employs a trusted linear opticsmore » network to encode information on photons received from an insecure quantum channel, and then performs a Bell state measurement (BSM) using untrusted detectors. One crucial assumption made in most of these studies is that the untrusted BSM located inside the receiver's laboratory cannot send any unwanted information to the outside. Here in this paper, we show that if the BSM is completely untrusted, a simple scheme would allow the BSM to send information to the outside. Combined with Trojan horse attacks, this scheme could allow Eve to gain information of the quantum key without being detected. Ultimately, to prevent the above attack, either countermeasures to Trojan horse attacks or some trustworthiness to the "untrusted" BSM device is required.« less

  4. Diffuse neutrino supernova background as a cosmological test

    NASA Astrophysics Data System (ADS)

    Barranco, J.; Bernal, A.; Delepine, D.

    2018-05-01

    The future detection and measurement of the diffuse neutrino supernova background will provide us with information about supernova neutrino emission and the cosmic core-collapse supernova rate. Little has been said about the information that this measurement could give us about the expansion history of the Universe. The purpose of this article is to study the change of the predicted diffuse supernova neutrino background as a function of the cosmological model. In particular, we study three different models: the Λ–Cold Dark Matter model, the Logotropic universe and a bulk viscous matter-dominated universe. By fitting the free parameters of each model with the supernova Ia probe, we calculate the predicted number of events in these three models. We found that the spectra and number of events for the Λ–Cold dark matter model and the Logotropic model are almost indistinguishable, while a bulk viscous matter-dominated cosmological model predicts more events.

  5. Adult Literacy Information and Evaluation System (ALIES): Background, Status and Future Directions.

    ERIC Educational Resources Information Center

    Cook, Jacqueline; And Others

    This document describes the Adult Literacy Information and Evaluation System (ALIES), which is the management information system for New York City's citywide adult education program expansion effort begun in 1984. Chapter 1 describes the organization's creation in order to provide timely and reliable information to funders about the effects of the…

  6. Study on the security of the authentication scheme with key recycling in QKD

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu

    2016-09-01

    In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.

  7. Bound entangled states with a private key and their classical counterpart.

    PubMed

    Ozols, Maris; Smith, Graeme; Smolin, John A

    2014-03-21

    Entanglement is a fundamental resource for quantum information processing. In its pure form, it allows quantum teleportation and sharing classical secrets. Realistic quantum states are noisy and their usefulness is only partially understood. Bound-entangled states are central to this question--they have no distillable entanglement, yet sometimes still have a private classical key. We present a construction of bound-entangled states with a private key based on classical probability distributions. From this emerge states possessing a new classical analogue of bound entanglement, distinct from the long-sought bound information. We also find states of smaller dimensions and higher key rates than previously known. Our construction has implications for classical cryptography: we show that existing protocols are insufficient for extracting private key from our distributions due to their "bound-entangled" nature. We propose a simple extension of existing protocols that can extract a key from them.

  8. [Application of laboratory information system in the management of the key indicators of quality inspection].

    PubMed

    Guo, Ye; Chen, Qian; Wu, Wei; Cui, Wei

    2015-03-31

    To establish a system of monitoring the key indicator of quality for inspection (KIQI) on a laboratory information system (LIS), and to have a better management of KIQI. Clinical sample made in PUMCH were collected during the whole of 2014. Next, interactive input program were designed to accomplish data collecting of the disqualification rate of samples, the mistake rate of samples and the occasions of losing samples, etc. Then, a series moment of sample collection, laboratory sample arrived, sample test, sample check, response to critical value, namely, trajectory information left on LIS were recorded and the qualification rate of TAT, the notification rate of endangering result were calculated. Finally, the information about quality control were collected to build an internal quality control database and the KIQI, such as the out-of-control rate of quality control and the total error of test items were monitored. The inspection of the sample management shows the disqualification rates in 2014 were all below the target, but the rates in January and February were a little high and the rates of four wards were above 2%. The mistake rates of samples was 0.47 cases/10 000 cases, attaining the target (< 2 cases/10 000 cases). Also, there was no occasion of losing samples in 2014, attaining the target too. The inspection of laboratory reports shows the qualification rates of TAT was within the acceptable range (> 95%), however the rates of blood routine in November (94.75%) was out of range. We have solved the problem by optimizing the processes. The notification rate of endangering result attained the target (≥ 98%), while the rate of timely notification is needed to improve. Quality inspection shows the CV of APTT in August (5.02%) was rising significantly, beyond the accepted CV (5.0%). We have solved the problem by changing the reagent. The CV of TT in 2014 were all below the allowable CV, thus the allowable CV of the next year lower to 10%. It is an objective

  9. Information visualization courses for students with a computer science background.

    PubMed

    Kerren, Andreas

    2013-01-01

    Linnaeus University offers two master's courses in information visualization for computer science students with programming experience. This article briefly describes the syllabi, exercises, and practices developed for these courses.

  10. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  11. [Maintenance treatment in opioid-dependent patients with migration background].

    PubMed

    Bald, L K; Schouler-Ocak, M; Penka, S; Schoofs, N; Häbel, T; Bermpohl, F; Gutwinski, S

    2016-05-01

    No regional analyses regarding opioid-dependent patients in maintenance treatment with a migration background have so far been performed in German-speaking countries. This study examined patients with and without a migration background regarding socioeconomic parameters, characteristics of dependency and attitude towards opiate maintenance treatment (OMT). From May to October 2011 patients in OMT from all of the 20 psychiatry clinics and 110 physician practices in Berlin with a licence to provide OMT were included in this analysis. Out of the 986 participating patients, 956 gave information on migration background and of these, 204 (21.3 %) originated from a country other than Germany. Compared to patients without a migration background, their participation in a maintenance program was significantly shorter and they more often expressed a desire to end OMT and wanted a limited duration of OMT. The differences regarding duration of OMT and the wish to end OMT can reflect a stronger desire for abstinence and a different attitude towards maintenance treatment of patients with a migration background.

  12. Coordinating Council. Sixth Meeting: Who Are Our Key Users?

    NASA Technical Reports Server (NTRS)

    1991-01-01

    This NASA Scientific and Technical Information Program Coordinating Council meeting deals with the topic 'Who are our key users?' Presentations were made on the following subtopics: Key users: Who uses the system the most, Who orders the most documents, Users: What do we know about them?, NASA/DOD Aerospace Knowledge Diffusion research project on 'Potential key users', How we meet the user's needs, and STI Council user requirements update. Summaries of discussions after the presentations are included along with visuals for the presentations.

  13. Health-care users, key community informants and primary health care workers' views on health, health promotion, health assets and deficits: qualitative study in seven Spanish regions.

    PubMed

    Pons-Vigués, Mariona; Berenguera, Anna; Coma-Auli, Núria; Pombo-Ramos, Haizea; March, Sebastià; Asensio-Martínez, Angela; Moreno-Peral, Patricia; Mora-Simón, Sara; Martínez-Andrés, Maria; Pujol-Ribera, Enriqueta

    2017-06-13

    Although some articles have analysed the definitions of health and health promotion from the perspective of health-care users and health care professionals, no published studies include the simultaneous participation of health-care users, primary health care professionals and key community informants. Understanding the perception of health and health promotion amongst these different stakeholders is crucial for the design and implementation of successful, equitable and sustainable measures that improve the health and wellbeing of populations. Furthermore, the identification of different health assets and deficits by the different informants will generate new evidence to promote healthy behaviours, improve community health and wellbeing and reduce preventable inequalities. The objective of this study is to explore the concept of health and health promotion and to compare health assets and deficits as identified by health-care users, key community informants and primary health care workers with the ultimate purpose to collect the necessary data for the design and implementation of a successful health promotion intervention. A descriptive-interpretive qualitative research was conducted with 276 participants from 14 primary care centres of 7 Spanish regions. Theoretical sampling was used for selection. We organized 11 discussion groups and 2 triangular groups with health-care users; 30 semi-structured interviews with key community informants; and 14 discussion groups with primary health care workers. A thematic content analysis was carried out. Health-care users and key community informants agree that health is a complex, broad, multifactorial concept that encompasses several interrelated dimensions (physical, psychological-emotional, social, occupational, intellectual, spiritual and environmental). The three participants' profiles consider health promotion indispensable despite defining it as complex and vague. In fact, most health-care users admit to having

  14. Background characterization of an ultra-low background liquid scintillation counter

    DOE PAGES

    Erchinger, J. L.; Orrell, John L.; Aalseth, C. E.; ...

    2017-01-26

    The Ultra-Low Background Liquid Scintillation Counter developed by Pacific Northwest National Laboratory will expand the application of liquid scintillation counting by enabling lower detection limits and smaller sample volumes. By reducing the overall count rate of the background environment approximately 2 orders of magnitude below that of commercially available systems, backgrounds on the order of tens of counts per day over an energy range of ~3–3600 keV can be realized. Finally, initial test results of the ULB LSC show promising results for ultra-low background detection with liquid scintillation counting.

  15. Dissemination of public health information: key tools utilised by the NECOBELAC network in Europe and Latin America

    PubMed Central

    De Castro, Paola; Marsili, Daniela; Poltronieri, Elisabetta; Calderón, Carlos Agudelo

    2012-01-01

    Background Open Access (OA) to scientific information is an important step forward in communication patterns, yet we still need to reinforce OA principles to promote a cultural change of traditional publishing practices. The advantages of free access to scientific information are even more evident in public health where knowledge is directly associated with human wellbeing. Objectives An OA ‘consolidation’ initiative in public health is presented to show how the involvement of people and institutions is fundamental to create awareness on OA and promote a cultural change. This initiative is developed within the project NEtwork of COllaboration Between Europe and Latin American Caribbean countries (NECOBELAC), financed by the European Commission. Methods Three actions are envisaged: Capacity building through a flexible and sustainable training programme on scientific writing and OA publishing; creation of training tools based on semantic web technologies; development of a network of supporting institutions. Results In 2010–2011, 23 training initiatives were performed involving 856 participants from 15 countries; topic maps on scientific publication and OA were produced; 195 institutions are included in the network. Conclusions Cultural change in scientific dissemination practices is a long process requiring a flexible approach and strong commitment by all stakeholders. PMID:22630360

  16. Security of quantum key distribution with iterative sifting

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Lo, Hoi-Kwong; Mizutani, Akihiro; Kato, Go; Lim, Charles Ci Wen; Azuma, Koji; Curty, Marcos

    2018-01-01

    Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma’s inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security.

  17. Latent variable method for automatic adaptation to background states in motor imagery BCI

    NASA Astrophysics Data System (ADS)

    Dagaev, Nikolay; Volkova, Ksenia; Ossadtchi, Alexei

    2018-02-01

    Objective. Brain-computer interface (BCI) systems are known to be vulnerable to variabilities in background states of a user. Usually, no detailed information on these states is available even during the training stage. Thus there is a need in a method which is capable of taking background states into account in an unsupervised way. Approach. We propose a latent variable method that is based on a probabilistic model with a discrete latent variable. In order to estimate the model’s parameters, we suggest to use the expectation maximization algorithm. The proposed method is aimed at assessing characteristics of background states without any corresponding data labeling. In the context of asynchronous motor imagery paradigm, we applied this method to the real data from twelve able-bodied subjects with open/closed eyes serving as background states. Main results. We found that the latent variable method improved classification of target states compared to the baseline method (in seven of twelve subjects). In addition, we found that our method was also capable of background states recognition (in six of twelve subjects). Significance. Without any supervised information on background states, the latent variable method provides a way to improve classification in BCI by taking background states into account at the training stage and then by making decisions on target states weighted by posterior probabilities of background states at the prediction stage.

  18. Key Decision Record Creation and Approval Module

    NASA Technical Reports Server (NTRS)

    Hebert, Barrt; Messer, Elizabeth A.; Albasini, Colby; Le, Thang; ORourke, William, Sr.; Stiglets, Tim; Strain, Ted

    2012-01-01

    Retaining good key decision records is critical to ensuring the success of a project or operation. Having adequately documented decisions with supporting documents and rationale can greatly reduce the amount of rework or reinvention over a project's, vehicle's, or facility's lifecycle. Stennis Space Center developed and uses a software tool that automates the Key Decision Record (KDR) process for its engineering and test projects. It provides the ability for a user to log key decisions that are made during the course of a project. By customizing Parametric Technology Corporation's (PTC) Windchill product, the team was able to log all information about a decision, and electronically route that information for approval. Customizing the Windchill product allowed the team to directly connect these decisions to the engineering data that it might affect and notify data owners of the decision. The user interface was created in JSP and Javascript, within the OOTB (Out of the Box) Windchill product, allowing users to create KDRs. Not only does this interface allow users to create and track KDRs, but it also plugs directly into the OOTB ability to associate these decision records with other relevant engineering data such as drawings, designs, models, requirements, or specifications

  19. Expert Search Strategies: The Information Retrieval Practices of Healthcare Information Professionals

    PubMed Central

    2017-01-01

    Background Healthcare information professionals play a key role in closing the knowledge gap between medical research and clinical practice. Their work involves meticulous searching of literature databases using complex search strategies that can consist of hundreds of keywords, operators, and ontology terms. This process is prone to error and can lead to inefficiency and bias if performed incorrectly. Objective The aim of this study was to investigate the search behavior of healthcare information professionals, uncovering their needs, goals, and requirements for information retrieval systems. Methods A survey was distributed to healthcare information professionals via professional association email discussion lists. It investigated the search tasks they undertake, their techniques for search strategy formulation, their approaches to evaluating search results, and their preferred functionality for searching library-style databases. The popular literature search system PubMed was then evaluated to determine the extent to which their needs were met. Results The 107 respondents indicated that their information retrieval process relied on the use of complex, repeatable, and transparent search strategies. On average it took 60 minutes to formulate a search strategy, with a search task taking 4 hours and consisting of 15 strategy lines. Respondents reviewed a median of 175 results per search task, far more than they would ideally like (100). The most desired features of a search system were merging search queries and combining search results. Conclusions Healthcare information professionals routinely address some of the most challenging information retrieval problems of any profession. However, their needs are not fully supported by current literature search systems and there is demand for improved functionality, in particular regarding the development and management of search strategies. PMID:28970190

  20. Verification and Trust: Background Investigations Preceding Faculty Appointment

    ERIC Educational Resources Information Center

    Academe, 2004

    2004-01-01

    Many employers in the United States have been initiating or expanding policies requiring background checks of prospective employees. The ability to perform such checks has been abetted by the growth of computerized databases and of commercial enterprises that facilitate access to personal information. Employers now have ready access to public…

  1. Workplace wellness programs in Canada: an exploration of key issues.

    PubMed

    Morrison, Erin; MacKinnon, Neil J

    2008-01-01

    Faced with the reality of rising health costs, Canadian employers are thinking beyond traditional notions of responsibility for employee health and have begun to embrace Workplace Wellness Programs (WWPs). This article investigates the critical issues of WWPs in the Canadian context from the perspective of key stakeholders. Using a combination of literature and key informant interviews, seven key themes are presented along with recommendations for wider implementation of WWPs in Canada.

  2. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  3. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  4. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    PubMed Central

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  5. The Cyber War: Maintaining and Controlling the Key Cyber Terrain of the Cyberspace Domain

    DTIC Science & Technology

    2016-06-26

    solution strategy to assess options that will enable the commander to realize the Air Force’s cyber mission. Recommendations will be made that will...will present a solution to assist the JFC in achieving cyberspace dominance. Background In the modern world of advanced technology, control of...the solutions are: 1) timely identification of key cyber terrain, 2) accurate mapping of the cyber terrain, 3) defense of key cyber terrain, and 4

  6. Reduced background autofluorescence for cell imaging using nanodiamonds and lanthanide chelates.

    PubMed

    Cordina, Nicole M; Sayyadi, Nima; Parker, Lindsay M; Everest-Dass, Arun; Brown, Louise J; Packer, Nicolle H

    2018-03-14

    Bio-imaging is a key technique in tracking and monitoring important biological processes and fundamental biomolecular interactions, however the interference of background autofluorescence with targeted fluorophores is problematic for many bio-imaging applications. This study reports on two novel methods for reducing interference with cellular autofluorescence for bio-imaging. The first method uses fluorescent nanodiamonds (FNDs), containing nitrogen vacancy centers. FNDs emit at near-infrared wavelengths typically higher than most cellular autofluorescence; and when appropriately functionalized, can be used for background-free imaging of targeted biomolecules. The second method uses europium-chelating tags with long fluorescence lifetimes. These europium-chelating tags enhance background-free imaging due to the short fluorescent lifetimes of cellular autofluorescence. In this study, we used both methods to target E-selectin, a transmembrane glycoprotein that is activated by inflammation, to demonstrate background-free fluorescent staining in fixed endothelial cells. Our findings indicate that both FND and Europium based staining can improve fluorescent bio-imaging capabilities by reducing competition with cellular autofluorescence. 30 nm nanodiamonds coated with the E-selectin antibody was found to enable the most sensitive detective of E-selectin in inflamed cells, with a 40-fold increase in intensity detected.

  7. Optical polarization: background and camouflage

    NASA Astrophysics Data System (ADS)

    Škerlind, Christina; Hallberg, Tomas; Eriksson, Johan; Kariis, Hans; Bergström, David

    2017-10-01

    Polarimetric imaging sensors in the electro-optical region, already military and commercially available in both the visual and infrared, show enhanced capabilities for advanced target detection and recognition. The capabilities arise due to the ability to discriminate between man-made and natural background surfaces using the polarization information of light. In the development of materials for signature management in the visible and infrared wavelength regions, different criteria need to be met to fulfil the requirements for a good camouflage against modern sensors. In conventional camouflage design, the aimed design of the surface properties of an object is to spectrally match or adapt it to a background and thereby minimizing the contrast given by a specific threat sensor. Examples will be shown from measurements of some relevant materials and how they in different ways affect the polarimetric signature. Dimensioning properties relevant in an optical camouflage from a polarimetric perspective, such as degree of polarization, the viewing or incident angle, and amount of diffuse reflection, mainly in the infrared region, will be discussed.

  8. The influence of sociocultural factors on organ donation and transplantation in Korea: findings from key informant interviews.

    PubMed

    Kim, Jung Ran; Elliott, Doug; Hyde, Cheryl

    2004-04-01

    Although brain death was formally recognized in Korea in 2000 for the purpose of organ donation, traditional Confucian-based thought still prevails. The aim of this study was to explore sociocultural perspectives that influence health professionals' attitudes and perceptions regarding organ donation. Semistructured interviews were conducted with nine key informants from three major hospitals providing transplant services in South Korea. Several themes were identified as barriers to organ donation: Confucianism, misunderstandings and myths, organs as spare for selling, lack of clarity in the definition of death in the new legislation, and limited medical insurance coverage. It remains difficult for brain death to be accepted as true death, and there is currently a poor rate of organ procurement. Findings of the study will help identify socioculturally appropriate strategies to promote acceptance and accessibility of organ transplantation among South Koreans.

  9. An interactive ontology-driven information system for simulating background radiation and generating scenarios for testing special nuclear materials detection algorithms

    DOE PAGES

    Sorokine, Alexandre; Schlicher, Bob G.; Ward, Richard C.; ...

    2015-05-22

    This paper describes an original approach to generating scenarios for the purpose of testing the algorithms used to detect special nuclear materials (SNM) that incorporates the use of ontologies. Separating the signal of SNM from the background requires sophisticated algorithms. To assist in developing such algorithms, there is a need for scenarios that capture a very wide range of variables affecting the detection process, depending on the type of detector being used. To provide such a cpability, we developed an ontology-driven information system (ODIS) for generating scenarios that can be used in creating scenarios for testing of algorithms for SNMmore » detection. The ontology-driven scenario generator (ODSG) is an ODIS based on information supplied by subject matter experts and other documentation. The details of the creation of the ontology, the development of the ontology-driven information system, and the design of the web user interface (UI) are presented along with specific examples of scenarios generated using the ODSG. We demonstrate that the paradigm behind the ODSG is capable of addressing the problem of semantic complexity at both the user and developer levels. Compared to traditional approaches, an ODIS provides benefits such as faithful representation of the users' domain conceptualization, simplified management of very large and semantically diverse datasets, and the ability to handle frequent changes to the application and the UI. Furthermore, the approach makes possible the generation of a much larger number of specific scenarios based on limited user-supplied information« less

  10. Hybrid active contour model for inhomogeneous image segmentation with background estimation

    NASA Astrophysics Data System (ADS)

    Sun, Kaiqiong; Li, Yaqin; Zeng, Shan; Wang, Jun

    2018-03-01

    This paper proposes a hybrid active contour model for inhomogeneous image segmentation. The data term of the energy function in the active contour consists of a global region fitting term in a difference image and a local region fitting term in the original image. The difference image is obtained by subtracting the background from the original image. The background image is dynamically estimated from a linear filtered result of the original image on the basis of the varying curve locations during the active contour evolution process. As in existing local models, fitting the image to local region information makes the proposed model robust against an inhomogeneous background and maintains the accuracy of the segmentation result. Furthermore, fitting the difference image to the global region information makes the proposed model robust against the initial contour location, unlike existing local models. Experimental results show that the proposed model can obtain improved segmentation results compared with related methods in terms of both segmentation accuracy and initial contour sensitivity.

  11. Entrepreneurial Librarianship: The Key to Effective Information Services Management. Information Services Management Series.

    ERIC Educational Resources Information Center

    St. Clair, Guy

    The need to approach library management from an entrepreneurial business perspective is vital, whether the information facility is in a corporate, academic, public or school setting. Although librarianship is not a business, library management must be driven by the same characteristics-- responsibility, performance, and control--as any other…

  12. Exploring Measures to Control Road Traffic Injuries in Iran: Key Informants Points of View.

    PubMed

    Salari, Hedayat; Motevalian, Seyed Abbas; Arab, Mohammad; Esfandiari, Atefeh; Akbari Sari, Ali

    2017-05-01

    Injuries and fatalities from road traffic Injuries are global public health concerns, and a major problem in the Iran. This study aimed to explore strategies to control road traffic Injuries (RTI) in Iran. We conducted a qualitative study to explore possible ways to reduce the occurrence of road traffic Injuries in Iran in 2016. Interviewees were purposively sampled from various sectors due to multidisciplinary nature of RTIs. Participants were mainly representatives from the police, Ministry of Road, Municipal, emergency services and Ministry of Health. Besides, public health authorities, researchers, and university professors were interviewed. We conducted in-depth interviews using generic guides. Data was analyzed using MAXQDA 10 software. Through content analysis, we interpreted core themes relevant to the accomplishment of our study objectives. Themes that emerged from our study include; road traffic management, governance, education, improving accident database, enforcement, driving license restrictions, and construction of pedestrian overpass. This study revealed key informants' views regarding available and affordable solutions to reduce RTIs in Iran. Many applicable strategies are identified in the control of RTIs in Iran. Although some solutions such as highway construction and/or expanding rail transportation have been suggested as effective measures for reducing accident, but they are costly and may not be fully applied in developing countries like Iran.

  13. European Society of Gastrointestinal Endoscopy - Establishing the key unanswered research questions within gastrointestinal endoscopy.

    PubMed

    Rees, Colin J; Ngu, Wee Sing; Regula, Jaroslaw; Bisschops, Raf; Saftoiu, Adrian; Dekker, Evelien; Gralnek, Ian; Ciocirlan, Mihai; Dinis-Ribeiro, Mario; Jover, Rodrigo; Meisner, Søren; Spada, Cristiano; Hassan, Cesare; Valori, Roland; Hucl, Tomas; Le Moine, Olivier; Domagk, Dirk; Kaminski, Michal F; Bretthauer, Michael; Rutter, Matthew D; Aabakken, Lars; Ponchon, Thierry; Fockens, Paul; Siersema, Peter D

    2016-10-01

    Background and study aim: Gastrointestinal endoscopy is a rapidly evolving research field. The European Society of Gastrointestinal Endoscopy (ESGE) plays a key role in shaping opinion and endoscopy activity throughout Europe and further afield. Establishing key unanswered questions within the field of endoscopy and prioritizing those that are important enables researchers and funders to appropriately allocate resources. Methods: Over 2 years, the ESGE Research Committee gathered information on research priorities and refined them through a modified Delphi approach. Consultations were held with the ESGE Governing Board and Quality Improvement Committee to identify important unanswered questions. Research workshops were held at the 21st United European Gastroenterology Week. Research questions were refined by the ESGE Research Committee and Governing Board, compiled into an online survey, and distributed to all ESGE members, who were invited to rank each question by priority. Results: The final questionnaire yielded 291 responses from over 60 countries. The three countries with the highest response rates were Spain, Italy, and United Kingdom. Most responders were from teaching hospitals (62 %) and were specialist endoscopists (51 %). Responses were analyzed with weighted rankings, resulting in prioritization of 26 key unanswered questions. The top ranked generic questions were: 1) How do we define the correct surveillance interval following endoscopic diagnosis? 2) How do we correctly utilize advanced endoscopic imaging? 3) What are the best markers of endoscopy quality? Conclusion: Following this comprehensive process, the ESGE has identified and ranked the key unanswered questions within the field of gastrointestinal endoscopy. Researchers, funders, and journals should prioritize studies that seek to answer these important questions. © Georg Thieme Verlag KG Stuttgart · New York.

  14. [Identification and sampling of people with migration background for epidemiological studies in Germany].

    PubMed

    Reiss, K; Makarova, N; Spallek, J; Zeeb, H; Razum, O

    2013-06-01

    In 2009, 19.6% of the population of Germany either had migrated themselves or were the offspring of people with migration experience. Migrants differ from the autochthonous German population in terms of health status, health awareness and health behaviour. To further investigate the health situation of migrants in Germany, epidemiological studies are needed. Such studies can employ existing databases which provide detailed information on migration status. Otherwise, onomastic or toponomastic procedures can be applied to identify people with migration background. If migrants have to be recruited into an epidemiological study, this can be done register-based (e. g., data from registration offices or telephone lists), based on residential location (random-route or random-walk procedure), via snowball sampling (e. g., through key persons) or via settings (e. g., school entry examination). An oversampling of people with migration background is not sufficient to avoid systematic bias in the sample due to non-participation. Additional measures have to be taken to increase access and raise participation rates. Personal contacting, multilingual instruments, multilingual interviewers and extensive public relations increase access and willingness to participate. Empirical evidence on 'successful' recruitment strategies for studies with migrants is still lacking in epidemiology and health sciences in Germany. The choice of the recruitment strategy as well as the measures to raise accessibility and willingness to participate depend on the available resources, the research question and the specific migrant target group. © Georg Thieme Verlag KG Stuttgart · New York.

  15. Scientific independence: A key to credibility

    Treesearch

    Leonard F. Ruggiero

    2007-01-01

    Independence and objectivity are key ingredients of scientific credibility, especially in research organizations that are part of a natural resource management agency like the Forest Service. Credibility, in turn, is essential to the utility of scientific information in socio-political processes. In order to develop this thesis further, a basic understanding of Forest...

  16. Intelligent Agents: Information Strategies for the Information Society.

    ERIC Educational Resources Information Center

    Garcia-Sierra, A. J.

    In the workplace of today which is increasingly being overloaded with information, the concept of intelligent information agents has been widely prescribed. This paper briefly looks at the United Kingdom Government's Information Society Initiative which has been fueled by the realization that information is the key component of the ongoing…

  17. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  18. Are national policies and programs for prevention and management of postpartum hemorrhage and preeclampsia adequate? A key informant survey in 37 countries.

    PubMed

    Smith, Jeffrey Michael; Currie, Sheena; Cannon, Tirza; Armbruster, Deborah; Perri, Julia

    2014-08-01

    Although maternal mortality has declined substantially in recent years, efforts to address postpartum hemorrhage (PPH) and preeclampsia/eclampsia (PE/E) must be systematically scaled up in order for further reduction to take place. In 2012, a key informant survey was conducted to identify both national and global gaps in PPH and PE/E program priorities and to highlight focus areas for future national and global programming. Between January and March 2012, national program teams in 37 countries completed a 44-item survey, consisting mostly of dichotomous yes/no responses and addressing 6 core programmatic areas: policy, training, medication distribution and logistics, national reporting of key indicators, programming, and challenges to and opportunities for scale up. An in-country focal person led the process to gather the necessary information from key local stakeholders. Some countries also provided national essential medicines lists and service delivery guidelines for comparison and further analysis. Most surveyed countries have many elements in place to address PPH and PE/E, but notable gaps remain in both policy and practice. Oxytocin and magnesium sulfate were reported to be regularly available in facilities in 89% and 76% of countries, respectively. Only 27% of countries, however, noted regular availability of misoprostol in health facilities. Midwife scope of practice regarding PPH and PE/E is inconsistent with global norms in a number of countries: 22% of countries do not allow midwives to administer magnesium sulfate and 30% do not allow them to perform manual removal of the placenta. Most countries surveyed have many of the essential policies and program elements to prevent/manage PPH and PE/E, but absence of commodities (especially misoprostol), limitations in scope of practice for midwives, and gaps in inclusion of maternal health indicators in the national data systems have impeded efforts to scale up programs nationally.

  19. Information management

    NASA Technical Reports Server (NTRS)

    Ricks, Wendell; Corker, Kevin

    1990-01-01

    Primary Flight Display (PFD) information management and cockpit display of information management research is presented in viewgraph form. The information management problem in the cockpit, information management burdens, the key characteristics of an information manager, the interface management system handling the flow of information and the dialogs between the system and the pilot, and overall system architecture are covered.

  20. Adult Learning: A Key for the 21st Century. CONFINTEA V Background Papers (Hamburg, Germany, July 14-18, 1997).

    ERIC Educational Resources Information Center

    Adult Education and Development, 1997

    1997-01-01

    The following papers are included: "Foreword" (Jakob Horn, Paul Belanger); "Internationalization and Globalization" (Ove Korsgaard); "Adult Learning and the Challenges of the 21st Century" (Marc-Laurent Hazoume); "Diversity in Adult Education: Some Key Concepts in Minority and Indigenous Issues" (Linda King de Jardon); "The Culture of Peace: The…

  1. In-mine testing of a natural background sensor, part B

    NASA Technical Reports Server (NTRS)

    Martzloff, F. D.

    1981-01-01

    The capability of a natural background sensor for measuring the thickness of top coal on a longwall face was examined. The limitations on the time during which tests could be performed, and the roof conditions, did not produce readings of top coal measurements during the shearer operation. It was demonstrated that the system is capable to survive operating conditions in the mine environment, while the static tests confirmed that the natural background sensor approach is a valid method of measuring top coal thickness in mines where the roof rock provides a constant radiation level. It is concluded that the practical results will improve sequent development of an integrated vertical control system which is information from the natural background system.

  2. Five key players shape institution's ethical character.

    PubMed

    Craig, R P; Middleton, C J; O'Connell, L J

    1986-05-01

    Various individuals or groups play important roles in achieving moral insight and direction in a health care facility. The administration, medical and nursing staffs, the professional theologian, and the bishop all contribute unique perspectives to the complex process of developing an institution's ethical character. An institutional ethics committee's (IEC's) effectiveness depends largely on the administrator's ability to support educational programming in ethics for the entire staff, coordinate ethical reflection throughout the organization, and shape ethically informed policy based on an IEC's practical experience. The medical staff brings its scientific background and practical experience to ethical issues under a committee's consideration, and nurses offer valuable insights based on their close contact with patients and family. The theologian provides resources and background on Catholic tradition as well as information on current theological developments. The IEC also should maintain a relationship with the local bishop whose duty is to articulate the Church's positions in health care ethics. Forthright dialogue among all parties is central to the IEC's task.

  3. Using Qualitative Comparative Analysis (QCA) of Key Informant Interviews in Health Services Research: Enhancing a Study of Adjuvant Therapy Use in Breast Cancer Care

    PubMed Central

    McAlearney, Ann Scheck; Walker, Daniel; Moss, Alexandra DeNardis; Bickell, Nina A.

    2015-01-01

    Background Qualitative Comparative Analysis (QCA) is a methodology created to address causal complexity in social sciences research by preserving the objectivity of quantitative data analysis without losing detail inherent in qualitative research. However, its use in health services research (HSR) is limited, and questions remain about its application in this context. Objective To explore the strengths and weaknesses of using QCA for HSR. Research Design Using data from semi-structured interviews conducted as part of a multiple case study about adjuvant treatment underuse among underserved breast cancer patients, findings were compared using qualitative approaches with and without QCA to identify strengths, challenges, and opportunities presented by QCA. Subjects Ninety administrative and clinical key informants interviewed across ten NYC area safety net hospitals. Measures Transcribed interviews were coded by three investigators using an iterative and interactive approach. Codes were calibrated for QCA, as well as examined using qualitative analysis without QCA. Results Relative to traditional qualitative analysis, QCA strengths include: (1) addressing causal complexity, (2) results presentation as pathways as opposed to a list, (3) identification of necessary conditions, (4) the option of fuzzy-set calibrations, and (5) QCA-specific parameters of fit that allow researchers to compare outcome pathways. Weaknesses include: (1) few guidelines and examples exist for calibrating interview data, (2) not designed to create predictive models, and (3) unidirectionality. Conclusions Through its presentation of results as pathways, QCA can highlight factors most important for production of an outcome. This strength can yield unique benefits for HSR not available through other methods. PMID:26908085

  4. Temporal dynamics and the identification of musical key.

    PubMed

    Farbood, Morwaread Mary; Marcus, Gary; Poeppel, David

    2013-08-01

    A central process in music cognition involves the identification of key; however, little is known about how listeners accomplish this task in real time. This study derives from work that suggests overlap between the neural and cognitive resources underlying the analyses of both music and speech and is the first, to our knowledge, to explore the timescales at which the brain infers musical key. We investigated the temporal psychophysics of key-finding over a wide range of tempi using melodic sequences with strong structural cues, where statistical information about overall key profile was ambiguous. Listeners were able to provide robust judgments within specific limits, at rates as high as 400 beats per minute (bpm; ∼7 Hz) and as low as 30 bpm (0.5 Hz), but not outside those bounds. These boundaries on reliable performance show that the process of key-finding is restricted to timescales that are closely aligned with beat induction and speech processing. 2013 APA, all rights reserved

  5. Innovation in mental health services: what are the key components of success?

    PubMed Central

    2011-01-01

    Background Service development innovation in health technology and practice is viewed as a pressing need within the field of mental health yet is relatively poorly understood. Macro-level theories have been criticised for their limited explanatory power and they may not be appropriate for understanding local and fine-grained uncertainties of services and barriers to the sustainability of change. This study aimed to identify contextual influences inhibiting or promoting the acceptance and integration of innovations in mental health services in both National Health Service (NHS) and community settings. Methods A comparative study using qualitative and case study data collection methods, including semi-structured interviews with key stakeholders and follow-up telephone interviews over a one-year period. The analysis was informed by learning organisation theory. Drawn from 11 mental health innovation projects within community, voluntary and NHS settings, 65 participants were recruited including service users, commissioners, health and non-health professionals, managers, and caregivers. The methods deployed in this evaluation focused on process-outcome links within and between the 11 projects. Results Key barriers to innovation included resistance from corporate departments and middle management, complexity of the innovation, and the availability and access to resources on a prospective basis within the host organisation. The results informed the construction of a proposed model of innovation implementation within mental health services. The main components of which are context, process, and outcomes. Conclusions The study produced a model of conducive and impeding factors drawn from the composite picture of 11 innovative mental health projects, and this is discussed in light of relevant literature. The model provides a rich agenda to consider for services wanting to innovate or adopt innovations from elsewhere. The evaluation suggested the importance of studying

  6. Low literacy and written drug information: information-seeking, leaflet evaluation and preferences, and roles for images.

    PubMed

    van Beusekom, Mara M; Grootens-Wiegers, Petronella; Bos, Mark J W; Guchelaar, Henk-Jan; van den Broek, Jos M

    2016-12-01

    Background Low-literate patients are at risk to misinterpret written drug information. For the (co-) design of targeted patient information, it is key to involve this group in determining their communication barriers and information needs. Objective To gain insight into how people with low literacy use and evaluate written drug information, and to identify ways in which they feel the patient leaflet can be improved, and in particular how images could be used. Setting Food banks and an education institution for Dutch language training in the Netherlands. Method Semi-structured focus groups and individual interviews were held with low-literate participants (n = 45). The thematic framework approach was used for analysis to identify themes in the data. Main outcome measure Low-literate people's experience with patient information leaflets, ideas for improvements, and perceptions on possible uses for visuals. Results Patient information leaflets were considered discouraging to use, and information difficult to find and understand. Many rely on alternative information sources. The leaflet should be shorter, and improved in terms of organisation, legibility and readability. Participants thought images could increase the leaflet's appeal, help ask questions, provide an overview, help understand textual information, aid recall, reassure, and even lead to increased confidence, empowerment and feeling of safety. Conclusion Already at the stages of paying attention to the leaflet and maintaining interest in the message, low-literate patients experience barriers in the communication process through written drug information. Short, structured, visual/textual explanations can lower the motivational threshold to use the leaflet, improve understanding, and empower the low-literate target group.

  7. Information Infrastructure: Organisational Capability for Online Information Provision.

    ERIC Educational Resources Information Center

    Klobas, Jane E.

    This paper identifies aspects of information flow that are affected by online provision of internal information. Reference is made to four case studies of Western Australian government agencies' steps toward becoming Internet information providers, and to the lessons learned from their experiences. Three key interdependent elements of…

  8. The location and recognition of anti-counterfeiting code image with complex background

    NASA Astrophysics Data System (ADS)

    Ni, Jing; Liu, Quan; Lou, Ping; Han, Ping

    2017-07-01

    The order of cigarette market is a key issue in the tobacco business system. The anti-counterfeiting code, as a kind of effective anti-counterfeiting technology, can identify counterfeit goods, and effectively maintain the normal order of market and consumers' rights and interests. There are complex backgrounds, light interference and other problems in the anti-counterfeiting code images obtained by the tobacco recognizer. To solve these problems, the paper proposes a locating method based on Susan operator, combined with sliding window and line scanning,. In order to reduce the interference of background and noise, we extract the red component of the image and convert the color image into gray image. For the confusing characters, recognition results correction based on the template matching method has been adopted to improve the recognition rate. In this method, the anti-counterfeiting code can be located and recognized correctly in the image with complex background. The experiment results show the effectiveness and feasibility of the approach.

  9. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allowsmore » for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.« less

  10. Detection regimes of the cosmological gravitational wave background from astrophysical sources

    NASA Astrophysics Data System (ADS)

    Coward, David; Regimbau, Tania

    2006-09-01

    Key targets for gravitational wave (GW) observatories, such as LIGO and the next generation interferometric detector, Advanced LIGO, include core-collapse of massive stars and the final stage of coalescence of compact stellar remnants. The combined GW signal from such events occurring throughout the Universe will produce an astrophysical GW background (AGB), one that is fundamentally different from the GW background by very early Universe processes. One can classify contributions to the AGB for different classes of sources based on the strength of the GW emissions from the individual sources, their peak emission frequency, emission duration and their event rate density distribution. This article provides an overview of the detectability regimes of the AGB in the context of current and planned gravitational wave observatories. We show that there are two important AGB signal detection regimes, which we define as 'continuous' and 'popcorn noise'. We describe how the 'popcorn noise' AGB regime evolves with observation time and we discuss how this feature distinguishes it from the GW background produced from very early Universe processes.

  11. An Effective Method for Modeling Two-dimensional Sky Background of LAMOST

    NASA Astrophysics Data System (ADS)

    Haerken, Hasitieer; Duan, Fuqing; Zhang, Jiannan; Guo, Ping

    2017-06-01

    Each CCD of LAMOST accommodates 250 spectra, while about 40 are used to observe sky background during real observations. How to estimate the unknown sky background information hidden in the observed 210 celestial spectra by using the known 40 sky spectra is the problem we solve. In order to model the sky background, usually a pre-observation is performed with all fibers observing sky background. We use the observed 250 skylight spectra as training data, where those observed by the 40 fibers are considered as a base vector set. The Locality-constrained Linear Coding (LLC) technique is utilized to represent the skylight spectra observed by the 210 fibers with the base vector set. We also segment each spectrum into small parts, and establish the local sky background model for each part. Experimental results validate the proposed method, and show the local model is better than the global model.

  12. Review Of Internet Health Information Quality Initiatives

    PubMed Central

    Dzenowagis, Joan

    2001-01-01

    Background The massive growth of health information on the Internet; the global nature of the Internet; the seismic shift taking place in the relationships of various actors in this arena, and the absence of real protection from harm for citizens who use the Internet for health purposes are seen to be real problems. One response to many of these problems has been the burgeoning output of codes of conduct by numerous organizations trying to address quality of health information. Objectives Review the major self-regulatory initiatives in the English-speaking world to develop quality and ethical standards for health information on the Internet. Compare and analyze the approaches taken by the different initiatives. Clarify the issues around the development and enforcement of standards. Methods Quality initiatives selected meet one or more of the following criteria: Self-regulatory. A reasonable constituency. Diversity (eg, of philosophy, approach and process)-to achieve balance and wide representation, and to illustrate and compare different approaches. Historic value. A wider reach than a national audience, except when its reach is a significant sector of the Internet health information industry. The initiatives were compared in 3 ways: (1) Analysis and comparison of: key concepts, mechanism, or approach. Analysis of: the obligations that a provider has to meet to comply with the given initiative, the intended beneficiaries of that initiative, and the burdens imposed on different actors. These burdens are described in terms of their effect on the long-term sustainability and maintenance of the initiative by its developers. Analysis of the enforcement mechanisms. (2) Analysis and comparison by type of sponsoring organization, the reach of the initiative, and the sources of funding of the initiative or the sponsoring organization. (3) How the various initiatives fall under 1 of 3 key mechanisms and comparison of the advantages and disadvantages of these key mechanisms

  13. TIMSS 2011 User Guide for the International Database. Supplement 2: National Adaptations of International Background Questionnaires

    ERIC Educational Resources Information Center

    Foy, Pierre, Ed.; Arora, Alka, Ed.; Stanco, Gabrielle M., Ed.

    2013-01-01

    This supplement describes national adaptations made to the international version of the TIMSS 2011 background questionnaires. This information provides users with a guide to evaluate the availability of internationally comparable data for use in secondary analyses involving the TIMSS 2011 background variables. Background questionnaire adaptations…

  14. Academic Primer Series: Eight Key Papers about Education Theory.

    PubMed

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M; Krzyzaniak, Sara M; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-02-01

    Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice.

  15. Background odour induces adaptation and sensitization of olfactory receptors in the antennae of houseflies.

    PubMed

    Kelling, F J; Ialenti, F; Den Otter, C J

    2002-06-01

    The presence of background odour was found to have a small but significant effect on the sensitivity of the antennal olfactory system of houseflies, Musca domestica Linnaeus (Diptera: Muscidae), to new pulses of odour. We show that cross-adaptation and cross-sensitization between a background odour of (+/-)-1-octen-3-ol and pulses of (+/-)-1-octen-3-ol, 2-pentanone and R-(+)-limonene can occur, confirming that olfactory receptor cells are sensitive to different odours. Background odour can increase the responses to low concentration odour pulses and decrease the responses to higher concentration odour pulses. It is suggested that background odour has a larger effect on olfactory receptor cells that respond with a tonic increase of spike frequency, giving information about the level of odour concentration, i.e. the 'static' environment. Cells that respond in a phasic way only provide information on the dynamics of the olfactory environment.

  16. Saudi Arabia: Background and U.S. Relations

    DTIC Science & Technology

    2015-04-29

    23, 2013. 6 Background information on Saudi cabinet members is available at http://www.saudiembassy.net/about/ Biographies - of-Ministers.aspx. Saudi...territories it occupied in 1967, (2) agree to the establishment of a Palestinian state with a capital in East Jerusalem , and provide for the (3) “[a...compromise on Palestinian sovereignty in Jerusalem .” Elhanan Miller, “Arab ministers back Abbas in rejecting ‘Jewish’ Israel,” Times of Israel, January

  17. Background for Builders--Related Science and Trade Information for the Building Trades.

    ERIC Educational Resources Information Center

    Lucas, Joseph

    Primarily intended for instructors but also useful to students, this guide provides a set of lessons (interlaced with humorous phrases and cartoons) for teaching fundamental information for the building trades. Each lesson contains objectives, related information, and a review or summary. Unit I is a brief, humorous message to the student on the…

  18. Florida's Information Policy: Problems and Issues in the Information Age.

    ERIC Educational Resources Information Center

    Florida State Legislature, Tallahassee.

    This report examines the major issues arising from the impact of information technology on the creation of government information and its storage, processing, and recordkeeping, based on information gathered through a literature search, several mailed questionnaires, and three public hearings. An outline of the background of the information policy…

  19. Key stakeholder perceptions about consent to participate in acute illness research: a rapid, systematic review to inform epi/pandemic research preparedness.

    PubMed

    Gobat, Nina H; Gal, Micaela; Francis, Nick A; Hood, Kerenza; Watkins, Angela; Turner, Jill; Moore, Ronald; Webb, Steve A R; Butler, Christopher C; Nichol, Alistair

    2015-12-29

    A rigorous research response is required to inform clinical and public health decision-making during an epi/pandemic. However, the ethical conduct of such research, which often involves critically ill patients, may be complicated by the diminished capacity to consent and an imperative to initiate trial therapies within short time frames. Alternative approaches to taking prospective informed consent may therefore be used. We aimed to rapidly review evidence on key stakeholder (patients, their proxy decision-makers, clinicians and regulators) views concerning the acceptability of various approaches for obtaining consent relevant to pandemic-related acute illness research. We conducted a rapid evidence review, using the Internet, database and hand-searching for English language empirical publications from 1996 to 2014 on stakeholder opinions of consent models (prospective informed, third-party, deferred, or waived) used in acute illness research. We excluded research on consent to treatment, screening, or other such procedures, non-emergency research and secondary studies. Papers were categorised, and data summarised using narrative synthesis. We screened 689 citations, reviewed 104 full-text articles and included 52. Just one paper related specifically to pandemic research. In other emergency research contexts potential research participants, clinicians and research staff found third-party, deferred, and waived consent to be acceptable as a means to feasibly conduct such research. Acceptability to potential participants was motivated by altruism, trust in the medical community, and perceived value in medical research and decreased as the perceived risks associated with participation increased. Discrepancies were observed in the acceptability of the concept and application or experience of alternative consent models. Patients accepted clinicians acting as proxy-decision makers, with preference for two decision makers as invasiveness of interventions increased

  20. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  1. Two-dimensional distributed-phase-reference protocol for quantum key distribution.

    PubMed

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-22

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  2. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    PubMed Central

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-01-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable. PMID:28004821

  3. A Novel Multiple-Access Correlation-Delay-Shift-Keying

    NASA Astrophysics Data System (ADS)

    Duan, J. Y.; Jiang, G. P.; Yang, H.

    In Correlation-Delay-Shift-Keying (CDSK), the reference signal and the information-bearing signal are added together during a certain time delay. Because the reference signal is not strictly orthogonal to the information-bearing signal, the cross-correlation between the adjacent chaotic signal (Intra-signal Interference, ISI) will be introduced into the demodulation at the receiver. Therefore, the Bit-Error Ratio (BER) of CDSK is higher than that of Differential-Chaos-Shift-Keying (DCSK). To avoid the ISI component and enhance the BER performance of CDSK in multiuser scenario, Multiple-Access CDSK with No Intra-signal Interference (MA-CDSK-NII) is proposed. By constructing the repeated chaotic generator and applying the Walsh code sequence to modulate the reference signal, in MA-CDSK-NII, the ISI component will be eliminated during the demodulation. Gaussian approximation method is adopted here to obtain the exact performance analysis of MA-CDSK-NII over additive white Gaussian noise (AWGN) channel and Rayleigh multipath fading channels. Results show that, due to no ISI component and lower transmitting power, the BER performance of MA-CDSK-NII can be better than that of multiple-access CDSK and Code-Shifted Differential-Chaos-Shift-Keying (CS-DCSK).

  4. C2 of Space: The Key to Full Spectrum Dominance

    DTIC Science & Technology

    1999-01-01

    created the Air Force Research Laboratory in 1997, AFRL/IF was tasked to provide Information Dominance technologies to the warfighter. These critical...allowing the future Battle Manager’s control of the battlespace. The first five ITTPs come under AFRL’s Information Dominance thrust area...time Sensor-to-Shooter, falls under the Precision Strike thrust area. This paper provides a brief background regarding Information Dominance and

  5. Key Characteristics of Carcinogens as a Basis for Organizing Data on Mechanisms of Carcinogenesis

    PubMed Central

    Smith, Martyn T.; Guyton, Kathryn Z.; Gibbons, Catherine F.; Fritz, Jason M.; Portier, Christopher J.; Rusyn, Ivan; DeMarini, David M.; Caldwell, Jane C.; Kavlock, Robert J.; Lambert, Paul F.; Hecht, Stephen S.; Bucher, John R.; Stewart, Bernard W.; Baan, Robert A.; Cogliano, Vincent J.; Straif, Kurt

    2015-01-01

    Background: A recent review by the International Agency for Research on Cancer (IARC) updated the assessments of the > 100 agents classified as Group 1, carcinogenic to humans (IARC Monographs Volume 100, parts A–F). This exercise was complicated by the absence of a broadly accepted, systematic method for evaluating mechanistic data to support conclusions regarding human hazard from exposure to carcinogens. Objectives and Methods: IARC therefore convened two workshops in which an international Working Group of experts identified 10 key characteristics, one or more of which are commonly exhibited by established human carcinogens. Discussion: These characteristics provide the basis for an objective approach to identifying and organizing results from pertinent mechanistic studies. The 10 characteristics are the abilities of an agent to 1) act as an electrophile either directly or after metabolic activation; 2) be genotoxic; 3) alter DNA repair or cause genomic instability; 4) induce epigenetic alterations; 5) induce oxidative stress; 6) induce chronic inflammation; 7) be immunosuppressive; 8) modulate receptor-mediated effects; 9) cause immortalization; and 10) alter cell proliferation, cell death, or nutrient supply. Conclusion: We describe the use of the 10 key characteristics to conduct a systematic literature search focused on relevant end points and construct a graphical representation of the identified mechanistic information. Next, we use benzene and polychlorinated biphenyls as examples to illustrate how this approach may work in practice. The approach described is similar in many respects to those currently being implemented by the U.S. EPA’s Integrated Risk Information System Program and the U.S. National Toxicology Program. Citation: Smith MT, Guyton KZ, Gibbons CF, Fritz JM, Portier CJ, Rusyn I, DeMarini DM, Caldwell JC, Kavlock RJ, Lambert P, Hecht SS, Bucher JR, Stewart BW, Baan R, Cogliano VJ, Straif K. 2016. Key characteristics of carcinogens as a

  6. Security enhancement of optical encryption based on biometric array keys

    NASA Astrophysics Data System (ADS)

    Yan, Aimin; Wei, Yang; Zhang, Jingtao

    2018-07-01

    A novel optical image encryption method is proposed by using Dammann grating and biometric array keys. Dammann grating is utilized to create a 2D finite uniform-intensity spot array. In encryption, a fingerprint array is used as private encryption keys. An original image can be encrypted by a scanning Fresnel zone plate array. Encrypted signals are processed by an optical coherent heterodyne detection system. Biometric array keys and optical scanning cryptography are integrated with each other to enhance information security greatly. Numerical simulations are performed to demonstrate the feasibility and validity of this method. Analyses on key sensitivity and the resistance against to possible attacks are provided.

  7. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  8. Infrared image background modeling based on improved Susan filtering

    NASA Astrophysics Data System (ADS)

    Yuehua, Xia

    2018-02-01

    When SUSAN filter is used to model the infrared image, the Gaussian filter lacks the ability of direction filtering. After filtering, the edge information of the image cannot be preserved well, so that there are a lot of edge singular points in the difference graph, increase the difficulties of target detection. To solve the above problems, the anisotropy algorithm is introduced in this paper, and the anisotropic Gauss filter is used instead of the Gauss filter in the SUSAN filter operator. Firstly, using anisotropic gradient operator to calculate a point of image's horizontal and vertical gradient, to determine the long axis direction of the filter; Secondly, use the local area of the point and the neighborhood smoothness to calculate the filter length and short axis variance; And then calculate the first-order norm of the difference between the local area of the point's gray-scale and mean, to determine the threshold of the SUSAN filter; Finally, the built SUSAN filter is used to convolution the image to obtain the background image, at the same time, the difference between the background image and the original image is obtained. The experimental results show that the background modeling effect of infrared image is evaluated by Mean Squared Error (MSE), Structural Similarity (SSIM) and local Signal-to-noise Ratio Gain (GSNR). Compared with the traditional filtering algorithm, the improved SUSAN filter has achieved better background modeling effect, which can effectively preserve the edge information in the image, and the dim small target is effectively enhanced in the difference graph, which greatly reduces the false alarm rate of the image.

  9. A method to characterise site, urban and regional ambient background radiation.

    PubMed

    Passmore, C; Kirr, M

    2011-03-01

    Control dosemeters are routinely provided to customers to monitor the background radiation so that it can be subtracted from the gross response of the dosemeter to arrive at the occupational dose. Landauer, the largest dosimetry processor in the world with subsidiaries in Australia, Brazil, China, France, Japan, Mexico and the UK, has clients in approximately 130 countries. The Glenwood facility processes over 1.1 million controls per year. This network of clients around the world provides a unique ability to monitor the world's ambient background radiation. Control data can be mined to provide useful historical information regarding ambient background rates and provide a historical baseline for geographical areas. Historical baseline can be used to provide site or region-specific background subtraction values, document the variation in ambient background radiation around a client's site or provide a baseline for measuring the efficiency of clean-up efforts in urban areas after a dirty bomb detonation.

  10. Illicit Drug Users in the Tanzanian Hinterland: Population Size Estimation Through Key Informant-Driven Hot Spot Mapping.

    PubMed

    Ndayongeje, Joel; Msami, Amani; Laurent, Yovin Ivo; Mwankemwa, Syangu; Makumbuli, Moza; Ngonyani, Alois M; Tiberio, Jenny; Welty, Susie; Said, Christen; Morris, Meghan D; McFarland, Willi

    2018-02-12

    We mapped hot spots and estimated the numbers of people who use drugs (PWUD) and who inject drugs (PWID) in 12 regions of Tanzania. Primary (ie, current and past PWUD) and secondary (eg, police, service providers) key informants identified potential hot spots, which we visited to verify and count the number of PWUD and PWID present. Adjustments to counts and extrapolation to regional estimates were done by local experts through iterative rounds of discussion. Drug use, specifically cocaine and heroin, occurred in all regions. Tanga had the largest numbers of PWUD and PWID (5190 and 540, respectively), followed by Mwanza (3300 and 300, respectively). Findings highlight the need to strengthen awareness of drug use and develop prevention and harm reduction programs with broader reach in Tanzania. This exercise provides a foundation for understanding the extent and locations of drug use, a baseline for future size estimations, and a sampling frame for future research.

  11. Physically Active Adults: An Analysis of the Key Variables That Keep Them Moving

    ERIC Educational Resources Information Center

    Downs, Andrew

    2016-01-01

    Background: A large proportion of adults are insufficiently physically active, and researchers have yet to determine the factors that enable individuals to maintain adequate levels of physical activity throughout adulthood. Purpose: This study sought to identify the key variables linked with consistent physical activity in adulthood as elucidated…

  12. Human Health Effects of Dichloromethane: Key Findings and Scientific Issues

    PubMed Central

    Schlosser, Paul M.; Bale, Ambuja S.; Gibbons, Catherine F.; Wilkins, Amina

    2014-01-01

    Background: The U.S. EPA’s Integrated Risk Information System (IRIS) completed an updated toxicological review of dichloromethane in November 2011. Objectives: In this commentary we summarize key results and issues of this review, including exposure sources, identification of potential health effects, and updated physiologically based pharmacokinetic (PBPK) modeling. Methods: We performed a comprehensive review of primary research studies and evaluation of PBPK models. Discussion: Hepatotoxicity was observed in oral and inhalation exposure studies in several studies in animals; neurological effects were also identified as a potential area of concern. Dichloromethane was classified as likely to be carcinogenic in humans based primarily on evidence of carcinogenicity at two sites (liver and lung) in male and female B6C3F1 mice (inhalation exposure) and at one site (liver) in male B6C3F1 mice (drinking-water exposure). Recent epidemiologic studies of dichloromethane (seven studies of hematopoietic cancers published since 2000) provide additional data raising concerns about associations with non-Hodgkin lymphoma and multiple myeloma. Although there are gaps in the database for dichloromethane genotoxicity (i.e., DNA adduct formation and gene mutations in target tissues in vivo), the positive DNA damage assays correlated with tissue and/or species availability of functional glutathione S-transferase (GST) metabolic activity, the key activation pathway for dichloromethane-induced cancer. Innovations in the IRIS assessment include estimation of cancer risk specifically for a presumed sensitive genotype (GST-theta-1+/+), and PBPK modeling accounting for human physiological distributions based on the expected distribution for all individuals 6 months to 80 years of age. Conclusion: The 2011 IRIS assessment of dichloromethane provides insights into the toxicity of a commonly used solvent. Citation: Schlosser PM, Bale AS, Gibbons CF, Wilkins A, Cooper GS. 2015. Human health

  13. The Alaskan mineral resource assessment program; background information to accompany folio of geologic and mineral resource maps of the Ambler River Quadrangle, Alaska

    USGS Publications Warehouse

    Mayfield, Charles F.; Tailleur, I.L.; Albert, N.R.; Ellersieck, Inyo; Grybeck, Donald; Hackett, S.W.

    1983-01-01

    The Ambler River quadrangle, consisting of 14,290 km2 (5,520 mi2) in northwest Alaska, was investigated by an interdisciplinary research team for the purpose of assessing the mineral resource potential of the quadrangle. This report provides background information for a folio of maps on the geology, reconnaissance geochemistry, aeromagnetics, Landsat imagery, and mineral resource evaluation of the quadrangle. A summary of the geologic history, radiometric dates, and fossil localities and a comprehensive bibliography are also included. The quadrangle contains jade reserves, now being mined, and potentially significant resources of copper, zinc, lead, and silver.

  14. Security of quantum key distribution with multiphoton components

    PubMed Central

    Yin, Hua-Lei; Fu, Yao; Mao, Yingqiu; Chen, Zeng-Bing

    2016-01-01

    Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be extracted from the two-photon component by modifying the classical post-processing procedure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three-photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works. Besides, we compare the performances of the six-state SARG04 with other prepare-and-measure QKD protocols using decoy states. PMID:27383014

  15. Information and Knowledge: An Evolutionary Framework for Information Science

    ERIC Educational Resources Information Center

    Bates, Marcia J.

    2005-01-01

    Background: Many definitions of information, knowledge, and data have been suggested throughout the history of information science. In this article, the objective is to provide definitions that are usable for the physical, biological, and social meanings of the terms, covering the various senses important to our field. Argument: Information 1 is…

  16. Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states

    NASA Astrophysics Data System (ADS)

    Jiang, Dong-Huan; Xu, Guang-Bao

    2018-07-01

    Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.

  17. Key Data on Education in Europe 2009

    ERIC Educational Resources Information Center

    Ranguelov, Stanislav; de Coster, Isabelle; Forsthuber, Bernadette; Noorani, Sogol; Ruffio, Philippe

    2009-01-01

    This seventh edition of "Key Data on Education in Europe" retains its main special feature which is the combination of statistical data and qualitative information to describe the organisation and functioning of education systems in Europe. The present 2009 edition maintains the subject-based structure defined by the previous one but…

  18. Key Data on Education in Europe 2012

    ERIC Educational Resources Information Center

    Ranguelov, Stanislav; De Coster, Isabelle; Norani, Sogol; Paolini, Giulia

    2012-01-01

    Key Data on Education in Europe 2012 is a Eurydice flagship publication tracing the main developments of European education systems over the last decade. The report combines statistical data with qualitative information to describe the organisation, management and functioning of 37 European education systems from pre-primary to higher education.…

  19. Emotional Intelligence: A Key to Improving Federal Chief Information Officer Management

    ERIC Educational Resources Information Center

    Borkowski, Tammy M.

    2012-01-01

    The United States Government relies on information technology to provide services to its citizens, spending more than $600 billion on its products and services in the last decade. Given the current fiscal climate, the Executive Branch of the United States Government has a renewed focus on information technology (IT) innovation, requiring federal…

  20. Emerging Technologies Program Integration Report. Volume 2. Background, Delphi and Workshop Data. Appendices

    DTIC Science & Technology

    1987-05-04

    FTIILE COP’ AD-A196 840 EMERGING TECHNOLOGIES PROGRAM INTEGRATION REPORT VOLUME II BACKGROUND, DELPHI AND WORKSHOP DATA, APPENDICES . -- PREPARED...Security Classification) Emerging Technologies Program Integration Report Volume II: Background, Delphi and Workshop Data; Appendices (U) 12 PERSONAL...volumes of this integration report assess and synthesize information gathered through a Delphi survey, defense needs prioritization workshops, and

  1. PEM public key certificate cache server

    NASA Astrophysics Data System (ADS)

    Cheung, T.

    1993-12-01

    Privacy Enhanced Mail (PEM) provides privacy enhancement services to users of Internet electronic mail. Confidentiality, authentication, message integrity, and non-repudiation of origin are provided by applying cryptographic measures to messages transferred between end systems by the Message Transfer System. PEM supports both symmetric and asymmetric key distribution. However, the prevalent implementation uses a public key certificate-based strategy, modeled after the X.509 directory authentication framework. This scheme provides an infrastructure compatible with X.509. According to RFC 1422, public key certificates can be stored in directory servers, transmitted via non-secure message exchanges, or distributed via other means. Directory services provide a specialized distributed database for OSI applications. The directory contains information about objects and then provides structured mechanisms for accessing that information. Since directory services are not widely available now, a good approach is to manage certificates in a centralized certificate server. This document describes the detailed design of a centralized certificate cache serve. This server manages a cache of certificates and a cache of Certificate Revocation Lists (CRL's) for PEM applications. PEMapplications contact the server to obtain/store certificates and CRL's. The server software is programmed in C and ELROS. To use this server, ISODE has to be configured and installed properly. The ISODE library 'libisode.a' has to be linked together with this library because ELROS uses the transport layer functions provided by 'libisode.a.' The X.500 DAP library that is included with the ELROS distribution has to be linked in also, since the server uses the DAP library functions to communicate with directory servers.

  2. Report: Management Alert - EPA Has Not Initiated Required Background Investigations for Information Systems Contractor Personnel

    EPA Pesticide Factsheets

    Report #17-P-0409, September 27, 2017. Not vetting contractor personnel before granting them network access exposes the EPA to risks. Contractor personnel with potentially questionable backgrounds who access sensitive agency data could cause harm.

  3. Stop the top background of the stop search

    NASA Astrophysics Data System (ADS)

    Bai, Yang; Cheng, Hsin-Chia; Gallicchio, Jason; Gu, Jiayin

    2012-07-01

    The main background for the supersymmetric stop direct production search comes from Standard Model toverline t events. For the single-lepton search channel, we introduce a few kinematic variables to further suppress this background by focusing on its dileptonic and semileptonic topologies. All are defined to have end points in the background, but not signal distributions. They can substantially improve the stop signal significance and mass reach when combined with traditional kinematic variables such as the total missing transverse energy. Among them, our variable M_{{T2}}^W hasthebestoverallperformancebecause it uses all available kinematic information, including the on-shell mass of both W's. We see 20 %-30 % improvement on the discovery significance and estimate that the 8 TeV LHC run with 20 fb-1 of data would be able to reach an exclusion limit of 650-700 GeV for direct stop production, as long as the stop decays dominantly to the top quark and a light stable neutralino. Most of the mass range required for the supersymmetric solution of the naturalness problem in the standard scenario can be covered.

  4. Economic and Physical Linkages of the Information and Communication Technology (ICT) Service Industry to Key Industries of the Economy: An Ad Hoc Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, David M.; Hoffman, Michael G.; Niemeyer, Jackie M.

    This report examines the information and communications technology (ICT) services industry in response to an inquiry by the Department of Energy’s (DOE’s) Office of Energy Policy and Systems Analysis. The report answers several key questions: •How has the reliance on ICT services evolved in recent years for key infrastructure services such as air travel, freight transport, electricity and natural gas distribution, financial services, and critical health care, and for the household sector? •What ICT industry trends explain continued strong linkage to and reliance upon ICT? •What is the ICT industry’s reliance on grid-supplied power, uninterruptible power supplies, emergency generators andmore » back-up energy storage technologies? •What are the observed direct effects of ICT disruptions induced by electrical system failures in recent history and how resilient are the components of the ICT industry?« less

  5. Quantum-key-distribution protocol with pseudorandom bases

    NASA Astrophysics Data System (ADS)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  6. Security of a single-state semi-quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  7. Developing content for an interprofessional training on fear of cancer recurrence (FCR): Key informant interviews of healthcare professionals, researchers and cancer survivors.

    PubMed

    Berrett-Abebe, Julie; Cadet, Tamara; Vitello, Joan; Maramaldi, Peter

    2018-04-10

    Growing numbers of cancer survivors are receiving healthcare through primary care practitioners, who often lack cancer-specific expertise to effectively treat survivors' concerns. Addressing that gap, this study aimed to develop content for a training on fear of cancer recurrence (FCR), a common concern in survivorship. Grounded in naturalistic inquiry, 42 key-informant interviews were conducted, transcribed, and analyzed for themes. Participants were healthcare professionals, researchers, and cancer survivors Results: Results included themes ranging from: rich conceptualizations of FCR, opportunities and challenges for addressing FCR in healthcare settings, interventions to address FCR, and important information to include in a training on FCR. This paper provides content for an interprofessional training and highlights the importance of developing trainings for interprofessional teams, given identified barriers that physicians face in addressing FCR and other psychosocial concerns of survivors in primary care.

  8. Coherent attacking continuous-variable quantum key distribution with entanglement in the middle

    NASA Astrophysics Data System (ADS)

    Zhang, Zhaoyuan; Shi, Ronghua; Zeng, Guihua; Guo, Ying

    2018-06-01

    We suggest an approach on the coherent attack of continuous-variable quantum key distribution (CVQKD) with an untrusted entangled source in the middle. The coherent attack strategy can be performed on the double links of quantum system, enabling the eavesdropper to steal more information from the proposed scheme using the entanglement correlation. Numeric simulation results show the improved performance of the attacked CVQKD system in terms of the derived secret key rate with the controllable parameters maximizing the stolen information.

  9. Standard Clock in primordial density perturbations and cosmic microwave background

    NASA Astrophysics Data System (ADS)

    Chen, Xingang; Namjoo, Mohammad Hossein

    2014-12-01

    Standard Clocks in the primordial epoch leave a special type of features in the primordial perturbations, which can be used to directly measure the scale factor of the primordial universe as a function of time a (t), thus discriminating between inflation and alternatives. We have started to search for such signals in the Planck 2013 data using the key predictions of the Standard Clock. In this Letter, we summarize the key predictions of the Standard Clock and present an interesting candidate example in Planck 2013 data. Motivated by this candidate, we construct and compute full Standard Clock models and use the more complete prediction to make more extensive comparison with data. Although this candidate is not yet statistically significant, we use it to illustrate how Standard Clocks appear in Cosmic Microwave Background (CMB) and how they can be further tested by future data. We also use it to motivate more detailed theoretical model building.

  10. A Master Key to Workforce Skills Development

    ERIC Educational Resources Information Center

    Association of Canadian Community Colleges, 2006

    2006-01-01

    Canadian society is undergoing a significant transformation, largely in response to the forces of globalization and the development of the knowledge/information economy. The key to the economic and social well being of Canada's diverse communities lies in the knowledge-and-skills base of its citizens. Canada must design policies and programs which…

  11. GSFC Information Systems Technology Developments Supporting the Vision for Space Exploration

    NASA Technical Reports Server (NTRS)

    Hughes, Peter; Dennehy, Cornelius; Mosier, Gary; Smith, Dan; Rykowski, Lisa

    2004-01-01

    The Vision for Space Exploration will guide NASA's future human and robotic space activities. The broad range of human and robotic missions now being planned will require the development of new system-level capabilities enabled by emerging new technologies. Goddard Space Flight Center is actively supporting the Vision for Space Exploration in a number of program management, engineering and technology areas. This paper provides a brief background on the Vision for Space Exploration and a general overview of potential key Goddard contributions. In particular, this paper focuses on describing relevant GSFC information systems capabilities in architecture development; interoperable command, control and communications; and other applied information systems technology/research activities that are applicable to support the Vision for Space Exploration goals. Current GSFC development efforts and task activities are presented together with future plans.

  12. Background Checks on School Personnel. ERIC Digest Series EA 55.

    ERIC Educational Resources Information Center

    Baas, Alan

    Although it is relatively simple to check on applicants' basic professional competency, ensuring the moral competency of potential school employees is much more difficult. This digest examines major legal issues, district liabilities and responsibilities, suggested guidelines, and information sources involving employee background checks. Of more…

  13. Human Blood Typing: A Forensic Science Approach. Part I: Background.

    ERIC Educational Resources Information Center

    Kobilinsky, Lawrence; Sheehan, Francis X.

    1988-01-01

    In this article, part I of a series, the forensic methods used in "typing" human blood, which as physical evidence is often found in the dried state, are outlined. Background information about individualization, antibody typing, fresh blood, dried blood, and additional systems is provided. (CW)

  14. Academic Primer Series: Eight Key Papers about Education Theory

    PubMed Central

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M.; Krzyzaniak, Sara M.; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-01-01

    Introduction Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. Methods A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. Results These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. Conclusion This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice. PMID:28210367

  15. Background Information for Educators

    ERIC Educational Resources Information Center

    US Environmental Protection Agency, 2001

    2001-01-01

    Mercury is a naturally occurring and widely used element that can cause health and ecological problems when released to the environment through human activities. Though a national and even international issue, the health and environmental impacts of mercury are best understood when studied at the local level. "Mercury: An Educator's Toolkit"…

  16. Antibiotic distribution channels in Thailand: results of key-informant interviews, reviews of drug regulations and database searches.

    PubMed

    Sommanustweechai, Angkana; Chanvatik, Sunicha; Sermsinsiri, Varavoot; Sivilaikul, Somsajee; Patcharanarumol, Walaiporn; Yeung, Shunmay; Tangcharoensathien, Viroj

    2018-02-01

    To analyse how antibiotics are imported, manufactured, distributed and regulated in Thailand. We gathered information, on antibiotic distribution in Thailand, in in-depth interviews - with 43 key informants from farms, health facilities, pharmaceutical and animal feed industries, private pharmacies and regulators- and in database and literature searches. In 2016-2017, licensed antibiotic distribution in Thailand involves over 700 importers and about 24 000 distributors - e.g. retail pharmacies and wholesalers. Thailand imports antibiotics and active pharmaceutical ingredients. There is no system for monitoring the distribution of active ingredients, some of which are used directly on farms, without being processed. Most antibiotics can be bought from pharmacies, for home or farm use, without a prescription. Although the 1987 Drug Act classified most antibiotics as "dangerous drugs", it only classified a few of them as prescription-only medicines and placed no restrictions on the quantities of antibiotics that could be sold to any individual. Pharmacists working in pharmacies are covered by some of the Act's regulations, but the quality of their dispensing and prescribing appears to be largely reliant on their competences. In Thailand, most antibiotics are easily and widely available from retail pharmacies, without a prescription. If the inappropriate use of active pharmaceutical ingredients and antibiotics is to be reduced, we need to reclassify and restrict access to certain antibiotics and to develop systems to audit the dispensing of antibiotics in the retail sector and track the movements of active ingredients.

  17. How much do I tell thee? Strategies for managing information to parents among American adolescents from Chinese, Mexican, and European backgrounds.

    PubMed

    Tasopoulos-Chan, Marina; Smetana, Judith G; Yau, Jenny P

    2009-06-01

    Strategies for managing information about activities to parents, including partial disclosure, avoidance, lying, and full disclosure, were examined in 479 American adolescents (M = 16.38 years, SD = 0.77) varying in generational status and from Mexican, Chinese, and European backgrounds. Information management strategies for personal, prudential, and overlapping (multifaceted) activities as defined within social domain theory were examined. With age, parental education, and generational status controlled, Chinese American adolescents partially disclosed more to mothers about personal and multifaceted activities than did Mexican American adolescents and more to fathers about personal activities than did European American teens. In contrast, European and Mexican American adolescents fully disclosed more to mothers about personal activities than did Chinese-origin adolescents. Strategies varied by generation among Chinese American youth; second-generation adolescents avoided discussing activities with parents more than did immigrants. Adolescents who fully disclosed about all activities and lied less about multifaceted and personal activities reported stronger endorsement of obligations to assist their families, more trust in parents, and less problem behavior. More depressed mood was associated with more lying about personal activities. Copyright 2009 APA, all rights reserved.

  18. 77 FR 55843 - Office of Facilities Management and Program Services; Submission for OMB Review; Background...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... of Facilities Management and Program Services; Submission for OMB Review; Background Investigations... collection of personal data for background investigations for child care workers accessing GSA owned and... assumptions and methodology; ways to enhance the quality, utility, and clarity of the information to be...

  19. A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays

    PubMed Central

    Jang, Seung-Jae; Lee, Young-Gu; Lee, Kwang-Hyung; Kim, Tai-Hoon; Jun, Moon-Seog

    2011-01-01

    These days, with the emergence of the concept of ubiquitous computing, sensor networks that collect, analyze and process all the information through the sensors have become of huge interest. However, sensor network technology fundamentally has wireless communication infrastructure as its foundation and thus has security weakness and limitations such as low computing capacity, power supply limitations and price. In this paper, and considering the characteristics of the sensor network environment, we propose a group key agreement method using a keyset pre-distribution of two-dimension arrays that should minimize the exposure of key and personal information. The key collision problems are resolved by utilizing a polygonal shape’s center of gravity. The method shows that calculating a polygonal shape’s center of gravity only requires a very small amount of calculations from the users. The simple calculation not only increases the group key generation efficiency, but also enhances the sense of security by protecting information between nodes. PMID:22164072

  20. Optimal background matching camouflage.

    PubMed

    Michalis, Constantine; Scott-Samuel, Nicholas E; Gibson, David P; Cuthill, Innes C

    2017-07-12

    Background matching is the most familiar and widespread camouflage strategy: avoiding detection by having a similar colour and pattern to the background. Optimizing background matching is straightforward in a homogeneous environment, or when the habitat has very distinct sub-types and there is divergent selection leading to polymorphism. However, most backgrounds have continuous variation in colour and texture, so what is the best solution? Not all samples of the background are likely to be equally inconspicuous, and laboratory experiments on birds and humans support this view. Theory suggests that the most probable background sample (in the statistical sense), at the size of the prey, would, on average, be the most cryptic. We present an analysis, based on realistic assumptions about low-level vision, that estimates the distribution of background colours and visual textures, and predicts the best camouflage. We present data from a field experiment that tests and supports our predictions, using artificial moth-like targets under bird predation. Additionally, we present analogous data for humans, under tightly controlled viewing conditions, searching for targets on a computer screen. These data show that, in the absence of predator learning, the best single camouflage pattern for heterogeneous backgrounds is the most probable sample. © 2017 The Authors.

  1. Why There Are 88 Keys on the Piano: "88 Logic-The Mackay Method for Piano." Volume 1

    ERIC Educational Resources Information Center

    Mackay, Stephen R.

    2005-01-01

    Background: After trying to define the reason why the piano ended up with 88 keys, I found patterns to explain ways of playing the piano with an 8:8 ratio which gives purpose to why the piano has 88 keys on it. Purpose: The first purpose is to enable piano teachers and music students to benefit from understanding how to play piano and be…

  2. State background checks for gun purchase and firearm deaths: an exploratory study.

    PubMed

    Sen, Bisakha; Panjamapirom, Anantachai

    2012-10-01

    This study examines the relationship between the types of background-information check required by states prior to firearm purchases, and firearm homicide and suicide deaths. Negative binomial models are used to analyze state-level data for homicides and suicides in the U.S. from 1996 to 2005. Data on types of background information are retrieved from the Surveys of State Procedures Related to Firearm Sales, and the violent death data are from the WISQARS. Several other state level factors were controlled for. More background checks are associated with fewer homicide (IRR:0.93, 95% CI:0.91-0.96) and suicide (IRR:0.98, 95% CI:0.96-1.00) deaths. Firearm homicide deaths are lower when states have checks for restraining orders (IRR:0.87, 95% CI:0.79-0.95) and fugitive status (IRR:0.79, 95% CI:0.72-0.88). Firearm suicide deaths are lower when states have background checks for mental illness (IRR:0.96, 95% CI:0.92-0.99), fugitive status (IRR:0.95, 95% CI:0.90-0.99) and misdemeanors (IRR:0.95, 95% CI:0.92-1.00). It does not appear that reductions in firearm deaths are offset by increases in non-firearm violent deaths. More extensive background checks prior to gun purchase are mostly associated with reductions in firearm homicide and suicide deaths. Several study limitations are acknowledged, and further research is called for to ascertain causality. Copyright © 2012 Elsevier Inc. All rights reserved.

  3. Practical private database queries based on a quantum-key-distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less

  4. The Conterminous United States Mineral Appraisal Program; background information to accompany folio of geologic, geochemical, geophysical, and mineral resources maps of the Tonopah 1 by 2 degree Quadrangle, Nevada

    USGS Publications Warehouse

    John, David A.; Nash, J.T.; Plouff, Donald; Whitebread, D.H.

    1991-01-01

    The Tonopah 1 ? by 2 ? quadrangle in south-central Nevada was studied by an interdisciplinary research team to appraise its mineral resources. The appraisal is based on geological, geochemical, and geophysical field and laboratory investigations, the results of which are published as a folio of maps, figures, and tables, with accompanying discussions. This circular provides background information on the investigations and integrates the information presented in the folio. The selected bibliography lists references to the geology, geochemistry, geophysics, and mineral deposits of the Tonopah 1 ? by 2 ? quadrangle.

  5. A Comprehensive Algorithm for Approval of Health Technologies With, Without, or Only in Research: The Key Principles for Informing Coverage Decisions.

    PubMed

    Claxton, Karl; Palmer, Stephen; Longworth, Louise; Bojke, Laura; Griffin, Susan; Soares, Marta; Spackman, Eldon; Rothery, Claire

    The value of evidence about the performance of a technology and the value of access to a technology are central to policy decisions regarding coverage with, without, or only in research and managed entry (or risk-sharing) agreements. We aim to outline the key principles of what assessments are needed to inform "only in research" (OIR) or "approval with research" (AWR) recommendations, in addition to approval or rejection. We developed a comprehensive algorithm to inform the sequence of assessments and judgments that lead to different types of guidance: OIR, AWR, Approve, or Reject. This algorithm identifies the order in which assessments might be made, how similar guidance might be arrived at through different combinations of considerations, and when guidance might change. The key principles are whether the technology is expected to be cost-effective; whether the technology has significant irrecoverable costs; whether additional research is needed; whether research is possible with approval and whether there are opportunity costs that once committed by approval cannot be recovered; and whether there are effective price reductions. Determining expected cost-effectiveness is only a first step. In addition to AWR for technologies expected to be cost-effective and OIR for those not expected to be cost-effective, there are other important circumstances when OIR should be considered. These principles demonstrate that cost-effectiveness is a necessary but not sufficient condition for approval. Even when research is possible with approval, OIR may be appropriate when a technology is expected to be cost-effective due to significant irrecoverable costs. Copyright © 2016 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  6. Empowering Students to Make Sense of an Information-Saturated World: The Evolution of "Information Searching and Analysis"

    ERIC Educational Resources Information Center

    Wittebols, James H.

    2016-01-01

    How well students conduct research online is an increasing concern for educators at all levels, especially higher education. This paper describes the evolution of a course that examines confirmation bias, information searching, and the political economy of information as keys to becoming more information and media literate. After a key assignment…

  7. Report: Improvements Needed in Key EPA Information System Security Practices

    EPA Pesticide Factsheets

    Report #10-P-0146, June 15, 2010. Williams Adley found that EPA program offices lacked evidence that they planned and executed tests of information system security controls as required by federal requirements.

  8. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  9. Background Information on the Very Long Baseline Array

    NASA Astrophysics Data System (ADS)

    A continent-wide radio telescope system offering the greatest resolving power of any astronomical instrument operational today Overview: The National Science Foundation's VLBA is a system of ten identical radio-telescope antennas controlled from a common headquarters and working together as a single instrument. The radio signals received by each individual antenna contribute part of the information used to produce images of celestial objects with hundreds of times more detail than Hubble Space Telescope images. Scientific Areas: The VLBA can contribute to any astronomical research area where quality, high-resolution radio images will advance knowledge of the field. In its first five years of full operation, the VLBA has produced dramatic new information in these areas: * Stars: With the VLBA, astronomers have tracked gas motions in the atmosphere of a star other than the Sun for the first time; made the first maps of the magnetic field of a star other than the Sun; and studied the violent dances of double-star pairs in which one of the pair is a superdense neutron star or a black hole. * Protostars, star formation, and protoplanetary disks: The VLBA has provided scientists with some of the best views yet of very young stars and the complex regions in which they are born. VLBA images have shown outflows of gas from young stars and disks of material orbiting these new stars - material that later may form planetary systems. * Supernovae and Supernova Remnants: The VLBA has directly measured the expansion of a shell of exploded debris from the supernova SN 1993J, in the galaxy M81, some 11 million light-years from Earth. This has allowed scientists to learn new details about the explosion itself and its surroundings as well as calculate the distance to the supernova by using the VLBA data in conjunction with information from optical telescopes. VLBA images have shown regions of shocked gas in supernova remnants. * The Milky Way: Radio waves from extragalactic objects

  10. Survey of key technologies on millimeter-wave CMOS integrated circuits

    NASA Astrophysics Data System (ADS)

    Yu, Fei; Gao, Lei; Li, Lixiang; Cai, Shuo; Wang, Wei; Wang, Chunhua

    2018-05-01

    In order to provide guidance for the development of high performance millimeter-wave complementary metal oxide semiconductor (MMW-CMOS) integrated circuits (IC), this paper provides a survey of key technologies on MMW-CMOS IC. Technical background of MMW wireless communications is described. Then the recent development of the critical technologies of the MMW-CMOS IC are introduced in detail and compared. A summarization is given, and the development prospects on MMW-CMOS IC are also discussed.

  11. Thresholding of auditory cortical representation by background noise

    PubMed Central

    Liang, Feixue; Bai, Lin; Tao, Huizhong W.; Zhang, Li I.; Xiao, Zhongju

    2014-01-01

    It is generally thought that background noise can mask auditory information. However, how the noise specifically transforms neuronal auditory processing in a level-dependent manner remains to be carefully determined. Here, with in vivo loose-patch cell-attached recordings in layer 4 of the rat primary auditory cortex (A1), we systematically examined how continuous wideband noise of different levels affected receptive field properties of individual neurons. We found that the background noise, when above a certain critical/effective level, resulted in an elevation of intensity threshold for tone-evoked responses. This increase of threshold was linearly dependent on the noise intensity above the critical level. As such, the tonal receptive field (TRF) of individual neurons was translated upward as an entirety toward high intensities along the intensity domain. This resulted in preserved preferred characteristic frequency (CF) and the overall shape of TRF, but reduced frequency responding range and an enhanced frequency selectivity for the same stimulus intensity. Such translational effects on intensity threshold were observed in both excitatory and fast-spiking inhibitory neurons, as well as in both monotonic and nonmonotonic (intensity-tuned) A1 neurons. Our results suggest that in a noise background, fundamental auditory representations are modulated through a background level-dependent linear shifting along intensity domain, which is equivalent to reducing stimulus intensity. PMID:25426029

  12. The key actor: a qualitative study of patient participation in the handover process in Europe

    PubMed Central

    Flink, Maria; Hesselink, Gijs; Pijnenborg, Loes; Wollersheim, Hub; Vernooij-Dassen, Myrra; Dudzik-Urbaniak, Ewa; Orrego, Carola; Toccafondi, Giulio; Schoonhoven, Lisette; Gademan, Petra J; Johnson, Julie K; Öhlén, Gunnar; Hansagi, Helen; Olsson, Mariann; Barach, Paul

    2012-01-01

    Background Patient safety experts have postulated that increasing patient participation in communications during patient handovers will improve the quality of patient transitions, and that this may reduce hospital readmissions. Choosing strategies that enhance patient safety through improved handovers requires better understanding of patient experiences and preferences for participation. Objective The aim of this paper is to explore the patients’ experiences and perspectives related to the handovers between their primary care providers and the inpatient hospital. Methods A qualitative secondary analysis was performed, based on individual and focus group patient interviews with 90 patients in five European countries. Results The analysis revealed three themes: patient positioning in the handover process; prerequisites for patient participation and patient preferences for the handover process. Patients’ participation ranged from being the key actor, to sharing the responsibility with healthcare professional(s), to being passive participants. For active participation patients required both personal and social resources as well as prerequisites such as information and respect. Some patients preferred to be the key actor in charge; others preferred their healthcare professionals to be the key actors in the handover. Conclusions Patients’ participation is related to the healthcare system, the activity of healthcare professionals’ and patients’ capacity for participation. Patients prefer a handover process where the responsibility is clear and unambiguous. Healthcare organisations need a clear and well-considered system of responsibility for handover processes, that takes into account the individual patient's need of clarity, and support in relation to his/hers own recourses. PMID:23112290

  13. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  14. Gravitational Waves Propagation through the Stochastic Background of Gravitational Waves

    NASA Astrophysics Data System (ADS)

    Frajuca, C.; Bortoli, F. S.; Nakamoto, F. Y.; Santos, G. A.

    2018-02-01

    With the recent claim that gravitational waves were finally detected and with other efforts around the world for GWs detection, its is reasonable to imagine that the relic gravitational wave background could be detected in some time in the future and with such information gather some hints about the origin of the universe. But, it’s also be considered that gravity has self-interaction, with such assumption it’s reasonable to expect that these gravitational wave will interact with the relic or nonrelic GW background by scattering, for example. Such interaction should decrease the distance which such propagating waves could be detected The propagation of gravitational waves (GWs) is analyzed in an asymptotically de Sitter space by the perturbation expansion around Minkowski space using a scalar component. Using the case of de Sitter inflationary phase scenario, the perturbation propagates through a FRW background. The GW, using the actual value for the Hubble scale (Ho), has a damping factor with a very small valor for the size of the observational universe; the stochastic relic GW background is given by a dimensionless function of the frequency. In this work we analyze this same damping including the gravitational wave background due to astrophysical sources such background is 3 orders of magnitude bigger in some frequencies and produces a higher damping factor.

  15. Secret-key-assisted private classical communication capacity over quantum channels

    NASA Astrophysics Data System (ADS)

    Hsieh, Min-Hsiu; Luo, Zhicheng; Brun, Todd

    2008-10-01

    We prove a regularized formula for the secret-key-assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak (e-print arXiv:quant-ph/0512015) on entanglement-assisted quantum communication capacity . This formula provides a family protocol, the private father protocol, under the resource inequality framework that includes private classical communication without secret-key assistance as a child protocol.

  16. Increasing Educational Efficiency Through Technology (Commission Discussion and Background Materials).

    ERIC Educational Resources Information Center

    Indiana State Commission for Higher Education, Indianapolis.

    A program schedule and background information for Indiana Commission for Higher Education-sponsored discussion of the use of educational technology to increase educational effeciency are presented. The four major topics of discussion to illustrate the uses and advantages/disadvantages of audio, video, and computing technologies are as follows:…

  17. Background sources at PEP

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lynch, H.; Schwitters, R.F.; Toner, W.T.

    Important sources of background for PEP experiments are studied. Background particles originate from high-energy electrons and positrons which have been lost from stable orbits, ..gamma..-rays emitted by the primary beams through bremsstrahlung in the residual gas, and synchrotron radiation x-rays. The effect of these processes on the beam lifetime are calculated and estimates of background rates at the interaction region are given. Recommendations for the PEP design, aimed at minimizing background are presented. 7 figs., 4 tabs.

  18. Huyghens Engines--a new concept and its embodiment for nano-micro interlevel information processing.

    PubMed

    Santoli, Salvatore

    2009-02-01

    Current criteria in Bionanotechnology based on software and sensor/actuator hardware of Artificial Intelligence for bioinspired nanostructured systems lack the nanophysical background and key mathematics to describe and mimick the biological hierarchies of nano-to-micro-integrated informational/energetic levels. It is argued that bionanoscale hardware/software undividable solidarity can be mimicked by artificial nanostructured systems featuring intra/interlevel information processing through the emerging organization principle of quantum holography, described by the Heisenberg group G and by harmonic analysis on G. From a property of G as a Lie group, quantum holography is shown to merge the quantum/classical dynamic-symbolic ongoings into the structure-function unity of biological sensing-information processing-actuating, while by Ch. Huyghens' principles about wave motion and coupled oscillators synchronization it applies to environmental waves of any kind, so embodying a universal information processing engine, dubbed Huyghens Engine, that mimicks the holistic nanobiological structure-function solidarity and the kinetics/thermodynamics of nano/micro interface information transfer.

  19. Key Factors in Development of Man-Made and Natural Ecosystems

    NASA Astrophysics Data System (ADS)

    Pechurkin, N. S.

    1999-01-01

    Key factors of ecosystem functioning are of the same nature for artificial and natural types. An hierarchical approach gives the opportunity for estimation of the quantitative behavior of both individual links and the system as a whole. At the organismic level we can use interactions of studied macroorganisms (man, animal, higher plant) with selected microorganisms as key indicating factors of the organisms immune status. The most informative factor for the population/community level is an age structure of populations and relationships of domination/elimination. The integrated key factors of the ecosystems level are productivity and rates of cycling of the limiting substances. The key factors approach is of great value for growth regulations and monitoring the state of any ecosystem, including the life support system (LSS)-type.

  20. Successful Implementation of Clinical Information Technology: Seven Key Lessons from CPOE.

    PubMed

    Gellert, G A; Hill, V; Bruner, K; Maciaz, G; Saucedo, L; Catzoela, L; Ramirez, R; Jacobs, W J; Nguyen, P; Patel, L; Webster, S L

    2015-01-01

    To identify and describe the most critical strategic and operational contributors to the successful implementation of clinical information technologies, as deployed within a moderate sized system of U.S. community hospitals. CHRISTUS Health is a multi-state system comprised of more than 350 services and 60 hospitals with over 9 000 physicians. The Santa Rosa region of CHRISTUS Health, located in greater San Antonio, Texas is comprised of three adult community hospital facilities and one Children's hospital each with bed capacities of 142-180. Computerized Patient Order Entry (CPOE) was first implemented in 2012 within a complex market environment. The Santa Rosa region has 2 417 credentialed physicians and 263 mid-level allied health professionals. This report focuses on the seven most valuable strategies deployed by the Health Informatics team in a large four hospital CHRISTUS region to achieve strong CPOE adoption and critical success lessons learned. The findings are placed within the context of the literature describing best practices in health information technology implementation. While the elements described involved discrete de novo process generation to support implementation and operations, collectively they represent the creation of a new customer-centric service culture in our Health Informatics team, which has served as a foundation for ensuring strong clinical information technology adoption beyond CPOE. The seven success factors described are not limited in their value to and impact on CPOE adoption, but generalize to - and can advance success in - varied other clinical information technology implementations across diverse hospitals. A number of these factors are supported by reports in the literature of other institutions' successful implementations of CPOE and other clinical information technologies, and while not prescriptive to other settings, may be adapted to yield value elsewhere.

  1. Decoy-state quantum key distribution with a leaky source

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Curty, Marcos; Lucamarini, Marco

    2016-06-01

    In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems.

  2. Community Information Systems.

    ERIC Educational Resources Information Center

    Freeman, Andrew

    Information is provided on technological and social trends as background for a workshop designed to heighten the consciousness of workers in community information systems. Initially, the basic terminology is considered in its implications for an integrated perspective of community information systems, with particular attention given to the meaning…

  3. Too much information? A document analysis of sport safety resources from key organisations

    PubMed Central

    Finch, Caroline F

    2016-01-01

    Objectives The field of sport injury prevention has seen a marked increase in published research in recent years, with concomitant proliferation of lay sport safety resources, such as policies, fact sheets and posters. The aim of this study was to catalogue and categorise the number, type and topic focus of sport safety resources from a representative set of key organisations. Design Cataloguing and qualitative document analysis of resources available from the websites of six stakeholder organisations in Australia. Setting This study was part of a larger investigation, the National Guidance for Australian Football Partnerships and Safety (NoGAPS) project. Participants The NoGAPS study provided the context for a purposive sampling of six organisations involved in the promotion of safety in Australian football. These partners are recognised as being highly representative of organisations at national and state level that reflect similarly in their goals around sport safety promotion in Australia. Results The catalogue comprised 284 resources. More of the practical and less prescriptive types of resources, such as fact sheets, than formal policies were found. Resources for the prevention of physical injuries were the predominant sport safety issue addressed, with risk management, environmental issues and social behaviours comprising other categories. Duplication of resources for specific safety issues, within and across organisations, was found. Conclusions People working within sport settings have access to a proliferation of resources, which creates a potential rivalry for sourcing of injury prevention information. Important issues that are likely to influence the uptake of safety advice by the general sporting public include the sheer number of resources available, and the overlap and duplication of resources addressing the same issues. The existence of a large number of resources from reputable organisations does not mean that they are necessarily evidence based

  4. Antibiotic distribution channels in Thailand: results of key-informant interviews, reviews of drug regulations and database searches

    PubMed Central

    Chanvatik, Sunicha; Sermsinsiri, Varavoot; Sivilaikul, Somsajee; Patcharanarumol, Walaiporn; Yeung, Shunmay; Tangcharoensathien, Viroj

    2018-01-01

    Abstract Objective To analyse how antibiotics are imported, manufactured, distributed and regulated in Thailand. Methods We gathered information, on antibiotic distribution in Thailand, in in-depth interviews – with 43 key informants from farms, health facilities, pharmaceutical and animal feed industries, private pharmacies and regulators– and in database and literature searches. Findings In 2016–2017, licensed antibiotic distribution in Thailand involves over 700 importers and about 24 000 distributors – e.g. retail pharmacies and wholesalers. Thailand imports antibiotics and active pharmaceutical ingredients. There is no system for monitoring the distribution of active ingredients, some of which are used directly on farms, without being processed. Most antibiotics can be bought from pharmacies, for home or farm use, without a prescription. Although the 1987 Drug Act classified most antibiotics as “dangerous drugs”, it only classified a few of them as prescription-only medicines and placed no restrictions on the quantities of antibiotics that could be sold to any individual. Pharmacists working in pharmacies are covered by some of the Act’s regulations, but the quality of their dispensing and prescribing appears to be largely reliant on their competences. Conclusion In Thailand, most antibiotics are easily and widely available from retail pharmacies, without a prescription. If the inappropriate use of active pharmaceutical ingredients and antibiotics is to be reduced, we need to reclassify and restrict access to certain antibiotics and to develop systems to audit the dispensing of antibiotics in the retail sector and track the movements of active ingredients. PMID:29403113

  5. Recent discoveries from the cosmic microwave background: a review of recent progress

    NASA Astrophysics Data System (ADS)

    Staggs, Suzanne; Dunkley, Jo; Page, Lyman

    2018-04-01

    Measurements of the anisotropies in the cosmic microwave background (CMB) radiation have provided a wealth of information about the cosmological model that describes the contents and evolution of the universe. These data have led to a standard model described by just six parameters. In this review we focus on discoveries made in the past decade from satellite and ground-based experiments, and look ahead to those anticipated in the coming decade. We provide an introduction to the key CMB observables including temperature and polarization anisotropies, and describe recent progress towards understanding the initial conditions of structure formation, and establishing the properties of the contents of the universe including neutrinos. Results are now being derived both from the primordial CMB signal that traces the behavior of the universe at 400 000 years of cosmic time, as well as from the signals imprinted at later times due to scattering from galaxy clusters, from the motion of electrons in the ionized universe, and from the gravitational lensing of the CMB photons. We describe current experimental methods to measure the CMB, particularly focusing on details relevant for ground and balloon-based instruments, and give an overview of the broad data analysis methods required to convert measurements of the microwave sky into cosmological parameters.

  6. Recent discoveries from the cosmic microwave background: a review of recent progress.

    PubMed

    Staggs, Suzanne; Dunkley, Jo; Page, Lyman

    2018-04-01

    Measurements of the anisotropies in the cosmic microwave background (CMB) radiation have provided a wealth of information about the cosmological model that describes the contents and evolution of the universe. These data have led to a standard model described by just six parameters. In this review we focus on discoveries made in the past decade from satellite and ground-based experiments, and look ahead to those anticipated in the coming decade. We provide an introduction to the key CMB observables including temperature and polarization anisotropies, and describe recent progress towards understanding the initial conditions of structure formation, and establishing the properties of the contents of the universe including neutrinos. Results are now being derived both from the primordial CMB signal that traces the behavior of the universe at 400 000 years of cosmic time, as well as from the signals imprinted at later times due to scattering from galaxy clusters, from the motion of electrons in the ionized universe, and from the gravitational lensing of the CMB photons. We describe current experimental methods to measure the CMB, particularly focusing on details relevant for ground and balloon-based instruments, and give an overview of the broad data analysis methods required to convert measurements of the microwave sky into cosmological parameters.

  7. Quantum key distribution session with 16-dimensional photonic states.

    PubMed

    Etcheverry, S; Cañas, G; Gómez, E S; Nogueira, W A T; Saavedra, C; Xavier, G B; Lima, G

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.

  8. Quantum key distribution session with 16-dimensional photonic states

    NASA Astrophysics Data System (ADS)

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-07-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.

  9. Modelling of celestial backgrounds

    NASA Astrophysics Data System (ADS)

    Hickman, Duncan L.; Smith, Moira I.; Lim, Jae-Wan; Jeon, Yun-Ho

    2018-05-01

    For applications where a sensor's image includes the celestial background, stars and Solar System Bodies compromise the ability of the sensor system to correctly classify a target. Such false targets are particularly significant for the detection of weak target signatures which only have a small relative angular motion. The detection of celestial features is well established in the visible spectral band. However, given the increasing sensitivity and low noise afforded by emergent infrared focal plane array technology together with larger and more efficient optics, the signatures of celestial features can also impact performance at infrared wavelengths. A methodology has been developed which allows the rapid generation of celestial signatures in any required spectral band using star data from star catalogues and other open-source information. Within this paper, the radiometric calculations are presented to determine the irradiance values of stars and planets in any spectral band.

  10. Exploring an Activist Approach of Working with Boys from Socially Vulnerable Backgrounds in a Sport Context

    ERIC Educational Resources Information Center

    Luguetti, Carla; Oliver, Kimberly L.; Kirk, David; Dantas, Luiz

    2017-01-01

    This study explores an activist approach for co-creating a prototype pedagogical model of sport for working with boys from socially vulnerable backgrounds. This paper addresses the key features that emerged when we identified what facilitated and hindered the boys' engagement in sport. This study was an activist research project that was conducted…

  11. A Consensus Action Agenda for Achieving the National Health Information Infrastructure

    PubMed Central

    Yasnoff, William A.; Humphreys, Betsy L.; Overhage, J. Marc; Detmer, Don E.; Brennan, Patricia Flatley; Morris, Richard W.; Middleton, Blackford; Bates, David W.; Fanning, John P.

    2004-01-01

    Background: Improving the safety, quality, and efficiency of health care will require immediate and ubiquitous access to complete patient information and decision support provided through a National Health Information Infrastructure (NHII). Methods: To help define the action steps needed to achieve an NHII, the U.S. Department of Health and Human Services sponsored a national consensus conference in July 2003. Results: Attendees favored a public–private coordination group to guide NHII activities, provide education, share resources, and monitor relevant metrics to mark progress. They identified financial incentives, health information standards, and overcoming a few important legal obstacles as key NHII enablers. Community and regional implementation projects, including consumer access to a personal health record, were seen as necessary to demonstrate comprehensive functional systems that can serve as models for the entire nation. Finally, the participants identified the need for increased funding for research on the impact of health information technology on patient safety and quality of care. Individuals, organizations, and federal agencies are using these consensus recommendations to guide NHII efforts. PMID:15187075

  12. Background rejection of TEXONO experiment to explore the sub-keV energy region with HPGe detector

    NASA Astrophysics Data System (ADS)

    Singh, M. K.; Sharma, V.; Singh, L.; Chen, J. H.; Singh, V.; Subrahmanyam, V. S.; Soma, A. K.; Wong, H. T.

    2017-10-01

    To observe the neutrino-nucleus coherent scattering as well as for dark matter search, a detection system with ultra-low energy high purity germanium detector has been set up by the TEXONO Collaboration in Kuo-Sheng Nuclear Power Plant. Owing to the weak nature and small recoil energy of these rare events, understanding of background sources and their contribution to the energy spectrum are the key factors in this experiment. In this report, we will focus in detail on the different sources of backgrounds in the TEXONO experiment and the techniques used to reject/minimize them.

  13. Considering the Informal Jewish Educator

    ERIC Educational Resources Information Center

    Winer, Laura Novak

    2007-01-01

    Informal Jewish education can and must put greater focus on the goals of education. While socialization is a key component, it is not its sole goal. Informal Jewish education must make more central deep, serious Jewish learning in which learners can experience moments of transcendence, connection, and transformation. A key to reaching this goal…

  14. Key Relation Extraction from Biomedical Publications.

    PubMed

    Huang, Lan; Wang, Ye; Gong, Leiguang; Kulikowski, Casimir; Bai, Tian

    2017-01-01

    Within the large body of biomedical knowledge, recent findings and discoveries are most often presented as research articles. Their number has been increasing sharply since the turn of the century, presenting ever-growing challenges for search and discovery of knowledge and information related to specific topics of interest, even with the help of advanced online search tools. This is especially true when the goal of a search is to find or discover key relations between important concepts or topic words. We have developed an innovative method for extracting key relations between concepts from abstracts of articles. The method focuses on relations between keywords or topic words in the articles. Early experiments with the method on PubMed publications have shown promising results in searching and discovering keywords and their relationships that are strongly related to the main topic of an article.

  15. The background is remapped across saccades.

    PubMed

    Cha, Oakyoon; Chong, Sang Chul

    2014-02-01

    Physiological studies have found that neurons prepare for impending eye movements, showing anticipatory responses to stimuli presented at the location of the post-saccadic receptive fields (RFs) (Wurtz in Vis Res 48:2070-2089, 2008). These studies proposed that visual neurons with shifting RFs prepared for the stimuli they would process after an impending saccade. Additionally, psychophysical studies have shown behavioral consequences of those anticipatory responses, including the transfer of aftereffects (Melcher in Nat Neurosci 10:903-907, 2007) and the remapping of attention (Rolfs et al. in Nat Neurosci 14:252-258, 2011). As the physiological studies proposed, the shifting RF mechanism explains the transfer of aftereffects. Recently, a new mechanism based on activation transfer via a saliency map was proposed, which accounted for the remapping of attention (Cavanagh et al. in Trends Cogn Sci 14:147-153, 2010). We hypothesized that there would be different aspects of the remapping corresponding to these different neural mechanisms. This study found that the information in the background was remapped to a similar extent as the figure, provided that the visual context remained stable. We manipulated the status of the figure and the ground in the saliency map and showed that the manipulation modulated the remapping of the figure and the ground in different ways. These results suggest that the visual system has an ability to remap the background as well as the figure, but lacks the ability to modulate the remapping of the background based on the visual context, and that different neural mechanisms might work together to maintain visual stability across saccades.

  16. The neural bases of key competencies of emotional intelligence.

    PubMed

    Krueger, Frank; Barbey, Aron K; McCabe, Kevin; Strenziok, Maren; Zamboni, Giovanna; Solomon, Jeffrey; Raymont, Vanessa; Grafman, Jordan

    2009-12-29

    Emotional intelligence (EI) refers to a set of competencies that are essential features of human social life. Although the neural substrates of EI are virtually unknown, it is well established that the prefrontal cortex (PFC) plays a crucial role in human social-emotional behavior. We studied a unique sample of combat veterans from the Vietnam Head Injury Study, which is a prospective, long-term follow-up study of veterans with focal penetrating head injuries. We administered the Mayer-Salovey-Caruso Emotional Intelligence Test as a valid standardized psychometric measure of EI behavior to examine two key competencies of EI: (i) Strategic EI as the competency to understand emotional information and to apply it for the management of the self and of others and (ii) Experiential EI as the competency to perceive emotional information and to apply it for the integration into thinking. The results revealed that key competencies underlying EI depend on distinct neural PFC substrates. First, ventromedial PFC damage diminishes Strategic EI, and therefore, hinders the understanding and managing of emotional information. Second, dorsolateral PFC damage diminishes Experiential EI, and therefore, hinders the perception and integration of emotional information. In conclusion, EI should be viewed as complementary to cognitive intelligence and, when considered together, provide a more complete understanding of human intelligence.

  17. The neural bases of key competencies of emotional intelligence

    PubMed Central

    Krueger, Frank; Barbey, Aron K.; McCabe, Kevin; Strenziok, Maren; Zamboni, Giovanna; Solomon, Jeffrey; Raymont, Vanessa; Grafman, Jordan

    2009-01-01

    Emotional intelligence (EI) refers to a set of competencies that are essential features of human social life. Although the neural substrates of EI are virtually unknown, it is well established that the prefrontal cortex (PFC) plays a crucial role in human social-emotional behavior. We studied a unique sample of combat veterans from the Vietnam Head Injury Study, which is a prospective, long-term follow-up study of veterans with focal penetrating head injuries. We administered the Mayer-Salovey-Caruso Emotional Intelligence Test as a valid standardized psychometric measure of EI behavior to examine two key competencies of EI: (i) Strategic EI as the competency to understand emotional information and to apply it for the management of the self and of others and (ii) Experiential EI as the competency to perceive emotional information and to apply it for the integration into thinking. The results revealed that key competencies underlying EI depend on distinct neural PFC substrates. First, ventromedial PFC damage diminishes Strategic EI, and therefore, hinders the understanding and managing of emotional information. Second, dorsolateral PFC damage diminishes Experiential EI, and therefore, hinders the perception and integration of emotional information. In conclusion, EI should be viewed as complementary to cognitive intelligence and, when considered together, provide a more complete understanding of human intelligence. PMID:20080795

  18. Informing Patients About Placebo Effects: Using Evidence, Theory, and Qualitative Methods to Develop a New Website

    PubMed Central

    Greville-Harris, Maddy; Bostock, Jennifer; Din, Amy; Graham, Cynthia A; Lewith, George; Liossi, Christina; O’Riordan, Tim; White, Peter; Yardley, Lucy

    2016-01-01

    Background According to established ethical principles and guidelines, patients in clinical trials should be fully informed about the interventions they might receive. However, information about placebo-controlled clinical trials typically focuses on the new intervention being tested and provides limited and at times misleading information about placebos. Objective We aimed to create an informative, scientifically accurate, and engaging website that could be used to improve understanding of placebo effects among patients who might be considering taking part in a placebo-controlled clinical trial. Methods Our approach drew on evidence-, theory-, and person-based intervention development. We used existing evidence and theory about placebo effects to develop content that was scientifically accurate. We used existing evidence and theory of health behavior to ensure our content would be communicated persuasively, to an audience who might currently be ignorant or misinformed about placebo effects. A qualitative ‘think aloud’ study was conducted in which 10 participants viewed prototypes of the website and spoke their thoughts out loud in the presence of a researcher. Results The website provides information about 10 key topics and uses text, evidence summaries, quizzes, audio clips of patients’ stories, and a short film to convey key messages. Comments from participants in the think aloud study highlighted occasional misunderstandings and off-putting/confusing features. These were addressed by modifying elements of content, style, and navigation to improve participants’ experiences of using the website. Conclusions We have developed an evidence-based website that incorporates theory-based techniques to inform members of the public about placebos and placebo effects. Qualitative research ensured our website was engaging and convincing for our target audience who might not perceive a need to learn about placebo effects. Before using the website in clinical trials

  19. Measurement-Device-Independent Quantum Key Distribution over 200 km

    NASA Astrophysics Data System (ADS)

    Tang, Yan-Lin; Yin, Hua-Lei; Chen, Si-Jing; Liu, Yang; Zhang, Wei-Jun; Jiang, Xiao; Zhang, Lu; Wang, Jian; You, Li-Xing; Guan, Jian-Yu; Yang, Dong-Xu; Wang, Zhen; Liang, Hao; Zhang, Zhen; Zhou, Nan; Ma, Xiongfeng; Chen, Teng-Yun; Zhang, Qiang; Pan, Jian-Wei

    2014-11-01

    Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon detectors. Recently, several proof-of-principle demonstrations of MDIQKD have been achieved. Those experiments, although novel, are implemented through limited distance with a key rate less than 0.1 bit /s . Here, by developing a 75 MHz clock rate fully automatic and highly stable system and superconducting nanowire single-photon detectors with detection efficiencies of more than 40%, we extend the secure transmission distance of MDIQKD to 200 km and achieve a secure key rate 3 orders of magnitude higher. These results pave the way towards a quantum network with measurement-device-independent security.

  20. Background ozone in North China: trends, photochemical and transport impacts

    NASA Astrophysics Data System (ADS)

    Xu, X.; Lin, W.; Ge, B.

    2011-12-01

    Tropospheric ozone is one of the key greenhouse gases and plays an important role in atmospheric chemistry. Being a strong oxidant, ozone in the surface layer has significant impacts on human and vegetation health. Long-term measurements of surface ozone are highly needed for climate change assessment and environmental policy-making. Such measurements are scarce, particularly from the background regions. Since 2004, surface ozone and some related reactive gases have been observed at Shangdianzi (SDZ), a Global Atmosphere Watch (GAW) station in North China. Located at the north edge of the Northern China Plain (NCP), the SDZ station is an ideal site for capturing polluted air masses from the NCP sector (southwest) and clean air masses from the background sector (northeast). This facilitates the investigation of impacts of regional transport on surface ozone. In this study, we present long-term measurements of surface ozone made at SDZ, discuss the trends of surface ozone levels in different seasons. Results about the observation-based ozone production efficiency (OPE) for the site will be presented, along with impacts from horizontal and vertical air transport.

  1. Background ozone in North China: trends, photochemical and transport impacts

    NASA Astrophysics Data System (ADS)

    Xu, X.; Lin, W.; Ge, B.

    2012-04-01

    Tropospheric ozone is one of the key greenhouse gases and plays an important role in atmospheric chemistry. Being a strong oxidant, ozone in the surface layer has significant impacts on human and vegetation health. Long-term measurements of surface ozone are highly needed for climate change assessment and environmental policy-making. Such measurements are scarce, particularly from the background regions. Since 2004, surface ozone and some related reactive gases have been observed at Shangdianzi (SDZ), a Global Atmosphere Watch (GAW) station in North China. Located at the north edge of the Northern China Plain (NCP), the SDZ station is an ideal site for capturing polluted air masses from the NCP sector (southwest) and clean air masses from the background sector (northeast). This facilitates the investigation of impacts of regional transport on surface ozone. In this study, we present long-term measurements of surface ozone made at SDZ, discuss the trends of surface ozone levels in different seasons. Results about the observation-based ozone production efficiency (OPE) for the site will be presented, along with impacts from horizontal and vertical air transport.

  2. Faked state attacks on realistic round robin DPS quantum key distribution systems and countermeasure

    NASA Astrophysics Data System (ADS)

    Iwakoshi, T.

    2015-05-01

    In May 2014, a new quantum key distribution protocol named "Round Robin Differential-Phase-Shift Quantum Key Distribution (RR DPS QKD)" was proposed. It has a special feature that the key consumption via privacy amplification is a small constant because RR DPS QKD guarantees its security by information causality, not by information-disturbance trade-off. Therefore, the authors claimed that RR DPS QKD systems does not need to monitor the disturbance by an attacker in the quantum channel. However, this study shows that a modified Faked-State Attack (or so-called bright illumination attack) can hack a RR DPS QKD system almost perfectly if it is implemented with realistic detectors even information-causality guarantees the security of RR DPS QKD protocol. Therefore, this study also proposes a possible Measurement-Device-Independent RR DPS QKD system to avoid the modified Faked-State Attack.

  3. A New Three Dimensional Based Key Generation Technique in AVK

    NASA Astrophysics Data System (ADS)

    Banerjee, Subhasish; Dutta, Manash Pratim; Bhunia, Chandan Tilak

    2017-08-01

    In modern era, ensuring high order security becomes one and only objective of computer networks. From the last few decades, many researchers have given their contributions to achieve the secrecy over the communication channel. In achieving perfect security, Shannon had done the pioneer work on perfect secret theorem and illustrated that secrecy of the shared information can be maintained if the key becomes variable in nature instead of static one. In this regard, a key generation technique has been proposed where the key can be changed every time whenever a new block of data needs to be exchanged. In our scheme, the keys not only vary in bit sequences but also in size. The experimental study is also included in this article to prove the correctness and effectiveness of our proposed technique.

  4. Determining Primary Care Physician Information Needs to Inform Ambulatory Visit Note Display

    PubMed Central

    Clarke, M.A.; Steege, L.M.; Moore, J.L.; Koopman, R.J.; Belden, J.L.; Kim, M.S.

    2014-01-01

    Summary Background With the increase in the adoption of electronic health records (EHR) across the US, primary care physicians are experiencing information overload. The purpose of this pilot study was to determine the information needs of primary care physicians (PCPs) as they review clinic visit notes to inform EHR display. Method Data collection was conducted with 15 primary care physicians during semi-structured interviews, including a third party observer to control bias. Physicians reviewed major sections of an artificial but typical acute and chronic care visit note to identify the note sections that were relevant to their information needs. Statistical methods used were McNemar-Mosteller’s and Cochran Q. Results Physicians identified History of Present Illness (HPI), Assessment, and Plan (A&P) as the most important sections of a visit note. In contrast, they largely judged the Review of Systems (ROS) to be superfluous. There was also a statistical difference in physicians’ highlighting among all seven major note sections in acute (p = 0.00) and chronic (p = 0.00) care visit notes. Conclusion A&P and HPI sections were most frequently identified as important which suggests that physicians may have to identify a few key sections out of a long, unnecessarily verbose visit note. ROS is viewed by doctors as mostly “not needed,” but can have relevant information. The ROS can contain information needed for patient care when other sections of the Visit note, such as the HPI, lack the relevant information. Future studies should include producing a display that provides only relevant information to increase physician efficiency at the point of care. Also, research on moving A&P to the top of visit notes instead of having A&P at the bottom of the page is needed, since those are usually the first sections physicians refer to and reviewing from top to bottom may cause cognitive load. PMID:24734131

  5. Impact of Sociocultural Background and Assessment Data Upon School Psychologists' Decisions.

    ERIC Educational Resources Information Center

    Huebner, E. Scott; Cummings, Jack A.

    1985-01-01

    Psychologists (N=56) participated in an adapted version of Algozzine and Ysseldyke's (1981) diagnostic simulation to investigate the effects of sociocultural background (rural vs. suburban) and assessment data (normal vs. learning disabled) on educational decisions. Findings suggest school psychologists utilize multiple sources of information but…

  6. Quantum cryptography using coherent states: Randomized encryption and key generation

    NASA Astrophysics Data System (ADS)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  7. How the Hawking radiation affect quantum Fisher information of Dirac particles in the background of a Schwarzschild black hole

    NASA Astrophysics Data System (ADS)

    Huang, ChunYu; Ma, Wen-chao; Wang, Dong; Ye, Liu

    2018-01-01

    In this work, the effect of Hawking radiation on the quantum Fisher information (QFI) of Dirac particles is investigated in the background of a Schwarzschild black hole. Interestingly, it has been verified that the QFI with respect to the weight parameter θ of a target state is always independent of the Hawking temperature T. This implies that if we encode the information on the weight parameter, then we can affirm that the corresponding accuracy of the parameter estimation will be immune to the Hawking effect. Besides, it reveals that the QFI with respect to the phase parameter φ exhibits a decay behavior with the increase in the Hawking temperature T and converges to a nonzero value in the limit of infinite Hawking temperature T. Remarkably, it turns out that the function F_φ on θ =π \\big /4 symmetry was broken by the influence of the Hawking radiation. Finally, we generalize the case of a three-qubit system to a case of a N-qubit system, i.e., |ψ > _{1,2,3,\\ldots ,N} =(cos θ | 0 > ^{⊗ N}+sin θ e^{iφ }| 1 > ^{⊗ N}) and obtain an interesting result: the number of particles in the initial state does not affect the QFI F_θ , nor the QFI F_φ . However, with the increasing number of particles located near the event horizon, F_φ will be affected by Hawking radiation to a large extent, while F_θ is still free from disturbance resulting from the Hawking effects.

  8. Quality control, analysis and secure sharing of Luminex® immunoassay data using the open source LabKey Server platform

    PubMed Central

    2013-01-01

    Background Immunoassays that employ multiplexed bead arrays produce high information content per sample. Such assays are now frequently used to evaluate humoral responses in clinical trials. Integrated software is needed for the analysis, quality control, and secure sharing of the high volume of data produced by such multiplexed assays. Software that facilitates data exchange and provides flexibility to perform customized analyses (including multiple curve fits and visualizations of assay performance over time) could increase scientists’ capacity to use these immunoassays to evaluate human clinical trials. Results The HIV Vaccine Trials Network and the Statistical Center for HIV/AIDS Research and Prevention collaborated with LabKey Software to enhance the open source LabKey Server platform to facilitate workflows for multiplexed bead assays. This system now supports the management, analysis, quality control, and secure sharing of data from multiplexed immunoassays that leverage Luminex xMAP® technology. These assays may be custom or kit-based. Newly added features enable labs to: (i) import run data from spreadsheets output by Bio-Plex Manager™ software; (ii) customize data processing, curve fits, and algorithms through scripts written in common languages, such as R; (iii) select script-defined calculation options through a graphical user interface; (iv) collect custom metadata for each titration, analyte, run and batch of runs; (v) calculate dose–response curves for titrations; (vi) interpolate unknown concentrations from curves for titrated standards; (vii) flag run data for exclusion from analysis; (viii) track quality control metrics across runs using Levey-Jennings plots; and (ix) automatically flag outliers based on expected values. Existing system features allow researchers to analyze, integrate, visualize, export and securely share their data, as well as to construct custom user interfaces and workflows. Conclusions Unlike other tools tailored for

  9. Analysis on the application of background parameters on remote sensing classification

    NASA Astrophysics Data System (ADS)

    Qiao, Y.

    Drawing accurate crop cultivation acreage, dynamic monitoring of crops growing and yield forecast are some important applications of remote sensing to agriculture. During the 8th 5-Year Plan period, the task of yield estimation using remote sensing technology for the main crops in major production regions in China once was a subtopic to the national research task titled "Study on Application of Remote sensing Technology". In 21 century in a movement launched by Chinese Ministry of Agriculture to combine high technology to farming production, remote sensing has given full play to farm crops' growth monitoring and yield forecast. And later in 2001 Chinese Ministry of Agriculture entrusted the Northern China Center of Agricultural Remote Sensing to forecast yield of some main crops like wheat, maize and rice in rather short time to supply information for the government decision maker. Present paper is a report for this task. It describes the application of background parameters in image recognition, classification and mapping with focuses on plan of the geo-science's theory, ecological feature and its cartographical objects or scale, the study of phrenology for image optimal time for classification of the ground objects, the analysis of optimal waveband composition and the application of background data base to spatial information recognition ;The research based on the knowledge of background parameters is indispensable for improving the accuracy of image classification and mapping quality and won a secondary reward of tech-science achievement from Chinese Ministry of Agriculture. Keywords: Spatial image; Classification; Background parameter

  10. Dark and background response stability for the Landsat 8 Thermal Infrared Sensor

    USGS Publications Warehouse

    Vanderwerff, Kelly; Montanaro, Matthew

    2012-01-01

    The Thermal Infrared Sensor (TIRS) is a pushbroom sensor that will be a part of the Landsat Data Continuity Mission (LDCM), which is a joint mission between NASA and the USGS. The TIRS instrument will continue to collect the thermal infrared data that are currently being collected by the Thematic Mapper and the Enhanced Thematic Mapper Plus on Landsats 5 and 7, respectively. One of the key requirements of the new sensor is that the dark and background response be stable to ensure proper data continuity from the legacy Landsat instruments. Pre launch testing of the instrument has recently been completed at the NASA Goddard Space Flight Center (GSFC), which included calibration collects that mimic those that will be performed on orbit. These collects include images of a cold plate meant to simulate the deep space calibration source as viewed by the instrument in flight. The data from these collects give insight into the stability of the instrument’s dark and background response, as well as factors that may cause these responses to vary. This paper quantifies the measured background and dark response of TIRS as well as its stability.

  11. Fundamental rate-loss tradeoff for optical quantum key distribution.

    PubMed

    Takeoka, Masahiro; Guha, Saikat; Wilde, Mark M

    2014-10-24

    Since 1984, various optical quantum key distribution (QKD) protocols have been proposed and examined. In all of them, the rate of secret key generation decays exponentially with distance. A natural and fundamental question is then whether there are yet-to-be discovered optical QKD protocols (without quantum repeaters) that could circumvent this rate-distance tradeoff. This paper provides a major step towards answering this question. Here we show that the secret key agreement capacity of a lossy and noisy optical channel assisted by unlimited two-way public classical communication is limited by an upper bound that is solely a function of the channel loss, regardless of how much optical power the protocol may use. Our result has major implications for understanding the secret key agreement capacity of optical channels-a long-standing open problem in optical quantum information theory-and strongly suggests a real need for quantum repeaters to perform QKD at high rates over long distances.

  12. A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra; Srinivas, Jangirala; Mukhopadhyay, Sourav

    2014-10-01

    Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.'s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.'s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.'s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.'s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  13. Research on College English Teachers' Information Literacy in Information Environment

    ERIC Educational Resources Information Center

    Du, Yan-xia

    2017-01-01

    The new technology revolution based on Internet, information and communication technology has triggered an upsurge of educational information in the world, including English learning and teaching. The improvement of teacher's information literacy is the key to the success of the current educational informatization reform. From the perspectives of…

  14. Quantum key distribution session with 16-dimensional photonic states

    PubMed Central

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD. PMID:23897033

  15. A Hierarchical Modulation Coherent Communication Scheme for Simultaneous Four-State Continuous-Variable Quantum Key Distribution and Classical Communication

    NASA Astrophysics Data System (ADS)

    Yang, Can; Ma, Cheng; Hu, Linxi; He, Guangqiang

    2018-06-01

    We present a hierarchical modulation coherent communication protocol, which simultaneously achieves classical optical communication and continuous-variable quantum key distribution. Our hierarchical modulation scheme consists of a quadrature phase-shifting keying modulation for classical communication and a four-state discrete modulation for continuous-variable quantum key distribution. The simulation results based on practical parameters show that it is feasible to transmit both quantum information and classical information on a single carrier. We obtained a secure key rate of 10^{-3} bits/pulse to 10^{-1} bits/pulse within 40 kilometers, and in the meantime the maximum bit error rate for classical information is about 10^{-7}. Because continuous-variable quantum key distribution protocol is compatible with standard telecommunication technology, we think our hierarchical modulation scheme can be used to upgrade the digital communication systems to extend system function in the future.

  16. Robust Data Detection for the Photon-Counting Free-Space Optical System With Implicit CSI Acquisition and Background Radiation Compensation

    NASA Astrophysics Data System (ADS)

    Song, Tianyu; Kam, Pooi-Yuen

    2016-02-01

    Since atmospheric turbulence and pointing errors cause signal intensity fluctuations and the background radiation surrounding the free-space optical (FSO) receiver contributes an undesired noisy component, the receiver requires accurate channel state information (CSI) and background information to adjust the detection threshold. In most previous studies, for CSI acquisition, pilot symbols were employed, which leads to a reduction of spectral and energy efficiency; and an impractical assumption that the background radiation component is perfectly known was made. In this paper, we develop an efficient and robust sequence receiver, which acquires the CSI and the background information implicitly and requires no knowledge about the channel model information. It is robust since it can automatically estimate the CSI and background component and detect the data sequence accordingly. Its decision metric has a simple form and involves no integrals, and thus can be easily evaluated. A Viterbi-type trellis-search algorithm is adopted to improve the search efficiency, and a selective-store strategy is adopted to overcome a potential error floor problem as well as to increase the memory efficiency. To further simplify the receiver, a decision-feedback symbol-by-symbol receiver is proposed as an approximation of the sequence receiver. By simulations and theoretical analysis, we show that the performance of both the sequence receiver and the symbol-by-symbol receiver, approach that of detection with perfect knowledge of the CSI and background radiation, as the length of the window for forming the decision metric increases.

  17. Countermeasure against blinding attacks on low-noise detectors with a background-noise-cancellation scheme

    NASA Astrophysics Data System (ADS)

    Lee, Min Soo; Park, Byung Kwon; Woo, Min Ki; Park, Chang Hoon; Kim, Yong-Su; Han, Sang-Wook; Moon, Sung

    2016-12-01

    We developed a countermeasure against blinding attacks on low-noise detectors with a background-noise-cancellation scheme in quantum key distribution (QKD) systems. Background-noise cancellation includes self-differencing and balanced avalanche photon diode (APD) schemes and is considered a promising solution for low-noise APDs, which are critical components in high-performance QKD systems. However, its vulnerability to blinding attacks has been recently reported. In this work, we propose a countermeasure that prevents this potential security loophole from being used in detector blinding attacks. An experimental QKD setup is implemented and various tests are conducted to verify the feasibility and performance of the proposed method. The obtained measurement results show that the proposed scheme successfully detects occurring blinding-attack-based hacking attempts.

  18. A Recommended Set of Key Arctic Indicators

    NASA Astrophysics Data System (ADS)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  19. DNA based random key generation and management for OTP encryption.

    PubMed

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  20. Traceability information carriers. The technology backgrounds and consumers' perceptions of the technological solutions.

    PubMed

    Chrysochou, Polymeros; Chryssochoidis, George; Kehagia, Olga

    2009-12-01

    The implementation of traceability in the food supply chain has reinforced adoption of technologies with the ability to track forward and trace back product-related information. Based on the premise that these technologies can be used as a means to provide product-related information to consumers, this paper explores the perceived benefits and drawbacks of such technologies. The aim is to identify factors that influence consumers' perceptions of such technologies, and furthermore to advise the agri-food business on issues that they should consider prior to the implementation of such technologies in their production lines. For the purposes of the study, a focus group study was conducted across 12 European countries, while a set of four different technologies used as a means to provide traceability information to consumers was the focal point of the discussions in each focus group. Results show that the amount of and confidence in the information provided, perceived levels of convenience, impact on product quality and safety, impact on consumers' health and the environment, and potential consequences on ethical and privacy liberties constitute important factors influencing consumers' perceptions of technologies that provide traceability.

  1. The limits of arousal's memory-impairing effects on nearby information.

    PubMed

    Mather, Mara; Gorlick, Marissa A; Nesmith, Kathryn

    2009-01-01

    Showing an arousing central stimulus in a scene often leads to enhanced memory for the arousing central information and impaired memory for peripheral details. However, it is not clear from previous work whether arousing stimuli impair memory for all nonarousing nearby information or just background information. In several experiments, we tested how emotionally arousing pictures affect memory for nearby pictures and for background information. We found that when 2 pictures were presented together, an arousing picture did not affect item and location memory for the other picture. In contrast, an arousing picture impaired memory for a background pattern. These findings suggest that arousal impairs memory for information that is the target of perceptual suppression, such as background information when there is a figure-ground distinction, but does not impair memory for other foreground information.

  2. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  3. [Background and characteristics of migration to urban areas in Java].

    PubMed

    Kawamoto, I

    1985-06-01

    A review of urbanization trends in Java, Indonesia, is presented, with the focus on the background and characteristics of migrants to urban areas. Comparisons are made between the characteristics of laborers in the informal sector (housemaids) and those of factory workers, and between migrants from rural areas and those from other urban areas. (summary in ENG)

  4. Student Information-Age Mindset: A Key to Success in Distance Learning Courses

    ERIC Educational Resources Information Center

    Madrigal, Osiel; Schreiber, Deborah

    2011-01-01

    This study provides empirical evidence that an information-age mindset exists; it is not necessarily age-specific; and it appears to be related to both the student's interaction with a digital environment over time, and the success or failure while online. Eight of ten identified information-age mindset attributes are significant, and represent…

  5. Strain Background Modifies Phenotypes in the ATP8B1-Deficient Mouse

    PubMed Central

    Vargas, Julie C.; Xu, Hongmei; Groen, Annamiek; Paulusma, Coen C.; Grenert, James P.; Pawlikowska, Ludmila; Sen, Saunak; Elferink, Ronald P. J. Oude; Bull, Laura N.

    2010-01-01

    Background Mutations in ATP8B1 (FIC1) underlie cases of cholestatic disease, ranging from chronic and progressive (progressive familial intrahepatic cholestasis) to intermittent (benign recurrent intrahepatic cholestasis). The ATP8B1-deficient mouse serves as an animal model of human ATP8B1 deficiency. Methodology/Principal Findings We investigated the effect of genetic background on phenotypes of ATP8B1-deficient and wild-type mice, using C57Bl/6 (B6), 129, and (B6-129) F1 strain backgrounds. B6 background resulted in greater abnormalities in ATP8B1-deficient mice than did 129 and/or F1 background. ATP8B1-deficient pups of B6 background gained less weight. In adult ATP8B1-deficient mice at baseline, those of B6 background had lower serum cholesterol levels, higher serum alkaline phosphatase levels, and larger livers. After challenge with cholate-supplemented diet, these mice exhibited higher serum alkaline phosphatase and bilirubin levels, greater weight loss and larger livers. ATP8B1-deficient phenotypes in mice of F1 and 129 backgrounds are usually similar, suggesting that susceptibility to manifestations of ATP8B1 deficiency may be recessive. We also detected differences in hepatobiliary phenotypes between wild-type mice of differing strains. Conclusions/Significance Our results indicate that the ATP8B1-deficient mouse in a B6 background may be a better model of human ATP8B1 deficiency and highlight the importance of informed background strain selection for mouse models of liver disease. PMID:20126555

  6. Key Planning Factors for Recovery from a Biological Terrorism Incident

    DTIC Science & Technology

    2012-08-30

    Goals, this document identifies key technical planning areas that may be used to inform subsequent FEMA response and recovery guidance documents. The...expressed herein do not necessarily state or reflect those of their respective organizations or the US Government. The modeling and analysis provided by...responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would

  7. Bayesian Analysis of the Cosmic Microwave Background

    NASA Technical Reports Server (NTRS)

    Jewell, Jeffrey

    2007-01-01

    There is a wealth of cosmological information encoded in the spatial power spectrum of temperature anisotropies of the cosmic microwave background! Experiments designed to map the microwave sky are returning a flood of data (time streams of instrument response as a beam is swept over the sky) at several different frequencies (from 30 to 900 GHz), all with different resolutions and noise properties. The resulting analysis challenge is to estimate, and quantify our uncertainty in, the spatial power spectrum of the cosmic microwave background given the complexities of "missing data", foreground emission, and complicated instrumental noise. Bayesian formulation of this problem allows consistent treatment of many complexities including complicated instrumental noise and foregrounds, and can be numerically implemented with Gibbs sampling. Gibbs sampling has now been validated as an efficient, statistically exact, and practically useful method for low-resolution (as demonstrated on WMAP 1 and 3 year temperature and polarization data). Continuing development for Planck - the goal is to exploit the unique capabilities of Gibbs sampling to directly propagate uncertainties in both foreground and instrument models to total uncertainty in cosmological parameters.

  8. Commonalities and differences in the implementation of models of care for arthritis: key informant interviews from Canada.

    PubMed

    Cott, Cheryl A; Davis, Aileen M; Badley, Elizabeth M; Wong, Rosalind; Canizares, Mayilee; Li, Linda C; Jones, Allyson; Brooks, Sydney; Ahlwalia, Vandana; Hawker, Gillian; Jaglal, Susan; Landry, Michel; MacKay, Crystal; Mosher, Dianne

    2016-08-19

    Timely access to effective treatments for arthritis is a priority at national, provincial and regional levels in Canada due to population aging coupled with limited health human resources. Models of care for arthritis are being implemented across the country but mainly in local contexts, not from an evidence-informed policy or framework. The purpose of this study is to examine existing models of care for arthritis in Canada at the local level in order to identify commonalities and differences in their implementation that could point to important considerations for health policy and service delivery. Semi-structured key informant interviews were conducted with 70 program managers and/or care providers in three Canadian provinces identified through purposive and snowball sampling followed by more detailed examination of 6 models of care (two per province). Interviews were transcribed verbatim and analyzed thematically using a qualitative descriptive approach. Two broad models of care were identified for Total Joint Replacement and Inflammatory Arthritis. Commonalities included lack of complete and appropriate referrals from primary care physicians and lack of health human resources to meet local demands. Strategies included standardized referrals and centralized intake and triage using non-specialist health care professionals. Differences included the nature of the care and follow-up, the role of the specialist, and location of service delivery. Current models of care are mainly focused on Total Joint Replacement and Inflammatory Arthritis. Given the increasing prevalence of arthritis and that published data report only a small proportion of current service delivery is specialist care; provision of timely, appropriate care requires development, implementation and evaluation of models of care across the continuum of care.

  9. Image use in field guides and identification keys: review and recommendations.

    PubMed

    Leggett, Roxanne; Kirchoff, Bruce K

    2011-01-01

    Although illustrations have played an important role in identification keys and guides since the 18th century, their use has varied widely. Some keys lack all illustrations, while others are heavily illustrated. Even within illustrated guides, the way in which images are used varies considerably. Here, we review image use in paper and electronic guides, and establish a set of best practices for image use in illustrated keys and guides. Our review covers image use in both paper and electronic guides, though we only briefly cover apps for mobile devices. With this one exception, we cover the full range of guides, from those that consist only of species descriptions with no keys, to lavishly illustrated technical keys. Emphasis is placed on how images are used, not on the operation of the guides and key, which has been reviewed by others. We only deal with operation when it impacts image use. Few illustrated keys or guides use images in optimal ways. Most include too few images to show taxonomic variation or variation in characters and character states. The use of multiple images allows easier taxon identification and facilitates the understanding of characters. Most images are usually not standardized, making comparison between images difficult. Although some electronic guides allow images to be enlarged, many do not. The best keys and guides use standardized images, displayed at sizes that are easy to see and arranged in a standardized manner so that similar images can be compared across species. Illustrated keys and glossaries should contain multiple images for each character state so that the user can judge variation in the state. Photographic backgrounds should not distract from the subject and, where possible, should be of a standard colour. When used, drawings should be prepared by professional botanical illustrators, and clearly labelled. Electronic keys and guides should allow images to be enlarged so that their details can be seen.

  10. Analyzing key ecological functions for transboundary subbasin assessments.

    Treesearch

    B.G Marcot; T.A. O' Neil; J.B. Nyberg; A. MacKinnon; P.J. Paquet; D.H. Johnson

    2007-01-01

    We present an evaluation of the ecological roles ("key ecological functions" or KEFs) of 618 wildlife species as one facet of subbasin assessment in the Columbia River basin (CRB) of the United States and Canada. Using a wildlife-habitat relationships database (IBIS) and geographic information system, we have mapped KEFs as levels of functional redundancy (...

  11. A study of nuclear recoil backgrounds in dark matter detectors

    NASA Astrophysics Data System (ADS)

    Westerdale, Shawn S.

    that informed the design of the DarkSide-50 boron-loaded liquid scintillator neutron veto. We describe the specific implementation of this veto system in DarkSide-50, including a description of its performance, and show that it can reject neutrons with a high enough efficiency to allow DarkSide-50 to run background-free for three years.

  12. A Study of Nuclear Recoil Backgrounds in Dark Matter Detectors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Westerdale, Shawn S.

    2016-01-01

    development that informed the design of the DarkSide-50 boron-loaded liquid scintillator neutron veto. We describe the specific implementation of this veto system in DarkSide-50, including a description of its performance, and show that it can reject neutrons with a high enough e_ciency to allow DarkSide-50 to run background-free for three years.« less

  13. [Informed and empowered citizens: Keys to the full exercise of health rights].

    PubMed

    Gil-Quevedo, Walter; Agurto-Távara, Elvia; Espinoza-Portilla, Elizabeth

    2017-01-01

    Currently, there is a Peruvian legal framework that promotes the dissemination of information on the health rights of the population. Institutions have been created, such as the National Superintendence of Health, which are in charge of promoting health rights and supervising health-care providers. Despite many achievements, such as extending comprehensive health insurance coverage, it is necessary to implement strategies for the population to access information and advice in a timely, quick and complete manner. Some experiences have shown potential for expansion and growth, such as citizens' participation in Health Service User Councils and the Program of Integrated Actions for the Promotion of Health Rights, as well as the formation of decentralized Intendencies of the National Superintendency of Health. The conciliation and arbitration centers, the training of community health agents, the citizen vigilance, and even innovative strategies using information and communication technologies such as free smartphone applications, are important mechanisms for citizens to have more information and knowledge in health, and thus, to be more empowered, having the capacity to exert more control over the decisions taken on their health.

  14. Use of a simplified consent form to facilitate patient understanding of informed consent for laparoscopic cholecystectomy

    PubMed Central

    Borello, Alessandro; Passera, Roberto; Surace, Alessandra; Marola, Silvia; Buccelli, Claudio; Niola, Massimo; Di Lorenzo, Pierpaolo; Amato, Maurizio; Di Domenico, Lorenza; Solej, Mario; Martino, Valter

    2016-01-01

    Abstract Background Surgical informed consent forms can be complicated for patients to read and understand. We created a consent form with key information presented in bulleted texts and diagrams combined in a graphical format to facilitate the understanding of information during the verbal consent discussion. Methods This prospective, randomized study involved 70 adult patients awaiting cholecystectomy for gallstones. Consent was obtained after standard verbal explanation using either a graphically formatted (study group, n=33) or a standard text document (control group, n=37). Comprehension was evaluated with a 9-item multiple-choice questionnaire administered before surgery and factors affecting comprehension were analyzed. Results Comparison of questionnaire scores showed no effect of age, sex, time between consent and surgery, or document format on understanding of informed consent. Educational level was the only predictor of comprehension. Conclusions Simplified surgical consent documents meet the goals of health literacy and informed consent. Educational level appears to be a strong predictor of understanding. PMID:28352847

  15. Characterization Of Dissolved Organic Mattter In The Florida Keys Ecosystem

    NASA Astrophysics Data System (ADS)

    Adams, D. G.; Shank, G. C.

    2009-12-01

    sources. Information generated by our study will provide a valuable data set for better understanding DOM bio-geochemical dynamics along the Florida Keys ecosystem and information for future studies linking DOM and the coral community.

  16. A flat Universe from high-resolution maps of the cosmic microwave background radiation

    PubMed

    de Bernardis P; Ade; Bock; Bond; Borrill; Boscaleri; Coble; Crill; De Gasperis G; Farese; Ferreira; Ganga; Giacometti; Hivon; Hristov; Iacoangeli; Jaffe; Lange; Martinis; Masi; Mason; Mauskopf; Melchiorri; Miglio; Montroy; Netterfield

    2000-04-27

    The blackbody radiation left over from the Big Bang has been transformed by the expansion of the Universe into the nearly isotropic 2.73 K cosmic microwave background. Tiny inhomogeneities in the early Universe left their imprint on the microwave background in the form of small anisotropies in its temperature. These anisotropies contain information about basic cosmological parameters, particularly the total energy density and curvature of the Universe. Here we report the first images of resolved structure in the microwave background anisotropies over a significant part of the sky. Maps at four frequencies clearly distinguish the microwave background from foreground emission. We compute the angular power spectrum of the microwave background, and find a peak at Legendre multipole Ipeak = (197 +/- 6), with an amplitude delta T200 = (69 +/- 8) microK. This is consistent with that expected for cold dark matter models in a flat (euclidean) Universe, as favoured by standard inflationary models.

  17. Providing long-acting reversible contraception services in Seattle school-based health centers: key themes for facilitating implementation.

    PubMed

    Gilmore, Kelly; Hoopes, Andrea J; Cady, Janet; Amies Oelschlager, Anne-Marie; Prager, Sarah; Vander Stoep, Ann

    2015-06-01

    The purpose of this study was to describe the implementation of a program that provides long-acting reversible contraception (LARC) services within school-based health centers (SBHCs) and to identify barriers and facilitators to implementation as reported by SBHC clinicians and administrators, public health officials, and community partners. We conducted 14 semistructured interviews with key informants involved in the implementation of LARC services. Key informants included SBHC clinicians and administrators, public health officials, and community partners. We used a content analysis approach to analyze interview transcripts for themes. We explored barriers to and facilitators of LARC service delivery across and within key informant groups. The most cited barriers across key informant groups were as follows: perceived lack of provider procedural skills and bias and negative attitudes about LARC methods. The most common facilitators identified across groups were as follows: clear communication strategies, contraceptive counseling practice changes, provider trainings, and stakeholder engagement. Two additional barriers emerged in specific key informant groups. Technical and logistical barriers to LARC service delivery were cited heavily by SBHC administrative staff, community partners, and public health officials. Expense and billing was a major barrier to SBHC administrative staff. LARC counseling and procedural services can be implemented in an SBHC setting to promote access to effective contraceptive options for adolescent women. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  18. Expert perspectives on hereditary angioedema: Key areas for advancements in care across the patient journey

    PubMed Central

    Baş, Murat; Bernstein, Jonathan A.; Boccon-Gibod, Isabelle; Bova, Maria; Dempster, John; Grumach, Anete Sevciovic; Magerl, Markus; Poarch, Kimberly; Ferreira, Manuel Branco

    2016-01-01

    Background: Published literature documents the substantial burden of hereditary angioedema (HAE) with C1 inhibitor deficiency on the quality of life and work productivity of patients. However, despite advances in the field and the availability of guidelines to advise health care providers (HCP) on the diagnosis and management of HAE, there are still many challenges to overcome. For example, delayed diagnosis and misdiagnosis are common, and treatment practices vary worldwide. Objective: An international expert panel was convened to consider opportunities for improvements that would benefit patients with HAE. Methods: Based on professional and personal experiences, the experts developed schematics to describe the journey of patients through the following stages: (1) onset of symptoms and initial evaluation; (2) referral/diagnosis; and (3) management of HAE. More importantly, the panel identified key areas in which it was possible to optimize the support provided to patients and HCPs along this journey. Results: Overall, this approach highlighted the need for wider dissemination of algorithms and scientific data to more effectively educate HCPs from multiple disciplines and the need for more research to inform appropriate treatment decisions. Furthermore, HAE awareness campaigns, accurate online information, and referral to patient advocacy groups were all considered helpful approaches to support patients. Conclusion: More detailed and widespread information on the diagnosis and management of HAE is needed and may lead to advancements in care throughout the journey of the patient with HAE. PMID:27661998

  19. Insuring continuity of care for chronic disease patients after a disaster: key preparedness elements

    PubMed Central

    Arrieta, Martha I.; Foreman, Rachel D.; Crook, Errol D.; Icenogle, Marjorie L.

    2009-01-01

    Background Care for patients with chronic diseases is a challenge after a disaster. This is particularly true for individuals from health disparate populations as they are less likely to evacuate, have less financial resources and often depend on resource-strapped institutions for their care. The specific aim of the study presented here was to elicit challenges and solutions in the provision of health care to those with chronic diseases after Hurricane Katrina in coastal Alabama and Mississippi. Methods Focusing on agencies providing care to health disparate populations, a qualitative methodology was employed using in-depth interviews with health and social service providers. Participants identified key elements essential to disaster preparedness. Results Pre-disaster issues were patient education and preparedness, evacuation, special needs shelters and health care provider preparedness. Post-disaster issues were communication, volunteer coordination and donation management. Conclusions Lessons learned from those on the ground administering healthcare during disasters should inform future disaster preparations. Furthermore, the methodological approach used in this study engendered collaboration between healthcare institutions and may enhance future inter-agency disaster preparedness. PMID:18703906

  20. From Informal Gatekeeper to Information Counselor: Emergence of a New Professional Role.

    ERIC Educational Resources Information Center

    Dosa, Marta; And Others

    Borrowed from the literature of more than two decades ago--when it alluded to key communicators within organizations--the concept of "gatekeeper" is reintroduced in this report. The role of information counselors, who, like informal gatekeepers, take part in liaison activities, networking, advising, information filtering, transmitting,…

  1. Clustering document fragments using background color and texture information

    NASA Astrophysics Data System (ADS)

    Chanda, Sukalpa; Franke, Katrin; Pal, Umapada

    2012-01-01

    Forensic analysis of questioned documents sometimes can be extensively data intensive. A forensic expert might need to analyze a heap of document fragments and in such cases to ensure reliability he/she should focus only on relevant evidences hidden in those document fragments. Relevant document retrieval needs finding of similar document fragments. One notion of obtaining such similar documents could be by using document fragment's physical characteristics like color, texture, etc. In this article we propose an automatic scheme to retrieve similar document fragments based on visual appearance of document paper and texture. Multispectral color characteristics using biologically inspired color differentiation techniques are implemented here. This is done by projecting document color characteristics to Lab color space. Gabor filter-based texture analysis is used to identify document texture. It is desired that document fragments from same source will have similar color and texture. For clustering similar document fragments of our test dataset we use a Self Organizing Map (SOM) of dimension 5×5, where the document color and texture information are used as features. We obtained an encouraging accuracy of 97.17% from 1063 test images.

  2. Visual signal detection in structured backgrounds. II. Effects of contrast gain control, background variations, and white noise

    NASA Technical Reports Server (NTRS)

    Eckstein, M. P.; Ahumada, A. J. Jr; Watson, A. B.

    1997-01-01

    Studies of visual detection of a signal superimposed on one of two identical backgrounds show performance degradation when the background has high contrast and is similar in spatial frequency and/or orientation to the signal. To account for this finding, models include a contrast gain control mechanism that pools activity across spatial frequency, orientation and space to inhibit (divisively) the response of the receptor sensitive to the signal. In tasks in which the observer has to detect a known signal added to one of M different backgrounds grounds due to added visual noise, the main sources of degradation are the stochastic noise in the image and the suboptimal visual processing. We investigate how these two sources of degradation (contrast gain control and variations in the background) interact in a task in which the signal is embedded in one of M locations in a complex spatially varying background (structured background). We use backgrounds extracted from patient digital medical images. To isolate effects of the fixed deterministic background (the contrast gain control) from the effects of the background variations, we conduct detection experiments with three different background conditions: (1) uniform background, (2) a repeated sample of structured background, and (3) different samples of structured background. Results show that human visual detection degrades from the uniform background condition to the repeated background condition and degrades even further in the different backgrounds condition. These results suggest that both the contrast gain control mechanism and the background random variations degrade human performance in detection of a signal in a complex, spatially varying background. A filter model and added white noise are used to generate estimates of sampling efficiencies, an equivalent internal noise, an equivalent contrast-gain-control-induced noise, and an equivalent noise due to the variations in the structured background.

  3. The limits of arousal's memory impairing effects on nearby information

    PubMed Central

    Mather, Mara; Gorlick, Marissa; Nesmith, Kathryn

    2009-01-01

    Showing an arousing central stimulus in a scene often leads to enhanced memory for the arousing central information and impaired memory for peripheral details. However, it is not clear from previous work whether arousing stimuli impair memory for all non-arousing nearby information or just background information. In several experiments, we tested how emotionally arousing pictures affect memory for nearby pictures and for background information. We found that when two pictures were presented together, having one of the pictures be arousing did not affect item and location memory for the other picture. In contrast, an arousing picture impaired memory for a background pattern. These findings suggest that arousal impairs memory for information that is the target of perceptual suppression, such as background information when there is a figure-ground distinction, but does not impair memory for other foreground information. PMID:19827704

  4. General Information About Injection Wells

    EPA Pesticide Factsheets

    This webpage provides general background information on injection wells used to place fluids in the subsurface. It also provides information on use, different categories, and how they are regulated. Information on the protection is also provided.

  5. Measurement-device-independent entanglement-based quantum key distribution

    NASA Astrophysics Data System (ADS)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Liu, Hongwei; Yin, Zhenqiang; Li, Zuohan; Lian, Shibin; Du, Yungang; Wu, Lingan

    2016-05-01

    We present a quantum key distribution protocol in a model in which the legitimate users gather statistics as in the measurement-device-independent entanglement witness to certify the sources and the measurement devices. We show that the task of measurement-device-independent quantum communication can be accomplished based on monogamy of entanglement, and it is fairly loss tolerate including source and detector flaws. We derive a tight bound for collective attacks on the Holevo information between the authorized parties and the eavesdropper. Then with this bound, the final secret key rate with the source flaws can be obtained. The results show that long-distance quantum cryptography over 144 km can be made secure using only standard threshold detectors.

  6. Some Aspects of Developing Background Knowledge in Second Language Acquisition Revisited

    ERIC Educational Resources Information Center

    Zashchitina, Galina; Moysyak, Natalia

    2017-01-01

    The article focuses on defining how background knowledge impacts on second-language acquisition by giving a brief overview of schema theory, the interaction of the basic modes of information processing. A challenge of dealing with culturally specific texts in second language acquisition is also touched upon. Different research-supported views on…

  7. Quantum key distribution in a multi-user network at gigahertz clock rates

    NASA Astrophysics Data System (ADS)

    Fernandez, Veronica; Gordon, Karen J.; Collins, Robert J.; Townsend, Paul D.; Cova, Sergio D.; Rech, Ivan; Buller, Gerald S.

    2005-07-01

    In recent years quantum information research has lead to the discovery of a number of remarkable new paradigms for information processing and communication. These developments include quantum cryptography schemes that offer unconditionally secure information transport guaranteed by quantum-mechanical laws. Such potentially disruptive security technologies could be of high strategic and economic value in the future. Two major issues confronting researchers in this field are the transmission range (typically <100km) and the key exchange rate, which can be as low as a few bits per second at long optical fiber distances. This paper describes further research of an approach to significantly enhance the key exchange rate in an optical fiber system at distances in the range of 1-20km. We will present results on a number of application scenarios, including point-to-point links and multi-user networks. Quantum key distribution systems have been developed, which use standard telecommunications optical fiber, and which are capable of operating at clock rates of up to 2GHz. They implement a polarization-encoded version of the B92 protocol and employ vertical-cavity surface-emitting lasers with emission wavelengths of 850 nm as weak coherent light sources, as well as silicon single-photon avalanche diodes as the single photon detectors. The point-to-point quantum key distribution system exhibited a quantum bit error rate of 1.4%, and an estimated net bit rate greater than 100,000 bits-1 for a 4.2 km transmission range.

  8. Addressing the key communication barriers between microbiology laboratories and clinical units: a qualitative study

    PubMed Central

    Skodvin, Brita; Aase, Karina; Brekken, Anita Løvås; Charani, Esmita; Lindemann, Paul Christoffer; Smith, Ingrid

    2017-01-01

    Abstract Background Many countries are on the brink of establishing antibiotic stewardship programmes in hospitals nationwide. In a previous study we found that communication between microbiology laboratories and clinical units is a barrier to implementing efficient antibiotic stewardship programmes in Norway. We have now addressed the key communication barriers between microbiology laboratories and clinical units from a laboratory point of view. Methods Qualitative semi-structured interviews were conducted with 18 employees (managers, doctors and technicians) from six diverse Norwegian microbiological laboratories, representing all four regional health authorities. Interviews were recorded and transcribed verbatim. Thematic analysis was applied, identifying emergent themes, subthemes and corresponding descriptions. Results The main barrier to communication is disruption involving specimen logistics, information on request forms, verbal reporting of test results and information transfer between poorly integrated IT systems. Furthermore, communication is challenged by lack of insight into each other’s area of expertise and limited provision of laboratory services, leading to prolonged turnaround time, limited advisory services and restricted opening hours. Conclusions Communication between microbiology laboratories and clinical units can be improved by a review of testing processes, educational programmes to increase insights into the other’s area of expertise, an evaluation of work tasks and expansion of rapid and point-of-care test services. Antibiotic stewardship programmes may serve as a valuable framework to establish these measures. PMID:28633405

  9. Too much information? A document analysis of sport safety resources from key organisations.

    PubMed

    Bekker, Sheree; Finch, Caroline F

    2016-05-06

    The field of sport injury prevention has seen a marked increase in published research in recent years, with concomitant proliferation of lay sport safety resources, such as policies, fact sheets and posters. The aim of this study was to catalogue and categorise the number, type and topic focus of sport safety resources from a representative set of key organisations. Cataloguing and qualitative document analysis of resources available from the websites of six stakeholder organisations in Australia. This study was part of a larger investigation, the National Guidance for Australian Football Partnerships and Safety (NoGAPS) project. The NoGAPS study provided the context for a purposive sampling of six organisations involved in the promotion of safety in Australian football. These partners are recognised as being highly representative of organisations at national and state level that reflect similarly in their goals around sport safety promotion in Australia. The catalogue comprised 284 resources. More of the practical and less prescriptive types of resources, such as fact sheets, than formal policies were found. Resources for the prevention of physical injuries were the predominant sport safety issue addressed, with risk management, environmental issues and social behaviours comprising other categories. Duplication of resources for specific safety issues, within and across organisations, was found. People working within sport settings have access to a proliferation of resources, which creates a potential rivalry for sourcing of injury prevention information. Important issues that are likely to influence the uptake of safety advice by the general sporting public include the sheer number of resources available, and the overlap and duplication of resources addressing the same issues. The existence of a large number of resources from reputable organisations does not mean that they are necessarily evidence based, fully up to date or even effective in supporting sport

  10. Summary of Key Operating Statistics: Data Collected from the 2009 Annual Institutional Report

    ERIC Educational Resources Information Center

    Accrediting Council for Independent Colleges and Schools, 2010

    2010-01-01

    The Accrediting Council for Independent Colleges and Schools (ACICS) provides the Summary of Key Operating Statistics (KOS) as an annual review of the performance and key measurements of the more than 800 private post-secondary institutions we accredit. This edition of the KOS contains information based on the 2009 Annual Institutional Reports…

  11. What? Me? Teach Dance? Background and Confidence of Primary Preservice Teachers in Dance Education across Five Countries

    ERIC Educational Resources Information Center

    Russell-Bowie, Deirdre E.

    2013-01-01

    In primary schools across many countries, dance is now included within the arts key learning area with its own outcomes and content. But as future teachers of dance and other art forms, how do preservice generalist primary teachers perceive their background and confidence in relation to dance and dance education? This study investigates the…

  12. Personal, Anticipated Information Need

    ERIC Educational Resources Information Center

    Bruce, Harry

    2005-01-01

    Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…

  13. Physical key-protected one-time pad

    PubMed Central

    Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei

    2013-01-01

    We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925

  14. How do hospitalised patients with Turkish migration background estimate their language skills and their comprehension of medical information – a prospective cross-sectional study and comparison to native patients in Germany to assess the language barrier and the need for translation

    PubMed Central

    2013-01-01

    Background Today more than two million people with Turkish migration background live in Germany making them the largest ethnic minority in the country. Data concerning language skills and the perception of medical information in hospitalised patients with Turkish migration background (T) are scarce. Our study is the first to gather quantitative information on this important subject. Methods T and hospitalised German patients without migration background (G) of our university hospital were prospectively included into a cross-sectional study and completed a questionnaire - each group in the appropriate language (T: Turkish, G: German). Results 121 T and 121 G were included. Groups significantly differed in age (T: 44.9 ± 17.8, G: 56.9 ± 16.7y) and proportion of males (T: 37.2, G: 54.5%) but not regarding the proportion of college graduates (T: 19.3, G: 15.7%). The majority of T was born in Turkey (71%) and is of Turkish nationality (66%). 74% of T speak mainly Turkish at home; however, 73% speak German at work. 74.4% of T self-rated their German linguistic proficiency as “average” or better while 25.6% reported it as “very bad” or “bad”. 10.7% of T need translation in order to pursue everyday activities. T were significantly less satisfied with the physician’s information on disease and estimated to understand significantly less of what the physician told them: 46.3% of T estimated their reception of the physician’s information to be “average” or worse. 43.3% of T had the impression that it would have helped them “much” or “very much” to be aided by an interpreter at the hospital. The information transmitted while giving informed consent to invasive medical procedure was judged to be “mostly” or “completely” sufficient by the majority of T (76%) and G (89.8%). In this setting 37 of 96 T (38.5%) reported being helped by an interpreter – in most cases (64.9%) a family member. Conclusion Although the majority of

  15. Key experimental information on intermediate-range atomic structures in amorphous Ge2Sb2Te5 phase change material

    NASA Astrophysics Data System (ADS)

    Hosokawa, Shinya; Pilgrim, Wolf-Christian; Höhle, Astrid; Szubrin, Daniel; Boudet, Nathalie; Bérar, Jean-François; Maruyama, Kenji

    2012-04-01

    Laser-induced crystalline-amorphous phase change of Ge-Sb-Te alloys is the key mechanism enabling the fast and stable writing/erasing processes in rewritable optical storage devices, such as digital versatile disk (DVD) or blu-ray disk. Although the structural information in the amorphous phase is essential for clarifying this fast process, as well as long lasting stabilities of both the phases, experimental works were mostly limited to the short-range order by x ray absorption fine structure. Here we show both the short and intermediate-range atomic structures of amorphous DVD material, Ge2Sb2Te5 (GST), investigated by a combination of anomalous x ray scattering and reverse Monte Carlo modeling. From the obtained atomic configurations of amorphous GST, we have found that the Sb atoms and half of the Ge atoms play roles in the fast phase change process of order-disorder transition, while the remaining Ge atoms act for the proper activation energy of barriers between the amorphous and crystalline phases.

  16. Getting something out of nothing in the measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tan, Yong-Gang; Cai, Qing-Yu; Yang, Hai-Feng; Hu, Yao-Hua

    2015-11-01

    Because of the monogamy of entanglement, the measurement-device-independent quantum key distribution is immune to the side-information leaking of the measurement devices. When the correlated measurement outcomes are generated from the dark counts, no entanglement is actually obtained. However, secure key bits can still be proven to be generated from these measurement outcomes. Especially, we will give numerical studies on the contributions of dark counts to the key generation rate in practical decoy state MDI-QKD where a signal source, a weaker decoy source and a vacuum decoy source are used by either legitimate key distributer.

  17. Institutional Data Management in Higher Education. ECAR Key Findings

    ERIC Educational Resources Information Center

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  18. Backlighting the Universe: Understanding the Large-Scale Structure Through Cosmic Microwave Background Observations

    NASA Astrophysics Data System (ADS)

    Schaan, Emmanuel Sebastien

    The primary fluctuations in the cosmic microwave background (CMB), the leftover heat from the big bang, have revealed invaluable clues about our universe (age, history, geometry, composition), and are now measured almost to the cosmic variance limit. While important fundamental physics questions remain to be answered from the primary CMB alone (e.g., detection of gravitational waves from inflation, number of relativistic species), many others require looking beyond the primary anisotropies: what is dark energy, this mysterious component responsible for the accelerated expansion of the universe? What is the nature of the dark matter, five times more abundant than ordinary matter? What are the masses of the neutrinos? The clustering pattern in the spatial distribution of galaxies across the universe, the so-called large-scale structure (LSS), contains the key to these fundamental physics questions, as well as many tightly related astrophysical questions: what are the key processes in galaxy formation? How did the universe transition from neutral to ionized, one billion years after the big bang? However, several hurdles hinder extracting this information: non-linear evolution under gravity is complex to model and turns independent Gaussian initial conditions into coupled non-Gaussian modes; uncertain astrophysical effects obscure the connection between visible and dark matter, and alter the matter power spectrum on small-scales; LSS observables are often complex and systematics-limited. In this thesis, I tackle these issues and explore various ways of using the CMB as a backlight for the LSS, to illuminate aspects of its uncertain physics and systematics. In the coming years, ever more sensitive CMB experiments (AdvACT, SPT-3G, Simons Observatory, CMB Stage 4) will overlap with imaging surveys (DES, HSC, LSST, Euclid, WFIRST) and spectroscopic surveys (DESI, PFS), thus greatly magnifying the power of the methods I developed, and helping to answer some of the most

  19. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  20. Detection prospects for the Cosmic Neutrino Background using laser interferometers

    NASA Astrophysics Data System (ADS)

    Domcke, Valerie; Spinrath, Martin

    2017-06-01

    The cosmic neutrino background is a key prediction of Big Bang cosmology which has not been observed yet. The movement of the earth through this neutrino bath creates a force on a pendulum, as if it were exposed to a cosmic wind. We revise here estimates for the resulting pendulum acceleration and compare it to the theoretical sensitivity of an experimental setup where the pendulum position is measured using current laser interferometer technology as employed in gravitational wave detectors. We discuss how a significant improvement of this setup can be envisaged in a micro gravity environment. The proposed setup could also function as a dark matter detector in the sub-MeV range, which currently eludes direct detection constraints.