Key management schemes using routing information frames in secure wireless sensor networks
NASA Astrophysics Data System (ADS)
Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.
2017-01-01
The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.
Information Security Scheme Based on Computational Temporal Ghost Imaging.
Jiang, Shan; Wang, Yurong; Long, Tao; Meng, Xiangfeng; Yang, Xiulun; Shu, Rong; Sun, Baoqing
2017-08-09
An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.
Cheng, Gong; Huang, Lu-qi; Xue, Da-yuan; Zhang, Xiao-bo
2014-12-01
The survey of traditional knowledge related to Chinese materia medica resources is the important component and one of the innovative aspects of the fourth national survey of the Chinese materia medica resources. China has rich traditional knowledge of traditional Chinese medicine (TCM) and the comprehensive investigation of TCM traditional knowledge aims to promote conservation and sustainable use of Chinese materia medica resources. Building upon the field work of pilot investigations, this paper introduces the essential procedures and key methods for conducting the survey of traditional knowledge related to Chinese materia medica resources. The essential procedures are as follows. First is the preparation phrase. It is important to review all relevant literature and provide training to the survey teams so that they have clear understanding of the concept of traditional knowledge and master key survey methods. Second is the field investigation phrase. When conducting field investigations, survey teams should identify the traditional knowledge holders by using the 'snowball method', record the traditional knowledge after obtaining prior informed concerned from the traditional knowledge holders. Researchers should fill out the survey forms provided by the Technical Specification of the Fourth National Survey of Chinese Materia Medica Resources. Researchers should pay particular attention to the scope of traditional knowledge and the method of inheriting the knowledge, which are the key information for traditional knowledge holders and potential users to reach mutual agreed terms to achieve benefit sharing. Third is the data compilation and analysis phrase. Researchers should try to compile and edit the TCM traditional knowledge in accordance with intellectual property rights requirements so that the information collected through the national survey can serve as the basic data for the TCM traditional knowledge database. The key methods of the survey include regional division of Chinese materia medica resources, interview of key information holders and standardization of information.' In particular, using "snowball method" can effectively identify traditional knowledge holder in the targeted regions and ensuring traditional knowledge holders receiving prior informed concerned before sharing the information with researcher to make sure the rights of traditional knowledge holders are protected. Employing right survey methods is not only the key to obtain traditional knowledge related to Chinese materia medica resources, but also the pathway to fulfill the objectives of access and benefit sharing stipulated in Convention on Biological Resources. It will promote the legal protection of TCM traditional knowledge and conservation of TCM intangible, cultural heritage.
High-efficiency reconciliation for continuous variable quantum key distribution
NASA Astrophysics Data System (ADS)
Bai, Zengliang; Yang, Shenshen; Li, Yongmin
2017-04-01
Quantum key distribution (QKD) is the most mature application of quantum information technology. Information reconciliation is a crucial step in QKD and significantly affects the final secret key rates shared between two legitimate parties. We analyze and compare various construction methods of low-density parity-check (LDPC) codes and design high-performance irregular LDPC codes with a block length of 106. Starting from these good codes and exploiting the slice reconciliation technique based on multilevel coding and multistage decoding, we realize high-efficiency Gaussian key reconciliation with efficiency higher than 95% for signal-to-noise ratios above 1. Our demonstrated method can be readily applied in continuous variable QKD.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sandford, M.T. II; Bradley, J.N.; Handel, T.G.
Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits,more » is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.« less
NASA Astrophysics Data System (ADS)
Sandford, Maxwell T., II; Bradley, Jonathan N.; Handel, Theodore G.
1996-01-01
Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in MicrosoftTM bitmap (BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed `steganography.' Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or `lossy' compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is derived from the original host data by an analysis algorithm.
A text zero-watermarking method based on keyword dense interval
NASA Astrophysics Data System (ADS)
Yang, Fan; Zhu, Yuesheng; Jiang, Yifeng; Qing, Yin
2017-07-01
Digital watermarking has been recognized as a useful technology for the copyright protection and authentication of digital information. However, rarely did the former methods focus on the key content of digital carrier. The idea based on the protection of key content is more targeted and can be considered in different digital information, including text, image and video. In this paper, we use text as research object and a text zero-watermarking method which uses keyword dense interval (KDI) as the key content is proposed. First, we construct zero-watermarking model by introducing the concept of KDI and giving the method of KDI extraction. Second, we design detection model which includes secondary generation of zero-watermark and the similarity computing method of keyword distribution. Besides, experiments are carried out, and the results show that the proposed method gives better performance than other available methods especially in the attacks of sentence transformation and synonyms substitution.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601
A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays
Jang, Seung-Jae; Lee, Young-Gu; Lee, Kwang-Hyung; Kim, Tai-Hoon; Jun, Moon-Seog
2011-01-01
These days, with the emergence of the concept of ubiquitous computing, sensor networks that collect, analyze and process all the information through the sensors have become of huge interest. However, sensor network technology fundamentally has wireless communication infrastructure as its foundation and thus has security weakness and limitations such as low computing capacity, power supply limitations and price. In this paper, and considering the characteristics of the sensor network environment, we propose a group key agreement method using a keyset pre-distribution of two-dimension arrays that should minimize the exposure of key and personal information. The key collision problems are resolved by utilizing a polygonal shape’s center of gravity. The method shows that calculating a polygonal shape’s center of gravity only requires a very small amount of calculations from the users. The simple calculation not only increases the group key generation efficiency, but also enhances the sense of security by protecting information between nodes. PMID:22164072
NASA Astrophysics Data System (ADS)
Zhang, Leihong; Pan, Zilan; Liang, Dong; Ma, Xiuhua; Zhang, Dawei
2015-12-01
An optical encryption method based on compressive ghost imaging (CGI) with double random-phase encoding (DRPE), named DRPE-CGI, is proposed. The information is first encrypted by the sender with DRPE, the DRPE-coded image is encrypted by the system of computational ghost imaging with a secret key. The key of N random-phase vectors is generated by the sender and will be shared with the receiver who is the authorized user. The receiver decrypts the DRPE-coded image with the key, with the aid of CGI and a compressive sensing technique, and then reconstructs the original information by the technique of DRPE-decoding. The experiments suggest that cryptanalysts cannot get any useful information about the original image even if they eavesdrop 60% of the key at a given time, so the security of DRPE-CGI is higher than that of the security of conventional ghost imaging. Furthermore, this method can reduce 40% of the information quantity compared with ghost imaging while the qualities of reconstructing the information are the same. It can also improve the quality of the reconstructed plaintext information compared with DRPE-GI with the same sampling times. This technique can be immediately applied to encryption and data storage with the advantages of high security, fast transmission, and high quality of reconstructed information.
Yasuhara, Tomohisa; Sone, Tomomichi; Konishi, Motomi; Kushihata, Taro; Nishikawa, Tomoe; Yamamoto, Yumi; Kurio, Wasako; Kohno, Takeyuki
2015-01-01
The KJ method (named for developer Jiro Kawakita; also known as affinity diagramming) is widely used in participatory learning as a means to collect and organize information. In addition, the World Café (WC) has recently become popular. However, differences in the information obtained using each method have not been studied comprehensively. To determine the appropriate information selection criteria, we analyzed differences in the information generated by the WC and KJ methods. Two groups engaged in sessions to collect and organize information using either the WC or KJ method and small group discussions were held to create "proposals to improve first-year education". Both groups answered two pre- and post- session questionnaires that asked for free descriptions. Key words were extracted from the results of the two questionnaires and categorized using text mining. In the responses to questionnaire 1, which was directly related to the session theme, a significant increase in the number of key words was observed in the WC group (p=0.0050, Fisher's exact test). However, there was no significant increase in the number of key words in the responses to questionnaire 2, which was not directly related to the session theme (p=0.8347, Fisher's exact test). In the KJ method, participants extracted the most notable issues and progressed to a detailed discussion, whereas in the WC method, various information and problems were spread among the participants. The choice between the WC and KJ method should be made to reflect the educational objective and desired direction of discussion.
Razavi, Hessom; Kuper, Hannah; Rezvan, Farhad; Amelie, Khatere; Mahboobi-Pur, Hassan; Oladi, Mohammad Reza; Muhit, Mohammad; Hashemi, Hassan
2010-03-01
To estimate the prevalence and causes of severe visual impairment and blindness among children in Lorestan province of Iran, and to assess the feasibility of the Key Informant Method in this setting. Potential cases were identified using the Key Informant Method, in 3 counties of Lorestan province during June through August 2008, and referred for examination. Causes of severe visual impairment/blindness were determined and categorized using standard World Health Organization methods. Of 123 children referred for examination, 27 children were confirmed to have severe visual impairment/blindness or blindness. The median age was11 years (interquartile range 6-13), and 59% were girls. After adjusting for non-attenders, the estimated prevalence of severe visual impairment/blindness was 0.04% (0.03-0.05). The main site of abnormality was retina (44%), followed by disorders of the whole eye (33%). The majority of causes had a hereditary etiology (70%), which was associated with a family history of blindness (P = 0.002). Potentially avoidable causes of severe visual impairment/blindness were found in 14 children (52%). Almost all children with severe visual impairment/blindness had a history of parental consanguinity (93%). Our findings suggest a moderate prevalence of childhood blindness in the Lorestan province of Iran, a high proportion of which may be avoidable, given improved access to ophthalmic and genetic counselling services in rural areas. The Key Informant Method is feasible in Iran; future research is discussed.
The Model Method: Singapore Children's Tool for Representing and Solving Algebraic Word Problems
ERIC Educational Resources Information Center
Ng, Swee Fong; Lee, Kerry
2009-01-01
Solving arithmetic and algebraic word problems is a key component of the Singapore elementary mathematics curriculum. One heuristic taught, the model method, involves drawing a diagram to represent key information in the problem. We describe the model method and a three-phase theoretical framework supporting its use. We conducted 2 studies to…
ERIC Educational Resources Information Center
Rainey, Jacquie
2007-01-01
Background: This paper describes a portion of a larger evaluation project of a state hepatitis prevention program. Purpose: The study explored the suggestions of key informants related to the delivery of hepatitis services in the state. Methods: Researchers conducted key informant interviews lasting 30 to 45 minutes. Results: Important findings…
ERIC Educational Resources Information Center
Manyibe, Edward O.; Moore, Corey L.; Wang, Ningning; Davis, Dytisha; Aref, Fariborz; Washington, Andre L.; Johnson, Jean; Eugene-Cross, Kenyotta; Muhammad, Atashia; Lewis, Allen
2017-01-01
Purpose: This study examined and documented minority disability and health research leaders' experiences and perspectives on career development challenges and success strategies. Methods: A sample of 15 African American, American Indian or Alaskan Native, Latino, and Asian research leaders as key informants participated in the inquiry. Research…
Virtual-optical information security system based on public key infrastructure
NASA Astrophysics Data System (ADS)
Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben
2005-01-01
A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.
Performance of device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Cao, Zhu; Zhao, Qi; Ma, Xiongfeng
2016-07-01
Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .
1995-09-01
vital processes of a business. process, IDEF, method, methodology, modeling, knowledge acquisition, requirements definition, information systems... knowledge resources. Like manpower, materials, and machines, information and knowledge assets are recognized as vital resources that can be leveraged to...integrated enterprise. These technologies are designed to leverage information and knowledge resources as the key enablers for high quality systems
[Key informers. When and How?].
Martín González, R
2009-03-01
When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.
Security enhancement of optical encryption based on biometric array keys
NASA Astrophysics Data System (ADS)
Yan, Aimin; Wei, Yang; Zhang, Jingtao
2018-07-01
A novel optical image encryption method is proposed by using Dammann grating and biometric array keys. Dammann grating is utilized to create a 2D finite uniform-intensity spot array. In encryption, a fingerprint array is used as private encryption keys. An original image can be encrypted by a scanning Fresnel zone plate array. Encrypted signals are processed by an optical coherent heterodyne detection system. Biometric array keys and optical scanning cryptography are integrated with each other to enhance information security greatly. Numerical simulations are performed to demonstrate the feasibility and validity of this method. Analyses on key sensitivity and the resistance against to possible attacks are provided.
System of end-to-end symmetric database encryption
NASA Astrophysics Data System (ADS)
Galushka, V. V.; Aydinyan, A. R.; Tsvetkova, O. L.; Fathi, V. A.; Fathi, D. V.
2018-05-01
The article is devoted to the actual problem of protecting databases from information leakage, which is performed while bypassing access control mechanisms. To solve this problem, it is proposed to use end-to-end data encryption, implemented at the end nodes of an interaction of the information system components using one of the symmetric cryptographic algorithms. For this purpose, a key management method designed for use in a multi-user system based on the distributed key representation model, part of which is stored in the database, and the other part is obtained by converting the user's password, has been developed and described. In this case, the key is calculated immediately before the cryptographic transformations and is not stored in the memory after the completion of these transformations. Algorithms for registering and authorizing a user, as well as changing his password, have been described, and the methods for calculating parts of a key when performing these operations have been provided.
Exploiting domain information for Word Sense Disambiguation of medical documents.
Stevenson, Mark; Agirre, Eneko; Soroa, Aitor
2012-01-01
Current techniques for knowledge-based Word Sense Disambiguation (WSD) of ambiguous biomedical terms rely on relations in the Unified Medical Language System Metathesaurus but do not take into account the domain of the target documents. The authors' goal is to improve these methods by using information about the topic of the document in which the ambiguous term appears. The authors proposed and implemented several methods to extract lists of key terms associated with Medical Subject Heading terms. These key terms are used to represent the document topic in a knowledge-based WSD system. They are applied both alone and in combination with local context. A standard measure of accuracy was calculated over the set of target words in the widely used National Library of Medicine WSD dataset. The authors report a significant improvement when combining those key terms with local context, showing that domain information improves the results of a WSD system based on the Unified Medical Language System Metathesaurus alone. The best results were obtained using key terms obtained by relevance feedback and weighted by inverse document frequency.
Exploiting domain information for Word Sense Disambiguation of medical documents
Agirre, Eneko; Soroa, Aitor
2011-01-01
Objective Current techniques for knowledge-based Word Sense Disambiguation (WSD) of ambiguous biomedical terms rely on relations in the Unified Medical Language System Metathesaurus but do not take into account the domain of the target documents. The authors' goal is to improve these methods by using information about the topic of the document in which the ambiguous term appears. Design The authors proposed and implemented several methods to extract lists of key terms associated with Medical Subject Heading terms. These key terms are used to represent the document topic in a knowledge-based WSD system. They are applied both alone and in combination with local context. Measurements A standard measure of accuracy was calculated over the set of target words in the widely used National Library of Medicine WSD dataset. Results and discussion The authors report a significant improvement when combining those key terms with local context, showing that domain information improves the results of a WSD system based on the Unified Medical Language System Metathesaurus alone. The best results were obtained using key terms obtained by relevance feedback and weighted by inverse document frequency. PMID:21900701
Three-dimensional information hierarchical encryption based on computer-generated holograms
NASA Astrophysics Data System (ADS)
Kong, Dezhao; Shen, Xueju; Cao, Liangcai; Zhang, Hao; Zong, Song; Jin, Guofan
2016-12-01
A novel approach for encrypting three-dimensional (3-D) scene information hierarchically based on computer-generated holograms (CGHs) is proposed. The CGHs of the layer-oriented 3-D scene information are produced by angular-spectrum propagation algorithm at different depths. All the CGHs are then modulated by different chaotic random phase masks generated by the logistic map. Hierarchical encryption encoding is applied when all the CGHs are accumulated one by one, and the reconstructed volume of the 3-D scene information depends on permissions of different users. The chaotic random phase masks could be encoded into several parameters of the chaotic sequences to simplify the transmission and preservation of the keys. Optical experiments verify the proposed method and numerical simulations show the high key sensitivity, high security, and application flexibility of the method.
Two-Party secret key distribution via a modified quantum secret sharing protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grice, Warren P.; Evans, Philip G.; Lawrie, Benjamin
We present and demonstrate a method of distributing secret information based on N-party single-qubit Quantum Secret Sharing (QSS) in a modied plug-and-play two-party Quantum Key Distribution (QKD) system with N 2 intermediate nodes and compare it to both standard QSS and QKD. Our setup is based on the Clavis2 QKD system built by ID Quantique but is generalizable to any implementation. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N 2 parties. This method signicantly reduces the number of resources (singlemore » photon detectors, lasers and dark ber connections) needed to implement QKD on the grid.« less
Two-Party secret key distribution via a modified quantum secret sharing protocol
Grice, Warren P.; Evans, Philip G.; Lawrie, Benjamin; ...
2015-01-01
We present and demonstrate a method of distributing secret information based on N-party single-qubit Quantum Secret Sharing (QSS) in a modied plug-and-play two-party Quantum Key Distribution (QKD) system with N 2 intermediate nodes and compare it to both standard QSS and QKD. Our setup is based on the Clavis2 QKD system built by ID Quantique but is generalizable to any implementation. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N 2 parties. This method signicantly reduces the number of resources (singlemore » photon detectors, lasers and dark ber connections) needed to implement QKD on the grid.« less
Information hiding based on double random-phase encoding and public-key cryptography.
Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li
2009-03-02
A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.
Secure information transmission in filter bank multi-carrier spread spectrum systems
Majid, Arslan; Moradi, Hussein; Farhang-Boroujeny, Behrouz
2015-12-17
This report discusses the issue of secure information transmission for a spread-spectrum system, which in our case is Filter-Bank Multi-Carrier spread spectrum (FB-MC SS). We develop a novel method for generating a secret key to augment the security of the spread spectrum system. The proposed key generation takes advantage of the channel reciprocity exhibited between two communicating parties.We validate the key generation aspect of our system by using real-world measurements. It is found that our augmentation of strongest path cancellation (SPC) is shown to be highly effective in our measurement scenarios where the adversary’s key would otherwise be significantly correlatedmore » with the legitimate nodes. Our approach in using the proposed key generation method as a part of FB-MC SS allows for it to be fault tolerant and it is not necessarily limited to FB-MC SS or spread-spectrum system in general. However, the advantage that our approach has in the domain of spread-spectrum security is that it significantly decorrelates the adversary’s key from the authentic parties. This aspect is crucial because if the adversary’s key is similar to the legitamate parties, then the adversary obtains a sizable advantage due to the fault tolerance nature of the developed spread spectrum key.« less
Secure information transmission in filter bank multi-carrier spread spectrum systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Majid, Arslan; Moradi, Hussein; Farhang-Boroujeny, Behrouz
This report discusses the issue of secure information transmission for a spread-spectrum system, which in our case is Filter-Bank Multi-Carrier spread spectrum (FB-MC SS). We develop a novel method for generating a secret key to augment the security of the spread spectrum system. The proposed key generation takes advantage of the channel reciprocity exhibited between two communicating parties.We validate the key generation aspect of our system by using real-world measurements. It is found that our augmentation of strongest path cancellation (SPC) is shown to be highly effective in our measurement scenarios where the adversary’s key would otherwise be significantly correlatedmore » with the legitimate nodes. Our approach in using the proposed key generation method as a part of FB-MC SS allows for it to be fault tolerant and it is not necessarily limited to FB-MC SS or spread-spectrum system in general. However, the advantage that our approach has in the domain of spread-spectrum security is that it significantly decorrelates the adversary’s key from the authentic parties. This aspect is crucial because if the adversary’s key is similar to the legitamate parties, then the adversary obtains a sizable advantage due to the fault tolerance nature of the developed spread spectrum key.« less
Distributed Data Networks That Support Public Health Information Needs.
Tabano, David C; Cole, Elizabeth; Holve, Erin; Davidson, Arthur J
Data networks, consisting of pooled electronic health data assets from health care providers serving different patient populations, promote data sharing, population and disease monitoring, and methods to assess interventions. Better understanding of data networks, and their capacity to support public health objectives, will help foster partnerships, expand resources, and grow learning health systems. We conducted semistructured interviews with 16 key informants across the United States, identified as network stakeholders based on their respective experience in advancing health information technology and network functionality. Key informants were asked about their experience with and infrastructure used to develop data networks, including each network's utility to identify and characterize populations, usage, and sustainability. Among 11 identified data networks representing hundreds of thousands of patients, key informants described aggregated health care clinical data contributing to population health measures. Key informant interview responses were thematically grouped to illustrate how networks support public health, including (1) infrastructure and information sharing; (2) population health measures; and (3) network sustainability. Collaboration between clinical data networks and public health entities presents an opportunity to leverage infrastructure investments to support public health. Data networks can provide resources to enhance population health information and infrastructure.
1992-05-01
methodology, knowledge acquisition, 140 requirements definition, information systems, information engineering, 16. PRICE CODE systems engineering...and knowledge resources. Like manpower, materials, and machines, information and knowledge assets are recognized as vital resources that can be...evolve towards an information -integrated enterprise. These technologies are designed to leverage information and knowledge resources as the key
Genetically Informative Research on Adolescent Substance Use: Methods, Findings, and Challenges
ERIC Educational Resources Information Center
Lynskey, Michael T.; Agrawal, Arpana; Heath, Andrew C.
2010-01-01
Objective: To provide an overview of the genetic epidemiology of substance use and misuse in adolescents. Method: A selective review of genetically informative research strategies, their limitations, and key findings examining issues related to the heritability of substance use and substance use disorders in children and adolescents is presented.…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-23
... key research questions. Qualitative information collected from site visits is a critical data source... September 23, 2013. ADDRESSES: You may submit comments by either one of the following methods: Email: Javar.... Instructions: Please submit one copy of your comments by only one method. All submissions received must include...
The comparison and analysis of extracting video key frame
NASA Astrophysics Data System (ADS)
Ouyang, S. Z.; Zhong, L.; Luo, R. Q.
2018-05-01
Video key frame extraction is an important part of the large data processing. Based on the previous work in key frame extraction, we summarized four important key frame extraction algorithms, and these methods are largely developed by comparing the differences between each of two frames. If the difference exceeds a threshold value, take the corresponding frame as two different keyframes. After the research, the key frame extraction based on the amount of mutual trust is proposed, the introduction of information entropy, by selecting the appropriate threshold values into the initial class, and finally take a similar mean mutual information as a candidate key frame. On this paper, several algorithms is used to extract the key frame of tunnel traffic videos. Then, with the analysis to the experimental results and comparisons between the pros and cons of these algorithms, the basis of practical applications is well provided.
The Design and Implement of Tourism Information System Based on GIS
NASA Astrophysics Data System (ADS)
Chunchang, Fu; Nan, Zhang
From the geographical information system concept, discusses the main contents of the geographic information system, and the current of the geographic information system key technological measures of tourism information system, the application of tourism information system for specific requirements and goals, and analyzes a relational database model based on the tourist information system in GIS application methods of realization.
Leadership Principles Leveraged from Key Civil War Battles
2017-05-15
primary research method utilized for this research paper. The purpose of the literature review was to find data and information regarding analysis of...review was the primary research method utilized for this research paper. The purpose of the literature review was to find data and information...data generation and analysis. Organizational Research Methods , 15 (2), 316-335. Becker, W.S. & Burke, M.J. (2014). Instructional staff
Rajić, Andrijana; Young, Ian; McEwen, Scott A
2013-05-01
Knowledge translation and transfer (KTT) aims to increase research utilization and ensure that the best available knowledge is used to inform policy and practice. Many frameworks, methods, and terms are used to describe KTT, and the field has largely developed in the health sector over the past decade. There is a need to review key KTT principles and methods in different sectors and evaluate their potential application in agri-food public health. We conducted a structured mixed-method review of the KTT literature. From 827 citations identified in a comprehensive search, we characterized 160 relevant review articles, case studies, and reports. A thematic analysis was conducted on a prioritized and representative subset of 33 articles to identify key principles and characteristics for ensuring effective KTT. The review steps were conducted by two or more independent reviewers using structured and pretested forms. We identified five key principles for effective KTT that were described within two contexts: to improve research utilization in general and to inform policy-making. To ensure general research uptake, there is a need for the following: (1) relevant and credible research; (2) ongoing interactions between researchers and end-users; (3) organizational support and culture; and (4) monitoring and evaluation. To inform policy-making, (5) researchers must also address the multiple and competing contextual factors of the policy-making process. We also describe 23 recommended and promising KTT methods, including six synthesis (e.g., systematic reviews, mixed-method reviews, and rapid reviews); nine dissemination (e.g., evidence summaries, social media, and policy briefs); and eight exchange methods (e.g., communities of practice, knowledge brokering, and policy dialogues). A brief description, contextual example, and key references are provided for each method. We recommend a wider endorsement of KTT principles and methods in agri-food public health, but there are also important gaps and challenges that should be addressed in the future.
How Qualitative Methods Can be Used to Inform Model Development.
Husbands, Samantha; Jowett, Susan; Barton, Pelham; Coast, Joanna
2017-06-01
Decision-analytic models play a key role in informing healthcare resource allocation decisions. However, there are ongoing concerns with the credibility of models. Modelling methods guidance can encourage good practice within model development, but its value is dependent on its ability to address the areas that modellers find most challenging. Further, it is important that modelling methods and related guidance are continually updated in light of any new approaches that could potentially enhance model credibility. The objective of this article was to highlight the ways in which qualitative methods have been used and recommended to inform decision-analytic model development and enhance modelling practices. With reference to the literature, the article discusses two key ways in which qualitative methods can be, and have been, applied. The first approach involves using qualitative methods to understand and inform general and future processes of model development, and the second, using qualitative techniques to directly inform the development of individual models. The literature suggests that qualitative methods can improve the validity and credibility of modelling processes by providing a means to understand existing modelling approaches that identifies where problems are occurring and further guidance is needed. It can also be applied within model development to facilitate the input of experts to structural development. We recommend that current and future model development would benefit from the greater integration of qualitative methods, specifically by studying 'real' modelling processes, and by developing recommendations around how qualitative methods can be adopted within everyday modelling practice.
NASA Astrophysics Data System (ADS)
Lee, M. J.; Oh, K. Y.; Joung-ho, L.
2016-12-01
Recently there are many research about analysing the interaction between entities by text-mining analysis in various fields. In this paper, we aimed to quantitatively analyse research-trends in the area of environmental research relating either spatial information or ICT (Information and Communications Technology) by Text-mining analysis. To do this, we applied low-dimensional embedding method, clustering analysis, and association rule to find meaningful associative patterns of key words frequently appeared in the articles. As the authors suppose that KCI (Korea Citation Index) articles reflect academic demands, total 1228 KCI articles that have been published from 1996 to 2015 were reviewed and analysed by Text-mining method. First, we derived KCI articles from NDSL(National Discovery for Science Leaders) site. And then we pre-processed their key-words elected from abstract and then classified those in separable sectors. We investigated the appearance rates and association rule of key-words for articles in the two fields: spatial-information and ICT. In order to detect historic trends, analysis was conducted separately for the four periods: 1996-2000, 2001-2005, 2006-2010, 2011-2015. These analysis were conducted with the usage of R-software. As a result, we conformed that environmental research relating spatial information mainly focused upon such fields as `GIS(35%)', `Remote-Sensing(25%)', `environmental theme map(15.7%)'. Next, `ICT technology(23.6%)', `ICT service(5.4%)', `mobile(24%)', `big data(10%)', `AI(7%)' are primarily emerging from environmental research relating ICT. Thus, from the analysis results, this paper asserts that research trends and academic progresses are well-structured to review recent spatial information and ICT technology and the outcomes of the analysis can be an adequate guidelines to establish environment policies and strategies. KEY WORDS: Big data, Test-mining, Environmental research, Spatial-information, ICT Acknowledgements: The authors appreciate the support that this study has received from `Building application frame of environmental issues, to respond to the latest ICT trends'.
NASA Astrophysics Data System (ADS)
Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato
2017-07-01
An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.
NASA Astrophysics Data System (ADS)
Krasilenko, Vladimir G.; Bardachenko, Vitaliy F.; Nikolsky, Alexander I.; Lazarev, Alexander A.; Ogorodnik, Konstantin V.
2006-04-01
We analyse the existent methods of cryptographic defence for the facsimile information transfer, consider their shortcomings and prove the necessity of better information protection degree. The method of information protection that is based on presentation of input data as images is proposed. We offer a new noise-immune algorithm for realization of this method which consists in transformation of an input frame by pixels transposition according to an entered key. At decoding mode the reverse transformation of image with the use of the same key is used. Practical realization of the given method takes into account noise in the transmission channels and information distortions by scanners, faxes and others like that. We show that the given influences are reduced to the transformation of the input image coordinates. We show the algorithm in detail and consider its basic steps. We show the possibility of the offered method by the means of the developed software. The realized algorithm corrects curvature of frames: turn, scaling, fallout of pixels and others like that. At low noise level (loss of pixel information less than 10 percents) it is possible to encode, transfer and decode any types of images and texts with 12-size font character. The software filters for information restore and noise removing allow to transfer fax data with 30 percents pixels loss at 18-size font text. This percent of data loss can be considerably increased by the use of the software character recognition block that can be realized on fuzzy-neural algorithms. Examples of encoding and decryption of images and texts are shown.
Optical image encryption method based on incoherent imaging and polarized light encoding
NASA Astrophysics Data System (ADS)
Wang, Q.; Xiong, D.; Alfalou, A.; Brosseau, C.
2018-05-01
We propose an incoherent encoding system for image encryption based on a polarized encoding method combined with an incoherent imaging. Incoherent imaging is the core component of this proposal, in which the incoherent point-spread function (PSF) of the imaging system serves as the main key to encode the input intensity distribution thanks to a convolution operation. An array of retarders and polarizers is placed on the input plane of the imaging structure to encrypt the polarized state of light based on Mueller polarization calculus. The proposal makes full use of randomness of polarization parameters and incoherent PSF so that a multidimensional key space is generated to deal with illegal attacks. Mueller polarization calculus and incoherent illumination of imaging structure ensure that only intensity information is manipulated. Another key advantage is that complicated processing and recording related to a complex-valued signal are avoided. The encoded information is just an intensity distribution, which is advantageous for data storage and transition because information expansion accompanying conventional encryption methods is also avoided. The decryption procedure can be performed digitally or using optoelectronic devices. Numerical simulation tests demonstrate the validity of the proposed scheme.
Morrato, Elaine H; Concannon, Thomas W; Meissner, Paul; Shah, Nilay D; Turner, Barbara J
2014-01-01
Aim To identify ongoing practices and opportunities for improving national comparative effectiveness research (CER) translation through dissemination and implementation (D&I) via NIH-funded Clinical and Translational Science Award (CTSA) institutions. Materials & methods Key informant interviews were conducted with 18 CTSA grantees sampled to represent a range of D&I efforts. Results & conclusions The institutional representatives endorsed fostering CER translation nationally via the CTSA Consortium. However, five themes emerged from the interviews as barriers to CER D&I: lack of institutional awareness, insufficient capacity, lack of established D&I methods, confusion among stakeholders about what CER actually is and limited funding opportunities. Interviewees offered two key recommendations to improve CER translation: development of a centralized clearing house to facilitate the diffusion of CER D&I resources and methods across CTSA institutions; and formalization of the national CTSA network to leverage existing community engagement relationships and resources for the purpose of adapting and disseminating robust CER evidence locally with providers, patients and healthcare systems. PMID:24236560
Optical image encryption by random shifting in fractional Fourier domains
NASA Astrophysics Data System (ADS)
Hennelly, B.; Sheridan, J. T.
2003-02-01
A number of methods have recently been proposed in the literature for the encryption of two-dimensional information by use of optical systems based on the fractional Fourier transform. Typically, these methods require random phase screen keys for decrypting the data, which must be stored at the receiver and must be carefully aligned with the received encrypted data. A new technique based on a random shifting, or jigsaw, algorithm is proposed. This method does not require the use of phase keys. The image is encrypted by juxtaposition of sections of the image in fractional Fourier domains. The new method has been compared with existing methods and shows comparable or superior robustness to blind decryption. Optical implementation is discussed, and the sensitivity of the various encryption keys to blind decryption is examined.
Reducing data friction through site-based data curation
NASA Astrophysics Data System (ADS)
Thomer, A.; Palmer, C. L.
2017-12-01
Much of geoscience research takes place at "scientifically significant sites": localities which have attracted a critical mass of scientific interest, and thereby merit protection by government bodies, as well as the preservation of specimen and data collections and the development of site-specific permitting requirements for access to the site and its associated collections. However, many data standards and knowledge organization schemas do not adequately describe key characteristics of the sites, despite their centrality to research projects. Through work conducted as part of the IMLS-funded Site-Based Data Curation (SBDC) project, we developed a Minimum Information Framework (MIF) for site-based science, in which "information about a site's structure" is considered a core class of information. Here we present our empirically-derived information framework, as well as the methods used to create it. We believe these approaches will lead to the development of more effective data repositories and tools, and thereby will reduce "data friction" in interdisciplinary, yet site-based, geoscience workflows. The Minimum Information Framework for Site-based Research was developed through work at two scientifically significant sites: the hot springs at Yellowstone National Park, which are key to geobiology research; and the La Brea Tar Pits, an important paleontology locality in Southern California. We employed diverse methods of participatory engagement, in which key stakeholders at our sites (e.g. curators, collections managers, researchers, permit officers) were consulted through workshops, focus groups, interviews, action research methods, and collaborative information modeling and systems analysis. These participatory approaches were highly effective in fostering on-going partnership among a diverse team of domain scientists, information scientists, and software developers. The MIF developed in this work may be viewed as a "proto-standard" that can inform future repository development and data standards. Further, the approaches used to develop the MIF represent an important step toward systematic methods of developing geoscience data standards. Finally, we argue that organizing data around aspects of a site makes data collections more accessible to a range of scientific communities.
a Mapping Method of Slam Based on Look up Table
NASA Astrophysics Data System (ADS)
Wang, Z.; Li, J.; Wang, A.; Wang, J.
2017-09-01
In the last years several V-SLAM(Visual Simultaneous Localization and Mapping) approaches have appeared showing impressive reconstructions of the world. However these maps are built with far more than the required information. This limitation comes from the whole process of each key-frame. In this paper we present for the first time a mapping method based on the LOOK UP TABLE(LUT) for visual SLAM that can improve the mapping effectively. As this method relies on extracting features in each cell divided from image, it can get the pose of camera that is more representative of the whole key-frame. The tracking direction of key-frames is obtained by counting the number of parallax directions of feature points. LUT stored all mapping needs the number of cell corresponding to the tracking direction which can reduce the redundant information in the key-frame, and is more efficient to mapping. The result shows that a better map with less noise is build using less than one-third of the time. We believe that the capacity of LUT efficiently building maps makes it a good choice for the community to investigate in the scene reconstruction problems.
SLAR image interpretation keys for geographic analysis
NASA Technical Reports Server (NTRS)
Coiner, J. C.
1972-01-01
A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.
Key Health Information Technologies and Related Issues for Iran: A Qualitative Study
Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh
2018-01-01
Background and Objective: Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. Methods: This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. Results: The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. Conclusion: In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making. PMID:29854016
Eavesdropping on counterfactual quantum key distribution with finite resources
NASA Astrophysics Data System (ADS)
Liu, Xingtong; Zhang, Bo; Wang, Jian; Tang, Chaojing; Zhao, Jingjing; Zhang, Sheng
2014-08-01
A striking scheme called "counterfactual quantum cryptography" gives a conceptually new approach to accomplish the task of key distribution. It allows two legitimate parties to share a secret even though a particle carrying secret information is not, in fact, transmitted through the quantum channel. Since an eavesdropper cannot directly access the entire quantum system of each signal particle, the protocol seems to provide practical security advantages. However, here we propose an eavesdropping method which works on the scheme in a finite key scenario. We show that, for practical systems only generating a finite number of keys, the eavesdropping can obtain all of the secret information without being detected. We also present a improved protocol as a countermeasure against this attack.
Gilmore, Kelly; Hoopes, Andrea J; Cady, Janet; Amies Oelschlager, Anne-Marie; Prager, Sarah; Vander Stoep, Ann
2015-06-01
The purpose of this study was to describe the implementation of a program that provides long-acting reversible contraception (LARC) services within school-based health centers (SBHCs) and to identify barriers and facilitators to implementation as reported by SBHC clinicians and administrators, public health officials, and community partners. We conducted 14 semistructured interviews with key informants involved in the implementation of LARC services. Key informants included SBHC clinicians and administrators, public health officials, and community partners. We used a content analysis approach to analyze interview transcripts for themes. We explored barriers to and facilitators of LARC service delivery across and within key informant groups. The most cited barriers across key informant groups were as follows: perceived lack of provider procedural skills and bias and negative attitudes about LARC methods. The most common facilitators identified across groups were as follows: clear communication strategies, contraceptive counseling practice changes, provider trainings, and stakeholder engagement. Two additional barriers emerged in specific key informant groups. Technical and logistical barriers to LARC service delivery were cited heavily by SBHC administrative staff, community partners, and public health officials. Expense and billing was a major barrier to SBHC administrative staff. LARC counseling and procedural services can be implemented in an SBHC setting to promote access to effective contraceptive options for adolescent women. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.
ERIC Educational Resources Information Center
Gärdén, Cecilia
2016-01-01
Introduction: Self-guided learning has had a major impact on adult education, where information seeking and use are key aspects of learning. With their lack of experience in study contexts, the students are nevertheless assumed to develop information literacy. Method: The paper aims to create an understanding of how information literacy can be…
Information Sharing: An Exploration of the Literature and Some Propositions
ERIC Educational Resources Information Center
Wilson, T. D.
2010-01-01
Purpose: Information sharing is a relatively unexplored part of the information behaviour. The aim of this paper is to examine the research on the concept, as it appears in other bodies of literature and to draw out the key variables that appear to influence information sharing in different contexts. Methods: A literature review was carried out…
"Just Google It"--The Scope of Freely Available Information Sources for Doctoral Thesis Writing
ERIC Educational Resources Information Center
Grigas, Vincas; Juzeniene, Simona; Velickaite, Jone
2017-01-01
Introduction: Recent developments in the field of scientific information resource provision lead us to the key research question, namely,what is the coverage of freely available information sources when writing doctoral theses, and whether the academic library can assume the leading role as a direct intermediator for information users. Method:…
Biometrics encryption combining palmprint with two-layer error correction codes
NASA Astrophysics Data System (ADS)
Li, Hengjian; Qiu, Jian; Dong, Jiwen; Feng, Guang
2017-07-01
To bridge the gap between the fuzziness of biometrics and the exactitude of cryptography, based on combining palmprint with two-layer error correction codes, a novel biometrics encryption method is proposed. Firstly, the randomly generated original keys are encoded by convolutional and cyclic two-layer coding. The first layer uses a convolution code to correct burst errors. The second layer uses cyclic code to correct random errors. Then, the palmprint features are extracted from the palmprint images. Next, they are fused together by XORing operation. The information is stored in a smart card. Finally, the original keys extraction process is the information in the smart card XOR the user's palmprint features and then decoded with convolutional and cyclic two-layer code. The experimental results and security analysis show that it can recover the original keys completely. The proposed method is more secure than a single password factor, and has higher accuracy than a single biometric factor.
Kim, Heejun; Bian, Jiantao; Mostafa, Javed; Jonnalagadda, Siddhartha; Del Fiol, Guilherme
2016-01-01
Motivation: Clinicians need up-to-date evidence from high quality clinical trials to support clinical decisions. However, applying evidence from the primary literature requires significant effort. Objective: To examine the feasibility of automatically extracting key clinical trial information from ClinicalTrials.gov. Methods: We assessed the coverage of ClinicalTrials.gov for high quality clinical studies that are indexed in PubMed. Using 140 random ClinicalTrials.gov records, we developed and tested rules for the automatic extraction of key information. Results: The rate of high quality clinical trial registration in ClinicalTrials.gov increased from 0.2% in 2005 to 17% in 2015. Trials reporting results increased from 3% in 2005 to 19% in 2015. The accuracy of the automatic extraction algorithm for 10 trial attributes was 90% on average. Future research is needed to improve the algorithm accuracy and to design information displays to optimally present trial information to clinicians.
Maximizing Program Delivery in Extension: Lessons from Leadership for Transformation.
ERIC Educational Resources Information Center
Laughlin, Kevin M.; Schmidt, Janet L.
1995-01-01
Reviews advantages and disadvantages of four extension delivery methods: partnerships, master volunteer programs, information centers, and regional programs. Concluded that the key is matching individual, community, and emerging needs with the right method. (SK)
NASA Astrophysics Data System (ADS)
Takeda, Masafumi; Nakano, Kazuya; Suzuki, Hiroyuki; Yamaguchi, Masahiro
2012-09-01
It has been shown that biometric information can be used as a cipher key for binary data encryption by applying double random phase encoding. In such methods, binary data are encoded in a bit pattern image, and the decrypted image becomes a plain image when the key is genuine; otherwise, decrypted images become random images. In some cases, images decrypted by imposters may not be fully random, such that the blurred bit pattern can be partially observed. In this paper, we propose a novel bit coding method based on a Fourier transform hologram, which makes images decrypted by imposters more random. Computer experiments confirm that the method increases the randomness of images decrypted by imposters while keeping the false rejection rate as low as in the conventional method.
Academic Primer Series: Eight Key Papers about Education Theory
Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M.; Krzyzaniak, Sara M.; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan
2017-01-01
Introduction Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. Methods A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. Results These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. Conclusion This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice. PMID:28210367
A Versatile, User-Oriented, Computerized Library System.
ERIC Educational Resources Information Center
Neuron, Eric
This paper deals with the problem of the referencing or storing methods in information systems which must be designed to allow for rapid retrieval of the key data leading to the desired information or the recovery of the information directly. Considered as a secondary, but frequently desirable, feature for the system is the ability to determine…
User Information Needs: The Challenge and a Response.
ERIC Educational Resources Information Center
Goodman, A. F.; Jones, S.O.
Described are the aims, goals, and methods of literature search of the Mechanized Library Information System serving West Coast locations of the McDonnell Douglas Corporation. Brief reports on two pilot programs, one on information awareness, and the other on a capability profile system for locating key personnel, are included. The first program…
Researching Society and Culture.
ERIC Educational Resources Information Center
Seale, Clive, Ed.
This book provides theoretically informed guidance to practicing the key research methods for investigating society and culture. It is a text in both methods and methodology, in which the importance of understanding the historical, theoretical and institutional context in which particular methods have developed is stressed. The contributors of the…
ERIC Educational Resources Information Center
Amuta, Ann Oyare; Chen, Xuewei; Mkuu, Rahma
2017-01-01
Background: Information seeking is crucial in the health behavior context. Cancer information seeking may play a key role in individuals' perceptions and subsequent health behaviors. Purpose: The purpose of this study is to investigate the influence of cancer information seeking on perceptions of cancer worry, fatalism and risk. Methods: Data from…
Information Integration for Concurrent Engineering (IICE) Compendium of Methods Report
1995-06-01
technological, economic, and strategic benefits can be attained through the effective capture, control, and management of information and knowledge ...resources. Like manpower, materials, and machines, information and knowledge assets are recognized as vital resources that can be leveraged to achieve...integrated enterprise. These technologies are designed to leverage information and knowledge resources as the key enablers for high quality systems that
Rowland, Susan L; Smith, Christopher A; Gillam, Elizabeth M A; Wright, Tony
2011-07-01
A strong, recent movement in tertiary education is the development of conceptual, or "big idea" teaching. The emphasis in course design is now on promoting key understandings, core competencies, and an understanding of connections between different fields. In biochemistry teaching, this radical shift from the content-based tradition is being driven by the "omics" information explosion; we can no longer teach all the information we have available. Biochemistry is a core, enabling discipline for much of modern scientific research, and biochemistry teaching is in urgent need of a method for delivery of conceptual frameworks. In this project, we aimed to define the key concepts in biochemistry. We find that the key concepts we defined map well onto the core science concepts recommended by the Vision and Change project. We developed a new method to present biochemistry through the lenses of these concepts. This new method challenged the way we thought about biochemistry as teachers. It also stimulated the majority of the students to think more deeply about biochemistry and to make links between biochemistry and material in other courses. This method is applicable to the full spectrum of content usually taught in biochemistry. Copyright © 2011 Wiley Periodicals, Inc.
Li, Shasha; Nie, Hongchao; Lu, Xudong; Duan, Huilong
2015-02-01
Integration of heterogeneous systems is the key to hospital information construction due to complexity of the healthcare environment. Currently, during the process of healthcare information system integration, people participating in integration project usually communicate by free-format document, which impairs the efficiency and adaptability of integration. A method utilizing business process model and notation (BPMN) to model integration requirement and automatically transforming it to executable integration configuration was proposed in this paper. Based on the method, a tool was developed to model integration requirement and transform it to integration configuration. In addition, an integration case in radiology scenario was used to verify the method.
Other Resources Related to SAM
Learn more about websites and information related to EPA's Selected Analytical Methods for Environmental Remediation and Recovery (SAM), including key EPA collaborators, laboratories, and research centers.
Pavement crack detection combining non-negative feature with fast LoG in complex scene
NASA Astrophysics Data System (ADS)
Wang, Wanli; Zhang, Xiuhua; Hong, Hanyu
2015-12-01
Pavement crack detection is affected by much interference in the realistic situation, such as the shadow, road sign, oil stain, salt and pepper noise etc. Due to these unfavorable factors, the exist crack detection methods are difficult to distinguish the crack from background correctly. How to extract crack information effectively is the key problem to the road crack detection system. To solve this problem, a novel method for pavement crack detection based on combining non-negative feature with fast LoG is proposed. The two key novelties and benefits of this new approach are that 1) using image pixel gray value compensation to acquisit uniform image, and 2) combining non-negative feature with fast LoG to extract crack information. The image preprocessing results demonstrate that the method is indeed able to homogenize the crack image with more accurately compared to existing methods. A large number of experimental results demonstrate the proposed approach can detect the crack regions more correctly compared with traditional methods.
Enabling the use of hereditary information from pedigree tools in medical knowledge-based systems.
Gay, Pablo; López, Beatriz; Plà, Albert; Saperas, Jordi; Pous, Carles
2013-08-01
The use of family information is a key issue to deal with inheritance illnesses. This kind of information use to come in the form of pedigree files, which contain structured information as tree or graphs, which explains the family relationships. Knowledge-based systems should incorporate the information gathered by pedigree tools to assess medical decision making. In this paper, we propose a method to achieve such a goal, which consists on the definition of new indicators, and methods and rules to compute them from family trees. The method is illustrated with several case studies. We provide information about its implementation and integration on a case-based reasoning tool. The method has been experimentally tested with breast cancer diagnosis data. The results show the feasibility of our methodology. Copyright © 2013 Elsevier Inc. All rights reserved.
Tools for community-oriented primary care: use of key informant trees in eleven practices.
Williams, R. L.; Jaén, C. R.
2000-01-01
Physicians increasingly need information about their communities to use in care of the individual patient. Busy practitioners need feasible methods for collecting this information before they can begin to gather and use it, however. Our objective was to study key informant trees as a practical approach for practice-based gathering of qualitative data from a community. Following a standard protocol, key informant trees were set up in 11 different practices to study the costs, advantages, and problems with their use for this purpose. Time studies showed that each tree took 7 to 11 hours of physician time and 7 hours of clerical time to organize and conduct. The technique appeared to be best suited for two qualitative informational needs: idea generation and explanatory data gathering. Trees appeared most productive where there was stability of physician staff in the practice, where the practice had been present in the community for some years, and where community residents were relatively stable. Response and selection biases are important considerations in use of this technique. PMID:10976171
A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems.
Ko, Hoon; Song, MoonBae
2016-01-01
Despite of various benefits such as a convenience and efficiency, home healthcare systems have some inherent security risks that may cause a serious leak on personal health information. This work presents a Secure User Profiling Structure which has the patient information including their health information. A patient and a hospital keep it at that same time, they share the updated data. While they share the data and communicate, the data can be leaked. To solve the security problems, a secure communication channel with a hash function and an One-Time Password between a client and a hospital should be established and to generate an input value to an OTP, it uses a dual hash-function. This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key. In result, attackers are unable to decrypt the leaked information because of the secured key; in addition, the proposed method outperforms the existing methods in terms of computation cost.
Negroni-Belén, Mirka; Vargas-Guadarrama, Galileo; Rueda-Neria, Celina Magally; Bassett-Hileman, Sarah; Weir, Sharon; Bronfman, Mario
2003-01-01
To identify the meeting sites of new sexual partners in two Southern border cities in Mexico. A descriptive epidemiologic study was carried out in May 2001, by surveying key informants in two border cities. Each reported site was visited to interview a resident subject. Subjects socializing in a subsample of sites were also interviewed. The key informants of the community reported 134 meeting sites in Chetumal and 111 in Ciudad Hidalgo. Both sites had scarce HIV/AIDS prevention activities. Characteristics were obtained for 89 sites in Chetumal and 42 in Ciudad Hidalgo. Almost 21% of interviewees reportedly met a new sexual partner in these sites in the past four weeks. Preventive actions are needed in meeting sites of new sexual partners. This method may provide information to plan for future interventions. The English version of this paper is available too at:http://www.insp.mx/salud/index.html.
Lyles, Courtney R; Gupta, Reena; Tieu, Lina; Fernandez, Alicia
2018-05-28
After-visit summary (AVS) documents presenting key information from each medical encounter have become standard in the USA due to federal health care reform. Little is known about how they are used or whether they improve patient care. First, we completed a literature review and described the totality of the literature on AVS by article type and major outcome measures. Next, we used reputational sampling from large-scale US studies on primary care to identify and interview nine stakeholders on their perceptions of AVS across high-performing primary care practices. Interviews were transcribed and coded for AVS use in practice, perceptions of the best/worst features and recommendations for improving AVS utility in routine care. The literature review resulted in 17 studies; patients reported higher perceived value of AVS compared with providers, despite poor recall of specific AVS content and varied post-visit use. In key informant interviews, key informants expressed enthusiasm for the potential of using AVS to reinforce key information with patients, especially if AVS were customizable. Despite this potential, key informants found that AVS included incorrect information and did not feel that patients or their practices were using AVS to enhance care. There is a gap between the potential of AVS and how providers and patients are using it in routine care. Suggestions for improved use of AVS include increasing customization, establishing care team responsibilities and workflows and ensuring patients with communication barriers have dedicated support to review AVS during visits.
Synchrosqueezing an effective method for analyzing Doppler radar physiological signals.
Yavari, Ehsan; Rahman, Ashikur; Jia Xu; Mandic, Danilo P; Boric-Lubecke, Olga
2016-08-01
Doppler radar can monitor vital sign wirelessly. Respiratory and heart rate have time-varying behavior. Capturing the rate variability provides crucial physiological information. However, the common time-frequency methods fail to detect key information. We investigate Synchrosqueezing method to extract oscillatory components of the signal with time varying spectrum. Simulation and experimental result shows the potential of the proposed method for analyzing signals with complex time-frequency behavior like physiological signals. Respiration and heart signals and their components are extracted with higher resolution and without any pre-filtering and signal conditioning.
Childhood disability in Malawi: a population based assessment using the key informant method.
Tataryn, Myroslava; Polack, Sarah; Chokotho, Linda; Mulwafu, Wakisa; Kayange, Petros; Banks, Lena Morgon; Noe, Christiane; Lavy, Chris; Kuper, Hannah
2017-11-28
Epidemiological data on childhood disability are lacking in Low and Middle Income countries (LMICs) such as Malawi, hampering effective service planning and advocacy. The Key Informant Method (KIM) is an innovative, cost-effective method for generating population data on the prevalence and causes of impairment in children. The aim of this study was to use the Key Informant Method to estimate the prevalence of moderate/severe, hearing, vision and physical impairments, intellectual impairments and epilepsy in children in two districts in Malawi and to estimate the associated need for rehabilitation and other services. Five hundred key informants (KIs) were trained to identify children in their communities who may have the impairment types included in this study. Identified children were invited to attend a screening camp where they underwent assessment by medical professionals for moderate/severe hearing, vision and physical impairments, intellectual impairments and epilepsy. Approximately 15,000 children were identified by KIs as potentially having an impairment of whom 7220 (48%) attended a screening camp. The estimated prevalence of impairments/epilepsy was 17.3/1000 children (95% CI: 16.9-17.7). Physical impairment (39%) was the commonest impairment type followed by hearing impairment (27%), intellectual impairment (26%), epilepsy (22%) and vision impairment (4%). Approximately 2100 children per million population could benefit from physiotherapy and occupational therapy and 300 per million are in need of a wheelchair. An estimated 1800 children per million population have hearing impairment caused by conditions that could be prevented or treated through basic primary ear care. Corneal opacity was the leading cause of vision impairment. Only 50% of children with suspected epilepsy were receiving medication. The majority (73%) of children were attending school, but attendance varied by impairment type and was lowest among children with multiple impairments (38%). Using the KIM this study identified more than 2500 children with impairments in two districts of Malawi. As well as providing data on child disability, rehabilitation and referral service needs which can be used to plan and advocate for appropriate services and interventions, this method study also has an important capacity building and disability awareness raising component.
USDA-ARS?s Scientific Manuscript database
MycoKey, an EU-funded Horizon 2020 project, includes a series of “Roundtable Discussions” to gather information on trending research areas in the field of mycotoxicology. This presentation includes summaries of the Roundtable Discussions on the role of Genetics and Biodiversity in mycotoxin product...
Fit for purpose: perspectives on rapid reviews from end-user interviews.
Hartling, Lisa; Guise, Jeanne-Marie; Hempel, Susanne; Featherstone, Robin; Mitchell, Matthew D; Motu'apuaka, Makalapua L; Robinson, Karen A; Schoelles, Karen; Totten, Annette; Whitlock, Evelyn; Wilt, Timothy J; Anderson, Johanna; Berliner, Elise; Gozu, Aysegul; Kato, Elisabeth; Paynter, Robin; Umscheid, Craig A
2017-02-17
There is increasing demand for rapid reviews and timely evidence synthesis. The goal of this project was to understand end-user perspectives on the utility and limitations of rapid products including evidence inventories, rapid responses, and rapid reviews. Interviews were conducted with key informants representing: guideline developers (n = 3), health care providers/health system organizations (n = 3), research funders (n = 1), and payers/health insurers (n = 1). We elicited perspectives on important characteristics of systematic reviews, acceptable methods to streamline reviews, and uses of rapid products. We analyzed content of the interview transcripts and identified themes and subthemes. Key informants identified the following as critical features of evidence reviews: (1) originating from a reliable source (i.e., conducted by experienced reviewers from an established research organization), (2) addressing clinically relevant questions, and (3) trusted relationship between the user and producer. Key informants expressed strong preference for the following review methods and characteristics: use of evidence tables, quality rating of studies, assessments of total evidence quality/strength, and use of summary tables for results and conclusions. Most acceptable trade-offs to increase efficiencies were limiting the literature search (e.g., limiting search dates or language) and performing single screening of citations and full texts for relevance. Key informants perceived rapid products (particularly evidence inventories and rapid responses) as useful interim products to inform downstream investigation (e.g., whether to proceed with a full review or guideline, direction for future research). Most key informants indicated that evidence analysis/synthesis and quality/strength of evidence assessments were important for decision-making. They reported that rapid reviews in particular were useful for guideline development on narrow topics, policy decisions when a quick turn-around is needed, decision-making for practicing clinicians in nuanced clinical settings, and decisions about coverage by payers/health insurers. Rapid reviews may be more relevant within specific clinical settings or health systems; whereas, broad/national guidelines often need a traditional systematic review. Key informants interviewed in our study indicated that evidence inventories, rapid responses, and rapid reviews have utility in specific decisions and contexts. They indicated that the credibility of the review producer, relevance of key questions, and close working relationship between the end-user and producer are critical for any rapid product. Our findings are limited by the sample size which may have been too small to reach saturation for the themes described.
NASA Technical Reports Server (NTRS)
Jewel, Joseph W., Jr.; Whitten, James B.
1960-01-01
An investigation has been conducted to determine the problems involved in an emergency method of guiding a gliding vehicle from high altitudes to a high key position (initial position) above a landing field. A jet airplane in a simulated flameout condition, conventional ground-tracking radar, and a scaled wire for guidance programming on the radar plotting board were used in the tests. Starting test altitudes varied from 30,000 feet to 46,500 feet, and starting positions ranged 8.4 to 67 nautical miles from the high key. Specified altitudes of the high key were 12,000, 10,000 or 4,000 feet. Lift-drag ratios of the aircraft of either 17, 16, or 6 were held constant during any given flight; however, for a few flights the lift-drag ratio was varied from 11 to 6. Indicated airspeeds were held constant at either 160 or 250 knots. Results from these tests indicate that a gliding vehicle having a lift-drag ratio of 16 and an indicated approach speed of 160 knots can be guided to within 800 feet vertically and 2,400 feet laterally of a high key position. When the lift-drag ratio of the vehicle is reduced to 6 and the indicated approach speed is raised to 250 knots, the radar controller was able to guide the vehicle to within 2,400 feet vertically and au feet laterally of the high key. It was also found that radar stations which give only azimuth-distance information could control the glide path of a gliding vehicle as well as stations that receive azimuth-distance-altitude information, provided that altitude information is supplied by the pilot.
Kim, Heejun; Bian, Jiantao; Mostafa, Javed; Jonnalagadda, Siddhartha; Del Fiol, Guilherme
2016-01-01
Motivation: Clinicians need up-to-date evidence from high quality clinical trials to support clinical decisions. However, applying evidence from the primary literature requires significant effort. Objective: To examine the feasibility of automatically extracting key clinical trial information from ClinicalTrials.gov. Methods: We assessed the coverage of ClinicalTrials.gov for high quality clinical studies that are indexed in PubMed. Using 140 random ClinicalTrials.gov records, we developed and tested rules for the automatic extraction of key information. Results: The rate of high quality clinical trial registration in ClinicalTrials.gov increased from 0.2% in 2005 to 17% in 2015. Trials reporting results increased from 3% in 2005 to 19% in 2015. The accuracy of the automatic extraction algorithm for 10 trial attributes was 90% on average. Future research is needed to improve the algorithm accuracy and to design information displays to optimally present trial information to clinicians. PMID:28269867
Morrato, Elaine H; Concannon, Thomas W; Meissner, Paul; Shah, Nilay D; Turner, Barbara J
2013-03-01
To identify ongoing practices and opportunities for improving national comparative effectiveness research (CER) translation through dissemination and implementation (D&I) via NIH-funded Clinical and Translational Science Award (CTSA) institutions. Key informant interviews were conducted with 18 CTSA grantees sampled to represent a range of D&I efforts. The institutional representatives endorsed fostering CER translation nationally via the CTSA Consortium. However, five themes emerged from the interviews as barriers to CER D&I: lack of institutional awareness, insufficient capacity, lack of established D&I methods, confusion among stakeholders about what CER actually is and limited funding opportunities. Interviewees offered two key recommendations to improve CER translation: development of a centralized clearing house to facilitate the diffusion of CER D&I resources and methods across CTSA institutions; and formalization of the national CTSA network to leverage existing community engagement relationships and resources for the purpose of adapting and disseminating robust CER evidence locally with providers, patients and healthcare systems.
ERIC Educational Resources Information Center
Fortunato, John A.
2001-01-01
Identifies and analyzes the exposure and portrayal framing methods that are utilized by the National Basketball Association (NBA). Notes that key informant interviews provide insight into the exposure framing method and reveal two portrayal instruments: cameras and announcers; and three framing strategies: depicting the NBA as a team game,…
Graph-Based Weakly-Supervised Methods for Information Extraction & Integration
ERIC Educational Resources Information Center
Talukdar, Partha Pratim
2010-01-01
The variety and complexity of potentially-related data resources available for querying--webpages, databases, data warehouses--has been growing ever more rapidly. There is a growing need to pose integrative queries "across" multiple such sources, exploiting foreign keys and other means of interlinking data to merge information from diverse…
Using Nominal Technique to Inform a Sexual Health Program for Black Youth
ERIC Educational Resources Information Center
Annang, Lucy; Hannon, Lonnie; Fletcher, Faith E.; Horn, Wendy Sykes; Cornish, Disa
2011-01-01
Objectives: To describe how nominal group technique (NGT) was used to inform the development of a sexual health education program for black high school youth in the South. Methods: NGT was used with a community advisory board (CAB) to obtain information regarding the key components of a sexual health program for youth in their community. Results:…
On supervised graph Laplacian embedding CA model & kernel construction and its application
NASA Astrophysics Data System (ADS)
Zeng, Junwei; Qian, Yongsheng; Wang, Min; Yang, Yongzhong
2017-01-01
There are many methods to construct kernel with given data attribute information. Gaussian radial basis function (RBF) kernel is one of the most popular ways to construct a kernel. The key observation is that in real-world data, besides the data attribute information, data label information also exists, which indicates the data class. In order to make use of both data attribute information and data label information, in this work, we propose a supervised kernel construction method. Supervised information from training data is integrated into standard kernel construction process to improve the discriminative property of resulting kernel. A supervised Laplacian embedding cellular automaton model is another key application developed for two-lane heterogeneous traffic flow with the safe distance and large-scale truck. Based on the properties of traffic flow in China, we re-calibrate the cell length, velocity, random slowing mechanism and lane-change conditions and use simulation tests to study the relationships among the speed, density and flux. The numerical results show that the large-scale trucks will have great effects on the traffic flow, which are relevant to the proportion of the large-scale trucks, random slowing rate and the times of the lane space change.
Qualitative Methods in Field Research: An Indonesian Experience in Community Based Practice.
ERIC Educational Resources Information Center
Lysack, Catherine L.; Krefting, Laura
1994-01-01
Cross-cultural evaluation of a community-based rehabilitation project in Indonesia used three methods: focus groups, questionnaires, and key informant interviews. A continuous cyclical approach to data collection and concern for cultural sensitivity increased the rigor of the research. (SK)
Application of L1/2 regularization logistic method in heart disease diagnosis.
Zhang, Bowen; Chai, Hua; Yang, Ziyi; Liang, Yong; Chu, Gejin; Liu, Xiaoying
2014-01-01
Heart disease has become the number one killer of human health, and its diagnosis depends on many features, such as age, blood pressure, heart rate and other dozens of physiological indicators. Although there are so many risk factors, doctors usually diagnose the disease depending on their intuition and experience, which requires a lot of knowledge and experience for correct determination. To find the hidden medical information in the existing clinical data is a noticeable and powerful approach in the study of heart disease diagnosis. In this paper, sparse logistic regression method is introduced to detect the key risk factors using L(1/2) regularization on the real heart disease data. Experimental results show that the sparse logistic L(1/2) regularization method achieves fewer but informative key features than Lasso, SCAD, MCP and Elastic net regularization approaches. Simultaneously, the proposed method can cut down the computational complexity, save cost and time to undergo medical tests and checkups, reduce the number of attributes needed to be taken from patients.
Wang, Zhifei; Xie, Yanming; Wang, Yongyan
2011-10-01
Computerizing extracting information from Chinese medicine literature seems more convenient than hand searching, which could simplify searching process and improve the accuracy. However, many computerized auto-extracting methods are increasingly used, regular expression is so special that could be efficient for extracting useful information in research. This article focused on regular expression applying in extracting information from Chinese medicine literature. Two practical examples were reported in this article about regular expression to extract "case number (non-terminology)" and "efficacy rate (subgroups for related information identification)", which explored how to extract information in Chinese medicine literature by means of some special research method.
Application research on temporal GIS in the transportation information management system
NASA Astrophysics Data System (ADS)
Wang, Wei; Qin, Qianqing; Wang, Chao
2006-10-01
The application, development and key matters of applying spatio-temporal GIS to traffic information management system are discussed in this paper by introducing the development of spatio-temporal database, current models of spatio-temporal data, traits of traffic information management system. This paper proposes a method of organizing spatio-temporal data taking road object changes into consideration, and describes its data structure in 3 aspects, including structure of spatio-temporal object, organizing method spatio-temporal data and storage means of spatio-temporal data. Trying to manage types of spatio-temporal data involved in traffic system, such as road information, river information, railway information, social and economical data, and etc, uniformly, efficiently and with low redundancy.
Ashton, Laura J; Gordon, Sarah E; Reeves, Racheal A
2018-04-01
A proliferation of recent literature provides substantial direction as to the key ingredients-target groups, messages and methods, and evaluation-of local-level, public interventions to counter stigma and discrimination. This paper provides a selective narrative review of that literature from the perspective or standpoint of anti-stigma experts with lived experience of mental distress, the key findings of which have been synthesised and presented in diagrammatic overviews (infographics). These are intended to guide providers in planning, delivering and evaluating lived experience-directed local-level, public interventions to counter stigma and discrimination in accord with current best practice.
Improving informed consent: Stakeholder views
Anderson, Emily E.; Newman, Susan B.; Matthews, Alicia K.
2017-01-01
Purpose Innovation will be required to improve the informed consent process in research. We aimed to obtain input from key stakeholders—research participants and those responsible for obtaining informed consent—to inform potential development of a multimedia informed consent “app.” Methods This descriptive study used a mixed-methods approach. Five 90-minute focus groups were conducted with volunteer samples of former research participants and researchers/research staff responsible for obtaining informed consent. Participants also completed a brief survey that measured background information and knowledge and attitudes regarding research and the use of technology. Established qualitative methods were used to conduct the focus groups and data analysis. Results We conducted five focus groups with 41 total participants: three groups with former research participants (total n = 22), and two groups with researchers and research coordinators (total n = 19). Overall, individuals who had previously participated in research had positive views regarding their experiences. However, further discussion elicited that the informed consent process often did not meet its intended objectives. Findings from both groups are presented according to three primary themes: content of consent forms, experience of the informed consent process, and the potential of technology to improve the informed consent process. A fourth theme, need for lay input on informed consent, emerged from the researcher groups. Conclusions Our findings add to previous research that suggests that the use of interactive technology has the potential to improve the process of informed consent. However, our focus-group findings provide additional insight that technology cannot replace the human connection that is central to the informed consent process. More research that incorporates the views of key stakeholders is needed to ensure that multimedia consent processes do not repeat the mistakes of paper-based consent forms. PMID:28949896
NASA Astrophysics Data System (ADS)
Sun, Xiaole; Djordjevic, Ivan B.; Neifeld, Mark A.
2016-03-01
Free-space optical (FSO) channels can be characterized by random power fluctuations due to atmospheric turbulence, which is known as scintillation. Weak coherent source based FSO quantum key distribution (QKD) systems suffer from the scintillation effect because during the deep channel fading the expected detection rate drops, which then gives an eavesdropper opportunity to get additional information about protocol by performing photon number splitting (PNS) attack and blocking single-photon pulses without changing QBER. To overcome this problem, in this paper, we study a large-alphabet QKD protocol, which is achieved by using pulse-position modulation (PPM)-like approach that utilizes the time-frequency uncertainty relation of the weak coherent photon state, called here TF-PPM-QKD protocol. We first complete finite size analysis for TF-PPM-QKD protocol to give practical bounds against non-negligible statistical fluctuation due to finite resources in practical implementations. The impact of scintillation under strong atmospheric turbulence regime is studied then. To overcome the secure key rate performance degradation of TF-PPM-QKD caused by scintillation, we propose an adaptation method for compensating the scintillation impact. By changing source intensity according to the channel state information (CSI), obtained by classical channel, the adaptation method improves the performance of QKD system with respect to the secret key rate. The CSI of a time-varying channel can be predicted using stochastic models, such as autoregressive (AR) models. Based on the channel state predictions, we change the source intensity to the optimal value to achieve a higher secret key rate. We demonstrate that the improvement of the adaptation method is dependent on the prediction accuracy.
Cross Correlation versus Normalized Mutual Information on Image Registration
NASA Technical Reports Server (NTRS)
Tan, Bin; Tilton, James C.; Lin, Guoqing
2016-01-01
This is the first study to quantitatively assess and compare cross correlation and normalized mutual information methods used to register images in subpixel scale. The study shows that the normalized mutual information method is less sensitive to unaligned edges due to the spectral response differences than is cross correlation. This characteristic makes the normalized image resolution a better candidate for band to band registration. Improved band-to-band registration in the data from satellite-borne instruments will result in improved retrievals of key science measurements such as cloud properties, vegetation, snow and fire.
Reconstruction method for data protection in telemedicine systems
NASA Astrophysics Data System (ADS)
Buldakova, T. I.; Suyatinov, S. I.
2015-03-01
In the report the approach to protection of transmitted data by creation of pair symmetric keys for the sensor and the receiver is offered. Since biosignals are unique for each person, their corresponding processing allows to receive necessary information for creation of cryptographic keys. Processing is based on reconstruction of the mathematical model generating time series that are diagnostically equivalent to initial biosignals. Information about the model is transmitted to the receiver, where the restoration of physiological time series is performed using the reconstructed model. Thus, information about structure and parameters of biosystem model received in the reconstruction process can be used not only for its diagnostics, but also for protection of transmitted data in telemedicine complexes.
Key Relation Extraction from Biomedical Publications.
Huang, Lan; Wang, Ye; Gong, Leiguang; Kulikowski, Casimir; Bai, Tian
2017-01-01
Within the large body of biomedical knowledge, recent findings and discoveries are most often presented as research articles. Their number has been increasing sharply since the turn of the century, presenting ever-growing challenges for search and discovery of knowledge and information related to specific topics of interest, even with the help of advanced online search tools. This is especially true when the goal of a search is to find or discover key relations between important concepts or topic words. We have developed an innovative method for extracting key relations between concepts from abstracts of articles. The method focuses on relations between keywords or topic words in the articles. Early experiments with the method on PubMed publications have shown promising results in searching and discovering keywords and their relationships that are strongly related to the main topic of an article.
2010-04-01
threats (also known as a SWOT analysis) is a very useful method in identifying potential issues, hidden agendas, and competing egos. • Defining a...comprehensive communications plan uses what’s been defined and informs (the second key component to DID) government and con - tractor teams of the essential...program execution strategies. Inform Inform means communicating to internal and external stake- holders what was defined, expected, discovered, con
Exploring Perceptions of the Mental Health of Youth in Mexico: A Qualitative Study
ERIC Educational Resources Information Center
Wells, Lisa; Varjas, Kris; Cadenhead, Catherine; Morillas, Catalina; Morris, Ashley
2012-01-01
Limited information is available regarding the mental health of children and adolescents in Mexico (Paula, Duarte, & Bordin, 2007). The purpose of this exploratory qualitative study was to examine the construct of mental health of children and adolescents from the emic perspective of key informants in Mexico. Utilizing qualitative methods of…
Organizational Learning and Power Dynamics: A Study in a Brazilian University
ERIC Educational Resources Information Center
Santos, Jane Lucia Silva; Steil, Andrea Valéria
2015-01-01
Purpose: This paper aims to describe and analyze organizational learning processes and power dynamics during the adoption and use of an information system (IS) at a Brazilian public organization. Design/methodology/approach: A case study was chosen as the research method. Data were gathered from documents and interviews with key informants.…
An Activity-Based Learning Approach for Key Geographical Information Systems (GIS) Concepts
ERIC Educational Resources Information Center
Srivastava, Sanjeev Kumar; Tait, Cynthia
2012-01-01
This study presents the effect of active learning methods of concepts in geographical information systems where students participated in a series of interlocked learning experiences. These activities spanned several teaching weeks and involved the creation of a hand drawn map that was scanned and geo-referenced with locations' coordinates derived…
Designing an Intervention to Promote Child Development among Fathers with Antisocial Behavior
ERIC Educational Resources Information Center
Charles, Pajarita; Gorman-Smith, Deborah; Jones, Anne
2016-01-01
Objective: This article describes an intervention development focusing on the early design stages of a model to improve psychosocial and behavioral health outcomes among children of fathers with incarceration and antisocial behavioral histories. Method: We use a synthesis of the literature and qualitative interviews with key informants to inform a…
1990-10-04
methods Category 6: Cryptographic methods (hard/ software ) - Tested countermeasures and standard means - Acknowledgements As the number of antivirus ...Skulason), only our own antiviruses have been mentioned in the catalog. We hope to include the major antivirus packages in the future. The current...Center GTE SRI International Trusted Information Systems, Inc. Grumann Data Systems SRI International Software Engineering Institute Trusted
Greenberg, Katherine Blumoff; Jenks, Sara Catherine; Piazza, Nina; Malibiran, Beatriz Ramos; Aligne, C Andrew
2017-08-01
To contextualize young women's knowledge and attitudes regarding contraception at the outset of an intervention promoting long-acting reversible contraceptive (LARC) use for teen pregnancy prevention. Our intervention was on the basis of diffusion of innovation theory, and at the outset we were interested in likely early adopters' existing knowledge and attitudes toward contraception. This mixed methods study consisted of focus groups within positive youth development programs in Rochester, New York; we discussed young women's knowledge and sources of information for all US Food and Drug Administration-approved contraceptive methods. Seven focus groups and 24 female adolescent participants aged 15-19 years. Quantitative ranking of all contraceptive methods; qualitative themes from focus group discussions. Our findings showed a high level of knowledge about a select group of methods, which included LARC methods, and that participants received contraceptive information from peers and family. Participants had more concerns than positive impressions regarding the effectiveness, safety, practicality, and partner reception of the contraceptive methods, with the exception of the condom. Quantitatively, the condom received the highest average rating. The importance of personal anecdotes in our findings supports the use of outreach and information campaigns; providing medically accurate information and spreading positive personal anecdotes will be key to improving young women's impressions of the safety and acceptability of LARC use. This snapshot of contraceptive knowledge indicates that young women can be mature, informed consumers of sexual and reproductive health care, and through diffusion of innovation could be key players in promoting the most effective means of pregnancy prevention. Copyright © 2017 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.
Creating a Shared Formulary in 7 Critical Access Hospitals
ERIC Educational Resources Information Center
Wakefield, Douglas S.; Ward, Marcia M.; Loes, Jean L.; O'Brien, John; Abbas, Nancy
2010-01-01
Purpose: This paper reports a case study of 7 Critical Access Hospitals' (CAH) and 1 rural referral hospital's successful collaboration to develop a shared formulary. Methods: Study methods included document reviews, interviews with key informants, and use of descriptive statistics. Findings: Through a systematic review and decision process, CAH…
Umoquit, Muriah J; Dobrow, Mark J; Lemieux-Charles, Louise; Ritvo, Paul G; Urbach, David R; Wodchis, Walter P
2008-08-08
This paper focuses on measuring the efficiency and effectiveness of two diagramming methods employed in key informant interviews with clinicians and health care administrators. The two methods are 'participatory diagramming', where the respondent creates a diagram that assists in their communication of answers, and 'graphic elicitation', where a researcher-prepared diagram is used to stimulate data collection. These two diagramming methods were applied in key informant interviews and their value in efficiently and effectively gathering data was assessed based on quantitative measures and qualitative observations. Assessment of the two diagramming methods suggests that participatory diagramming is an efficient method for collecting data in graphic form, but may not generate the depth of verbal response that many qualitative researchers seek. In contrast, graphic elicitation was more intuitive, better understood and preferred by most respondents, and often provided more contemplative verbal responses, however this was achieved at the expense of more interview time. Diagramming methods are important for eliciting interview data that are often difficult to obtain through traditional verbal exchanges. Subject to the methodological limitations of the study, our findings suggest that while participatory diagramming and graphic elicitation have specific strengths and weaknesses, their combined use can provide complementary information that would not likely occur with the application of only one diagramming method. The methodological insights gained by examining the efficiency and effectiveness of these diagramming methods in our study should be helpful to other researchers considering their incorporation into qualitative research designs.
Optical hiding with visual cryptography
NASA Astrophysics Data System (ADS)
Shi, Yishi; Yang, Xiubo
2017-11-01
We propose an optical hiding method based on visual cryptography. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof and image-covered, leading to the high security. During the extraction process, the covered phase-keys are illuminated with laser beams and then incoherently superimposed to extract the hidden information directly by human vision, without complicated optical implementations and any additional computation, resulting in the convenience of extraction. Also, the phase-keys are manufactured as the diffractive optical elements that are robust to the attacks, such as the blocking and the phase-noise. Optical experiments verify that the high security, the easy extraction and the strong robustness are all obtainable in the visual-cryptography-based optical hiding.
Gannotti, Mary E; Handwerker, W Penn
2002-12-01
Validating the cultural context of health is important for obtaining accurate and useful information from standardized measures of child health adapted for cross-cultural applications. This paper describes the application of ethnographic triangulation for cultural validation of a measure of childhood disability, the Pediatric Evaluation of Disability Inventory (PEDI) for use with children living in Puerto Rico. The key concepts include macro-level forces such as geography, demography, and economics, specific activities children performed and their key social interactions, beliefs, attitudes, emotions, and patterns of behavior surrounding independence in children and childhood disability, as well as the definition of childhood disability. Methods utilize principal components analysis to establish the validity of cultural concepts and multiple regression analysis to identify intracultural variation. Findings suggest culturally specific modifications to the PEDI, provide contextual information for informed interpretation of test scores, and point to the need to re-standardize normative values for use with Puerto Rican children. Without this type of information, Puerto Rican children may appear more disabled than expected for their level of impairment or not to be making improvements in functional status. The methods also allow for cultural boundaries to be quantitatively established, rather than presupposed. Copyright 2002 Elsevier Science Ltd.
Research on rebuilding the data information environment for aeronautical manufacturing enterprise
NASA Astrophysics Data System (ADS)
Feng, Xilan; Jiang, Zhiqiang; Zong, Xuewen; Shi, Jinfa
2005-12-01
The data environment on integrated information system and the basic standard on information resource management are the key effectively of the remote collaborative designing and manufacturing for complex product. A study project on rebuilding the data information environment for aeronautical manufacturing enterprise (Aero-ME) is put forwarded. Firstly, the data environment on integrated information system, the basic standard on information resource management, the basic establishment on corporation's information, the development on integrated information system, and the information education are discussed profoundly based on the practical requirement of information resource and technique for contemporary Aero-ME. Then, the idea and method with the data environment rebuilding based on I-CASE in the corporation is put forward, and the effective method and implement approach for manufacturing enterprise information is brought forwards. It will also the foundation and assurance that rebuilding the corporation data-environment and promoting standardizing information resource management for the development of Aero-ME information engineering.
Brereton, Louise; Ingleton, Christine; Gardiner, Clare; Goyder, Elizabeth; Mozygemba, Kati; Lysdahl, Kristin Bakke; Tummers, Marcia; Sacchini, Dario; Leppert, Wojciech; Blaževičienė, Aurelija; van der Wilt, Gert Jan; Refolo, Pietro; De Nicola, Martina; Chilcott, James; Oortwijn, Wija
2017-02-01
Stakeholders are people with an interest in a topic. Internationally, stakeholder involvement in palliative care research and health technology assessment requires development. Stakeholder involvement adds value throughout research (from prioritising topics to disseminating findings). Philosophies and understandings about the best ways to involve stakeholders in research differ internationally. Stakeholder involvement took place in seven countries (England, Germany, Italy, Lithuania, the Netherlands, Norway and Poland). Findings informed a project that developed concepts and methods for health technology assessment and applied these to evaluate models of palliative care service delivery. To report on stakeholder involvement in the INTEGRATE-HTA project and how issues identified informed project development. Using stakeholder consultation or a qualitative research design, as appropriate locally, stakeholders in seven countries acted as 'advisors' to aid researchers' decision making. Thematic analysis was used to identify key issues across countries. A total of 132 stakeholders (82 professionals and 50 'lay' people) aged ⩾18 participated in individual face-to-face or telephone interviews, consultation meetings or focus groups. Different stakeholder involvement methods were used successfully to identify key issues in palliative care. A total of 23 issues common to three or more countries informed decisions about the intervention and comparator of interest, sub questions and specific assessments within the health technology assessment. Stakeholders, including patients and families undergoing palliative care, can inform project decision making using various involvement methods according to the local context. Researchers should consider local understandings about stakeholder involvement as views of appropriate and feasible methods vary. Methods for stakeholder involvement, especially consultation, need further development.
75 FR 34487 - Notice of Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-17
... baseline and provide general themes on areas to focus on in order to enhance creativity and innovation at the Center. II. Method of Collection Electronic. III. Data Title: The KEYS Creativity and Innovation...
Developing a method for estimating AADT on all Louisiana roads.
DOT National Transportation Integrated Search
2015-07-01
Traffic flow volumes present key information needed for making transportation engineering and planning decisions. : Accurate traffic volume count has many applications including: roadway planning, design, air quality compliance, travel : model valida...
NASA Astrophysics Data System (ADS)
Gallo, J.; Sylak-Glassman, E.
2017-12-01
We will present a method for assessing interdependencies between heterogeneous Earth observation (EO) systems when applied to key Federal objectives. Using data from the National Earth Observation Assessment (EOA), we present a case study that examines the frequency that measurements from each of the Landsat 8 sensors are used in conjunction with heterogeneous measurements from other Earth observation sensors to develop data and information products. This EOA data allows us to map the most frequent interactions between Landsat measurements and measurements from other sensors, identify high-impact data and information products where these interdependencies occur, and identify where these combined measurements contribute most to meeting a key Federal objective within one of the 13 Societal Benefit Areas used in the EOA study. Using a value-tree framework to trace the application of data from EO systems to weighted key Federal objectives within the EOA study, we are able to estimate relative contribution of individual EO systems to meeting those objectives, as well as the interdependencies between measurements from all EO systems within the EOA study. The analysis relies on a modified Delphi method to elicit relative levels of reliance on individual measurements from EO systems, including combinations of measurements, from subject matter experts. This results in the identification of a representative portfolio of all EO systems used to meet key Federal objectives. Understanding the interdependencies among a heterogeneous set of measurements that modify the impact of any one individual measurement on meeting a key Federal objective, especially if the measurements originate from multiple agencies or state/local/tribal, international, academic, and commercial sources, can impact agency decision-making regarding mission requirements and inform understanding of user needs.
Patient-Reported Safety Information: A Renaissance of Pharmacovigilance?
Härmark, Linda; Raine, June; Leufkens, Hubert; Edwards, I Ralph; Moretti, Ugo; Sarinic, Viola Macolic; Kant, Agnes
2016-10-01
The role of patients as key contributors in pharmacovigilance was acknowledged in the new EU pharmacovigilance legislation. This contains several efforts to increase the involvement of the general public, including making patient adverse drug reaction (ADR) reporting systems mandatory. Three years have passed since the legislation was introduced and the key question is: does pharmacovigilance yet make optimal use of patient-reported safety information? Independent research has shown beyond doubt that patients make an important contribution to pharmacovigilance signal detection. Patient reports provide first-hand information about the suspected ADR and the circumstances under which it occurred, including medication errors, quality failures, and 'near misses'. Patient-reported safety information leads to a better understanding of the patient's experiences of the ADR. Patients are better at explaining the nature, personal significance and consequences of ADRs than healthcare professionals' reports on similar associations and they give more detailed information regarding quality of life including psychological effects and effects on everyday tasks. Current methods used in pharmacovigilance need to optimise use of the information reported from patients. To make the most of information from patients, the systems we use for collecting, coding and recording patient-reported information and the methodologies applied for signal detection and assessment need to be further developed, such as a patient-specific form, development of a severity grading and evolution of the database structure and the signal detection methods applied. It is time for a renaissance of pharmacovigilance.
Mining key elements for severe convection prediction based on CNN
NASA Astrophysics Data System (ADS)
Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng
2017-04-01
Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with the new machine-learning method via CNN models. Based on the analysis of those experimental results and case studies, the proposed new method have below benefits for the severe convection prediction: (1) helping forecasters to narrow down the scope of analysis and saves lead-time for those high-impact severe convection; (2) performing huge amount of weather big data by machine learning methods rather relying on traditional theory and knowledge, which provide new method to explore and quantify the severe convective weathers; (3) providing machine learning based end-to-end analysis and processing ability with considerable scalability on data volumes, and accomplishing the analysis work without human intervention.
NASA Astrophysics Data System (ADS)
Benaben, Frederick; Mu, Wenxin; Boissel-Dallier, Nicolas; Barthe-Delanoe, Anne-Marie; Zribi, Sarah; Pingaud, Herve
2015-08-01
The Mediation Information System Engineering project is currently finishing its second iteration (MISE 2.0). The main objective of this scientific project is to provide any emerging collaborative situation with methods and tools to deploy a Mediation Information System (MIS). MISE 2.0 aims at defining and designing a service-based platform, dedicated to initiating and supporting the interoperability of collaborative situations among potential partners. This MISE 2.0 platform implements a model-driven engineering approach to the design of a service-oriented MIS dedicated to supporting the collaborative situation. This approach is structured in three layers, each providing their own key innovative points: (i) the gathering of individual and collaborative knowledge to provide appropriate collaborative business behaviour (key point: knowledge management, including semantics, exploitation and capitalisation), (ii) deployment of a mediation information system able to computerise the previously deduced collaborative processes (key point: the automatic generation of collaborative workflows, including connection with existing devices or services) (iii) the management of the agility of the obtained collaborative network of organisations (key point: supervision of collaborative situations and relevant exploitation of the gathered data). MISE covers business issues (through BPM), technical issues (through an SOA) and agility issues of collaborative situations (through EDA).
Main, Barry G; McNair, Angus G K; Huxtable, Richard; Donovan, Jenny L; Thomas, Steven J; Kinnersley, Paul; Blazeby, Jane M
2017-04-26
Consent remains a crucial, yet challenging, cornerstone of clinical practice. The ethical, legal and professional understandings of this construct have evolved away from a doctor-centred act to a patient-centred process that encompasses the patient's values, beliefs and goals. This alignment of consent with the philosophy of shared decision-making was affirmed in a recent high-profile Supreme Court ruling in England. The communication of information is central to this model of health care delivery but it can be difficult for doctors to gauge the information needs of the individual patient. The aim of this paper is to describe 'core information sets' which are defined as a minimum set of consensus-derived information about a given procedure to be discussed with all patients. Importantly, they are intended to catalyse discussion of subjective importance to individuals. The model described in this paper applies health services research and Delphi consensus-building methods to an idea orginally proposed 30 years ago. The hypothesis is that, first, large amounts of potentially-important information are distilled down to discrete information domains. These are then, secondly, rated by key stakeholders in multiple iterations, so that core information of agreed importance can be defined. We argue that this scientific approach is key to identifying information important to all stakeholders, which may otherwise be communicated poorly or omitted from discussions entirely. Our methods apply systematic review, qualitative, survey and consensus-building techniques to define this 'core information'. We propose that such information addresses the 'reasonable patient' standard for information disclosure but, more importantly, can serve as a spring board for high-value discussion of importance to the individual patient. The application of established research methods can define information of core importance to informed consent. Further work will establish how best to incorporate this model in routine practice.
Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B
2014-09-15
Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.
NASA Astrophysics Data System (ADS)
Gaidash, A. A.; Egorov, V. I.; Gleim, A. V.
2016-08-01
Quantum cryptography allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source of quantum states. In order to prevent actions of an eavesdropper, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. In this paper, we describe an alternative method based on monitoring photon number statistics after detection. We provide a useful rule of thumb to estimate approximate order of difference of expected distribution and distribution in case of attack. Formula for calculating a minimum value of total pulses or time-gaps to resolve attack is shown. Also formulas for actual fraction of raw key known to Eve were derived. This method can therefore be used with any system and even combining with mentioned special protocols.
A method for automatically abstracting visual documents
NASA Technical Reports Server (NTRS)
Rorvig, Mark E.
1994-01-01
Visual documents--motion sequences on film, videotape, and digital recording--constitute a major source of information for the Space Agency, as well as all other government and private sector entities. This article describes a method for automatically selecting key frames from visual documents. These frames may in turn be used to represent the total image sequence of visual documents in visual libraries, hypermedia systems, and training algorithm reduces 51 minutes of video sequences to 134 frames; a reduction of information in the range of 700:1.
Mining reflective continuing medical education data for family physician learning needs.
Lewis, Denice Colleen; Pluye, Pierre; Rodriguez, Charo; Grad, Roland
2016-04-06
A mixed methods research (sequential explanatory design) studied the potential of mining the data from the consumers of continuing medical education (CME) programs, for the developers of CME programs. The quantitative data generated by family physicians, through applying the information assessment method to CME content, was presented to key informants from the CME planning community through a qualitative description study.The data were revealed to have many potential applications including supporting the creation of CME content, CME program planning and personal learning portfolios.
Leung, Leanne; de Lemos, Mário L; Kovacic, Laurel
2017-01-01
Background With the rising cost of new oncology treatments, it is no longer sustainable to base initial drug funding decisions primarily on prospective clinical trials as their performance in real-life populations are often difficult to determine. In British Columbia, an approach in evidence building is to retrospectively analyse patient outcomes using observational research on an ad hoc basis. Methods The deliberative framework was constructed in three stages: framework design, framework validation and treatment programme characterization, and key informant interview. Framework design was informed through a literature review and analyses of provincial and national decision-making processes. Treatment programmes funded between 2010 and 2013 were used for framework validation. A selection concordance rate of 80% amongst three reviewers was considered to be a validation of the framework. Key informant interviews were conducted to determine the utility of this deliberative framework. Results A multi-domain deliberative framework with 15 assessment parameters was developed. A selection concordance rate of 84.2% was achieved for content validation of the framework. Nine treatment programmes from five different tumour groups were selected for retrospective outcomes analysis. Five contributory factors to funding uncertainties were identified. Key informants agreed that the framework is a comprehensive tool that targets the key areas involved in the funding decision-making process. Conclusions The oncology-based deliberative framework can be routinely used to assess treatment programmes from the major tumour sites for retrospective outcomes analysis. Key informants indicate this is a value-added tool and will provide insight to the current prospective funding model.
Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin
2015-10-14
Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate.
Sandford, II, Maxwell T.; Handel, Theodore G.; Ettinger, J. Mark
1999-01-01
A method of embedding auxiliary information into the digital representation of host data containing noise in the low-order bits. The method applies to digital data representing analog signals, for example digital images. The method reduces the error introduced by other methods that replace the low-order bits with auxiliary information. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user through use of a digital key. The modular error embedding method includes a process to permute the order in which the host data values are processed. The method doubles the amount of auxiliary information that can be added to host data values, in comparison with bit-replacement methods for high bit-rate coding. The invention preserves human perception of the meaning and content of the host data, permitting the addition of auxiliary data in the amount of 50% or greater of the original host data.
Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains
NASA Astrophysics Data System (ADS)
Wei, Yang; Yan, Aimin; Dong, Jiabin; Hu, Zhijuan; Zhang, Jingtao
2017-11-01
A new concept of GT encryption scheme is proposed in this paper. We present a novel optical image encryption method by using quick response (QR) code and multilevel fingerprint keys in gyrator transform (GT) domains. In this method, an original image is firstly transformed into a QR code, which is placed in the input plane of cascaded GTs. Subsequently, the QR code is encrypted into the cipher-text by using multilevel fingerprint keys. The original image can be obtained easily by reading the high-quality retrieved QR code with hand-held devices. The main parameters used as private keys are GTs' rotation angles and multilevel fingerprints. Biometrics and cryptography are integrated with each other to improve data security. Numerical simulations are performed to demonstrate the validity and feasibility of the proposed encryption scheme. In the future, the method of applying QR codes and fingerprints in GT domains possesses much potential for information security.
Power from Coal. A Student Handbook Recommended for Upper Elementary and Middle Grades.
ERIC Educational Resources Information Center
National Coal Association, Washington, DC.
The contributions of coal as an important energy source are reviewed in this booklet for teachers. It provides background information on coal, activities for classroom use, and an answer key for all the exercises. The introductory section includes information on: (1) coal and electricity; (2) reasons for using coal; (3) methods for extracting…
ERIC Educational Resources Information Center
Bollinger, Sarah; Kreuter, Matthew W.
2012-01-01
In a randomized experiment using moment-to-moment audience analysis methods, we compared women's emotional responses with a narrative versus informational breast cancer video. Both videos communicated three key messages about breast cancer: (i) understand your breast cancer risk, (ii) talk openly about breast cancer and (iii) get regular…
ERIC Educational Resources Information Center
Taylor, Maurice; Trumpower, David; Pavic, Ivana
2013-01-01
This article reports on a mixed methods study that investigated aspects of formal, non-formal and informal learning for workers and adult high school learners seeking literacy and essential skills. Three key themes emerged from the qualitative data: motivations for participation in various forms of learning; seeking out informal learning…
Document co-citation analysis to enhance transdisciplinary research
Trujillo, Caleb M.; Long, Tammy M.
2018-01-01
Specialized and emerging fields of research infrequently cross disciplinary boundaries and would benefit from frameworks, methods, and materials informed by other fields. Document co-citation analysis, a method developed by bibliometric research, is demonstrated as a way to help identify key literature for cross-disciplinary ideas. To illustrate the method in a useful context, we mapped peer-recognized scholarship related to systems thinking. In addition, three procedures for validation of co-citation networks are proposed and implemented. This method may be useful for strategically selecting information that can build consilience about ideas and constructs that are relevant across a range of disciplines. PMID:29308433
Parameter as a Switch Between Dynamical States of a Network in Population Decoding.
Yu, Jiali; Mao, Hua; Yi, Zhang
2017-04-01
Population coding is a method to represent stimuli using the collective activities of a number of neurons. Nevertheless, it is difficult to extract information from these population codes with the noise inherent in neuronal responses. Moreover, it is a challenge to identify the right parameter of the decoding model, which plays a key role for convergence. To address the problem, a population decoding model is proposed for parameter selection. Our method successfully identified the key conditions for a nonzero continuous attractor. Both the theoretical analysis and the application studies demonstrate the correctness and effectiveness of this strategy.
Umoquit, Muriah J; Dobrow, Mark J; Lemieux-Charles, Louise; Ritvo, Paul G; Urbach, David R; Wodchis, Walter P
2008-01-01
Background This paper focuses on measuring the efficiency and effectiveness of two diagramming methods employed in key informant interviews with clinicians and health care administrators. The two methods are 'participatory diagramming', where the respondent creates a diagram that assists in their communication of answers, and 'graphic elicitation', where a researcher-prepared diagram is used to stimulate data collection. Methods These two diagramming methods were applied in key informant interviews and their value in efficiently and effectively gathering data was assessed based on quantitative measures and qualitative observations. Results Assessment of the two diagramming methods suggests that participatory diagramming is an efficient method for collecting data in graphic form, but may not generate the depth of verbal response that many qualitative researchers seek. In contrast, graphic elicitation was more intuitive, better understood and preferred by most respondents, and often provided more contemplative verbal responses, however this was achieved at the expense of more interview time. Conclusion Diagramming methods are important for eliciting interview data that are often difficult to obtain through traditional verbal exchanges. Subject to the methodological limitations of the study, our findings suggest that while participatory diagramming and graphic elicitation have specific strengths and weaknesses, their combined use can provide complementary information that would not likely occur with the application of only one diagramming method. The methodological insights gained by examining the efficiency and effectiveness of these diagramming methods in our study should be helpful to other researchers considering their incorporation into qualitative research designs. PMID:18691410
Operating Reserves and Wind Power Integration: An International Comparison; Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Milligan, M.; Donohoo, P.; Lew, D.
2010-10-01
This paper provides a high-level international comparison of methods and key results from both operating practice and integration analysis, based on an informal International Energy Agency Task 25: Large-scale Wind Integration.
Booth, Andrew
2016-05-04
Qualitative systematic reviews or qualitative evidence syntheses (QES) are increasingly recognised as a way to enhance the value of systematic reviews (SRs) of clinical trials. They can explain the mechanisms by which interventions, evaluated within trials, might achieve their effect. They can investigate differences in effects between different population groups. They can identify which outcomes are most important to patients, carers, health professionals and other stakeholders. QES can explore the impact of acceptance, feasibility, meaningfulness and implementation-related factors within a real world setting and thus contribute to the design and further refinement of future interventions. To produce valid, reliable and meaningful QES requires systematic identification of relevant qualitative evidence. Although the methodologies of QES, including methods for information retrieval, are well-documented, little empirical evidence exists to inform their conduct and reporting. This structured methodological overview examines papers on searching for qualitative research identified from the Cochrane Qualitative and Implementation Methods Group Methodology Register and from citation searches of 15 key papers. A single reviewer reviewed 1299 references. Papers reporting methodological guidance, use of innovative methodologies or empirical studies of retrieval methods were categorised under eight topical headings: overviews and methodological guidance, sampling, sources, structured questions, search procedures, search strategies and filters, supplementary strategies and standards. This structured overview presents a contemporaneous view of information retrieval for qualitative research and identifies a future research agenda. This review concludes that poor empirical evidence underpins current information practice in information retrieval of qualitative research. A trend towards improved transparency of search methods and further evaluation of key search procedures offers the prospect of rapid development of search methods.
Bridge Condition Assessment Using D Numbers
Hu, Yong
2014-01-01
Bridge condition assessment is a complex problem influenced by many factors. The uncertain environment increases more its complexity. Due to the uncertainty in the process of assessment, one of the key problems is the representation of assessment results. Though there exists many methods that can deal with uncertain information, however, they have more or less deficiencies. In this paper, a new representation of uncertain information, called D numbers, is presented. It extends the Dempster-Shafer theory. By using D numbers, a new method is developed for the bridge condition assessment. Compared to these existing methods, the proposed method is simpler and more effective. An illustrative case is given to show the effectiveness of the new method. PMID:24696639
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei
2016-05-01
This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.
Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment
NASA Astrophysics Data System (ADS)
Montminy, David P.
Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information.
An analytical approach to customer requirement information processing
NASA Astrophysics Data System (ADS)
Zhou, Zude; Xiao, Zheng; Liu, Quan; Ai, Qingsong
2013-11-01
'Customer requirements' (CRs) management is a key component of customer relationship management (CRM). By processing customer-focused information, CRs management plays an important role in enterprise systems (ESs). Although two main CRs analysis methods, quality function deployment (QFD) and Kano model, have been applied to many fields by many enterprises in the past several decades, the limitations such as complex processes and operations make them unsuitable for online businesses among small- and medium-sized enterprises (SMEs). Currently, most SMEs do not have the resources to implement QFD or Kano model. In this article, we propose a method named customer requirement information (CRI), which provides a simpler and easier way for SMEs to run CRs analysis. The proposed method analyses CRs from the perspective of information and applies mathematical methods to the analysis process. A detailed description of CRI's acquisition, classification and processing is provided.
Aghaji, Ada E; Ezegwui, Ifeoma R; Shiweobi, Jude O; Mamah, Cyril C; Okoloagu, Mary N; Onwasigwe, Ernest N
2017-12-01
To determine the prevalence and causes of childhood blindness in an underserved community in south-eastern Nigeria using the key informant method. This was a descriptive cross-sectional study. Key informants (KI) appointed by their respective communities received 1-day training on identification of blind children in their communities. Two weeks later, the research team visited the agreed sites within the community and examined the identified children. The World Health Organization eye examination record for blind children was used for data collection. Data entry and analysis were done with the Statistical Package for Social Sciences (SPSS) version 17.0. Fifteen blind or severely visually impaired children (age range 3 months to 15 years) were identified in this community; nine of these were brought by the KIs. The prevalence of childhood blindness/severe visual impairment (BL/SVI) was 0.12 per 1000 children. By anatomical classification, operable cataract in 6 (40.0%) was the leading cause of BL/SVI in the series; followed by optic nerve lesions (atrophy/hypoplasia) in 3 (20.0%). The etiology of BL/SVI is unknown for the majority of the children (66.7%). It was presumed hereditary in four children (26.7%). Sixty percent of the blindness was judged avoidable. Only three children (20.0%) were enrolled in the Special Education Centre for the Blind. The prevalence of childhood BL/SVI in our study population is low but over half of the blindness is avoidable. There may be a significant backlog of operable childhood cataract in south-eastern Nigeria. The KI method is a practical method for case finding of blind children in rural communities.
Information Quality Evaluation of C2 Systems at Architecture Level
2014-06-01
based on architecture models of C2 systems, which can help to identify key factors impacting information quality and improve the system capability at the stage of architecture design of C2 system....capability evaluation of C2 systems at architecture level becomes necessary and important for improving the system capability at the stage of architecture ... design . This paper proposes a method for information quality evaluation of C2 system at architecture level. First, the information quality model is
Lin, Luan; McKerrow, Wilson H; Richards, Bryce; Phonsom, Chukiat; Lawrence, Charles E
2018-03-05
The nearest neighbor model and associated dynamic programming algorithms allow for the efficient estimation of the RNA secondary structure Boltzmann ensemble. However because a given RNA secondary structure only contains a fraction of the possible helices that could form from a given sequence, the Boltzmann ensemble is multimodal. Several methods exist for clustering structures and finding those modes. However less focus is given to exploring the underlying reasons for this multimodality: the presence of conflicting basepairs. Information theory, or more specifically mutual information, provides a method to identify those basepairs that are key to the secondary structure. To this end we find most informative basepairs and visualize the effect of these basepairs on the secondary structure. Knowing whether a most informative basepair is present tells us not only the status of the particular pair but also provides a large amount of information about which other pairs are present or not present. We find that a few basepairs account for a large amount of the structural uncertainty. The identification of these pairs indicates small changes to sequence or stability that will have a large effect on structure. We provide a novel algorithm that uses mutual information to identify the key basepairs that lead to a multimodal Boltzmann distribution. We then visualize the effect of these pairs on the overall Boltzmann ensemble.
The Extraction of Post-Earthquake Building Damage Informatiom Based on Convolutional Neural Network
NASA Astrophysics Data System (ADS)
Chen, M.; Wang, X.; Dou, A.; Wu, X.
2018-04-01
The seismic damage information of buildings extracted from remote sensing (RS) imagery is meaningful for supporting relief and effective reduction of losses caused by earthquake. Both traditional pixel-based and object-oriented methods have some shortcoming in extracting information of object. Pixel-based method can't make fully use of contextual information of objects. Object-oriented method faces problem that segmentation of image is not ideal, and the choice of feature space is difficult. In this paper, a new stratage is proposed which combines Convolution Neural Network (CNN) with imagery segmentation to extract building damage information from remote sensing imagery. the key idea of this method includes two steps. First to use CNN to predicate the probability of each pixel and then integrate the probability within each segmentation spot. The method is tested through extracting the collapsed building and uncollapsed building from the aerial image which is acquired in Longtoushan Town after Ms 6.5 Ludian County, Yunnan Province earthquake. The results show that the proposed method indicates its effectiveness in extracting damage information of buildings after earthquake.
Collaborating with Youth to Inform and Develop Tools for Psychotropic Decision Making
Murphy, Andrea; Gardner, David; Kutcher, Stan; Davidson, Simon; Manion, Ian
2010-01-01
Introduction: Youth oriented and informed resources designed to support psychopharmacotherapeutic decision-making are essentially unavailable. This article outlines the approach taken to design such resources, the product that resulted from the approach taken, and the lessons learned from the process. Methods: A project team with psychopharmacology expertise was assembled. The project team reviewed best practices regarding medication educational materials and related tools to support decisions. Collaboration with key stakeholders who were thought of as primary end-users and target groups occurred. A graphic designer and a plain language consultant were also retained. Results: Through an iterative and collaborative process over approximately 6 months, Med Ed and Med Ed Passport were developed. Literature and input from key stakeholders, in particular youth, was instrumental to the development of the tools and materials within Med Ed. A training program utilizing a train-the-trainer model was developed to facilitate the implementation of Med Ed in Ontario, which is currently ongoing. Conclusion: An evidence-informed process that includes youth and key stakeholder engagement is required for developing tools to support in psychopharmacotherapeutic decision-making. The development process fostered an environment of reciprocity between the project team and key stakeholders. PMID:21037916
NASA Astrophysics Data System (ADS)
Lang, Jun; Zhang, Jing
2015-03-01
In our proposed optical image cryptosystem, two pairs of phase-amplitude masks are generated from the chaotic web map for image encryption in the 4f double random phase-amplitude encoding (DRPAE) system. Instead of transmitting the real keys and the enormous masks codes, only a few observed measurements intermittently chosen from the masks are delivered. Based on compressive sensing paradigm, we suitably refine the series expansions of web map equations to better reconstruct the underlying system. The parameters of the chaotic equations can be successfully calculated from observed measurements and then can be used to regenerate the correct random phase-amplitude masks for decrypting the encoded information. Numerical simulations have been performed to verify the proposed optical image cryptosystem. This cryptosystem can provide a new key management and distribution method. It has the advantages of sufficiently low occupation of the transmitted key codes and security improvement of information transmission without sending the real keys.
Active Learning Framework for Non-Intrusive Load Monitoring: Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jin, Xin
2016-05-16
Non-Intrusive Load Monitoring (NILM) is a set of techniques that estimate the electricity usage of individual appliances from power measurements taken at a limited number of locations in a building. One of the key challenges in NILM is having too much data without class labels yet being unable to label the data manually for cost or time constraints. This paper presents an active learning framework that helps existing NILM techniques to overcome this challenge. Active learning is an advanced machine learning method that interactively queries a user for the class label information. Unlike most existing NILM systems that heuristically requestmore » user inputs, the proposed method only needs minimally sufficient information from a user to build a compact and yet highly representative load signature library. Initial results indicate the proposed method can reduce the user inputs by up to 90% while still achieving similar disaggregation performance compared to a heuristic method. Thus, the proposed method can substantially reduce the burden on the user, improve the performance of a NILM system with limited user inputs, and overcome the key market barriers to the wide adoption of NILM technologies.« less
NASA Astrophysics Data System (ADS)
Permadi, Ginanjar Setyo; Adi, Kusworo; Gernowo, Rahmad
2018-02-01
RSA algorithm give security in the process of the sending of messages or data by using 2 key, namely private key and public key .In this research to ensure and assess directly systems are made have meet goals or desire using a comprehensive evaluation methods HOT-Fit system .The purpose of this research is to build a information system sending mail by applying methods of security RSA algorithm and to evaluate in uses the method HOT-Fit to produce a system corresponding in the faculty physics. Security RSA algorithm located at the difficulty of factoring number of large coiled factors prima, the results of the prime factors has to be done to obtain private key. HOT-Fit has three aspects assessment, in the aspect of technology judging from the system status, the quality of system and quality of service. In the aspect of human judging from the use of systems and satisfaction users while in the aspect of organization judging from the structure and environment. The results of give a tracking system sending message based on the evaluation acquired.
Rotarius, Timothy; Wan, Thomas T H; Liberman, Aaron
2007-01-01
Research plays a critical role throughout virtually every conduit of the health services industry. The key terms of research, public relations, and organizational interests are discussed. Combining public relations as a strategic methodology with the organizational concern as a factor, a typology of four different research methods emerges. These four health marketing research methods are: investigative, strategic, informative, and verification. The implications of these distinct and contrasting research methods are examined.
Greville-Harris, Maddy; Bostock, Jennifer; Din, Amy; Graham, Cynthia A; Lewith, George; Liossi, Christina; O’Riordan, Tim; White, Peter; Yardley, Lucy
2016-01-01
Background According to established ethical principles and guidelines, patients in clinical trials should be fully informed about the interventions they might receive. However, information about placebo-controlled clinical trials typically focuses on the new intervention being tested and provides limited and at times misleading information about placebos. Objective We aimed to create an informative, scientifically accurate, and engaging website that could be used to improve understanding of placebo effects among patients who might be considering taking part in a placebo-controlled clinical trial. Methods Our approach drew on evidence-, theory-, and person-based intervention development. We used existing evidence and theory about placebo effects to develop content that was scientifically accurate. We used existing evidence and theory of health behavior to ensure our content would be communicated persuasively, to an audience who might currently be ignorant or misinformed about placebo effects. A qualitative ‘think aloud’ study was conducted in which 10 participants viewed prototypes of the website and spoke their thoughts out loud in the presence of a researcher. Results The website provides information about 10 key topics and uses text, evidence summaries, quizzes, audio clips of patients’ stories, and a short film to convey key messages. Comments from participants in the think aloud study highlighted occasional misunderstandings and off-putting/confusing features. These were addressed by modifying elements of content, style, and navigation to improve participants’ experiences of using the website. Conclusions We have developed an evidence-based website that incorporates theory-based techniques to inform members of the public about placebos and placebo effects. Qualitative research ensured our website was engaging and convincing for our target audience who might not perceive a need to learn about placebo effects. Before using the website in clinical trials, it is necessary to test its effects on key outcomes including patients’ knowledge and capacity for making informed choices about placebos. PMID:27288271
ERIC Educational Resources Information Center
St Quinton, Tom; Brunton, Julie A.
2018-01-01
Purpose: This study is the 3rd piece of formative research utilizing the theory of planned behavior to inform the development of a behavior change intervention. Focus groups were used to identify reasons for and solutions to previously identified key beliefs in addition to potentially effective behavior change techniques. Method: A purposive…
The quality of mental disorder information websites: a review.
Reavley, Nicola J; Jorm, Anthony F
2011-11-01
This paper reviews studies assessing the quality of websites providing information about mental disorders. The review included 31 articles identified by searching research databases in March 2010. Topics covered included affective disorders, anxiety disorders, eating disorders, substance use disorders and schizophrenia/psychosis. The largest number of articles (13) reported studies assessing affective disorder information quality. Methodologies varied in site selection and rating methods, with some of limited validity. Most concluded that quality was poor, although quality of affective disorder sites may be improving. There is currently very little understanding of the influence of website quality on user behaviour. Future quality assessments might use the criteria informed by key behaviour change theories. A possible approach to research on websites and user behaviour might be to develop an evaluation framework incorporating strategies from behaviour change models, key mental health literacy elements and health outcomes relevant to mental health promotion. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
The construction of a public key infrastructure for healthcare information networks in Japan.
Sakamoto, N
2001-01-01
The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.
Baral, Stefan D; Edwards, Jessie K; Zadrozny, Sabrina; Hargreaves, James; Zhao, Jinkou; Sabin, Keith
2018-01-01
Background Normative guidelines from the World Health Organization recommend tracking strategic information indicators among key populations. Monitoring progress in the global response to the HIV epidemic uses indicators put forward by the Joint United Nations Programme on HIV/AIDS. These include the 90-90-90 targets that require a realignment of surveillance data, routinely collected program data, and medical record data, which historically have developed separately. Objective The aim of this study was to describe current challenges for monitoring HIV-related strategic information indicators among key populations ((men who have sex with men [MSM], people in prisons and other closed settings, people who inject drugs, sex workers, and transgender people) and identify future opportunities to enhance the use of surveillance data, programmatic data, and medical record data to describe the HIV epidemic among key populations and measure the coverage of HIV prevention, care, and treatment programs. Methods To provide a historical perspective, we completed a scoping review of the expansion of HIV surveillance among key populations over the past three decades. To describe current efforts, we conducted a review of the literature to identify published examples of SI indicator estimates among key populations. To describe anticipated challenges and future opportunities to improve measurement of strategic information indicators, particularly from routine program and health data, we consulted participants of the Third Global HIV Surveillance Meeting in Bangkok, where the 2015 World Health Organization strategic information guidelines were launched. Results There remains suboptimal alignment of surveillance and programmatic data, as well as routinely collected medical records to facilitate the reporting of the 90-90-90 indicators for HIV among key populations. Studies (n=3) with estimates of all three 90-90-90 indicators rely on cross-sectional survey data. Programmatic data and medical record data continue to be insufficiently robust to provide estimates of the 90-90-90 targets for key populations. Conclusions Current reliance on more active data collection processes, including key population-specific surveys, remains warranted until the quality and validity of passively collected routine program and medical record data for key populations is optimized. PMID:29789279
Unified Communications: Simplifying DoD Communication Methods
2013-04-18
private key to encrypt the hash. The encrypted hash, together with some other information, such as the hashing algorithm , is known as a digital...virtual private network (VPN). The use of a VPN would allow users to access corporate data while encrypting traffic.35 Another layer of protection would...sign and encrypt emails as well as controlling access to restricted sites. PKI uses a combination of public and private keys for encryption and
Integrative methods for analyzing big data in precision medicine.
Gligorijević, Vladimir; Malod-Dognin, Noël; Pržulj, Nataša
2016-03-01
We provide an overview of recent developments in big data analyses in the context of precision medicine and health informatics. With the advance in technologies capturing molecular and medical data, we entered the area of "Big Data" in biology and medicine. These data offer many opportunities to advance precision medicine. We outline key challenges in precision medicine and present recent advances in data integration-based methods to uncover personalized information from big data produced by various omics studies. We survey recent integrative methods for disease subtyping, biomarkers discovery, and drug repurposing, and list the tools that are available to domain scientists. Given the ever-growing nature of these big data, we highlight key issues that big data integration methods will face. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Ifcwall Reconstruction from Unstructured Point Clouds
NASA Astrophysics Data System (ADS)
Bassier, M.; Klein, R.; Van Genechten, B.; Vergauwen, M.
2018-05-01
The automated reconstruction of Building Information Modeling (BIM) objects from point cloud data is still ongoing research. A key aspect is the creation of accurate wall geometry as it forms the basis for further reconstruction of objects in a BIM. After segmenting and classifying the initial point cloud, the labelled segments are processed and the wall topology is reconstructed. However, the preocedure is challenging due to noise, occlusions and the complexity of the input data.In this work, a method is presented to automatically reconstruct consistent wall geometry from point clouds. More specifically, the use of room information is proposed to aid the wall topology creation. First, a set of partial walls is constructed based on classified planar primitives. Next, the rooms are identified using the retrieved wall information along with the floors and ceilings. The wall topology is computed by the intersection of the partial walls conditioned on the room information. The final wall geometry is defined by creating IfcWallStandardCase objects conform the IFC4 standard. The result is a set of walls according to the as-built conditions of a building. The experiments prove that the used method is a reliable framework for wall reconstruction from unstructured point cloud data. Also, the implementation of room information reduces the rate of false positives for the wall topology. Given the walls, ceilings and floors, 94% of the rooms is correctly identified. A key advantage of the proposed method is that it deals with complex rooms and is not bound to single storeys.
Mapping mental health finances in Ghana, Uganda, Sri Lanka, India and Lao PDR
2010-01-01
Background Limited evidence about mental health finances in low and middle-income countries is a key challenge to mental health care policy initiatives. This study aimed to map mental health finances in Ghana, Uganda, India (Kerala state), Sri Lanka and Lao PDR focusing on how much money is available for mental health, how it is spent, and how this impacts mental health services. Methods A researcher in each region reviewed public mental health-related budgets and interviewed key informants on government mental health financing. A total of 43 key informant interviews were conducted. Quantitative data was analyzed in an excel matrix using descriptive statistics. Key informant interviews were coded a priori against research questions. Results National ring-fenced budgets for mental health as a percentage of national health spending for 2007-08 is 1.7% in Sri Lanka, 3.7% in Ghana, 2.0% in Kerala (India) and 6.6% in Uganda. Budgets were not available in Lao PDR. The majority of ring-fenced budgets (76% to 100%) is spent on psychiatric hospitals. Mental health spending could not be tracked beyond the psychiatric hospital level due to limited information at the health centre and community levels. Conclusions Mental health budget information should be tracked and made publically accessible. Governments can adapt WHO AIMS indicators for reviewing national mental health finances. Funding allocations work more effectively through decentralization. Mental health financing should reflect new ideas emerging from community based practice in LMICs. PMID:20507558
Peterson, Lauren; Comfort, Alison; Hatt, Laurel; van Bastelaer, Thierry
2018-04-15
As a growing number of low- and middle-income countries commit to achieving universal health coverage, one key challenge is how to extend coverage to informal sector workers. Micro health insurance (MHI) provides a potential model to finance health services for this population. This study presents lessons from a pilot study of a mandatory MHI plan offered by a private insurance company and distributed through a microfinance bank to urban, informal sector workers in Lagos, Nigeria. Study methods included a survey of microfinance clients, key informant interviews, and a review of administrative records. Demographic, health care seeking, and willingness-to-pay data suggested that microfinance clients, particularly women, could benefit from a comprehensive MHI plan that improved access to health care and reduced out-of-pocket spending on health services. However, administrative data revealed declining enrollment, and key informant interviews further suggested low use of the health insurance plan. Key implementation challenges, including changes to mandatory enrollment requirements, insufficient client education and marketing, misaligned incentives, and weak back-office systems, undermined enrollment and use of the plan. Mandatory MHI plans, intended to mitigate adverse selection and facilitate private insurers' entry into new markets, present challenges for covering informal sector workers, including when distributed through agents such as a microfinance bank. Properly aligning the incentives of the insurer and the agent are critical to effectively distribute and service insurance. Further, an urban environment presents unique challenges for distributing MHI, addressing client perceptions of health insurance, and meeting their health care needs. Copyright © 2018 John Wiley & Sons, Ltd.
An improved scheme on decoy-state method for measurement-device-independent quantum key distribution
Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin
2015-01-01
Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate. PMID:26463580
Quantum communication and information processing
NASA Astrophysics Data System (ADS)
Beals, Travis Roland
Quantum computers enable dramatically more efficient algorithms for solving certain classes of computational problems, but, in doing so, they create new problems. In particular, Shor's Algorithm allows for efficient cryptanalysis of many public-key cryptosystems. As public key cryptography is a critical component of present-day electronic commerce, it is crucial that a working, secure replacement be found. Quantum key distribution (QKD), first developed by C.H. Bennett and G. Brassard, offers a partial solution, but many challenges remain, both in terms of hardware limitations and in designing cryptographic protocols for a viable large-scale quantum communication infrastructure. In Part I, I investigate optical lattice-based approaches to quantum information processing. I look at details of a proposal for an optical lattice-based quantum computer, which could potentially be used for both quantum communications and for more sophisticated quantum information processing. In Part III, I propose a method for converting and storing photonic quantum bits in the internal state of periodically-spaced neutral atoms by generating and manipulating a photonic band gap and associated defect states. In Part II, I present a cryptographic protocol which allows for the extension of present-day QKD networks over much longer distances without the development of new hardware. I also present a second, related protocol which effectively solves the authentication problem faced by a large QKD network, thus making QKD a viable, information-theoretic secure replacement for public key cryptosystems.
Assessment of the needs of vulnerable youth populations in post-conflict Liberia.
Levey, E J; Borba, C P; Harris, B L; Carney, J R; Dominguez, S; Wang, E K; Boxill, R; Henderson, D C
2013-09-01
The study examined key informants' perceptions of the emotional impact of traumatic events, major problems, functional limitations and appropriate treatment settings for children, adolescents, and young adults in post-conflict Liberia. This research is a based on cross-sectional survey conducted between March 30, 2009 and April 30, 2009 in Liberia with 171 local key Liberian informants. Analysis was conducted using mixed methods. The findings we will report were collected in the qualitative portion of the survey. We found that while different interventions were preferred for different types of young people, some interventions were mentioned for all youth and by all age and gender groups of key informants. These included counseling, education, and skills training. Also frequently chosen were housing, community reintegration, recreation, and medical care. In general, key informants reported similar concerns regardless of their ages or genders. Notable exceptions to this were in interventions for youth who joined fighting forces. Men over 50 were the only ones to recommend apology and reparations. Similarly, in recommendations for criminals and violent youth, a number of men mentioned prison, whereas the women did not. Our findings suggest that the needs of post-conflict Liberian youth span a variety of domains, including physical, emotional, medical, psychological, and educational. These findings can be used to guide the development of treatment programs for these young people.
A Noninvasive Imaging Modality for Cardiac Arrhythmias
Burnes, John E.; Taccardi, Bruno; Rudy, Yoram
2007-01-01
Background The last decade witnessed an explosion of information regarding the genetic, molecular, and mechanistic basis of heart disease. Translating this information into clinical practice requires the development of novel functional imaging modalities for diagnosis, localization, and guided intervention. A noninvasive modality for imaging cardiac arrhythmias is not yet available. Present electrocardiographic methods cannot precisely localize a ventricular tachycardia (VT) or its key reentrant circuit components. Recently, we developed a noninvasive electrocardiographic imaging modality (ECGI) that can reconstruct epicardial electrophysiological information from body surface potentials. Here, we extend its application to image reentrant arrhythmias. Methods and Results Epicardial potentials were recorded during VT with a 490 electrode sock during an open chest procedure in 2 dogs with 4-day-old myocardial infarctions. Body surface potentials were generated from these epicardial potentials in a human torso model. Realistic geometry errors and measurement noise were added to the torso data, which were then used to noninvasively reconstruct epicardial isochrones, electrograms, and potentials with excellent accuracy. ECGI reconstructed the reentry pathway and its key components, including (1) the central common pathway, (2) the VT exit site, (3) lines of block, and (4) regions of slow and fast conduction. This allowed for detailed characterization of the reentrant circuit morphology. Conclusions ECGI can noninvasively image arrhythmic activation on the epicardium during VT to identify and localize key components of the arrhythmogenic pathway that can be effective targets for antiarrhythmic intervention. PMID:11044435
Stang, Jamie; Bonilla, Zobeida
2017-09-29
To determine preferred policies and programs to prevent obesity and diabetes as identified by parents and caregivers of 3- to 5-year-old Latino children. Constructs from the Social Ecological Model were used to develop 10 focus group and key informant interview questions. Community venues and schools in St Paul, MN. A total of 64 parents and caregivers and 20 key informants provided comments. Community-based participatory research methods were used to gather opinions regarding appropriate and preferred methods to prevent obesity and diabetes among Latino youth. Native Spanish-speaking investigators who were members of the community conducted 7 focus groups (60-90 minutes each) and 20 key informant interviews. Themes and subthemes of preferences based on participant comments. Transcript-based, long-table qualitative analysis. Five themes were identified: (1) cultural beliefs and practices are inconsistent with obesity prevention; (2) cost and convenience; (3) positive parenting practices; (4) we want to learn more about being healthy; and (5) gardens, parks, gyms, and school meals. At least 1 theme fell within each of the social ecological model domains. Our results suggest that parents of young Hispanic children prefer that obesity and diabetes prevention programs address multiple levels of influence. Copyright © 2017 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.
Feller, Tara T; Doucette, William R; Witry, Matthew J
2016-06-25
Objective. To summarize student pharmacist leadership development opportunities delivered by pharmacy programs, to describe selected opportunities, and to assess how these opportunities meet leadership development competencies. Methods. A multi-method study was conducted that comprised a systematic content analysis of pharmacy education journals, pharmacy program websites, and telephone interviews with key informants, which included open-ended questions and scaled responses. Results. Review of six articles, 37 American Association of Colleges of Pharmacy (AACP) Annual Meeting abstracts, and 138 websites resulted in the identification of 191 leadership development opportunities. These consisted of courses, projects/programs, and events/speaker series. Interviews with 12 key informants detailed unique events that developed leadership competencies. Formal assessments of student leadership development were limited and primarily focused on informal feedback and course evaluations. Conclusion. Most US pharmacy programs offer their students an array of opportunities to develop leadership abilities. Pharmacy programs should consider expanding opportunities beyond elective courses, learn from the successes of others to implement new leadership development opportunities, and bolster the assessment of student leadership competencies and outcomes.
Feller, Tara T.; Witry, Matthew J.
2016-01-01
Objective. To summarize student pharmacist leadership development opportunities delivered by pharmacy programs, to describe selected opportunities, and to assess how these opportunities meet leadership development competencies. Methods. A multi-method study was conducted that comprised a systematic content analysis of pharmacy education journals, pharmacy program websites, and telephone interviews with key informants, which included open-ended questions and scaled responses. Results. Review of six articles, 37 American Association of Colleges of Pharmacy (AACP) Annual Meeting abstracts, and 138 websites resulted in the identification of 191 leadership development opportunities. These consisted of courses, projects/programs, and events/speaker series. Interviews with 12 key informants detailed unique events that developed leadership competencies. Formal assessments of student leadership development were limited and primarily focused on informal feedback and course evaluations. Conclusion. Most US pharmacy programs offer their students an array of opportunities to develop leadership abilities. Pharmacy programs should consider expanding opportunities beyond elective courses, learn from the successes of others to implement new leadership development opportunities, and bolster the assessment of student leadership competencies and outcomes. PMID:27402982
Efficient sidelobe ASK based dual-function radar-communications
NASA Astrophysics Data System (ADS)
Hassanien, Aboulnasr; Amin, Moeness G.; Zhang, Yimin D.; Ahmad, Fauzia
2016-05-01
Recently, dual-function radar-communications (DFRC) has been proposed as means to mitigate the spectrum congestion problem. Existing amplitude-shift keying (ASK) methods for information embedding do not take full advantage of the highest permissable sidelobe level. In this paper, a new ASK-based signaling strategy for enhancing the signal-to-noise ratio (SNR) at the communication receiver is proposed. The proposed method employs one reference waveform and simultaneously transmits a number of orthogonal waveforms equals to the number of 1's in the binary sequence being embedded. 3 dB SNR gain is achieved using the proposed method as compared to existing sidelobe ASK methods. The effectiveness of the proposed information embedding strategy is verified using simulations examples.
Ridgely, M Susan; Giard, Julienne; Shern, David; Mulkern, Virginia; Burnam, M Audrey
2002-01-01
Objective To develop an instrument to characterize public sector managed behavioral health care arrangements to capture key differences between managed and “unmanaged” care and among managed care arrangements. Study Design The instrument was developed by a multi-institutional group of collaborators with participation of an expert panel. Included are six domains predicted to have an impact on access, service utilization, costs, and quality. The domains are: characteristics of the managed care plan, enrolled population, benefit design, payment and risk arrangements, composition of provider networks, and accountability. Data are collected at three levels: managed care organization, subcontractor, and network of service providers. Data Collection Methods Data are collected through contract abstraction and key informant interviews. A multilevel coding scheme is used to organize the data into a matrix along key domains, which is then reviewed and verified by the key informants. Principal Findings This instrument can usefully differentiate between and among Medicaid fee-for-service programs and Medicaid managed care plans along key domains of interest. Beyond documenting basic features of the plans and providing contextual information, these data will support the refinement and testing of hypotheses about the impact of public sector managed care on access, quality, costs, and outcomes of care. Conclusions If managed behavioral health care research is to advance beyond simple case study comparisons, a well-conceptualized set of instruments is necessary. PMID:12236386
Full-duplex optical communication system
NASA Technical Reports Server (NTRS)
Shay, Thomas M. (Inventor); Hazzard, David A. (Inventor); Horan, Stephen (Inventor); Payne, Jason A. (Inventor)
2004-01-01
A method of full-duplex electromagnetic communication wherein a pair of data modulation formats are selected for the forward and return data links respectively such that the forward data electro-magnetic beam serves as a carrier for the return data. A method of encoding optical information is used wherein right-hand and left-hand circular polarizations are assigned to optical information to represent binary states. An application for an earth to low earth orbit optical communications system is presented which implements the full-duplex communication and circular polarization keying modulation format.
NASA Astrophysics Data System (ADS)
Börger, Tobias; Böhnke-Henrichs, Anne; Hattam, Caroline; Piwowarczyk, Joanna; Schasfoort, Femke; Austen, Melanie C.
2018-02-01
With the increasing use of environmental valuation methods in coastal, marine and deep-sea settings, there is a growing need for the collaboration of natural scientists and environmental economists. Stated preference valuation methods in particular need to be based on sound natural science information and translate such information to be used in social surveys. This paper uses three applications to make explicit the flow of information between different disciplines in the preparation and implementation of stated preference studies. One approach for facilitating this flow is to increase knowledge and understanding of natural scientists on these methods. To address this, this paper highlights key opportunities and pitfalls and demonstrates those in the context of three case studies. It therefore provides guidance on stated preference valuation for natural scientists rather than for economists.
Abiola, Sara; Colgrove, James
2012-01-01
Objectives. We sought to investigate roles that Merck & Co Inc played in state human papillomavirus (HPV) immunization policymaking, to elicit key stakeholders’ perceptions of the appropriateness of these activities, and to explore implications for relationships between health policymakers and industry. Methods. We used a series of state case studies combining data from key informant interviews with analysis of media reports and archival materials. We interviewed 73 key informants in 6 states that were actively engaged in HPV vaccine policy deliberations. Results. Merck promoted school-entry mandate legislation by serving as an information resource, lobbying legislators, drafting legislation, mobilizing female legislators and physician organizations, conducting consumer marketing campaigns, and filling gaps in access to the vaccine. Legislators relied heavily on Merck for scientific information. Most stakeholders found lobbying by vaccine manufacturers acceptable in principle, but perceived that Merck had acted too aggressively and nontransparently in this case. Conclusions. Although policymakers acknowledge the utility of manufacturers’ involvement in vaccination policymaking, industry lobbying that is overly aggressive, not fully transparent, or not divorced from financial contributions to lawmakers risks undermining the prospects for legislation to foster uptake of new vaccines. PMID:22420796
Wang, Xiaogang; Chen, Wen; Chen, Xudong
2015-03-09
In this paper, we develop a new optical information authentication system based on compressed double-random-phase-encoded images and quick-response (QR) codes, where the parameters of optical lightwave are used as keys for optical decryption and the QR code is a key for verification. An input image attached with QR code is first optically encoded in a simplified double random phase encoding (DRPE) scheme without using interferometric setup. From the single encoded intensity pattern recorded by a CCD camera, a compressed double-random-phase-encoded image, i.e., the sparse phase distribution used for optical decryption, is generated by using an iterative phase retrieval technique with QR code. We compare this technique to the other two methods proposed in literature, i.e., Fresnel domain information authentication based on the classical DRPE with holographic technique and information authentication based on DRPE and phase retrieval algorithm. Simulation results show that QR codes are effective on improving the security and data sparsity of optical information encryption and authentication system.
A noise immunity controlled quantum teleportation protocol
NASA Astrophysics Data System (ADS)
Li, Dong-fen; Wang, Rui-jin; Zhang, Feng-li; Baagyere, Edward; Qin, Zhen; Xiong, Hu; Zhan, Huayi
2016-11-01
With the advent of the Internet and information and communication technology, quantum teleportation has become an important field in information security and its application areas. This is because quantum teleportation has the ability to attain a timely secret information delivery and offers unconditional security. And as such, the field of quantum teleportation has become a hot research topic in recent years. However, noise has serious effect on the safety of quantum teleportation within the aspects of information fidelity, channel capacity and information transfer. Therefore, the main purpose of this paper is to address these problems of quantum teleportation. Firstly, in order to resist collective noise, we construct a decoherence-free subspace under different noise scenarios to establish a two-dimensional fidelity quantum teleportation models. And also create quantum teleportation of multiple degree of freedom, and these models ensure the accuracy and availability of the exchange of information and in multiple degree of freedom. Secondly, for easy preparation, measurement and implementation, we use super dense coding features to build an entangled quantum secret exchange channel. To improve the channel utilization and capacity, an efficient super dense coding method based on ultra-entanglement exchange is used. Thirdly, continuous variables of the controlled quantum key distribution were designed for quantum teleportation; in addition, we perform Bell-basis measurement under the collective noise and also prepare the storage technology of quantum states to achieve one-bit key by three-photon encoding to improve its security and efficiency. We use these two methods because they conceal information, resist a third party attack and can detect eavesdropping. Our proposed methods, according to the security analysis, are able to solve the problems associated with the quantum teleportation under various noise environments.
Improving informed consent: Stakeholder views.
Anderson, Emily E; Newman, Susan B; Matthews, Alicia K
2017-01-01
Innovation will be required to improve the informed consent process in research. We aimed to obtain input from key stakeholders-research participants and those responsible for obtaining informed consent-to inform potential development of a multimedia informed consent "app." This descriptive study used a mixed-methods approach. Five 90-minute focus groups were conducted with volunteer samples of former research participants and researchers/research staff responsible for obtaining informed consent. Participants also completed a brief survey that measured background information and knowledge and attitudes regarding research and the use of technology. Established qualitative methods were used to conduct the focus groups and data analysis. We conducted five focus groups with 41 total participants: three groups with former research participants (total n = 22), and two groups with researchers and research coordinators (total n = 19). Overall, individuals who had previously participated in research had positive views regarding their experiences. However, further discussion elicited that the informed consent process often did not meet its intended objectives. Findings from both groups are presented according to three primary themes: content of consent forms, experience of the informed consent process, and the potential of technology to improve the informed consent process. A fourth theme, need for lay input on informed consent, emerged from the researcher groups. Our findings add to previous research that suggests that the use of interactive technology has the potential to improve the process of informed consent. However, our focus-group findings provide additional insight that technology cannot replace the human connection that is central to the informed consent process. More research that incorporates the views of key stakeholders is needed to ensure that multimedia consent processes do not repeat the mistakes of paper-based consent forms.
Spatio-Temporal Process Simulation of Dam-Break Flood Based on SPH
NASA Astrophysics Data System (ADS)
Wang, H.; Ye, F.; Ouyang, S.; Li, Z.
2018-04-01
On the basis of introducing the SPH (Smooth Particle Hydrodynamics) simulation method, the key research problems were given solutions in this paper, which ere the spatial scale and temporal scale adapting to the GIS(Geographical Information System) application, the boundary condition equations combined with the underlying surface, and the kernel function and parameters applicable to dam-break flood simulation. In this regards, a calculation method of spatio-temporal process emulation with elaborate particles for dam-break flood was proposed. Moreover the spatio-temporal process was dynamic simulated by using GIS modelling and visualization. The results show that the method gets more information, objectiveness and real situations.
The Sherlock Holmes method in clinical practice.
Sopeña, B
2014-04-01
This article lists the integral elements of the Sherlock Holmes method, which is based on the intelligent collection of information through detailed observation, careful listening and thorough examination. The information thus obtained is analyzed to develop the main and alternative hypotheses, which are shaped during the deductive process until the key leading to the solution is revealed. The Holmes investigative method applied to clinical practice highlights the advisability of having physicians reason through and seek out the causes of the disease with the data obtained from acute observation, a detailed review of the medical history and careful physical examination. Copyright © 2013 Elsevier España, S.L. All rights reserved.
du Toit, Rènée; Courtright, Paul; Lewallen, Susan
2017-06-01
An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.
Bassett-Gunter, R L; Ruscitti, R J; Latimer-Cheung, A E; Fraser-Thomas, J L
2017-05-01
Physical activity (PA) has myriad benefits for children with disabilities (CWD). Information and messaging campaigns can promote PA among CWD. The overall purpose of the study was to gain an understanding of the development of PA information and messages targeting parents of CWD. The specific objectives were to identify parents' preferences regarding PA information and messaging content and preferred methods and sources of communication. Focus groups were conducted with parents of CWD (N=28). Qualitative data were collected and transcribed. Inductive content analyses were employed to identify key themes. Three key thematic areas were identified: 1) Preferred content (e.g., targeted information, self-regulatory strategies, inclusive images), 2) Challenges (e.g., lack of information and language clarity), 3) Preferred sources (e.g., other parents, reliable organizations, central information hub). Parents' needs and preferences regarding PA information could be incorporated into campaigns to enhance parent PA support and PA among CWD. Stakeholders (e.g., PA organizations, programs and practitioners) can employ these strategies in campaigns and resources targeting parents of CWD. Research is necessary to empirically develop and evaluate PA information and messaging campaigns targeting parents of CWD. Copyright © 2017 Elsevier Ltd. All rights reserved.
Community-based health and schools of nursing: supporting health promotion and research.
Shannon, Crystal
2014-01-01
This article examines the role of community-based schools of nursing in the promotion of public health and research in poverty-stricken areas. This was a three-phase study (questionnaire and key-informants' interviews) that surveyed representatives of prelicensure associate and baccalaureate nursing schools (n=17), nursing-school key informants (n=6) and community leaders (n=10). A 13-question web-based survey and semi-structured interview of key informants elicited data on demographics, nursing program design, exposure of faculty and students to various research and health promotion methods, and beliefs about student involvement. Nursing schools participated minimally in community-based health promotion (CBHP) and community-based participatory research saw reduced need for student involvement in such activities, cited multiple barriers to active community collaboration, and reported restricted community partnerships. CBHP was recognized to be a valuable element of health care and student education, but is obstructed by many barriers. This study suggests that nursing schools are not taking full advantage of relationships with community leaders. Recommendations for action are given. © 2013 Wiley Periodicals, Inc.
Ethnographic field work in requirements engineering
NASA Astrophysics Data System (ADS)
Reddivari, Sandeep; Asaithambi, Asai; Niu, Nan; Wang, Wentao; Xu, Li Da; Cheng, Jing-Ru C.
2017-01-01
The requirements engineering (RE) processes have become a key in developing and deploying enterprise information system (EIS) for organisations and corporations in various fields and industrial sectors. Ethnography is a contextual method allowing scientific description of the stakeholders, their needs and their organisational customs. Despite the recognition in the RE literature that ethnography could be helpful, the actual leverage of the method has been limited and ad hoc. To overcome the problems, we report in this paper a systematic mapping study where the relevant literature is examined. Building on the literature review, we further identify key parameters, their variations and their connections. The improved understanding about the role of ethnography in EIS RE is then presented in a consolidated model, and the guidelines of how to apply ethnography are organised by the key factors uncovered. Our study can direct researchers towards thorough understanding about the role that ethnography plays in EIS RE, and more importantly, to help practitioners better integrate contextually rich and ecologically valid methods in their daily practices.
FPGA based digital phase-coding quantum key distribution system
NASA Astrophysics Data System (ADS)
Lu, XiaoMing; Zhang, LiJun; Wang, YongGang; Chen, Wei; Huang, DaJun; Li, Deng; Wang, Shuang; He, DeYong; Yin, ZhenQiang; Zhou, Yu; Hui, Cong; Han, ZhengFu
2015-12-01
Quantum key distribution (QKD) is a technology with the potential capability to achieve information-theoretic security. Phasecoding is an important approach to develop practical QKD systems in fiber channel. In order to improve the phase-coding modulation rate, we proposed a new digital-modulation method in this paper and constructed a compact and robust prototype of QKD system using currently available components in our lab to demonstrate the effectiveness of the method. The system was deployed in laboratory environment over a 50 km fiber and continuously operated during 87 h without manual interaction. The quantum bit error rate (QBER) of the system was stable with an average value of 3.22% and the secure key generation rate is 8.91 kbps. Although the modulation rate of the photon in the demo system was only 200 MHz, which was limited by the Faraday-Michelson interferometer (FMI) structure, the proposed method and the field programmable gate array (FPGA) based electronics scheme have a great potential for high speed QKD systems with Giga-bits/second modulation rate.
Connecting Medical Records: An Evaluation of Benefits and Challenges for Primary Care Practices.
Compeau, Deborah Ruth; Terry, Amanda
2017-06-30
Implementation of systems to support health information sharing has lagged other areas of healthcare IT, yet offers a strong possibility for benefit. Clinical acceptance is a key limiting factor in health IT adoption. To assess the benefits and challenges experienced by clinicians using a custom-developed health information exchange system, and to show how perceptions of benefits and challenges influence perceptions of productivity and care-related outcomes. We used a mixed methods design with two phases. First, we conducted interviews with stakeholders who were familiar with the health information exchange system to inform the development of a measure of benefits and challenges of the use of this system. Second, using this measure we conducted a survey of current and former users of the health information exchange system using a modified Dillman method. 105 current and former users completed the survey. The results showed information quality, ease of completing tasks and clinical process improvement as key benefits that reduced workload and improved patient care. Challenges related to system reliability, quality of reports and service quality increased workload and decreased impact on care, though the effect of the challenges was smaller than that of the benefits. Even very limited health information exchange capabilities can improve outcomes for primary care users. Improving perceptions of benefits may be even more important the removing challenges to use, though it is likely that a threshold of quality must be achieved for this to be true.
Mobile phones and social structures: an exploration of a closed user group in rural Ghana
2013-01-01
Background In the Millennium Villages Project site of Bonsaaso, Ghana, the Health Team is using a mobile phone closed user group to place calls amongst one another at no cost. Methods In order to determine the utilization and acceptability of the closed user group amongst users, social network analysis and qualitative methods were used. Key informants were identified and interviewed. The key informants also kept prospective call journals. Billing statements and de-identified call data from the closed user group were used to generate data for analyzing the social structure revealed by the network traffic. Results The majority of communication within the closed user group was personal and not for professional purposes. The members of the CUG felt that the group improved their efficiency at work. Conclusions The methods used present an interesting way to investigate the social structure surrounding communication via mobile phones. In addition, the benefits identified from the exploration of this closed user group make a case for supporting mobile phone closed user groups amongst professional groups. PMID:24007331
NASA Astrophysics Data System (ADS)
Zhong, Shenlu; Li, Mengjiao; Tang, Xiajie; He, Weiqing; Wang, Xiaogang
2017-01-01
A novel optical information verification and encryption method is proposed based on inference principle and phase retrieval with sparsity constraints. In this method, a target image is encrypted into two phase-only masks (POMs), which comprise sparse phase data used for verification. Both of the two POMs need to be authenticated before being applied for decrypting. The target image can be optically reconstructed when the two authenticated POMs are Fourier transformed and convolved by the correct decryption key, which is also generated in encryption process. No holographic scheme is involved in the proposed optical verification and encryption system and there is also no problem of information disclosure in the two authenticable POMs. Numerical simulation results demonstrate the validity and good performance of this new proposed method.
Ozcan, Sercan; Islam, Nazrul
2017-01-01
Many challenges still remain in the processing of explicit technological knowledge documents such as patents. Given the limitations and drawbacks of the existing approaches, this research sets out to develop an improved method for searching patent databases and extracting patent information to increase the efficiency and reliability of nanotechnology patent information retrieval process and to empirically analyse patent collaboration. A tech-mining method was applied and the subsequent analysis was performed using Thomson data analyser software. The findings show that nations such as Korea and Japan are highly collaborative in sharing technological knowledge across academic and corporate organisations within their national boundaries, and China presents, in some cases, a great illustration of effective patent collaboration and co-inventorship. This study also analyses key patent strengths by country, organisation and technology.
Guilcher, Sara J. T.; Casciaro, Tiziana; Lemieux-Charles, Louise; Craven, Catharine; McColl, Mary Ann; Jaglal, Susan B.
2012-01-01
Objectives To describe the structure of informal networks for individuals with spinal cord injury (SCI) living in the community, to understand the quality of relationship of informal networks, and to understand the role of informal networks in the prevention and management of secondary health conditions (SHCs). Design Mixed-method descriptive study. Setting Ontario, Canada Participants Community-dwelling adults with an SCI living in Ontario Interventions/methods The Arizona Social Support Interview Survey was used to measure social networks. Participants were asked the following open-ended questions: (1) What have been your experiences with your health care in the community? (2) What have been your experiences with care related to prevention and/or management of SHCs?, (3)What has been the role of your informal social networks (friends/family) related to SHCs? Results Fourteen key informant interviews were conducted (6 men, 8 women). The overall median for available informal networks was 11.0 persons (range 3–19). The informal network engaged in the following roles: (1) advice/validating concerns; (2) knowledge brokers; (3) advocacy; (4) preventing SHCs; (5) assisting with finances; and (6) managing SHCs. Participants described their informal networks as a “secondary team”; a critical and essential force in dealing with SHCs. Conclusions While networks are smaller for persons with SCI compared with the general population, these ties seems to be strong, which is essential when the roles involve a level of trust, certainty, tacit knowledge, and flexibility. These informal networks serve as essential key players in filling the gaps that exist within the formal health care system. PMID:23031170
Identifying key genes in glaucoma based on a benchmarked dataset and the gene regulatory network.
Chen, Xi; Wang, Qiao-Ling; Zhang, Meng-Hui
2017-10-01
The current study aimed to identify key genes in glaucoma based on a benchmarked dataset and gene regulatory network (GRN). Local and global noise was added to the gene expression dataset to produce a benchmarked dataset. Differentially-expressed genes (DEGs) between patients with glaucoma and normal controls were identified utilizing the Linear Models for Microarray Data (Limma) package based on benchmarked dataset. A total of 5 GRN inference methods, including Zscore, GeneNet, context likelihood of relatedness (CLR) algorithm, Partial Correlation coefficient with Information Theory (PCIT) and GEne Network Inference with Ensemble of Trees (Genie3) were evaluated using receiver operating characteristic (ROC) and precision and recall (PR) curves. The interference method with the best performance was selected to construct the GRN. Subsequently, topological centrality (degree, closeness and betweenness) was conducted to identify key genes in the GRN of glaucoma. Finally, the key genes were validated by performing reverse transcription-quantitative polymerase chain reaction (RT-qPCR). A total of 176 DEGs were detected from the benchmarked dataset. The ROC and PR curves of the 5 methods were analyzed and it was determined that Genie3 had a clear advantage over the other methods; thus, Genie3 was used to construct the GRN. Following topological centrality analysis, 14 key genes for glaucoma were identified, including IL6 , EPHA2 and GSTT1 and 5 of these 14 key genes were validated by RT-qPCR. Therefore, the current study identified 14 key genes in glaucoma, which may be potential biomarkers to use in the diagnosis of glaucoma and aid in identifying the molecular mechanism of this disease.
Academic Primer Series: Eight Key Papers about Education Theory.
Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M; Krzyzaniak, Sara M; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan
2017-02-01
Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice.
Starting the data conversation: informing data services at an academic health sciences library*
Read, Kevin B.; Surkis, Alisa; Larson, Catherine; McCrillis, Aileen; Graff, Alice; Nicholson, Joey; Xu, Juanchan
2015-01-01
Objective The research obtained information to plan data-related products and services. Methods Biomedical researchers in an academic medical center were selected using purposive sampling and interviewed using open-ended questions based on a literature review. Interviews were conducted until saturation was achieved. Results Interview responses informed library planners about researchers’ key data issues. Conclusions This approach proved valuable for planning data management products and services and raising library visibility among clients in the research data realm. PMID:26213504
Fundamental finite key limits for one-way information reconciliation in quantum key distribution
NASA Astrophysics Data System (ADS)
Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David
2017-11-01
The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.
EVALUATION OF LITERATURE ESTABLISHING SCREENING LEVELS FOR TERRESTRIAL PLANTS/INVERTEBRATES
Scientific publications often lack key information on experimental design or do not follow appropriate test methods and therefore cannot be used in deriving reliable benchmarks. Risk based soil screening levels (Eco-SSLs) are being established for chemicals of concern to terrestr...
Implementation Science: Buzzword or Game Changer?
ERIC Educational Resources Information Center
Douglas, Natalie F.; Campbell, Wenonah N.; Hinckley, Jacqueline J.
2015-01-01
Purpose: The purpose of this supplement article is to provide a resource of pertinent information concerning implementation science for immediate research application in communication sciences and disorders. Method: Key terminology related to implementation science is reviewed. Practical suggestions for the application of implementation science…
Clinical methods to quantify trunk mobility in an elite male surfing population.
Furness, James; Climstein, Mike; Sheppard, Jeremy M; Abbott, Allan; Hing, Wayne
2016-05-01
Thoracic mobility in the sagittal and horizontal planes are key requirements in the sport of surfing; however to date the normal values of these movements have not yet been quantified in a surfing population. To develop a reliable method to quantify thoracic mobility in the sagittal plane; to assess the reliability of an existing thoracic rotation method, and quantify thoracic mobility in an elite male surfing population. Clinical Measurement, reliability and comparative study. A total of 30 subjects were used to determine the reliability component. 15 elite surfers were used as part of a comparative analysis with age and gender matched controls. Intraclass correlation coefficient values ranged between 0.95-0.99 (95% CI; 0.89-0.99) for both thoracic methods. The elite surfing group had significantly (p ≤ 0.05) greater rotation than the comparative group (mean rotation 63.57° versus 40.80°, respectively). This study has illustrated reliable methods to assess the thoracic spine in the sagittal plane and thoracic rotation. It has also quantified ROM in a surfing cohort; identifying thoracic rotation as a key movement. This information may provide clinicians, coaches and athletic trainers with imperative information regarding the importance of maintaining adequate thoracic rotation. Copyright © 2015 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Luo, Yunhan; Chen, Zhe; Li, Yan; Di, Hongwei; Li, Zhen; Bai, Chunhe; Tang, Jieyuan; Zhang, Jun; Yi, Xiao
2017-08-01
The course of optoelectronic information science is a diverse science and technology with wide range of disciplines, intensive technology, and strong applicability. As a result, the practice teaching in undergraduate education occupies the strategic important position, which is a key link in the process of innovative talents cultivation of photoelectric information, plays a unique and irreplaceable role by any other teaching methods. In order to meet the requirements of national innovative talents of photoelectric information, the complete teaching reform strategy was put forward by combining with the higher education policy and development strategy of teaching and professional characteristics. The goal of the experimental teaching reform is to cultivate innovative talents and to construct the photoelectric information industry chain system of experimental teaching platform and cultivating creative personnel. The key clue is the photoelectric information surrounding photoelectric information, like "generation - modulation - transformation - detection - procession" which will be realized by resource integration and complementary among cross disciplines, and focusing on scientific research support for the teaching and the combination of professional knowledge and practical application. This teaching reform scheme presented in the paper will provide very good demonstration effect in the curriculum reform of other photoelectric information related courses.
Aguado Loi, Claudia X; Alfonso, Moya L; Chan, Isabella; Anderson, Kelsey; Tyson, Dinorah Dina Martinez; Gonzales, Junius; Corvin, Jaime
2017-08-01
The purpose of this paper is to share lessons learned from a collaborative, community-informed mixed-methods approach to adapting an evidence-based intervention to meet the needs of Latinos with chronic disease and minor depression and their family members. Mixed-methods informed by community-based participatory research (CBPR) were employed to triangulate multiple stakeholders' perceptions of facilitators and barriers of implementing the adapted intervention in community settings. Community partners provided an insider perspective to overcome methodological challenges. The study's community informed mixed-methods: research approach offered advantages to a single research methodology by expanding or confirming research findings and engaging multiple stakeholders in data collection. This approach also allowed community partners to collaborate with academic partners in key research decisions. Copyright © 2016 Elsevier Ltd. All rights reserved.
Dissemination of assistive technology information to farmers and ranchers with disabilities.
Racz, C W; Field, W E
2011-07-01
Since induction of the AgrAbility program through appropriations contained in the 1990 Farm Bill, the national and state/regional AgrAbility projects have used a variety of methods to disseminate information about assistive technology (AT) to farmers, ranchers, and other agricultural workers with disabilities. To date, no known research has been conducted to assess those delivery methods from the perspectives of either the persons with disabilities in need of information or the education and rehabilitation professionals who work with them. This study's purpose was two-fold: (1) review various dissemination strategies to identify those documented as being more effective, and (2) conduct surveys to ascertain the perspectives of AgrAbility project professionals and a national network of farmers and ranchers with disabilities (called the Barn Builders). Key findings of the study were as follows: (1) the farmers and ranchers most preferred receiving information via printed newsletters (71%) and printed publications (67%); (2) AgrAbility staff most preferred receiving information via internet-based publication access (61%), e-mail (60%), and printed publications (58%); (3) many farmers and ranchers perceived that dissemination strategies were moving toward the internet (53%) and that AT information was generally more available now than in the past (38%); (4) both AgrAbility staff and the Barn Builders tended to agree that farmers still wanted to receive information in printed form; and (5) neither age nor education level appeared to be a strong predictor of internet use by farmers. Key recommendations to enhance the effectiveness of current AT information delivery methods included: (1) implementing effective document management strategies for all information resources, especially for online content; and (2) minimizing language translation efforts, since such a small percentage of the AgrAbility project customer base is primarily non-English speaking. It is believed that the findings of this study also have implications for service delivery strategies in other areas, including topics relating to agricultural safety and health.
Three-dimensional compound comparison methods and their application in drug discovery.
Shin, Woong-Hee; Zhu, Xiaolei; Bures, Mark Gregory; Kihara, Daisuke
2015-07-16
Virtual screening has been widely used in the drug discovery process. Ligand-based virtual screening (LBVS) methods compare a library of compounds with a known active ligand. Two notable advantages of LBVS methods are that they do not require structural information of a target receptor and that they are faster than structure-based methods. LBVS methods can be classified based on the complexity of ligand structure information utilized: one-dimensional (1D), two-dimensional (2D), and three-dimensional (3D). Unlike 1D and 2D methods, 3D methods can have enhanced performance since they treat the conformational flexibility of compounds. In this paper, a number of 3D methods will be reviewed. In addition, four representative 3D methods were benchmarked to understand their performance in virtual screening. Specifically, we tested overall performance in key aspects including the ability to find dissimilar active compounds, and computational speed.
Independent assessment is key to financial well-being.
Karling, J; Pyper, T
1999-02-01
Both traditional group practices and IPAs have felt the impact of changes brought about by managed care. Group practices need to ensure that their financial reporting and cost-accounting methods capture information that is key to decision making. An independent assessment of financial procedures helps identify any outstanding issues and maintain financial well-being. This assessment should be conducted at least quarterly so that potential problems can be resolved, income opportunities explored, and cost-saving measures adopted in a timely manner.
Use of fuzzy sets in modeling of GIS objects
NASA Astrophysics Data System (ADS)
Mironova, Yu N.
2018-05-01
The paper discusses modeling and methods of data visualization in geographic information systems. Information processing in Geoinformatics is based on the use of models. Therefore, geoinformation modeling is a key in the chain of GEODATA processing. When solving problems, using geographic information systems often requires submission of the approximate or insufficient reliable information about the map features in the GIS database. Heterogeneous data of different origin and accuracy have some degree of uncertainty. In addition, not all information is accurate: already during the initial measurements, poorly defined terms and attributes (e.g., "soil, well-drained") are used. Therefore, there are necessary methods for working with uncertain requirements, classes, boundaries. The author proposes using spatial information fuzzy sets. In terms of a characteristic function, a fuzzy set is a natural generalization of ordinary sets, when one rejects the binary nature of this feature and assumes that it can take any value in the interval.
All about Eve: Secret Sharing using Quantum Effects
NASA Technical Reports Server (NTRS)
Jackson, Deborah J.
2005-01-01
This document discusses the nature of light (including classical light and photons), encryption, quantum key distribution (QKD), light polarization and beamsplitters and their application to information communication. A quantum of light represents the smallest possible subdivision of radiant energy (light) and is called a photon. The QKD key generation sequence is outlined including the receiver broadcasting the initial signal indicating reception availability, timing pulses from the sender to provide reference for gated detection of photons, the sender generating photons through random polarization while the receiver detects photons with random polarization and communicating via data link to mutually establish random keys. The QKD network vision includes inter-SATCOM, point-to-point Gnd Fiber and SATCOM-fiber nodes. QKD offers an unconditionally secure method of exchanging encryption keys. Ongoing research will focus on how to increase the key generation rate.
Montesanti, Stephanie R; Abelson, Julia; Lavis, John N; Dunn, James R
2017-08-01
We examined efforts to engage marginalized populations in Ontario Community Health Centers (CHCs), which are primary health care organizations serving 74 high-risk communities. Qualitative case studies of community participation in four Ontario CHCs were carried out through key informant interviews with CHC staff to identify: (i) the approaches, strategies and methods used in participation initiatives aimed specifically at engaging marginalized populations in the planning of and decision making for health services; and (ii) the challenges and enablers for engaging these populations. The marginalized populations involved in the community participation initiatives studied included Low-German Speaking Mennonites in a rural town, newcomer immigrants and refugees in an urban downtown city, immigrant and francophone seniors in an inner city and refugee women in an inner city. Our analysis revealed that enabling the participation of marginalized populations requires CHCs to attend to the barriers experienced by marginalized populations that constrain their participation. Key informants outlined the features of a 'community development approach' that they rely on to address the barriers to marginalized peoples' involvement by strengthening their skills, abilities and leadership in capacity-building activities. The community development approach also shaped the participation methods that were used in the engagement process of CHCs. However, key informants also described the challenges of applying this approach, influenced by the cultural values of some groups, which shaped their willingness and motivation to participate. This study provides further insight into the approach, strategies and methods used in the engagement process to enable the participation of marginalized populations, which may be transferable to other health services settings. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
A Review of Methods for Analysis of the Expected Value of Information.
Heath, Anna; Manolopoulou, Ioanna; Baio, Gianluca
2017-10-01
In recent years, value-of-information analysis has become more widespread in health economic evaluations, specifically as a tool to guide further research and perform probabilistic sensitivity analysis. This is partly due to methodological advancements allowing for the fast computation of a typical summary known as the expected value of partial perfect information (EVPPI). A recent review discussed some approximation methods for calculating the EVPPI, but as the research has been active over the intervening years, that review does not discuss some key estimation methods. Therefore, this paper presents a comprehensive review of these new methods. We begin by providing the technical details of these computation methods. We then present two case studies in order to compare the estimation performance of these new methods. We conclude that a method based on nonparametric regression offers the best method for calculating the EVPPI in terms of accuracy, computational time, and ease of implementation. This means that the EVPPI can now be used practically in health economic evaluations, especially as all the methods are developed in parallel with R functions and a web app to aid practitioners.
Learning of Alignment Rules between Concept Hierarchies
NASA Astrophysics Data System (ADS)
Ichise, Ryutaro; Takeda, Hideaki; Honiden, Shinichi
With the rapid advances of information technology, we are acquiring much information than ever before. As a result, we need tools for organizing this data. Concept hierarchies such as ontologies and information categorizations are powerful and convenient methods for accomplishing this goal, which have gained wide spread acceptance. Although each concept hierarchy is useful, it is difficult to employ multiple concept hierarchies at the same time because it is hard to align their conceptual structures. This paper proposes a rule learning method that inputs information from a source concept hierarchy and finds suitable location for them in a target hierarchy. The key idea is to find the most similar categories in each hierarchy, where similarity is measured by the κ(kappa) statistic that counts instances belonging to both categories. In order to evaluate our method, we conducted experiments using two internet directories: Yahoo! and LYCOS. We map information instances from the source directory into the target directory, and show that our learned rules agree with a human-generated assignment 76% of the time.
Petri net-based method for the analysis of the dynamics of signal propagation in signaling pathways.
Hardy, Simon; Robillard, Pierre N
2008-01-15
Cellular signaling networks are dynamic systems that propagate and process information, and, ultimately, cause phenotypical responses. Understanding the circuitry of the information flow in cells is one of the keys to understanding complex cellular processes. The development of computational quantitative models is a promising avenue for attaining this goal. Not only does the analysis of the simulation data based on the concentration variations of biological compounds yields information about systemic state changes, but it is also very helpful for obtaining information about the dynamics of signal propagation. This article introduces a new method for analyzing the dynamics of signal propagation in signaling pathways using Petri net theory. The method is demonstrated with the Ca(2+)/calmodulin-dependent protein kinase II (CaMKII) regulation network. The results constitute temporal information about signal propagation in the network, a simplified graphical representation of the network and of the signal propagation dynamics and a characterization of some signaling routes as regulation motifs.
Identifying core competencies for public health epidemiologists.
Bondy, Susan J; Johnson, Ian; Cole, Donald C; Bercovitz, Kim
2008-01-01
Public health authorities have prioritized the identification of competencies, yet little empirical data exist to support decisions on competency selection among particular disciplines. We sought perspectives on important competencies among epidemiologists familiar with or practicing in public health settings (local to national). Using a sequential, qualitative-quantitative mixed method design, we conducted key informant interviews with 12 public health practitioners familiar with front-line epidemiologists' practice, followed by a web-based survey of members of a provincial association of public health epidemiologists (90 respondents of 155 eligible) and a consensus workshop. Competency statements were drawn from existing core competency lists and those identified by key informants, and ranked by extent of agreement in importance for entry-level practitioners. Competencies in quantitative methods and analysis, critical appraisal of scientific evidence and knowledge transfer of scientific data to other members of the public health team were all regarded as very important for public health epidemiologists. Epidemiologist competencies focused on the provision, interpretation and 'translation' of evidence to inform decision-making by other public health professionals. Considerable tension existed around some potential competency items, particularly in the areas of more advanced database and data-analytic skills. Empirical data can inform discussions of discipline-specific competencies as one input to decisions about competencies appropriate for epidemiologists in the public health workforce.
Social accountability and nursing education in South Africa
Armstrong, Susan J.; Rispel, Laetitia C.
2015-01-01
Background There is global emphasis on transforming health workforce education in support of universal health coverage. Objective This paper uses a social accountability framework, specifically the World Health Organization's six building blocks for transformative education, to explore key informants’ perspectives on nursing education in South Africa. Methods Using a snowballing sampling technique, 44 key informants were selected purposively on the basis of their expertise or knowledge of the research area. Semi-structured interviews were conducted with the key informants after informed consent had been obtained. The interviews were analysed using template analysis. Results South Africa has strategic plans on human resources for health and nursing education, training, and practice and has a well-established system of regulation and accreditation of nursing education through the South African Nursing Council (SANC). Key informants criticised the following: the lack of national staffing norms; sub-optimal governance by both the SANC and the Department of Health; outdated curricula that are unresponsive to population and health system needs; lack of preparedness of nurse educators; and the unsuitability of the majority of nursing students. These problems are exacerbated by a perceived lack of prioritisation of nursing, resource constraints in both the nursing education institutions and the health training facilities, and general implementation inertia. Conclusion Social accountability, which is an essential component of transformative education, necessitates that attention be paid to the issues of governance, responsive curricula, educator preparedness, and appropriate student recruitment and selection. PMID:25971402
Automatic Artifact Removal from Electroencephalogram Data Based on A Priori Artifact Information.
Zhang, Chi; Tong, Li; Zeng, Ying; Jiang, Jingfang; Bu, Haibing; Yan, Bin; Li, Jianxin
2015-01-01
Electroencephalogram (EEG) is susceptible to various nonneural physiological artifacts. Automatic artifact removal from EEG data remains a key challenge for extracting relevant information from brain activities. To adapt to variable subjects and EEG acquisition environments, this paper presents an automatic online artifact removal method based on a priori artifact information. The combination of discrete wavelet transform and independent component analysis (ICA), wavelet-ICA, was utilized to separate artifact components. The artifact components were then automatically identified using a priori artifact information, which was acquired in advance. Subsequently, signal reconstruction without artifact components was performed to obtain artifact-free signals. The results showed that, using this automatic online artifact removal method, there were statistical significant improvements of the classification accuracies in both two experiments, namely, motor imagery and emotion recognition.
Automatic Artifact Removal from Electroencephalogram Data Based on A Priori Artifact Information
Zhang, Chi; Tong, Li; Zeng, Ying; Jiang, Jingfang; Bu, Haibing; Li, Jianxin
2015-01-01
Electroencephalogram (EEG) is susceptible to various nonneural physiological artifacts. Automatic artifact removal from EEG data remains a key challenge for extracting relevant information from brain activities. To adapt to variable subjects and EEG acquisition environments, this paper presents an automatic online artifact removal method based on a priori artifact information. The combination of discrete wavelet transform and independent component analysis (ICA), wavelet-ICA, was utilized to separate artifact components. The artifact components were then automatically identified using a priori artifact information, which was acquired in advance. Subsequently, signal reconstruction without artifact components was performed to obtain artifact-free signals. The results showed that, using this automatic online artifact removal method, there were statistical significant improvements of the classification accuracies in both two experiments, namely, motor imagery and emotion recognition. PMID:26380294
NASA Astrophysics Data System (ADS)
Liu, Zhengjun; Chen, Hang; Blondel, Walter; Shen, Zhenmin; Liu, Shutian
2018-06-01
A novel image encryption method is proposed by using the expanded fractional Fourier transform, which is implemented with a pair of lenses. Here the centers of two lenses are separated at the cross section of axis in optical system. The encryption system is addressed with Fresnel diffraction and phase modulation for the calculation of information transmission. The iterative process with the transform unit is utilized for hiding secret image. The structure parameters of a battery of lenses can be used for additional keys. The performance of encryption method is analyzed theoretically and digitally. The results show that the security of this algorithm is enhanced markedly by the added keys.
Teaching Epidemiology at the Undergraduate Level: Considerations and Approaches.
Goldmann, Emily; Stark, James H; Kapadia, Farzana; McQueen, Matthew B
2018-06-01
The rapid growth in undergraduate public health education has offered training in epidemiology to an increasing number of undergraduate students. Epidemiology courses introduce undergraduate students to a population health perspective and provide opportunities for these students to build essential skills and competencies such as ethical reasoning, teamwork, comprehension of scientific methods, critical thinking, quantitative and information literacy, ability to analyze public health information, and effective writing and oral communication. Taking a varied approach and incorporating active learning and assessment strategies can help engage students in the material, improve comprehension of key concepts, and further develop key competencies. In this commentary, we present examples of how epidemiology may be taught in the undergraduate setting. Evaluation of these approaches and others would be a valuable next step.
Volume hologram with random encoded reference beam for secure data encryption
NASA Astrophysics Data System (ADS)
Markov, Vladimir B.; Weber, David C.; Trolinger, James D.
2000-04-01
A method is presented to store biometric and/or other important information on an ID card in the form of a Card Hologram that cannot be read or duplicated without the use of a special Key Hologram that is secured inside of an automated reader. The Key Hologram produces the unique wavefront required to release the information contained in a complex, 3D diffraction pattern recorded in a volume hologram attached to the card. Experimental results are presented in which the image of an Air Force resolution target are recorded and reconstructed in a volume material using a random speckle wavefront and that cannot be viewed using a simple wavefront such as a collimated or diverging laser beam.
Random encoded reference beam for secure data storage in a holographic memory
NASA Astrophysics Data System (ADS)
Markov, Vladimir B.; Weber, David C.
2000-11-01
A method is presented to store biometric and/or other important information on an ID card in the form of a Card Hologram that cannot be read or duplicated without the use of a special Key Hologram that is secured inside of an automated reader. The Key Hologram produces the unique wavefront required to release the information contained in a complex, 3- D diffraction pattern recorded in a volume hologram attached to the card. Experimental results are presented in which the image of an Air Force resolution target are recorded and reconstructed in a volume material using a random speckle wavefront and that cannot be viewed using a simple wavefront such as a collimated or diverging laser beam.
Tip-Nanoparticle Near-Field Coupling in Scanning Near-Field Microscopy by Coupled Dipole Method
NASA Astrophysics Data System (ADS)
Ruan, Yi; Li, Kan; Lin, Qiang; Zhang, Ting
2018-04-01
Not Available Supported by the Start-Up Grant of Zhejiang University of Technology, the Zhejiang Provincial Key Laboratory of Information Processing, Communication and Networking, the Zhejiang University, and the National Natural Science Foundation of China under Grant No 61605171.
Climate Change: A "Green" Approach to Teaching Contemporary Germany
ERIC Educational Resources Information Center
Melin, Charlotte
2013-01-01
This article describes a newly designed upper division German language course, "Contemporary Germany: Food, Energy Politics," and two sampling methods of assessment for measuring parallel gains in German skills and sustainable development (SD) thinking. Second Language Acquisition (SLA) informed course design, key assignments, and…
Estimating Lake Volume from Limited Data: A Simple GIS Approach
Lake volume provides key information for estimating residence time or modeling pollutants. Methods for calculating lake volume have relied on dated technologies (e.g. planimeters) or used potentially inaccurate assumptions (e.g. volume of a frustum of a cone). Modern GIS provid...
The Supersites Program is a methods development and evaluation, measurements, modeling, and data analysis program designed to provide key stakeholders in the science, regulatory, and policy communities with information to support primarily implementation of National Ambient Air Q...
Mooney, Ryan; Samhouri, Mahasen; Holton, Avery; Devine, Katie A.; Kirchhoff, Anne C.; Wright, Jennifer
2017-01-01
Purpose: To explore adolescent and young adult (AYA) cancer survivors' internet use in seeking healthy lifestyle behavior (HLB) information on diet and exercise. Methods: Twenty-five AYA cancer survivors participated in focus groups or interviews. Data were analyzed using qualitative content analysis. Results: Most survivors (92%) sought HLB information from internet sources. Key issues included the following: (1) too much information available, (2) information not meeting survivors' unique needs, and (3) concerns about trustworthiness of information. Conclusion: Although AYA cancer survivors use the internet to seek HLB information, internet resources could be modified to better meet the needs of AYA cancer survivors. PMID:27845844
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heifetz, A.; Bakhtiari, S.; Huang, X.
The objective of this project is to develop and demonstrate methods for transmission of information in nuclear facilities by acoustic means along existing in-place metal piping infrastructure. Pipes are omnipresent in a nuclear facility, and penetrate enclosures and partitions, such as the containment building wall. In the envisioned acoustic communication (AC) system, packets of information will be transmitted as guided acoustic waves along pipes. Performance of AC hardware and network protocols for efficient and secure communications under development in this project will be eventually evaluated in a representative nuclear power plant environment. Research efforts in the first year of thismore » project have been focused on identification of appropriate transducers, and evaluation of their performance for information transmission along nuclear-grade metallic pipes. COMSOL computer simulations were performed to study acoustic wave generation, propagation, and attenuation on pipes. An experimental benchtop system was used to evaluate signal attenuation and spectral dispersion using piezo-electric transducers (PZTs) and electromagnetic acoustic transducers (EMATs). Communication protocols under evaluation consisted on-off keying (OOK) signal modulation, in particular amplitude shift keying (ASK) and phase shift keying (PSK). Tradeoffs between signal power and communication data rate were considered for ASK and PSK coding schemes.« less
Hefner, Jennifer; Robbins, Julie; Huerta, Timothy R.
2013-01-01
Background. Ambulatory care practices have increasing interest in leveraging the capabilities of electronic health record (EHR) systems, but little information is available documenting how organizations have successfully implemented these systems. Objective. To characterize elements of successful electronic health record (EHR) system implementation and to synthesize the key informants' perspectives about successful implementation practices. Methods. Key informant interviews and focus groups were conducted with a purposive sample of individuals from US healthcare organizations identified for their success with ambulatory EHR implementation. Rigorous qualitative data analyses used both deductive and inductive methods. Results. Participants identified personal and system-related barriers, at both the individual and organization levels, including poor computer skills, productivity losses, resistance to change, and EHR system failure. Implementation success was reportedly facilitated by careful planning and consistent communication throughout distinct stages of the implementation process. A significant element of successful implementation was an emphasis on optimization, both during “go-live” and, subsequently, when users had more experience with the system. Conclusion. Successful EHR implementation requires both detailed planning and clear mechanisms to deal with unforeseen or unintended consequences. Focusing on user buy-in early and including plans for optimization can facilitate greater success. PMID:24228257
Evaluation research of small and medium-sized enterprise informatization on big data
NASA Astrophysics Data System (ADS)
Yang, Na
2017-09-01
Under the background of big data, key construction of small and medium-sized enterprise informationization level was needed, but information construction cost was large, while information cost of inputs can bring benefit to small and medium-sized enterprises. This paper established small and medium-sized enterprise informatization evaluation system from hardware and software security level, information organization level, information technology application and the profit level, and information ability level. The rough set theory was used to brief indexes, and then carry out evaluation by support vector machine (SVM) model. At last, examples were used to verify the theory in order to prove the effectiveness of the method.
A Secure Information Framework with APRQ Properties
NASA Astrophysics Data System (ADS)
Rupa, Ch.
2017-08-01
Internet of the things is the most trending topics in the digital world. Security issues are rampant. In the corporate or institutional setting, security risks are apparent from the outset. Market leaders are unable to use the cryptographic techniques due to their complexities. Hence many bits of private information, including ID, are readily available for third parties to see and to utilize. There is a need to decrease the complexity and increase the robustness of the cryptographic approaches. In view of this, a new cryptographic technique as good encryption pact with adjacency, random prime number and quantum code properties has been proposed. Here, encryption can be done by using quantum photons with gray code. This approach uses the concepts of physics and mathematics with no external key exchange to improve the security of the data. It also reduces the key attacks by generation of a key at the party side instead of sharing. This method makes the security more robust than with the existing approach. Important properties of gray code and quantum are adjacency property and different photons to a single bit (0 or 1). These can reduce the avalanche effect. Cryptanalysis of the proposed method shows that it is resistant to various attacks and stronger than the existing approaches.
ERIC Educational Resources Information Center
Brown, Chris; Rogers, Sue
2015-01-01
This paper has three key aims. First it examines the authors' attempts to use knowledge creation activity as a way of developing evidence informed practice amongst a learning community of 36 early years practitioners in the London Borough of Camden. Second, it seeks to illustrate how the authors approached the idea of measuring evidence use and…
Identification of key ancestors of modern germplasm in a breeding program of maize.
Technow, F; Schrag, T A; Schipprack, W; Melchinger, A E
2014-12-01
Probabilities of gene origin computed from the genomic kinships matrix can accurately identify key ancestors of modern germplasms Identifying the key ancestors of modern plant breeding populations can provide valuable insights into the history of a breeding program and provide reference genomes for next generation whole genome sequencing. In an animal breeding context, a method was developed that employs probabilities of gene origin, computed from the pedigree-based additive kinship matrix, for identifying key ancestors. Because reliable and complete pedigree information is often not available in plant breeding, we replaced the additive kinship matrix with the genomic kinship matrix. As a proof-of-concept, we applied this approach to simulated data sets with known ancestries. The relative contribution of the ancestral lines to later generations could be determined with high accuracy, with and without selection. Our method was subsequently used for identifying the key ancestors of the modern Dent germplasm of the public maize breeding program of the University of Hohenheim. We found that the modern germplasm can be traced back to six or seven key ancestors, with one or two of them having a disproportionately large contribution. These results largely corroborated conjectures based on early records of the breeding program. We conclude that probabilities of gene origin computed from the genomic kinships matrix can be used for identifying key ancestors in breeding programs and estimating the proportion of genes contributed by them.
Beyond mind-reading: multi-voxel pattern analysis of fMRI data.
Norman, Kenneth A; Polyn, Sean M; Detre, Greg J; Haxby, James V
2006-09-01
A key challenge for cognitive neuroscience is determining how mental representations map onto patterns of neural activity. Recently, researchers have started to address this question by applying sophisticated pattern-classification algorithms to distributed (multi-voxel) patterns of functional MRI data, with the goal of decoding the information that is represented in the subject's brain at a particular point in time. This multi-voxel pattern analysis (MVPA) approach has led to several impressive feats of mind reading. More importantly, MVPA methods constitute a useful new tool for advancing our understanding of neural information processing. We review how researchers are using MVPA methods to characterize neural coding and information processing in domains ranging from visual perception to memory search.
A knowledge-driven approach to biomedical document conceptualization.
Zheng, Hai-Tao; Borchert, Charles; Jiang, Yong
2010-06-01
Biomedical document conceptualization is the process of clustering biomedical documents based on ontology-represented domain knowledge. The result of this process is the representation of the biomedical documents by a set of key concepts and their relationships. Most of clustering methods cluster documents based on invariant domain knowledge. The objective of this work is to develop an effective method to cluster biomedical documents based on various user-specified ontologies, so that users can exploit the concept structures of documents more effectively. We develop a flexible framework to allow users to specify the knowledge bases, in the form of ontologies. Based on the user-specified ontologies, we develop a key concept induction algorithm, which uses latent semantic analysis to identify key concepts and cluster documents. A corpus-related ontology generation algorithm is developed to generate the concept structures of documents. Based on two biomedical datasets, we evaluate the proposed method and five other clustering algorithms. The clustering results of the proposed method outperform the five other algorithms, in terms of key concept identification. With respect to the first biomedical dataset, our method has the F-measure values 0.7294 and 0.5294 based on the MeSH ontology and gene ontology (GO), respectively. With respect to the second biomedical dataset, our method has the F-measure values 0.6751 and 0.6746 based on the MeSH ontology and GO, respectively. Both results outperforms the five other algorithms in terms of F-measure. Based on the MeSH ontology and GO, the generated corpus-related ontologies show informative conceptual structures. The proposed method enables users to specify the domain knowledge to exploit the conceptual structures of biomedical document collections. In addition, the proposed method is able to extract the key concepts and cluster the documents with a relatively high precision. Copyright 2010 Elsevier B.V. All rights reserved.
Predicting protein contact map using evolutionary and physical constraints by integer programming.
Wang, Zhiyong; Xu, Jinbo
2013-07-01
Protein contact map describes the pairwise spatial and functional relationship of residues in a protein and contains key information for protein 3D structure prediction. Although studied extensively, it remains challenging to predict contact map using only sequence information. Most existing methods predict the contact map matrix element-by-element, ignoring correlation among contacts and physical feasibility of the whole-contact map. A couple of recent methods predict contact map by using mutual information, taking into consideration contact correlation and enforcing a sparsity restraint, but these methods demand for a very large number of sequence homologs for the protein under consideration and the resultant contact map may be still physically infeasible. This article presents a novel method PhyCMAP for contact map prediction, integrating both evolutionary and physical restraints by machine learning and integer linear programming. The evolutionary restraints are much more informative than mutual information, and the physical restraints specify more concrete relationship among contacts than the sparsity restraint. As such, our method greatly reduces the solution space of the contact map matrix and, thus, significantly improves prediction accuracy. Experimental results confirm that PhyCMAP outperforms currently popular methods no matter how many sequence homologs are available for the protein under consideration. http://raptorx.uchicago.edu.
NASA Astrophysics Data System (ADS)
Riedinger, Kelly; Marbach-Ad, Gili; Randy McGinnis, J.; Hestness, Emily; Pease, Rebecca
2011-02-01
We investigated curricular and pedagogical innovations in an undergraduate science methods course for elementary education majors at the University of Maryland. The goals of the innovative elementary science methods course included: improving students' attitudes toward and views of science and science teaching, to model innovative science teaching methods and to encourage students to continue in teacher education. We redesigned the elementary science methods course to include aspects of informal science education. The informal science education course features included informal science educator guest speakers, a live animal demonstration and a virtual field trip. We compared data from a treatment course ( n = 72) and a comparison course ( n = 26). Data collection included: researchers' observations, instructors' reflections, and teacher candidates' feedback. Teacher candidate feedback involved interviews and results on a reliable and valid Attitudes and Beliefs about the Nature of and the Teaching of Science instrument. We used complementary methods to analyze the data collected. A key finding of the study was that while benefits were found in both types of courses, the difference in results underscores the need of identifying the primary purpose for innovation as a vital component of consideration.
Islam, Nadia; Patel, Shilpa; Brooks-Griffin, Quanza; Kemp, Patrice; Raveis, Victoria; Riley, Lindsey; Gummi, Sindhura; Nur, Potrirankamanis Queano; Ravenell, Joseph; Cole, Helen; Kwon, Simona
2017-01-01
Background Muslims are one of the fastest growing religious groups in the US. However, little is known about their health disparities, and how their unique cultural, religious, and social beliefs and practices affect health behaviors and outcomes. Studies demonstrate Muslim women may have lower rates of breast and cervical cancer screening compared to the overall population. Methods The purpose of this study was to: 1) conduct key-informant interviews with Muslim community leaders in New York City (NYC), to understand contextual factors that impact Muslim women’s beliefs and practices regarding breast and cervical cancer screening; and 2) inform the development and implementation of a research study on breast and cervical cancer screening among Muslims. Twelve key-informant interviews were conducted. The sample included imams, female religious leaders, physicians, community-based organization leaders, and social service representatives. The interview guide assessed: 1) unique healthcare barriers faced by Muslim women; 2) cultural and social considerations in conducting research; 3) potential strategies for increasing screening in this population; and 4) content and venues for culturally tailored programming and messaging. Results Key informants noted structure and culture as barriers and religion as a facilitator to breast and cervical cancer screening. Themes regarding the development of targeted health campaigns to increase screening included the importance of educational and in-language materials and messaging, and engaging mosques and religious leaders for dissemination. Conclusion Although Muslim women face a number of barriers to screening, religious beliefs and support structures can be leveraged to facilitate screening and enhance the dissemination and promotion of screening. PMID:29629435
NASA Astrophysics Data System (ADS)
Yadav, Poonam Lata; Singh, Hukum
2018-06-01
To maintain the security of the image encryption and to protect the image from intruders, a new asymmetric cryptosystem based on fractional Hartley Transform (FrHT) and the Arnold transform (AT) is proposed. AT is a method of image cropping and edging in which pixels of the image are reorganized. In this cryptosystem we have used AT so as to extent the information content of the two original images onto the encrypted images so as to increase the safety of the encoded images. We have even used Structured Phase Mask (SPM) and Hybrid Mask (HM) as the encryption keys. The original image is first multiplied with the SPM and HM and then transformed with direct and inverse fractional Hartley transform so as to obtain the encrypted image. The fractional orders of the FrHT and the parameters of the AT correspond to the keys of encryption and decryption methods. If both the keys are correctly used only then the original image would be retrieved. Recommended method helps in strengthening the safety of DRPE by growing the key space and the number of parameters and the method is robust against various attacks. By using MATLAB 8.3.0.52 (R2014a) we calculate the strength of the recommended cryptosystem. A set of simulated results shows the power of the proposed asymmetric cryptosystem.
Identification of Chemical Toxicity Using Ontology Information of Chemicals.
Jiang, Zhanpeng; Xu, Rui; Dong, Changchun
2015-01-01
With the advance of the combinatorial chemistry, a large number of synthetic compounds have surged. However, we have limited knowledge about them. On the other hand, the speed of designing new drugs is very slow. One of the key causes is the unacceptable toxicities of chemicals. If one can correctly identify the toxicity of chemicals, the unsuitable chemicals can be discarded in early stage, thereby accelerating the study of new drugs and reducing the R&D costs. In this study, a new prediction method was built for identification of chemical toxicities, which was based on ontology information of chemicals. By comparing to a previous method, our method is quite effective. We hope that the proposed method may give new insights to study chemical toxicity and other attributes of chemicals.
Forman, Jane; Creswell, John W; Damschroder, Laura; Kowalski, Christine P; Krein, Sarah L
2008-12-01
Infection control professionals and hospital epidemiologists are accustomed to using quantitative research. Although quantitative studies are extremely important in the field of infection control and prevention, often they cannot help us explain why certain factors affect the use of infection control practices and identify the underlying mechanisms through which they do so. Qualitative research methods, which use open-ended techniques, such as interviews, to collect data and nonstatistical techniques to analyze it, provide detailed, diverse insights of individuals, useful quotes that bring a realism to applied research, and information about how different health care settings operate. Qualitative research can illuminate the processes underlying statistical correlations, inform the development of interventions, and show how interventions work to produce observed outcomes. This article describes the key features of qualitative research and the advantages that such features add to existing quantitative research approaches in the study of infection control. We address the goal of qualitative research, the nature of the research process, sampling, data collection and analysis, validity, generalizability of findings, and presentation of findings. Health services researchers are increasingly using qualitative methods to address practical problems by uncovering interacting influences in complex health care environments. Qualitative research methods, applied with expertise and rigor, can contribute important insights to infection prevention efforts.
An overview of health forecasting.
Soyiri, Ireneous N; Reidpath, Daniel D
2013-01-01
Health forecasting is a novel area of forecasting, and a valuable tool for predicting future health events or situations such as demands for health services and healthcare needs. It facilitates preventive medicine and health care intervention strategies, by pre-informing health service providers to take appropriate mitigating actions to minimize risks and manage demand. Health forecasting requires reliable data, information and appropriate analytical tools for the prediction of specific health conditions or situations. There is no single approach to health forecasting, and so various methods have often been adopted to forecast aggregate or specific health conditions. Meanwhile, there are no defined health forecasting horizons (time frames) to match the choices of health forecasting methods/approaches that are often applied. The key principles of health forecasting have not also been adequately described to guide the process. This paper provides a brief introduction and theoretical analysis of health forecasting. It describes the key issues that are important for health forecasting, including: definitions, principles of health forecasting, and the properties of health data, which influence the choices of health forecasting methods. Other matters related to the value of health forecasting, and the general challenges associated with developing and using health forecasting services are discussed. This overview is a stimulus for further discussions on standardizing health forecasting approaches and methods that will facilitate health care and health services delivery.
Post-disaster Gulf Coast Recovery Using Telehealth
Kim, Thomas J.; Eastburn, Sasha L.; Icenogle, Marjorie L.; Slagle, Michelle; Nuriddin, Azizeh H.; Brantley, Katrina M.; Foreman, Rachel D.; Buckner, Ayanna V.
2013-01-01
Abstract Objective: The Gulf Coast continues to struggle with service need far outpacing available resources. Since 2005, the Regional Coordinating Center for Hurricane Response (RCC) at Morehouse School of Medicine, Atlanta, GA, has supported telehealth solutions designed to meet high service needs (e.g., psychiatry) within primary care and other healthcare organizations. The overall RCC vision is to support autonomous, useful, and sustainable telehealth programs towards mitigating unmet disaster-related needs. Subjects and Methods: To assess Gulf Coast telehealth experiences, we conducted semistructured interviews with both regional key informants and national organizations with Gulf Coast recovery interests. Using qualitative-descriptive analysis, interview transcripts were analyzed to identify shared development themes. Results: Thirty-eight key informants were interviewed, representing a 77.6% participation rate among organizations engaged by the RCC. Seven elements critical to telehealth success were identified: Funding, Regulatory, Workflow, Attitudes, Personnel, Technology, and Evaluation. These key informant accounts reveal shared insights with telehealth regarding successes, challenges, and recommendations. Conclusions: The seven elements critical to telehealth success both confirm and organize development principles from a diverse collective of healthcare stakeholders. The structured nature of these insights suggests a generalizable framework upon which other organizations might develop telehealth strategies toward addressing high service needs with limited resources. PMID:23427981
Messner, Donna A; Mohr, Penny; Towse, Adrian
2015-08-01
Explore key factors influencing future expectations for the production of evidence from comparative effectiveness research for drugs in the USA in 2020 and construct three plausible future scenarios. Semistructured key informant interviews and three rounds of modified Delphi with systematic scenario-building methods. Most influential key factors were: health delivery system integration; electronic health record development; exploitation of very large databases and mixed data sources; and proactive patient engagement in research. The scenario deemed most likely entailed uneven development of large integrated health systems with pockets of increased provider risk for patient care, enhanced data collection systems, changing incentives to do comparative effectiveness research and new opportunities for evidence generation partnerships.
Cellular and Synaptic Properties of Local Inhibitory Circuits.
Hull, Court
2017-05-01
Inhibitory interneurons play a key role in sculpting the information processed by neural circuits. Despite the wide range of physiologically and morphologically distinct types of interneurons that have been identified, common principles have emerged that have shed light on how synaptic inhibition operates, both mechanistically and functionally, across cell types and circuits. This introduction summarizes how electrophysiological approaches have been used to illuminate these key principles, including basic interneuron circuit motifs, the functional properties of inhibitory synapses, and the main roles for synaptic inhibition in regulating neural circuit function. It also highlights how some key electrophysiological methods and experiments have advanced our understanding of inhibitory synapse function. © 2017 Cold Spring Harbor Laboratory Press.
Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.
Zheng, Ran; Yao, Chuanwei; Jin, Hai; Zhu, Lei; Zhang, Qin; Deng, Wei
2015-01-01
Surveillance video service (SVS) is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units) to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.
Reply to Efford on ‘Integrating resource selection information with spatial capture-recapture’
Royle, Andy; Chandler, Richard; Sun, Catherine C.; Fuller, Angela K.
2014-01-01
3. A key point of Royle et al. (Methods in Ecology and Evolution, 2013, 4) was that active resource selection induces heterogeneity in encounter probability which, if unaccounted for, should bias estimates of population size or density. The models of Royle et al. (Methods in Ecology and Evolution, 2013, 4) and Efford (Methods in Ecology and Evolution, 2014, 000, 000) merely amount to alternative models of resource selection, and hence varying amounts of heterogeneity in encounter probability.
Teaching at the edge of knowledge: Non-equilibrium statistical physics
NASA Astrophysics Data System (ADS)
Schmittmann, Beate
2007-03-01
As physicists become increasingly interested in biological problems, we frequently find ourselves confronted with complex open systems, involving many interacting constituents and characterized by non-vanishing fluxes of mass or energy. Faced with the task of predicting macroscopic behaviors from microscopic information for these non-equilibrium systems, the familiar Gibbs-Boltzmann framework fails. The development of a comprehensive theoretical characterization of non-equilibrium behavior is one of the key challenges of modern condensed matter physics. In its absence, several approaches have been developed, from master equations to thermostatted molecular dynamics, which provide key insights into the rich and often surprising phenomenology of systems far from equilibrium. In my talk, I will address some of these methods, selecting those that are most relevant for a broad range of interdisciplinary problems from biology to traffic, finance, and sociology. The ``portability'' of these methods makes them valuable for graduate students from a variety of disciplines. To illustrate how different methods can complement each other when probing a problem from, e.g., the life sciences, I will discuss some recent attempts at modeling translation, i.e., the process by which the genetic information encoded on an mRNA is translated into the corresponding protein.
GOClonto: an ontological clustering approach for conceptualizing PubMed abstracts.
Zheng, Hai-Tao; Borchert, Charles; Kim, Hong-Gee
2010-02-01
Concurrent with progress in biomedical sciences, an overwhelming of textual knowledge is accumulating in the biomedical literature. PubMed is the most comprehensive database collecting and managing biomedical literature. To help researchers easily understand collections of PubMed abstracts, numerous clustering methods have been proposed to group similar abstracts based on their shared features. However, most of these methods do not explore the semantic relationships among groupings of documents, which could help better illuminate the groupings of PubMed abstracts. To address this issue, we proposed an ontological clustering method called GOClonto for conceptualizing PubMed abstracts. GOClonto uses latent semantic analysis (LSA) and gene ontology (GO) to identify key gene-related concepts and their relationships as well as allocate PubMed abstracts based on these key gene-related concepts. Based on two PubMed abstract collections, the experimental results show that GOClonto is able to identify key gene-related concepts and outperforms the STC (suffix tree clustering) algorithm, the Lingo algorithm, the Fuzzy Ants algorithm, and the clustering based TRS (tolerance rough set) algorithm. Moreover, the two ontologies generated by GOClonto show significant informative conceptual structures.
Key Working for Families with Young Disabled Children
Carter, Bernie; Thomas, Megan
2011-01-01
For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop). Data were collected from 43 participants (parents, key workers, and other stakeholders). All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals, and other stakeholders to explore what was working well with key working within an Early Support Pilot Programme. PMID:21994827
Weighing the Evidence: From Chaos to Consilience
ERIC Educational Resources Information Center
Brendtro, Larry K.; Mitchell, Martin L.
2010-01-01
A flood of contradictory publications claim widely different methods to be "evidence-based." What then are the key principles for success with challenging youth? Amidst all the confusion, how do we identify powerful universal truths? The answer lies in a "consilience," which involves drawing information from multiple fields of knowledge.…
Preventing Mother-to-Child HIV Transmission among South African Adolescents
ERIC Educational Resources Information Center
Varga, Christine; Brookes, Heather
2008-01-01
Although prevention of mother-to-child HIV transmission (PMTCT) programs are predicated on maternal behavior change, little is known about sociocultural factors affecting maternal-child care practices in this arena. The authors used narrative methods (key informant workshops, questionnaires, focus groups, and case study analysis) to explore how…
Teaching Ecological Concepts with Mud Dauber Nests.
ERIC Educational Resources Information Center
Matthews, Robert W.; Matthews, Janice R.
1999-01-01
Contends that mud dauber nests--which are widely available, safe, inexpensive, and easy to use--offer a novel and highly motivating way to teach ecological concepts to life science students at many grade levels. Presents background information for teachers, details classroom-tested methods for nest dissection, provides keys to nest contents, and…
Operating School Meal Programs in Rural Districts: Challenges and Solutions
ERIC Educational Resources Information Center
Hoffman, Vanessa; Srinivasan, Mithuna; Levin, Madeleine; Scarmo, Stephanie
2018-01-01
Purpose/Objectives: The goal of this study was to explore unique issues that rural school nutrition professionals face in operating successful school meal programs, and their strategies for overcoming those barriers. Methods: This study was conducted through 10 key informant interviews and three focus groups with rural school nutrition…
Developing Skills in Years 11 and 12 Secondary School Economics
ERIC Educational Resources Information Center
Stokes, Anthony; Wright, Sarah
2013-01-01
This paper explores different approaches for developing skills in economics in schools. It considers the different preferred learning styles of students through the VARK method and applies a contextual learning approach to engage students and develop skills. The key skills that are considered are literacy, numeracy, information and communication…
Watching what widlife want and need
Natasha Vizcarra; Mary Rowland; Christina Vojta
2016-01-01
National forests and grasslands are home to a diverse array of wildlife. To keep tabs on the general viability and wellbeing of these inhabitants, land managers need practical, defensible monitoring protocols. Population monitoring is one method. Another is habitat monitoring, which provides critical information about the quantity and quality of key habitat attributes...
Collaborative School-Based Obesity Interventions: Lessons Learned from 6 Southern Districts
ERIC Educational Resources Information Center
Jain, Anjali; Langwith, Casey
2013-01-01
Background: Although studies have shown that school-based obesity interventions can be effective, little is known about how to translate and implement programs into real-world school settings. Methods: Semistructured interviews were conducted in spring 2012 with 19 key informants who participated in a multifaceted childhood obesity intervention…
77 FR 60127 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-02
... improvement methods to address the obesity epidemic in communities across the country. A key part of that... program and policy interventions to address childhood obesity. The HWC is being implemented in two... obesity. Community team interviews will be conducted with the team coordinator, the quality improvement...
Predicting Student Engagement in Online High Schools
ERIC Educational Resources Information Center
Vieira, Christopher James
2013-01-01
The purpose of this study was to analyze student engagement in online high schools based on demographic information of high school students using a mixed methods research design. Key findings through a multiple regression analysis and Pearson correlation coefficient suggest that although the majority of participants in the study are highly engaged…
Online Learning and Social Exclusion.
ERIC Educational Resources Information Center
Clarke, Alan
Online learning covers a wide range of technologies and formal and informal learning methods. A key factor promoting the significant enthusiasm for online learning across all education and training sectors in Great Britain and elsewhere is its potential to overcome many of the barriers of place, pace, and time that socially and economically…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-28
... qualitative research with its key audiences--older people, caregivers, and health professionals. Methods will... issues from the National Institute on Aging (NIA). Type of Information Collection Request: New. Need and... about aging and advances in research on aging to the scientific community, health care providers, and...
Planning Adolescent Mental Health Promotion Programming in Saskatoon
ERIC Educational Resources Information Center
Cushon, Jennifer; Waldner, Cheryl; Scott, Christina; Neudorf, Cordell
2016-01-01
Background: We assessed associations between key demographic risk factors and the outcome of depressed mood in Saskatoon, Saskatchewan, to inform the planning and implementation of mental health promotion programming in schools. Methods: In the 2008/2009 school year, 3,958 students from grades 5 through 8 from 76 elementary schools completed…
Long term understanding of study information in research participants with Parkinson's disease.
Ravina, Bernard; Swearingen, Christopher; Elm, Jordan; Kamp, Cornelia; Kieburtz, Karl; Kim, Scott Y H
2010-01-01
Little is known about research participants' understanding of consent information over the course of a clinical study and the relationship of this information with participant behavior. We conducted a cross sectional patient completed questionnaire of comprehension and satisfaction administered at the end of a Parkinson's disease clinical trial. Scores on 9 comprehension items in a 30 item questionnaire covering the key elements of informed consent. 78% of eligible trial participants completed this substudy. Greater than 90% of respondents showed good comprehension of the study purpose, method of treatment assignment, experimental nature of drugs, voluntary participation, and expected effect of the trial on their PD. However, 42.3% of subjects incorrectly endorsed that participating in the study was part of the "usual treatment" for their PD. We found no relationship between comprehension, compliance, and satisfaction with whether or not one's own neurologist was also the study doctor. Years of education and cognitive function at baseline were correlated with comprehension of study information. Overall comprehension of key study information presented in the consent was high after 12 months of trial participation, although there were inconsistencies in responses that need further study.
Construction of Green Tide Monitoring System and Research on its Key Techniques
NASA Astrophysics Data System (ADS)
Xing, B.; Li, J.; Zhu, H.; Wei, P.; Zhao, Y.
2018-04-01
As a kind of marine natural disaster, Green Tide has been appearing every year along the Qingdao Coast, bringing great loss to this region, since the large-scale bloom in 2008. Therefore, it is of great value to obtain the real time dynamic information about green tide distribution. In this study, methods of optical remote sensing and microwave remote sensing are employed in Green Tide Monitoring Research. A specific remote sensing data processing flow and a green tide information extraction algorithm are designed, according to the optical and microwave data of different characteristics. In the aspect of green tide spatial distribution information extraction, an automatic extraction algorithm of green tide distribution boundaries is designed based on the principle of mathematical morphology dilation/erosion. And key issues in information extraction, including the division of green tide regions, the obtaining of basic distributions, the limitation of distribution boundary, and the elimination of islands, have been solved. The automatic generation of green tide distribution boundaries from the results of remote sensing information extraction is realized. Finally, a green tide monitoring system is built based on IDL/GIS secondary development in the integrated environment of RS and GIS, achieving the integration of RS monitoring and information extraction.
An unsupervised method for summarizing egocentric sport videos
NASA Astrophysics Data System (ADS)
Habibi Aghdam, Hamed; Jahani Heravi, Elnaz; Puig, Domenec
2015-12-01
People are getting more interested to record their sport activities using head-worn or hand-held cameras. This type of videos which is called egocentric sport videos has different motion and appearance patterns compared with life-logging videos. While a life-logging video can be defined in terms of well-defined human-object interactions, notwithstanding, it is not trivial to describe egocentric sport videos using well-defined activities. For this reason, summarizing egocentric sport videos based on human-object interaction might fail to produce meaningful results. In this paper, we propose an unsupervised method for summarizing egocentric videos by identifying the key-frames of the video. Our method utilizes both appearance and motion information and it automatically finds the number of the key-frames. Our blind user study on the new dataset collected from YouTube shows that in 93:5% cases, the users choose the proposed method as their first video summary choice. In addition, our method is within the top 2 choices of the users in 99% of studies.
2014-01-01
Background Given the global nursing shortage and investments to scale-up the workforce, this study evaluated trends in annual student nurse enrolment, pre-service attrition between enrolment and registration, and factors that influence nurse production in Kenya. Methods This study used a mixed methods approach with data from the Regulatory Human Resources Information System (tracks initial student enrolment through registration) and the Kenya Health Workforce Information System (tracks deployment and demographic information on licensed nurses) for the quantitative analyses and qualitative data from key informant interviews with nurse training institution educators and/or administrators. Trends in annual student nurse enrolment from 1999 to 2010 were analyzed using regulatory and demographic data. To assess pre-service attrition between training enrolment and registration with the nursing council, data for a cohort that enrolled in training from 1999 to 2004 and completed training by 2010 was analyzed. Multivariate logistic regression was used to test for factors that significantly affected attrition. To assess the capacity of nurse training institutions for scale-up, qualitative data was obtained through key informant interviews. Results From 1999 to 2010, 23,350 students enrolled in nurse training in Kenya. While annual new student enrolment doubled between 1999 (1,493) and 2010 (3,030), training institutions reported challenges in their capacity to accommodate the increased numbers. Key factors identified by the nursing faculty included congestion at clinical placement sites, limited clinical mentorship by qualified nurses, challenges with faculty recruitment and retention, and inadequate student housing, transportation and classroom space. Pre-service attrition among the cohort that enrolled between 1999 and 2004 and completed training by 2010 was found to be low (6%). Conclusion To scale-up the nursing workforce in Kenya, concurrent investments in expanding the number of student nurse clinical placement sites, utilizing alternate forms of skills training, hiring more faculty and clinical instructors, and expanding the dormitory and classroom space to accommodate new students are needed to ensure that increases in student enrolment are not at the cost of quality nursing education. Student attrition does not appear to be a concern in Kenya compared to other African countries (10 to 40%). PMID:25142037
Strachan, Clare; Wharton–Smith, Alexandra; Sinyangwe, Chomba; Mubiru, Denis; Ssekitooleko, James; Meier, Joslyn; Gbanya, Miatta; Tibenderana, James K.; Counihan, Helen
2014-01-01
Numerous studies highlight the effectiveness of an integrated approach for the management of malaria, pneumonia and diarrhoea at the community level. There has however been little study on lessons learnt from implementation in practice and stakeholder experiences which could inform future programmatic planning and evaluation frameworks. A participatory, qualitative evaluation was conducted in the three varied settings of South Sudan, Uganda and Zambia, which have seen the scale up of integrated community case management (iCCM) over the last five years. All key in–country stakeholders were consulted on study design, with a particular focus on scope and methodology. Data collection methods included stakeholder consultations (key informant interviews, focus group discussions), and a review of project and Ministry of Health documentation. Data analysis followed the Framework Approach. Results suggest that iCCM implementation generally followed national pre–agreed guidelines. Overarching key programmatic recommendations included: collaboration with implementing partners in planning stages to positively impact on community acceptance and ownership; adoption of participatory training methods adapted to low literacy populations; development of alternative support supervision methods such as peer support groups; full integration of community level data into the health management information system and emphasizing data analysis, use and feedback at all levels; strengthened supply chains through improved quantification and procurement of commodities in conjunction with the national distribution network; community engagement to establish a support system for community health workers to increase their motivation; enhanced sensitisation and behaviour change communication to raise awareness and usage of appropriate health services; and advocacy at the national level for funding and logistical support for the continuation and integration of iCCM. This qualitative study is a valuable contribution in understanding the ‘hows’ of iCCM implementation with key insights for improved feasibility and acceptability. Main findings show how community support to iCCM and community health workers is necessary for sustained health benefits coupled with a focus on strengthening and ‘enabling’ the public health system. The participatory study design and methodologies used enabled the scope of the research enquiry to effectively capture various stakeholder perspectives. PMID:25520794
NASA Astrophysics Data System (ADS)
Li, Na; Zhang, Yu; Wen, Shuang; Li, Lei-lei; Li, Jian
2018-01-01
Noise is a problem that communication channels cannot avoid. It is, thus, beneficial to analyze the security of MDI-QKD in noisy environment. An analysis model for collective-rotation noise is introduced, and the information theory methods are used to analyze the security of the protocol. The maximum amount of information that Eve can eavesdrop is 50%, and the eavesdropping can always be detected if the noise level ɛ ≤ 0.68. Therefore, MDI-QKD protocol is secure as quantum key distribution protocol. The maximum probability that the relay outputs successful results is 16% when existing eavesdropping. Moreover, the probability that the relay outputs successful results when existing eavesdropping is higher than the situation without eavesdropping. The paper validates that MDI-QKD protocol has better robustness.
Addressing underutilization of consumer health information resource centers: a formative study*
Kennedy, May G.; Kiken, Laura; Shipman, Jean P.
2008-01-01
Problem: Four consumer health information centers in Richmond, Virginia, provide one-on-one assistance in accessing health information. Because they may not be fully utilized at present, an exploratory marketing study of factors affecting usage of the centers was conducted. Method: Observers counted center passers-by and tracked their paths. Also, brief intercept interviews were conducted with people who had just used a center, people nearby who could have used one but did not, and people on the street. Finally, in-depth individual interviews were conducted with key informants. Results: There was a high degree of satisfaction with the centers among users. Nonusers universally endorsed the center concept. However, most passers-by did not even glance at the centers, and intercept interviewees suggested better signage and promoting the resource centers through various media channels. Key informants added suggestions about interpersonal strategies (e.g., physician referrals) for center usage promotion but cautioned that a large increase in traffic could not be accommodated without increasing staff size or shifting from a model of individualized service. Conclusions: Triangulating findings from multiple data collection methods can provide useful guidance for efforts to promote center utilization. At minimum, steps should be taken to make the largest centers more noticeable. Because center utilization is not only associated with consumer satisfaction with hospitals, but may also foster health literacy, both hospital-based and community-based usage promotion strategies may be warranted. All such promotional strategies should be audience-tested before they are adopted. PMID:18219380
NASA Astrophysics Data System (ADS)
Okawa, Tsutomu; Kaminishi, Tsukasa; Hirabayashi, Syuichi; Suzuki, Ryo; Mitsui, Hiroyasu; Koizumi, Hisao
The business in the enterprise is closely related with the information system to such an extent that the business activities are difficult without the information system. The system design technique that considers the business process well, and that enables a quick system development is requested. In addition, the demand for the development cost is also severe than before. To cope with the current situation, the modeling technology named BPM(Business Process Management/Modeling)is drawing attention and becoming important as a key technology. BPM is a technology to model business activities as business processes and visualize them to improve the business efficiency. However, a general methodology to develop the information system using the analysis result of BPM doesn't exist, and a few development cases are reported. This paper proposes an information system development method combining business process modeling with executable modeling. In this paper we describe a guideline to support consistency of development and development efficiency and the framework enabling to develop the information system from model. We have prototyped the information system with the proposed method and our experience has shown that the methodology is valuable.
A Novel Multiple-Access Correlation-Delay-Shift-Keying
NASA Astrophysics Data System (ADS)
Duan, J. Y.; Jiang, G. P.; Yang, H.
In Correlation-Delay-Shift-Keying (CDSK), the reference signal and the information-bearing signal are added together during a certain time delay. Because the reference signal is not strictly orthogonal to the information-bearing signal, the cross-correlation between the adjacent chaotic signal (Intra-signal Interference, ISI) will be introduced into the demodulation at the receiver. Therefore, the Bit-Error Ratio (BER) of CDSK is higher than that of Differential-Chaos-Shift-Keying (DCSK). To avoid the ISI component and enhance the BER performance of CDSK in multiuser scenario, Multiple-Access CDSK with No Intra-signal Interference (MA-CDSK-NII) is proposed. By constructing the repeated chaotic generator and applying the Walsh code sequence to modulate the reference signal, in MA-CDSK-NII, the ISI component will be eliminated during the demodulation. Gaussian approximation method is adopted here to obtain the exact performance analysis of MA-CDSK-NII over additive white Gaussian noise (AWGN) channel and Rayleigh multipath fading channels. Results show that, due to no ISI component and lower transmitting power, the BER performance of MA-CDSK-NII can be better than that of multiple-access CDSK and Code-Shifted Differential-Chaos-Shift-Keying (CS-DCSK).
J2ME implementation of system for storing and accessing of sensitive data on patient's mobile device
NASA Astrophysics Data System (ADS)
Zabołotny, Wojciech M.; Wielgórski, Radosław; Nowik, Marcin
2011-10-01
This paper presents a system allowing to use a patient's mobile phone or PDA for storing of biomedical data, which then, during medical consultation or intervention may be used by the medical staff. The presented solution is aimed on providing both: reliable protection to sensitive patient's data, and easy access to information for authorized medical staff. In the presented system, data are stored in an encrypted form, and the encryption key is available only for authorized persons. The central authentication server verifies the current access rights of the person trying to obtain the information, before providing him or her with the key needed to access the patient's data. The key provided by the server is valid only for the particular device, which minimizes the risk of its misuse. For rare situations when no connection to the authentication server is available (e.g. intervention in the mountains or rural area), system assures an additional "emergency" method to access the encryption key in controlled, registered way. The system has been implemented in Java language and tested in the simulated environment provided by Sun Java Wireless Toolkit for CLDC.
Wang, Lu; Xu, Lisheng; Feng, Shuting; Meng, Max Q-H; Wang, Kuanquan
2013-11-01
Analysis of pulse waveform is a low cost, non-invasive method for obtaining vital information related to the conditions of the cardiovascular system. In recent years, different Pulse Decomposition Analysis (PDA) methods have been applied to disclose the pathological mechanisms of the pulse waveform. All these methods decompose single-period pulse waveform into a constant number (such as 3, 4 or 5) of individual waves. Furthermore, those methods do not pay much attention to the estimation error of the key points in the pulse waveform. The estimation of human vascular conditions depends on the key points' positions of pulse wave. In this paper, we propose a Multi-Gaussian (MG) model to fit real pulse waveforms using an adaptive number (4 or 5 in our study) of Gaussian waves. The unknown parameters in the MG model are estimated by the Weighted Least Squares (WLS) method and the optimized weight values corresponding to different sampling points are selected by using the Multi-Criteria Decision Making (MCDM) method. Performance of the MG model and the WLS method has been evaluated by fitting 150 real pulse waveforms of five different types. The resulting Normalized Root Mean Square Error (NRMSE) was less than 2.0% and the estimation accuracy for the key points was satisfactory, demonstrating that our proposed method is effective in compressing, synthesizing and analyzing pulse waveforms. Copyright © 2013 Elsevier Ltd. All rights reserved.
Desale, Adino; Taye, Bineyam; Belay, Getachew; Nigatu, Alemayehu
2013-01-01
Introduction Logistics management information system for health commodities remained poorly implemented in most of developing countries. To assess the status of laboratory logistics management information system for HIV/AIDS and tuberculosis laboratory commodities in public health facilities in Addis Ababa. Methods A cross-sectional descriptive study was conducted from September 2010-January 2011 at selected public health facilities. A stratified random sampling method was used to include a total of 43 facilities which, were investigated through quantitative methods using structured questionnaires interviews. Focus group discussion with the designated supply chain managers and key informant interviews were conducted for the qualitative method. Results There exists a well-designed logistics system for laboratory commodities with trained pharmacy personnel, distributed standard LMIS formats and established inventory control procedures. However, majority of laboratory professionals were not trained in LMIS. Majority of the facilities (60.5%) were stocked out for at least one ART monitoring and TB laboratory reagents and the highest stock out rate was for chemistry reagents. Expired ART monitoring laboratory commodities were found in 25 (73.5%) of facilities. Fifty percent (50%) of the assessed hospitals and 54% of health centers were currently using stock/bin cards for all HIV/AIDS and TB laboratory commodities in main pharmacy store, among these only 25% and 20.8% of them were updated with accurate information matching with the physical count done at the time of visit for hospitals and health centers respectively. Conclusion Even though there exists a well designed laboratory LMIS, keeping quality stock/bin cards and LMIS reports were very low. Key ART monitoring laboratory commodities were stock out at many facilities at the day of visit and during the past six months. Based on findings, training of laboratory personnel's managing laboratory commodities and keeping accurate inventory control procedures were recommended. PMID:24106574
Dwairy, Mai N.; Kendall, Nicholas
2002-01-01
Objectives: The objective is to study how the staff who purchase health care services for a large national government accident-compensation system seek information on treatment effectiveness, how they assess the quality of that information, whether they question the information sources they choose, and how familiar they are with the key concepts of evidence-based health care (EBHC). Method: Staff (22 out of 34) of the health purchasing division of the New Zealand Accident Compensation Corporation (NZ ACC) were interviewed using eight preformatted questions to which they could provide open and multiple answers. Responses were subsequently codified into typologies for quantitative analysis. Results: Most respondents report that they assess the effectiveness of a treatment by accessing published information (nonhuman sources), by consulting others (human sources), or by both means. They assess the quality of information mostly by consulting others, and the second-highest proportion of responses state that they do not know how to evaluate the quality of information. No clear preference emerges with respect to the types of information needed to determine the effectiveness of treatments. The majority of the staff believes they can access information needed to determine treatment effectiveness through the Internet or information databases such as MEDLINE. Although most said they understand the key concepts of EBHC, only five out of twenty-two were able to accurately describe them. Conclusions: The findings suggest that there is a low level of awareness among the staff of the NZ ACC regarding the use of evidence and understanding of the key concepts of EBHC. Many surveyed staff members lack the skills or training to directly question information about effectiveness of a treatment. They have little idea of the information required to determine the effectiveness of a treatment, and the majority appears to lack the skills to evaluate the health care literature. PMID:11999181
A quantitative metric to identify critical elements within seafood supply networks.
Plagányi, Éva E; van Putten, Ingrid; Thébaud, Olivier; Hobday, Alistair J; Innes, James; Lim-Camacho, Lilly; Norman-López, Ana; Bustamante, Rodrigo H; Farmery, Anna; Fleming, Aysha; Frusher, Stewart; Green, Bridget; Hoshino, Eriko; Jennings, Sarah; Pecl, Gretta; Pascoe, Sean; Schrobback, Peggy; Thomas, Linda
2014-01-01
A theoretical basis is required for comparing key features and critical elements in wild fisheries and aquaculture supply chains under a changing climate. Here we develop a new quantitative metric that is analogous to indices used to analyse food-webs and identify key species. The Supply Chain Index (SCI) identifies critical elements as those elements with large throughput rates, as well as greater connectivity. The sum of the scores for a supply chain provides a single metric that roughly captures both the resilience and connectedness of a supply chain. Standardised scores can facilitate cross-comparisons both under current conditions as well as under a changing climate. Identification of key elements along the supply chain may assist in informing adaptation strategies to reduce anticipated future risks posed by climate change. The SCI also provides information on the relative stability of different supply chains based on whether there is a fairly even spread in the individual scores of the top few key elements, compared with a more critical dependence on a few key individual supply chain elements. We use as a case study the Australian southern rock lobster Jasus edwardsii fishery, which is challenged by a number of climate change drivers such as impacts on recruitment and growth due to changes in large-scale and local oceanographic features. The SCI identifies airports, processors and Chinese consumers as the key elements in the lobster supply chain that merit attention to enhance stability and potentially enable growth. We also apply the index to an additional four real-world Australian commercial fishery and two aquaculture industry supply chains to highlight the utility of a systematic method for describing supply chains. Overall, our simple methodological approach to empirically-based supply chain research provides an objective method for comparing the resilience of supply chains and highlighting components that may be critical.
A Quantitative Metric to Identify Critical Elements within Seafood Supply Networks
Plagányi, Éva E.; van Putten, Ingrid; Thébaud, Olivier; Hobday, Alistair J.; Innes, James; Lim-Camacho, Lilly; Norman-López, Ana; Bustamante, Rodrigo H.; Farmery, Anna; Fleming, Aysha; Frusher, Stewart; Green, Bridget; Hoshino, Eriko; Jennings, Sarah; Pecl, Gretta; Pascoe, Sean; Schrobback, Peggy; Thomas, Linda
2014-01-01
A theoretical basis is required for comparing key features and critical elements in wild fisheries and aquaculture supply chains under a changing climate. Here we develop a new quantitative metric that is analogous to indices used to analyse food-webs and identify key species. The Supply Chain Index (SCI) identifies critical elements as those elements with large throughput rates, as well as greater connectivity. The sum of the scores for a supply chain provides a single metric that roughly captures both the resilience and connectedness of a supply chain. Standardised scores can facilitate cross-comparisons both under current conditions as well as under a changing climate. Identification of key elements along the supply chain may assist in informing adaptation strategies to reduce anticipated future risks posed by climate change. The SCI also provides information on the relative stability of different supply chains based on whether there is a fairly even spread in the individual scores of the top few key elements, compared with a more critical dependence on a few key individual supply chain elements. We use as a case study the Australian southern rock lobster Jasus edwardsii fishery, which is challenged by a number of climate change drivers such as impacts on recruitment and growth due to changes in large-scale and local oceanographic features. The SCI identifies airports, processors and Chinese consumers as the key elements in the lobster supply chain that merit attention to enhance stability and potentially enable growth. We also apply the index to an additional four real-world Australian commercial fishery and two aquaculture industry supply chains to highlight the utility of a systematic method for describing supply chains. Overall, our simple methodological approach to empirically-based supply chain research provides an objective method for comparing the resilience of supply chains and highlighting components that may be critical. PMID:24633147
Reynolds, Heidi W; Atuahene, Kyeremeh; Sutherland, Elizabeth; Amenyah, Richard; Kwao, Isaiah Doe; Larbi, Emmanuel Tettey
2015-01-01
Objective Just as HIV prevention programs need to be tailored to the local epidemic, so should evaluations be country-owned and country-led to ensure use of those results in decision making and policy. The objective of this paper is to describe the process undertaken in Ghana to develop a national evaluation plan for the Ghana national strategy for key populations. Methods This was a participatory process that involved meetings between the Ghana AIDS Commission (GAC), other partners in Ghana working to prevent HIV among key populations, and MEASURE Evaluation. The process included three two-day, highly structured yet participatory meetings over the course of 12 months during which participants shared information about on-going and planned data and identified research questions and methods. Results An evaluation plan was prepared to inform stakeholders about which data collection activities need to be prioritized for funding, who would implement the study, the timing of data collection, the research question the data will help answer, and the analysis methods. The plan discusses various methods that can be used including the recommendation for the study design using multiple data sources. It has an evaluation conceptual model, proposed analyses, proposed definition of independent variables, estimated costs for filling data gaps, roles and responsibilities of stakeholders to carry out the plan, and considerations for ethics, data sharing and authorship. Conclusion The experience demonstrates that it is possible to design an evaluation responsive to national strategies and priorities with country leadership, regardless of stakeholders' experiences with evaluations. This process may be replicable elsewhere, where stakeholders want to plan and implement an evaluation of a large-scale program at the national or subnational level that is responsive to national priorities and part of a comprehensive monitoring and evaluation system. PMID:26120495
Medagama, Arjuna Bandara; Widanapahirana, Heshan; Prasanga, Tharindu
2015-01-01
Aims: There is an increase of over-the-counter (OTC) herbal products for use in diabetes mellitus. The aim of this study is to evaluate the safety information provided with OTC herbal remedies intended for diabetic patients in Sri Lanka and to assess the completeness of the information provided. Methods: Inclusion criteria consisted of OTC herbal remedies meant for use in diabetes. They were bought from local Sri Lankan supermarkets and non-ayurvedic pharmacies and product information regarding the risk of hypoglycemia, precautions for use, adverse events, dose, and interactions were assessed using a scoring system. The accuracy of the information was then compared against published data. Results: 11 products fulfilled the inclusion criteria. Five products contained a single constituent and five contained more than one. None had complete and accurate safety information according to our criteria. None specifically warned against the risk of hypoglycemia. 9 out of 11 products (81.8%) carried ≤3 items of the five essential factual information we expected. Hypoglycemic coma, gastrointestinal symptoms, hepatotoxicity, carcinogenesis, and interactions causing elevated drug levels of Carbamazepine were some of the safety information that was missing. Conclusions: Key safety information was absent in most products. Regulation of sale, provision of key safety information and adverse event reporting should be a priority. PMID:26649230
The Key Roles in the Informal Organization: A Network Analysis Perspective
ERIC Educational Resources Information Center
de Toni, Alberto F.; Nonino, Fabio
2010-01-01
Purpose: The purpose of this paper is to identify the key roles embedded in the informal organizational structure (informal networks) and to outline their contribution in the companies' performance. A major objective of the research is to find and characterize a new key informal role that synthesises problem solving, expertise, and accessibility…
Leontaridou, Maria; Gabbert, Silke; Van Ierland, Ekko C; Worth, Andrew P; Landsiedel, Robert
2016-07-01
This paper offers a Bayesian Value-of-Information (VOI) analysis for guiding the development of non-animal testing strategies, balancing information gains from testing with the expected social gains and costs from the adoption of regulatory decisions. Testing is assumed to have value, if, and only if, the information revealed from testing triggers a welfare-improving decision on the use (or non-use) of a substance. As an illustration, our VOI model is applied to a set of five individual non-animal prediction methods used for skin sensitisation hazard assessment, seven battery combinations of these methods, and 236 sequential 2-test and 3-test strategies. Their expected values are quantified and compared to the expected value of the local lymph node assay (LLNA) as the animal method. We find that battery and sequential combinations of non-animal prediction methods reveal a significantly higher expected value than the LLNA. This holds for the entire range of prior beliefs. Furthermore, our results illustrate that the testing strategy with the highest expected value does not necessarily have to follow the order of key events in the sensitisation adverse outcome pathway (AOP). 2016 FRAME.
Use of historical control data for assessing treatment effects in clinical trials.
Viele, Kert; Berry, Scott; Neuenschwander, Beat; Amzal, Billy; Chen, Fang; Enas, Nathan; Hobbs, Brian; Ibrahim, Joseph G; Kinnersley, Nelson; Lindborg, Stacy; Micallef, Sandrine; Roychoudhury, Satrajit; Thompson, Laura
2014-01-01
Clinical trials rarely, if ever, occur in a vacuum. Generally, large amounts of clinical data are available prior to the start of a study, particularly on the current study's control arm. There is obvious appeal in using (i.e., 'borrowing') this information. With historical data providing information on the control arm, more trial resources can be devoted to the novel treatment while retaining accurate estimates of the current control arm parameters. This can result in more accurate point estimates, increased power, and reduced type I error in clinical trials, provided the historical information is sufficiently similar to the current control data. If this assumption of similarity is not satisfied, however, one can acquire increased mean square error of point estimates due to bias and either reduced power or increased type I error depending on the direction of the bias. In this manuscript, we review several methods for historical borrowing, illustrating how key parameters in each method affect borrowing behavior, and then, we compare these methods on the basis of mean square error, power and type I error. We emphasize two main themes. First, we discuss the idea of 'dynamic' (versus 'static') borrowing. Second, we emphasize the decision process involved in determining whether or not to include historical borrowing in terms of the perceived likelihood that the current control arm is sufficiently similar to the historical data. Our goal is to provide a clear review of the key issues involved in historical borrowing and provide a comparison of several methods useful for practitioners. Copyright © 2013 John Wiley & Sons, Ltd.
Use of historical control data for assessing treatment effects in clinical trials
Viele, Kert; Berry, Scott; Neuenschwander, Beat; Amzal, Billy; Chen, Fang; Enas, Nathan; Hobbs, Brian; Ibrahim, Joseph G.; Kinnersley, Nelson; Lindborg, Stacy; Micallef, Sandrine; Roychoudhury, Satrajit; Thompson, Laura
2014-01-01
Clinical trials rarely, if ever, occur in a vacuum. Generally, large amounts of clinical data are available prior to the start of a study, particularly on the current study’s control arm. There is obvious appeal in using (i.e., ‘borrowing’) this information. With historical data providing information on the control arm, more trial resources can be devoted to the novel treatment while retaining accurate estimates of the current control arm parameters. This can result in more accurate point estimates, increased power, and reduced type I error in clinical trials, provided the historical information is sufficiently similar to the current control data. If this assumption of similarity is not satisfied, however, one can acquire increased mean square error of point estimates due to bias and either reduced power or increased type I error depending on the direction of the bias. In this manuscript, we review several methods for historical borrowing, illustrating how key parameters in each method affect borrowing behavior, and then, we compare these methods on the basis of mean square error, power and type I error. We emphasize two main themes. First, we discuss the idea of ‘dynamic’ (versus ‘static’) borrowing. Second, we emphasize the decision process involved in determining whether or not to include historical borrowing in terms of the perceived likelihood that the current control arm is sufficiently similar to the historical data. Our goal is to provide a clear review of the key issues involved in historical borrowing and provide a comparison of several methods useful for practitioners. PMID:23913901
NASA Astrophysics Data System (ADS)
Shi, Aiye; Wang, Chao; Shen, Shaohong; Huang, Fengchen; Ma, Zhenli
2016-10-01
Chi-squared transform (CST), as a statistical method, can describe the difference degree between vectors. The CST-based methods operate directly on information stored in the difference image and are simple and effective methods for detecting changes in remotely sensed images that have been registered and aligned. However, the technique does not take spatial information into consideration, which leads to much noise in the result of change detection. An improved unsupervised change detection method is proposed based on spatial constraint CST (SCCST) in combination with a Markov random field (MRF) model. First, the mean and variance matrix of the difference image of bitemporal images are estimated by an iterative trimming method. In each iteration, spatial information is injected to reduce scattered changed points (also known as "salt and pepper" noise). To determine the key parameter confidence level in the SCCST method, a pseudotraining dataset is constructed to estimate the optimal value. Then, the result of SCCST, as an initial solution of change detection, is further improved by the MRF model. The experiments on simulated and real multitemporal and multispectral images indicate that the proposed method performs well in comprehensive indices compared with other methods.
An innovative approach to capability-based emergency operations planning
Keim, Mark E
2013-01-01
This paper describes the innovative use information technology for assisting disaster planners with an easily-accessible method for writing and improving evidence-based emergency operations plans. This process is used to identify all key objectives of the emergency response according to capabilities of the institution, community or society. The approach then uses a standardized, objective-based format, along with a consensus-based method for drafting capability-based operational-level plans. This information is then integrated within a relational database to allow for ease of access and enhanced functionality to search, sort and filter and emergency operations plan according to user need and technological capacity. This integrated approach is offered as an effective option for integrating best practices of planning with the efficiency, scalability and flexibility of modern information and communication technology. PMID:28228987
An innovative approach to capability-based emergency operations planning.
Keim, Mark E
2013-01-01
This paper describes the innovative use information technology for assisting disaster planners with an easily-accessible method for writing and improving evidence-based emergency operations plans. This process is used to identify all key objectives of the emergency response according to capabilities of the institution, community or society. The approach then uses a standardized, objective-based format, along with a consensus-based method for drafting capability-based operational-level plans. This information is then integrated within a relational database to allow for ease of access and enhanced functionality to search, sort and filter and emergency operations plan according to user need and technological capacity. This integrated approach is offered as an effective option for integrating best practices of planning with the efficiency, scalability and flexibility of modern information and communication technology.
A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.
Ali, Aftab; Khan, Farrukh Aslam
2014-05-01
Information and communication technologies have thrived over the last few years. Healthcare systems have also benefited from this progression. A wireless body area network (WBAN) consists of small, low-power sensors used to monitor human physiological values remotely, which enables physicians to remotely monitor the health of patients. Communication security in WBANs is essential because it involves human physiological data. Key agreement and authentication are the primary issues in the security of WBANs. To agree upon a common key, the nodes exchange information with each other using wireless communication. This information exchange process must be secure enough or the information exchange should be minimized to a certain level so that if information leak occurs, it does not affect the overall system. Most of the existing solutions for this problem exchange too much information for the sake of key agreement; getting this information is sufficient for an attacker to reproduce the key. Set reconciliation is a technique used to reconcile two similar sets held by two different hosts with minimal communication complexity. This paper presents a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The proposed scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from the electrocardiogram (EKG) feature set of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Because of the limited information exchange, if an attacker gets the information in any way, he/she will not be able to reproduce the key. The proposed scheme mitigates replay, selective forwarding, and denial of service attacks using a challenge-response authentication mechanism. The simulation results show that the proposed scheme has a great deal of adoptability in terms of security, communication overhead, and running time complexity, as compared to the existing EKG-based key agreement scheme.
Kananura, Rornald Muhumuza; Ekirapa-Kiracho, Elizabeth; Paina, Ligia; Bumba, Ahmed; Mulekwa, Godfrey; Nakiganda-Busiku, Dinah; Oo, Htet Nay Lin; Kiwanuka, Suzanne Namusoke; George, Asha; Peters, David H
2017-12-28
The use of participatory monitoring and evaluation (M&E) approaches is important for guiding local decision-making, promoting the implementation of effective interventions and addressing emerging issues in the course of implementation. In this article, we explore how participatory M&E approaches helped to identify key design and implementation issues and how they influenced stakeholders' decision-making in eastern Uganda. The data for this paper is drawn from a retrospective reflection of various M&E approaches used in a maternal and newborn health project that was implemented in three districts in eastern Uganda. The methods included qualitative and quantitative M&E techniques such as key informant interviews, formal surveys and supportive supervision, as well as participatory approaches, notably participatory impact pathway analysis. At the design stage, the M&E approaches were useful for identifying key local problems and feasible local solutions and informing the activities that were subsequently implemented. During the implementation phase, the M&E approaches provided evidence that informed decision-making and helped identify emerging issues, such as weak implementation by some village health teams, health facility constraints such as poor use of standard guidelines, lack of placenta disposal pits, inadequate fuel for the ambulance at some facilities, and poor care for low birth weight infants. Sharing this information with key stakeholders prompted them to take appropriate actions. For example, the sub-county leadership constructed placenta disposal pits, the district health officer provided fuel for ambulances, and health workers received refresher training and mentorship on how to care for newborns. Diverse sources of information and perspectives can help researchers and decision-makers understand and adapt evidence to contexts for more effective interventions. Supporting districts to have crosscutting, routine information generating and sharing platforms that bring together stakeholders from different sectors is therefore crucial for the successful implementation of complex development interventions.
Information filtering via a scaling-based function.
Qiu, Tian; Zhang, Zi-Ke; Chen, Guang
2013-01-01
Finding a universal description of the algorithm optimization is one of the key challenges in personalized recommendation. In this article, for the first time, we introduce a scaling-based algorithm (SCL) independent of recommendation list length based on a hybrid algorithm of heat conduction and mass diffusion, by finding out the scaling function for the tunable parameter and object average degree. The optimal value of the tunable parameter can be abstracted from the scaling function, which is heterogeneous for the individual object. Experimental results obtained from three real datasets, Netflix, MovieLens and RYM, show that the SCL is highly accurate in recommendation. More importantly, compared with a number of excellent algorithms, including the mass diffusion method, the original hybrid method, and even an improved version of the hybrid method, the SCL algorithm remarkably promotes the personalized recommendation in three other aspects: solving the accuracy-diversity dilemma, presenting a high novelty, and solving the key challenge of cold start problem.
Qualitative analysis of the dynamics of policy design and implementation in hospital funding reform
Brown, Adalsteinn D.; Evans, Jenna M.; Marani, Husayn; Russell, Kirstie K.; Martin, Danielle; Ivers, Noah M.
2018-01-01
Background As in many health care systems, some Canadian jurisdictions have begun shifting away from global hospital budgets. Payment for episodes of care has begun to be implemented. Starting in 2012, the Province of Ontario implemented hospital funding reforms comprising three elements: Global Budgets; Health Based Allocation Method (HBAM); and Quality-Based Procedures (QBP). This evaluation focuses on implementation of QBPs, a procedure/diagnosis-specific funding approach involving a pre-set price per episode of care coupled with best practice clinical pathways. We examined whether or not there was consensus in understanding of the program theory underpinning QBPs and how this may have influenced full and effective implementation of this innovative funding model. Methods We undertook a formative evaluation of QBP implementation. We used an embedded case study method and in-depth, one-on-one, semi-structured, telephone interviews with key informants at three levels of the health care system: Designers (those who designed the QBP policy); Adoption Supporters (organizations and individuals supporting adoption of QBPs); and Hospital Implementers (those responsible for QBP implementation in hospitals). Thematic analysis involved an inductive approach, incorporating Framework analysis to generate descriptive and explanatory themes that emerged from the data. Results Five main findings emerged from our research: (1) Unbeknownst to most key informants, there was neither consistency nor clarity over time among QBP designers in their understanding of the original goal(s) for hospital funding reform; (2) Prior to implementation, the intended hospital funding mechanism transitioned from ABF to QBPs, but most key informants were either unaware of the transition or believe it was intentional; (3) Perception of the primary goal(s) of the policy reform continues to vary within and across all levels of key informants; (4) Four years into implementation, the QBP funding mechanism remains misunderstood; and (5) Ongoing differences in understanding of QBP goals and funding mechanism have created challenges with implementation and difficulties in measuring success. Conclusions Policy drift and policy layering affected both the goal and the mechanism of action of hospital funding reform. Lack of early specification in both policy goals and hospital funding mechanism exposed the reform to reactive changes that did not reflect initial intentions. Several challenges further exacerbated implementation of complex hospital funding reforms, including a prolonged implementation schedule, turnover of key staff, and inconsistent messaging over time. These factors altered the trajectory of the hospital funding reforms and created confusion amongst those responsible for implementation. Enacting changes to hospital funding policy through a process that is transparent, collaborative, and intentional may increase the likelihood of achieving intended effects. PMID:29373587
ERIC Educational Resources Information Center
Matarrita-Cascante, David
2010-01-01
The relationship between a community's services and conditions, satisfaction, and overall quality of life were examined in this study. As these relationships respond to specific contextual and cultural settings, qualitative methods were used to account for their complexity and depth. Key informant interviews were conducted in two rural communities…
Magnesium Object Manager Sandbox, A More Effective Sandbox Method for Windows 7
2012-03-01
keys, synchronization primitives , etc.). The object body is specific to, and the same for, each object type; it contains information common to each...the Object Directory Specific Rights Synchronization Object (Event, Mutex, Semaphore , Timer) Synchronization objects allow multiple threads to... Synchronization Object Specific Rights . . . . . . . . . . . . . . . . . . . . . 19 2.5 File Object Specific Rights
Management Guide for the black spruce type in the Lake States.
William F. Johnston
1971-01-01
Summarizes information on: (1) soil-site relations; (2) associated vegetation; (3) methods and requirements for reproduction; (4) stand development; (5) yield and 10-year net growth; (6) damaging agents. A key to recommended management practices is given for pulpwood and Christmas tree stands, and requirements for successful broadcast burning are included.
Towards a Reframing of Student Support: A Case Study Approach
ERIC Educational Resources Information Center
Roberts, Pamela Anne; Dunworth, Katie; Boldy, Duncan
2018-01-01
This paper reports on a study that investigated the range of institutional support needs of international students at one Australian university with a view to increasing understanding of their needs and the ways in which support was provided. The study involved a number of data collection methods including focus groups, key informant interviews…
Time Is Precious: Variable- and Event-Centred Approaches to Process Analysis in CSCL Research
ERIC Educational Resources Information Center
Reimann, Peter
2009-01-01
Although temporality is a key characteristic of the core concepts of CSCL--interaction, communication, learning, knowledge building, technology use--and although CSCL researchers have privileged access to process data, the theoretical constructs and methods employed in research practice frequently neglect to make full use of information relating…
Children and ICT European Initiatives and Policies on Protecting Children Online
ERIC Educational Resources Information Center
Wojniak, Justyna; Majorek, Marta
2016-01-01
The paper concerns the opportunities of use information and communication technologies for the education purposes. It presents key assumptions of the European Union policy concerning innovative methods of training and the prospects for their further development. As nowadays one can observe increasing activity of the children and young people in…
ERIC Educational Resources Information Center
Nodulman, Jessica A.; Starling, Randall; Kong, Alberta S.; Buller, David B.; Wheeler, Cosette M.; Woodall, W. Gill
2015-01-01
Background: In several countries worldwide, school-based human papillomavirus (HPV) vaccination programs have been successful; however, little research has explored US stakeholders' acceptance toward school-based HPV vaccination programs. Methods: A total of 13 focus groups and 12 key informant interviews (N?=?117; 85% females; 66% racial/ethnic…
Family Involvement in Creative Teaching Practices for All in Small Rural Schools
ERIC Educational Resources Information Center
Vigo Arrazola, Begoña; Soriano Bozalongo, Juana
2015-01-01
Parental involvement is interpreted as a key form of support that can contribute to the establishment of inclusive practices in schools, but this can be difficult in sparsely populated areas. Using ethnographic methods of participant observation, informal conversations and document analysis, this article therefore focuses on family involvement…
Ballew, Paula; Castro, Sarah; Claus, Julie; Kittur, Nupur; Brennan, Laura; Brownson, Ross C.
2013-01-01
During a time when governmental funding, resources and staff are decreasing and travel restrictions are increasing, attention to efficient methods of public health workforce training is essential. A literature review was conducted to inform the development and delivery of web-based trainings for public health practitioners. Literature was gathered and summarized from five disciplines: Information Technology, Health, Education, Business and Communications, following five research themes: benefits, barriers, retention, promotion and evaluation. As a result, a total of 138 articles relevant to web-based training design and implementation were identified. Key recommendations emerged, including the need to conduct formative research and evaluation, provide clear design and layout, concise content, interactivity, technical support, marketing and promotion and incentives. We conclude that there is limited application of web-based training in public health. This review offers an opportunity to learn from other disciplines. Web-based training methods may prove to be a key training strategy for reaching our public health workforce in the environment of limited resources. PMID:22987862
Optimization in Cardiovascular Modeling
NASA Astrophysics Data System (ADS)
Marsden, Alison L.
2014-01-01
Fluid mechanics plays a key role in the development, progression, and treatment of cardiovascular disease. Advances in imaging methods and patient-specific modeling now reveal increasingly detailed information about blood flow patterns in health and disease. Building on these tools, there is now an opportunity to couple blood flow simulation with optimization algorithms to improve the design of surgeries and devices, incorporating more information about the flow physics in the design process to augment current medical knowledge. In doing so, a major challenge is the need for efficient optimization tools that are appropriate for unsteady fluid mechanics problems, particularly for the optimization of complex patient-specific models in the presence of uncertainty. This article reviews the state of the art in optimization tools for virtual surgery, device design, and model parameter identification in cardiovascular flow and mechanobiology applications. In particular, it reviews trade-offs between traditional gradient-based methods and derivative-free approaches, as well as the need to incorporate uncertainties. Key future challenges are outlined, which extend to the incorporation of biological response and the customization of surgeries and devices for individual patients.
Secure distribution for high resolution remote sensing images
NASA Astrophysics Data System (ADS)
Liu, Jin; Sun, Jing; Xu, Zheng Q.
2010-09-01
The use of remote sensing images collected by space platforms is becoming more and more widespread. The increasing value of space data and its use in critical scenarios call for adoption of proper security measures to protect these data against unauthorized access and fraudulent use. In this paper, based on the characteristics of remote sensing image data and application requirements on secure distribution, a secure distribution method is proposed, including users and regions classification, hierarchical control and keys generation, and multi-level encryption based on regions. The combination of the three parts can make that the same remote sensing images after multi-level encryption processing are distributed to different permission users through multicast, but different permission users can obtain different degree information after decryption through their own decryption keys. It well meets user access control and security needs in the process of high resolution remote sensing image distribution. The experimental results prove the effectiveness of the proposed method which is suitable for practical use in the secure transmission of remote sensing images including confidential information over internet.
Stefansson, Lilja S; Webb, M Elizabeth; Hebert, Luciana E; Masinter, Lisa; Gilliam, Melissa L
2018-03-01
Adolescents experience numerous barriers to obtaining sexual and reproductive health care (SRHC). Mobile Health Units (MHUs) can remove some barriers by traveling to the community. This pilot study developed Mobile SRHC through an iterative process on an existing MHU and evaluated it among adolescents and providers. Mobile SRHC was developed through a mixed-method, multiphase study. Three key informant interviews with MHU providers, an adolescent needs assessment survey, and a Youth Model Development Session informed model development. Emergency contraception (EC), oral contraceptive pills (OCPs), and depot-medroxyprogesterone acetate (DMPA) were sequentially incorporated into MHU services. Administrative data assessed method distribution and surveys assessed patient satisfaction. Key informants held positive attitudes toward implementing Mobile SRHC into their practice. Needs assessment surveys (N = 103) indicated a majority was interested in learning about sexual health (66.0%) and obtaining birth control (54.4%) on an MHU. Over 3 months, 123 adolescents participated in Mobile SRHC. Seven packs and 9 prescriptions of EC, 8 3-month packs and 10 prescriptions of OCPs, and 5 injections and 5 prescriptions of DMPA were distributed. Ninety-two percent of adolescent participants reported they would recommend Mobile SRHC to friends. Mobile SRHC is a feasible approach for reproductive health care among adolescents. © 2018, American School Health Association.
Jacobsen, Richard E.
2008-01-01
A key has been developed for identifying the pupal exuviae of 132 taxa of chironomid midges collected in Everglades National Park, as well as 18 additional species from freshwater habitats adjacent to the Park. Descriptions and illustrations are based upon voucher specimens from extensive collections of chironomid pupal exuviae for faunal surveys and biomonitoring research conducted in ENP and surrounding freshwater areas from 1998 to 2007. The key includes taxonomic comments for confirming identifications, as well as brief summaries of the distribution and ecology of each species in southern Florida waters. Information is also provided on the morphology of chironomid pupal exuviae, recommended references for identifying pupal exuviae, techniques for making slides, and methods to confirm proper identification.
Lazy collaborative filtering for data sets with missing values.
Ren, Yongli; Li, Gang; Zhang, Jun; Zhou, Wanlei
2013-12-01
As one of the biggest challenges in research on recommender systems, the data sparsity issue is mainly caused by the fact that users tend to rate a small proportion of items from the huge number of available items. This issue becomes even more problematic for the neighborhood-based collaborative filtering (CF) methods, as there are even lower numbers of ratings available in the neighborhood of the query item. In this paper, we aim to address the data sparsity issue in the context of neighborhood-based CF. For a given query (user, item), a set of key ratings is first identified by taking the historical information of both the user and the item into account. Then, an auto-adaptive imputation (AutAI) method is proposed to impute the missing values in the set of key ratings. We present a theoretical analysis to show that the proposed imputation method effectively improves the performance of the conventional neighborhood-based CF methods. The experimental results show that our new method of CF with AutAI outperforms six existing recommendation methods in terms of accuracy.
Information and communication technology developments in asthma management: a systematic review.
Duvvuri, Venkata Rama Satya Kumar; Jianhong, Wu
2007-04-01
This review aims to explain the progress of information and communication technology (ICT) applications in asthma management. Appropriate literature was printed out from the bibliographic databases and library source using relevant key phrases of ICT and asthma. The ICT developments from simple to complex modules to augment the conventional methods of asthma care with a caution of excessive reliance upon technology were discussed. However, it should be noted ICTs are for maximizing the human clinician's own ability to receive and process information as well as providing unique opportunities for patients, physicians, pharmacists and researchers.
Tools for Visualizing HIV in Cure Research.
Niessl, Julia; Baxter, Amy E; Kaufmann, Daniel E
2018-02-01
The long-lived HIV reservoir remains a major obstacle for an HIV cure. Current techniques to analyze this reservoir are generally population-based. We highlight recent developments in methods visualizing HIV, which offer a different, complementary view, and provide indispensable information for cure strategy development. Recent advances in fluorescence in situ hybridization techniques enabled key developments in reservoir visualization. Flow cytometric detection of HIV mRNAs, concurrently with proteins, provides a high-throughput approach to study the reservoir on a single-cell level. On a tissue level, key spatial information can be obtained detecting viral RNA and DNA in situ by fluorescence microscopy. At total-body level, advancements in non-invasive immuno-positron emission tomography (PET) detection of HIV proteins may allow an encompassing view of HIV reservoir sites. HIV imaging approaches provide important, complementary information regarding the size, phenotype, and localization of the HIV reservoir. Visualizing the reservoir may contribute to the design, assessment, and monitoring of HIV cure strategies in vitro and in vivo.
NASA Astrophysics Data System (ADS)
Lv, Zheng; Sui, Haigang; Zhang, Xilin; Huang, Xianfeng
2007-11-01
As one of the most important geo-spatial objects and military establishment, airport is always a key target in fields of transportation and military affairs. Therefore, automatic recognition and extraction of airport from remote sensing images is very important and urgent for updating of civil aviation and military application. In this paper, a new multi-source data fusion approach on automatic airport information extraction, updating and 3D modeling is addressed. Corresponding key technologies including feature extraction of airport information based on a modified Ostu algorithm, automatic change detection based on new parallel lines-based buffer detection algorithm, 3D modeling based on gradual elimination of non-building points algorithm, 3D change detecting between old airport model and LIDAR data, typical CAD models imported and so on are discussed in detail. At last, based on these technologies, we develop a prototype system and the results show our method can achieve good effects.
NASA Astrophysics Data System (ADS)
Jun, An Won
2006-01-01
We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.
2012-12-21
material data and other key information in a UIMA environment. In the course of this project, the tools and methods developed were used to extract and...Architecture ( UIMA ) library from the Apache Software Foundation. Using this architecture, a given document is run through several “annotators” to...material taxonomy developed for the XSB, Inc. Coherent View™ database. In order to integrate this technology into the Java-based UIMA annotation
[A research on real-time ventricular QRS classification methods for single-chip-microcomputers].
Peng, L; Yang, Z; Li, L; Chen, H; Chen, E; Lin, J
1997-05-01
Ventricular QRS classification is key technique of ventricular arrhythmias detection in single-chip-microcomputer based dynamic electrocardiogram real-time analyser. This paper adopts morphological feature vector including QRS amplitude, interval information to reveal QRS morphology. After studying the distribution of QRS morphology feature vector of MIT/BIH DB ventricular arrhythmia files, we use morphological feature vector cluster to classify multi-morphology QRS. Based on the method, morphological feature parameters changing method which is suitable to catch occasional ventricular arrhythmias is presented. Clinical experiments verify missed ventricular arrhythmia is less than 1% by this method.
Qin, Chao; Sun, Yongqi; Dong, Yadong
2017-01-01
Essential proteins are the proteins that are indispensable to the survival and development of an organism. Deleting a single essential protein will cause lethality or infertility. Identifying and analysing essential proteins are key to understanding the molecular mechanisms of living cells. There are two types of methods for predicting essential proteins: experimental methods, which require considerable time and resources, and computational methods, which overcome the shortcomings of experimental methods. However, the prediction accuracy of computational methods for essential proteins requires further improvement. In this paper, we propose a new computational strategy named CoTB for identifying essential proteins based on a combination of topological properties, subcellular localization information and orthologous protein information. First, we introduce several topological properties of the protein-protein interaction (PPI) network. Second, we propose new methods for measuring orthologous information and subcellular localization and a new computational strategy that uses a random forest prediction model to obtain a probability score for the proteins being essential. Finally, we conduct experiments on four different Saccharomyces cerevisiae datasets. The experimental results demonstrate that our strategy for identifying essential proteins outperforms traditional computational methods and the most recently developed method, SON. In particular, our strategy improves the prediction accuracy to 89, 78, 79, and 85 percent on the YDIP, YMIPS, YMBD and YHQ datasets at the top 100 level, respectively.
DNA based random key generation and management for OTP encryption.
Zhang, Yunpeng; Liu, Xin; Sun, Manhui
2017-09-01
One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.
NASA Astrophysics Data System (ADS)
Zhang, L.; Cong, Y.; Wu, C.; Bai, C.; Wu, C.
2017-08-01
The recording of Architectural heritage information is the foundation of research, conservation, management, and the display of architectural heritage. In other words, the recording of architectural heritage information supports heritage research, conservation, management and architectural heritage display. What information do we record and collect and what technology do we use for information recording? How do we determine the level of accuracy required when recording architectural information? What method do we use for information recording? These questions should be addressed in relation to the nature of the particular heritage site and the specific conditions for the conservation work. In recent years, with the rapid development of information acquisition technology such as Close Range Photogrammetry, 3D Laser Scanning as well as high speed and high precision Aerial Photogrammetry, many Chinese universities, research institutes and heritage management bureaux have purchased considerable equipment for information recording. However, the lack of understanding of both the nature of architectural heritage and the purpose for which the information is being collected has led to several problems. For example: some institutions when recording architectural heritage information aim solely at high accuracy. Some consider that advanced measuring methods must automatically replace traditional measuring methods. Information collection becomes the purpose, rather than the means, of architectural heritage conservation. Addressing these issues, this paper briefly reviews the history of architectural heritage information recording at the Summer Palace (Yihe Yuan, first built in 1750), Beijing. Using the recording practices at the Summer Palace during the past ten years as examples, we illustrate our achievements and lessons in recording architectural heritage information with regard to the following aspects: (buildings') ideal status desired, (buildings') current status, structural distortion analysis, display, statue restoration and thematic research. Three points will be highlighted in our discussion: 1. Understanding of the heritage is more important than the particular technology used: Architectural heritage information collection and recording are based on an understanding of the value and nature of the architectural heritage. Understanding is the purpose, whereas information collection and recording are the means. 2. Demand determines technology: Collecting and recording architectural heritage information is to serve the needs of heritage research, conservation, management and display. These different needs determine the different technologies that we use. 3. Set the level of accuracy appropriately: For information recording, high accuracy is not the key criterion; rather an appropriate level of accuracy is key. There is considerable deviation between the nominal accuracy of any instrument and the accuracy of any particular measurement.
ERIC Educational Resources Information Center
Torrens, George Edward; Newton, Helen
2013-01-01
This paper provides education-based researchers and practitioners with the preferred research and design methods used by Higher Education Institute (HEI) students and Key Stage 3 (KS3) pupils applied within a participatory approach to a design activity. The outcomes were that both pupils and students found informal (unstructured) interview to be…
Satellite markers: a simple method for ground truth car pose on stereo video
NASA Astrophysics Data System (ADS)
Gil, Gustavo; Savino, Giovanni; Piantini, Simone; Pierini, Marco
2018-04-01
Artificial prediction of future location of other cars in the context of advanced safety systems is a must. The remote estimation of car pose and particularly its heading angle is key to predict its future location. Stereo vision systems allow to get the 3D information of a scene. Ground truth in this specific context is associated with referential information about the depth, shape and orientation of the objects present in the traffic scene. Creating 3D ground truth is a measurement and data fusion task associated with the combination of different kinds of sensors. The novelty of this paper is the method to generate ground truth car pose only from video data. When the method is applied to stereo video, it also provides the extrinsic camera parameters for each camera at frame level which are key to quantify the performance of a stereo vision system when it is moving because the system is subjected to undesired vibrations and/or leaning. We developed a video post-processing technique which employs a common camera calibration tool for the 3D ground truth generation. In our case study, we focus in accurate car heading angle estimation of a moving car under realistic imagery. As outcomes, our satellite marker method provides accurate car pose at frame level, and the instantaneous spatial orientation for each camera at frame level.
NASA Astrophysics Data System (ADS)
Qing, Chun; Wu, Xiaoqing; Li, Xuebin; Tian, Qiguo; Liu, Dong; Rao, Ruizhong; Zhu, Wenyue
2018-01-01
In this paper, we introduce an approach wherein the Weather Research and Forecasting (WRF) model is coupled with the bulk aerodynamic method to estimate the surface layer refractive index structure constant (C n 2) above Taishan Station in Antarctica. First, we use the measured meteorological parameters to estimate C n 2 using the bulk aerodynamic method, and second, we use the WRF model output parameters to estimate C n 2 using the bulk aerodynamic method. Finally, the corresponding C n 2 values from the micro-thermometer are compared with the C n 2 values estimated using the WRF model coupled with the bulk aerodynamic method. We analyzed the statistical operators—the bias, root mean square error (RMSE), bias-corrected RMSE (σ), and correlation coefficient (R xy )—in a 20 day data set to assess how this approach performs. In addition, we employ contingency tables to investigate the estimation quality of this approach, which provides complementary key information with respect to the bias, RMSE, σ, and R xy . The quantitative results are encouraging and permit us to confirm the fine performance of this approach. The main conclusions of this study tell us that this approach provides a positive impact on optimizing the observing time in astronomical applications and provides complementary key information for potential astronomical sites.
Zimbabwe's national AIDS levy: A case study
Bhat, Nisha; Kilmarx, Peter H.; Dube, Freeman; Manenji, Albert; Dube, Medelina; Magure, Tapuwa
2016-01-01
Abstract Background: We conducted a case study of the Zimbabwe National AIDS Trust Fund (‘AIDS Levy’) as an approach to domestic government financing of the response to HIV and AIDS. Methods: Data came from three sources: a literature review, including a search for grey literature, review of government documents from the Zimbabwe National AIDS Council (NAC), and key informant interviews with representatives of the Zimbabwean government, civil society and international organizations. Findings: The literature search yielded 139 sources, and 20 key informants were interviewed. Established by legislation in 1999, the AIDS Levy entails a 3% income tax for individuals and 3% tax on profits of employers and trusts (which excluded the mining industry until 2015). It is managed by the parastatal NAC through a decentralized structure of AIDS Action Committees. Revenues increased from inception to 2006 through 2008, a period of economic instability and hyperinflation. Following dollarization in 2009, annual revenues continued to increase, reaching US$38.6 million in 2014. By policy, at least 50% of funds are used for purchase of antiretroviral medications. Other spending includes administration and capital costs, HIV prevention, and monitoring and evaluation. Several financial controls and auditing systems are in place. Key informants perceived the AIDS Levy as a ‘homegrown’ solution that provided country ownership and reduced dependence on donor funding, but called for further increased transparency, accountability, and reduced administrative costs, as well as recommended changes to increase revenue. Conclusions: The Zimbabwe AIDS Levy has generated substantial resources, recently over US$35 million per year, and signals an important commitment by Zimbabweans, which may have helped attract other donor resources. Many key informants considered the Zimbabwe AIDS Levy to be a best practice for other countries to follow. PMID:26781215
Extremality of Gaussian quantum states.
Wolf, Michael M; Giedke, Geza; Cirac, J Ignacio
2006-03-03
We investigate Gaussian quantum states in view of their exceptional role within the space of all continuous variables states. A general method for deriving extremality results is provided and applied to entanglement measures, secret key distillation and the classical capacity of bosonic quantum channels. We prove that for every given covariance matrix the distillable secret key rate and the entanglement, if measured appropriately, are minimized by Gaussian states. This result leads to a clearer picture of the validity of frequently made Gaussian approximations. Moreover, it implies that Gaussian encodings are optimal for the transmission of classical information through bosonic channels, if the capacity is additive.
Research on the method of precise alignment technology of atmospheric laser communication
NASA Astrophysics Data System (ADS)
Chen, Wen-jian; Gao, Wei; Duan, Yuan-yuan; Ma, Shi-wei; Chen, Jian
2016-10-01
Atmosphere laser communication takes advantage of laser as the carrier transmitting the voice, data, and image information in the atmosphere. Because of its high reliability, strong anti-interference ability, the advantages of easy installation, it has great potential and development space in the communications field. In the process of establish communication, the capture, targeting and tracking of the communication signal is the key technology. This paper introduce a method of targeting the signal spot in the process of atmosphere laser communication, which through the way of making analog signal addition and subtraction directly and normalized to obtain the target azimuth information to drive the servo system to achieve precise alignment of tracking.
Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung
2015-05-01
Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.
Decision Trajectories in Dementia Care Networks: Decisions and Related Key Events.
Groen-van de Ven, Leontine; Smits, Carolien; Oldewarris, Karen; Span, Marijke; Jukema, Jan; Eefsting, Jan; Vernooij-Dassen, Myrra
2017-10-01
This prospective multiperspective study provides insight into the decision trajectories of people with dementia by studying the decisions made and related key events. This study includes three waves of interviews, conducted between July 2010 and July 2012, with 113 purposefully selected respondents (people with beginning to advanced stages of dementia and their informal and professional caregivers) completed in 12 months (285 interviews). Our multilayered qualitative analysis consists of content analysis, timeline methods, and constant comparison. Four decision themes emerged-managing daily life, arranging support, community living, and preparing for the future. Eight key events delineate the decision trajectories of people with dementia. Decisions and key events differ between people with dementia living alone and living with a caregiver. Our study clarifies that decisions relate not only to the disease but to living with the dementia. Individual differences in decision content and sequence may effect shared decision-making and advance care planning.
The carrot and the stick? Strategies to improve compliance with college campus tobacco policies
Fallin-Bennett, Amanda; Roditis, Maria; Glantz, Stanton A.
2017-01-01
Objective Tobacco-free policies are being rapidly adopted nationwide, yet compliance with these policies remains a challenge. This study explored college campus key informants’ experiences with tobacco policies, and their perceived benefits, drawbacks, and outcomes. Participants The sample for this study was 68 key informants representing 16 different California universities with varying tobacco policies (no smoking indoors and within 20 feet of entrances, designated smoking areas, 100% smoke-free, and 100% tobacco-free). Methods Qualitative, descriptive study. Semistructured interviews were transcribed verbatim and analyzed using content analysis. Results Strategies to improve compliance ranged from a social approach to a heavy focus on punitive enforcement. Key informants from campuses using a social approach alone reported barriers to improving compliance, including a perceived lack of efficacy of the approach. However, these campuses found it challenging to incorporate enforcement through campus police or security. Conclusions College campus decision makers should explore using a combined approach (social approach as well as formal enforcement), with enforcement primarily the responsibility of nonpolice university channels (eg, Student Affairs, employee supervisors). PMID:27869568
Weir, Charlene R; Nebeker, Jonathan J R; Hicken, Bret L; Campo, Rebecca; Drews, Frank; Lebar, Beth
2007-01-01
Computerized Provider Order Entry (CPOE) with electronic documentation, and computerized decision support dramatically changes the information environment of the practicing clinician. Prior work patterns based on paper, verbal exchange, and manual methods are replaced with automated, computerized, and potentially less flexible systems. The objective of this study is to explore the information management strategies that clinicians use in the process of adapting to a CPOE system using cognitive task analysis techniques. Observation and semi-structured interviews were conducted with 88 primary-care clinicians at 10 Veterans Administration Medical Centers. Interviews were taped, transcribed, and extensively analyzed to identify key information management goals, strategies, and tasks. Tasks were aggregated into groups, common components across tasks were clarified, and underlying goals and strategies identified. Nearly half of the identified tasks were not fully supported by the available technology. Six core components of tasks were identified. Four meta-cognitive information management goals emerged: 1) Relevance Screening; 2) Ensuring Accuracy; 3) Minimizing memory load; and 4) Negotiating Responsibility. Strategies used to support these goals are presented. Users develop a wide array of information management strategies that allow them to successfully adapt to new technology. Supporting the ability of users to develop adaptive strategies to support meta-cognitive goals is a key component of a successful system.
King, Catherine L; Chow, Maria Y K; Wiley, Kerrie E; Leask, Julie
2018-07-01
Effective public health messaging is essential in both the planning phase and duration of a pandemic. This study aimed to gain an understanding of parental information seeking, trusted sources and needs in relation to pandemic influenza A 2009 (pH1N1) to inform future policy planning and resource development. We conducted a mixed methods study; parents from 16 childcare centres in Sydney, Australia, were surveyed between 16 November and 9 December 2009, and interviews were conducted with participants from six childcare centres between June 2009 and May 2011. From 972 surveys distributed, 431 were completed; a response rate of 44%. Most parents (90%) reported that doctors were "trusted a lot" as a source of influenza information, followed by nurses (59%), government (56%) and childcare centres (52%). Less trusted sources included media (7% selected "trusted a lot"), antivaccination groups (6%) and celebrities (1%). Parents identified a range of key search terms for influenza infection and vaccine. From 42 in-depth interviews, key themes were as follows: "Action trigger," "In an emergency, think Emergency," "Fright to hype" and "Dr Google and beyond." Parents relied heavily on media messages, but cynicism emerged when the pandemic was milder than expected. Parents viewed a range of information sources as trustworthy, including doctors, authoritative hospital or government websites, and childcare centres and schools. A user-centred orientation is vital for pandemic communications including tailored information provision, via trusted sources based on what parents want to know and how they can find it. © 2018 The Authors. Influenza and Other Respiratory Viruses Published by John Wiley & Sons Ltd.
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-01-01
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-03-21
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.
Information bias in health research: definition, pitfalls, and adjustment methods
Althubaiti, Alaa
2016-01-01
As with other fields, medical sciences are subject to different sources of bias. While understanding sources of bias is a key element for drawing valid conclusions, bias in health research continues to be a very sensitive issue that can affect the focus and outcome of investigations. Information bias, otherwise known as misclassification, is one of the most common sources of bias that affects the validity of health research. It originates from the approach that is utilized to obtain or confirm study measurements. This paper seeks to raise awareness of information bias in observational and experimental research study designs as well as to enrich discussions concerning bias problems. Specifying the types of bias can be essential to limit its effects and, the use of adjustment methods might serve to improve clinical evaluation and health care practice. PMID:27217764
Trauma-informed schools: Child disaster exposure, community violence and somatic symptoms.
Lai, Betty S; Osborne, Melissa C; Lee, NaeHyung; Self-Brown, Shannon; Esnard, Ann-Margaret; Kelley, Mary Lou
2018-06-15
Given the increasing prevalence of natural disasters, trauma-informed school settings should include efficient methods for assessing child health and mental health in post-disaster environments. To develop such methods, factors that contribute to children's vulnerability and key signs of distress reactions after disasters need to be understood. To address these issues, we evaluated pre-disaster community violence exposure as a vulnerability factor for children's post-disaster reactions and somatic symptoms as a key post-disaster outcome. We evaluated 426 children exposed to Hurricane Katrina at two timepoints (3-7 months and 13-17 months post-disaster). Structural equation models evaluated community violence exposure, hurricane exposure, and posttraumatic stress and somatic symptoms. Community violence exposure was associated with increased levels of posttraumatic stress symptoms among disaster-impacted youth, and did not moderate the relationship between disaster exposure and posttraumatic stress symptoms. Posttraumatic stress symptoms were associated with somatic symptoms in the short-term recovery period (3-7 months), but not associated with somatic symptoms during the longer-term recovery period (13-17 months). This study did not include school-level factors, and somatic symptoms were based on parent reports. The study did not include parent functioning information or distinguish between whether somatic symptoms were medical or functional in nature. Post-disaster school-based screeners may need to incorporate questions related to children's past exposure to community violence and their somatic symptoms to provide trauma-informed care for children. Copyright © 2018. Published by Elsevier B.V.
Recommendations for Selecting Drug-Drug Interactions for Clinical Decision Support
Tilson, Hugh; Hines, Lisa E.; McEvoy, Gerald; Weinstein, David M.; Hansten, Philip D.; Matuszewski, Karl; le Comte, Marianne; Higby-Baker, Stefanie; Hanlon, Joseph T.; Pezzullo, Lynn; Vieson, Kathleen; Helwig, Amy L.; Huang, Shiew-Mei; Perre, Anthony; Bates, David W.; Poikonen, John; Wittie, Michael A.; Grizzle, Amy J.; Brown, Mary; Malone, Daniel C.
2016-01-01
Purpose To recommend principles for including drug-drug interactions (DDIs) in clinical decision support. Methods A conference series was conducted to improve clinical decision support (CDS) for DDIs. The Content Workgroup met monthly by webinar from January 2013 to February 2014, with two in-person meetings to reach consensus. The workgroup consisted of 20 experts in pharmacology, drug information, and CDS from academia, government agencies, health information (IT) vendors, and healthcare organizations. Workgroup members addressed four key questions: (1) What process should be used to develop and maintain a standard set of DDIs?; (2) What information should be included in a knowledgebase of standard DDIs?; (3) Can/should a list of contraindicated drug pairs be established?; and (4) How can DDI alerts be more intelligently filtered? Results To develop and maintain a standard set of DDIs for CDS in the United States, we recommend a transparent, systematic, and evidence-driven process with graded recommendations by a consensus panel of experts and oversight by a national organization. We outline key DDI information needed to help guide clinician decision-making. We recommend judicious classification of DDIs as contraindicated, as only a small set of drug combinations are truly contraindicated. Finally, we recommend more research to identify methods to safely reduce repetitive and less relevant alerts. Conclusion A systematic ongoing process is necessary to select DDIs for alerting clinicians. We anticipate that our recommendations can lead to consistent and clinically relevant content for interruptive DDIs, and thus reduce alert fatigue and improve patient safety. PMID:27045070
A Bionic Polarization Navigation Sensor and Its Calibration Method.
Zhao, Huijie; Xu, Wujian
2016-08-03
The polarization patterns of skylight which arise due to the scattering of sunlight in the atmosphere can be used by many insects for deriving compass information. Inspired by insects' polarized light compass, scientists have developed a new kind of navigation method. One of the key techniques in this method is the polarimetric sensor which is used to acquire direction information from skylight. In this paper, a polarization navigation sensor is proposed which imitates the working principles of the polarization vision systems of insects. We introduce the optical design and mathematical model of the sensor. In addition, a calibration method based on variable substitution and non-linear curve fitting is proposed. The results obtained from the outdoor experiments provide support for the feasibility and precision of the sensor. The sensor's signal processing can be well described using our mathematical model. A relatively high degree of accuracy in polarization measurement can be obtained without any error compensation.
A Bionic Polarization Navigation Sensor and Its Calibration Method
Zhao, Huijie; Xu, Wujian
2016-01-01
The polarization patterns of skylight which arise due to the scattering of sunlight in the atmosphere can be used by many insects for deriving compass information. Inspired by insects’ polarized light compass, scientists have developed a new kind of navigation method. One of the key techniques in this method is the polarimetric sensor which is used to acquire direction information from skylight. In this paper, a polarization navigation sensor is proposed which imitates the working principles of the polarization vision systems of insects. We introduce the optical design and mathematical model of the sensor. In addition, a calibration method based on variable substitution and non-linear curve fitting is proposed. The results obtained from the outdoor experiments provide support for the feasibility and precision of the sensor. The sensor’s signal processing can be well described using our mathematical model. A relatively high degree of accuracy in polarization measurement can be obtained without any error compensation. PMID:27527171
Enterprise architecture availability analysis using fault trees and stakeholder interviews
NASA Astrophysics Data System (ADS)
Närman, Per; Franke, Ulrik; König, Johan; Buschle, Markus; Ekstedt, Mathias
2014-01-01
The availability of enterprise information systems is a key concern for many organisations. This article describes a method for availability analysis based on Fault Tree Analysis and constructs from the ArchiMate enterprise architecture (EA) language. To test the quality of the method, several case-studies within the banking and electrical utility industries were performed. Input data were collected through stakeholder interviews. The results from the case studies were compared with availability of log data to determine the accuracy of the method's predictions. In the five cases where accurate log data were available, the yearly downtime estimates were within eight hours from the actual downtimes. The cost of performing the analysis was low; no case study required more than 20 man-hours of work, making the method ideal for practitioners with an interest in obtaining rapid availability estimates of their enterprise information systems.
Bayesian demography 250 years after Bayes
Bijak, Jakub; Bryant, John
2016-01-01
Bayesian statistics offers an alternative to classical (frequentist) statistics. It is distinguished by its use of probability distributions to describe uncertain quantities, which leads to elegant solutions to many difficult statistical problems. Although Bayesian demography, like Bayesian statistics more generally, is around 250 years old, only recently has it begun to flourish. The aim of this paper is to review the achievements of Bayesian demography, address some misconceptions, and make the case for wider use of Bayesian methods in population studies. We focus on three applications: demographic forecasts, limited data, and highly structured or complex models. The key advantages of Bayesian methods are the ability to integrate information from multiple sources and to describe uncertainty coherently. Bayesian methods also allow for including additional (prior) information next to the data sample. As such, Bayesian approaches are complementary to many traditional methods, which can be productively re-expressed in Bayesian terms. PMID:26902889
Shannon information entropy in heavy-ion collisions
NASA Astrophysics Data System (ADS)
Ma, Chun-Wang; Ma, Yu-Gang
2018-03-01
The general idea of information entropy provided by C.E. Shannon "hangs over everything we do" and can be applied to a great variety of problems once the connection between a distribution and the quantities of interest is found. The Shannon information entropy essentially quantify the information of a quantity with its specific distribution, for which the information entropy based methods have been deeply developed in many scientific areas including physics. The dynamical properties of heavy-ion collisions (HICs) process make it difficult and complex to study the nuclear matter and its evolution, for which Shannon information entropy theory can provide new methods and observables to understand the physical phenomena both theoretically and experimentally. To better understand the processes of HICs, the main characteristics of typical models, including the quantum molecular dynamics models, thermodynamics models, and statistical models, etc., are briefly introduced. The typical applications of Shannon information theory in HICs are collected, which cover the chaotic behavior in branching process of hadron collisions, the liquid-gas phase transition in HICs, and the isobaric difference scaling phenomenon for intermediate mass fragments produced in HICs of neutron-rich systems. Even though the present applications in heavy-ion collision physics are still relatively simple, it would shed light on key questions we are seeking for. It is suggested to further develop the information entropy methods in nuclear reactions models, as well as to develop new analysis methods to study the properties of nuclear matters in HICs, especially the evolution of dynamics system.
ERIC Educational Resources Information Center
Miller, Jane K.; Repinski, Shelby L.; Hayes, Kathryn N.; Bliss, Frederick A.; Trexler, Cary J.
2011-01-01
A broad-based survey using the Delphi method was conducted to garner current information from private sector stakeholders and build consensus opinions supporting key ideas for enhancing plant breeder education and training. This study asked respondents to suggest and rate topics and content they deemed most important to plant breeding graduate…
ERIC Educational Resources Information Center
Corkum, Penny; Bryson, Susan E.; Smith, Isabel M.; Giffen, Cynthia; Hume, Kym; Power, Ann
2014-01-01
The primary objective of this mixed methods study was to identify educators' professional development needs to determine how best to support them in providing quality programming for children with Autism Spectrum Disorders (ASD) within an inclusive educational system. Information was collected through focus groups with key school board informants…
ERIC Educational Resources Information Center
Odell, John H.
A school construction guide offers key personnel in school development projects information on the complex task of master planning and construction of schools in Australia. This chapter of the guide provides advice on the various types of construction that may be used, the materials available, and some elementary aspects of the services required…
Optimal Methods for Classification of Digitally Modulated Signals
2013-03-01
of using a ratio of likelihood functions, the proposed approach uses the Kullback - Leibler (KL) divergence. KL...58 List of Acronyms ALRT Average LRT BPSK Binary Shift Keying BPSK-SS BPSK Spread Spectrum or CDMA DKL Kullback - Leibler Information Divergence...blind demodulation for develop classification algorithms for wider set of signals types. Two methodologies were used : Likelihood Ratio Test
The mission of ORD's Ecosystme Services Research Program (ESRP) is to provide the information and methods needed by decision-makers to assess the benefits of ecosystem goods and services to human well-being for inclusion in management alternatives. The Decision Support Framework...
Logic of Sherlock Holmes in Technology Enhanced Learning
ERIC Educational Resources Information Center
Patokorpi, Erkki
2007-01-01
Abduction is a method of reasoning that people use under uncertainty in a context in order to come up with new ideas. The use of abduction in this exploratory study is twofold: (i) abduction is a cross-disciplinary analytic tool that can be used to explain certain key aspects of human-computer interaction in advanced Information Society Technology…
Prescribing regeneration treatments for mixed-oak forests in the Mid-Atlantic region
Patrick H. Brose; Kurt W. Gottschalk; Stephen B. Horsley; Peter D. Knopp; James N. Kochenderfer; Barbara J. McGuinness; Gary W. Miller; Todd E. Ristau; Scott H. Stoleson; Susan L. Stout
2008-01-01
Includes guidelines for using the SILVAH decision-support system to perpetuate oak forests in the Mid-Atlantic region. Six chapters provide information on values of oak forests, inventory methods, key decision variables, decision charts, and silvicultural prescriptions, as well as guidance on fostering young stands. Sample tally sheets and SILVAH computer printouts are...
Spontaneously Combustible Solids -- A Literature Search
1975-05-01
Wasahizeon, D.* C. It. K(EY WORDS (Continue on reviers side It necesary and Identify by block number) Pyrophoric Materials Hazardous Materials...and Identify by block number) Existing information on spontaneously combustible solids including pyrophoric - air hazardous materials and water... pyrophoric -air hazardous and water reactive materials. All available hazard classification systems and test methods releting to spontaneous combustion have
Factors Affecting Performance of Agricultural Extension: Evidence from Democratic Republic of Congo
ERIC Educational Resources Information Center
Ragasa, Catherine; Ulimwengu, John; Randriamamonjy, Josee; Badibanga, Thaddee
2016-01-01
Purpose: As part of the institutional reforms and agricultural restructuring in the Democratic Republic of Congo (DRC), this paper provides an assessment of the performance of the agricultural extension system as well as factors explaining it. Method: This paper involves key informants' interviews and surveys of 107 extension organizations and 162…
USDA-ARS?s Scientific Manuscript database
Chemical spray on cotton is almost an exclusive method for control of tarnished plant bug (TPB, Lygus lineolaris). Frequent use of imidacloprid is a concern for neonicotinoid resistance in this key pest. Information of how and why TPB become less susceptible to imidacloprid is essential for effectiv...
Fu, Yongqing; Li, Xingyuan; Li, Yanan; Yang, Wei; Song, Hailiang
2013-03-01
Chaotic communication has aroused general interests in recent years, but its communication effect is not ideal with the restriction of chaos synchronization. In this paper a new chaos M-ary digital modulation and demodulation method is proposed. By using region controllable characteristics of spatiotemporal chaos Hamilton map in phase plane and chaos unique characteristic, which is sensitive to initial value, zone mapping method is proposed. It establishes the map relationship between M-ary digital information and the region of Hamilton map phase plane, thus the M-ary information chaos modulation is realized. In addition, zone partition demodulation method is proposed based on the structure characteristic of Hamilton modulated information, which separates M-ary information from phase trajectory of chaotic Hamilton map, and the theory analysis of zone partition demodulator's boundary range is given. Finally, the communication system based on the two methods is constructed on the personal computer. The simulation shows that in high speed transmission communications and with no chaos synchronization circumstance, the proposed chaotic M-ary modulation and demodulation method has outperformed some conventional M-ary modulation methods, such as quadrature phase shift keying and M-ary pulse amplitude modulation in bit error rate. Besides, it has performance improvement in bandwidth efficiency, transmission efficiency and anti-noise performance, and the system complexity is low and chaos signal is easy to generate.
Introduction strategies raise key questions.
Finger, W R; Keller, S
1995-09-01
Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying whether or not women in developing countries will use the female condom.
Developing measures for information ergonomics in knowledge work.
Franssila, Heljä; Okkonen, Jussi; Savolainen, Reijo
2016-03-01
Information ergonomics is an evolving application domain of ergonomics focusing on the management of workload in the real-world contexts of information-intensive tasks. This study introduces a method for the evaluation of information ergonomics in knowledge work. To this end, five key dimensions of information ergonomics were identified: contextual factors of knowledge work, multitasking, interruptions at work, practices for managing information load, and perceived job control and productivity. In total, 24 measures focusing on the above dimensions were constructed. The measures include, for example, the number of fragmented work tasks per work day. The measures were preliminarily tested in two Finnish organisations, making use of empirical data gathered by interviews, electronic questionnaires and log data applications tracking work processes on personal computers. The measures are applicable to the evaluation of information ergonomics, even though individual measures vary with regard to the amount of work and time needed for data analysis. Practitioner Summary: The study introduces a method for the evaluation of information ergonomics in knowledge work. To this end, 24 measures were constructed and tested empirically. The measures focus on contextual factors of knowledge work, multitasking, interruptions at work, practices for managing information load, and perceived job control and productivity.
Bertrand, Jane T.; Njeuhmeli, Emmanuel; Forsythe, Steven; Mattison, Sarah K.; Mahler, Hally; Hankins, Catherine A.
2011-01-01
Background This paper proposes an approach to estimating the costs of demand creation for voluntary medical male circumcision (VMMC) scale-up in 13 countries of eastern and southern Africa. It addresses two key questions: (1) what are the elements of a standardized package for demand creation? And (2) what challenges exist and must be taken into account in estimating the costs of demand creation? Methods and Findings We conducted a key informant study on VMMC demand creation using purposive sampling to recruit seven people who provide technical assistance to government programs and manage budgets for VMMC demand creation. Key informants provided their views on the important elements of VMMC demand creation and the most effective funding allocations across different types of communication approaches (e.g., mass media, small media, outreach/mobilization). The key finding was the wide range of views, suggesting that a standard package of core demand creation elements would not be universally applicable. This underscored the importance of tailoring demand creation strategies and estimates to specific country contexts before estimating costs. The key informant interviews, supplemented by the researchers' field experience, identified these issues to be addressed in future costing exercises: variations in the cost of VMMC demand creation activities by country and program, decisions about the quality and comprehensiveness of programming, and lack of data on critical elements needed to “trigger the decision” among eligible men. Conclusions Based on this study's findings, we propose a seven-step methodological approach to estimate the cost of VMMC scale-up in a priority country, based on our key assumptions. However, further work is needed to better understand core components of a demand creation package and how to cost them. Notwithstanding the methodological challenges, estimating the cost of demand creation remains an essential element in deriving estimates of the total costs for VMMC scale-up in eastern and southern Africa. PMID:22140450
2018-01-01
ABSTRACT Background: Information from patient complaints – a widely accepted measure of patient satisfaction with services – can inform improvements in service quality, and contribute towards overall health systems performance. While analyses of data from patient complaints received much emphasis, there is limited published literature on key interventions to improve complaint management systems. Objectives: The objectives are two-fold: first, to synthesise existing evidence and provide practical options to inform future policy and practice and, second, to identify key outstanding gaps in the existing literature to inform agenda for future research. Methods: We report results of review of the existing literature. Peer-reviewed published literature was searched in OVID Medline, OVID Global Health and PubMed. In addition, relevant citations from the reviewed articles were followed up, and we also report grey literature from the UK and the Netherlands. Results: Effective interventions can improve collection of complaints (e.g. establishing easy-to-use channels and raising patients’ awareness of these), analysis of complaint data (e.g. creating structures and spaces for analysis and learning from complaints data), and subsequent action (e.g. timely feedback to complainants and integrating learning from complaints into service quality improvement). No one single measure can be sufficient, and any intervention to improve patient complaint management system must include different components, which need to be feasible, effective, scalable, and sustainable within local context. Conclusions: Effective interventions to strengthen patient complaints systems need to be: comprehensive, integrated within existing systems, context-specific and cognizant of the information asymmetry and the unequal power relations between the key actors. Four gaps in the published literature represent an agenda for future research: limited understanding of contexts of effective interventions, absence of system-wide approaches, lack of evidence from low- and middle-income countries and absence of focused empirical assessments of behaviour of staff who manage patient complaints. PMID:29658393
Pojskic, Nedzad; MacKeigan, Linda; Boon, Heather; Austin, Zubin
2014-01-01
A number of jurisdictions, both in Canada and internationally, have recently expanded pharmacists' scope of practice to allow prescriptive authority. To ascertain the initial perceptions of the Ontario government and health professional stakeholder groups regarding the prospect of prescriptive authority for pharmacists. Qualitative research methods were used; data sources were policy documents and semi-structured interviews with key informants from the Ontario government and pharmacy and medical professional organizations. Purposive and snowball sampling strategies were used to identify 17 key informants. Fifty-one relevant policy documents were retrieved through searches of organizational websites and interviewee suggestions. Interview transcripts and documents were content analyzed independently by 2 researchers; and once consensus was achieved on key themes, the primary investigator analyzed the remainder. Pharmacy organizations and Ontario government representatives both expressed support for pharmacist prescriptive authority, suggesting that it would enhance patient access to primary care. Medical organizations were opposed to this expanded pharmacist role, arguing that pharmacists' lack of training and experience in diagnosis and prescribing would endanger patient safety. Other concerns were fragmentation of care and pharmacists' lack of access to patient clinical information. Some government and pharmacy informants felt that pharmacist prescribing would decrease health system costs through substitution of cheaper health professionals for physicians, while others felt that costs would increase due to increased utilization of services. Medical organizations preferred delegated medical authority as the policy alternative to pharmacist prescribing. Widely different views were expressed by the Ontario government and pharmacy organizations on the one hand and medical professional organizations on the other hand, regarding the potential impact of pharmacist prescribing on patient safety and access to primary care. This is likely due, at least in part, to the lack of evidence on the expected impact of this expanded pharmacist role. More research is needed to help inform discussions regarding this issue. Copyright © 2014 Elsevier Inc. All rights reserved.
Muhammad, Khan; Sajjad, Muhammad; Baik, Sung Wook
2016-05-01
In this paper, the problem of secure transmission of sensitive contents over the public network Internet is addressed by proposing a novel data hiding method in encrypted images with dual-level security. The secret information is divided into three blocks using a specific pattern, followed by an encryption mechanism based on the three-level encryption algorithm (TLEA). The input image is scrambled using a secret key, and the encrypted sub-message blocks are then embedded in the scrambled image by cyclic18 least significant bit (LSB) substitution method, utilizing LSBs and intermediate LSB planes. Furthermore, the cover image and its planes are rotated at different angles using a secret key prior to embedding, deceiving the attacker during data extraction. The usage of message blocks division, TLEA, image scrambling, and the cyclic18 LSB method results in an advanced security system, maintaining the visual transparency of resultant images and increasing the security of embedded data. In addition, employing various secret keys for image scrambling, data encryption, and data hiding using the cyclic18 LSB method makes the data recovery comparatively more challenging for attackers. Experimental results not only validate the effectiveness of the proposed framework in terms of visual quality and security compared to other state-of-the-art methods, but also suggest its feasibility for secure transmission of diagnostically important keyframes to healthcare centers and gastroenterologists during wireless capsule endoscopy.
Creating an advance-care-planning decision aid for high-risk surgery: a qualitative study
2014-01-01
Background High-risk surgery patients may lose decision-making capacity as a result of surgical complications. Advance care planning prior to surgery may be beneficial, but remains controversial and is hindered by a lack of appropriate decision aids. This study sought to examine stakeholders’ views on the appropriateness of using decision aids, in general, to support advance care planning among high-risk surgery populations and the design of such a decision aid. Methods Key informants were recruited through purposive and snowball sampling. Semi-structured interviews were conducted by phone until data collected reached theoretical saturation. Key informants were asked to discuss their thoughts about advance care planning and interventions to support advance care planning, particularly for this population. Researchers took de-identified notes that were analyzed for emerging concordant, discordant, and recurrent themes using interpretative phenomenological analysis. Results Key informants described the importance of initiating advance care planning preoperatively, despite potential challenges present in surgical settings. In general, decision aids were viewed as an appropriate approach to support advance care planning for this population. A recipe emerged from the data that outlines tools, ingredients, and tips for success that are needed to design an advance care planning decision aid for high-risk surgical settings. Conclusions Stakeholders supported incorporating advance care planning in high-risk surgical settings and endorsed the appropriateness of using decision aids to do so. Findings will inform the next stages of developing the first advance care planning decision aid for high-risk surgery patients. PMID:25067908
A new method for generating an invariant iris private key based on the fuzzy vault system.
Lee, Youn Joo; Park, Kang Ryoung; Lee, Sung Joo; Bae, Kwanghyuk; Kim, Jaihie
2008-10-01
Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.
Data standardization. The key to effective management
Wagner, C. Russell
1991-01-01
Effective management of the nation's water resources is dependent upon accurate and consistent hydrologic information. Before the emergence of environmental concerns in the 1960's, most hydrologic information was collected by the U.S. Geological Survey and other Federal agencies that used fairly consistent methods and equipment. In the past quarter century, however, increased environmental awareness has resulted in an expansion of hydrologic data collection not only by Federal agencies, but also by state and municipal governments, university investigators, and private consulting firms. The acceptance and use of standard methods of collecting and processing hydrologic data would contribute to cost savings and to greater credibility of flow information vital to responsible assessment and management of the nation's water resources. This paper traces the evolution of the requirements and uses of open-channel flow information in the U.S., and the sequence of efforts to standardize the methods used to obtain this information in the future. The variable nature of naturally flowing rivers results in continually changing hydraulic properties of their channels. Those persons responsible for measurement of water flowing in open channels (streamflow) must use a large amount of judgement in the selection of appropriate equipment and technique to obtain accurate flow information. Standardization of the methods used in the measurement of streamflow is essential to assure consistency of data, but must also allow considerable latitude for individual judgement to meet constantly changing field conditions.
NASA/Howard University Large Space Structures Institute
NASA Technical Reports Server (NTRS)
Broome, T. H., Jr.
1984-01-01
Basic research on the engineering behavior of large space structures is presented. Methods of structural analysis, control, and optimization of large flexible systems are examined. Topics of investigation include the Load Correction Method (LCM) modeling technique, stabilization of flexible bodies by feedback control, mathematical refinement of analysis equations, optimization of the design of structural components, deployment dynamics, and the use of microprocessors in attitude and shape control of large space structures. Information on key personnel, budgeting, support plans and conferences is included.
MRIVIEW: An interactive computational tool for investigation of brain structure and function
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ranken, D.; George, J.
MRIVIEW is a software system which uses image processing and visualization to provide neuroscience researchers with an integrated environment for combining functional and anatomical information. Key features of the software include semi-automated segmentation of volumetric head data and an interactive coordinate reconciliation method which utilizes surface visualization. The current system is a precursor to a computational brain atlas. We describe features this atlas will incorporate, including methods under development for visualizing brain functional data obtained from several different research modalities.
ITO-based evolutionary algorithm to solve traveling salesman problem
NASA Astrophysics Data System (ADS)
Dong, Wenyong; Sheng, Kang; Yang, Chuanhua; Yi, Yunfei
2014-03-01
In this paper, a ITO algorithm inspired by ITO stochastic process is proposed for Traveling Salesmen Problems (TSP), so far, many meta-heuristic methods have been successfully applied to TSP, however, as a member of them, ITO needs further demonstration for TSP. So starting from designing the key operators, which include the move operator, wave operator, etc, the method based on ITO for TSP is presented, and moreover, the ITO algorithm performance under different parameter sets and the maintenance of population diversity information are also studied.
Method and apparatus for filtering visual documents
NASA Technical Reports Server (NTRS)
Rorvig, Mark E. (Inventor); Shelton, Robert O. (Inventor)
1993-01-01
A method and apparatus for producing an abstract or condensed version of a visual document is presented. The frames comprising the visual document are first sampled to reduce the number of frames required for processing. The frames are then subjected to a structural decomposition process that reduces all information in each frame to a set of values. These values are in turn normalized and further combined to produce only one information content value per frame. The information content values of these frames are then compared to a selected distribution cutoff point. This effectively selects those values at the tails of a normal distribution, thus filtering key frames from their surrounding frames. The value for each frame is then compared with the value from the previous frame, and the respective frame is finally stored only if the values are significantly different. The method filters or compresses a visual document with a reduction in digital storage on the ratio of up to 700 to 1 or more, depending on the content of the visual document being filtered.
Anonymizing and Sharing Medical Text Records
Li, Xiao-Bai; Qin, Jialun
2017-01-01
Health information technology has increased accessibility of health and medical data and benefited medical research and healthcare management. However, there are rising concerns about patient privacy in sharing medical and healthcare data. A large amount of these data are in free text form. Existing techniques for privacy-preserving data sharing deal largely with structured data. Current privacy approaches for medical text data focus on detection and removal of patient identifiers from the data, which may be inadequate for protecting privacy or preserving data quality. We propose a new systematic approach to extract, cluster, and anonymize medical text records. Our approach integrates methods developed in both data privacy and health informatics fields. The key novel elements of our approach include a recursive partitioning method to cluster medical text records based on the similarity of the health and medical information and a value-enumeration method to anonymize potentially identifying information in the text data. An experimental study is conducted using real-world medical documents. The results of the experiments demonstrate the effectiveness of the proposed approach. PMID:29569650
Key Spatial Relations-based Focused Crawling (KSRs-FC) for Borderlands Situation Analysis
NASA Astrophysics Data System (ADS)
Hou, D. Y.; Wu, H.; Chen, J.; Li, R.
2013-11-01
Place names play an important role in Borderlands Situation topics, while current focused crawling methods treat them in the same way as other common keywords, which may lead to the omission of many useful web pages. In the paper, place names in web pages and their spatial relations were firstly discussed. Then, a focused crawling method named KSRs-FC was proposed to deal with the collection of situation information about borderlands. In this method, place names and common keywords were represented separately, and some of the spatial relations related to web pages crawling were used in the relevance calculation between the given topic and web pages. Furthermore, an information collection system for borderlands situation analysis was developed based on KSRs-FC. Finally, F-Score method was adopted to quantitatively evaluate this method by comparing with traditional method. Experimental results showed that the F-Score value of the proposed method increased by 11% compared to traditional method with the same sample data. Obviously, KSRs-FC method can effectively reduce the misjudgement of relevant webpages.
Qualitative analysis of the dynamics of policy design and implementation in hospital funding reform.
Palmer, Karen S; Brown, Adalsteinn D; Evans, Jenna M; Marani, Husayn; Russell, Kirstie K; Martin, Danielle; Ivers, Noah M
2018-01-01
As in many health care systems, some Canadian jurisdictions have begun shifting away from global hospital budgets. Payment for episodes of care has begun to be implemented. Starting in 2012, the Province of Ontario implemented hospital funding reforms comprising three elements: Global Budgets; Health Based Allocation Method (HBAM); and Quality-Based Procedures (QBP). This evaluation focuses on implementation of QBPs, a procedure/diagnosis-specific funding approach involving a pre-set price per episode of care coupled with best practice clinical pathways. We examined whether or not there was consensus in understanding of the program theory underpinning QBPs and how this may have influenced full and effective implementation of this innovative funding model. We undertook a formative evaluation of QBP implementation. We used an embedded case study method and in-depth, one-on-one, semi-structured, telephone interviews with key informants at three levels of the health care system: Designers (those who designed the QBP policy); Adoption Supporters (organizations and individuals supporting adoption of QBPs); and Hospital Implementers (those responsible for QBP implementation in hospitals). Thematic analysis involved an inductive approach, incorporating Framework analysis to generate descriptive and explanatory themes that emerged from the data. Five main findings emerged from our research: (1) Unbeknownst to most key informants, there was neither consistency nor clarity over time among QBP designers in their understanding of the original goal(s) for hospital funding reform; (2) Prior to implementation, the intended hospital funding mechanism transitioned from ABF to QBPs, but most key informants were either unaware of the transition or believe it was intentional; (3) Perception of the primary goal(s) of the policy reform continues to vary within and across all levels of key informants; (4) Four years into implementation, the QBP funding mechanism remains misunderstood; and (5) Ongoing differences in understanding of QBP goals and funding mechanism have created challenges with implementation and difficulties in measuring success. Policy drift and policy layering affected both the goal and the mechanism of action of hospital funding reform. Lack of early specification in both policy goals and hospital funding mechanism exposed the reform to reactive changes that did not reflect initial intentions. Several challenges further exacerbated implementation of complex hospital funding reforms, including a prolonged implementation schedule, turnover of key staff, and inconsistent messaging over time. These factors altered the trajectory of the hospital funding reforms and created confusion amongst those responsible for implementation. Enacting changes to hospital funding policy through a process that is transparent, collaborative, and intentional may increase the likelihood of achieving intended effects.
Predicting Key Events in the Popularity Evolution of Online Information.
Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen
2017-01-01
The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.
Predicting Key Events in the Popularity Evolution of Online Information
Fu, Shushen; Fang, Mingzhe; Xu, Wenwen
2017-01-01
The popularity of online information generally experiences a rising and falling evolution. This paper considers the “burst”, “peak”, and “fade” key events together as a representative summary of popularity evolution. We propose a novel prediction task—predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify “burst”, “peak”, and “fade” in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution. PMID:28046121
Participatory interaction design in user requirements specification in healthcare.
Martikainen, Susanna; Ikävalko, Pauliina; Korpela, Mikko
2010-01-01
Healthcare information systems are accused of poor usability even in the popular media in Finland. Doctors especially have been very critical and actively expressed their opinions in public. User involvement and user-centered design methods are seen as the key solution to usability problems. In this paper we describe a research case where participatory methods were experimented within healthcare information systems development in medicinal care in a hospital. The study was part of a larger research project on Activity-driven Information Systems Development in healthcare. The study started by finding out about and modeling the present state of medicinal care in the hospital. After that it was important to define and model the goal state. The goal state, facilitated by the would-be software package, was modeled with the help of user interface drawings as one way of prototyping. Traditional usability methods were extended during the study. According to the health professionals' feedback, the use of participatory and user-centered interaction design methods, particularly user interface drawings enabled them to describe their requirements and create common understanding with the system developers.
NASA Astrophysics Data System (ADS)
Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu
2014-07-01
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
"ATLAS" Advanced Technology Life-cycle Analysis System
NASA Technical Reports Server (NTRS)
Lollar, Louis F.; Mankins, John C.; ONeil, Daniel A.
2004-01-01
Making good decisions concerning research and development portfolios-and concerning the best systems concepts to pursue - as early as possible in the life cycle of advanced technologies is a key goal of R&D management This goal depends upon the effective integration of information from a wide variety of sources as well as focused, high-level analyses intended to inform such decisions Life-cycle Analysis System (ATLAS) methodology and tool kit. ATLAS encompasses a wide range of methods and tools. A key foundation for ATLAS is the NASA-created Technology Readiness. The toolkit is largely spreadsheet based (as of August 2003). This product is being funded by the Human and Robotics The presentation provides a summary of the Advanced Technology Level (TRL) systems Technology Program Office, Office of Exploration Systems, NASA Headquarters, Washington D.C. and is being integrated by Dan O Neil of the Advanced Projects Office, NASA/MSFC, Huntsville, AL
Li, Wen-Jie; Zhang, Shi-Huang; Wang, Hui-Min
2011-12-01
Ecosystem services evaluation is a hot topic in current ecosystem management, and has a close link with human beings welfare. This paper summarized the research progress on the evaluation of ecosystem services based on geographic information system (GIS) and remote sensing (RS) technology, which could be reduced to the following three characters, i. e., ecological economics theory is widely applied as a key method in quantifying ecosystem services, GIS and RS technology play a key role in multi-source data acquisition, spatiotemporal analysis, and integrated platform, and ecosystem mechanism model becomes a powerful tool for understanding the relationships between natural phenomena and human activities. Aiming at the present research status and its inadequacies, this paper put forward an "Assembly Line" framework, which was a distributed one with scalable characteristics, and discussed the future development trend of the integration research on ecosystem services evaluation based on GIS and RS technologies.
[Modeling in value-based medicine].
Neubauer, A S; Hirneiss, C; Kampik, A
2010-03-01
Modeling plays an important role in value-based medicine (VBM). It allows decision support by predicting potential clinical and economic consequences, frequently combining different sources of evidence. Based on relevant publications and examples focusing on ophthalmology the key economic modeling methods are explained and definitions are given. The most frequently applied model types are decision trees, Markov models, and discrete event simulation (DES) models. Model validation includes besides verifying internal validity comparison with other models (external validity) and ideally validation of its predictive properties. The existing uncertainty with any modeling should be clearly stated. This is true for economic modeling in VBM as well as when using disease risk models to support clinical decisions. In economic modeling uni- and multivariate sensitivity analyses are usually applied; the key concepts here are tornado plots and cost-effectiveness acceptability curves. Given the existing uncertainty, modeling helps to make better informed decisions than without this additional information.
The application of machine vision in fire protection system
NASA Astrophysics Data System (ADS)
Rong, Jiang
2018-04-01
Based on the previous research, this paper introduces the theory of wavelet, collects the situation through the video system, and calculates the key information needed in the fire protection system. That is, through the algorithm to collect the information, according to the flame color characteristics and smoke characteristics were extracted, and as the characteristic information corresponding processing. Alarm system set the corresponding alarm threshold, when more than this alarm threshold, the system will alarm. This combination of flame color characteristics and smoke characteristics of the fire method not only improve the accuracy of judgment, but also improve the efficiency of judgments. Experiments show that the scheme is feasible.
Desale, Adino; Taye, Bineyam; Belay, Getachew; Nigatu, Alemayehu
2013-01-01
Logistics management information system for health commodities remained poorly implemented in most of developing countries. To assess the status of laboratory logistics management information system for HIV/AIDS and tuberculosis laboratory commodities in public health facilities in Addis Ababa. A cross-sectional descriptive study was conducted from September 2010-January 2011 at selected public health facilities. A stratified random sampling method was used to include a total of 43 facilities which, were investigated through quantitative methods using structured questionnaires interviews. Focus group discussion with the designated supply chain managers and key informant interviews were conducted for the qualitative method. There exists a well-designed logistics system for laboratory commodities with trained pharmacy personnel, distributed standard LMIS formats and established inventory control procedures. However, majority of laboratory professionals were not trained in LMIS. Majority of the facilities (60.5%) were stocked out for at least one ART monitoring and TB laboratory reagents and the highest stock out rate was for chemistry reagents. Expired ART monitoring laboratory commodities were found in 25 (73.5%) of facilities. Fifty percent (50%) of the assessed hospitals and 54% of health centers were currently using stock/bin cards for all HIV/AIDS and TB laboratory commodities in main pharmacy store, among these only 25% and 20.8% of them were updated with accurate information matching with the physical count done at the time of visit for hospitals and health centers respectively. Even though there exists a well designed laboratory LMIS, keeping quality stock/bin cards and LMIS reports were very low. Key ART monitoring laboratory commodities were stock out at many facilities at the day of visit and during the past six months. Based on findings, training of laboratory personnel's managing laboratory commodities and keeping accurate inventory control procedures were recommended.
On protection against a bright-pulse attack in the two-pass quantum cryptography system
NASA Astrophysics Data System (ADS)
Balygin, K. A.; Klimov, A. N.; Korol'kov, A. V.; Kulik, S. P.; Molotkov, S. N.
2016-06-01
The security of keys in quantum cryptography systems, in contrast to mathematical cryptographic algorithms, is guaranteed by fundamental quantum-mechanical laws. However, the cryptographic resistance of such systems, which are distributed physical devices, fundamentally depends on the method of their implementation and particularly on the calibration and control of critical parameters. The most important parameter is the number of photons in quasi-single-photon information states in a communication channel. The sensitivity to a bright-pulse attack has been demonstrated in an explicit form for a number of systems. A method guaranteeing the resistance to such attacks has been proposed and implemented. Furthermore, the relation of physical observables used and obtained at the control of quantum states to the length of final secret keys has been obtained for the first time.
Greville-Harris, Maddy; Bostock, Jennifer; Din, Amy; Graham, Cynthia A; Lewith, George; Liossi, Christina; O'Riordan, Tim; White, Peter; Yardley, Lucy; Bishop, Felicity L
2016-06-10
According to established ethical principles and guidelines, patients in clinical trials should be fully informed about the interventions they might receive. However, information about placebo-controlled clinical trials typically focuses on the new intervention being tested and provides limited and at times misleading information about placebos. We aimed to create an informative, scientifically accurate, and engaging website that could be used to improve understanding of placebo effects among patients who might be considering taking part in a placebo-controlled clinical trial. Our approach drew on evidence-, theory-, and person-based intervention development. We used existing evidence and theory about placebo effects to develop content that was scientifically accurate. We used existing evidence and theory of health behavior to ensure our content would be communicated persuasively, to an audience who might currently be ignorant or misinformed about placebo effects. A qualitative 'think aloud' study was conducted in which 10 participants viewed prototypes of the website and spoke their thoughts out loud in the presence of a researcher. The website provides information about 10 key topics and uses text, evidence summaries, quizzes, audio clips of patients' stories, and a short film to convey key messages. Comments from participants in the think aloud study highlighted occasional misunderstandings and off-putting/confusing features. These were addressed by modifying elements of content, style, and navigation to improve participants' experiences of using the website. We have developed an evidence-based website that incorporates theory-based techniques to inform members of the public about placebos and placebo effects. Qualitative research ensured our website was engaging and convincing for our target audience who might not perceive a need to learn about placebo effects. Before using the website in clinical trials, it is necessary to test its effects on key outcomes including patients' knowledge and capacity for making informed choices about placebos.
Lee, Tian-Fu
2013-12-01
A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.
Innovation in mental health services: what are the key components of success?
2011-01-01
Background Service development innovation in health technology and practice is viewed as a pressing need within the field of mental health yet is relatively poorly understood. Macro-level theories have been criticised for their limited explanatory power and they may not be appropriate for understanding local and fine-grained uncertainties of services and barriers to the sustainability of change. This study aimed to identify contextual influences inhibiting or promoting the acceptance and integration of innovations in mental health services in both National Health Service (NHS) and community settings. Methods A comparative study using qualitative and case study data collection methods, including semi-structured interviews with key stakeholders and follow-up telephone interviews over a one-year period. The analysis was informed by learning organisation theory. Drawn from 11 mental health innovation projects within community, voluntary and NHS settings, 65 participants were recruited including service users, commissioners, health and non-health professionals, managers, and caregivers. The methods deployed in this evaluation focused on process-outcome links within and between the 11 projects. Results Key barriers to innovation included resistance from corporate departments and middle management, complexity of the innovation, and the availability and access to resources on a prospective basis within the host organisation. The results informed the construction of a proposed model of innovation implementation within mental health services. The main components of which are context, process, and outcomes. Conclusions The study produced a model of conducive and impeding factors drawn from the composite picture of 11 innovative mental health projects, and this is discussed in light of relevant literature. The model provides a rich agenda to consider for services wanting to innovate or adopt innovations from elsewhere. The evaluation suggested the importance of studying innovation with a focus on context, process, and outcomes. PMID:22029930
Dedios, Maria Cecilia; Esperato, Alexo; De-Regil, Luz Maria; Peña-Rosas, Juan Pablo; Norris, Susan L
2017-03-21
Over the past decade, the World Health Organization (WHO) has implemented a standardized, evidence-informed guideline development process to assure technically sound and policy-relevant guidelines. This study is an independent evaluation of the adaptability of the guidelines produced by the Evidence and Programme Guidance unit, at the Department of Nutrition for Health and Development (NHD). The study systematizes the lessons learned by the NHD group at WHO. We used a mixed methods approach to determine the adaptability of the nutrition guidelines. Adaptability was defined as having two components; methodological quality and implementability of guidelines. Additionally, we gathered recommendations to improve future guideline development in nutrition actions for health and development. Data sources for this evaluation were official documentation and feedback (both qualitative and quantitative) from key stakeholders involved in the development of nutrition guidelines. The qualitative data was collected through a desk review and two waves of semi-structured interviews (n = 12) and was analyzed through axial coding. Guideline adaptability was assessed quantitatively using two standardized instruments completed by key stakeholders. The Appraisal Guideline for Research and Evaluation questionnaire, version II was used to assess guideline quality (n = 6), while implementability was assessed with the electronic version of the GuideLine Implementability Appraisal (n = 7). The nutrition evidence-informed guideline development process has several strengths, among them are the appropriate management of conflicts of interest of guideline developers and the systematic use of high-quality evidence to inform the recommendations. These features contribute to increase the methodological quality of the guidelines. The key areas for improvement are the limited implementability of the recommendations, the lack of explicit and precise implementation advice in the guidelines and challenges related to collaborative work within interdisciplinary groups. Overall, our study found that the nutrition evidence-informed guidelines are of good methodological quality but that the implementability requires improvement. The recommendations to improve guideline adaptability address the guideline content, the dynamics shaping interdisciplinary work, and actions for implementation feasibility. As WHO relies heavily on a standardized procedure to develop guidelines, the lessons learned may be applicable to guideline development across the organization and to other groups developing guidelines.
Williams, Emily C; Achtmeyer, Carol E; Young, Jessica P; Rittmueller, Stacey E; Ludman, Evette J; Lapham, Gwen T; Lee, Amy K; Chavez, Laura J; Berger, Douglas; Bradley, Katharine A
2016-01-01
Population-based alcohol screening, followed by brief intervention for patients who screen positive for unhealthy alcohol use, is widely recommended for primary care settings and considered a top prevention priority, but is challenging to implement. However, new policy initiatives in the U.S., including the Affordable Care Act, may help launch widespread implementation. While the nationwide Veterans Health Administration (VA) has achieved high rates of documented alcohol screening and brief intervention, research has identified quality problems with both. We conducted a qualitative key informant study to describe local implementation of alcohol screening and brief intervention from the perspectives of frontline adopters in VA primary care in order to understand the process of implementation and factors underlying quality problems. A purposive snowball sampling method was used to identify and recruit key informants from 5 VA primary care clinics in the northwestern U.S. Key informants completed 20-30 minute semi-structured interviews, which were recorded, transcribed, and qualitatively analyzed using template analysis. Key informants (N=32) included: clinical staff (n=14), providers (n=14), and administrative informants (n=4) with varying participation in implementation of and responsibility for alcohol screening and brief intervention at the medical center. Ten inter-related themes (5 a priori and 5 emergent) were identified and grouped into 3 applicable domains of Greenhalgh's conceptual framework for dissemination of innovations, including values of adopters (theme 1), processes of implementation (themes 2 and 3), and post-implementation consequences in care processes (themes 4-10). While key informants believed alcohol use was relevant to health and important to address, the process of implementation (in which no training was provided and electronic clinical reminders "just showed up") did not address critical training and infrastructure needs. Key informants lacked understanding of the goals of screening and brief intervention, believed referral to specialty addictions treatment (as opposed to offering brief intervention) was the only option for following up on a positive screen, reported concern regarding limited availability of treatment resources, and lacked optimism regarding patients' interest in seeking help. Findings suggest that the local process of implementing alcohol screening and brief intervention may have inadequately addressed important adopter needs and thus may have ultimately undermined, instead of capitalized on, staff and providers' belief in the importance of addressing alcohol use as part of primary care. Additional implementation strategies, such as training or academic detailing, may address some unmet needs and help improve the quality of both screening and brief intervention. However, these strategies may be resource-intensive and insufficient for comprehensively addressing implementation barriers. Published by Elsevier Inc.
Community Member and Stakeholder Perspectives on a Healthy Environment Initiative in North Carolina
Lowe-Wilson, Abby; Mouw, Mary Sherwyn; Jeon, Janet Yewon; Baber, Ceola Ross; Vu, Maihan B.; Bethell, Monique
2015-01-01
Introduction The North Carolina Community Transformation Grant Project (NC-CTG) aimed to implement policy, system, and environmental strategies to promote healthy eating, active living, tobacco-free living, and clinical and community preventive services to advance health equity and reduce health disparities for the state’s most vulnerable communities. This article presents findings from the Health Equity Collaborative Evaluation and Implementation Project, which assessed community and stakeholder perceptions of health equity for 3 NC-CTG strategies: farmers markets, shared use, and smoke-free multiunit housing. Methods In a triangulated qualitative evaluation, 6 photo elicitation (PE) sessions among 45 community members in 1 urban and 3 rural counties and key informant interviews among 22 stakeholders were conducted. Nine participants from the PE sessions and key informant interviews in the urban county subsequently participated in a stakeholder power analysis and mapping session (SPA) to discuss and identify people and organizations in their community perceived to be influential in addressing health equity–related issues. Results Evaluations of the PE sessions and key informant interviews indicated that access (convenience, cost, safety, and awareness of products and services) and community fit (community-defined quality, safety, values, and norms) were important constructs across the strategies. The SPA identified specific community- and faith-based organizations, health care organizations, and local government agencies as key stakeholders for future efforts. Conclusions Both community fit and access are essential constructs for promoting health equity. Findings demonstrate the feasibility of and need for formative research that engages community members and local stakeholders to shape context-specific, culturally relevant health promotion strategies. PMID:26270741
Quality: performance improvement, teamwork, information technology and protocols.
Coleman, Nana E; Pon, Steven
2013-04-01
Using the Institute of Medicine framework that outlines the domains of quality, this article considers four key aspects of health care delivery which have the potential to significantly affect the quality of health care within the pediatric intensive care unit. The discussion covers: performance improvement and how existing methods for reporting, review, and analysis of medical error relate to patient care; team composition and workflow; and the impact of information technologies on clinical practice. Also considered is how protocol-driven and standardized practice affects both patients and the fiscal interests of the health care system.
NASA Astrophysics Data System (ADS)
Keum, Jongho; Coulibaly, Paulin
2017-07-01
Adequate and accurate hydrologic information from optimal hydrometric networks is an essential part of effective water resources management. Although the key hydrologic processes in the water cycle are interconnected, hydrometric networks (e.g., streamflow, precipitation, groundwater level) have been routinely designed individually. A decision support framework is proposed for integrated design of multivariable hydrometric networks. The proposed method is applied to design optimal precipitation and streamflow networks simultaneously. The epsilon-dominance hierarchical Bayesian optimization algorithm was combined with Shannon entropy of information theory to design and evaluate hydrometric networks. Specifically, the joint entropy from the combined networks was maximized to provide the most information, and the total correlation was minimized to reduce redundant information. To further optimize the efficiency between the networks, they were designed by maximizing the conditional entropy of the streamflow network given the information of the precipitation network. Compared to the traditional individual variable design approach, the integrated multivariable design method was able to determine more efficient optimal networks by avoiding the redundant stations. Additionally, four quantization cases were compared to evaluate their effects on the entropy calculations and the determination of the optimal networks. The evaluation results indicate that the quantization methods should be selected after careful consideration for each design problem since the station rankings and the optimal networks can change accordingly.
Investigating accident causation through information network modelling.
Griffin, T G C; Young, M S; Stanton, N A
2010-02-01
Management of risk in complex domains such as aviation relies heavily on post-event investigations, requiring complex approaches to fully understand the integration of multi-causal, multi-agent and multi-linear accident sequences. The Event Analysis of Systemic Teamwork methodology (EAST; Stanton et al. 2008) offers such an approach based on network models. In this paper, we apply EAST to a well-known aviation accident case study, highlighting communication between agents as a central theme and investigating the potential for finding agents who were key to the accident. Ultimately, this work aims to develop a new model based on distributed situation awareness (DSA) to demonstrate that the risk inherent in a complex system is dependent on the information flowing within it. By identifying key agents and information elements, we can propose proactive design strategies to optimize the flow of information and help work towards avoiding aviation accidents. Statement of Relevance: This paper introduces a novel application of an holistic methodology for understanding aviation accidents. Furthermore, it introduces an ongoing project developing a nonlinear and prospective method that centralises distributed situation awareness and communication as themes. The relevance of findings are discussed in the context of current ergonomic and aviation issues of design, training and human-system interaction.
NASA Astrophysics Data System (ADS)
Alfalou, Ayman; Mansour, Ali
2009-09-01
Nowadays, protecting information is a major issue in any transmission system, as showed by an increasing number of research papers related to this topic. Optical encoding methods, such as a Double Random Phase encryption system i.e. DRP, are widely used and cited in the literature. DRP systems have very simple principle and they are easily applicable to most images (B&W, gray levels or color). Moreover, some applications require an enhanced encoding level based on multiencryption scheme and including biometric keys (as digital fingerprints). The enhancement should be done without increasing transmitted or stored information. In order to achieve that goal, a new approach for simultaneous multiplexing & encoding of several target images is developed in this manuscript. By introducing two additional security levels, our approach enhances the security level of a classic "DRP" system. Our first security level consists in using several independent image-keys (randomly and structurally) along with a new multiplexing algorithm. At this level, several target images (multiencryption) are used. This part can reduce needed information (encoding information). At the second level a standard DRP system is included. Finally, our approach can detect if any vandalism attempt has been done on transmitted encrypted images.
Anomaly detection in reconstructed quantum states using a machine-learning technique
NASA Astrophysics Data System (ADS)
Hara, Satoshi; Ono, Takafumi; Okamoto, Ryo; Washio, Takashi; Takeuchi, Shigeki
2014-02-01
The accurate detection of small deviations in given density matrices is important for quantum information processing. Here we propose a method based on the concept of data mining. We demonstrate that the proposed method can more accurately detect small erroneous deviations in reconstructed density matrices, which contain intrinsic fluctuations due to the limited number of samples, than a naive method of checking the trace distance from the average of the given density matrices. This method has the potential to be a key tool in broad areas of physics where the detection of small deviations of quantum states reconstructed using a limited number of samples is essential.
Research and Implementation of Tibetan Word Segmentation Based on Syllable Methods
NASA Astrophysics Data System (ADS)
Jiang, Jing; Li, Yachao; Jiang, Tao; Yu, Hongzhi
2018-03-01
Tibetan word segmentation (TWS) is an important problem in Tibetan information processing, while abbreviated word recognition is one of the key and most difficult problems in TWS. Most of the existing methods of Tibetan abbreviated word recognition are rule-based approaches, which need vocabulary support. In this paper, we propose a method based on sequence tagging model for abbreviated word recognition, and then implement in TWS systems with sequence labeling models. The experimental results show that our abbreviated word recognition method is fast and effective and can be combined easily with the segmentation model. This significantly increases the effect of the Tibetan word segmentation.
Wildman, John; McMeekin, Peter; Grieve, Eleanor; Briggs, Andrew
2016-11-01
With an ageing population there is a move towards the use of assisted living technologies (ALTs) to provide social care and health care services, and to improve service processes. These technologies are at the forefront of the integration of health and social care. However, economic evaluations of ALTs, and indeed economic evaluations of any interventions providing both health benefits and benefits beyond health are complex. This paper considers the challenges faced by evaluators and presents a method of economic evaluation for use with interventions where traditional methods may not be suitable for informing funders and decision makers. We propose a method, combining economic evaluation techniques, that can accommodate health outcomes and outcomes beyond health through the use of a common numeraire. Such economic evaluations can benefit both the public and private sector, firstly by ensuring the efficient allocation of resources. And secondly, by providing information for individuals who, in the market for ALTs, face consumption decisions that are infrequent and for which there may be no other sources of information. We consider these issues in the welfarist, extra-welfarist and capabilities frameworks, which we link to attributes in an individual production model. This approach allows for the valuation of the health component of any such intervention and the valuation of key social care attributes and processes. Finally, we present a set of considerations for evaluators highlighting the key issues that need to be considered in this type of economic evaluation. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.
Sun, Hong; Guns, Tias; Fierro, Ana Carolina; Thorrez, Lieven; Nijssen, Siegfried; Marchal, Kathleen
2012-01-01
Computationally retrieving biologically relevant cis-regulatory modules (CRMs) is not straightforward. Because of the large number of candidates and the imperfection of the screening methods, many spurious CRMs are detected that are as high scoring as the biologically true ones. Using ChIP-information allows not only to reduce the regions in which the binding sites of the assayed transcription factor (TF) should be located, but also allows restricting the valid CRMs to those that contain the assayed TF (here referred to as applying CRM detection in a query-based mode). In this study, we show that exploiting ChIP-information in a query-based way makes in silico CRM detection a much more feasible endeavor. To be able to handle the large datasets, the query-based setting and other specificities proper to CRM detection on ChIP-Seq based data, we developed a novel powerful CRM detection method ‘CPModule’. By applying it on a well-studied ChIP-Seq data set involved in self-renewal of mouse embryonic stem cells, we demonstrate how our tool can recover combinatorial regulation of five known TFs that are key in the self-renewal of mouse embryonic stem cells. Additionally, we make a number of new predictions on combinatorial regulation of these five key TFs with other TFs documented in TRANSFAC. PMID:22422841
Fan, Desheng; Meng, Xiangfeng; Wang, Yurong; Yang, Xiulun; Pan, Xuemei; Peng, Xiang; He, Wenqi; Dong, Guoyan; Chen, Hongyi
2015-04-10
A multiple-image authentication method with a cascaded multilevel architecture in the Fresnel domain is proposed, in which a synthetic encoded complex amplitude is first fabricated, and its real amplitude component is generated by iterative amplitude encoding, random sampling, and space multiplexing for the low-level certification images, while the phase component of the synthetic encoded complex amplitude is constructed by iterative phase information encoding and multiplexing for the high-level certification images. Then the synthetic encoded complex amplitude is iteratively encoded into two phase-type ciphertexts located in two different transform planes. During high-level authentication, when the two phase-type ciphertexts and the high-level decryption key are presented to the system and then the Fresnel transform is carried out, a meaningful image with good quality and a high correlation coefficient with the original certification image can be recovered in the output plane. Similar to the procedure of high-level authentication, in the case of low-level authentication with the aid of a low-level decryption key, no significant or meaningful information is retrieved, but it can result in a remarkable peak output in the nonlinear correlation coefficient of the output image and the corresponding original certification image. Therefore, the method realizes different levels of accessibility to the original certification image for different authority levels with the same cascaded multilevel architecture.
Novel optical scanning cryptography using Fresnel telescope imaging.
Yan, Aimin; Sun, Jianfeng; Hu, Zhijuan; Zhang, Jingtao; Liu, Liren
2015-07-13
We propose a new method called modified optical scanning cryptography using Fresnel telescope imaging technique for encryption and decryption of remote objects. An image or object can be optically encrypted on the fly by Fresnel telescope scanning system together with an encryption key. For image decryption, the encrypted signals are received and processed with an optical coherent heterodyne detection system. The proposed method has strong performance through use of secure Fresnel telescope scanning with orthogonal polarized beams and efficient all-optical information processing. The validity of the proposed method is demonstrated by numerical simulations and experimental results.
Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm
NASA Astrophysics Data System (ADS)
Rachmawati, Dian; Sharif, Amer; Jaysilen; Andri Budiman, Mohammad
2018-01-01
Security becomes a very important issue in data transmission and there are so many methods to make files more secure. One of that method is cryptography. Cryptography is a method to secure file by writing the hidden code to cover the original file. Therefore, if the people do not involve in cryptography, they cannot decrypt the hidden code to read the original file. There are many methods are used in cryptography, one of that method is hybrid cryptosystem. A hybrid cryptosystem is a method that uses a symmetric algorithm to secure the file and use an asymmetric algorithm to secure the symmetric algorithm key. In this research, TEA algorithm is used as symmetric algorithm and LUC algorithm is used as an asymmetric algorithm. The system is tested by encrypting and decrypting the file by using TEA algorithm and using LUC algorithm to encrypt and decrypt the TEA key. The result of this research is by using TEA Algorithm to encrypt the file, the cipher text form is the character from ASCII (American Standard for Information Interchange) table in the form of hexadecimal numbers and the cipher text size increase by sixteen bytes as the plaintext length is increased by eight characters.
Tsotsos, John K.
2017-01-01
Much has been written about how the biological brain might represent and process visual information, and how this might inspire and inform machine vision systems. Indeed, tremendous progress has been made, and especially during the last decade in the latter area. However, a key question seems too often, if not mostly, be ignored. This question is simply: do proposed solutions scale with the reality of the brain's resources? This scaling question applies equally to brain and to machine solutions. A number of papers have examined the inherent computational difficulty of visual information processing using theoretical and empirical methods. The main goal of this activity had three components: to understand the deep nature of the computational problem of visual information processing; to discover how well the computational difficulty of vision matches to the fixed resources of biological seeing systems; and, to abstract from the matching exercise the key principles that lead to the observed characteristics of biological visual performance. This set of components was termed complexity level analysis in Tsotsos (1987) and was proposed as an important complement to Marr's three levels of analysis. This paper revisits that work with the advantage that decades of hindsight can provide. PMID:28848458
Tsotsos, John K
2017-01-01
Much has been written about how the biological brain might represent and process visual information, and how this might inspire and inform machine vision systems. Indeed, tremendous progress has been made, and especially during the last decade in the latter area. However, a key question seems too often, if not mostly, be ignored. This question is simply: do proposed solutions scale with the reality of the brain's resources? This scaling question applies equally to brain and to machine solutions. A number of papers have examined the inherent computational difficulty of visual information processing using theoretical and empirical methods. The main goal of this activity had three components: to understand the deep nature of the computational problem of visual information processing; to discover how well the computational difficulty of vision matches to the fixed resources of biological seeing systems; and, to abstract from the matching exercise the key principles that lead to the observed characteristics of biological visual performance. This set of components was termed complexity level analysis in Tsotsos (1987) and was proposed as an important complement to Marr's three levels of analysis. This paper revisits that work with the advantage that decades of hindsight can provide.
Evaluation of the structures size in the liquid-gas flow by gamma-ray absorption
NASA Astrophysics Data System (ADS)
Zych, Marcin; Hanus, Robert; Jaszczur, Marek; Świsulski, Dariusz; Petryka, Leszek; Jodłowski, Paweł; Zych, Piotr
2018-06-01
The rapid development of tomography methods particularly electrical, X and gamma rays allows for a wide range of the information about flow structure. However, all of such methods are quite complicated. At the same time much simpler systems as the measuring system of gamma rays absorption, allows to obtain a all key flow information which describe the two-phase flow. In the article the results of analyzes of radiometric signal that not only allow to recognize the type of flow, but also the assessment of forming structures are presented. Calculation and interpretation of the data were based on the crosscorrelation and cross-spectral density function. In order to verify the calculations the photographic documentation made during the measurements was used.
MRI brain tumor segmentation based on improved fuzzy c-means method
NASA Astrophysics Data System (ADS)
Deng, Wankai; Xiao, Wei; Pan, Chao; Liu, Jianguo
2009-10-01
This paper focuses on the image segmentation, which is one of the key problems in medical image processing. A new medical image segmentation method is proposed based on fuzzy c- means algorithm and spatial information. Firstly, we classify the image into the region of interest and background using fuzzy c means algorithm. Then we use the information of the tissues' gradient and the intensity inhomogeneities of regions to improve the quality of segmentation. The sum of the mean variance in the region and the reciprocal of the mean gradient along the edge of the region are chosen as an objective function. The minimum of the sum is optimum result. The result shows that the clustering segmentation algorithm is effective.
Likumahuwa-Ackman, Sonja; Angier, Heather; Sumic, Aleksandra; Harding, Rose L; Cottrell, Erika K; Cohen, Deborah J; Nelson, Christine A; Burdick, Timothy E; Wallace, Lorraine S; Gallia, Charles; DeVoe, Jennifer E
2015-01-01
The Patient-Centered Outcomes Research Institute has accelerated conversations about the importance of actively engaging stakeholders in all aspects of comparative effectiveness research (CER). Other scientific disciplines have a history of stakeholder engagement, yet few empirical examples exist of how these stakeholders can inform and enrich CER. Here we present a case study which includes the methods used to engage stakeholders, what we learned from them, and how we incorporated their ideas in a CER project. We selected stakeholders from key groups, built relationships with them and collected their feedback through interviews, observation and ongoing meetings during the four research process phases: proposal development, adapting study methods, understanding the context and information technology tool design and refinement. PMID:26274796
Introduction to the Wetland Book 1: Wetland structure and function, management, and nethods
Davidson, Nick C.; Middleton, Beth A.; McInnes, Robert J.; Everard, Mark; Irvine, Kenneth; Van Dam, Anne A.; Finlayson, C. Max; Finlayson, C. Max; Everard, Mark; Irvine, Kenneth; McInnes, Robert J.; Middleton, Beth A.; Van Dam, Anne A.; Davidson, Nick C.
2016-01-01
The Wetland Book 1 is designed as a ‘first port-of-call’ reference work for information on the structure and functions of wetlands, current approaches to wetland management, and methods for researching and understanding wetlands. Contributions by experts summarize key concepts, orient the reader to the major issues, and support further research on such issues by individuals and multidisciplinary teams. The Wetland Book 1 is organized in three parts - Wetland structure and function; Wetland management; and Wetland methods - each of which is divided into a number of thematic Sections. Each Section starts with one or more overview chapters, supported by chapters providing further information and case studies on different aspects of the theme.
Likumahuwa-Ackman, Sonja; Angier, Heather; Sumic, Aleksandra; Harding, Rose L; Cottrell, Erika K; Cohen, Deborah J; Nelson, Christine A; Burdick, Timothy E; Wallace, Lorraine S; Gallia, Charles; DeVoe, Jennifer E
2015-08-01
The Patient-Centered Outcomes Research Institute has accelerated conversations about the importance of actively engaging stakeholders in all aspects of comparative effectiveness research (CER). Other scientific disciplines have a history of stakeholder engagement, yet few empirical examples exist of how these stakeholders can inform and enrich CER. Here we present a case study which includes the methods used to engage stakeholders, what we learned from them, and how we incorporated their ideas in a CER project. We selected stakeholders from key groups, built relationships with them and collected their feedback through interviews, observation and ongoing meetings during the four research process phases: proposal development, adapting study methods, understanding the context and information technology tool design and refinement.
The assessment of cognitive errors using an observer-rated method.
Drapeau, Martin
2014-01-01
Cognitive Errors (CEs) are a key construct in cognitive behavioral therapy (CBT). Integral to CBT is that individuals with depression process information in an overly negative or biased way, and that this bias is reflected in specific depressotypic CEs which are distinct from normal information processing. Despite the importance of this construct in CBT theory, practice, and research, few methods are available to researchers and clinicians to reliably identify CEs as they occur. In this paper, the author presents a rating system, the Cognitive Error Rating Scale, which can be used by trained observers to identify and assess the cognitive errors of patients or research participants in vivo, i.e., as they are used or reported by the patients or participants. The method is described, including some of the more important rating conventions to be considered when using the method. This paper also describes the 15 cognitive errors assessed, and the different summary scores, including valence of the CEs, that can be derived from the method.
Spatial Lattice Modulation for MIMO Systems
NASA Astrophysics Data System (ADS)
Choi, Jiwook; Nam, Yunseo; Lee, Namyoon
2018-06-01
This paper proposes spatial lattice modulation (SLM), a spatial modulation method for multipleinput-multiple-output (MIMO) systems. The key idea of SLM is to jointly exploit spatial, in-phase, and quadrature dimensions to modulate information bits into a multi-dimensional signal set that consists oflattice points. One major finding is that SLM achieves a higher spectral efficiency than the existing spatial modulation and spatial multiplexing methods for the MIMO channel under the constraint ofM-ary pulseamplitude-modulation (PAM) input signaling per dimension. In particular, it is shown that when the SLM signal set is constructed by using dense lattices, a significant signal-to-noise-ratio (SNR) gain, i.e., a nominal coding gain, is attainable compared to the existing methods. In addition, closed-form expressions for both the average mutual information and average symbol-vector-error-probability (ASVEP) of generic SLM are derived under Rayleigh-fading environments. To reduce detection complexity, a low-complexity detection method for SLM, which is referred to as lattice sphere decoding, is developed by exploiting lattice theory. Simulation results verify the accuracy of the conducted analysis and demonstrate that the proposed SLM techniques achieve higher average mutual information and lower ASVEP than do existing methods.
Perinatal Alcohol and Drug Use: Access to Essential Services in 12 California Counties. CPS Report.
ERIC Educational Resources Information Center
Soman, Laurie A.; And Others
A research project acquired and compiled information on the services (from state and federally funded programs in California) available for chemically dependent pregnant and parenting women and young drug-exposed children from birth to age 3. The research methods consisted of a literature review and a survey of 13 key state and federally funded…
ERIC Educational Resources Information Center
Whitehead, Michele L.; Gutierrez, Laura; Miller, Melody
2014-01-01
The purpose of this study is to gain an understanding of current academic medical library circulation polices and examine methods libraries utilize to meet patron needs. Key informants were selected from five states. Statistics regarding financial practices, users, services, space access, and circulation practices were collected via survey…
ERIC Educational Resources Information Center
Huq, Nafisa Lira; Chowdhury, Mahbub Elahi
2012-01-01
In this qualitative study of brothel-based Female Sex Workers (FSWs), the authors explored factors that influence safe sex practices of FSWs within an integrated HIV intervention. Qualitative methods, including focus group discussions (FGDs), in-depth interviews and key informant interviews were applied in four brothels in Bangladesh. Young and…
Long-Term Outcome from a Medium Secure Service for People with Intellectual Disability
ERIC Educational Resources Information Center
Alexander, R. T.; Crouch, K.; Halstead, S.; Piachaud, J.
2006-01-01
Background: The purpose of this paper is to describe long-term outcomes for patients discharged over a 12-year period from a medium secure service for people with intellectual disabilities (ID). Methods: A cohort study using case-notes analysis and a structured interview of current key informants. Results: Eleven per cent of the sample was…
Peter H. Wychoff; James S. Clark
2000-01-01
Ecologists and foresters have long noted a link between tree growth rate and mortality, and recent work suggests that i&erspecific differences in low growth tolerauce is a key force shaping forest structure. Little information is available, however, on the growth-mortality relationship for most species. We present three methods for estimating growth-mortality...
ERIC Educational Resources Information Center
Wei, Tie; Ford, Julie
2015-01-01
This article provides information about the integration of innovative hands-on activities within a sophomore-level Fluid Mechanics course at New Mexico Tech. The course introduces students to the fundamentals of fluid mechanics with emphasis on teaching key equations and methods of analysis for solving real-world problems. Strategies and examples…
Airborne Multi-Spectral Minefield Survey
2005-05-01
Swedish Defence Research Agency), GEOSPACE (Austria), GTD ( Ingenieria de Sistemas y Software Industrial, Spain), IMEC (Ineruniversity MicroElectronic...RTO-MP-SET-092 18 - 1 UNCLASSIFIED/UNLIMITED UNCLASSIFIED/UNLIMITED Airborne Multi-Spectral Minefield Survey Dirk-Jan de Lange, Eric den...actions is the severe lack of baseline information. To respond to this in a rapid way, cost-efficient data acquisition methods are a key issue. de
Logie, Carmen; James, LLana; Charles, Tamicka; Maxwell, John; Salam, Khaled; Woodford, Michael
2011-01-01
Objectives. We investigated how persons from key populations at higher risk of HIV exposure interpreted the process and outcomes of the Step Study HIV-1 vaccine trial, which was terminated early, and implications for willingness to participate in and community support for HIV vaccine research. Methods. We used qualitative methods and a community-based approach in 9 focus groups (n = 72) among ethnically and sexually diverse populations and 6 semistructured key informant interviews in Ontario, Canada, in 2007 to 2008. Results. Participants construed social meaning from complex clinical and biomedical phenomena. Social representations and mental models emerged in fears of vaccine-induced infection, conceptualizations of unfair recruitment practices and increased risk behaviors among trial participants, and questioning of informed consent. Narratives of altruism and the common good demonstrated support for future trials. Conclusions. Public discourse on HIV vaccine trials is a productive means of interpreting complex clinical trial processes and outcomes in the context of existing beliefs and experiences regarding HIV vaccines, medical research, and historical disenfranchisement. Strategic engagement with social representations and mental models may promote meaningful community involvement in biomedical HIV prevention research. PMID:21778490
Evolutionary crossroads in developmental biology: Cnidaria
Technau, Ulrich; Steele, Robert E.
2011-01-01
There is growing interest in the use of cnidarians (corals, sea anemones, jellyfish and hydroids) to investigate the evolution of key aspects of animal development, such as the formation of the third germ layer (mesoderm), the nervous system and the generation of bilaterality. The recent sequencing of the Nematostella and Hydra genomes, and the establishment of methods for manipulating gene expression, have inspired new research efforts using cnidarians. Here, we present the main features of cnidarian models and their advantages for research, and summarize key recent findings using these models that have informed our understanding of the evolution of the developmental processes underlying metazoan body plan formation. PMID:21389047
Evolutionary crossroads in developmental biology: Cnidaria.
Technau, Ulrich; Steele, Robert E
2011-04-01
There is growing interest in the use of cnidarians (corals, sea anemones, jellyfish and hydroids) to investigate the evolution of key aspects of animal development, such as the formation of the third germ layer (mesoderm), the nervous system and the generation of bilaterality. The recent sequencing of the Nematostella and Hydra genomes, and the establishment of methods for manipulating gene expression, have inspired new research efforts using cnidarians. Here, we present the main features of cnidarian models and their advantages for research, and summarize key recent findings using these models that have informed our understanding of the evolution of the developmental processes underlying metazoan body plan formation.
Probabilistic Exposure Analysis for Chemical Risk Characterization
Bogen, Kenneth T.; Cullen, Alison C.; Frey, H. Christopher; Price, Paul S.
2009-01-01
This paper summarizes the state of the science of probabilistic exposure assessment (PEA) as applied to chemical risk characterization. Current probabilistic risk analysis methods applied to PEA are reviewed. PEA within the context of risk-based decision making is discussed, including probabilistic treatment of related uncertainty, interindividual heterogeneity, and other sources of variability. Key examples of recent experience gained in assessing human exposures to chemicals in the environment, and other applications to chemical risk characterization and assessment, are presented. It is concluded that, although improvements continue to be made, existing methods suffice for effective application of PEA to support quantitative analyses of the risk of chemically induced toxicity that play an increasing role in key decision-making objectives involving health protection, triage, civil justice, and criminal justice. Different types of information required to apply PEA to these different decision contexts are identified, and specific PEA methods are highlighted that are best suited to exposure assessment in these separate contexts. PMID:19223660
Information Filtering via a Scaling-Based Function
Qiu, Tian; Zhang, Zi-Ke; Chen, Guang
2013-01-01
Finding a universal description of the algorithm optimization is one of the key challenges in personalized recommendation. In this article, for the first time, we introduce a scaling-based algorithm (SCL) independent of recommendation list length based on a hybrid algorithm of heat conduction and mass diffusion, by finding out the scaling function for the tunable parameter and object average degree. The optimal value of the tunable parameter can be abstracted from the scaling function, which is heterogeneous for the individual object. Experimental results obtained from three real datasets, Netflix, MovieLens and RYM, show that the SCL is highly accurate in recommendation. More importantly, compared with a number of excellent algorithms, including the mass diffusion method, the original hybrid method, and even an improved version of the hybrid method, the SCL algorithm remarkably promotes the personalized recommendation in three other aspects: solving the accuracy-diversity dilemma, presenting a high novelty, and solving the key challenge of cold start problem. PMID:23696829
NASA Astrophysics Data System (ADS)
Wang, X.; Xu, L.
2018-04-01
One of the most important applications of remote sensing classification is water extraction. The water index (WI) based on Landsat images is one of the most common ways to distinguish water bodies from other land surface features. But conventional WI methods take into account spectral information only form a limited number of bands, and therefore the accuracy of those WI methods may be constrained in some areas which are covered with snow/ice, clouds, etc. An accurate and robust water extraction method is the key to the study at present. The support vector machine (SVM) using all bands spectral information can reduce for these classification error to some extent. Nevertheless, SVM which barely considers spatial information is relatively sensitive to noise in local regions. Conditional random field (CRF) which considers both spatial information and spectral information has proven to be able to compensate for these limitations. Hence, in this paper, we develop a systematic water extraction method by taking advantage of the complementarity between the SVM and a water index-guided stochastic fully-connected conditional random field (SVM-WIGSFCRF) to address the above issues. In addition, we comprehensively evaluate the reliability and accuracy of the proposed method using Landsat-8 operational land imager (OLI) images of one test site. We assess the method's performance by calculating the following accuracy metrics: Omission Errors (OE) and Commission Errors (CE); Kappa coefficient (KP) and Total Error (TE). Experimental results show that the new method can improve target detection accuracy under complex and changeable environments.
Simple group password-based authenticated key agreements for the integrated EPR information system.
Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng
2013-04-01
The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.
Deng, Wu; Zhao, Huimin; Zou, Li; Li, Yuanyuan; Li, Zhengguang
2012-08-01
Computer and information technology popularizes in the medicine manufacturing enterprise for its potentials in working efficiency and service quality. In allusion to the explosive data and information of application system in current medicine manufacturing enterprise, we desire to propose a novel application information system integration platform in medicine manufacturing enterprise, which based on a combination of RFID technology and SOA, to implement information sharing and alternation. This method exploits the application integration platform across service interface layer to invoke the RFID middleware. The loose coupling in integration solution is realized by Web services. The key techniques in RFID event components and expanded role-based security access mechanism are studied in detail. Finally, a case study is implemented and tested to evidence our understanding on application system integration platform in medicine manufacturing enterprise.
Multiple-stage pure phase encoding with biometric information
NASA Astrophysics Data System (ADS)
Chen, Wen
2018-01-01
In recent years, many optical systems have been developed for securing information, and optical encryption/encoding has attracted more and more attention due to the marked advantages, such as parallel processing and multiple-dimensional characteristics. In this paper, an optical security method is presented based on pure phase encoding with biometric information. Biometric information (such as fingerprint) is employed as security keys rather than plaintext used in conventional optical security systems, and multiple-stage phase-encoding-based optical systems are designed for generating several phase-only masks with biometric information. Subsequently, the extracted phase-only masks are further used in an optical setup for encoding an input image (i.e., plaintext). Numerical simulations are conducted to illustrate the validity, and the results demonstrate that high flexibility and high security can be achieved.
NASA Astrophysics Data System (ADS)
Iisaka, Joji; Sakurai-Amano, Takako
1994-08-01
This paper describes an integrated approach to terrain feature detection and several methods to estimate spatial information from SAR (synthetic aperture radar) imagery. Spatial information of image features as well as spatial association are key elements in terrain feature detection. After applying a small feature preserving despeckling operation, spatial information such as edginess, texture (smoothness), region-likeliness and line-likeness of objects, target sizes, and target shapes were estimated. Then a trapezoid shape fuzzy membership function was assigned to each spatial feature attribute. Fuzzy classification logic was employed to detect terrain features. Terrain features such as urban areas, mountain ridges, lakes and other water bodies as well as vegetated areas were successfully identified from a sub-image of a JERS-1 SAR image. In the course of shape analysis, a quantitative method was developed to classify spatial patterns by expanding a spatial pattern through the use of a series of pattern primitives.
NASA Astrophysics Data System (ADS)
Peng, Xiang; Zhang, Peng; Cai, Lilong
In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.
Memristive crypto primitive for building highly secure physical unclonable functions
NASA Astrophysics Data System (ADS)
Gao, Yansong; Ranasinghe, Damith C.; Al-Sarawi, Said F.; Kavehei, Omid; Abbott, Derek
2015-08-01
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information.
Measuring Integration of Cancer Services to Support Performance Improvement: The CSI Survey
Dobrow, Mark J.; Paszat, Lawrence; Golden, Brian; Brown, Adalsteinn D.; Holowaty, Eric; Orchard, Margo C.; Monga, Neerav; Sullivan, Terrence
2009-01-01
Objective: To develop a measure of cancer services integration (CSI) that can inform clinical and administrative decision-makers in their efforts to monitor and improve cancer system performance. Methods: We employed a systematic approach to measurement development, including review of existing cancer/health services integration measures, key-informant interviews and focus groups with cancer system leaders. The research team constructed a Web-based survey that was field- and pilot-tested, refined and then formally conducted on a sample of cancer care providers and administrators in Ontario, Canada. We then conducted exploratory factor analysis to identify key dimensions of CSI. Results: A total of 1,769 physicians, other clinicians and administrators participated in the survey, responding to a 67-item questionnaire. The exploratory factor analysis identified 12 factors that were linked to three broader dimensions: clinical, functional and vertical system integration. Conclusions: The CSI Survey provides important insights on a range of typically unmeasured aspects of the coordination and integration of cancer services, representing a new tool to inform performance improvement efforts. PMID:20676250
Memristive crypto primitive for building highly secure physical unclonable functions.
Gao, Yansong; Ranasinghe, Damith C; Al-Sarawi, Said F; Kavehei, Omid; Abbott, Derek
2015-08-04
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information.
Lowe, Dianne; Ebi, Kristie L.; Forsberg, Bertil
2011-01-01
Introduction: With climate change, there has been an increase in the frequency, intensity and duration of heatwave events. In response to the devastating mortality and morbidity of recent heatwave events, many countries have introduced heatwave early warning systems (HEWS). HEWS are designed to reduce the avoidable human health consequences of heatwaves through timely notification of prevention measures to vulnerable populations. Objective: To identify the key characteristics of HEWS in European countries to help inform modification of current, and development of, new systems and plans. Methods: We searched the internet to identify HEWS policy or government documents for 33 European countries and requested information from relevant organizations. We translated the HEWS documents and extracted details on the trigger indicators, thresholds for action, notification strategies, message intermediaries, communication and dissemination strategies, prevention strategies recommended and specified target audiences. Findings and Conclusions: Twelve European countries have HEWS. Although there are many similarities among the HEWS, there also are differences in key characteristics that could inform improvements in heatwave early warning plans. PMID:22408593
Memristive crypto primitive for building highly secure physical unclonable functions
Gao, Yansong; Ranasinghe, Damith C.; Al-Sarawi, Said F.; Kavehei, Omid; Abbott, Derek
2015-01-01
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information. PMID:26239669
Multiplexed Sequence Encoding: A Framework for DNA Communication.
Zakeri, Bijan; Carr, Peter A; Lu, Timothy K
2016-01-01
Synthetic DNA has great propensity for efficiently and stably storing non-biological information. With DNA writing and reading technologies rapidly advancing, new applications for synthetic DNA are emerging in data storage and communication. Traditionally, DNA communication has focused on the encoding and transfer of complete sets of information. Here, we explore the use of DNA for the communication of short messages that are fragmented across multiple distinct DNA molecules. We identified three pivotal points in a communication-data encoding, data transfer & data extraction-and developed novel tools to enable communication via molecules of DNA. To address data encoding, we designed DNA-based individualized keyboards (iKeys) to convert plaintext into DNA, while reducing the occurrence of DNA homopolymers to improve synthesis and sequencing processes. To address data transfer, we implemented a secret-sharing system-Multiplexed Sequence Encoding (MuSE)-that conceals messages between multiple distinct DNA molecules, requiring a combination key to reveal messages. To address data extraction, we achieved the first instance of chromatogram patterning through multiplexed sequencing, thereby enabling a new method for data extraction. We envision these approaches will enable more widespread communication of information via DNA.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dowell, Larry Jonathan
Disclosed is a method and device for aligning at least two digital images. An embodiment may use frequency-domain transforms of small tiles created from each image to identify substantially similar, "distinguishing" features within each of the images, and then align the images together based on the location of the distinguishing features. To accomplish this, an embodiment may create equal sized tile sub-images for each image. A "key" for each tile may be created by performing a frequency-domain transform calculation on each tile. A information-distance difference between each possible pair of tiles on each image may be calculated to identify distinguishingmore » features. From analysis of the information-distance differences of the pairs of tiles, a subset of tiles with high discrimination metrics in relation to other tiles may be located for each image. The subset of distinguishing tiles for each image may then be compared to locate tiles with substantially similar keys and/or information-distance metrics to other tiles of other images. Once similar tiles are located for each image, the images may be aligned in relation to the identified similar tiles.« less
Effects of a Television Drama about Environmental Exposure to Toxic Substances
Kennedy, May G.; Eustis Turf, Elizabeth; Wilson-Genderson, Maureen; Wells, Kristen; Huang, Grace C.; Beck, Vicki
2011-01-01
Objective. This study assessed short-term outcomes of viewing an episode of a prime-time television drama in which a child developed cancer after environmental exposure to an illegal pesticide. The study explored the effects among viewers of feeling transported into a narrative world. Methods. Respondents (n=2,139) to a post-episode Internet panel survey were asked if they had seen the show and asked questions about their demographic information, their frequency of viewing the television show, the degree to which they had felt transported into a narrative world created by the drama, and their knowledge and beliefs about the health effects of environmental exposure. Conversations with key informants from federal agencies and advocacy groups were also held. Results. Episode viewing and narrative transportation were positively associated with knowledge of toxic exposure effects, and transported viewers reported being more likely to report an unusually high number of cancer cases to authorities. The show also appeared to have prompted a clarification of federal pesticide-testing policy. Conclusions. Entertainment Education is a promising strategy for disseminating key points of information about environmental health. PMID:21563723
Older people's views on what they need to successfully adjust to life with a hearing aid.
Kelly, Timothy B; Tolson, Debbie; Day, Tracy; McColgan, Gillian; Kroll, Thilo; Maclaren, William
2013-05-01
This article reports a study exploring what older people believe would enable them to adjust to and gain maximum benefit from wearing a hearing aid. A mixed methods approach was employed during 2006 involving interviews with key stakeholders, a survey across three Scottish health board areas and focus groups. Nine key stakeholders from six national and local organisations were interviewed about the needs of older people being fitted with hearing aids. In total, 240 older people belonging to three different types of hearing impaired older people were surveyed: long-term users of hearing aids, new hearing aid users, and those on a waiting list from urban and rural areas (response rate = 24%). A series of eight follow-up focus groups with 31 audiology patients was held. Health professionals appeared to neglect appropriate provision of information and overly rely on technological interventions. Of 154 older people already fitted with hearing aids, only 52% of hearing aid users reported receiving enough practical help post fitting and only 41% reported receiving enough support. Approximately 40% reported not feeling confident in the use of their aids or their controls. Older people wanted more information than they received both before and after hearing aid fitting. Information provision and attention to the psychosocial aspects of care are key to enabling older people to adjust and optimise hearing aid benefit. © 2013 Blackwell Publishing Ltd.
Interventions and controls to prevent emergency service vehicle incidents: A mixed methods review.
Bui, David P; Balland, Samantha; Giblin, Casey; Jung, Alesia M; Kramer, Sandy; Peng, Abigail; Aquino, Marie Corazon Ponce; Griffin, Stephanie; French, Dustin D; Pollack Porter, Keshia; Crothers, Steve; Burgess, Jefferey L
2018-06-01
Emergency service vehicle incidents (ESVI), including crashes, rollovers, and roadside struck-by-incidents, are a leading cause of occupational fatality and injury among firefighters and other emergency responders. Though there are numerous strategies and interventions to prevent ESVIs, the evidence base for these strategies is limited and dispersed. The goal of this study was to gather and present a review of evidence-based ESVI interventions. We searched five academic databases for articles published within the last decade featuring interventions to reduce or prevent ESVIs. We interviewed key informants from fire departments serving major metropolitan areas for additional interventions. Interventions from both sources were summarized and data on intervention effectiveness were reported when available. Sixty-five articles were included in the final review and 17 key informant interviews were completed. Most articles focused on vehicle engineering interventions (38%), followed by policy and administration interventions (26%), environmental engineering interventions (19%) and education or training (17%). Most key informants reported policy (49%) and training interventions (29%). Enhanced drivers' training and risk management programs were associated with 19-50% and 19-58% reductions in ESVIs, respectively. Only a limited number of interventions to address ESVIs had adequate outcome data. Based on the available data, training and risk management approaches may be particularly effective approaches to reducing ESVIs. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.
Heterogeneity image patch index and its application to consumer video summarization.
Dang, Chinh T; Radha, Hayder
2014-06-01
Automatic video summarization is indispensable for fast browsing and efficient management of large video libraries. In this paper, we introduce an image feature that we refer to as heterogeneity image patch (HIP) index. The proposed HIP index provides a new entropy-based measure of the heterogeneity of patches within any picture. By evaluating this index for every frame in a video sequence, we generate a HIP curve for that sequence. We exploit the HIP curve in solving two categories of video summarization applications: key frame extraction and dynamic video skimming. Under the key frame extraction frame-work, a set of candidate key frames is selected from abundant video frames based on the HIP curve. Then, a proposed patch-based image dissimilarity measure is used to create affinity matrix of these candidates. Finally, a set of key frames is extracted from the affinity matrix using a min–max based algorithm. Under video skimming, we propose a method to measure the distance between a video and its skimmed representation. The video skimming problem is then mapped into an optimization framework and solved by minimizing a HIP-based distance for a set of extracted excerpts. The HIP framework is pixel-based and does not require semantic information or complex camera motion estimation. Our simulation results are based on experiments performed on consumer videos and are compared with state-of-the-art methods. It is shown that the HIP approach outperforms other leading methods, while maintaining low complexity.
Human action recognition based on spatial-temporal descriptors using key poses
NASA Astrophysics Data System (ADS)
Hu, Shuo; Chen, Yuxin; Wang, Huaibao; Zuo, Yaqing
2014-11-01
Human action recognition is an important area of pattern recognition today due to its direct application and need in various occasions like surveillance and virtual reality. In this paper, a simple and effective human action recognition method is presented based on the key poses of human silhouette and the spatio-temporal feature. Firstly, the contour points of human silhouette have been gotten, and the key poses are learned by means of K-means clustering based on the Euclidean distance between each contour point and the centre point of the human silhouette, and then the type of each action is labeled for further match. Secondly, we obtain the trajectories of centre point of each frame, and create a spatio-temporal feature value represented by W to describe the motion direction and speed of each action. The value W contains the information of location and temporal order of each point on the trajectories. Finally, the matching stage is performed by comparing the key poses and W between training sequences and test sequences, the nearest neighbor sequences is found and its label supplied the final result. Experiments on the public available Weizmann datasets show the proposed method can improve accuracy by distinguishing amphibious poses and increase suitability for real-time applications by reducing the computational cost.
Weir, Charlene R.; Nebeker, Jonathan J.R.; Hicken, Bret L.; Campo, Rebecca; Drews, Frank; LeBar, Beth
2007-01-01
Objective Computerized Provider Order Entry (CPOE) with electronic documentation, and computerized decision support dramatically changes the information environment of the practicing clinician. Prior work patterns based on paper, verbal exchange, and manual methods are replaced with automated, computerized, and potentially less flexible systems. The objective of this study is to explore the information management strategies that clinicians use in the process of adapting to a CPOE system using cognitive task analysis techniques. Design Observation and semi-structured interviews were conducted with 88 primary-care clinicians at 10 Veterans Administration Medical Centers. Measurements Interviews were taped, transcribed, and extensively analyzed to identify key information management goals, strategies, and tasks. Tasks were aggregated into groups, common components across tasks were clarified, and underlying goals and strategies identified. Results Nearly half of the identified tasks were not fully supported by the available technology. Six core components of tasks were identified. Four meta-cognitive information management goals emerged: 1) Relevance Screening; 2) Ensuring Accuracy; 3) Minimizing memory load; and 4) Negotiating Responsibility. Strategies used to support these goals are presented. Conclusion Users develop a wide array of information management strategies that allow them to successfully adapt to new technology. Supporting the ability of users to develop adaptive strategies to support meta-cognitive goals is a key component of a successful system. PMID:17068345
Code of Federal Regulations, 2011 CFR
2011-01-01
... INFORMATION AND RESTRICTED DATA Physical Security § 95.18 Key personnel. The senior management official and... Clearance. Other key management officials, as determined by the CSA, must be granted an access authorization... organization's policies or practices in the performance of activities involving classified information. This...
Transportation key facts 2002 : useful information about transportation in Oregon
DOT National Transportation Integrated Search
2002-01-01
The Oregon Department of Transportation 2002 edition of Key Facts summarizes information related to transportation in Oregon. Key Facts can be used for a variety of planning and budget purposes, and it is intended to provide: : an introduction to tra...
The Importance of Experiential Learning
NASA Astrophysics Data System (ADS)
Stanford, Jennifer
2017-04-01
As student numbers increase year on year, the ability to provide experiential learning opportunities and individual formative feedback is decreasing. As an important mechanism for cementing understanding of key concept thresholds in physical Earth sciences, practical based learning is paramount, especially for students with diverse learning abilities. According to Steinaker & Bell's taxonomy, experiential learning and dissemination of information to peers is key for students to make the transition to being much deeper learners. Furthermore, practical based learning also provides opportunity for varied methods of assessment, which are otherwise more challenging to devise. I here present results from practical, experiential based learning within the context of Foundation Year teaching, which shows that predominantly, students found experiential learning to be both a positive and rewarding part of their curriculum. Key aspects of these findings are now being translated to the design of new curricula.
Authentication Without Secrets
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pierson, Lyndon G.; Robertson, Perry J.
This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integritymore » of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.« less
Practical Quantum Cryptography for Secure Free-Space Communications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.
1999-02-01
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less
FREE-SPACE QUANTUM CRYPTOGRAPHY IN DAYLIGHT
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, R.J.; Buttler, W.T.
2000-01-01
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less
Comparing hair-morphology and molecular methods to identify fecal samples from Neotropical felids
Alberts, Carlos C.; Saranholi, Bruno H.; Frei, Fernando; Galetti, Pedro M.
2017-01-01
To avoid certain problems encountered with more-traditional and invasive methods in behavioral-ecology studies of mammalian predators, such as felids, molecular approaches have been employed to identify feces found in the field. However, this method requires a complete molecular biology laboratory, and usually also requires very fresh fecal samples to avoid DNA degradation. Both conditions are normally absent in the field. To address these difficulties, identification based on morphological characters (length, color, banding, scales and medullar patterns) of hairs found in feces could be employed as an alternative. In this study we constructed a morphological identification key for guard hairs of eight Neotropical felids (jaguar, oncilla, Geoffroy’s cat, margay, ocelot, Pampas cat, puma and jaguarundi) and compared its efficiency to that of a molecular identification method, using the ATP6 region as a marker. For this molecular approach, we simulated some field conditions by postponing sample-conservation procedures. A blind test of the identification key obtained a nearly 70% overall success rate, which we considered equivalent to or better than the results of some molecular methods (probably due to DNA degradation) found in other studies. The jaguar, puma and jaguarundi could be unequivocally discriminated from any other Neotropical felid. On a scale ranging from inadequate to excellent, the key proved poor only for the margay, with only 30% of its hairs successfully identified using this key; and have intermediate success rates for the remaining species, the oncilla, Geoffroy’s cat, ocelot and Pampas cat, were intermediate. Complementary information about the known distributions of felid populations may be necessary to substantially improve the results obtained with the key. Our own molecular results were even better, since all blind-tested samples were correctly identified. Part of these identifications were made from samples kept in suboptimal conditions, with some samples remaining outdoors for up to seven days, simulating conditions in the field. It appears that both methods can be used, depending on the available laboratory facilities and on the expected results. PMID:28880947
Addressing unmeasured confounding in comparative observational research.
Zhang, Xiang; Faries, Douglas E; Li, Hu; Stamey, James D; Imbens, Guido W
2018-04-01
Observational pharmacoepidemiological studies can provide valuable information on the effectiveness or safety of interventions in the real world, but one major challenge is the existence of unmeasured confounder(s). While many analytical methods have been developed for dealing with this challenge, they appear under-utilized, perhaps due to the complexity and varied requirements for implementation. Thus, there is an unmet need to improve understanding the appropriate course of action to address unmeasured confounding under a variety of research scenarios. We implemented a stepwise search strategy to find articles discussing the assessment of unmeasured confounding in electronic literature databases. Identified publications were reviewed and characterized by the applicable research settings and information requirements required for implementing each method. We further used this information to develop a best practice recommendation to help guide the selection of appropriate analytical methods for assessing the potential impact of unmeasured confounding. Over 100 papers were reviewed, and 15 methods were identified. We used a flowchart to illustrate the best practice recommendation which was driven by 2 critical components: (1) availability of information on the unmeasured confounders; and (2) goals of the unmeasured confounding assessment. Key factors for implementation of each method were summarized in a checklist to provide further assistance to researchers for implementing these methods. When assessing comparative effectiveness or safety in observational research, the impact of unmeasured confounding should not be ignored. Instead, we suggest quantitatively evaluating the impact of unmeasured confounding and provided a best practice recommendation for selecting appropriate analytical methods. Copyright © 2018 John Wiley & Sons, Ltd.
Martinez, Ramon; Ordunez, Pedro; Soliz, Patricia N; Ballesteros, Michael F
2016-01-01
Background The complexity of current injury-related health issues demands the usage of diverse and massive data sets for comprehensive analyses, and application of novel methods to communicate data effectively to the public health community, decision-makers and the public. Recent advances in information visualisation, availability of new visual analytic methods and tools, and progress on information technology provide an opportunity for shaping the next generation of injury surveillance. Objective To introduce data visualisation conceptual bases, and propose a visual analytic and visualisation platform in public health surveillance for injury prevention and control. Methods The paper introduces data visualisation conceptual bases, describes a visual analytic and visualisation platform, and presents two real-world case studies illustrating their application in public health surveillance for injury prevention and control. Results Application of visual analytic and visualisation platform is presented as solution for improved access to heterogeneous data sources, enhance data exploration and analysis, communicate data effectively, and support decision-making. Conclusions Applications of data visualisation concepts and visual analytic platform could play a key role to shape the next generation of injury surveillance. Visual analytic and visualisation platform could improve data use, the analytic capacity, and ability to effectively communicate findings and key messages. The public health surveillance community is encouraged to identify opportunities to develop and expand its use in injury prevention and control. PMID:26728006
Stakeholder-focused evaluation of an online course for health care providers.
Dunet, Diane O; Reyes, Michele
2006-01-01
Different people who have a stake or interest in a training course (stakeholders) may have markedly different definitions of what constitutes "training success" and how they will use evaluation results. Stakeholders at multiple levels within and outside of the organization guided the development of an evaluation plan for a Web-based training course on hemochromatosis. Stakeholder interests and values were reflected in the type, level, and rigor of evaluation methods selected. Our mixed-method evaluation design emphasized small sample sizes and repeated measures. Limited resources for evaluation were leveraged by focusing on the data needs of key stakeholders, understanding how they wanted to use evaluation results, and collecting data needed for stakeholder decision making. Regular feedback to key stakeholders provided opportunities for updating the course evaluation plan to meet emerging needs for new or different information. Early and repeated involvement of stakeholders in the evaluation process also helped build support for the final product. Involving patient advocacy groups, managers, and representative course participants improved the course and enhanced product dissemination. For training courses, evaluation planning is an opportunity to tailor methods and data collection to meet the information needs of particular stakeholders. Rigorous evaluation research of every training course may be infeasible or unwarranted; however, course evaluations can be improved by good planning. A stakeholder-focused approach can build a picture of the results and impact of training while fostering the practical use of evaluation data.
Combination of Rivest-Shamir-Adleman Algorithm and End of File Method for Data Security
NASA Astrophysics Data System (ADS)
Rachmawati, Dian; Amalia, Amalia; Elviwani
2018-03-01
Data security is one of the crucial issues in the delivery of information. One of the ways which used to secure the data is by encoding it into something else that is not comprehensible by human beings by using some crypto graphical techniques. The Rivest-Shamir-Adleman (RSA) cryptographic algorithm has been proven robust to secure messages. Since this algorithm uses two different keys (i.e., public key and private key) at the time of encryption and decryption, it is classified as asymmetric cryptography algorithm. Steganography is a method that is used to secure a message by inserting the bits of the message into a larger media such as an image. One of the known steganography methods is End of File (EoF). In this research, the cipher text resulted from the RSA algorithm is compiled into an array form and appended to the end of the image. The result of the EoF is the image which has a line with black gradations under it. This line contains the secret message. This combination of cryptography and steganography in securing the message is expected to increase the security of the message, since the message encryption technique (RSA) is mixed with the data hiding technique (EoF).
The Status and Promise of Advanced M&V: An Overview of “M&V 2.0” Methods, Tools, and Applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Franconi, Ellen; Gee, Matt; Goldberg, Miriam
Advanced measurement and verification (M&V) of energy efficiency savings, often referred to as M&V 2.0 or advanced M&V, is currently an object of much industry attention. Thus far, however, there has been a lack of clarity about what techniques M&V 2.0 includes, how those techniques differ from traditional approaches, what the key considerations are for their use, and what value propositions M&V 2.0 presents to different stakeholders. The objective of this paper is to provide background information and frame key discussion points related to advanced M&V. The paper identifies the benefits, methods, and requirements of advanced M&V and outlines keymore » technical issues for applying these methods. It presents an overview of the distinguishing elements of M&V 2.0 tools and of how the industry is addressing needs for tool testing, consistency, and standardization, and it identifies opportunities for collaboration. In this paper, we consider two key features of M&V 2.0: (1) automated analytics that can provide ongoing, near-real-time savings estimates, and (2) increased data granularity in terms of frequency, volume, or end-use detail. Greater data granularity for large numbers of customers, such as that derived from comprehensive implementation of advanced metering infrastructure (AMI) systems, leads to very large data volumes. This drives interest in automated processing systems. It is worth noting, however, that automated processing can provide value even when applied to less granular data, such as monthly consumption data series. Likewise, more granular data, such as interval or end-use data, delivers value with or without automated processing, provided the processing is manageable. But it is the combination of greater data detail with automated processing that offers the greatest opportunity for value. Using M&V methods that capture load shapes together with automated processing1 can determine savings in near-real time to provide stakeholders with more timely and detailed information. This information can be used to inform ongoing building operations, provide early input on energy efficiency program design, or assess the impact of efficiency by location and time of day. Stakeholders who can make use of such information include regulators, energy efficiency program administrators, program evaluators, contractors and aggregators, building owners, the investment community, and grid planners. Although each stakeholder has its own priorities and challenges related to savings measurement and verification, the potential exists for all to draw from a single set of efficiency valuation data. Such an integrated approach could provide a base consistency across stakeholder uses.« less
DOT National Transportation Integrated Search
2004-01-28
This document presents the detailed plan to conduct the Key Informants Interviews Test, one of several test activities to be conducted as part of the national evaluation of the regional, multi-modal 511 Traveler Information System Model Deployment. T...
Santhi, B; Dheeptha, B
2016-01-01
The field of telemedicine has gained immense momentum, owing to the need for transmitting patients' information securely. This paper puts forth a unique method for embedding data in medical images. It is based on edge based embedding and XOR coding. The algorithm proposes a novel key generation technique by utilizing the design of a sudoku puzzle to enhance the security of the transmitted message. The edge blocks of the cover image alone, are utilized to embed the payloads. The least significant bit of the pixel values are changed by XOR coding depending on the data to be embedded and the key generated. Hence the distortion in the stego image is minimized and the information is retrieved accurately. Data is embedded in the RGB planes of the cover image, thus increasing its embedding capacity. Several measures including peak signal noise ratio (PSNR), mean square error (MSE), universal image quality index (UIQI) and correlation coefficient (R) are the image quality measures that have been used to analyze the quality of the stego image. It is evident from the results that the proposed technique outperforms the former methodologies.
The segmentation of bones in pelvic CT images based on extraction of key frames.
Yu, Hui; Wang, Haijun; Shi, Yao; Xu, Ke; Yu, Xuyao; Cao, Yuzhen
2018-05-22
Bone segmentation is important in computed tomography (CT) imaging of the pelvis, which assists physicians in the early diagnosis of pelvic injury, in planning operations, and in evaluating the effects of surgical treatment. This study developed a new algorithm for the accurate, fast, and efficient segmentation of the pelvis. The proposed method consists of two main parts: the extraction of key frames and the segmentation of pelvic CT images. Key frames were extracted based on pixel difference, mutual information and normalized correlation coefficient. In the pelvis segmentation phase, skeleton extraction from CT images and a marker-based watershed algorithm were combined to segment the pelvis. To meet the requirements of clinical application, physician's judgment is needed. Therefore the proposed methodology is semi-automated. In this paper, 5 sets of CT data were used to test the overlapping area, and 15 CT images were used to determine the average deviation distance. The average overlapping area of the 5 sets was greater than 94%, and the minimum average deviation distance was approximately 0.58 pixels. In addition, the key frame extraction efficiency and the running time of the proposed method were evaluated on 20 sets of CT data. For each set, approximately 13% of the images were selected as key frames, and the average processing time was approximately 2 min (the time for manual marking was not included). The proposed method is able to achieve accurate, fast, and efficient segmentation of pelvic CT image sequences. Segmentation results not only provide an important reference for early diagnosis and decisions regarding surgical procedures, they also offer more accurate data for medical image registration, recognition and 3D reconstruction.
Secure and Efficient Signature Scheme Based on NTRU for Mobile Payment
NASA Astrophysics Data System (ADS)
Xia, Yunhao; You, Lirong; Sun, Zhe; Sun, Zhixin
2017-10-01
Mobile payment becomes more and more popular, however the traditional public-key encryption algorithm has higher requirements for hardware which is not suitable for mobile terminals of limited computing resources. In addition, these public-key encryption algorithms do not have the ability of anti-quantum computing. This paper researches public-key encryption algorithm NTRU for quantum computation through analyzing the influence of parameter q and k on the probability of generating reasonable signature value. Two methods are proposed to improve the probability of generating reasonable signature value. Firstly, increase the value of parameter q. Secondly, add the authentication condition that meet the reasonable signature requirements during the signature phase. Experimental results show that the proposed signature scheme can realize the zero leakage of the private key information of the signature value, and increase the probability of generating the reasonable signature value. It also improve rate of the signature, and avoid the invalid signature propagation in the network, but the scheme for parameter selection has certain restrictions.
NASA Astrophysics Data System (ADS)
Guo, H., II
2016-12-01
Spatial distribution information of mountainous area settlement place is of great significance to the earthquake emergency work because most of the key earthquake hazardous areas of china are located in the mountainous area. Remote sensing has the advantages of large coverage and low cost, it is an important way to obtain the spatial distribution information of mountainous area settlement place. At present, fully considering the geometric information, spectral information and texture information, most studies have applied object-oriented methods to extract settlement place information, In this article, semantic constraints is to be added on the basis of object-oriented methods. The experimental data is one scene remote sensing image of domestic high resolution satellite (simply as GF-1), with a resolution of 2 meters. The main processing consists of 3 steps, the first is pretreatment, including ortho rectification and image fusion, the second is Object oriented information extraction, including Image segmentation and information extraction, the last step is removing the error elements under semantic constraints, in order to formulate these semantic constraints, the distribution characteristics of mountainous area settlement place must be analyzed and the spatial logic relation between settlement place and other objects must be considered. The extraction accuracy calculation result shows that the extraction accuracy of object oriented method is 49% and rise up to 86% after the use of semantic constraints. As can be seen from the extraction accuracy, the extract method under semantic constraints can effectively improve the accuracy of mountainous area settlement place information extraction. The result shows that it is feasible to extract mountainous area settlement place information form GF-1 image, so the article proves that it has a certain practicality to use domestic high resolution optical remote sensing image in earthquake emergency preparedness.
Distinguishability of quantum states and shannon complexity in quantum cryptography
NASA Astrophysics Data System (ADS)
Arbekov, I. M.; Molotkov, S. N.
2017-07-01
The proof of the security of quantum key distribution is a rather complex problem. Security is defined in terms different from the requirements imposed on keys in classical cryptography. In quantum cryptography, the security of keys is expressed in terms of the closeness of the quantum state of an eavesdropper after key distribution to an ideal quantum state that is uncorrelated to the key of legitimate users. A metric of closeness between two quantum states is given by the trace metric. In classical cryptography, the security of keys is understood in terms of, say, the complexity of key search in the presence of side information. In quantum cryptography, side information for the eavesdropper is given by the whole volume of information on keys obtained from both quantum and classical channels. The fact that the mathematical apparatuses used in the proof of key security in classical and quantum cryptography are essentially different leads to misunderstanding and emotional discussions [1]. Therefore, one should be able to answer the question of how different cryptographic robustness criteria are related to each other. In the present study, it is shown that there is a direct relationship between the security criterion in quantum cryptography, which is based on the trace distance determining the distinguishability of quantum states, and the criterion in classical cryptography, which uses guesswork on the determination of a key in the presence of side information.
Postmastectomy Information Needs and Information-seeking Motives for Women with Breast Cancer
Latifi, Masoome; Salimi, Sohrab; Barahmand, Nilofar; Fahimnia, Fateme; Allahbakhshian Farsani, Leili
2018-01-01
Background: Health information-seeking behavior is a key concept in the empowerment of women with breast cancer after mastectomy for self-care management. Thus, a real understanding of their information needs and their information-seeking behavior may open up new opportunities for their postsurgery cares. The current research was conducted to identify the information needs and information-seeking motives of women with breast cancer after mastectomy. Materials and Methods: This is an applied qualitative research. Samples included 17 women with breast cancer after mastectomy selected from two hospitals of Shahid Mohammadi and Persian Gulf and Omid Central Chemotherapy in Bandar Abbas. Data were collected using semi-structured interview on winter 2014 and analyzed using qualitative content analysis method. Results: Three basic contents were extracted including information needs related to mental health, physical health related to disease and personal daily activities along with their subcategories, and representing common experience and perception of mastectomized women seeking for health information. Furthermore, hope, self-esteem, return to life, and available social support resources were expressed as the main information-seeking motives. Conclusion: Considering research findings, mastectomized women need to receive information in wide range of health and thus pursue purposeful behavior. Hence, it is necessary that required actions and measures are taken by health-care authorities, especially institutions responsible for women health, to support and meet information needs of the patients considering their information-seeking motives. PMID:29862224
Developing an Engineering Design Process Assessment using Mixed Methods.
Wind, Stefanie A; Alemdar, Meltem; Lingle, Jeremy A; Gale, Jessica D; Moore, Roxanne A
Recent reforms in science education worldwide include an emphasis on engineering design as a key component of student proficiency in the Science, Technology, Engineering, and Mathematics disciplines. However, relatively little attention has been directed to the development of psychometrically sound assessments for engineering. This study demonstrates the use of mixed methods to guide the development and revision of K-12 Engineering Design Process (EDP) assessment items. Using results from a middle-school EDP assessment, this study illustrates the combination of quantitative and qualitative techniques to inform item development and revisions. Overall conclusions suggest that the combination of quantitative and qualitative evidence provides an in-depth picture of item quality that can be used to inform the revision and development of EDP assessment items. Researchers and practitioners can use the methods illustrated here to gather validity evidence to support the interpretation and use of new and existing assessments.
Novek, Sheila; Wilkinson, Heather
2017-01-01
Aim Developing strategies to ensure the safe participation of people with dementia in research is critical to support their wider inclusion in research and to advance knowledge in the areas of dementia policy and practice. Objectives This literature review synthesizes and critically appraises different approaches to promote the safe participation of people with dementia in qualitative research. Methods Two databases were searched for articles that discuss the methodological or ethical aspects of qualitative research involving people with dementia. We did not focus on informed consent or ethical review processes as these have been reviewed elsewhere. Findings Key issues that impact participant safety include: language, gatekeepers, the research relationship, communication, dealing with distress, knowledge dissemination, and researcher skills. Conclusion By synthesizing different approaches to safety and highlighting areas of debate, we hope to advance discussion and to contribute to the development of inclusive research methods.
Elements of Scenario-Based Learning on Suicidal Patient Care Using Real-Time Video.
Lu, Chuehfen; Lee, Hueying; Hsu, Shuhui; Shu, Inmei
2016-01-01
This study aims understanding of students' learning experiences when receiving scenario-based learning combined with real-time video. Videos that recorded student nurses intervention with a suicidal standardized patient (SP) were replayed immediately as teaching materials. Videos clips and field notes from ten classes were analysed. Investigators and method triangulation were used to boost the robustness of the study. Three key elements, emotional involvement, concretizing of the teaching material and substitute learning were identified. Emotions were evoked among the SP, the student performer and the students who were observing, thus facilitating a learning effect. Concretizing of the teaching material refers to students were able to focus on the discussions using visual and verbal information. Substitute learning occurred when the students watching the videos, both the strengths and weaknesses represented were similar to those that would be likely to occur. These key elements explicate their learning experience and suggested a strategic teaching method.
ERIC Educational Resources Information Center
Barefoot, Helen; Oliver, Martin; Mellar, Harvey
2016-01-01
This paper explores the ways in which information about course pedagogy has been represented to potential students through national descriptors and specifications such as the United Kingdom's Key Information Set. It examines the extent to which such descriptors provide helpful information about pedagogy, for example innovative uses of technology.…
Protheroe, Joanne; Rogers, Anne; Kennedy, Anne P; Macdonald, Wendy; Lee, Victoria
2008-10-13
Patient information has been viewed as a key component of self-management. However, little attention has been given to methods of dissemination or implementation of effective information strategies. Previous problems identified with the use and implementation of patient information point to the need to explore the way in which patients engage with and use information to support self-management for chronic conditions. Four published qualitative studies from a programme of research about self-management were analysed as a group; these included studies of the management of inflammatory bowel disease (IBD); self-help in anxiety and depression (SHADE); menorrhagia, treatment, information, and preference (MENTIP) study; and self-help for irritable bowel syndrome (IBS). For the analysis, we used an adapted meta-ethnographic approach to the synthesis of qualitative data in order to develop an evidence base. The ontological status and experience of the condition in everyday life was the most dominant theme to emerge from this synthesis. This, coupled with access to and experience of traditional health services responses, shaped the engagement with and use of information to support self-management. Five key elements were found which were likely to influence this: the perception and awareness of alternative self-management possibilities; the prior extent and nature of engagement with information; the extent of and ability to self-manage; opportunities for use of the information and the stage of the illness career; and congruence and synergy with the professional role. People with chronic conditions need support from providers in both supply and engagement with information, in a way which gives legitimacy to the person's own self-management strategies and possible alternatives. Thus, a link could usefully be made between information offered, as well as patients' past experiences of self-management and engagement with services for their condition. The timeliness of the information should be considered, both in terms of the illness career and the type of condition (i.e., before depression gets too bad or time to reflect on existing knowledge about a condition and how it is to be managed) and in terms of the pre-existing relationship with services (i.e., options explored and tried). More considered use of information (how it is provided, by whom, and at what point it should be introduced) is key to facilitating patients' engagement with and therefore use of information to support self-management.
2010-01-01
Background In Ontario, local public health inspectors play an important frontline role in protecting the public from foodborne illness. This study was an in-depth exploration of public health inspectors' perceptions of the key food safety issues in public health, and their opinions and needs with regards to food safety information resources. Methods Four focus group discussions were conducted with public health inspectors from the Central West region of Ontario, Canada during June and July, 2008. A questioning route was used to standardize qualitative data collection. Audio recordings of sessions were transcribed verbatim and data-driven content analysis was performed. Results A total of 23 public health inspectors participated in four focus group discussions. Five themes emerged as key food safety issues: time-temperature abuse, inadequate handwashing, cross-contamination, the lack of food safety knowledge by food handlers and food premise operators, and the lack of food safety information and knowledge about specialty foods (i.e., foods from different cultures). In general, participants reported confidence with their current knowledge of food safety issues and foodborne pathogens. Participants highlighted the need for a central source for food safety information, access to up-to-date food safety information, resources in different languages, and additional food safety information on specialty foods. Conclusions The information gathered from these focus groups can provide a basis for the development of resources that will meet the specific needs of public health inspectors involved in protecting and promoting food safety. PMID:20553592
Entanglement entropy of dispersive media from thermodynamic entropy in one higher dimension.
Maghrebi, M F; Reid, M T H
2015-04-17
A dispersive medium becomes entangled with zero-point fluctuations in the vacuum. We consider an arbitrary array of material bodies weakly interacting with a quantum field and compute the quantum mutual information between them. It is shown that the mutual information in D dimensions can be mapped to classical thermodynamic entropy in D+1 dimensions. As a specific example, we compute the mutual information both analytically and numerically for a range of separation distances between two bodies in D=2 dimensions and find a logarithmic correction to the area law at short separations. A key advantage of our method is that it allows the strong subadditivity property to be easily verified.
Rich Language Analysis for Counterterrorism
NASA Astrophysics Data System (ADS)
Guidère, Mathieu; Howard, Newton; Argamon, Shlomo
Accurate and relevant intelligence is critical for effective counterterrorism. Too much irrelevant information is as bad or worse than not enough information. Modern computational tools promise to provide better search and summarization capabilities to help analysts filter and select relevant and key information. However, to do this task effectively, such tools must have access to levels of meaning beyond the literal. Terrorists operating in context-rich cultures like fundamentalist Islam use messages with multiple levels of interpretation, which are easily misunderstood by non-insiders. This chapter discusses several kinds of such “encryption” used by terrorists and insurgents in the Arabic language, and how knowledge of such methods can be used to enhance computational text analysis techniques for use in counterterrorism.
Forensic Evaluation of Deaf Individuals: Challenges and Strategies.
Pollard, Robert Q; Berlinski, Brian T
2017-01-01
Forensic evaluation of deaf individuals presents unique challenges due to many examinees' fund of information deficits, potential for language deprivation, and examiners' frequent lack of creativity regarding communication methods. This article describes challenges most frequently encountered in competency to stand trial and criminal responsibility evaluations and offers strategies for overcoming them. The value of employing multiple communication methods, especially the use of illustrations, is emphasized. Suggestions also are offered regarding preparing evaluation reports and effectively communicating "key deaf fundamentals" to legal personnel. Encouragement is offered for qualified, sign-fluent professionals to engage in forensic work.
Ribosomal RNA: a key to phylogeny
NASA Technical Reports Server (NTRS)
Olsen, G. J.; Woese, C. R.
1993-01-01
As molecular phylogeny increasingly shapes our understanding of organismal relationships, no molecule has been applied to more questions than have ribosomal RNAs. We review this role of the rRNAs and some of the insights that have been gained from them. We also offer some of the practical considerations in extracting the phylogenetic information from the sequences. Finally, we stress the importance of comparing results from multiple molecules, both as a method for testing the overall reliability of the organismal phylogeny and as a method for more broadly exploring the history of the genome.
Design and Diagnosis Problem Solving with Multifunctional Technical Knowledge Bases
1992-09-29
STRUCTURE METHODOLOGY Design problem solving is a complex activity involving a number of subtasks. and a number of alternative methods potentially available...Conference on Artificial Intelligence. London: The British Computer Society, pp. 621-633. Friedland, P. (1979). Knowledge-based experimental design ...Computing Milieuxl: Management of Computing and Information Systems- -ty,*m man- agement General Terms: Design . Methodology Additional Key Words and Phrases
ERIC Educational Resources Information Center
Watt, Michael
2016-01-01
The purpose of this study was to inform the deliberations of a policymakers' working group by investigating what key actors in the materials' marketplace are doing to align digital and print-based materials with the Australian Curriculum and what steps need to be taken to deliver aligned materials to schools. Content analysis method was used to…
Naz, Anila; Rosenberg, Ellen; Andersson, Neil; Labonté, Ronald; Andermann, Anne
2016-11-01
To assess the feasibility of implementing a clinical decision aid called the CLEAR Toolkit that helps front-line health workers ask their patients about social determinants of health, refer to local support resources, and advocate for wider social change. A mixed-methods study using quantitative (online self-completed questionnaires) and qualitative (in-depth interviews, focus groups, and key informant interviews) methods. A large, university-affiliated family medicine teaching centre in Montreal, Que, serving one of the most ethnically diverse populations in Canada. Fifty family doctors and allied health workers responded to the online survey (response rate of 50.0%), 15 completed in-depth interviews, 14 joined 1 of 2 focus groups, and 3 senior administrators participated in key informant interviews. Our multimethod approach included an online survey of front-line health workers to assess current practices and collect feedback on the tool kit; in-depth interviews to understand why they consider certain patients to be more vulnerable and how to help such patients; focus groups to explore barriers to asking about social determinants of health; and key informant interviews with high-level administrators to identify organizational levers for changing practice. Senior administrators consider asking about social determinants to be part of the mandate of health workers. However, barriers perceived by front-line clinicians include insufficient training in social history taking, uncertainty about how to address these issues in clinical practice, and a lack of knowledge of local referral resources. Health workers with specific ways of asking patients about their social challenges were more likely to report having helped their patients as compared with those who did not know how to ask (93.8% vs 52.9%; P = .003). While health workers recognize the importance of social determinants, many are unsure how to ask about these often sensitive issues or where to refer patients. The CLEAR Toolkit can be easily adapted to local contexts to help front-line health workers initiate dialogue around social challenges and better support patients in clinical practice. Copyright© the College of Family Physicians of Canada.
NASA Technical Reports Server (NTRS)
Cruse, T. A.
1987-01-01
The objective is the development of several modular structural analysis packages capable of predicting the probabilistic response distribution for key structural variables such as maximum stress, natural frequencies, transient response, etc. The structural analysis packages are to include stochastic modeling of loads, material properties, geometry (tolerances), and boundary conditions. The solution is to be in terms of the cumulative probability of exceedance distribution (CDF) and confidence bounds. Two methods of probability modeling are to be included as well as three types of structural models - probabilistic finite-element method (PFEM); probabilistic approximate analysis methods (PAAM); and probabilistic boundary element methods (PBEM). The purpose in doing probabilistic structural analysis is to provide the designer with a more realistic ability to assess the importance of uncertainty in the response of a high performance structure. Probabilistic Structural Analysis Method (PSAM) tools will estimate structural safety and reliability, while providing the engineer with information on the confidence that should be given to the predicted behavior. Perhaps most critically, the PSAM results will directly provide information on the sensitivity of the design response to those variables which are seen to be uncertain.
NASA Technical Reports Server (NTRS)
Cruse, T. A.; Burnside, O. H.; Wu, Y.-T.; Polch, E. Z.; Dias, J. B.
1988-01-01
The objective is the development of several modular structural analysis packages capable of predicting the probabilistic response distribution for key structural variables such as maximum stress, natural frequencies, transient response, etc. The structural analysis packages are to include stochastic modeling of loads, material properties, geometry (tolerances), and boundary conditions. The solution is to be in terms of the cumulative probability of exceedance distribution (CDF) and confidence bounds. Two methods of probability modeling are to be included as well as three types of structural models - probabilistic finite-element method (PFEM); probabilistic approximate analysis methods (PAAM); and probabilistic boundary element methods (PBEM). The purpose in doing probabilistic structural analysis is to provide the designer with a more realistic ability to assess the importance of uncertainty in the response of a high performance structure. Probabilistic Structural Analysis Method (PSAM) tools will estimate structural safety and reliability, while providing the engineer with information on the confidence that should be given to the predicted behavior. Perhaps most critically, the PSAM results will directly provide information on the sensitivity of the design response to those variables which are seen to be uncertain.
Rose, K E
1999-01-01
This article discusses issues relating to information arising from a qualitative study of the experiences of informal carers of terminally ill cancer patients. Qualitative data analysis, drawing on methods of literary criticism, revealed that information was a key area in carers' experience. The findings are presented in the context of needing to provide individualized care to every family and deal with information needs relating to the illness and prognosis. The question of who is in possession of what information is raised, and the effect that this can have on couples is discussed, together with the issue of false information which carers may receive. The discussion centres on the complexity of understanding carers' information needs and considers how these are affected by the context within which carers operate. The work of Glaser and Strauss on awareness contexts is discussed in this respect. Finally, the importance of the nurse's role as a sensitive mediator of information is considered.
Volumetric Light-field Encryption at the Microscopic Scale
Li, Haoyu; Guo, Changliang; Muniraj, Inbarasan; Schroeder, Bryce C.; Sheridan, John T.; Jia, Shu
2017-01-01
We report a light-field based method that allows the optical encryption of three-dimensional (3D) volumetric information at the microscopic scale in a single 2D light-field image. The system consists of a microlens array and an array of random phase/amplitude masks. The method utilizes a wave optics model to account for the dominant diffraction effect at this new scale, and the system point-spread function (PSF) serves as the key for encryption and decryption. We successfully developed and demonstrated a deconvolution algorithm to retrieve both spatially multiplexed discrete data and continuous volumetric data from 2D light-field images. Showing that the method is practical for data transmission and storage, we obtained a faithful reconstruction of the 3D volumetric information from a digital copy of the encrypted light-field image. The method represents a new level of optical encryption, paving the way for broad industrial and biomedical applications in processing and securing 3D data at the microscopic scale. PMID:28059149
NASA Astrophysics Data System (ADS)
Dalarmelina, Carlos A.; Adegbite, Saheed A.; Pereira, Esequiel da V.; Nunes, Reginaldo B.; Rocha, Helder R. O.; Segatto, Marcelo E. V.; Silva, Jair A. L.
2017-05-01
Block-level detection is required to decode what may be classified as selective control information (SCI) such as control format indicator in 4G-long-term evolution systems. Using optical orthogonal frequency division multiplexing over radio-over-fiber (RoF) links, we report the experimental evaluation of an SCI detection scheme based on a time-domain correlation (TDC) technique in comparison with the conventional maximum likelihood (ML) approach. When compared with the ML method, it is shown that the TDC method improves detection performance over both 20 and 40 km of standard single mode fiber (SSMF) links. We also report a performance analysis of the TDC scheme in noisy visible light communication channel models after propagation through 40 km of SSMF. Experimental and simulation results confirm that the TDC method is attractive for practical orthogonal frequency division multiplexing-based RoF and fiber-wireless systems. Unlike the ML method, another key benefit of the TDC is that it requires no channel estimation.
Volumetric Light-field Encryption at the Microscopic Scale
NASA Astrophysics Data System (ADS)
Li, Haoyu; Guo, Changliang; Muniraj, Inbarasan; Schroeder, Bryce C.; Sheridan, John T.; Jia, Shu
2017-01-01
We report a light-field based method that allows the optical encryption of three-dimensional (3D) volumetric information at the microscopic scale in a single 2D light-field image. The system consists of a microlens array and an array of random phase/amplitude masks. The method utilizes a wave optics model to account for the dominant diffraction effect at this new scale, and the system point-spread function (PSF) serves as the key for encryption and decryption. We successfully developed and demonstrated a deconvolution algorithm to retrieve both spatially multiplexed discrete data and continuous volumetric data from 2D light-field images. Showing that the method is practical for data transmission and storage, we obtained a faithful reconstruction of the 3D volumetric information from a digital copy of the encrypted light-field image. The method represents a new level of optical encryption, paving the way for broad industrial and biomedical applications in processing and securing 3D data at the microscopic scale.
Management of Agroforestry Practices in Assosa District, Benishangul Gumuze Region, Ethiopia
NASA Astrophysics Data System (ADS)
Kifle, E. T.; Asfaw, Z.; Abdelkadir, A.
2017-12-01
Trees on farms have evolved from the selective retention of useful trees on agricultural lands following the severe forest destruction and degradation for agriculture and other uses. As a consequence, trees on farms form the main vegetation types in much of rural Ethiopia in general and Assosa district in particular. In order to increase the products and services of these important agroforestry species there is a need to identify and document the species type and their management practices. To this end, this study is intended to:1) identify agroforestry types, species richness, use-diversity and management of the woody and non-woody plant species 2) record on-farm tree management practices and 3) assess the perception and attitude of farmers towards tree management. A combination of assessment methods including species inventory, key informant discussions and questionnaire surveys were employed in the study. The key findings of the study have shown that a) there were four major agroforestry practices namely homrgardens, parklands, alley cropping and farm boundary plantings with homegardens and parklands appearing to be the dominant practices, b) a total of 57 woody and non-woody species were found to form the main vegetation species with about 21 species commonly shared by both homegardens and parklands c)the difference in mean number of stems in homegardens and parklands was significantly different (p<0.05), d) retained trees in the study area are multifunctional with more than six use types and were managed by more than five management practices including slant-cut of mango (Mangifera indica) trees. According to household respondents and key informants land tenure insecurity, prevalence of pests/diseases, scarcity of water and poor survival of seedlings were the major problems. Therefore, land certification, water resource development, integrated pest management(IPM), training of farmers and further research on the cultural management practices are key recommendations for further development of agroforestry in the study area. Keywords: homegardens; parklands; local knowledge; slant-cut; inventory; key informants; questionnaire
Bluetooth Roaming for Sensor Network System in Clinical Environment.
Kuroda, Tomohiro; Noma, Haruo; Takase, Kazuhiko; Sasaki, Shigeto; Takemura, Tadamasa
2015-01-01
A sensor network is key infrastructure for advancing a hospital information system (HIS). The authors proposed a method to provide roaming functionality for Bluetooth to realize a Bluetooth-based sensor network, which is suitable to connect clinical devices. The proposed method makes the average response time of a Bluetooth connection less than one second by making the master device repeat the inquiry process endlessly and modifies parameters of the inquiry process. The authors applied the developed sensor network for daily clinical activities in an university hospital, and confirmed the stabilitya and effectiveness of the sensor network. As Bluetooth becomes a quite common wireless interface for medical devices, the proposed protocol that realizes Bluetooth-based sensor network enables HIS to equip various clinical devices and, consequently, lets information and communication technologies advance clinical services.
Probabilistic Low-Rank Multitask Learning.
Kong, Yu; Shao, Ming; Li, Kang; Fu, Yun
2018-03-01
In this paper, we consider the problem of learning multiple related tasks simultaneously with the goal of improving the generalization performance of individual tasks. The key challenge is to effectively exploit the shared information across multiple tasks as well as preserve the discriminative information for each individual task. To address this, we propose a novel probabilistic model for multitask learning (MTL) that can automatically balance between low-rank and sparsity constraints. The former assumes a low-rank structure of the underlying predictive hypothesis space to explicitly capture the relationship of different tasks and the latter learns the incoherent sparse patterns private to each task. We derive and perform inference via variational Bayesian methods. Experimental results on both regression and classification tasks on real-world applications demonstrate the effectiveness of the proposed method in dealing with the MTL problems.
Key Facts about Higher Education in Washington: 2009-10
ERIC Educational Resources Information Center
Washington Higher Education Coordinating Board, 2010
2010-01-01
First published in 2002, "Key Facts about Higher Education in Washington" provides valuable information on the ways higher education serves the state and its people. The most current data and information available is presented throughout this report to highlight the "Key Facts" about Washington's postsecondary institutions,…
2016-08-01
prioritization of key information technology limits management’s ability to focus audit readiness efforts on the systems with the highest risk...corrective actions for the higher-risk systems first. For an audit readiness plan for key information technology systems, the Navy provided a schedule...prioritization of key information technology systems used in the FBWT process limits management’s ability to focus audit readiness efforts on the most
ERIC Educational Resources Information Center
Wittebols, James H.
2016-01-01
How well students conduct research online is an increasing concern for educators at all levels, especially higher education. This paper describes the evolution of a course that examines confirmation bias, information searching, and the political economy of information as keys to becoming more information and media literate. After a key assignment…
Glycopeptide Analysis, Recent Developments and Applications*
Desaire, Heather
2013-01-01
Glycopeptide-based analysis is used to inform researchers about the glycans on one or more proteins. The method's key attractive feature is its ability to link glycosylation information to exact locations (glycosylation sites) on proteins. Numerous applications for glycopeptide analysis are known, and several examples are described herein. The techniques used to characterize glycopeptides are still emerging, and recently, research focused on facilitating aspects of glycopeptide analysis has advanced significantly in the areas of sample preparation, MS fragmentation, and automation of data analysis. These recent developments, described herein, provide the foundation for the growth of glycopeptide analysis as a blossoming field. PMID:23389047
The ECAR Study of Undergraduate Students and Information Technology, 2010. Key Findings
ERIC Educational Resources Information Center
Smith, Shannon D.; Caruso, Judith Borreson
2010-01-01
This document presents the key findings from "The ECAR Study of Undergraduate Students and Information Technology, 2010". Since 2004, the annual ECAR (EDUCAUSE Center for Applied Research) study of undergraduate students and information technology has sought to shed light on how information technology affects the college experience. We…
ERIC Educational Resources Information Center
Pierce, Robert E.
2012-01-01
This research study reviewed relative literature on information security and information security culture within organizations to determine what factors potentially assist an organization in implementing, integrating, and maintaining a successful organizational information security culture. Based on this review of literature, five key factors were…
Dumbaugh, Mari; Bapolisi, Wyvine; van de Weerd, Jennie; Zabiti, Michel; Mommers, Paula; Balaluka, Ghislain Bisimwa; Merten, Sonja
2017-07-03
In this protocol we describe a mixed methods study in the province of South Kivu, Democratic Republic of Congo evaluating the effectiveness of different demand side strategies to increase maternal health service utilization and the practice of birth spacing. Conditional service subsidization, conditional cash transfers and non-monetary incentives aim to encourage women to use maternal health services and practice birth spacing in two different health districts. Our methodology will comparatively evaluate the effectiveness of different approaches against each other and no intervention. This study comprises four main research activities: 1) Formative qualitative research to determine feasibility of planned activities and inform development of the quantitative survey; 2) A community-based, longitudinal survey; 3) A retrospective review of health facility records; 4) Qualitative exploration of intervention acceptability and emergent themes through in-depth interviews with program participants, non-participants, their partners and health providers. Female community health workers are engaged as core members of the research team, working in tandem with female survey teams to identify women in the community who meet eligibility criteria. Female community health workers also act as key informants and community entry points during methods design and qualitative exploration. Main study outcomes are completion of antenatal care, institutional delivery, practice of birth spacing, family planning uptake and intervention acceptability in the communities. Qualitative methods also explore decision making around maternal health service use, fertility preference and perceptions of family planning. The innovative mixed methods design allows quantitative data to inform the relationships and phenomena to be explored in qualitative collection. In turn, qualitative findings will be triangulated with quantitative findings. Inspired by the principles of grounded theory, qualitative analysis will begin while data collection is ongoing. This "conversation" between quantitative and qualitative data will result in a more holistic, context-specific exploration and understanding of research topics, including the mechanisms through which the interventions are or are not effective. In addition, engagement of female community health workers as core members of the research team roots research methods in the realities of the community and provides teams with key informants who are simultaneously implicated in the health system, community and target population.
Acka, Cinthia A.; Raso, Giovanna; N'Goran, Eliézer K.; Tschannen, Andres B.; Bogoch, Isaac I.; Séraphin, Essane; Tanner, Marcel; Obrist, Brigit; Utzinger, Jürg
2010-01-01
Background In the developing world where parasitic worm infections are pervasive, preventive chemotherapy is the key strategy for morbidity control. However, local knowledge, attitudes, and practices (KAP) of parasitic worms are poorly understood, although such information is required for prevention and sustainable control. Methods We carried out KAP surveys in two rural communities of Côte d'Ivoire that were subjected to school-based and community-based research and control activities. We used qualitative and quantitative methods. The former included observations, in-depth interviews with key informants, and focus group discussions with school children and adults. Quantitative methods consisted of a structured questionnaire administered to household heads. Principal Findings Access to clean water was lacking in both communities and only a quarter of the households had functioning latrines. There was a better understanding of soil-transmitted helminthiasis than intestinal schistosomiasis, but community-based rather than school-based interventions appeared to improve knowledge of schistosomiasis. In the villages with community-based interventions, three-quarters of household interviewees knew about intestinal schistosomiasis compared to 14% in the village where school-based interventions were implemented (P<0.001). Whereas two-thirds of respondents from the community-based intervention village indicated that the research and control project was the main source of information, only a quarter of the respondents cited the project as the main source. Conclusions/Significance Preventive chemotherapy targeting school-aged children has limitations, as older population segments are neglected, and hence lack knowledge about how to prevent and control parasitic worm infections. Improved access to clean water and sanitation is necessary, along with health education to make a durable impact against helminth infections. PMID:21200423
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chironis, N.P.
This book contains a wealth of valuable information carefully selected and compiled from recent issues of Coal Age magazine. Much of the source material has been gathered by Coal Age Editors during their visits to coal mines, research establishments, universities and technical symposiums. Equally important are the articles and data contributed by over 50 top experts, many of whom are well known to the mining industry. Specifically, this easy-to-use handbook is divided into eleven key areas of underground mining. Here you will find the latest information on continuous mining techniques, longwall and shortwall methods and equipment, specialized mining and boringmore » systems, continuous haulage techniques, improved roof control and ventilation methods, mine communications and instrumentation, power systems, fire control methods, and new mining regulations. There is also a section on engineering and management considerations, including the modern use of computer terminals, practical techniques for picking leaders and for encouraging more safety consciousness in employees, factors affecting absenteeism, and some highly important financial considerations. All of this valuable information has been thoroughly indexed to provide immediate access to the specific data needed by the reader.« less
Computer-Aided Drug Design Methods.
Yu, Wenbo; MacKerell, Alexander D
2017-01-01
Computational approaches are useful tools to interpret and guide experiments to expedite the antibiotic drug design process. Structure-based drug design (SBDD) and ligand-based drug design (LBDD) are the two general types of computer-aided drug design (CADD) approaches in existence. SBDD methods analyze macromolecular target 3-dimensional structural information, typically of proteins or RNA, to identify key sites and interactions that are important for their respective biological functions. Such information can then be utilized to design antibiotic drugs that can compete with essential interactions involving the target and thus interrupt the biological pathways essential for survival of the microorganism(s). LBDD methods focus on known antibiotic ligands for a target to establish a relationship between their physiochemical properties and antibiotic activities, referred to as a structure-activity relationship (SAR), information that can be used for optimization of known drugs or guide the design of new drugs with improved activity. In this chapter, standard CADD protocols for both SBDD and LBDD will be presented with a special focus on methodologies and targets routinely studied in our laboratory for antibiotic drug discoveries.
X-ray method shows fibers fail during fatigue of boron-epoxy laminates
NASA Technical Reports Server (NTRS)
Roderick, G. L.; Whitcomb, J. D.
1975-01-01
A method proposed for studying progressive fiber fracture in boron-epoxy laminates during fatigue tests is described. It is based on the intensity of X-ray absorption of the tungsten core in the boron filaments as contrasted with that of the boron and epoxy matrix. When the laminate is X-rayed, the image of the tungsten in the born filaments is recorded on a photographic plate. Breaks in the boron laminates can be easily identified by magnifying the photographic plates. The method is suitable for studying broken boron filaments in most matrix materials, and may supply key information for developing realistic fatigue and fracture models.
Noise-free recovery of optodigital encrypted and multiplexed images.
Henao, Rodrigo; Rueda, Edgar; Barrera, John F; Torroba, Roberto
2010-02-01
We present a method that allows storing multiple encrypted data using digital holography and a joint transform correlator architecture with a controllable angle reference wave. In this method, the information is multiplexed by using a key and a different reference wave angle for each object. In the recovering process, the use of different reference wave angles prevents noise produced by the nonrecovered objects from being superimposed on the recovered object; moreover, the position of the recovered object in the exit plane can be fully controlled. We present the theoretical analysis and the experimental results that show the potential and applicability of the method.
NASA Astrophysics Data System (ADS)
Stefko, Kamil; Bukowski, Tomasz; Urbański, Michał
2012-03-01
A fast method for visual inspection and classification of massive locomotor activity data registered from laboratory rats is presented. Positions in the home cage of one hundred rats have been constantly recorded during 90 day period using photodiodes and beam crossing method with use of custom build system. Direct inspection and comparison of classic form of actograms did not bring information for fast and easy recognition of anomalies in daily behavioural cycle. A method of obtaining fast and easy to compare locomotor activity pattern is presented. The key point of proposed method is exposition of characteristic points in the activity diagram. About 9000 actograms were inspected and classified for investigation with use of ANOVA.
Exploiting Information Diffusion Feature for Link Prediction in Sina Weibo
NASA Astrophysics Data System (ADS)
Li, Dong; Zhang, Yongchao; Xu, Zhiming; Chu, Dianhui; Li, Sheng
2016-01-01
The rapid development of online social networks (e.g., Twitter and Facebook) has promoted research related to social networks in which link prediction is a key problem. Although numerous attempts have been made for link prediction based on network structure, node attribute and so on, few of the current studies have considered the impact of information diffusion on link creation and prediction. This paper mainly addresses Sina Weibo, which is the largest microblog platform with Chinese characteristics, and proposes the hypothesis that information diffusion influences link creation and verifies the hypothesis based on real data analysis. We also detect an important feature from the information diffusion process, which is used to promote link prediction performance. Finally, the experimental results on Sina Weibo dataset have demonstrated the effectiveness of our methods.
Exploiting Information Diffusion Feature for Link Prediction in Sina Weibo.
Li, Dong; Zhang, Yongchao; Xu, Zhiming; Chu, Dianhui; Li, Sheng
2016-01-28
The rapid development of online social networks (e.g., Twitter and Facebook) has promoted research related to social networks in which link prediction is a key problem. Although numerous attempts have been made for link prediction based on network structure, node attribute and so on, few of the current studies have considered the impact of information diffusion on link creation and prediction. This paper mainly addresses Sina Weibo, which is the largest microblog platform with Chinese characteristics, and proposes the hypothesis that information diffusion influences link creation and verifies the hypothesis based on real data analysis. We also detect an important feature from the information diffusion process, which is used to promote link prediction performance. Finally, the experimental results on Sina Weibo dataset have demonstrated the effectiveness of our methods.
Study on the security of the authentication scheme with key recycling in QKD
NASA Astrophysics Data System (ADS)
Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu
2016-09-01
In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.
Psychometric Comparison of Self- and Informant-Reports of Personality
Olino, Thomas M.; Klein, Daniel N.
2017-01-01
Self-reports are the most relied on assessment method in psychology. In the area of personality, informant-reports are a reasonable alternative assessment strategy. However, agreement between self- and informant-reports of personality is only moderately good. A portion of the observed discrepancies between self- and informant-reports of personality may come from differences in psychometric measurement across raters. That is, it is unknown whether the constructs assessed via self- and informant-reports are psychometrically identical. We examined four key personality scales—Well-Being, Social Closeness, Stress Reaction, and Harm Avoidance—in male and female dyads who provided self- and informant-reports for their partner. Similarities in self- and informant-reports of personality were evaluated by testing measurement invariance. Overall, models supported configural, metric, and scalar invariance for each of the four personality dimensions. These results suggest that the same psychometric constructs are assessed via self- and informant-reports of these personality dimensions. Informant-reports can be used in studies to avoid biases from relying solely on self-reports. PMID:25612626
NASA Astrophysics Data System (ADS)
Zhao, Y.; Zhang, L.; Ma, W.; Zhang, P.; Zhao, T.
2018-04-01
The First National Geographical Condition Survey is a predecessor task to dynamically master basic situations of the nature, ecology and human activities on the earth's surface and it is the brand-new mapping geographic information engineering. In order to ensure comprehensive, real and accurate survey results and achieve the quality management target which the qualified rate is 100 % and the yield is more than 80 %, it is necessary to carry out the quality control and result inspection for national geographical conditions survey on a national scale. To ensure that achievement quality meets quality target requirements, this paper develops the key technology method of "five-in-one" quality control that is constituted by "quality control system of national geographical condition survey, quality inspection technology system, quality evaluation system, quality inspection information management system and national linked quality control institutions" by aiming at large scale, wide coverage range, more undertaking units, more management levels, technical updating, more production process and obvious regional differences in the national geographical condition survey and combining with novel achievement manifestation, complicated dependency, more special reference data, and large data size. This project fully considering the domestic and foreign related research results and production practice experience, combined with the technology development and the needs of the production, it stipulates the inspection methods and technical requirements of each stage in the quality inspection of the geographical condition survey results, and extends the traditional inspection and acceptance technology, and solves the key technologies that are badly needed in the first national geographic survey.
Best practices for assessing ocean health in multiple contexts using tailorable frameworks
Pacheco, Erich J.; Best, Benjamin D.; Scarborough, Courtney; Longo, Catherine; Katona, Steven K.; Halpern, Benjamin S.
2015-01-01
Marine policy is increasingly calling for maintaining or restoring healthy oceans while human activities continue to intensify. Thus, successful prioritization and management of competing objectives requires a comprehensive assessment of the current state of the ocean. Unfortunately, assessment frameworks to define and quantify current ocean state are often site-specific, limited to a few ocean components, and difficult to reproduce in different geographies or even through time, limiting spatial or temporal comparisons as well as the potential for shared learning. Ideally, frameworks should be tailorable to accommodate use in disparate locations and contexts, removing the need to develop frameworks de novo and allowing efforts to focus on the assessments themselves to advise action. Here, we present some of our experiences using the Ocean Health Index (OHI) framework, a tailorable and repeatable approach that measures health of coupled human-ocean ecosystems in different contexts by accommodating differences in local environmental characteristics, cultural priorities, and information availability and quality. Since its development in 2012, eleven assessments using the OHI framework have been completed at global, national, and regional scales, four of which have been led by independent academic or government groups. We have found the following to be best practices for conducting assessments: Incorporate key characteristics and priorities into the assessment framework design before gathering information; Strategically define spatial boundaries to balance information availability and decision-making scales; Maintain the key characteristics and priorities of the assessment framework regardless of information limitations; and Document and share the assessment process, methods, and tools. These best practices are relevant to most ecosystem assessment processes, but also provide tangible guidance for assessments using the OHI framework. These recommendations also promote transparency around which decisions were made and why, reproducibility through access to detailed methods and computational code, repeatability via the ability to modify methods and computational code, and ease of communication to wide audiences, all of which are critical for any robust assessment process. PMID:26713251
Best practices for assessing ocean health in multiple contexts using tailorable frameworks.
Lowndes, Julia S Stewart; Pacheco, Erich J; Best, Benjamin D; Scarborough, Courtney; Longo, Catherine; Katona, Steven K; Halpern, Benjamin S
2015-01-01
Marine policy is increasingly calling for maintaining or restoring healthy oceans while human activities continue to intensify. Thus, successful prioritization and management of competing objectives requires a comprehensive assessment of the current state of the ocean. Unfortunately, assessment frameworks to define and quantify current ocean state are often site-specific, limited to a few ocean components, and difficult to reproduce in different geographies or even through time, limiting spatial or temporal comparisons as well as the potential for shared learning. Ideally, frameworks should be tailorable to accommodate use in disparate locations and contexts, removing the need to develop frameworks de novo and allowing efforts to focus on the assessments themselves to advise action. Here, we present some of our experiences using the Ocean Health Index (OHI) framework, a tailorable and repeatable approach that measures health of coupled human-ocean ecosystems in different contexts by accommodating differences in local environmental characteristics, cultural priorities, and information availability and quality. Since its development in 2012, eleven assessments using the OHI framework have been completed at global, national, and regional scales, four of which have been led by independent academic or government groups. We have found the following to be best practices for conducting assessments: Incorporate key characteristics and priorities into the assessment framework design before gathering information; Strategically define spatial boundaries to balance information availability and decision-making scales; Maintain the key characteristics and priorities of the assessment framework regardless of information limitations; and Document and share the assessment process, methods, and tools. These best practices are relevant to most ecosystem assessment processes, but also provide tangible guidance for assessments using the OHI framework. These recommendations also promote transparency around which decisions were made and why, reproducibility through access to detailed methods and computational code, repeatability via the ability to modify methods and computational code, and ease of communication to wide audiences, all of which are critical for any robust assessment process.
NASA Astrophysics Data System (ADS)
Hou, W. Z.; Li, Z. Q.; Zheng, F. X.; Qie, L. L.
2018-04-01
This paper evaluates the information content for the retrieval of key aerosol microphysical and surface properties for multispectral single-viewing satellite polarimetric measurements cantered at 410, 443, 555, 670, 865, 1610 and 2250 nm over bright land. To conduct the information content analysis, the synthetic data are simulated by the Unified Linearized Vector Radiative Transfer Model (UNLVTM) with the intensity and polarization together over bare soil surface for various scenarios. Following the optimal estimation theory, a principal component analysis method is employed to reconstruct the multispectral surface reflectance from 410 nm to 2250 nm, and then integrated with a linear one-parametric BPDF model to represent the contribution of polarized surface reflectance, thus further to decouple the surface-atmosphere contribution from the TOA measurements. Focusing on two different aerosol models with the aerosol optical depth equal to 0.8 at 550 nm, the total DFS and DFS component of each retrieval aerosol and surface parameter are analysed. The DFS results show that the key aerosol microphysical properties, such as the fine- and coarse-mode columnar volume concentration, the effective radius and the real part of complex refractive index at 550 nm, could be well retrieved with the surface parameters simultaneously over bare soil surface type. The findings of this study can provide the guidance to the inversion algorithm development over bright surface land by taking full use of the single-viewing satellite polarimetric measurements.
[Causes of underreporting of occupational injuries and adverse events in Chile].
Luengo, Carolina; Paravic, Tatiana; Valenzuela, Sandra
2016-02-01
Objective To describe the causes of underreporting of occupational injuries and adverse events as identified in the international literature and by key informants in the area of health and risk prevention in Chile. Methods The study uses a qualitative descriptive approach. This includes a systematized literature review that follows the SALSA method (Search, Appraisal, Synthesis and Analysis) and is in line with the PRISMA statement (Preferred Reporting Items for Systematic Reviews and Meta-Analyses). In addition, interviews were conducted with informants in the area of health and risk prevention in Chile. Results The leading causes of underreporting of occupational injuries as described in the literature and by key informants were economic factors and ignorance. With regard to adverse events, the principal causes indicated were fear of sanctions, limited support provided by the authorities, lack of knowledge, and excessive workload. Conclusions It is important to continue working to strengthen the reporting of occupational injuries and adverse events and to implement measures aimed at minimizing factors that appear to be the leading causes of underreporting. In the case of occupational injuries, this means making sure that economic factors are not an impediment but rather an incentive to reporting. With respect to adverse events, steps should be taken to eliminate the fear of sanctions and to develop recommendations, focusing more on systemic improvements than on individuals, to promote joint learning. In both cases it will be necessary to combat ignorance through continuous, systematic training and support.
A conceptual framework to support exposure science research ...
While knowledge of exposure is fundamental to assessing and mitigating risks, exposure information has been costly and difficult to generate. Driven by major scientific advances in analytical methods, biomonitoring, computational tools, and a newly articulated vision for a greater impact in public health, the field of exposure science is undergoing a rapid transition that allows it to be more agile, predictive, and data- and knowledge-driven. A necessary element of this evolved paradigm is an organizational and predictive framework for exposure science that furthers the application of systems-based approaches. To enable such systems-based approaches, we proposed the Aggregate Exposure Pathway (AEP) concept to organize data and information emerging from an invigorated and expanding field of exposure science. The AEP framework is a layered structure that describes the elements of an exposure pathway, as well as the relationship between those elements. The basic building blocks of an AEP adopt the naming conventions used for Adverse Outcome Pathways (AOPs): Key Events (KEs) to describe the measurable, obligate steps through the AEP; and Key Event Relationships (KERs) describe the linkages between KEs. Importantly, the AEP offers an intuitive approach to organize exposure information from sources to internal site of action, setting the stage for predicting stressor concentrations at an internal target site. These predicted concentrations can help inform the r
Safety evaluation of cosmetics in the EU. Reality and challenges for the toxicologist.
Pauwels, Marleen; Rogiers, Vera
2004-06-15
Council Directive 76/768/EEC, its seven amendments and 30 adaptations to technical progress form the basis of the cosmetic EU legislation today. There are actually four key principles for safety in the cosmetic legislation. (i) The full responsibility for the safety of cosmetics for human health is placed on the manufacturer, first importer in the EU or marketer. (ii) The safety evaluation of finished products is based on safety of individual ingredients, more specifically on their chemical structure, toxicological profile and their level of exposure. (iii) A compilation of information on each cosmetic product (dossier) must be kept readily available for inspection by the competent authorities of the Member State concerned. This information source, usually called a technical information file (TIF) or product information file/requirements (PIF(R)), contains, as the most important part, the safety assessment of the product undersigned by a competent safety assessor. (iv) The use of validated replacement alternative methods instead of animal testing forms the 4th key principle for safety of cosmetic products on the EU market. The 7th amendment imposes strict deadlines for the abolition of animal in vivo studies on cosmetic ingredients. These legal requirements induce a number of important challenges for the cosmetic industry and more specifically for the toxicologist involved as safety assessor.
Toye, Christine; Matthews, Anne; Hill, Andrew; Maher, Sean
2014-09-01
Delirium is common in older patients. Little is known of support needs of families of older hospital patients with delirium. To inform nursing practice, we sought to describe families' experiences, understanding of delirium and delirium care, and support needs. Descriptive mixed methods. Review of questionnaire items used with families of people with terminal delirium informed development of a new questionnaire to evaluate the support needs in our study population. In a tertiary hospital delirium unit, we recruited 17 family carers of older patients with (non-terminal) delirium to respond to this questionnaire. Twelve participants (11 female) also took part in interviews addressing the study's aims. Descriptive statistics were calculated and thematic analysis was undertaken. From the survey, key family issues included distress about the patient's condition, worries about future care, and a need for more information about how the patient might feel and how families could support the patient. Themes from interviews included The admission experience, Worries and concerns, Feeling supported, and The discharge experience. Limited understanding of delirium underpinned all themes. Families experienced shock and sadness at the change in the patient; they were reassured by the specialist care but needed more information about delirium, its effects and outcomes, and how they could help with care. Meeting long-term postdischarge needs was a key concern. In this study, families with a hospitalised older relative who had delirium described a distressing experience and needs for informational support. Further research is needed outside of delirium-specific units and in samples including a greater proportion of male relatives. Nurses should work within the interdisciplinary team to ensure a planned, sensitive and timely approach to informing the patient's family about delirium and its implications for their relative, recognising the family carer's role and likely distress. © 2013 Blackwell Publishing Ltd.
A digital memories based user authentication scheme with privacy preservation.
Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang
2017-01-01
The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.
A digital memories based user authentication scheme with privacy preservation
Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang
2017-01-01
The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users’ privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results. PMID:29190659
Listening for Prescriptions: A National Consultation on Pharmaceutical Policy Issues
Morgan, Steve; Cunningham, Colleen M.
2010-01-01
Objectives and Methods: Pharmaceutical policy is an increasingly costly, essential and challenging component of health system management. We sought to identify priority pharmaceutical policy issues in Canada and to translate them into research priorities using key informant interviews, stakeholder surveys and a deliberative workshop. Results: We found consensus on overarching policy goals: to provide all Canadians with equitable and sustainable access to necessary medicines. We also found widespread frustration that many key pharmaceutical policy issues in Canada — including improving prescription drug financing and pricing — have been persistent challenges owing to a lack of policy coordination. The coverage of extraordinarily costly medicines for serious conditions was identified as a rapidly emerging policy issue. Conclusion: Targeted research and knowledge translation activities can help address key policy issues and, importantly, challenges of policy coordination in Canada and thereby reduce inequity and inefficiency in policy approaches and outcomes. PMID:22043223
Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier
Akram, M. Usman; Khan, Shoab A.; Javed, Muhammad Younus
2014-01-01
National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe. Use of different subfields of information technology has also gained much attraction of researchers and practitioners to design systems which can detect main members which are actually responsible for such kind of events. In this paper, we present a novel method to predict key players from a covert network by applying a hybrid framework. The proposed system calculates certain centrality measures for each node in the network and then applies novel hybrid classifier for detection of key players. Our system also applies anomaly detection to predict any terrorist activity in order to help law enforcement agencies to destabilize the involved network. As a proof of concept, the proposed framework has been implemented and tested using different case studies including two publicly available datasets and one local network. PMID:25136674
Carroll, John A; Smith, Helen E; Scott, Donia; Cassell, Jackie A
2016-01-01
Background Electronic medical records (EMRs) are revolutionizing health-related research. One key issue for study quality is the accurate identification of patients with the condition of interest. Information in EMRs can be entered as structured codes or unstructured free text. The majority of research studies have used only coded parts of EMRs for case-detection, which may bias findings, miss cases, and reduce study quality. This review examines whether incorporating information from text into case-detection algorithms can improve research quality. Methods A systematic search returned 9659 papers, 67 of which reported on the extraction of information from free text of EMRs with the stated purpose of detecting cases of a named clinical condition. Methods for extracting information from text and the technical accuracy of case-detection algorithms were reviewed. Results Studies mainly used US hospital-based EMRs, and extracted information from text for 41 conditions using keyword searches, rule-based algorithms, and machine learning methods. There was no clear difference in case-detection algorithm accuracy between rule-based and machine learning methods of extraction. Inclusion of information from text resulted in a significant improvement in algorithm sensitivity and area under the receiver operating characteristic in comparison to codes alone (median sensitivity 78% (codes + text) vs 62% (codes), P = .03; median area under the receiver operating characteristic 95% (codes + text) vs 88% (codes), P = .025). Conclusions Text in EMRs is accessible, especially with open source information extraction algorithms, and significantly improves case detection when combined with codes. More harmonization of reporting within EMR studies is needed, particularly standardized reporting of algorithm accuracy metrics like positive predictive value (precision) and sensitivity (recall). PMID:26911811
Goebel, Carsten; Aeby, Pierre; Ade, Nadège; Alépée, Nathalie; Aptula, Aynur; Araki, Daisuke; Dufour, Eric; Gilmour, Nicola; Hibatallah, Jalila; Keller, Detlef; Kern, Petra; Kirst, Annette; Marrec-Fairley, Monique; Maxwell, Gavin; Rowland, Joanna; Safford, Bob; Schellauf, Florian; Schepky, Andreas; Seaman, Chris; Teichert, Thomas; Tessier, Nicolas; Teissier, Silvia; Weltzien, Hans Ulrich; Winkler, Petra; Scheel, Julia
2012-06-01
Characterisation of skin sensitisation potential is a key endpoint for the safety assessment of cosmetic ingredients especially when significant dermal exposure to an ingredient is expected. At present the mouse local lymph node assay (LLNA) remains the 'gold standard' test method for this purpose however non-animal test methods are under development that aim to replace the need for new animal test data. COLIPA (the European Cosmetics Association) funds an extensive programme of skin sensitisation research, method development and method evaluation and helped coordinate the early evaluation of the three test methods currently undergoing pre-validation. In May 2010, a COLIPA scientific meeting was held to analyse to what extent skin sensitisation safety assessments for cosmetic ingredients can be made in the absence of animal data. In order to propose guiding principles for the application and further development of non-animal safety assessment strategies it was evaluated how and when non-animal test methods, predictions based on physico-chemical properties (including in silico tools), threshold concepts and weight-of-evidence based hazard characterisation could be used to enable safety decisions. Generation and assessment of potency information from alternative tools which at present is predominantly derived from the LLNA is considered the future key research area. Copyright © 2012 Elsevier Inc. All rights reserved.
Brennan, Paul M; Murray, Gordon D; Teasdale, Graham M
2018-06-01
OBJECTIVE Glasgow Coma Scale (GCS) scores and pupil responses are key indicators of the severity of traumatic brain damage. The aim of this study was to determine what information would be gained by combining these indicators into a single index and to explore the merits of different ways of achieving this. METHODS Information about early GCS scores, pupil responses, late outcomes on the Glasgow Outcome Scale, and mortality were obtained at the individual patient level by reviewing data from the CRASH (Corticosteroid Randomisation After Significant Head Injury; n = 9,045) study and the IMPACT (International Mission for Prognosis and Clinical Trials in TBI; n = 6855) database. These data were combined into a pooled data set for the main analysis. Methods of combining the Glasgow Coma Scale and pupil response data varied in complexity from using a simple arithmetic score (GCS score [range 3-15] minus the number of nonreacting pupils [0, 1, or 2]), which we call the GCS-Pupils score (GCS-P; range 1-15), to treating each factor as a separate categorical variable. The content of information about patient outcome in each of these models was evaluated using Nagelkerke's R 2 . RESULTS Separately, the GCS score and pupil response were each related to outcome. Adding information about the pupil response to the GCS score increased the information yield. The performance of the simple GCS-P was similar to the performance of more complex methods of evaluating traumatic brain damage. The relationship between decreases in the GCS-P and deteriorating outcome was seen across the complete range of possible scores. The additional 2 lowest points offered by the GCS-Pupils scale (GCS-P 1 and 2) extended the information about injury severity from a mortality rate of 51% and an unfavorable outcome rate of 70% at GCS score 3 to a mortality rate of 74% and an unfavorable outcome rate of 90% at GCS-P 1. The paradoxical finding that GCS score 4 was associated with a worse outcome than GCS score 3 was not seen when using the GCS-P. CONCLUSIONS A simple arithmetic combination of the GCS score and pupillary response, the GCS-P, extends the information provided about patient outcome to an extent comparable to that obtained using more complex methods. The greater range of injury severities that are identified and the smoothness of the stepwise pattern of outcomes across the range of scores may be useful in evaluating individual patients and identifying patient subgroups. The GCS-P may be a useful platform onto which information about other key prognostic features can be added in a simple format likely to be useful in clinical practice.
Eight Key Issues for the White House Conference on Library and Information Services.
ERIC Educational Resources Information Center
American Society for Information Science, Washington, DC.
Presented as a public service in anticipation of the October 1979 White House Conference on Library and Information Services, the eight papers in this booklet call attention to the key issues which the American Society for Information Science (ASIS) believes have developed from proliferating information and for technological advances. Each of the…
Experiences Using Lightweight Formal Methods for Requirements Modeling
NASA Technical Reports Server (NTRS)
Easterbrook, Steve; Lutz, Robyn; Covington, Rick; Kelly, John; Ampo, Yoko; Hamilton, David
1997-01-01
This paper describes three case studies in the lightweight application of formal methods to requirements modeling for spacecraft fault protection systems. The case studies differ from previously reported applications of formal methods in that formal methods were applied very early in the requirements engineering process, to validate the evolving requirements. The results were fed back into the projects, to improve the informal specifications. For each case study, we describe what methods were applied, how they were applied, how much effort was involved, and what the findings were. In all three cases, formal methods enhanced the existing verification and validation processes, by testing key properties of the evolving requirements, and helping to identify weaknesses. We conclude that the benefits gained from early modeling of unstable requirements more than outweigh the effort needed to maintain multiple representations.
US Fish and Wildlife Service biomonitoring operations manual, Appendices A--K
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gianotto, D.F.; Rope, R.C.; Mondecar, M.
1993-04-01
Volume 2 contains Appendices and Summary Sheets for the following areas: A-Legislative Background and Key to Relevant Legislation, B- Biomonitoring Operations Workbook, C-Air Monitoring, D-Introduction to the Flora and Fauna for Biomonitoring, E-Decontamination Guidance Reference Field Methods, F-Documentation Guidance, Sample Handling, and Quality Assurance/Quality Control Standard Operating Procedures, G-Field Instrument Measurements Reference Field Methods, H-Ground Water Sampling Reference Field Methods, I-Sediment Sampling Reference Field Methods, J-Soil Sampling Reference Field Methods, K-Surface Water Reference Field Methods. Appendix B explains how to set up strategy to enter information on the ``disk workbook``. Appendix B is enhanced by DE97006389, an on-line workbook formore » users to be able to make revisions to their own biomonitoring data.« less
Description of inpatient medication management using cognitive work analysis.
Pingenot, Alleene Anne; Shanteau, James; Sengstacke, L T C Daniel N
2009-01-01
The purpose of this article was to describe key elements of an inpatient medication system using the cognitive work analysis method of Rasmussen et al (Cognitive Systems Engineering. Wiley Series in Systems Engineering; 1994). The work of nurses and physicians were observed in routine care of inpatients on a medical-surgical unit and attached ICU. Interaction with pharmacists was included. Preoperative, postoperative, and medical care was observed. Personnel were interviewed to obtain information not easily observable during routine work. Communication between healthcare workers was projected onto an abstraction/decomposition hierarchy. Decision ladders and information flow charts were developed. Results suggest that decision making on an inpatient medical/surgical unit or ICU setting is a parallel, distributed process. Personnel are highly mobile and often are working on multiple issues concurrently. In this setting, communication is key to maintaining organization and synchronization for effective care. Implications for research approaches to system and interface designs and decision support for personnel involved in the process are discussed.
Ares-I-X Stability and Control Flight Test: Analysis and Plans
NASA Technical Reports Server (NTRS)
Brandon, Jay M.; Derry, Stephen D.; Heim, Eugene H.; Hueschen, Richard M.; Bacon, Barton J.
2008-01-01
The flight test of the Ares I-X vehicle provides a unique opportunity to reduce risk of the design of the Ares I vehicle and test out design, math modeling, and analysis methods. One of the key features of the Ares I design is the significant static aerodynamic instability coupled with the relatively flexible vehicle - potentially resulting in a challenging controls problem to provide adequate flight path performance while also providing adequate structural mode damping and preventing adverse control coupling to the flexible structural modes. Another challenge is to obtain enough data from the single flight to be able to conduct analysis showing the effectiveness of the controls solutions and have data to inform design decisions for Ares I. This paper will outline the modeling approaches and control system design to conduct this flight test, and also the system identification techniques developed to extract key information such as control system performance (gain/phase margins, for example), structural dynamics responses, and aerodynamic model estimations.
Hawaii state legislator views on e-cigarettes and likelihood of legislative action
Juarez, Deborah Taira; Seto, Jason; Guimaraes, Alexander; Masterson, James; Davis, James; Seto, Todd B.
2017-01-01
Objective To examine perspectives on e-cigarette use and regulations in Hawaii through key informant interviews with state legislators. Background E-cigarette use is rapidly increasing, with sales in 2013 topping $1 billion in the United States, but e-cigarettes are still a largely unregulated industry. Although e-cigarettes are thought by most to be a healthier alternative to traditional cigarettes, long-term health effects are not yet known. Methods Semistructured key informant interviews were conducted with Hawaii state legislators (n = 15). Results We found a lack of consensus among legislators, which suggests that substantial legislative action is unlikely in the upcoming session. However, most legislators believe that some type of incremental legislation will pass, such as enactment of a small tax, limitations on advertising to protect adolescents, or regulations concerning where people can use e-cigarettes. Conclusion Legislators eagerly await further research to clarify the overall benefits and harms of e-cigarettes at both the individual and population levels. PMID:26340417
NASA Astrophysics Data System (ADS)
McCandless, M.; Ibaraki, M.; Shum, C.; Lee, H.; Liang, S.
2008-12-01
Schistosomiasis is the second-most prevalent tropical disease after malaria affecting two-hundred million people annually world-wide; it shortens lifespan on average by ten years in endemic areas and no vaccine exists. The current control methods of human host chemotherapy and application of molluscicides to the environment do not break the disease transmission cycle. Schistosomiasis transmission in southern China involves an amphibious intermediate host snail for which hydrology is a key factor because the adults need moist vegetation while the juveniles are fully aquatic. Thus, hydrology is a key factor in schistosomiasis transmission and understanding its role can inform control measures. Our objective is to integrate hydrologic, ecologic, and other environmental factors to determine the changes in available snail habitat through space and time. We use radar altimetry measurements to determine water level every 35 days when the Envisat (Environmental Satellite) passes over the lake. The radar altimetry readings have been calibrated to levels from in-situ gauging stations and will support remote analysis of disease transmission potential without the need for gauging station data. A geographic information system was used to combine key factors including water level, topography, and air temperature data to identify areas of available snail habitat. In order to accomplish this, we conducted three steps including: delineating the watershed, specifying potential snail habitat areas through topography and air temperature classification, and calculating the intersection between potential snail habitat and non-flooded areas in the watershed. Statistical analyses of total available habitat area are also conducted. These maps and statistics analyses can be used by public health agencies to monitor snail habitat trends over time. Coupling remote sensing of water levels with a geographic information system model will continue to be important as the hydrology of the lake changes due to the completion of the upstream Three Gorges Dam project.
Exploratory Study of Rural Physicians' Self-Directed Learning Experiences in a Digital Age.
Curran, Vernon; Fleet, Lisa; Simmons, Karla; Ravalia, Mohamed; Snow, Pamela
2016-01-01
The nature and characteristics of self-directed learning (SDL) by physicians has been transformed with the growth in digital, social, and mobile technologies (DSMTs). Although these technologies present opportunities for greater "just-in-time" information seeking, there are issues for ensuring effective and efficient usage to compliment one's repertoire for continuous learning. The purpose of this study was to explore the SDL experiences of rural physicians and the potential of DSMTs for supporting their continuing professional development (CPD). Semistructured interviews were conducted with a purposive sample of rural physicians. Interview data were transcribed verbatim and analyzed using NVivo analytical software and thematic analysis. Fourteen (N = 14) interviews were conducted and key thematic categories that emerged included key triggers, methods of undertaking SDL, barriers, and supports. Methods and resources for undertaking SDL have evolved considerably, and rural physicians report greater usage of mobile phones, tablets, and laptop computers for updating their knowledge and skills and in responding to patient questions/problems. Mobile technologies, and some social media, can serve as "triggers" in instigating SDL and a greater usage of DSMTs, particularly at "point of care," may result in higher levels of SDL. Social media is met with some scrutiny and ambivalence, mainly because of the "credibility" of information and risks associated with digital professionalism. DSMTs are growing in popularity as a key resource to support SDL for rural physicians. Mobile technologies are enabling greater "point-of-care" learning and more efficient information seeking. Effective use of DSMTs for SDL has implications for enhancing just-in-time learning and quality of care. Increasing use of DSMTs and their new effect on SDL raises the need for reflection on conceptualizations of the SDL process. The "digital age" has implications for our CPD credit systems and the roles of CPD providers in supporting SDL using DSMTs.
Hargreaves, James R; Sprague, Laurel; Stangl, Anne L; Baral, Stefan D
2017-01-01
Background The levels of coverage of human immunodeficiency virus (HIV) treatment and prevention services needed to change the trajectory of the HIV epidemic among key populations, including gay men and other men who have sex with men (MSM) and sex workers, have consistently been shown to be limited by stigma. Objective The aim of this study was to propose an agenda for the goals and approaches of a sexual behavior stigma surveillance effort for key populations, with a focus on collecting surveillance data from 4 groups: (1) members of key population groups themselves (regardless of HIV status), (2) people living with HIV (PLHIV) who are also members of key populations, (3) members of nonkey populations, and (4) health workers. Methods We discuss strengths and weaknesses of measuring multiple different types of stigma including perceived, anticipated, experienced, perpetrated, internalized, and intersecting stigma as measured among key populations themselves, as well as attitudes or beliefs about key populations as measured among other groups. Results With the increasing recognition of the importance of stigma, consistent and validated stigma metrics for key populations are needed to monitor trends and guide immediate action. Evidence-based stigma interventions may ultimately be the key to overcoming the barriers to coverage and retention in life-saving antiretroviral-based HIV prevention and treatment programs for key populations. Conclusions Moving forward necessitates the integration of validated stigma scales in routine HIV surveillance efforts, as well as HIV epidemiologic and intervention studies focused on key populations, as a means of tracking progress toward a more efficient and impactful HIV response. PMID:28446420
NASA Astrophysics Data System (ADS)
Yang, Can; Ma, Cheng; Hu, Linxi; He, Guangqiang
2018-06-01
We present a hierarchical modulation coherent communication protocol, which simultaneously achieves classical optical communication and continuous-variable quantum key distribution. Our hierarchical modulation scheme consists of a quadrature phase-shifting keying modulation for classical communication and a four-state discrete modulation for continuous-variable quantum key distribution. The simulation results based on practical parameters show that it is feasible to transmit both quantum information and classical information on a single carrier. We obtained a secure key rate of 10^{-3} bits/pulse to 10^{-1} bits/pulse within 40 kilometers, and in the meantime the maximum bit error rate for classical information is about 10^{-7}. Because continuous-variable quantum key distribution protocol is compatible with standard telecommunication technology, we think our hierarchical modulation scheme can be used to upgrade the digital communication systems to extend system function in the future.
Coats, Heather; Paganelli, Tia; Starks, Helene; Lindhorst, Taryn; Starks Acosta, Anne; Mauksch, Larry; Doorenbos, Ardith
2017-03-01
There is a known shortage of trained palliative care professionals, and an even greater shortage of professionals who have been trained through interprofessional curricula. As part of an institutional Palliative Care Training Center grant, a core team of interprofessional palliative care academic faculty and staff completed a state-wide palliative care educational assessment to determine the needs for an interprofessional palliative care training program. The purpose of this article is to describe the process and results of our community needs assessment of interprofessional palliative care educational needs in Washington state. We approached the needs assessment through a cross-sectional descriptive design by using mixed-method inquiry. Each phase incorporated a variety of settings and subjects. The assessment incorporated multiple phases with diverse methodological approaches: a preparatory phase-identifying key informants; Phase I-key informant interviews; Phase II-survey; and Phase III-steering committee endorsement. The multiple phases of the needs assessment helped create a conceptual framework for the Palliative Care Training Center and developed an interprofessional palliative care curriculum. The input from key informants at multiple phases also allowed us to define priority needs and to refine an interprofessional palliative care curriculum. This curriculum will provide an interprofessional palliative care educational program that crosses disciplinary boundaries to integrate knowledge that is beneficial for all palliative care clinicians. The input from a range of palliative care clinicians and professionals at every phase of the needs assessment was critical for creating an interprofessional palliative care curriculum.
White, Peta E; Register-Mihalik, Johna; Donaldson, Alex; Sullivan, S John
2017-01-01
Background/aim Concussion guidelines exist for multiple community sports. Parents are key stakeholders in guideline implementation and in appropriate responses following concussive injury. The purpose of this qualitative investigation was to understand how parents of community-level Australian Football (AF) players experience and perceive concussion guidelines in order to inform the design and implementation of concussion guidelines in community sport. Methods A cross-sectional qualitative approach was adopted to allow for an open and detailed exploration of the views of parents of junior community AF players (ie, those aged <16 years) regarding concussion guidelines of the AF League (AFL)—the national governing body for AF. Participants were 15 parents of junior community AF players from two clubs affiliated with a large regional community AF League. Results The key experiences and perceptions of the parents included appreciation that the guidelines outlined the postconcussion process that should be followed, desires for better understanding of the guidelines by general practitioners (ie, medical doctors) who care for children with concussion, having more readily available information for parents and receiving more formal policy guiding timing of return-to-participation following concussion. Difficulties with the guidelines not addressing delayed presentations of concussion were also frequently mentioned. Conclusions Parents are key stakeholders in concussion prevention and care in community sport. As such, their input should be considered when developing guidelines and resources for community sport. Furthermore, concussion information should be made available to parents in an easily accessible and community-friendly form. PMID:28761707
A Survey of Workplace Violence Across 65 U.S. Emergency Departments
Kansagra, Susan M.; Rao, Sowmya R.; Sullivan, Ashley F.; Gordon, James A.; Magid, David J.; Kaushal, Rainu; Camargo, Carlos A.; Blumenthal, David
2012-01-01
Objectives Workplace violence is a concerning issue. Healthcare workers represent a significant portion of the victims, especially those who work in the emergency department (ED). The objective of this study was to examine ED workplace violence and staff perceptions of physical safety. Methods Data were obtained from the National Emergency Department Safety Study (NEDSS), which surveyed staff across 69 U.S. EDs including physicians, residents, nurses, nurse practitioners, and physician assistants. The authors also conducted surveys of key informants (one from each site) including ED chairs, medical directors, nurse managers, and administrators. The main outcome measures included physical attacks against staff, frequency of guns or knives in the ED, and staff perceptions of physical safety. Results A total of 5,695 staff surveys were distributed, and 3,518 surveys from 65 sites were included in the final analysis. One-fourth of surveyed ED staff reported feeling safe sometimes, rarely, or never. Key informants at the sampled EDs reported a total of 3,461 physical attacks (median of 11 attacks per ED) over the 5-year period. Key informants at 20% of EDs reported that guns or knives were brought to the ED on a daily or weekly basis. In multivariate analysis, nurses were less likely to feel safe “most of the time” or “always” when compared to other surveyed staff. Conclusions This study showed that violence and weapons in the ED are common, and nurses were less likely to feel safe than other ED staff. PMID:18976337
NASA Astrophysics Data System (ADS)
Kunkel, K.; Dissen, J.; Easterling, D. R.; Kulkarni, A.; Akhtar, F. H.; Hayhoe, K.; Stoner, A. M. K.; Swaminathan, R.; Thrasher, B. L.
2017-12-01
s part of the Department of State U.S.-India Partnership for Climate Resilience (PCR), scientists from NOAA NCEI, CICS-NC, Texas Tech University (TTU), Stanford University (SU), and the Indian Institute of Tropical Meteorology (IITM) held a workshop at IITM in Pune, India during 7-9 March 2017 on the development, techniques and applications of downscaled climate projections. Workshop participants from TTU, SU, and IITM presented state-of-the-art climate downscaling techniques using the ARRM method, NASA NEX climate products, CORDEX-South Asia and analysis tools for resilience planning and sustainable development. PCR collaborators in attendance included Indian practitioners, researchers and other NGO including the WRI Partnership for Resilience and Preparedness (PREP), The Energy and Resources Institute (TERI), and NIH. The scientific techniques were provided to workshop participants in a software package written in R by TTU scientists and several sessions were devoted to hands-on experience with the software package. The workshop further examined case studies on the use of downscaled climate data for decision making in a range of sectors, including human health, agriculture, and water resources management as well as to inform the development of the India State Action Plans. This talk will discuss key outcomes including information needs for downscaling climate projections, importance of QA/QC of the data, key findings from select case studies, and the importance of collaborations and partnerships to apply downscaling projections to help inform the development of the India State Action Plans.
Function key and shortcut key use in airway facilities.
DOT National Transportation Integrated Search
2003-02-01
This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...