Sample records for observation key informant

  1. [Key informers. When and How?].

    PubMed

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  2. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  3. Squeezed-state quantum key distribution with a Rindler observer

    NASA Astrophysics Data System (ADS)

    Zhou, Jian; Shi, Ronghua; Guo, Ying

    2018-03-01

    Lengthening the maximum transmission distance of quantum key distribution plays a vital role in quantum information processing. In this paper, we propose a directional squeezed-state protocol with signals detected by a Rindler observer in the relativistic quantum field framework. We derive an analytical solution to the transmission problem of squeezed states from the inertial sender to the accelerated receiver. The variance of the involved signal mode is closer to optimality than that of the coherent-state-based protocol. Simulation results show that the proposed protocol has better performance than the coherent-state counterpart especially in terms of the maximal transmission distance.

  4. An Information Architect's View of Earth Observations for Disaster Risk Management

    NASA Astrophysics Data System (ADS)

    Moe, K.; Evans, J. D.; Cappelaere, P. G.; Frye, S. W.; Mandl, D.; Dobbs, K. E.

    2014-12-01

    Satellite observations play a significant role in supporting disaster response and risk management, however data complexity is a barrier to broader use especially by the public. In December 2013 the Committee on Earth Observation Satellites Working Group on Information Systems and Services documented a high-level reference model for the use of Earth observation satellites and associated products to support disaster risk management within the Global Earth Observation System of Systems context. The enterprise architecture identified the important role of user access to all key functions supporting situational awareness and decision-making. This paper focuses on the need to develop actionable information products from these Earth observations to simplify the discovery, access and use of tailored products. To this end, our team has developed an Open GeoSocial API proof-of-concept for GEOSS. We envision public access to mobile apps available on smart phones using common browsers where users can set up a profile and specify a region of interest for monitoring events such as floods and landslides. Information about susceptibility and weather forecasts about flood risks can be accessed. Users can generate geo-located information and photos of local events, and these can be shared on social media. The information architecture can address usability challenges to transform sensor data into actionable information, based on the terminology of the emergency management community responsible for informing the public. This paper describes the approach to collecting relevant material from the disasters and risk management community to address the end user needs for information. The resulting information architecture addresses the structural design of the shared information in the disasters and risk management enterprise. Key challenges are organizing and labeling information to support both online user communities and machine-to-machine processing for automated product generation.

  5. Machine actionable information about observed environments

    NASA Astrophysics Data System (ADS)

    Stocker, Markus; Nativi, Stefano; Pearlman, Jay

    2017-04-01

    Data, information, and knowledge are terms commonly used in earth and environmental sciences, as well as in informatics supporting these sciences. The Lindstrom et al. Framework for Ocean Observing highlights the "challenge of delivering ocean information for societal benefit" and suggests that a key framework concept is to promote the "transformation of observational data organized in [Essential Ocean Variables] into information." A flyer presenting the Integrated Carbon Observation System says "Knowledge through observations." Writing about Oceans 2.0, Ocean Networks Canada highlights that the system is able to mine "data streams to detect trends, classify content and extract features [...] thereby turning raw data into information and setting the stage to allow the information to be transformed into knowledge." At 2016 AGU Fall Meeting, Rebecca Moore presented the vision of monitoring a changing planet and "generating precise, actionable information and knowledge." Yet, what exactly are these entities in the context of earth sciences and environmental research infrastructures? Can they be defined? To which processes are they input and output? How are they represented and managed? Can we extend Moore's vision to machine actionable information and knowledge? Information Systems research has for long struggled with defining data, information, and knowledge. Literature on the Data, Information, Knowledge, Wisdom (DIKW) hierarchy underscores the challenge of defining these terms. Some scholars have even suggested that providing general definitions is beyond the scope of the discipline. This may be particularly true at the higher levels, where wisdom should be considered in the context of the societal environment and may not be quantifiable out of context. While reaching consensus is hard, to obtain a better understanding for what the terms mean, how they are applied, and to what processes they are relevant in the context of earth sciences and environmental research

  6. Key management schemes using routing information frames in secure wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  7. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kiktenko, Evgeniy O.; Trushechkin, Anton S.; Lim, Charles Ci Wen

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration ofmore » results of unsuccessful belief-propagation decodings.« less

  8. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    DOE PAGES

    Kiktenko, Evgeniy O.; Trushechkin, Anton S.; Lim, Charles Ci Wen; ...

    2017-10-27

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration ofmore » results of unsuccessful belief-propagation decodings.« less

  9. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Kiktenko, E. O.; Trushechkin, A. S.; Lim, C. C. W.; Kurochkin, Y. V.; Fedorov, A. K.

    2017-10-01

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. The proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.

  10. The Key Roles in the Informal Organization: A Network Analysis Perspective

    ERIC Educational Resources Information Center

    de Toni, Alberto F.; Nonino, Fabio

    2010-01-01

    Purpose: The purpose of this paper is to identify the key roles embedded in the informal organizational structure (informal networks) and to outline their contribution in the companies' performance. A major objective of the research is to find and characterize a new key informal role that synthesises problem solving, expertise, and accessibility…

  11. Compressed Secret Key Agreement:Maximizing Multivariate Mutual Information per Bit

    NASA Astrophysics Data System (ADS)

    Chan, Chung

    2017-10-01

    The multiterminal secret key agreement problem by public discussion is formulated with an additional source compression step where, prior to the public discussion phase, users independently compress their private sources to filter out strongly correlated components for generating a common secret key. The objective is to maximize the achievable key rate as a function of the joint entropy of the compressed sources. Since the maximum achievable key rate captures the total amount of information mutual to the compressed sources, an optimal compression scheme essentially maximizes the multivariate mutual information per bit of randomness of the private sources, and can therefore be viewed more generally as a dimension reduction technique. Single-letter lower and upper bounds on the maximum achievable key rate are derived for the general source model, and an explicit polynomial-time computable formula is obtained for the pairwise independent network model. In particular, the converse results and the upper bounds are obtained from those of the related secret key agreement problem with rate-limited discussion. A precise duality is shown for the two-user case with one-way discussion, and such duality is extended to obtain the desired converse results in the multi-user case. In addition to posing new challenges in information processing and dimension reduction, the compressed secret key agreement problem helps shed new light on resolving the difficult problem of secret key agreement with rate-limited discussion, by offering a more structured achieving scheme and some simpler conjectures to prove.

  12. Observations to information

    NASA Astrophysics Data System (ADS)

    Cox, S. J.

    2013-12-01

    Observations provide the fundamental constraint on natural science interpretations. Earth science observations originate in many contexts, including in-situ field observations and monitoring, various modes of remote sensing and geophysics, sampling for ex-situ (laboratory) analysis, as well as numerical modelling and simulation which also provide estimates of parameter values. Most investigations require a combination of these, often sourced from multiple initiatives and archives, so data discovery and re-organization can be a significant project burden. The Observations and Measurements (O&M) information model was developed to provide a common vocabulary that can be applied to all these cases, and thus provide a basis for cross-initiative and cross-domain interoperability. O&M was designed in the context of the standards for geographic information from OGC and ISO. It provides a complementary viewpoint to the well-known feature (object oriented) and coverage (property field) views, but prioritizes the property determination process. Nevertheless, use of O&M implies the existence of well defined feature types. In disciplines such as geology and ecosystem sciences the primary complexity is in their model of the world, for which the description of each item requires access to diverse observation sets. On the other hand, geophysics and earth observations work with simpler underlying information items, but in larger quantities over multiple spatio-temporal dimensions, acquired using complex sensor systems. Multiple transformations between the three viewpoints are involved in the data flows in most investigations, from collection through analysis to information and story. The O&M model classifies observations: - from a provider viewpoint: in terms of the sensor or procedure involved; - from a consumer viewpoint: in terms of the property being reported, and the feature with which it is associated. These concerns carry different weights in different applications

  13. Transportation key facts 2002 : useful information about transportation in Oregon

    DOT National Transportation Integrated Search

    2002-01-01

    The Oregon Department of Transportation 2002 edition of Key Facts summarizes information related to transportation in Oregon. Key Facts can be used for a variety of planning and budget purposes, and it is intended to provide: : an introduction to tra...

  14. Nephrology key information for internists

    PubMed Central

    Salim, Sohail Abdul; Medaura, Juan A.; Malhotra, Bharat; Garla, Vishnu; Ahuja, Shradha; Lawson, Nicki; Pamarthy, Amaleswari; Sonani, Hardik; Kovvuru, Karthik; Palabindala, Venkataraman

    2017-01-01

    ABSTRACT Hospitalists and primary care physicians encounter renal disease daily. Although most cases of acute kidney injury (AKI) are secondary to dehydration and resolve by giving fluids, many cases of AKI are due to not uncommon but unfamiliar causes needing nephrology evaluation. Common indications to consult a nephrologist on an emergency basis include hyperkalemia or volume overload in end stage renal disease patients (ESRD). Other causes of immediate consultation are cresenteric glomerulonephritis / rapidly progressive glomerulonephritis in which renal prognosis of the patient depends on timely intervention. The following evidence-based key information could improve patient care and outcomes. Abbreviations: AKI: Acute kidney injury ESRD: End stage renal disease patients PMID:28638567

  15. Value of Earth Observations: Key principles and techniques of socioeconomic benefits analysis (Invited)

    NASA Astrophysics Data System (ADS)

    Friedl, L.; Macauley, M.; Bernknopf, R.

    2013-12-01

    Internationally, multiple organizations are placing greater emphasis on the societal benefits that governments, businesses, and NGOs can derive from applications of Earth-observing satellite observations, research, and models. A growing set of qualitative, anecdotal examples on the uses of Earth observations across a range of sectors can be complemented by the quantitative substantiation of the socioeconomic benefits. In turn, the expanding breadth of environmental data available and the awareness of their beneficial applications to inform decisions can support new products and services by companies, agencies, and civil society. There are, however, significant efforts needed to bridge the Earth sciences and social and economic sciences fields to build capacity, develop case studies, and refine analytic techniques in quantifying socioeconomic benefits from the use of Earth observations. Some government programs, such as the NASA Earth Science Division's Applied Sciences Program have initiated activities in recent years to quantify the socioeconomic benefits from applications of Earth observations research, and to develop multidisciplinary models for organizations' decision-making activities. A community of practice has conducted workshops, developed impact analysis reports, published a book, developed a primer, and pursued other activities to advance analytic methodologies and build capacity. This paper will present an overview of measuring socioeconomic impacts of Earth observations and how the measures can be translated into a value of Earth observation information. It will address key terms, techniques, principles and applications of socioeconomic impact analyses. It will also discuss activities to pursue a research agenda on analytic techniques, develop a body of knowledge, and promote broader skills and capabilities.

  16. Patron Banning in the Nightlife Entertainment Districts: A Key Informant Perspective.

    PubMed

    Miller, Peter; Curtis, Ashlee; Palmer, Darren; Warren, Ian; McFarlane, Emma

    2016-07-01

    Alcohol-related harm in and around licensed venues is associated with substantial costs. Many interventions have been introduced in an effort to combat these harms, and one such intervention is known as patron banning. Patron banning involves prohibiting patrons who have been violent or disorderly in a licensed venue in an attempt to reduce alcohol-related harm. It can be implemented by the venue, by members of police, or by liquor accords. This study aimed to obtain key informant perspectives on the benefits of patron banning as well as on the effectiveness of patron banning in reducing alcohol-related harm. Thirty-six key informants provided perspectives on patron banning through in-depth interviews that were part of a larger study. Key informants were supportive of patron banning for reducing alcohol-related harm, noting that it had many benefits including increased venue safety, general risk management, and deterrence of antisocial behavior. Although processes for banning were not always consistent, identification scanners were generally recognized as a way to ensure that patron banning was enforced. Key informants viewed patron banning as an effective measure for increasing patron safety and reducing alcohol-related harms.

  17. World Key Information Service System Designed For EPCOT Center

    NASA Astrophysics Data System (ADS)

    Kelsey, J. A.

    1984-03-01

    An advanced Bell Laboratories and Western Electric designed electronic information retrieval system utilizing the latest Information Age technologies, and a fiber optic transmission system is featured at the Walt Disney World Resort's newest theme park - The Experimental Prototype Community of Tomorrow (EPCOT Center). The project is an interactive audio, video and text information system that is deployed at key locations within the park. The touch sensitive terminals utilizing the ARIEL (Automatic Retrieval of Information Electronically) System is interconnected by a Western Electric designed and manufactured lightwave transmission system.

  18. Freedom of Information Act Requests: Six Keys to Handling Them

    DTIC Science & Technology

    2016-01-01

    Defense AT&L: January–February 2016 50 Freedom of Information Act Requests Six Keys to Handling Them Michael A. Rodgers Rodgers is a professor of...crucial mission tasks. Understanding and using the six steps and keys provided above will free you from FOIA-induced distractions. The author can be contacted at michael.rodgers@dau.mil.

  19. Key Informants' Perspectives on Teacher Learning in Scotland

    ERIC Educational Resources Information Center

    Kennedy, Aileen; Christie, Donald; Fraser, Christine; Reid, Lesley; McKinney, Stephen; Welsh, Mary; Wilson, Alastair; Griffiths, Morwenna

    2008-01-01

    This article outlines the policy context for teachers' learning and continuing professional development in Scotland and considers this in relation to the perspectives of key informants gained through interview. The analysis draws on a triple-lens conceptual framework and points to some interesting contradictions between the policy text and the…

  20. Key principles to guide development of consumer medicine information--content analysis of information design texts.

    PubMed

    Raynor, David K; Dickinson, David

    2009-04-01

    Effective written consumer medicines information is essential to support safe and effective medicine taking, but the wording and layout of currently provided materials do not meet patients' needs. To identify principles from the wider discipline of information design for use by health professionals when developing or assessing written drug information for patients. Six experts in information design nominated texts on best practice in information design applicable to consumer medicines information. A content analysis identified key principles that were tabulated to bring out key themes. Six texts that met the inclusion criteria, were identified, and content analysis indentified 4 themes: words, type, lines, and layout. Within these main themes, there were 24 subthemes. Selected principles relating to these subthemes were: use short familiar words, short sentences, and short headings that stand out from the text; use a conversational tone of voice, addressing the reader as "you"; use a large type size while retaining sufficient white space; use bullet points to organize lists; use unjustified text (ragged right) and bold, lower-case text for emphasis. Pictures or graphics do not necessarily improve a document. Applying the good information design principles identified to written consumer medicines information could support health professionals when developing and assessing drug information for patients.

  1. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  2. Informed Choice? How the United Kingdom's Key Information Set Fails to Represent Pedagogy to Potential Students

    ERIC Educational Resources Information Center

    Barefoot, Helen; Oliver, Martin; Mellar, Harvey

    2016-01-01

    This paper explores the ways in which information about course pedagogy has been represented to potential students through national descriptors and specifications such as the United Kingdom's Key Information Set. It examines the extent to which such descriptors provide helpful information about pedagogy, for example innovative uses of technology.…

  3. Big Data in the Earth Observing System Data and Information System

    NASA Technical Reports Server (NTRS)

    Lynnes, Chris; Baynes, Katie; McInerney, Mark

    2016-01-01

    Approaches that are being pursued for the Earth Observing System Data and Information System (EOSDIS) data system to address the challenges of Big Data were presented to the NASA Big Data Task Force. Cloud prototypes are underway to tackle the volume challenge of Big Data. However, advances in computer hardware or cloud won't help (much) with variety. Rather, interoperability standards, conventions, and community engagement are the key to addressing variety.

  4. Key informant interviews test plan : model deployment of a regional, multi-modal 511 traveler information system

    DOT National Transportation Integrated Search

    2004-01-28

    This document presents the detailed plan to conduct the Key Informants Interviews Test, one of several test activities to be conducted as part of the national evaluation of the regional, multi-modal 511 Traveler Information System Model Deployment. T...

  5. Metrological challenges for measurements of key climatological observables Part 2: oceanic salinity

    NASA Astrophysics Data System (ADS)

    Pawlowicz, R.; Feistel, R.; McDougall, T. J.; Ridout, P.; Seitz, S.; Wolf, H.

    2016-02-01

    Salinity is a key variable in the modelling and observation of ocean circulation and ocean-atmosphere fluxes of heat and water. In this paper, we examine the climatological relevance of ocean salinity, noting fundamental deficiencies in the definition of this key observable, and its lack of a secure foundation in the International System of Units, the SI. The metrological history of salinity is reviewed, problems with its current definitions and measurement practices are analysed, and options for future improvements are discussed in conjunction with the recent seawater standard TEOS-10.

  6. Information security system based on virtual-optics imaging methodology and public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  7. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.

    PubMed

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.

  8. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study

    PubMed Central

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Background and Objective: Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. Methods: This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. Results: The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. Conclusion: In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making. PMID:29854016

  9. An overview of key silvicultural information for ponderosa pine

    Treesearch

    John Fiske; John Tappeiner

    2005-01-01

    This paper provides a selected list of classical references for the important silvicultural findings for ponderosa pine, and categorizes some of the key current literature, as well as some of the older, lesser known but important literature. The paper also provides some history of scientific developments, and sources of further information.

  10. Vocational bias: a potential pitfall in the use of key informant interviews in pediatric community needs assessments.

    PubMed

    Northrip, Kimberly; Chen, Candice; Marsh, Jennifer

    2008-04-29

    Key informants are individuals with insight into a community or a problem of interest. Our objective was to evaluate the effect of the employment type of key informants on the outcome of a pediatric needs assessment for an urban community. Twenty-one interviews were conducted during the course of a pediatric community needs assessment. As part of the interview, informants were asked to list the top three problems facing children in their community. We analyzed their answers to determine if informant responses differed by employment type. Key informants were divided into four employment types: health care setting, social service, business, and infrastructure. Responses were coded as being primarily one of three types: medical, social, or resource. Our results showed that those informants who worked in a health care setting listed medical problems more often than those who did not (p < 0.04). Those who worked in social services listed resource problems more often than those who did not (p < 0.05). Those in business and infrastructure positions listed more social problems (p < 0.37). No difference was observed in response type between those who had lived in the community at some point and those who had not. This study lends support to the hypothesis that informants' reporting of community problems is biased by their vocation. Clinicians often focus their needs assessments on health care workers. This study suggests, however, that we need to take into consideration the bias this presents and to seek to interview people with diverse work experiences. By limiting the process to health care workers, clinicians are likely to get a skewed perspective of a community's needs and wants.

  11. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    PubMed

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.

  12. The ECAR Study of Undergraduate Students and Information Technology, 2010. Key Findings

    ERIC Educational Resources Information Center

    Smith, Shannon D.; Caruso, Judith Borreson

    2010-01-01

    This document presents the key findings from "The ECAR Study of Undergraduate Students and Information Technology, 2010". Since 2004, the annual ECAR (EDUCAUSE Center for Applied Research) study of undergraduate students and information technology has sought to shed light on how information technology affects the college experience. We…

  13. Virtual-optical information security system based on public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  14. Key features of an EU health information system: a concept mapping study.

    PubMed

    Rosenkötter, Nicole; Achterberg, Peter W; van Bon-Martens, Marja J H; Michelsen, Kai; van Oers, Hans A M; Brand, Helmut

    2016-02-01

    Despite the acknowledged value of an EU health information system (EU-HISys) and the many achievements in this field, the landscape is still heavily fragmented and incomplete. Through a systematic analysis of the opinions and valuations of public health stakeholders, this study aims to conceptualize key features of an EU-HISys. Public health professionals and policymakers were invited to participate in a concept mapping procedure. First, participants (N = 34) formulated statements that reflected their vision of an EU-HISys. Second, participants (N = 28) rated the relative importance of each statement and grouped conceptually similar ones. Principal Component and cluster analyses were used to condense these results to EU-HISys key features in a concept map. The number of key features and the labelling of the concept map were determined by expert consensus. The concept map contains 10 key features that summarize 93 statements. The map consists of a horizontal axis that represents the relevance of an 'organizational strategy', which deals with the 'efforts' to design and develop an EU-HISys and the 'achievements' gained by a functioning EU-HISys. The vertical axis represents the 'professional orientation' of the EU-HISys, ranging from the 'scientific' through to the 'policy' perspective. The top ranking statement expressed the need to establish a system that is permanent and sustainable. The top ranking key feature focuses on data and information quality. This study provides insights into key features of an EU-HISys. The results can be used to guide future planning and to support the development of a health information system for Europe. © The Author 2015. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  15. Acadia National Park ITS field operational test : key informant interviews

    DOT National Transportation Integrated Search

    2003-03-01

    This document reflects the ideas and opinions of a group of key informants and stakeholders involved in the Field Operational Test of ITS components in and around Acadia National Park from 1999 through 2002. The stakeholders were involved in the plan...

  16. NASA's Earth Observing Data and Information System

    NASA Technical Reports Server (NTRS)

    Mitchell, Andrew E.; Behnke, Jeanne; Lowe, Dawn; Ramapriyan, H. K.

    2009-01-01

    NASA's Earth Observing System Data and Information System (EOSDIS) has been a central component of NASA Earth observation program for over 10 years. It is one of the largest civilian science information system in the US, performing ingest, archive and distribution of over 3 terabytes of data per day much of which is from NASA s flagship missions Terra, Aqua and Aura. The system supports a variety of science disciplines including polar processes, land cover change, radiation budget, and most especially global climate change. The EOSDIS data centers, collocated with centers of science discipline expertise, archive and distribute standard data products produced by science investigator-led processing systems. Key to the success of EOSDIS is the concept of core versus community requirements. EOSDIS supports a core set of services to meet specific NASA needs and relies on community-developed services to meet specific user needs. EOSDIS offers a metadata registry, ECHO (Earth Observing System Clearinghouse), through which the scientific community can easily discover and exchange NASA s Earth science data and services. Users can search, manage, and access the contents of ECHO s registries (data and services) through user-developed and community-tailored interfaces or clients. The ECHO framework has become the primary access point for cross-Data Center search-and-order of EOSDIS and other Earth Science data holdings archived at the EOSDIS data centers. ECHO s Warehouse Inventory Search Tool (WIST) is the primary web-based client for discovering and ordering cross-discipline data from the EOSDIS data centers. The architecture of the EOSDIS provides a platform for the publication, discovery, understanding and access to NASA s Earth Observation resources and allows for easy integration of new datasets. The EOSDIS also has developed several methods for incorporating socioeconomic data into its data collection. Over the years, we have developed several methods for determining

  17. A Statewide Key Informant Survey and Social Indicators Analysis.

    ERIC Educational Resources Information Center

    Fleischer, Mitchell

    This needs assessment study of mental health needs of the elderly in Pennsylvania used a three-part approach. These parts were a review of existing data sources, an extensive key informant study, and a review of service delivery models. A recent study found a prevalence rate for mental illness in the elderly of 12.8%, more than 5% lower than the…

  18. Advancing an Information Model for Environmental Observations

    NASA Astrophysics Data System (ADS)

    Horsburgh, J. S.; Aufdenkampe, A. K.; Hooper, R. P.; Lehnert, K. A.; Schreuders, K.; Tarboton, D. G.; Valentine, D. W.; Zaslavsky, I.

    2011-12-01

    Observational data are fundamental to hydrology and water resources, and the way they are organized, described, and shared either enables or inhibits the analyses that can be performed using the data. The CUAHSI Hydrologic Information System (HIS) project is developing cyberinfrastructure to support hydrologic science by enabling better access to hydrologic data. HIS is composed of three major components. HydroServer is a software stack for publishing time series of hydrologic observations on the Internet as well as geospatial data using standards-based web feature, map, and coverage services. HydroCatalog is a centralized facility that catalogs the data contents of individual HydroServers and enables search across them. HydroDesktop is a client application that interacts with both HydroServer and HydroCatalog to discover, download, visualize, and analyze hydrologic observations published on one or more HydroServers. All three components of HIS are founded upon an information model for hydrologic observations at stationary points that specifies the entities, relationships, constraints, rules, and semantics of the observational data and that supports its data services. Within this information model, observations are described with ancillary information (metadata) about the observations to allow them to be unambiguously interpreted and used, and to provide traceable heritage from raw measurements to useable information. Physical implementations of this information model include the Observations Data Model (ODM) for storing hydrologic observations, Water Markup Language (WaterML) for encoding observations for transmittal over the Internet, the HydroCatalog metadata catalog database, and the HydroDesktop data cache database. The CUAHSI HIS and this information model have now been in use for several years, and have been deployed across many different academic institutions as well as across several national agency data repositories. Additionally, components of the HIS

  19. Developing information literacy: a key to evidence-based nursing.

    PubMed

    Shorten, A; Wallace, M C; Crookes, P A

    2001-06-01

    This report describes the evaluation of a curriculum-integrated programme designed to help students develop an awareness of the nursing literature, the skills to locate and retrieve it, and skills required in its evaluation; in other words'information literacy'. Positive changes in student performance on objective measures of information-literacy skills were revealed as well as a significant increase in the levels of confidence of the student in performing those skills. Students who had undertaken the information-literacy programme ('programme' students) performed better on a range of objective measures of information literacy, as well as reporting higher levels of confidence in these skills, than students who had not participated in the programme ('non-programme' students). Evaluation of this programme provides evidence of the potential usefulness of a curriculum-integrated approach for the development of information-literacy skills within nursing education. With these underlying skills, students will be better equipped to consolidate and extend their key information-literacy skills to include research appreciation and application. These are vital for effective lifelong learning and a prerequisite to evidence-based practice.

  20. Information hiding based on double random-phase encoding and public-key cryptography.

    PubMed

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  1. Information processing in bacteria: memory, computation, and statistical physics: a key issues review

    NASA Astrophysics Data System (ADS)

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  2. Information processing in bacteria: memory, computation, and statistical physics: a key issues review.

    PubMed

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  3. Eight Key Issues for the White House Conference on Library and Information Services.

    ERIC Educational Resources Information Center

    American Society for Information Science, Washington, DC.

    Presented as a public service in anticipation of the October 1979 White House Conference on Library and Information Services, the eight papers in this booklet call attention to the key issues which the American Society for Information Science (ASIS) believes have developed from proliferating information and for technological advances. Each of the…

  4. A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory

    NASA Astrophysics Data System (ADS)

    Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu

    2014-07-01

    Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.

  5. NASA's Earth Observing Data and Information System - Near-Term Challenges

    NASA Technical Reports Server (NTRS)

    Behnke, Jeanne; Mitchell, Andrew; Ramapriyan, Hampapuram

    2018-01-01

    NASA's Earth Observing System Data and Information System (EOSDIS) has been a central component of the NASA Earth observation program since the 1990's. EOSDIS manages data covering a wide range of Earth science disciplines including cryosphere, land cover change, polar processes, field campaigns, ocean surface, digital elevation, atmosphere dynamics and composition, and inter-disciplinary research, and many others. One of the key components of EOSDIS is a set of twelve discipline-based Distributed Active Archive Centers (DAACs) distributed across the United States. Managed by NASA's Earth Science Data and Information System (ESDIS) Project at Goddard Space Flight Center, these DAACs serve over 3 million users globally. The ESDIS Project provides the infrastructure support for EOSDIS, which includes other components such as the Science Investigator-led Processing systems (SIPS), common metadata and metrics management systems, specialized network systems, standards management, and centralized support for use of commercial cloud capabilities. Given the long-term requirements, and the rapid pace of information technology and changing expectations of the user community, EOSDIS has evolved continually over the past three decades. However, many challenges remain. Challenges addressed in this paper include: growing volume and variety, achieving consistency across a diverse set of data producers, managing information about a large number of datasets, migration to a cloud computing environment, optimizing data discovery and access, incorporating user feedback from a diverse community, keeping metadata updated as data collections grow and age, and ensuring that all the content needed for understanding datasets by future users is identified and preserved.

  6. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  7. Management of CAD/CAM information: Key to improved manufacturing productivity

    NASA Technical Reports Server (NTRS)

    Fulton, R. E.; Brainin, J.

    1984-01-01

    A key element to improved industry productivity is effective management of CAD/CAM information. To stimulate advancements in this area, a joint NASA/Navy/industry project designated Intergrated Programs for Aerospace-Vehicle Design (IPAD) is underway with the goal of raising aerospace industry productivity through advancement of technology to integrate and manage information involved in the design and manufacturing process. The project complements traditional NASA/DOD research to develop aerospace design technology and the Air Force's Integrated Computer-Aided Manufacturing (ICAM) program to advance CAM technology. IPAD research is guided by an Industry Technical Advisory Board (ITAB) composed of over 100 representatives from aerospace and computer companies.

  8. Clinical information transfer and data capture in the acute myocardial infarction pathway: an observational study.

    PubMed

    Kesavan, Sujatha; Kelay, Tanika; Collins, Ruth E; Cox, Benita; Bello, Fernando; Kneebone, Roger L; Sevdalis, Nick

    2013-10-01

    Acute myocardial infarctions (MIs) or heart attacks are the result of a complete or an incomplete occlusion of the lumen of the coronary artery with a thrombus. Prompt diagnosis and early coronary intervention results in maximum myocardial salvage, hence time to treat is of the essence. Adequate, accurate and complete information is vital during the early stages of admission of an MI patient and can impact significantly on the quality and safety of patient care. This study aimed to record how clinical information between different clinical teams during the journey of a patient in the MI care pathway is captured and to review the flow of information within this care pathway. A prospective, descriptive, structured observational study to assess (i) current clinical information systems (CIS) utilization and (ii) real-time information availability within an acute cardiac care setting was carried out. Completeness and availability of patient information capture across four key stages of the MI care pathway were assessed prospectively. Thirteen separate information systems were utilized during the four phases of the MI pathway. Observations revealed fragmented CIS utilization, with users accessing an average of six systems to gain a complete set of patient information. Data capture was found to vary between each pathway stage and in both patient cohort risk groupings. The highest level of information completeness (100%) was observed only in the discharge stage of the MI care pathway. The lowest level of information completeness (58%) was observed in the admission stage. The study highlights fragmentation, CIS duplication, and discrepancies in the current clinical information capture and data transfer across the MI care pathway in an acute cardiac care setting. The development of an integrated and user-friendly electronic data capture and transfer system would reduce duplication and would facilitate efficient and complete information provision at the point of care. © 2012

  9. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    NASA Astrophysics Data System (ADS)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  10. Channelling information flows from observation to decision; or how to increase certainty

    NASA Astrophysics Data System (ADS)

    Weijs, S. V.

    2015-12-01

    To make adequate decisions in an uncertain world, information needs to reach the decision problem, to enable overseeing the full consequences of each possible decision.On its way from the physical world to a decision problem, information is transferred through the physical processes that influence the sensor, then through processes that happen in the sensor, through wires or electromagnetic waves. For the last decade, most information becomes digitized at some point. From moment of digitization, information can in principle be transferred losslessly. Information about the physical world is often also stored, sometimes in compressed form, such as physical laws, concepts, or models of specific hydrological systems. It is important to note, however, that all information about a physical system eventually has to originate from observation (although inevitably coloured by some prior assumptions). This colouring makes the compression lossy, but is effectively the only way to make use of similarities in time and space that enable predictions while measuring only a a few macro-states of a complex hydrological system.Adding physical process knowledge to a hydrological model can thus be seen as a convenient way to transfer information from observations from a different time or place, to make predictions about another situation, assuming the same dynamics are at work.The key challenge to achieve more certainty in hydrological prediction can therefore be formulated as a challenge to tap and channel information flows from the environment. For tapping more information flows, new measurement techniques, large scale campaigns, historical data sets, and large sample hydrology and regionalization efforts can bring progress. For channelling the information flows with minimum loss, model calibration, and model formulation techniques should be critically investigated. Some experience from research in a Swiss high alpine catchment are used as an illustration.

  11. Predicting Key Events in the Popularity Evolution of Online Information.

    PubMed

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  12. Smart cards--the key to trustworthy health information systems.

    PubMed Central

    Neame, R.

    1997-01-01

    Some 20 years after they were first developed, "smart cards" are set to play a crucial part in healthcare systems. Last year about a billion were supplied, mainly for use in the financial sector, but their special features make them of particular strategic importance for the health sector, where they offer a ready made solution to some key problems of security and confidentiality. This article outlines what smart cards are and why they are so important in managing health information. I discuss some of the unique features of smart cards that are of special importance in the development of secure and trustworthy health information systems. Smart cards would enable individuals' identities to be authenticated and communications to be secured and would provide the mechanisms for implementing strong security, differential access to data, and definitive audit trails. Patient cards can also with complete security carry personal details, data on current health problems and medications, emergency care data, and pointers to where medical records for the patient can be found. Provider cards can in addition carry authorisations and information on computer set up. PMID:9055719

  13. Rethinking Field Observations: Strengthening Teacher Education through INFORM

    ERIC Educational Resources Information Center

    Hoyt, Kristin; Terantino, Joe

    2015-01-01

    This article introduces the Instructional Field Observation Rounds Model (INFORM), drawn from the medical profession where resident interns make rounds with experienced physicians, as an alternative approach for conducting classroom observations in pre-service teacher education methods courses. INFORM centers on structured group observations in…

  14. Linking Earth Observations and Models to Societal Information Needs: The Case of Coastal Flooding

    NASA Astrophysics Data System (ADS)

    Buzzanga, B. A.; Plag, H. P.

    2016-12-01

    Coastal flooding is expected to increase in many areas due to sea level rise (SLR). Many societal applications such as emergency planning and designing public services depend on information on how the flooding spectrum may change as a result of SLR. To identify the societal information needs a conceptual model is needed that identifies the key stakeholders, applications, and information and observation needs. In the context of the development of the Global Earth Observation System of Systems (GEOSS), which is implemented by the Group on Earth Observations (GEO), the Socio-Economic and Environmental Information Needs Knowledge Base (SEE-IN KB) is developed as part of the GEOSS Knowledge Base. A core function of the SEE-IN KB is to facilitate the linkage of societal information needs to observations, models, information and knowledge. To achieve this, the SEE-IN KB collects information on objects such as user types, observational requirements, societal goals, models, and datasets. Comprehensive information concerning the interconnections between instances of these objects is used to capture the connectivity and to establish a conceptual model as a network of networks. The captured connectivity can be used in searches to allow users to discover products and services for their information needs, and providers to search for users and applications benefiting from their products. It also allows to answer "What if?" questions and supports knowledge creation. We have used the SEE-IN KB to develop a conceptual model capturing the stakeholders in coastal flooding and their information needs, and to link these elements to objects. We show how the knowledge base enables the transition of scientific data to useable information by connecting individuals such as city managers to flood maps. Within the knowledge base, these same users can request information that improves their ability to make specific planning decisions. These needs are linked to entities within research

  15. The construction of a public key infrastructure for healthcare information networks in Japan.

    PubMed

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  16. New maps, new information: Coral reefs of the Florida keys

    USGS Publications Warehouse

    Lidz, B.H.; Reich, C.D.; Peterson, R.L.; Shinn, E.A.

    2006-01-01

    A highly detailed digitized map depicts 22 benthic habitats in 3140.5 km2 of the Florida Keys National Marine Sanctuary. Dominant are a seagrass/lime-mud zone (map area 27.5%) throughout Hawk Channel and seagrass/carbonate-sand (18.7%) and bare carbonate-sand (17.3%) zones on the outer shelf and in The Quicksands. A lime-mud/seagrass-covered muddy carbonate-sand zone (9.6%) abuts the keys. Hardbottom communities (13.2%) consist of bare Pleistocene coralline and oolitic limestone, coral rubble, and senile coral reefs. Smaller terrestrial (4.0%) and marine habitats, including those of live coral (patch reefs, 0.7%), account for the rest (13.7%) of the area. Derived from aerial photomosaics, the seabed dataset fits precisely when transposed onto a newly developed National Geophysical Data Center hydrographic-bathymetry map. Combined, the maps point to new information on unstudied seabed morphologies, among them an erosional nearshore rock ledge bordering the seaward side of the Florida Keys and thousands of patch-reef clusters aligned in mid-Hawk Channel. Preliminary indications are that the ledge may represent the seaward extent of the 125-ka Key Largo and Miami Limestone that form the keys, and the patch reefs colonized landward edges of two noncoralline, non-dune-ridge topographic troughs. The troughs, their substrate, and inner-shelf location along the seaward side of the Hawk Channel bedrock depression are the first of that type of nuclei to be recognized in the Florida reef record. Together, the map datasets establish the efficacy and accuracy of using aerial photographs to define in extraordinary detail the seabed features and habitats in a shallow-reef setting.

  17. Predicting Key Events in the Popularity Evolution of Online Information

    PubMed Central

    Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the “burst”, “peak”, and “fade” key events together as a representative summary of popularity evolution. We propose a novel prediction task—predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify “burst”, “peak”, and “fade” in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution. PMID:28046121

  18. Tools for community-oriented primary care: use of key informant trees in eleven practices.

    PubMed Central

    Williams, R. L.; Jaén, C. R.

    2000-01-01

    Physicians increasingly need information about their communities to use in care of the individual patient. Busy practitioners need feasible methods for collecting this information before they can begin to gather and use it, however. Our objective was to study key informant trees as a practical approach for practice-based gathering of qualitative data from a community. Following a standard protocol, key informant trees were set up in 11 different practices to study the costs, advantages, and problems with their use for this purpose. Time studies showed that each tree took 7 to 11 hours of physician time and 7 hours of clerical time to organize and conduct. The technique appeared to be best suited for two qualitative informational needs: idea generation and explanatory data gathering. Trees appeared most productive where there was stability of physician staff in the practice, where the practice had been present in the community for some years, and where community residents were relatively stable. Response and selection biases are important considerations in use of this technique. PMID:10976171

  19. Attribution of Observed Streamflow Changes in Key British Columbia Drainage Basins

    NASA Astrophysics Data System (ADS)

    Najafi, Mohammad Reza; Zwiers, Francis W.; Gillett, Nathan P.

    2017-11-01

    We study the observed decline in summer streamflow in four key river basins in British Columbia (BC), Canada, using a formal detection and attribution (D&A) analysis procedure. Reconstructed and simulated streamflow is generated using the semidistributed variable infiltration capacity hydrologic model, which is driven by 1/16° gridded observations and downscaled climate model data from the Coupled Model Intercomparison Project phase 5 (CMIP5), respectively. The internal variability of the regional hydrologic components using 5100 years of streamflow was simulated using CMIP5 preindustrial control runs. Results show that the observed changes in summer streamflow are inconsistent with simulations representing the responses to natural forcing factors alone, while the response to anthropogenic and natural forcing factors combined is detected in these changes. A two-signal D&A analysis indicates that the effects of anthropogenic (ANT) forcing factors are discernable from natural forcing in BC, albeit with large uncertainties.

  20. Scent marking in Sunda clouded leopards (Neofelis diardi): novel observations close a key gap in understanding felid communication behaviours.

    PubMed

    Allen, Maximilian L; Wittmer, Heiko U; Setiawan, Endro; Jaffe, Sarah; Marshall, Andrew J

    2016-10-14

    Intraspecific communication is integral to the behavioural ecology of solitary carnivores, but observing and quantifying their communication behaviours in natural environments is difficult. Our systematic literature review found that basic information on scent marking is completely lacking for 23% of all felid species, and information on 21% of other felid species comes solely from one study of captive animals. Here we present results of the first systematic investigation of the scent marking behaviours of Sunda clouded leopards in the wild. Our observations using motion-triggered video cameras in Indonesian Borneo are novel for clouded leopards, and contrary to previous descriptions of their behaviour. We found that clouded leopards displayed 10 distinct communication behaviours, with olfaction, scraping, and cheek rubbing the most frequently recorded. We also showed that males make repeated visits to areas they previously used for marking and that multiple males advertise and receive information at the same sites, potentially enhancing our ability to document and monitor clouded leopard populations. The behaviours we recorded are remarkably similar to those described in other solitary felids, despite tremendous variation in the environments they inhabit, and close a key gap in understanding and interpreting communication behaviours of clouded leopards and other solitary felids.

  1. Scent marking in Sunda clouded leopards (Neofelis diardi): novel observations close a key gap in understanding felid communication behaviours

    PubMed Central

    Allen, Maximilian L.; Wittmer, Heiko U.; Setiawan, Endro; Jaffe, Sarah; Marshall, Andrew J.

    2016-01-01

    Intraspecific communication is integral to the behavioural ecology of solitary carnivores, but observing and quantifying their communication behaviours in natural environments is difficult. Our systematic literature review found that basic information on scent marking is completely lacking for 23% of all felid species, and information on 21% of other felid species comes solely from one study of captive animals. Here we present results of the first systematic investigation of the scent marking behaviours of Sunda clouded leopards in the wild. Our observations using motion-triggered video cameras in Indonesian Borneo are novel for clouded leopards, and contrary to previous descriptions of their behaviour. We found that clouded leopards displayed 10 distinct communication behaviours, with olfaction, scraping, and cheek rubbing the most frequently recorded. We also showed that males make repeated visits to areas they previously used for marking and that multiple males advertise and receive information at the same sites, potentially enhancing our ability to document and monitor clouded leopard populations. The behaviours we recorded are remarkably similar to those described in other solitary felids, despite tremendous variation in the environments they inhabit, and close a key gap in understanding and interpreting communication behaviours of clouded leopards and other solitary felids. PMID:27739507

  2. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  3. Management of CAD/CAM information: Key to improved manufacturing productivity

    NASA Technical Reports Server (NTRS)

    Fulton, R. E.; Brainin, J.

    1984-01-01

    A key element to improved industry productivity is effective management of CAD/CAM information. To stimulate advancements in this area, a joint NASA/Navy/Industry project designated Integrated Programs for Aerospace-Vehicle Design (IPAD) is underway with the goal of raising aerospace industry productivity through advancement of technology to integrate and manage information involved in the design and manufacturing process. The project complements traditional NASA/DOD research to develop aerospace design technology and the Air Force's Integrated Computer-Aided Manufacturing (ICAM) program to advance CAM technology. IPAD research is guided by an Industry Technical Advisory Board (ITAB) composed of over 100 repesentatives from aerospace and computer companies. The IPAD accomplishments to date in development of requirements and prototype software for various levels of company-wide CAD/CAM data management are summarized and plans for development of technology for management of distributed CAD/CAM data and information required to control future knowledge-based CAD/CAM systems are discussed.

  4. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  5. 77 FR 17458 - Proposed Information Collection; Comment Request; Observer Programs' Information that Can Be...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-26

    ... DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration Proposed Information Collection; Comment Request; Observer Programs' Information that Can Be Gathered Only Through Questions... options; and (5) ensure that the observer programs can safely and efficiently collect the information...

  6. Stakeholder engagement: a key component of integrating genomic information into electronic health records

    PubMed Central

    Hartzler, Andrea; McCarty, Catherine A.; Rasmussen, Luke V.; Williams, Marc S.; Brilliant, Murray; Bowton, Erica A.; Clayton, Ellen Wright; Faucett, William A.; Ferryman, Kadija; Field, Julie R.; Fullerton, Stephanie M.; Horowitz, Carol R.; Koenig, Barbara A.; McCormick, Jennifer B.; Ralston, James D.; Sanderson, Saskia C.; Smith, Maureen E.; Trinidad, Susan Brown

    2014-01-01

    Integrating genomic information into clinical care and the electronic health record can facilitate personalized medicine through genetically guided clinical decision support. Stakeholder involvement is critical to the success of these implementation efforts. Prior work on implementation of clinical information systems provides broad guidance to inform effective engagement strategies. We add to this evidence-based recommendations that are specific to issues at the intersection of genomics and the electronic health record. We describe stakeholder engagement strategies employed by the Electronic Medical Records and Genomics Network, a national consortium of US research institutions funded by the National Human Genome Research Institute to develop, disseminate, and apply approaches that combine genomic and electronic health record data. Through select examples drawn from sites of the Electronic Medical Records and Genomics Network, we illustrate a continuum of engagement strategies to inform genomic integration into commercial and homegrown electronic health records across a range of health-care settings. We frame engagement as activities to consult, involve, and partner with key stakeholder groups throughout specific phases of health information technology implementation. Our aim is to provide insights into engagement strategies to guide genomic integration based on our unique network experiences and lessons learned within the broader context of implementation research in biomedical informatics. On the basis of our collective experience, we describe key stakeholder practices, challenges, and considerations for successful genomic integration to support personalized medicine. PMID:24030437

  7. Part II--Factors Associated with School Nurse Ratios: Key State Informants' Perceptions

    ERIC Educational Resources Information Center

    Maughan, Erin

    2009-01-01

    This paper is the second of a two-part series examining factors influencing school nurse to pupil staffing ratios. The paper reports data from a qualitative study exploring the social and political factors that potentially influence ratios. Interviews were conducted with 30 key state informants from these states. Content analysis of the data…

  8. The Complicate Observations and Multi-Parameter Land Information Constructions on Allied Telemetry Experiment (COMPLICATE)

    PubMed Central

    Tian, Xin; Li, Zengyuan; Chen, Erxue; Liu, Qinhuo; Yan, Guangjian; Wang, Jindi; Niu, Zheng; Zhao, Shaojie; Li, Xin; Pang, Yong; Su, Zhongbo; van der Tol, Christiaan; Liu, Qingwang; Wu, Chaoyang; Xiao, Qing; Yang, Le; Mu, Xihan; Bo, Yanchen; Qu, Yonghua; Zhou, Hongmin; Gao, Shuai; Chai, Linna; Huang, Huaguo; Fan, Wenjie; Li, Shihua; Bai, Junhua; Jiang, Lingmei; Zhou, Ji

    2015-01-01

    The Complicate Observations and Multi-Parameter Land Information Constructions on Allied Telemetry Experiment (COMPLICATE) comprises a network of remote sensing experiments designed to enhance the dynamic analysis and modeling of remotely sensed information for complex land surfaces. Two types of experimental campaigns were established under the framework of COMPLICATE. The first was designed for continuous and elaborate experiments. The experimental strategy helps enhance our understanding of the radiative and scattering mechanisms of soil and vegetation and modeling of remotely sensed information for complex land surfaces. To validate the methodologies and models for dynamic analyses of remote sensing for complex land surfaces, the second campaign consisted of simultaneous satellite-borne, airborne, and ground-based experiments. During field campaigns, several continuous and intensive observations were obtained. Measurements were undertaken to answer key scientific issues, as follows: 1) Determine the characteristics of spatial heterogeneity and the radiative and scattering mechanisms of remote sensing on complex land surfaces. 2) Determine the mechanisms of spatial and temporal scale extensions for remote sensing on complex land surfaces. 3) Determine synergist inversion mechanisms for soil and vegetation parameters using multi-mode remote sensing on complex land surfaces. Here, we introduce the background, the objectives, the experimental designs, the observations and measurements, and the overall advances of COMPLICATE. As a result of the implementation of COMLICATE and for the next several years, we expect to contribute to quantitative remote sensing science and Earth observation techniques. PMID:26332035

  9. The Gulf of Mexico Coastal Ocean Observing System: Building an MBON for the Florida Keys.

    NASA Astrophysics Data System (ADS)

    Howard, M.; Stoessel, M. M.; Currier, R. D.

    2016-02-01

    The Gulf of Mexico Coastal Ocean Observing System Regional Association (GCOOS-RA) Data Portal was designed to aggregate regional data and to serve it to the public through standards-based services in useful and desirable forms. These standards are established and sanctioned for use by the U.S. Integrated Ocean Observing System (IOOS) Program Office with inputs from experts on the Integrated Ocean Observation Committee and the RA informatics community. In 2012, with considerable input from staff from Ocean Biogeographical Information System USA (OBIS-USA), IOOS began to develop and adopt standards for serving biological datasets. GCOOS-RA applied these standards the following year and began serving fisheries independent data through an GCOOS ERDDAP server. In late 2014, GCOOS-RA partnered with the University of South Florida in a 5-year Marine Biodiversity Observing Network (MBON) Project sponsored by NOAA, NASA and BOEM. Work began in 2015. GCOOS' primary role is to aggregate, organize and serve data that are useful to an MBON for the Florida Keys National Marine Sanctuary. GCOOS, in collaboration with Axiom Data Science, will produce a decision support system (DSS) for stakeholders such as NOAA National Marine Sanctuaries Program managers. The datasets to be managed include environmental observations from: field surveys, fixed platforms, and satellites; GIS layers of: bathymetry, shoreline, sanctuary boundaries, living marine resources and habitats; outputs from ocean circulation models and ecosystem models (e.g., Ecopath/Ecosim) and Environmental DNA. Additionally, the DSS may be called upon to perform analyses, compute indices of biodiversity and present results in tabular, graphic and fused forms in an interactive setting. This presentation will discuss our progress to date for this challenging work in data integration.

  10. Secret information reconciliation based on punctured low-density parity-check codes for continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Jiang, Xue-Qin; Huang, Peng; Huang, Duan; Lin, Dakai; Zeng, Guihua

    2017-02-01

    Achieving information theoretic security with practical complexity is of great interest to continuous-variable quantum key distribution in the postprocessing procedure. In this paper, we propose a reconciliation scheme based on the punctured low-density parity-check (LDPC) codes. Compared to the well-known multidimensional reconciliation scheme, the present scheme has lower time complexity. Especially when the chosen punctured LDPC code achieves the Shannon capacity, the proposed reconciliation scheme can remove the information that has been leaked to an eavesdropper in the quantum transmission phase. Therefore, there is no information leaked to the eavesdropper after the reconciliation stage. This indicates that the privacy amplification algorithm of the postprocessing procedure is no more needed after the reconciliation process. These features lead to a higher secret key rate, optimal performance, and availability for the involved quantum key distribution scheme.

  11. Strategies for Supporting Physician-Scientists in Faculty Roles: A Narrative Review With Key Informant Consultations.

    PubMed

    Lingard, Lorelei; Zhang, Peter; Strong, Michael; Steele, Margaret; Yoo, John; Lewis, James

    2017-10-01

    Physician-scientists are a population in decline globally. Solutions to reverse this decline often have focused on the training pipeline. Less attention has been paid to reducing attrition post training, when physician-scientists take up faculty roles. However, this period is a known time of vulnerability because of the pressures of clinical duties and the long timeline to securing independent research funding. This narrative review explored existing knowledge regarding how best to support physician-scientists for success in their faculty roles. The authors searched the Medline, Embase, ERIC, and Cochrane Library databases for articles published from 2000 to 2016 on this topic and interviewed key informants in 2015 to solicit their input on the review results. The authors reviewed 78 articles and interviewed 16 key informants. From the literature, they developed a framework of organizational (facilitate mentorship, foster community, value the physician-scientist role, minimize financial barriers) and individual (develop professional and research skills) strategies for supporting physician-scientists. They also outlined key knowledge gaps representing topics either rarely or never addressed in the reviewed articles (percent research time, structural hypocrisy, objective assessment, group metrics, professional identity). The key informants confirmed the identified strategies and discussed how the gaps were particularly important and impactful. This framework offers a basis for assessing an organization's existing support strategies, identifying outstanding needs, and developing targeted programming. The identified gaps require attention, as they threaten to undermine the benefits of existing support strategies.

  12. A mental health needs assessment of children and adolescents in post-conflict Liberia: results from a quantitative key-informant survey

    PubMed Central

    Borba, Christina P.C.; Ng, Lauren C.; Stevenson, Anne; Vesga-Lopez, Oriana; Harris, Benjamin L.; Parnarouskis, Lindsey; Gray, Deborah A.; Carney, Julia R.; Domínguez, Silvia; Wang, Edward K.S.; Boxill, Ryan; Song, Suzan J.; Henderson, David C.

    2016-01-01

    Between 1989 and 2004, Liberia experienced a devastating civil war that resulted in widespread trauma with almost no mental health infrastructure to help citizens cope. In 2009, the Liberian Ministry of Health and Social Welfare collaborated with researchers from Massachusetts General Hospital to conduct a rapid needs assessment survey in Liberia with local key informants (n = 171) to examine the impact of war and post-war events on emotional and behavioral problems of, functional limitations of, and appropriate treatment settings for Liberian youth aged 5–22. War exposure and post-conflict sexual violence, poverty, infectious disease and parental death negatively impacted youth mental health. Key informants perceived that youth displayed internalizing and externalizing symptoms and mental health-related functional impairment at home, school, work and in relationships. Medical clinics were identified as the most appropriate setting for mental health services. Youth in Liberia continue to endure the harsh social, economic and material conditions of everyday life in a protracted post-conflict state, and have significant mental health needs. Their observed functional impairment due to mental health issues further limited their access to protective factors such as education, employment and positive social relationships. Results from this study informed Liberia's first post-conflict mental health policy. PMID:26807147

  13. A mental health needs assessment of children and adolescents in post-conflict Liberia: results from a quantitative key-informant survey.

    PubMed

    Borba, Christina P C; Ng, Lauren C; Stevenson, Anne; Vesga-Lopez, Oriana; Harris, Benjamin L; Parnarouskis, Lindsey; Gray, Deborah A; Carney, Julia R; Domínguez, Silvia; Wang, Edward K S; Boxill, Ryan; Song, Suzan J; Henderson, David C

    2016-01-02

    Between 1989 and 2004, Liberia experienced a devastating civil war that resulted in widespread trauma with almost no mental health infrastructure to help citizens cope. In 2009, the Liberian Ministry of Health and Social Welfare collaborated with researchers from Massachusetts General Hospital to conduct a rapid needs assessment survey in Liberia with local key informants ( n = 171) to examine the impact of war and post-war events on emotional and behavioral problems of, functional limitations of, and appropriate treatment settings for Liberian youth aged 5-22. War exposure and post-conflict sexual violence, poverty, infectious disease and parental death negatively impacted youth mental health. Key informants perceived that youth displayed internalizing and externalizing symptoms and mental health-related functional impairment at home, school, work and in relationships. Medical clinics were identified as the most appropriate setting for mental health services. Youth in Liberia continue to endure the harsh social, economic and material conditions of everyday life in a protracted post-conflict state, and have significant mental health needs. Their observed functional impairment due to mental health issues further limited their access to protective factors such as education, employment and positive social relationships. Results from this study informed Liberia's first post-conflict mental health policy.

  14. Water clarity in the Florida Keys, USA, as observed from space (1984-2002)

    NASA Astrophysics Data System (ADS)

    Palandro, D. A.; Hu, C.; Andrefouet, S.; Muller-Karger, F. E.; Hallock, P.

    2007-12-01

    Landsat TM and ETM+ satellite data were used to derive the diffuse attenuation coefficient (Kd, m-1), a measure of water clarity, for 29 sites throughout the Florida Keys Reef Tract. A total of 28 individual Landsat images between 1984 and 2002 were used, with imagery gathered every two years for spring seasons and every six years for fall seasons. Useful information was obtained by Landsat bands 1 (blue) and 2 (green), except when sites were covered by clouds or showed turbid water. Landsat band 3 (red) provided no consistent data due to the high absorption of red light by water. Because image sampling represented only one or two samples per year on specific days, and because water turbidity may change over short time scales, it was not possible to assess temporal trends at the sites with the Landsat data. Kd values in band 1 were higher in the spring (mean spring = 0.034 m-1, mean fall = 0.031 m-1) and band 2 were higher in the fall (mean spring = 0.056 m-1, mean fall = 0.058 m-1), but the differences were not statistically significant. Spatial variability was high between sites and between regions (Upper, Middle and Lower Keys), with band 1 ranges of 0.019 m-1 - 0.060 m-1 and band 2 ranges of 0.036 m-1 - 0.076 m-1. The highest Kd values were found in the Upper Keys, followed by the Middle Keys and Lower Keys, respectively. This result must be taken in context however, two Middle Keys sites were found to be inconsistent due to high turbidity, obscuring the benthos and altering our assumption of a visible seafloor, which the algorithm is dependent upon. If all Middle Keys data were valid it is likely that this region would have the highest Kd values for both bands. The Landsat-derived Kd values, and inherent variability, may be influenced by the dominant water mass associated with each Florida Keys region, as well as localized oceanic variables. The methodology used here may be applied to other reef areas and used with satellites that offer higher temporal

  15. Perspectives on impacts of water quality on agriculture and community well-being-a key informant study from Sri Lanka.

    PubMed

    Thoradeniya, Bhadranie; Pinto, Uthpala; Maheshwari, Basant

    2017-11-04

    Integrated management of water quality is critical for sustaining food production and achieving overall well-being of a community. Further, understanding people's perceptions and engagement can play an important role in achieving water and food security. The main aim of this study was to investigate the perspectives of community and other stakeholders as to how water quality impacts on agriculture, livelihood and community well-being within rural farming communities of two dry zone districts of Sri Lanka. The study adopted 'key informant interviews' as the methodology to investigate community and other stakeholder perspectives to collect primary data over a period of four months. The interview contents were then examined using a frequency matrix and graphed using an Excel graphing tool. The raw text was also analysed to understand the broader patterns in the text. A fuzzy logic cognitive map (FCM) was developed using the relationships between various concepts and linkages provided by the key informants. All key informants were concerned with the quality of drinking water they consume and the water used for their food preparation. Key informants representing the farming community indicated that the use of poor quality groundwater with higher levels of hardness has made growing crops difficult in the region. The key informants also identified extensive and ongoing use of agro-chemicals and fertilisers as a major source of pollution in water bodies in both spatio-temporal scale. Based on key informant interviews, possible initiatives that can help improve surface water and groundwater qualities for both drinking and agricultural use in the dry zone of Sri Lanka can be categorised into four broader themes, viz., provision of filtering/treatment systems, reduction in the use of agro-chemical and fertilisers, education of community stakeholders and support of alternative options for portable water supplies. The study indicates that in the key informants' view of

  16. Aerosol typing - key information from aerosol studies

    NASA Astrophysics Data System (ADS)

    Mona, Lucia; Kahn, Ralph; Papagiannopoulos, Nikolaos; Holzer-Popp, Thomas; Pappalardo, Gelsomina

    2016-04-01

    Aerosol typing is a key source of aerosol information from ground-based and satellite-borne instruments. Depending on the specific measurement technique, aerosol typing can be used as input for retrievals or represents an output for other applications. Typically aerosol retrievals require some a priori or external aerosol type information. The accuracy of the derived aerosol products strongly depends on the reliability of these assumptions. Different sensors can make use of different aerosol type inputs. A critical review and harmonization of these procedures could significantly reduce related uncertainties. On the other hand, satellite measurements in recent years are providing valuable information about the global distribution of aerosol types, showing for example the main source regions and typical transport paths. Climatological studies of aerosol load at global and regional scales often rely on inferred aerosol type. There is still a high degree of inhomogeneity among satellite aerosol typing schemes, which makes the use different sensor datasets in a consistent way difficult. Knowledge of the 4d aerosol type distribution at these scales is essential for understanding the impact of different aerosol sources on climate, precipitation and air quality. All this information is needed for planning upcoming aerosol emissions policies. The exchange of expertise and the communication among satellite and ground-based measurement communities is fundamental for improving long-term dataset consistency, and for reducing aerosol type distribution uncertainties. Aerosol typing has been recognized as one of its high-priority activities of the AEROSAT (International Satellite Aerosol Science Network, http://aero-sat.org/) initiative. In the AEROSAT framework, a first critical review of aerosol typing procedures has been carried out. The review underlines the high heterogeneity in many aspects: approach, nomenclature, assumed number of components and parameters used for the

  17. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates.

    PubMed

    Dellson, P; Nilbert, M; Bendahl, P-O; Malmström, P; Carlsson, C

    2011-07-01

    Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials. © 2010 Blackwell Publishing Ltd.

  18. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  19. Understanding Price Elasticities to Inform Public Health Research and Intervention Studies: Key Issues

    PubMed Central

    Nghiem, Nhung; Genç, Murat; Blakely, Tony

    2013-01-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies. PMID:24028228

  20. Diagnosing the Dynamics of Observed and Simulated Ecosystem Gross Primary Productivity with Time Causal Information Theory Quantifiers

    PubMed Central

    Sippel, Sebastian; Mahecha, Miguel D.; Hauhs, Michael; Bodesheim, Paul; Kaminski, Thomas; Gans, Fabian; Rosso, Osvaldo A.

    2016-01-01

    Data analysis and model-data comparisons in the environmental sciences require diagnostic measures that quantify time series dynamics and structure, and are robust to noise in observational data. This paper investigates the temporal dynamics of environmental time series using measures quantifying their information content and complexity. The measures are used to classify natural processes on one hand, and to compare models with observations on the other. The present analysis focuses on the global carbon cycle as an area of research in which model-data integration and comparisons are key to improving our understanding of natural phenomena. We investigate the dynamics of observed and simulated time series of Gross Primary Productivity (GPP), a key variable in terrestrial ecosystems that quantifies ecosystem carbon uptake. However, the dynamics, patterns and magnitudes of GPP time series, both observed and simulated, vary substantially on different temporal and spatial scales. We demonstrate here that information content and complexity, or Information Theory Quantifiers (ITQ) for short, serve as robust and efficient data-analytical and model benchmarking tools for evaluating the temporal structure and dynamical properties of simulated or observed time series at various spatial scales. At continental scale, we compare GPP time series simulated with two models and an observations-based product. This analysis reveals qualitative differences between model evaluation based on ITQ compared to traditional model performance metrics, indicating that good model performance in terms of absolute or relative error does not imply that the dynamics of the observations is captured well. Furthermore, we show, using an ensemble of site-scale measurements obtained from the FLUXNET archive in the Mediterranean, that model-data or model-model mismatches as indicated by ITQ can be attributed to and interpreted as differences in the temporal structure of the respective ecological time

  1. Career Development Factors for Minority Disability and Health Research Leaders: A Key Informant Study

    ERIC Educational Resources Information Center

    Manyibe, Edward O.; Moore, Corey L.; Wang, Ningning; Davis, Dytisha; Aref, Fariborz; Washington, Andre L.; Johnson, Jean; Eugene-Cross, Kenyotta; Muhammad, Atashia; Lewis, Allen

    2017-01-01

    Purpose: This study examined and documented minority disability and health research leaders' experiences and perspectives on career development challenges and success strategies. Methods: A sample of 15 African American, American Indian or Alaskan Native, Latino, and Asian research leaders as key informants participated in the inquiry. Research…

  2. Harmonising and semantically linking key variables from in-situ observing networks of an Integrated Atlantic Ocean Observing System, AtlantOS

    NASA Astrophysics Data System (ADS)

    Darroch, Louise; Buck, Justin

    2017-04-01

    Atlantic Ocean observation is currently undertaken through loosely-coordinated, in-situ observing networks, satellite observations and data management arrangements at regional, national and international scales. The EU Horizon 2020 AtlantOS project aims to deliver an advanced framework for the development of an Integrated Atlantic Ocean Observing System that strengthens the Global Ocean Observing System (GOOS) and contributes to the aims of the Galway Statement on Atlantic Ocean Cooperation. One goal is to ensure that data from different and diverse in-situ observing networks are readily accessible and useable to a wider community, including the international ocean science community and other stakeholders in this field. To help achieve this goal, the British Oceanographic Data Centre (BODC) produced a parameter matrix to harmonise data exchange, data flow and data integration for the key variables acquired by multiple in-situ AtlantOS observing networks such as ARGO, Seafloor Mapping and OceanSITES. Our solution used semantic linking of controlled vocabularies and metadata for parameters that were "mappable" to existing EU and international standard vocabularies. An AtlantOS Essential Variables list of terms (aggregated level) based on Global Climate Observing System (GCOS) Essential Climate Variables (ECV), GOOS Essential Ocean Variables (EOV) and other key network variables was defined and published on the Natural Environment Research Council (NERC) Vocabulary Server (version 2.0) as collection A05 (http://vocab.nerc.ac.uk/collection/A05/current/). This new vocabulary was semantically linked to standardised metadata for observed properties and units that had been validated by the AtlantOS community: SeaDataNet parameters (P01), Climate and Forecast (CF) Standard Names (P07) and SeaDataNet units (P06). Observed properties were mapped to biological entities from the internationally assured AphiaID from the WOrld Register of Marine Species (WoRMS), http

  3. The use of mode of action information in risk assessment: quantitative key events/dose-response framework for modeling the dose-response for key events.

    PubMed

    Simon, Ted W; Simons, S Stoney; Preston, R Julian; Boobis, Alan R; Cohen, Samuel M; Doerrer, Nancy G; Fenner-Crisp, Penelope A; McMullin, Tami S; McQueen, Charlene A; Rowlands, J Craig

    2014-08-01

    The HESI RISK21 project formed the Dose-Response/Mode-of-Action Subteam to develop strategies for using all available data (in vitro, in vivo, and in silico) to advance the next-generation of chemical risk assessments. A goal of the Subteam is to enhance the existing Mode of Action/Human Relevance Framework and Key Events/Dose Response Framework (KEDRF) to make the best use of quantitative dose-response and timing information for Key Events (KEs). The resulting Quantitative Key Events/Dose-Response Framework (Q-KEDRF) provides a structured quantitative approach for systematic examination of the dose-response and timing of KEs resulting from a dose of a bioactive agent that causes a potential adverse outcome. Two concepts are described as aids to increasing the understanding of mode of action-Associative Events and Modulating Factors. These concepts are illustrated in two case studies; 1) cholinesterase inhibition by the pesticide chlorpyrifos, which illustrates the necessity of considering quantitative dose-response information when assessing the effect of a Modulating Factor, that is, enzyme polymorphisms in humans, and 2) estrogen-induced uterotrophic responses in rodents, which demonstrate how quantitative dose-response modeling for KE, the understanding of temporal relationships between KEs and a counterfactual examination of hypothesized KEs can determine whether they are Associative Events or true KEs.

  4. Key Factors in the Success of an Organization's Information Security Culture: A Quantitative Study and Analysis

    ERIC Educational Resources Information Center

    Pierce, Robert E.

    2012-01-01

    This research study reviewed relative literature on information security and information security culture within organizations to determine what factors potentially assist an organization in implementing, integrating, and maintaining a successful organizational information security culture. Based on this review of literature, five key factors were…

  5. Developing a Strategic Program for Chilean Health Information Technology: Environmental Scan and Key Informant Interviews.

    PubMed

    Taylor, Erin Audrey; Fischer, Shira H; Gracner, Tadeja; Tejeda, Ivo; Kim, Alice; Chavez-Herrerias, Emilio; de la Guardia, Fernando Hoces

    2016-06-20

    As part of an effort to assist Chile in developing a strategic program to foster the development of the health information technology (health IT) sector over the next five to ten years, this study assesses the current state of health IT adoption and implementation in Chile, as well as the challenges and opportunities facing the sector over the coming years. The authors conducted an environmental scan and ten key informant interviews and found that there are a number of successful health IT projects and strategies for further development currently underway in Chile, but that the successful projects are generally localized within specific health care providers and lack integration. These and other challenges suggest significant potential for the Ministry of Economy and other stakeholders to take specific actions designed to encourage further development of the health IT sector in Chile over the coming years. The next phase of this effort will use the results from this study to develop a roadmap for the Ministry of Economy to encourage health IT development in Chile over the short, medium, and long terms.

  6. An improved authenticated key agreement protocol for telecare medicine information system.

    PubMed

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  7. Diagnosing the Dynamics of Observed and Simulated Ecosystem Gross Primary Productivity with Time Causal Information Theory Quantifiers

    DOE PAGES

    Sippel, Sebastian; Lange, Holger; Mahecha, Miguel D.; ...

    2016-10-20

    Data analysis and model-data comparisons in the environmental sciences require diagnostic measures that quantify time series dynamics and structure, and are robust to noise in observational data. This paper investigates the temporal dynamics of environmental time series using measures quantifying their information content and complexity. The measures are used to classify natural processes on one hand, and to compare models with observations on the other. The present analysis focuses on the global carbon cycle as an area of research in which model-data integration and comparisons are key to improving our understanding of natural phenomena. We investigate the dynamics of observedmore » and simulated time series of Gross Primary Productivity (GPP), a key variable in terrestrial ecosystems that quantifies ecosystem carbon uptake. However, the dynamics, patterns and magnitudes of GPP time series, both observed and simulated, vary substantially on different temporal and spatial scales. Here we demonstrate that information content and complexity, or Information Theory Quantifiers (ITQ) for short, serve as robust and efficient data-analytical and model benchmarking tools for evaluating the temporal structure and dynamical properties of simulated or observed time series at various spatial scales. At continental scale, we compare GPP time series simulated with two models and an observations-based product. This analysis reveals qualitative differences between model evaluation based on ITQ compared to traditional model performance metrics, indicating that good model performance in terms of absolute or relative error does not imply that the dynamics of the observations is captured well. Furthermore, we show, using an ensemble of site-scale measurements obtained from the FLUXNET archive in the Mediterranean, that model-data or model-model mismatches as indicated by ITQ can be attributed to and interpreted as differences in the temporal structure of the respective ecological

  8. Diagnosing the Dynamics of Observed and Simulated Ecosystem Gross Primary Productivity with Time Causal Information Theory Quantifiers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sippel, Sebastian; Lange, Holger; Mahecha, Miguel D.

    Data analysis and model-data comparisons in the environmental sciences require diagnostic measures that quantify time series dynamics and structure, and are robust to noise in observational data. This paper investigates the temporal dynamics of environmental time series using measures quantifying their information content and complexity. The measures are used to classify natural processes on one hand, and to compare models with observations on the other. The present analysis focuses on the global carbon cycle as an area of research in which model-data integration and comparisons are key to improving our understanding of natural phenomena. We investigate the dynamics of observedmore » and simulated time series of Gross Primary Productivity (GPP), a key variable in terrestrial ecosystems that quantifies ecosystem carbon uptake. However, the dynamics, patterns and magnitudes of GPP time series, both observed and simulated, vary substantially on different temporal and spatial scales. Here we demonstrate that information content and complexity, or Information Theory Quantifiers (ITQ) for short, serve as robust and efficient data-analytical and model benchmarking tools for evaluating the temporal structure and dynamical properties of simulated or observed time series at various spatial scales. At continental scale, we compare GPP time series simulated with two models and an observations-based product. This analysis reveals qualitative differences between model evaluation based on ITQ compared to traditional model performance metrics, indicating that good model performance in terms of absolute or relative error does not imply that the dynamics of the observations is captured well. Furthermore, we show, using an ensemble of site-scale measurements obtained from the FLUXNET archive in the Mediterranean, that model-data or model-model mismatches as indicated by ITQ can be attributed to and interpreted as differences in the temporal structure of the respective ecological

  9. Social networks predict selective observation and information spread in ravens

    PubMed Central

    Rubenstein, Daniel I.; Bugnyar, Thomas; Hoppitt, William; Mikus, Nace; Schwab, Christine

    2016-01-01

    Animals are predicted to selectively observe and learn from the conspecifics with whom they share social connections. Yet, hardly anything is known about the role of different connections in observation and learning. To address the relationships between social connections, observation and learning, we investigated transmission of information in two raven (Corvus corax) groups. First, we quantified social connections in each group by constructing networks on affiliative interactions, aggressive interactions and proximity. We then seeded novel information by training one group member on a novel task and allowing others to observe. In each group, an observation network based on who observed whose task-solving behaviour was strongly correlated with networks based on affiliative interactions and proximity. Ravens with high social centrality (strength, eigenvector, information centrality) in the affiliative interaction network were also central in the observation network, possibly as a result of solving the task sooner. Network-based diffusion analysis revealed that the order that ravens first solved the task was best predicted by connections in the affiliative interaction network in a group of subadult ravens, and by social rank and kinship (which influenced affiliative interactions) in a group of juvenile ravens. Our results demonstrate that not all social connections are equally effective at predicting the patterns of selective observation and information transmission. PMID:27493780

  10. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  11. Precipitation information from GNSS Polarimetric Radio Occultation observations

    NASA Astrophysics Data System (ADS)

    Padulles, R.; Cardellach, E.; Turk, J.; Tomás, S.; Ao, C. O.; de la Torre-Juárez, M.

    2017-12-01

    There is currently a gap in satellite observations of the moisture structure during heavy precipitation conditions, since infrared and microwave sounders cannot sense water vapor structure near the surface in the presence of intense precipitation. Conversely, Global Navigation Satellite System (GNSS) Radio Occultations (RO) can profile the moisture structure with high precision and vertical resolution, but cannot directly indicate the presence of precipitation. Polarimetric RO (PRO) measurements have been proposed as a method to characterize heavy rain in GNSS RO, by measuring the polarimetric differential phase delay induced by large size hydrometeors. The PRO concept will be tested from space for the first time on board the Spanish PAZ satellite, planned for launch by the end of 2017. Therefore, for the first time ever, GNSS RO measurements will be taken at two polarizations, to exploit the potential capabilities of polarimetric RO for detecting and quantifying heavy precipitation events. If the concept is proved, PAZ will mean a new application of the GNSS Radio-Occultation observations, by providing coincident thermodynamic and precipitation information with high vertical resolution within regions with thick clouds. Before the launch, a series of studies have been performed in order to assess the retrieval of precipitation information from the polarimetric observations. These studies have been based on coincident observations from the COSMIC / FORMOSAT-3 RO satellite constellation, and TRMM and GPM missions. This massive collocation exercise allowed us to build a series of Look Up Tables that relate probabilistically the precipitation intensity to the polarimetric observables. Such studies needed a previous characterization of the polarimetric observable, since it contains contributions from the ionosphere and the emitting and receiving systems. For this purpose, complete end-to-end simulations have been performed, where information from the ionospheric state

  12. Implementation of eMental Health care: viewpoints from key informants from organizations and agencies with eHealth mandates.

    PubMed

    Wozney, Lori; Newton, Amanda S; Gehring, Nicole D; Bennett, Kathryn; Huguet, Anna; Hartling, Lisa; Dyson, Michele P; McGrath, Patrick

    2017-06-02

    The use of technology such as computers, tablets, and smartphones to improve access to and the delivery of mental health care (eMental Health care) is growing worldwide. However, despite the rapidly expanding evidence base demonstrating the efficacy of eMental Health care, its implementation in clinical practice and health care systems remains fragmented. To date, no peer-reviewed, key-informant studies have reported on the perspectives of decision-makers concerned with whether and how to implement eMental Health care. From September to November 2015, we conducted 31 interviews with key informants responsible for leadership, policy, research, and/ or information technology in organizations influential in the adoption of technology for eMental Health care. Deductive and inductive thematic analyses of transcripts were conducted using the Behavior Change Wheel as an organizing framework. Frequency and intensity effect sizes were calculated for emerging themes to further explore patterns within the data. Key informant responses (n = 31) representing 6 developed countries and multiple organizations showed consensus on common factors impacting implementation: individual and organizational capacities (e.g., computer literacy skills [patients and providers], knowledge gaps about cyber security, limited knowledge of available services); motivational drivers of technology-based care (e.g., extending care, data analytics); and opportunities for health systems to advance eMental Health care implementation (e.g., intersectoral research, rapid testing cycles, sustainable funding). Frequency effect sizes showed strong associations between implementation and credibility, knowledge, workflow, patient empowerment, electronic medical record (EMR) integration, sustained funding and intersectoral networks. Intensity effect sizes showed the highest concentration of statements (>10% of all comments) related to funding, credibility, knowledge gaps, and patient empowerment. This study

  13. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  14. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    DTIC Science & Technology

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  15. Understanding key tradeoffs for cost-effective deployment of surveillance to support advanced traveler information systems (ATIS)

    DOT National Transportation Integrated Search

    2004-04-01

    This paper presents the authors' understanding of a key tradeoff in ATIS investment planning: investment in expanding surveillance coverage to additional miles of roadway vs. improving the accuracy of the information provided on roadways already cove...

  16. Earth Observation-Supported Service Platform for the Development and Provision of Thematic Information on the Built Environment - the Tep-Urban Project

    NASA Astrophysics Data System (ADS)

    Esch, T.; Asamer, H.; Boettcher, M.; Brito, F.; Hirner, A.; Marconcini, M.; Mathot, E.; Metz, A.; Permana, H.; Soukop, T.; Stanek, F.; Kuchar, S.; Zeidler, J.; Balhar, J.

    2016-06-01

    The Sentinel fleet will provide a so-far unique coverage with Earth observation data and therewith new opportunities for the implementation of methodologies to generate innovative geo-information products and services. It is here where the TEP Urban project is supposed to initiate a step change by providing an open and participatory platform based on modern ICT technologies and services that enables any interested user to easily exploit Earth observation data pools, in particular those of the Sentinel missions, and derive thematic information on the status and development of the built environment from these data. Key component of TEP Urban project is the implementation of a web-based platform employing distributed high-level computing infrastructures and providing key functionalities for i) high-performance access to satellite imagery and derived thematic data, ii) modular and generic state-of-the art pre-processing, analysis, and visualization techniques, iii) customized development and dissemination of algorithms, products and services, and iv) networking and communication. This contribution introduces the main facts about the TEP Urban project, including a description of the general objectives, the platform systems design and functionalities, and the preliminary portfolio products and services available at the TEP Urban platform.

  17. Uncertainty information in climate data records from Earth observation

    NASA Astrophysics Data System (ADS)

    Merchant, C. J.

    2017-12-01

    How to derive and present uncertainty in climate data records (CDRs) has been debated within the European Space Agency Climate Change Initiative, in search of common principles applicable across a range of essential climate variables. Various points of consensus have been reached, including the importance of improving provision of uncertainty information and the benefit of adopting international norms of metrology for language around the distinct concepts of uncertainty and error. Providing an estimate of standard uncertainty per datum (or the means to readily calculate it) emerged as baseline good practice, and should be highly relevant to users of CDRs when the uncertainty in data is variable (the usual case). Given this baseline, the role of quality flags is clarified as being complementary to and not repetitive of uncertainty information. Data with high uncertainty are not poor quality if a valid estimate of the uncertainty is available. For CDRs and their applications, the error correlation properties across spatio-temporal scales present important challenges that are not fully solved. Error effects that are negligible in the uncertainty of a single pixel may dominate uncertainty in the large-scale and long-term. A further principle is that uncertainty estimates should themselves be validated. The concepts of estimating and propagating uncertainty are generally acknowledged in geophysical sciences, but less widely practised in Earth observation and development of CDRs. Uncertainty in a CDR depends in part (and usually significantly) on the error covariance of the radiances and auxiliary data used in the retrieval. Typically, error covariance information is not available in the fundamental CDR (FCDR) (i.e., with the level-1 radiances), since provision of adequate level-1 uncertainty information is not yet standard practice. Those deriving CDRs thus cannot propagate the radiance uncertainty to their geophysical products. The FIDUCEO project (www.fiduceo.eu) is

  18. Childhood disability in Malawi: a population based assessment using the key informant method.

    PubMed

    Tataryn, Myroslava; Polack, Sarah; Chokotho, Linda; Mulwafu, Wakisa; Kayange, Petros; Banks, Lena Morgon; Noe, Christiane; Lavy, Chris; Kuper, Hannah

    2017-11-28

    Epidemiological data on childhood disability are lacking in Low and Middle Income countries (LMICs) such as Malawi, hampering effective service planning and advocacy. The Key Informant Method (KIM) is an innovative, cost-effective method for generating population data on the prevalence and causes of impairment in children. The aim of this study was to use the Key Informant Method to estimate the prevalence of moderate/severe, hearing, vision and physical impairments, intellectual impairments and epilepsy in children in two districts in Malawi and to estimate the associated need for rehabilitation and other services. Five hundred key informants (KIs) were trained to identify children in their communities who may have the impairment types included in this study. Identified children were invited to attend a screening camp where they underwent assessment by medical professionals for moderate/severe hearing, vision and physical impairments, intellectual impairments and epilepsy. Approximately 15,000 children were identified by KIs as potentially having an impairment of whom 7220 (48%) attended a screening camp. The estimated prevalence of impairments/epilepsy was 17.3/1000 children (95% CI: 16.9-17.7). Physical impairment (39%) was the commonest impairment type followed by hearing impairment (27%), intellectual impairment (26%), epilepsy (22%) and vision impairment (4%). Approximately 2100 children per million population could benefit from physiotherapy and occupational therapy and 300 per million are in need of a wheelchair. An estimated 1800 children per million population have hearing impairment caused by conditions that could be prevented or treated through basic primary ear care. Corneal opacity was the leading cause of vision impairment. Only 50% of children with suspected epilepsy were receiving medication. The majority (73%) of children were attending school, but attendance varied by impairment type and was lowest among children with multiple impairments (38

  19. Optical key system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  20. Participation rate or informed choice? Rethinking the European key performance indicators for mammography screening.

    PubMed

    Strech, Daniel

    2014-03-01

    Despite the intensive controversies about the likelihood of benefits and harms of mammography screening almost all experts conclude that the choice to screen or not to screen needs to be made by the individual patient who is adequately informed. However, the "European guideline for quality assurance in breast cancer screening and diagnosis" specifies a participation rate of 70% as the key performance indicator for mammography screening. This paper argues that neither the existing evidence on benefits and harms, nor survey research with women, nor compliance rates in clinical trials, nor cost-effectiveness ratios justify participation rates as a reasonable performance indicator for preference-sensitive condition such as mammography screening. In contrast, an informed choice rate would be more reasonable. Further research needs to address the practical challenges in assessing informed choice rates. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  1. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan

    2015-08-01

    Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

  2. Herschel Observations of Protostellar and Young Stellar Objects in Nearby Molecular Clouds: The DIGIT Open Time Key Project

    NASA Astrophysics Data System (ADS)

    Green, Joel D.; DIGIT OTKP Team

    2010-01-01

    The DIGIT (Dust, Ice, and Gas In Time) Open Time Key Project utilizes the PACS spectrometer (57-210 um) onboard the Herschel Space Observatory to study the colder regions of young stellar objects and protostellar cores, complementary to recent observations from Spitzer and ground-based observatories. DIGIT focuses on 30 embedded sources and 64 disk sources, and includes supporting photometry from PACS and SPIRE, as well as spectroscopy from HIFI, selected from nearby molecular clouds. For the embedded sources, PACS spectroscopy will allow us to address the origin of [CI] and high-J CO lines observed with ISO-LWS. Our observations are sensitive to the presence of cold crystalline water ice, diopside, and carbonates. Additionally, PACS scans are 5x5 maps of the embedded sources and their outflows. Observations of more evolved disk sources will sample low and intermediate mass objects as well as a variety of spectral types from A to M. Many of these sources are extremely rich in mid-IR crystalline dust features, enabling us to test whether similar features can be detected at larger radii, via colder dust emission at longer wavelengths. If processed grains are present only in the inner disk (in the case of full disks) or from the emitting wall surface which marks the outer edge of the gap (in the case of transitional disks), there must be short timescales for dust processing; if processed grains are detected in the outer disk, radial transport must be rapid and efficient. Weak bands of forsterite and clino- and ortho-enstatite in the 60-75 um range provide information about the conditions under which these materials were formed. For the Science Demonstration Phase we are observing an embedded protostar (DK Cha) and a Herbig Ae/Be star (HD 100546), exemplars of the kind of science that DIGIT will achieve over the full program.

  3. Linking Informant Discrepancies to Observed Variations in Young Children's Disruptive Behavior

    ERIC Educational Resources Information Center

    De Los Reyes, Andres; Henry, David B.; Tolan, Patrick H.; Wakschlag, Lauren S.

    2009-01-01

    Prior work has not tested the basic theoretical notion that informant discrepancies in reports of children's behavior exist, in part, because different informants observe children's behavior in different settings. We examined patterns of observed preschool disruptive behavior across varying social contexts in the laboratory and whether they…

  4. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    ERIC Educational Resources Information Center

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  5. Key performance indicators to benchmark hospital information systems - a delphi study.

    PubMed

    Hübner-Bloder, G; Ammenwerth, E

    2009-01-01

    To identify the key performance indicators for hospital information systems (HIS) that can be used for HIS benchmarking. A Delphi survey with one qualitative and two quantitative rounds. Forty-four HIS experts from health care IT practice and academia participated in all three rounds. Seventy-seven performance indicators were identified and organized into eight categories: technical quality, software quality, architecture and interface quality, IT vendor quality, IT support and IT department quality, workflow support quality, IT outcome quality, and IT costs. The highest ranked indicators are related to clinical workflow support and user satisfaction. Isolated technical indicators or cost indicators were not seen as useful. The experts favored an interdisciplinary group of all the stakeholders, led by hospital management, to conduct the HIS benchmarking. They proposed benchmarking activities both in regular (annual) intervals as well as at defined events (for example after IT introduction). Most of the experts stated that in their institutions no HIS benchmarking activities are being performed at the moment. In the context of IT governance, IT benchmarking is gaining importance in the healthcare area. The found indicators reflect the view of health care IT professionals and researchers. Research is needed to further validate and operationalize key performance indicators, to provide an IT benchmarking framework, and to provide open repositories for a comparison of the HIS benchmarks of different hospitals.

  6. Economic and Physical Linkages of the Information and Communication Technology (ICT) Service Industry to Key Industries of the Economy: An Ad Hoc Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, David M.; Hoffman, Michael G.; Niemeyer, Jackie M.

    This report examines the information and communications technology (ICT) services industry in response to an inquiry by the Department of Energy’s (DOE’s) Office of Energy Policy and Systems Analysis. The report answers several key questions: •How has the reliance on ICT services evolved in recent years for key infrastructure services such as air travel, freight transport, electricity and natural gas distribution, financial services, and critical health care, and for the household sector? •What ICT industry trends explain continued strong linkage to and reliance upon ICT? •What is the ICT industry’s reliance on grid-supplied power, uninterruptible power supplies, emergency generators andmore » back-up energy storage technologies? •What are the observed direct effects of ICT disruptions induced by electrical system failures in recent history and how resilient are the components of the ICT industry?« less

  7. An ICU Preanesthesia Evaluation Form Reduces Missing Preoperative Key Information.

    PubMed

    Chuy, Katherine; Yan, Zhe; Fleisher, Lee; Liu, Renyu

    2012-09-28

    A comprehensive preoperative evaluation is critical for providing anesthetic care for patients from the intensive care unit (ICU). There has been no preoperative evaluation form specific for ICU patients that allows for a rapid and focused evaluation by anesthesia providers, including junior residents. In this study, a specific preoperative form was designed for ICU patients and evaluated to allow residents to perform the most relevant and important preoperative evaluations efficiently. The following steps were utilized for developing the preoperative evaluation form: 1) designed a new preoperative form specific for ICU patients; 2) had the form reviewed by attending physicians and residents, followed by multiple revisions; 3) conducted test releases and revisions; 4) released the final version and conducted a survey; 5) compared data collection from new ICU form with that from a previously used generic form. Each piece of information on the forms was assigned a score, and the score for the total missing information was determined. The score for each form was presented as mean ± standard deviation (SD), and compared by unpaired t test. A P value < 0.05 was considered statistically significant. Of 52 anesthesiologists (19 attending physicians, 33 residents) responding to the survey, 90% preferred the final new form; and 56% thought the new form would reduce perioperative risk for ICU patients. Forty percent were unsure whether the form would reduce perioperative risk. Over a three month period, we randomly collected 32 generic forms and 25 new forms. The average score for missing data was 23 ± 10 for the generic form and 8 ± 4 for the new form (P = 2.58E-11). A preoperative evaluation form designed specifically for ICU patients is well accepted by anesthesia providers and helped to reduce missing key preoperative information. Such an approach is important for perioperative patient safety.

  8. Key observations from the NHLBI Asthma Clinical Research Network.

    PubMed

    Szefler, Stanley J; Chinchilli, Vernon M; Israel, Elliot; Denlinger, Loren Clark; Lemanske, Robert F; Calhoun, William; Peters, Stephen P

    2012-05-01

    The National Heart, Lung and Blood Institute (NHLBI) Asthma Clinical Research Network (ACRN) recently completed its work after 20 years of collaboration as a multicentre clinical trial network. When formed, its stated mission was to perform multiple controlled clinical trials for treating patients with asthma by dispassionately examining new and existing therapies, and to rapidly communicate its findings to the medical community. The ACRN conducted 15 major clinical trials. In addition, clinical data, manual of operations, protocols and template informed consents from all ACRN trials are available via NHLBI BioLINCC (https://biolincc.nhlbi.nih.gov/studies/). This network contributed major insights into the use of inhaled corticosteroids, short-acting and long-acting ß-adrenergic agonists, leukotriene receptor antagonists, and novel agents (tiotropium, colchicine and macrolide antibiotics). They also pioneered studies of the variability in drug response, predictors of treatment response and pharmacogenetics. This review highlights the major research observations from the ACRN that have impacted the current management of asthma.

  9. Information management and information technologies: keys to professional and business success.

    PubMed

    Otten, K W

    1984-01-01

    Personal computers, spreadsheets, decision support software, electronic mail and video disks are just a few of the innovations of information technology which attract the attention of information professionals and managers alike: they are all concerned with the rapidly changing face of information technology and how to cope with a changing competitive environment, personally, and for the benefit of their companies. This paper is the first in a monthly series which tries to illuminate some of the factors and changes which shape our future as professionals and managers. In so doing, it guides and motivates the reader to become "information literate," a prerequisite for personal advancement in an information-based economy. This first paper outlines the relationship between technological innovations, use of information tools and information management and what to consider in order to benefit from the information revolution. It explains the risks of becoming professionally obsolete and alerts the reader to get personally involved to remain or become "information and computer literate."

  10. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  11. NASDA's earth observation satellite data archive policy for the earth observation data and information system (EOIS)

    NASA Technical Reports Server (NTRS)

    Sobue, Shin-ichi; Yoshida, Fumiyoshi; Ochiai, Osamu

    1996-01-01

    NASDA's new Advanced Earth Observing Satellite (ADEOS) is scheduled for launch in August, 1996. ADEOS carries 8 sensors to observe earth environmental phenomena and sends their data to NASDA, NASA, and other foreign ground stations around the world. The downlink data bit rate for ADEOS is 126 MB/s and the total volume of data is about 100 GB per day. To archive and manage such a large quantity of data with high reliability and easy accessibility it was necessary to develop a new mass storage system with a catalogue information database using advanced database management technology. The data will be archived and maintained in the Master Data Storage Subsystem (MDSS) which is one subsystem in NASDA's new Earth Observation data and Information System (EOIS). The MDSS is based on a SONY ID1 digital tape robotics system. This paper provides an overview of the EOIS system, with a focus on the Master Data Storage Subsystem and the NASDA Earth Observation Center (EOC) archive policy for earth observation satellite data.

  12. Study of key factors influencing dust emission: An assessment of GEOS-Chem and DEAD simulations with observations

    NASA Astrophysics Data System (ADS)

    Bartlett, Kevin S.

    Mineral dust aerosols can impact air quality, climate change, biological cycles, tropical cyclone development and flight operations due to reduced visibility. Dust emissions are primarily limited to the extensive arid regions of the world, yet can negatively impact local to global scales, and are extremely complex to model accurately. Within this dissertation, the Dust Entrainment And Deposition (DEAD) model was adapted to run, for the first known time, using high temporal (hourly) and spatial (0.3°x0.3°) resolution data to methodically interrogate the key parameters and factors influencing global dust emissions. The dependence of dust emissions on key parameters under various conditions has been quantified and it has been shown that dust emissions within DEAD are largely determined by wind speeds, vegetation extent, soil moisture and topographic depressions. Important findings were that grid degradation from 0.3ºx0.3º to 1ºx1º, 2ºx2.5º, and 4°x5° of key meteorological, soil, and surface input parameters greatly reduced emissions approximately 13% and 29% and 64% respectively, as a result of the loss of sub grid detail within these key parameters at coarse grids. After running high resolution DEAD emissions globally for 2 years, two severe dust emission cases were chosen for an in-depth investigation of the root causes of the events and evaluation of the 2°x2.5° Goddard Earth Observing System (GEOS)-Chem and 0.3°x0.3° DEAD model capabilities to simulate the events: one over South West Asia (SWA) in June 2008 and the other over the Middle East in July 2009. The 2 year lack of rain over SWA preceding June 2008 with a 43% decrease in mean rainfall, yielded less than normal plant growth, a 28% increase in Aerosol Optical Depth (AOD), and a 24% decrease in Meteorological Aerodrome Report (METAR) observed visibility (VSBY) compared to average years. GEOS-Chem captured the observed higher AOD over SWA in June 2008. More detailed comparisons of GEOS

  13. 10 CFR 95.18 - Key personnel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INFORMATION AND RESTRICTED DATA Physical Security § 95.18 Key personnel. The senior management official and... Clearance. Other key management officials, as determined by the CSA, must be granted an access authorization... organization's policies or practices in the performance of activities involving classified information. This...

  14. [Organization, functioning and expectations of organizations representing patients. Survey of key informants].

    PubMed

    García-Sempere, Aníbal; Artells, Juan José

    2005-01-01

    To explore patient organizations and their scope in terms of patient and user participation in decisions affecting their health. Semi-structured questionnaire survey of key informants from 21 patient organizations. Most of the patient organizations were regional or national private organizations. Their main objectives include improving quality of life and representing the interests of patients and their families, developing information triage and dissemination activities, and providing additional services not offered by the public health service. The main methods of communicating with members were electronic mail, open meetings and forums. Most patient organizations considered health professionals to be the most important group of stakeholders. The sources of funding most frequently quoted were membership fees, public grants and contributions from the pharmaceutical industry. The most important factor for enhancing patient co-responsibility was considered to be involving patients in health care as a way to improve the quality of the heath services. The proposed future scenario that received the most support was the creation of a legal forum in which the patient's voice could be heard and demonstrably taken into account. Patient organizations can play an important role in providing patients and health professionals with information, promoting self care and improving the effectiveness of health care. These features require visible commitment by the health authorities to facilitate opportunities for patient decisions and choice within the system.

  15. Lessons from the Canadian national health information technology plan for the United States: opinions of key Canadian experts.

    PubMed

    Zimlichman, Eyal; Rozenblum, Ronen; Salzberg, Claudia A; Jang, Yeona; Tamblyn, Melissa; Tamblyn, Robyn; Bates, David W

    2012-01-01

    To summarize the Canadian health information technology (HIT) policy experience and impart lessons learned to the US as it determines its policy in this area. Qualitative analysis of interviews with identified key stakeholders followed by an electronic survey. We conducted semi-structured interviews with 29 key Canadian HIT policy and opinion leaders and used a grounded theory approach to analyze the results. The informant sample was chosen to provide views from different stakeholder groups including national representatives and regional representatives from three Canadian provinces. Canadian informants believed that much of the current US direction is positive, especially regarding incentives and meaningful use, but that there are key opportunities for the US to emphasize direct engagement with providers, define a clear business case for them, sponsor large scale evaluations to assess HIT impact in a broad array of settings, determine standards but also enable access to resources needed for mid-course corrections of standards when issues are identified, and, finally, leverage implementation of digital imaging systems. Not all stakeholder groups were included, such as providers or patients. In addition, as in all qualitative research, a selection bias could be present due to the relatively small sample size. Based on Canadian experience with HIT policy, stakeholders identified as lessons for the US the need to increase direct engagement with providers and the importance of defining the business case for HIT, which can be achieved through large scale evaluations, and of recognizing and leveraging successes as they emerge.

  16. Support of Herschel Key Programme Teams at the NASA Herschel Science Center

    NASA Astrophysics Data System (ADS)

    Shupe, David L.; Appleton, P. N.; Ardila, D.; Bhattacharya, B.; Mei, Y.; Morris, P.; Rector, J.; NHSC Team

    2010-01-01

    The first science data from the Herschel Space Observatory were distributed to Key Programme teams in September 2009. This poster describes a number of resources that have been developed by the NASA Herschel Science Center (NHSC) to support the first users of the observatory. The NHSC webpages and Helpdesk serve as the starting point for information and queries from the US community. Details about the use of the Herschel Common Science Software can be looked up in the Helpdesk Knowledgebase. The capability of real-time remote support through desktop sharing has been implemented. The NHSC continues to host workshops on data analysis and observation planning. Key Programme teams have been provided Wiki sites upon request for their team's private use and for sharing information with other teams. A secure data storage area is in place for troubleshooting purposes and for use by visitors. The NHSC draws upon close working relationships with Instrument Control Centers and the Herschel Science Center in Madrid in order to have the necessary expertise on hand to assist Herschel observers, including both Key Programme teams and respondents to upcoming open time proposal calls.

  17. Expected versus Observed Information in SEM with Incomplete Normal and Nonnormal Data

    ERIC Educational Resources Information Center

    Savalei, Victoria

    2010-01-01

    Maximum likelihood is the most common estimation method in structural equation modeling. Standard errors for maximum likelihood estimates are obtained from the associated information matrix, which can be estimated from the sample using either expected or observed information. It is known that, with complete data, estimates based on observed or…

  18. Extending Value of Information Methods to Include the Co-Net Benefits of Earth Observations

    NASA Astrophysics Data System (ADS)

    Macauley, M.

    2015-12-01

    The widening relevance of Earth observations information across the spectrum of natural and environmental resources markedly enhances the value of these observations. An example is observations of forest extent, species composition, health, and change; this information can help in assessing carbon sequestration, biodiversity and habitat, watershed management, fuelwood potential, and other ecosystem services as well as inform the opportunity cost of forest removal for alternative land use such as agriculture, pasture, or development. These "stacked" indicators or co- net benefits add significant value to Earth observations. In part because of reliance on case studies, much previous research about the value of information from Earth observations has assessed individual applications rather than aggregate across applications, thus tending to undervalue the observations. Aggregating across applications is difficult, however, because it requires common units of measurement: controlling for spatial, spectral, and temporal attributes of the observations; and consistent application of value of information techniques. This paper will discuss general principles of co-net benefit aggregation and illustrate its application to attributing value to Earth observations.

  19. Input of Psychosocial Information During Multidisciplinary Team Meetings at Medical Oncology Departments: Protocol for an Observational Study.

    PubMed

    Horlait, Melissa; Van Belle, Simon; Leys, Mark

    2018-02-26

    Multidisciplinary team meetings (MDTMs) have become standard practice in oncology and gained the status of the key decision-making forum for cancer patient management. The current literature provides evidence that MDTMs are achieving their intended objectives but there are also indications to question the positive impact of MDTMs in oncology settings. For cancer management to be patient-centered, it is crucial that medical information as well as psychosocial aspects-such as the patients' living situation, possible family problems, patients' mental state, and patients' perceptions and values or preferences towards treatment or care-are considered and discussed during MDTMs. Previous studies demonstrate that failure to account for patients' psychosocial information has a negative impact on the implementation of the treatment recommendations formulated during MDTMs. Few empirical studies have demonstrated the predominant role of physicians during MDTMs, leading to the phenomenon that medical information is shared almost exclusively at the expense of psychosocial information. However, more in-depth insight on the underlying reasons why MDTMs fail to take into account psychosocial information of cancer patients is needed. This paper presents a research protocol for a cross-sectional observational study that will focus on exploring the barriers to considering psychosocial information during MDTMs at medical oncology departments. This protocol encompasses a cross-sectional comparative case study of MDTMs at medical oncology departments in Flanders, Belgium. MDTMs from various oncology subspecialties at inpatient medical oncology departments in multiple hospitals (academic as well as general hospitals) are compared. The observations focus on the "multidisciplinary oncology consultation" (MOC), a formally regulated and financed type of MDTM in Belgian oncology since 2003. Data are collected through nonparticipant observations of MOC-meetings. Observational data are

  20. Key Informant Perspectives on Federal Research Agency Policy and Systems and Scientific Workforce Diversity Development: A Companion Study

    ERIC Educational Resources Information Center

    Moore, Corey L.; Wang, Ningning; Davis, Dytisha; Aref, Fariborz; Manyibe, Edward O.; Washington, Andre L.; Johnson, Jean; Eugene-Cross, Kenyotta; Muhammad, Atashia; Jennings-Jones, Desiree

    2017-01-01

    Purpose: In the previous analysis of key informant perspectives on minority research leaders' career development factors, we identified individual and sociocultural, institutional, and federal research agency (i.e., National Institute on Disability, Independent Living, and Rehabilitation Research; National Institutes of Health; Agency for…

  1. A century of ocean warming on Florida Keys coral reefs: historic in situ observations

    USGS Publications Warehouse

    Kuffner, Ilsa B.; Lidz, Barbara H.; Hudson, J. Harold; Anderson, Jeffery S.

    2015-01-01

    There is strong evidence that global climate change over the last several decades has caused shifts in species distributions, species extinctions, and alterations in the functioning of ecosystems. However, because of high variability on short (i.e., diurnal, seasonal, and annual) timescales as well as the recency of a comprehensive instrumental record, it is difficult to detect or provide evidence for long-term, site-specific trends in ocean temperature. Here we analyze five in situ datasets from Florida Keys coral reef habitats, including historic measurements taken by lighthouse keepers, to provide three independent lines of evidence supporting approximately 0.8 °C of warming in sea surface temperature (SST) over the last century. Results indicate that the warming observed in the records between 1878 and 2012 can be fully accounted for by the warming observed in recent decades (from 1975 to 2007), documented using in situ thermographs on a mid-shore patch reef. The magnitude of warming revealed here is similar to that found in other SST datasets from the region and to that observed in global mean surface temperature. The geologic context and significance of recent ocean warming to coral growth and population dynamics are discussed, as is the future prognosis for the Florida reef tract.

  2. Live Video Classroom Observation: An Effective Approach to Reducing Reactivity in Collecting Observational Information for Teacher Professional Development

    ERIC Educational Resources Information Center

    Liang, Jiwen

    2015-01-01

    This paper examines the significance of live video classroom observations of teaching practice to reduce reactivity (the observer effect) so as to obtain more credible observational information for teacher professional development in a secondary school in the largest city in southern China. Although much has been discussed regarding the use of…

  3. Information Requirements for Integrating Spatially Discrete, Feature-Based Earth Observations

    NASA Astrophysics Data System (ADS)

    Horsburgh, J. S.; Aufdenkampe, A. K.; Lehnert, K. A.; Mayorga, E.; Hsu, L.; Song, L.; Zaslavsky, I.; Valentine, D. L.

    2014-12-01

    Several cyberinfrastructures have emerged for sharing observational data collected at densely sampled and/or highly instrumented field sites. These include the CUAHSI Hydrologic Information System (HIS), the Critical Zone Observatory Integrated Data Management System (CZOData), the Integrated Earth Data Applications (IEDA) and EarthChem system, and the Integrated Ocean Observing System (IOOS). These systems rely on standard data encodings and, in some cases, standard semantics for classes of geoscience data. Their focus is on sharing data on the Internet via web services in domain specific encodings or markup languages. While they have made progress in making data available, it still takes investigators significant effort to discover and access datasets from multiple repositories because of inconsistencies in the way domain systems describe, encode, and share data. Yet, there are many scenarios that require efficient integration of these data types across different domains. For example, understanding a soil profile's geochemical response to extreme weather events requires integration of hydrologic and atmospheric time series with geochemical data from soil samples collected over various depth intervals from soil cores or pits at different positions on a landscape. Integrated access to and analysis of data for such studies are hindered because common characteristics of data, including time, location, provenance, methods, and units are described differently within different systems. Integration requires syntactic and semantic translations that can be manual, error-prone, and lossy. We report information requirements identified as part of our work to define an information model for a broad class of earth science data - i.e., spatially-discrete, feature-based earth observations resulting from in-situ sensors and environmental samples. We sought to answer the question: "What information must accompany observational data for them to be archivable and discoverable within

  4. Quantifying How Observations Inform a Numerical Reanalysis of Hawaii

    NASA Astrophysics Data System (ADS)

    Powell, B. S.

    2017-11-01

    When assimilating observations into a model via state-estimation, it is possible to quantify how each observation changes the modeled estimate of a chosen oceanic metric. Using an existing 2 year reanalysis of Hawaii that includes more than 31 million observations from satellites, ships, SeaGliders, and autonomous floats, I assess which observations most improve the estimates of the transport and eddy kinetic energy. When the SeaGliders were in the water, they comprised less than 2.5% of the data, but accounted for 23% of the transport adjustment. Because the model physics constrains advanced state-estimation, the prescribed covariances are propagated in time to identify observation-model covariance. I find that observations that constrain the isopycnal tilt across the transport section provide the greatest impact in the analysis. In the case of eddy kinetic energy, observations that constrain the surface-driven upper ocean have more impact. This information can help to identify optimal sampling strategies to improve both state-estimates and forecasts.

  5. The Efficacy of Key Performance Indicators in Ontario Universities as Perceived by Key Informants

    ERIC Educational Resources Information Center

    Chan, Vivian

    2015-01-01

    The Ontario Ministry of Education and Training's Task Force on University Accountability first proposed key performance indicators (KPIs) for colleges and universities in Ontario in the early 1990s. The three main KPIs for Ontario universities are the rates of (1) graduation, (2) employment, and (3) Ontario Student Assistance Program loan default.…

  6. Performance of device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Zhu; Zhao, Qi; Ma, Xiongfeng

    2016-07-01

    Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .

  7. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.

    PubMed

    Zhang, Liping; Zhu, Shaohui

    2015-05-01

    To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.

  8. Facing the Maze: Young Cancer Survivors' Return to Education and Work-A Professional Expert Key Informant Study.

    PubMed

    Pedersen, Kaspar Jessen; Boisen, Kirsten Arntz; Midtgaard, Julie; Elsbernd, Abbey; Larsen, Hanne Baekgaard

    2018-03-13

    An insufficient transition to normal life after cancer treatment in adolescent and young adults (AYAs) may lead to decreased occupational and educational opportunities throughout a survivor's lifespan. Key informant interviews were used to access unique knowledge of the healthcare, educational, and social systems. We used key informant interviews with professionals representing disciplines from healthcare, educational, and social systems (n = 15). Informants were recruited through purposive sampling and snowball sampling. Interviews were analyzed thematically using Malterud's Systematic Text Condensation and verified by member checking. We found four major themes: the impact of late effects, navigating the system, social reintegration, and the drive of youth. Although legal frameworks are often in place to assist AYA cancer survivors, navigating the public, educational, and social systems is a complex task and many AYAs do not have the required skill set or energy. Furthermore, AYA survivors often feel different from their peers and misunderstood by their surroundings, which may hinder reintegration into normal social life. In Scandinavia, healthcare and education are free of charge with equal access for all, primarily funded by government taxes. Therefore, insurance status and tuition fees should not constitute barriers for returning to education and work. However, this study finds that the public and educational systems are complex to navigate, and that AYAs face trouble mobilizing the energy to receive needed support.

  9. A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems.

    PubMed

    Xu, Xin; Zhu, Ping; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua; He, Lian

    2014-01-01

    In the field of the Telecare Medicine Information System, recent researches have focused on consummating more convenient and secure healthcare delivery services for patients. In order to protect the sensitive information, various attempts such as access control have been proposed to safeguard patients' privacy in this system. However, these schemes suffered from some certain security defects and had costly consumption, which were not suitable for the telecare medicine information system. In this paper, based on the elliptic curve cryptography, we propose a secure and efficient two-factor mutual authentication and key agreement scheme to reduce the computational cost. Such a scheme enables to provide the patient anonymity by employing the dynamic identity. Compared with other related protocols, the security analysis and performance evaluation show that our scheme overcomes some well-known attacks and has a better performance in the telecare medicine information system.

  10. Observability and Estimation of Distributed Space Systems via Local Information-Exchange Networks

    NASA Technical Reports Server (NTRS)

    Rahmani, Amirreza; Mesbahi, Mehran; Fathpour, Nanaz; Hadaegh, Fred Y.

    2008-01-01

    In this work, we develop an approach to formation estimation by explicitly characterizing formation's system-theoretic attributes in terms of the underlying inter-spacecraft information-exchange network. In particular, we approach the formation observer/estimator design by relaxing the accessibility to the global state information by a centralized observer/estimator- and in turn- providing an analysis and synthesis framework for formation observers/estimators that rely on local measurements. The noveltyof our approach hinges upon the explicit examination of the underlying distributed spacecraft network in the realm of guidance, navigation, and control algorithmic analysis and design. The overarching goal of our general research program, some of whose results are reported in this paper, is the development of distributed spacecraft estimation algorithms that are scalable, modular, and robust to variations inthe topology and link characteristics of the formation information exchange network. In this work, we consider the observability of a spacecraft formation from a single observation node and utilize the agreement protocol as a mechanism for observing formation states from local measurements. Specifically, we show how the symmetry structure of the network, characterized in terms of its automorphism group, directly relates to the observability of the corresponding multi-agent system The ramification of this notion of observability over networks is then explored in the context of distributed formation estimation.

  11. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  12. NASA's Earth Observing System Data and Information System - EOSDIS

    NASA Technical Reports Server (NTRS)

    Ramapriyan, Hampapuram K.

    2011-01-01

    This slide presentation reviews the work of NASA's Earth Observing System Data and Information System (EOSDIS), a petabyte-scale archive of environmental data that supports global climate change research. The Earth Science Data Systems provide end-to-end capabilities to deliver data and information products to users in support of understanding the Earth system. The presentation contains photographs from space of recent events, (i.e., the effects of the tsunami in Japan, and the wildfires in Australia.) It also includes details of the Data Centers that provide the data to EOSDIS and Science Investigator-led Processing Systems. Information about the Land, Atmosphere Near-real-time Capability for EOS (LANCE) and some of the uses that the system has made possible are reviewed. Also included is information about how to access the data, and evolutionary plans for the future of the system.

  13. Lagrange Point Missions: the Key to Next-Generation Integrated Earth Observations. DSCOVR Innovation

    NASA Astrophysics Data System (ADS)

    Valero, F. P. J.

    2016-12-01

    From L-1 DSCOVR is capable of new, unique observations potentially conducive to a deeper scientific understanding of the Earth sciences. At L-1 and L-2 the net gravitational pull of the Earth and Sun equals the centripetal force required to orbit the Sun with the same period as the Earth. Satellites at or near L-1 and L-2 keep the same position relative to the Sun and the Earth. DSCOVR does not orbit the Earth but the Sun in synchronism with Earth, acts like a planetoid (orbits the Sun in the ecliptic plane) while acquiring integrated plus spatially and time resolved scientific data as Earth rotates around its axis. Because of the planet's axial tilt relative to the ecliptic plane, the Polar Regions are visible during local summer from L-1 and local winter from L-2 (Fig. 1). DSCOVR's synoptic and continuous observations solve most of the temporal and spatial limitations associated with low Earth (LEO) and Geostationary (GEO) orbits. Two observatories, one at L-1 (daytime) and one at L-2 (nighttime), would acquire minute-by-minute climate quality data for essentially every point on Earth. The integration of L-1, L-2, LEO, and GEO satellites plus the Moon offers new scientific tools and enriched data sets for Earth sciences. Lagrange points observatories are key to next-generation integrated Earth observations. For example, DSCOVR at L-1 views the Earth plus the Moon (a reference) and simultaneously, at one time or another, all LEO and GEO satellites. The L-1 and L-2 satellites would be the link between the Moon, LEO and GEO satellites while providing the data needed to build an integrated Earth observational system. The above properties are the bases for DSCOVR's innovation and scientific approach that systematically observes climate drivers (radiation, aerosols, ozone, clouds, water vapor, vegetation) from L-1 in a way not possible but synergistic with other satellites. Next step: more capable L-1 plus L-2 satellites. The way of the future.

  14. Key influences in the design and implementation of mental health information systems in Ghana and South Africa.

    PubMed

    Ahuja, S; Mirzoev, T; Lund, C; Ofori-Atta, A; Skeen, S; Kufuor, A

    2016-01-01

    Strengthening of mental health information systems (MHIS) is essential to monitor and evaluate mental health services in low and middle-income countries. While research exists assessing wider health management information systems, there is limited published evidence exploring the design and implementation of MHIS in these settings. This paper aims to identify and assess the key factors affecting the design and implementation of MHIS, as perceived by the key stakeholders in Ghana and South Africa. We report findings from the Mental Health and Poverty Project, a 5-year research programme implemented within four African countries. The MHIS strengthening in South Africa and Ghana included two related components: intervention and research. The intervention component aimed to strengthen MHIS in the two countries, and the research component aimed to document interventions in each country, including the key influences. Data were collected using semi structured interviews with key stakeholders and reviews of key documents and secondary data from the improved MHIS. We analyzed the qualitative data using a framework approach. Key components of the MHIS intervention involved the introduction of a redesigned patient registration form, entry into computers for analysis every 2 months by clinical managerial staff, and utilization of data in hospital management meetings in three psychiatric hospitals in Ghana; and the introduction of a new set of mental health indicators and related forms and tally sheets at primary care clinics and district hospitals in five districts in the KwaZulu-Natal and Northern Cape provinces in South Africa. Overall, the key stakeholders perceived the MHIS strengthening as an effective intervention in both countries with an enhanced set of indicators in South Africa and introduction of a computerized system in Ghana. Influences on the design and implementation of MHIS interventions in Ghana and South Africa relate to resources, working approaches

  15. Environmental Influences on Physical Activity among Rural Adults in Montana, United States: Views from Built Environment Audits, Resident Focus Groups, and Key Informant Interviews.

    PubMed

    Lo, Brian K; Morgan, Emily H; Folta, Sara C; Graham, Meredith L; Paul, Lynn C; Nelson, Miriam E; Jew, Nicolette V; Moffat, Laurel F; Seguin, Rebecca A

    2017-10-04

    Rural populations in the United States have lower physical activity levels and are at a higher risk of being overweight and suffering from obesity than their urban counterparts. This paper aimed to understand the environmental factors that influence physical activity among rural adults in Montana. Eight built environment audits, 15 resident focus groups, and 24 key informant interviews were conducted between August and December 2014. Themes were triangulated and summarized into five categories of environmental factors: built, social, organizational, policy, and natural environments. Although the existence of active living features was documented by environmental audits, residents and key informants agreed that additional indoor recreation facilities and more well-maintained and conveniently located options were needed. Residents and key informants also agreed on the importance of age-specific, well-promoted, and structured physical activity programs, offered in socially supportive environments, as facilitators to physical activity. Key informants, however, noted that funding constraints and limited political will were barriers to developing these opportunities. Since building new recreational facilities and structures to support active transportation pose resource challenges, especially for rural communities, our results suggest that enhancing existing features, making small improvements, and involving stakeholders in the city planning process would be more fruitful to build momentum towards larger changes.

  16. Looking at Earth observation impacts with fresh eyes: a Landsat example

    NASA Astrophysics Data System (ADS)

    Wu, Zhuoting; Snyder, Greg; Quirk, Bruce; Stensaas, Greg; Vadnais, Carolyn; Babcock, Michael; Dale, Erin; Doucette, Peter

    2016-05-01

    The U. S. Geological Survey (USGS) initiated the Requirements, Capabilities and Analysis for Earth Observations (RCA-EO) activity in the Land Remote Sensing (LRS) program to provide a structured approach to collect, store, maintain, and analyze user requirements and Earth observing system capabilities information. RCA-EO enables the collection of information on current key Earth observation products, services, and projects, and to evaluate them at different organizational levels within an agency, in terms of how reliant they are on Earth observation data from all sources, including spaceborne, airborne, and ground-based platforms. Within the USGS, RCA-EO has engaged over 500 subject matter experts in this assessment, and evaluated the impacts of more than 1000 different Earth observing data sources on 345 key USGS products and services. This paper summarizes Landsat impacts at various levels of the organizational structure of the USGS and highlights the feedback of the subject matter experts regarding Landsat data and Landsat-derived products. This feedback is expected to inform future Landsat mission decision making. The RCA-EO approach can be applied in a much broader scope to derive comprehensive knowledge of Earth observing system usage and impacts, to inform product and service development and remote sensing technology innovation beyond the USGS.

  17. Possibilities and Expectations for mHealth in the Pacific Islands: Insights From Key Informants

    PubMed Central

    McCool, Judith; Whittaker, Robyn

    2016-01-01

    Background The increase in mobile phone use across the globe is creating mounting interest for its application in addressing health system constraints. Although still limited, there is growing evidence of success in using mobile phones for health (mHealth) in low- and middle- income countries. The promise of mHealth to address key health system issues presents a huge potential for the Pacific Island countries where mobile use has radically increased. Current projections indicate an improved information and communications technology (ICT) environment to support greater access to mobile and digital devices in the Pacific region. Objective The objective of the study was to explore key stakeholder perspectives on the potential for mHealth in the Pacific region. Methods A series of in-depth interviews were conducted either face-to-face, via Skype or by email, with a series of key informants from the Pacific Rim region. Interviews were audio-recorded and later transcribed for detailed thematic analysis. Results We found widespread support for the potential to use mobile phones as a mechanism to facilitate improved health service delivery in the region. Essential elements for the successful development and implementation of mHealth were identified by these stakeholders. These included: developing an understanding of the local context and the problems that may be usefully addressed by the addition of mHealth to existing strategies and services; consideration of local infrastructure, capability, policy, mobile literacy and engagement; learning from others, particularly other low- and middle-income countries (LMICs); the importance of building supportive environments and of evaluation to provide evidence of impact and total cost. Conclusions The rapid growth of mobile phone use in the region presents a unique juxtaposition of opportunity and promise. Though the region lags behind other LMICs in the adoption of mHealth technologies, this offers the convenience of learning

  18. Possibilities and Expectations for mHealth in the Pacific Islands: Insights From Key Informants.

    PubMed

    Umali, Elaine; McCool, Judith; Whittaker, Robyn

    2016-01-20

    The increase in mobile phone use across the globe is creating mounting interest for its application in addressing health system constraints. Although still limited, there is growing evidence of success in using mobile phones for health (mHealth) in low- and middle- income countries. The promise of mHealth to address key health system issues presents a huge potential for the Pacific Island countries where mobile use has radically increased. Current projections indicate an improved information and communications technology (ICT) environment to support greater access to mobile and digital devices in the Pacific region. The objective of the study was to explore key stakeholder perspectives on the potential for mHealth in the Pacific region. A series of in-depth interviews were conducted either face-to-face, via Skype or by email, with a series of key informants from the Pacific Rim region. Interviews were audio-recorded and later transcribed for detailed thematic analysis. We found widespread support for the potential to use mobile phones as a mechanism to facilitate improved health service delivery in the region. Essential elements for the successful development and implementation of mHealth were identified by these stakeholders. These included: developing an understanding of the local context and the problems that may be usefully addressed by the addition of mHealth to existing strategies and services; consideration of local infrastructure, capability, policy, mobile literacy and engagement; learning from others, particularly other low- and middle-income countries (LMICs); the importance of building supportive environments and of evaluation to provide evidence of impact and total cost. The rapid growth of mobile phone use in the region presents a unique juxtaposition of opportunity and promise. Though the region lags behind other LMICs in the adoption of mHealth technologies, this offers the convenience of learning from past mHealth interventions and applying these

  19. Data Assimilation to Extract Soil Moisture Information From SMAP Observations

    NASA Technical Reports Server (NTRS)

    Kolassa, J.; Reichle, R. H.; Liu, Q.; Alemohammad, S. H.; Gentine, P.

    2017-01-01

    Statistical techniques permit the retrieval of soil moisture estimates in a model climatology while retaining the spatial and temporal signatures of the satellite observations. As a consequence, they can be used to reduce the need for localized bias correction techniques typically implemented in data assimilation (DA) systems that tend to remove some of the independent information provided by satellite observations. Here, we use a statistical neural network (NN) algorithm to retrieve SMAP (Soil Moisture Active Passive) surface soil moisture estimates in the climatology of the NASA Catchment land surface model. Assimilating these estimates without additional bias correction is found to significantly reduce the model error and increase the temporal correlation against SMAP CalVal in situ observations over the contiguous United States. A comparison with assimilation experiments using traditional bias correction techniques shows that the NN approach better retains the independent information provided by the SMAP observations and thus leads to larger model skill improvements during the assimilation. A comparison with the SMAP Level 4 product shows that the NN approach is able to provide comparable skill improvements and thus represents a viable assimilation approach.

  20. Honeybees Learn Odour Mixtures via a Selection of Key Odorants

    PubMed Central

    Reinhard, Judith; Sinclair, Michael; Srinivasan, Mandyam V.; Claudianos, Charles

    2010-01-01

    Background The honeybee has to detect, process and learn numerous complex odours from her natural environment on a daily basis. Most of these odours are floral scents, which are mixtures of dozens of different odorants. To date, it is still unclear how the bee brain unravels the complex information contained in scent mixtures. Methodology/Principal Findings This study investigates learning of complex odour mixtures in honeybees using a simple olfactory conditioning procedure, the Proboscis-Extension-Reflex (PER) paradigm. Restrained honeybees were trained to three scent mixtures composed of 14 floral odorants each, and then tested with the individual odorants of each mixture. Bees did not respond to all odorants of a mixture equally: They responded well to a selection of key odorants, which were unique for each of the three scent mixtures. Bees showed less or very little response to the other odorants of the mixtures. The bees' response to mixtures composed of only the key odorants was as good as to the original mixtures of 14 odorants. A mixture composed of the other, non-key-odorants elicited a significantly lower response. Neither an odorant's volatility or molecular structure, nor learning efficiencies for individual odorants affected whether an odorant became a key odorant for a particular mixture. Odorant concentration had a positive effect, with odorants at high concentration likely to become key odorants. Conclusions/Significance Our study suggests that the brain processes complex scent mixtures by predominantly learning information from selected key odorants. Our observations on key odorant learning lend significant support to previous work on olfactory learning and mixture processing in honeybees. PMID:20161714

  1. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  2. 76 FR 9551 - Proposed Information Collection; Comment Request; Northeast Region Observer Providers Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration Proposed Information Collection; Comment Request; Northeast Region Observer Providers Requirements AGENCY: National Oceanic and...; formally request observer training by the Northeast Fisheries Observer Program (NEFOP); submit observer...

  3. Part II--Factors associated with school nurse ratios: key state informants' perceptions.

    PubMed

    Maughan, Erin

    2009-08-01

    This paper is the second of a two-part series examining factors influencing school nurse to pupil staffing ratios. The paper reports data from a qualitative study exploring the social and political factors that potentially influence ratios. Interviews were conducted with 30 key state informants from these states. Content analysis of the data identified common themes. Positive factors reported to influence ratios included: the approach taken to effect change, value placed upon school nurses, local support (from both educators and parents) and community buy-in, fear of litigation, and dynamic leadership. Barriers to improving ratios included: lack of funding and misunderstanding of the role of the school nurse. Philosophical beliefs and state geography were "swing" factors that influenced staffing positively or negatively. This study adds to our knowledge of the factors influencing staffing and highlights important social and political factors that school nurses can target to improve nurse to pupil ratios.

  4. Scheme of Optical Image Encryption with Digital Information Input and Dynamic Encryption Key based on Two LC SLMs

    NASA Astrophysics Data System (ADS)

    Bondareva, A. P.; Cheremkhin, P. A.; Evtikhiev, N. N.; Krasnov, V. V.; Starikov, S. N.

    Scheme of optical image encryption with digital information input and dynamic encryption key based on two liquid crystal spatial light modulators and operating with spatially-incoherent monochromatic illumination is experimentally implemented. Results of experiments on images optical encryption and numerical decryption are presented. Satisfactory decryption error of 0.20÷0.27 is achieved.

  5. Key stakeholder perceptions about consent to participate in acute illness research: a rapid, systematic review to inform epi/pandemic research preparedness.

    PubMed

    Gobat, Nina H; Gal, Micaela; Francis, Nick A; Hood, Kerenza; Watkins, Angela; Turner, Jill; Moore, Ronald; Webb, Steve A R; Butler, Christopher C; Nichol, Alistair

    2015-12-29

    A rigorous research response is required to inform clinical and public health decision-making during an epi/pandemic. However, the ethical conduct of such research, which often involves critically ill patients, may be complicated by the diminished capacity to consent and an imperative to initiate trial therapies within short time frames. Alternative approaches to taking prospective informed consent may therefore be used. We aimed to rapidly review evidence on key stakeholder (patients, their proxy decision-makers, clinicians and regulators) views concerning the acceptability of various approaches for obtaining consent relevant to pandemic-related acute illness research. We conducted a rapid evidence review, using the Internet, database and hand-searching for English language empirical publications from 1996 to 2014 on stakeholder opinions of consent models (prospective informed, third-party, deferred, or waived) used in acute illness research. We excluded research on consent to treatment, screening, or other such procedures, non-emergency research and secondary studies. Papers were categorised, and data summarised using narrative synthesis. We screened 689 citations, reviewed 104 full-text articles and included 52. Just one paper related specifically to pandemic research. In other emergency research contexts potential research participants, clinicians and research staff found third-party, deferred, and waived consent to be acceptable as a means to feasibly conduct such research. Acceptability to potential participants was motivated by altruism, trust in the medical community, and perceived value in medical research and decreased as the perceived risks associated with participation increased. Discrepancies were observed in the acceptability of the concept and application or experience of alternative consent models. Patients accepted clinicians acting as proxy-decision makers, with preference for two decision makers as invasiveness of interventions increased

  6. Metrological challenges for measurements of key climatological observables, Part 4: Atmospheric relative humidity

    PubMed Central

    Lovell-Smith, J W; Feistel, R; Harvey, A H; Hellmuth, O; Bell, S A; Heinonen, M; Cooper, J R

    2016-01-01

    Water in its three ambient phases plays the central thermodynamic role in the terrestrial climate system. Clouds control Earth’s radiation balance, atmospheric water vapour is the strongest “greenhouse” gas, and non-equilibrium relative humidity at the air-sea interface drives evaporation and latent heat export from the ocean. In this paper, we examine the climatologically relevant atmospheric relative humidity, noting fundamental deficiencies in the definition of this key observable. The metrological history of this quantity is reviewed, problems with its current definition and measurement practice are analysed, and options for future improvements are discussed in conjunction with the recent seawater standard TEOS-10. It is concluded that the International Bureau of Weights and Measures, (BIPM), in cooperation with the International Association for the Properties of Water and Steam, IAPWS, along with other international organisations and institutions, can make significant contributions by developing and recommending state-of-the-art solutions for this long standing metrological problem, such as are suggested here. PMID:26877551

  7. Key messages for communicating information about BRCA1 and BRCA2 to women with breast or ovarian cancer: Consensus across health professionals and service users.

    PubMed

    Jacobs, Chris; Pichert, Gabriella; Harris, Jackie; Tucker, Kathy; Michie, Susan

    2017-11-01

    Genetic testing of cancer predisposing genes will increasingly be needed in oncology clinics to target cancer treatment. This Delphi study aimed to identify areas of agreement and disagreement between genetics and oncology health professionals and service users about the key messages required by women with breast/ovarian cancer who undergo BRCA1/BRCA2 genetic testing and the optimal timing of communicating key messages. Participants were 16 expert health professionals specialising in oncology/genetics and 16 service users with breast/ovarian cancer and a pathogenic BRCA1/BRCA2 variant. Online questionnaires containing 53 inductively developed information messages were circulated to the groups separately. Participants rated each message as key/not key on a Likert scale and suggested additional messages. Questionnaires were modified according to the feedback and up to 3 rounds were circulated. Consensus was reached when there was ≥75% agreement. Thirty key messages were agreed by both groups with 7 of the key messages agreed by ≥95% of participants: dominant inheritance, the availability of predictive testing, the importance of pretest discussion, increased risk of breast and ovarian cancer, and the option of risk-reducing mastectomy and bilateral salpingo-oophorectomy. Both groups agreed that key messages should be communicated before genetic testing and once a pathogenic variant has been identified. There was a high level of agreement within and between the groups about the information requirements of women with breast/ovarian cancer about BRCA1/BRCA2. These key messages will be helpful in developing new approaches to the delivery of information as genetic testing becomes further integrated into mainstream oncology services. Copyright © 2017 John Wiley & Sons, Ltd.

  8. The International Space Station as a Key Platform to Synergize Observations of Fundamental Ecosystem Properties

    NASA Astrophysics Data System (ADS)

    Fisher, J. B.; Stavros, E. N.; Pavlick, R.; Hook, S. J.; Eldering, A.; Dubayah, R.; Schimel, D.

    2016-12-01

    Terrestrial ecosystems can be described in terms of trait composition, physiological function, and physical structure; all three of these are observable remotely to varying degrees. Yet, no mission is able to singularly capture all three together, thus inhibiting our ability to dynamically measure and describe ecosystems as holistic, integrated, and interconnected entities. The International Space Station (ISS) is a new platform for global ecology. The variable overpass time offers a key advantage to investigations interested in sampling over the diurnal cycle, critical to understanding ecosystem function. The ISS also offers another key advantage—financial; it is already there with funded astronaut cargo re-supply missions, so the cost of launch and platform do not need to be added onto new science missions, thereby enabling NASA to select more missions at lower costs. In 2018, NASA will begin sending a series of independently-selected missions to the ISS focused on terrestrial ecosystems. First, ECOSTRESS will produce thermal-based evapotranspiration (ET) data, among other products. OCO-3 will arrive a few months later to measure chlorophyll fluorescence (related to gross primary production, GPP) and atmospheric CO2. Finally, GEDI will produce LiDAR-based ecosystem structure (height, leaf area index, biomass). While each mission is independently developed and funded, the respective mission scientists are working together to bridge observations and leverage their unique contemporaneous and synergistic value for global ecology. A composition-based mission is still missing from the ISS, but airborne and other space agency missions may be leveraged. This talk will describe these ISS-based terrestrial ecosystem science missions, and discuss synergies that will enable the study of ecosystems as a whole that is larger than the sum of their parts.

  9. Effect of Information Load and Time on Observational Learning

    ERIC Educational Resources Information Center

    Breslin, Gavin; Hodges, Nicola J.; Williams, A. Mark

    2009-01-01

    We examined whether altering the amount of and moment when visual information is presented affected observational learning for participants practicing a bowling skill. On Day 1, four groups practiced a cricket bowling action. Three groups viewed a full-body point-light model, the model's bowling arm, or between-limb coordination of the model's…

  10. Understanding Barriers and Facilitators to Breast and Cervical Cancer Screening among Muslim Women in New York City: Perspectives from Key Informants.

    PubMed

    Islam, Nadia; Patel, Shilpa; Brooks-Griffin, Quanza; Kemp, Patrice; Raveis, Victoria; Riley, Lindsey; Gummi, Sindhura; Nur, Potrirankamanis Queano; Ravenell, Joseph; Cole, Helen; Kwon, Simona

    2017-01-01

    Muslims are one of the fastest growing religious groups in the US. However, little is known about their health disparities, and how their unique cultural, religious, and social beliefs and practices affect health behaviors and outcomes. Studies demonstrate Muslim women may have lower rates of breast and cervical cancer screening compared to the overall population. The purpose of this study was to: 1) conduct key-informant interviews with Muslim community leaders in New York City (NYC), to understand contextual factors that impact Muslim women's beliefs and practices regarding breast and cervical cancer screening; and 2) inform the development and implementation of a research study on breast and cervical cancer screening among Muslims. Twelve key-informant interviews were conducted. The sample included imams, female religious leaders, physicians, community-based organization leaders, and social service representatives. The interview guide assessed: 1) unique healthcare barriers faced by Muslim women; 2) cultural and social considerations in conducting research; 3) potential strategies for increasing screening in this population; and 4) content and venues for culturally tailored programming and messaging. Key informants noted structure and culture as barriers and religion as a facilitator to breast and cervical cancer screening. Themes regarding the development of targeted health campaigns to increase screening included the importance of educational and in-language materials and messaging, and engaging mosques and religious leaders for dissemination. Although Muslim women face a number of barriers to screening, religious beliefs and support structures can be leveraged to facilitate screening and enhance the dissemination and promotion of screening.

  11. Understanding Barriers and Facilitators to Breast and Cervical Cancer Screening among Muslim Women in New York City: Perspectives from Key Informants

    PubMed Central

    Islam, Nadia; Patel, Shilpa; Brooks-Griffin, Quanza; Kemp, Patrice; Raveis, Victoria; Riley, Lindsey; Gummi, Sindhura; Nur, Potrirankamanis Queano; Ravenell, Joseph; Cole, Helen; Kwon, Simona

    2017-01-01

    Background Muslims are one of the fastest growing religious groups in the US. However, little is known about their health disparities, and how their unique cultural, religious, and social beliefs and practices affect health behaviors and outcomes. Studies demonstrate Muslim women may have lower rates of breast and cervical cancer screening compared to the overall population. Methods The purpose of this study was to: 1) conduct key-informant interviews with Muslim community leaders in New York City (NYC), to understand contextual factors that impact Muslim women’s beliefs and practices regarding breast and cervical cancer screening; and 2) inform the development and implementation of a research study on breast and cervical cancer screening among Muslims. Twelve key-informant interviews were conducted. The sample included imams, female religious leaders, physicians, community-based organization leaders, and social service representatives. The interview guide assessed: 1) unique healthcare barriers faced by Muslim women; 2) cultural and social considerations in conducting research; 3) potential strategies for increasing screening in this population; and 4) content and venues for culturally tailored programming and messaging. Results Key informants noted structure and culture as barriers and religion as a facilitator to breast and cervical cancer screening. Themes regarding the development of targeted health campaigns to increase screening included the importance of educational and in-language materials and messaging, and engaging mosques and religious leaders for dissemination. Conclusion Although Muslim women face a number of barriers to screening, religious beliefs and support structures can be leveraged to facilitate screening and enhance the dissemination and promotion of screening. PMID:29629435

  12. Western scrub-jays allocate longer observation time to more valuable information.

    PubMed

    Watanabe, Arii; Grodzinski, Uri; Clayton, Nicola S

    2014-07-01

    When humans mentally reconstruct past events and imagine future scenarios, their subjective experience of mentally time travelling is accompanied by the awareness of doing so. Despite recent popularity of studying episodic memory in animals, such phenomenological consciousness has been extremely difficult to demonstrate without agreed behavioural markers of consciousness in non-linguistic subjects. We presented western scrub-jays (Aphelocoma californica) with a task requiring them to allocate observing time between two peepholes to see food being hidden in either of two compartments, one where observing the hiding location was necessary to later relocate the food, and another where food could easily be found without watching. Jays first separately experienced these consequences of possessing information in each compartment and subsequently, once given a choice, made more looks and spent more time looking into the compartment where information was necessary than into the compartment where it was unnecessary. Thus, the jays can collect information to solve a future problem. Moreover, they can differentiate sources of information according to their potential value and modify behaviour to efficiently collect important, usable information. This is the first evidence of metacognition in a species that passes the behavioural criteria for both retrospective and prospective mental time travel.

  13. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  14. Observational information for f(T) theories and dark torsion

    NASA Astrophysics Data System (ADS)

    Bengochea, Gabriel R.

    2011-01-01

    In the present work we analyze and compare the information coming from different observational data sets in the context of a sort of f(T) theories. We perform a joint analysis with measurements of the most recent type Ia supernovae (SNe Ia), Baryon Acoustic Oscillation (BAO), Cosmic Microwave Background radiation (CMB), Gamma-Ray Bursts data (GRBs) and Hubble parameter observations (OHD) to constraint the only new parameter these theories have. It is shown that when the new combined BAO/CMB parameter is used to put constraints, the result is different from previous works. We also show that when we include Observational Hubble Data (OHD) the simpler ΛCDM model is excluded to one sigma level, leading the effective equation of state of these theories to be of phantom type. Also, analyzing a tension criterion for SNe Ia and other observational sets, we obtain more consistent and better suited data sets to work with these theories.

  15. Observing Bridge Dynamic Deflection in Green Time by Information Technology

    NASA Astrophysics Data System (ADS)

    Yu, Chengxin; Zhang, Guojian; Zhao, Yongqian; Chen, Mingzhi

    2018-01-01

    As traditional surveying methods are limited to observe bridge dynamic deflection; information technology is adopted to observe bridge dynamic deflection in Green time. Information technology used in this study means that we use digital cameras to photograph the bridge in red time as a zero image. Then, a series of successive images are photographed in green time. Deformation point targets are identified and located by Hough transform. With reference to the control points, the deformation values of these deformation points are obtained by differencing the successive images with a zero image, respectively. Results show that the average measurement accuracies of C0 are 0.46 pixels, 0.51 pixels and 0.74 pixels in X, Z and comprehensive direction. The average measurement accuracies of C1 are 0.43 pixels, 0.43 pixels and 0.67 pixels in X, Z and comprehensive direction in these tests. The maximal bridge deflection is 44.16mm, which is less than 75mm (Bridge deflection tolerance value). Information technology in this paper can monitor bridge dynamic deflection and depict deflection trend curves of the bridge in real time. It can provide data support for the site decisions to the bridge structure safety.

  16. Key Provenance of Earth Science Observational Data Products

    NASA Astrophysics Data System (ADS)

    Conover, H.; Plale, B.; Aktas, M.; Ramachandran, R.; Purohit, P.; Jensen, S.; Graves, S. J.

    2011-12-01

    As the sheer volume of data increases, particularly evidenced in the earth and environmental sciences, local arrangements for sharing data need to be replaced with reliable records about the what, who, how, and where of a data set or collection. This is frequently called the provenance of a data set. While observational data processing systems in the earth sciences have a long history of capturing metadata about the processing pipeline, current processes are limited in both what is captured and how it is disseminated to the science community. Provenance capture plays a role in scientific data preservation and stewardship precisely because it can automatically capture and represent a coherent picture of the what, how and who of a particular scientific collection. It reflects the transformations that a data collection underwent prior to its current form and the sequence of tasks that were executed and data products applied to generate a new product. In the NASA-funded Instant Karma project, we examine provenance capture in earth science applications, specifically the Advanced Microwave Scanning Radiometer - Earth Observing System (AMSR-E) Science Investigator-led Processing system (SIPS). The project is integrating the Karma provenance collection and representation tool into the AMSR-E SIPS production environment, with an initial focus on Sea Ice. This presentation will describe capture and representation of provenance that is guided by the Open Provenance Model (OPM). Several things have become clear during the course of the project to date. One is that core OPM entities and relationships are not adequate for expressing the kinds of provenance that is of interest in the science domain. OPM supports name-value pair annotations that can be used to augment what is known about the provenance entities and relationships, but in Karma, annotations cannot be added during capture, but only after the fact. This limits the capture system's ability to record something it

  17. Observations-based GPP estimates

    NASA Astrophysics Data System (ADS)

    Joiner, J.; Yoshida, Y.; Jung, M.; Tucker, C. J.; Pinzon, J. E.

    2017-12-01

    We have developed global estimates of gross primary production based on a relatively simple satellite observations-based approach using reflectance data from the MODIS instruments in the form of vegetation indices that provide information about photosynthetic capacity at both high temporal and spatial resolution and combined with information from chlorophyll solar-induced fluorescence from the Global Ozone Monitoring Experiment-2 instrument that is noisier and available only at lower temporal and spatial scales. We compare our gross primary production estimates with those from eddy covariance flux towers and show that they are competitive with more complicated extrapolated machine learning gross primary production products. Our results provide insight into the amount of variance in gross primary production that can be explained with satellite observations data and also show how processing of the satellite reflectance data is key to using it for accurate GPP estimates.

  18. The ConnectinGEO Observation Inventory

    NASA Astrophysics Data System (ADS)

    Santoro, M.; Nativi, S.; Jirka, S.; McCallum, I.

    2016-12-01

    ConnectinGEO (Coordinating an Observation Network of Networks EnCompassing saTellite and IN-situ to fill the Gaps in European Observations) is an EU-funded project under the H2020 Framework Programme. The primary goal of the project is to link existing coordinated Earth Observation networks with science and technology (S&T) communities, the industry sector and the GEOSS and Copernicus stakeholders. An expected outcome of the project is a prioritized list of critical gaps within GEOSS (Global Earth Observation System of Systems) in observations and models that translate observations into practice relevant knowledge. The project defines and utilizes a formalized methodology to create a set of observation requirements that will be related to information on available observations to identify key gaps. Gaps in the information provided by current observation systems as well as gaps in the systems themselves will be derived from five different threads. One of these threads consists in the analysis of the observations and measurements that are currently registered in GEO Discovery and Access Broker (DAB). To this aim, an Observation Inventory (OI) has been created and populated using the current metadata information harmonized by the DAB. This presentation describes the process defined to populate the ConnectinGEO OI and the resulting system architecture. In addition, it provides information on how to systematically access the OI for performing the gap analysis. Furthermore it demonstrates initial findings of the gap analysis, and shortcomings in the metadata that need attention. The research leading to these results benefited from funding by the European Union H2020 Framework Programme under grant agreement n. 641538 (ConnectinGEO).

  19. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    PubMed Central

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  20. Data assimilation to extract soil moisture information from SMAP observations

    USDA-ARS?s Scientific Manuscript database

    This study compares different methods to extract soil moisture information through the assimilation of Soil Moisture Active Passive (SMAP) observations. Neural Network(NN) and physically-based SMAP soil moisture retrievals were assimilated into the NASA Catchment model over the contiguous United Sta...

  1. Epidemiological Data Management during an Outbreak of Ebola Virus Disease: Key Issues and Observations from Sierra Leone.

    PubMed

    Owada, Kei; Eckmanns, Tim; Kamara, Kande-Bure O'Bai; Olu, Olushayo Oluseun

    2016-01-01

    Sierra Leone experienced intense transmission of Ebola virus disease (EVD) from May 2014 to November 2015 during which a total of 8,704 confirmed cases and over 3,589 confirmed deaths were reported. Our field observation showed many issues in the EVD data management system, which may have contributed to the magnitude and long duration of the outbreak. In this perspective article, we explain the key issues with EVD data management in the field, and the resulting obstacles in analyzing key epidemiological indicators during the outbreak response work. Our observation showed that, during the latter part of the EVD outbreak, surveillance and data management improved at all levels in the country as compared to the earlier stage. We identified incomplete filling and late arrival of the case investigation forms at data management centers, difficulties in detecting double entries and merging identified double entries in the database, and lack of clear process of how death of confirmed cases in holding, treatment, and community care centers are reported to the data centers as some of challenges to effective data management. Furthermore, there was no consolidated database that captured and linked all data sources in a structured way. We propose development of a new application tool easily adaptable to new occurrences, regular data harmonization meetings between national and district data management teams, and establishment of a data quality audit system to assure good quality data as ways to improve EVD data management during future outbreaks.

  2. An Observational Study of Consumers’ Accessing of Nutrition Information in Chain Restaurants

    PubMed Central

    Agnew, Henry; Brownell, Kelly D.

    2009-01-01

    In this observational study, we determined how frequently consumers accessed on-premises nutrition information provided at chain restaurants. The number of patrons entering and accessing nutrition information was recorded at 8 locations that were part of 4 major restaurant chains (McDonald's, Burger King, Starbucks, and Au Bon Pain). Only 6 (0.1%) of 4311 patrons accessed on-premises nutrition information before purchasing food. This very small percentage suggests that such information should be more prominently displayed, such as on restaurant menu boards, to help customers make informed decisions. PMID:19299679

  3. An observational study of consumers' accessing of nutrition information in chain restaurants.

    PubMed

    Roberto, Christina A; Agnew, Henry; Brownell, Kelly D

    2009-05-01

    In this observational study, we determined how frequently consumers accessed on-premises nutrition information provided at chain restaurants. The number of patrons entering and accessing nutrition information was recorded at 8 locations that were part of 4 major restaurant chains (McDonald's, Burger King, Starbucks, and Au Bon Pain). Only 6 (0.1%) of 4311 patrons accessed on-premises nutrition information before purchasing food. This very small percentage suggests that such information should be more prominently displayed, such as on restaurant menu boards, to help customers make informed decisions.

  4. Uncertainty information in climate data records from Earth observation

    NASA Astrophysics Data System (ADS)

    Merchant, Christopher J.; Paul, Frank; Popp, Thomas; Ablain, Michael; Bontemps, Sophie; Defourny, Pierre; Hollmann, Rainer; Lavergne, Thomas; Laeng, Alexandra; de Leeuw, Gerrit; Mittaz, Jonathan; Poulsen, Caroline; Povey, Adam C.; Reuter, Max; Sathyendranath, Shubha; Sandven, Stein; Sofieva, Viktoria F.; Wagner, Wolfgang

    2017-07-01

    The question of how to derive and present uncertainty information in climate data records (CDRs) has received sustained attention within the European Space Agency Climate Change Initiative (CCI), a programme to generate CDRs addressing a range of essential climate variables (ECVs) from satellite data. Here, we review the nature, mathematics, practicalities, and communication of uncertainty information in CDRs from Earth observations. This review paper argues that CDRs derived from satellite-based Earth observation (EO) should include rigorous uncertainty information to support the application of the data in contexts such as policy, climate modelling, and numerical weather prediction reanalysis. Uncertainty, error, and quality are distinct concepts, and the case is made that CDR products should follow international metrological norms for presenting quantified uncertainty. As a baseline for good practice, total standard uncertainty should be quantified per datum in a CDR, meaning that uncertainty estimates should clearly discriminate more and less certain data. In this case, flags for data quality should not duplicate uncertainty information, but instead describe complementary information (such as the confidence in the uncertainty estimate provided or indicators of conditions violating the retrieval assumptions). The paper discusses the many sources of error in CDRs, noting that different errors may be correlated across a wide range of timescales and space scales. Error effects that contribute negligibly to the total uncertainty in a single-satellite measurement can be the dominant sources of uncertainty in a CDR on the large space scales and long timescales that are highly relevant for some climate applications. For this reason, identifying and characterizing the relevant sources of uncertainty for CDRs is particularly challenging. The characterization of uncertainty caused by a given error effect involves assessing the magnitude of the effect, the shape of the

  5. Associations between Observed Mother-Adolescent Interactions and Adolescent Information Management

    ERIC Educational Resources Information Center

    Rote, Wendy M.; Smetana, Judith G.; Campione-Barr, Nicole; Villalobos, Myriam; Tasopoulos-Chan, Marina

    2012-01-01

    Associations between observed mother-adolescent interactions during a conflict task and adolescents' information management strategies were examined in 108 primarily middle class, European-American adolescents (M = 13.80 years, SD = 1.52) and their mothers. Teens who communicated more clearly disclosed more about personal and multifaceted…

  6. KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer on Smartphones

    DTIC Science & Technology

    2011-05-01

    format data to exchange because contact information can be exported to V- Cards using existing APIs. For these reasons it was chosen as the medium to... Card format allows customization of this field. The service provider field serves to identify the app the key is for and the username field stores the...public key data. A sample V- Card field looks like Listing 1 below. IMPP;TextSecure

  7. ASPECTS OF ARCTIC SEA ICE OBSERVABLE BY SEQUENTIAL PASSIVE MICROWAVE OBSERVATIONS FROM THE NIMBUS-5 SATELLITE.

    USGS Publications Warehouse

    Campbell, William J.; Gloersen, Per; Zwally, H. Jay; ,

    1984-01-01

    Observations made from 1972 to 1976 with the Electrically Scanning Microwave Radiometer on board the Nimbus-5 satellite provide sequential synoptic information of the Arctic sea ice cover. This four-year data set was used to construct a fairly continuous series of three-day average 19-GHz passive microwave images which has become a valuable source of polar information, yielding many anticipated and unanticipated discoveries of the sea ice canopy observed in its entirety through the clouds and during the polar night. Short-term, seasonal, and annual variations of key sea ice parameters, such as ice edge position, ice types, mixtures of ice types, ice concentrations, and snow melt on the ice, are presented for various parts of the Arctic.

  8. Generalizability and Decision Studies to Inform Observational and Experimental Research in Classroom Settings

    ERIC Educational Resources Information Center

    Bottema-Beutel, Kristen; Lloyd, Blair; Carter, Erik W.; Asmus, Jennifer M.

    2014-01-01

    Attaining reliable estimates of observational measures can be challenging in school and classroom settings, as behavior can be influenced by multiple contextual factors. Generalizability (G) studies can enable researchers to estimate the reliability of observational data, and decision (D) studies can inform how many observation sessions are…

  9. An observational study of the accuracy and completeness of an anesthesia information management system: recommendations for documentation system changes.

    PubMed

    Wilbanks, Bryan A; Moss, Jacqueline A; Berner, Eta S

    2013-08-01

    Anesthesia information management systems must often be tailored to fit the environment in which they are implemented. Extensive customization necessitates that systems be analyzed for both accuracy and completeness of documentation design to ensure that the final record is a true representation of practice. The purpose of this study was to determine the accuracy of a recently installed system in the capture of key perianesthesia data. This study used an observational design and was conducted using a convenience sample of nurse anesthetists. Observational data of the nurse anesthetists'delivery of anesthesia care were collected using a touch-screen tablet computer utilizing an Access database customized observational data collection tool. A questionnaire was also administered to these nurse anesthetists to assess perceived accuracy, completeness, and satisfaction with the electronic documentation system. The major sources of data not documented in the system were anesthesiologist presence (20%) and placement of intravenous lines (20%). The major sources of inaccuracies in documentation were gas flow rates (45%), medication administration times (30%), and documentation of neuromuscular function testing (20%)-all of the sources of inaccuracies were related to the use of charting templates that were not altered to reflect the actual interventions performed.

  10. Satellite Phenology Observations Inform Peak Season of Allergenic Grass Pollen Aerobiology across Two Continents

    NASA Astrophysics Data System (ADS)

    Huete, A. R.; Devadas, R.; Davies, J.

    2015-12-01

    Pollen exposure and prevalence of allergenic diseases have increased in many parts of the world during the last 30 years, with exposure to aeroallergen grass pollen expected to intensify with climate change, raising increased concerns for allergic diseases. The primary contributing factors to higher allergenic plant species presence are thought to be climate change, land conversion, and biotic mixing of species. Conventional methods for monitoring airborne pollen are hampered by a lack of sampling sites and heavily rely on meteorology with less attention to land cover updates and monitoring of key allergenic species phenology stages. Satellite remote sensing offers an alternative method to overcome the restrictive coverage afforded by in situ pollen networks by virtue of its synoptic coverage and repeatability of measurements that enable timely updates of land cover and land use information and monitoring landscape dynamics and interactions with human activity and climate. In this study, we assessed the potential of satellite observations of urban/peri-urban environments to directly inform landscape conditions conducive to pollen emissions. We found satellite measurements of grass cover phenological evolution to be highly correlated with in situ aerobiological grass pollen concentrations in five urban centres located across two hemispheres (Australia and France). Satellite greenness data from the Moderate Resolution Imaging Spectroradiometer (MODIS) were found to be strongly synchronous with grass pollen aerobiology in both temperate grass dominated sites (France and Melbourne), as well as in Sydney, where multiple pollen peaks coincided with the presence of subtropical grasses. Employing general additive models (GAM), the satellite phenology data provided strong predictive capabilities to inform airborne pollen levels and forecast periods of grass pollen emissions at all five sites. Satellite phenology offer promising opportunities of improving public health risk

  11. SLAR image interpretation keys for geographic analysis

    NASA Technical Reports Server (NTRS)

    Coiner, J. C.

    1972-01-01

    A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.

  12. Understanding Interdependencies between Heterogeneous Earth Observation Systems When Applied to Federal Objectives

    NASA Astrophysics Data System (ADS)

    Gallo, J.; Sylak-Glassman, E.

    2017-12-01

    We will present a method for assessing interdependencies between heterogeneous Earth observation (EO) systems when applied to key Federal objectives. Using data from the National Earth Observation Assessment (EOA), we present a case study that examines the frequency that measurements from each of the Landsat 8 sensors are used in conjunction with heterogeneous measurements from other Earth observation sensors to develop data and information products. This EOA data allows us to map the most frequent interactions between Landsat measurements and measurements from other sensors, identify high-impact data and information products where these interdependencies occur, and identify where these combined measurements contribute most to meeting a key Federal objective within one of the 13 Societal Benefit Areas used in the EOA study. Using a value-tree framework to trace the application of data from EO systems to weighted key Federal objectives within the EOA study, we are able to estimate relative contribution of individual EO systems to meeting those objectives, as well as the interdependencies between measurements from all EO systems within the EOA study. The analysis relies on a modified Delphi method to elicit relative levels of reliance on individual measurements from EO systems, including combinations of measurements, from subject matter experts. This results in the identification of a representative portfolio of all EO systems used to meet key Federal objectives. Understanding the interdependencies among a heterogeneous set of measurements that modify the impact of any one individual measurement on meeting a key Federal objective, especially if the measurements originate from multiple agencies or state/local/tribal, international, academic, and commercial sources, can impact agency decision-making regarding mission requirements and inform understanding of user needs.

  13. SIM PlanetQuest Key Project Precursor Observations to Detect Gas Giant Planets Around Young Stars

    NASA Technical Reports Server (NTRS)

    Tanner, Angelle; Beichman, Charles; Akeson, Rachel; Ghez, Andrea; Grankin, Konstantin N.; Herbst, William; Hillenbrand, Lynne; Huerta, Marcos; Konopacky, Quinn; Metchev, Stanimir; hide

    2008-01-01

    We present a review of precursor observing programs for the SIM PlanetQuest Key project devoted to detecting Jupiter mass planets around young stars. In order to ensure that the stars in the sample are free of various sources of astrometric noise that might impede the detection of planets, we have initiated programs to collect photometry, high contrast images, interferometric data and radial velocities for stars in both the Northern and Southern hemispheres. We have completed a high contrast imaging survey of target stars in Taurus and the Pleiades and found no definitive common proper motion companions within one arcsecond (140 AU) of the SIM targets. Our radial velocity surveys have shown that many of the target stars in Sco-Cen are fast rotators and a few stars in Taurus and the Pleiades may have sub-stellar companions. Interferometric data of a few stars in Taurus show no signs of stellar or sub-stellar companions with separations of <5 mas. The photometric survey suggests that approximately half of the stars initially selected for this program are variable to a degree (1(sigma) >0.1 mag) that would degrade the astrometric accuracy achievable for that star. While the precursor programs are still a work in progress, we provide a comprehensive list of all targets ranked according to their viability as a result of the observations taken to date. By far, the observable that removes the most targets from the SIM-YSO program is photometric variability.

  14. Two-qubit correlations revisited: average mutual information, relevant (and useful) observables and an application to remote state preparation

    NASA Astrophysics Data System (ADS)

    Giorda, Paolo; Allegra, Michele

    2017-07-01

    Understanding how correlations can be used for quantum communication protocols is a central goal of quantum information science. While many authors have linked the global measures of correlations such as entanglement or discord to the performance of specific protocols, in general the latter may require only correlations between specific observables. In this work, we first introduce a general measure of correlations for two-qubit states, based on the classical mutual information between local observables. Our measure depends on the state’s purity and the symmetry in the correlation distribution, according to which we provide a classification of maximally mixed marginal states (MMMS). We discuss the complementarity relation between correlations and coherence. By focusing on a simple yet paradigmatic example, i.e. the remote state preparation protocol, we introduce a method to systematically define the proper protocol-tailored measures of the correlations. The method is based on the identification of those correlations that are relevant (useful) for the protocol. On the one hand, the approach allows the role of the symmetry of the correlation distribution to be discussed in determining the efficiency of the protocol, both for MMMS and general two-qubit quantum states, and on the other hand, it allows an optimized protocol for non-MMMS to be devised, which is more efficient with respect to the standard one. Overall, our findings clarify how the key resources in simple communication protocols are the purity of the state used and the symmetry of the correlation distribution.

  15. Key Facts about Higher Education in Washington: 2009-10

    ERIC Educational Resources Information Center

    Washington Higher Education Coordinating Board, 2010

    2010-01-01

    First published in 2002, "Key Facts about Higher Education in Washington" provides valuable information on the ways higher education serves the state and its people. The most current data and information available is presented throughout this report to highlight the "Key Facts" about Washington's postsecondary institutions,…

  16. The Use of Key Informant Method for Identifying Children with Blindness and Severe Visual Impairment in Developing Countries.

    PubMed

    du Toit, Rènée; Courtright, Paul; Lewallen, Susan

    2017-06-01

    An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.

  17. Mining key elements for severe convection prediction based on CNN

    NASA Astrophysics Data System (ADS)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  18. Dissemination and implementation of comparative effectiveness evidence: key informant interviews with Clinical and Translational Science Award institutions.

    PubMed

    Morrato, Elaine H; Concannon, Thomas W; Meissner, Paul; Shah, Nilay D; Turner, Barbara J

    2013-03-01

    To identify ongoing practices and opportunities for improving national comparative effectiveness research (CER) translation through dissemination and implementation (D&I) via NIH-funded Clinical and Translational Science Award (CTSA) institutions. Key informant interviews were conducted with 18 CTSA grantees sampled to represent a range of D&I efforts. The institutional representatives endorsed fostering CER translation nationally via the CTSA Consortium. However, five themes emerged from the interviews as barriers to CER D&I: lack of institutional awareness, insufficient capacity, lack of established D&I methods, confusion among stakeholders about what CER actually is and limited funding opportunities. Interviewees offered two key recommendations to improve CER translation: development of a centralized clearing house to facilitate the diffusion of CER D&I resources and methods across CTSA institutions; and formalization of the national CTSA network to leverage existing community engagement relationships and resources for the purpose of adapting and disseminating robust CER evidence locally with providers, patients and healthcare systems.

  19. Dissemination and implementation of comparative effectiveness evidence: key informant interviews with Clinical and Translational Science Award institutions

    PubMed Central

    Morrato, Elaine H; Concannon, Thomas W; Meissner, Paul; Shah, Nilay D; Turner, Barbara J

    2014-01-01

    Aim To identify ongoing practices and opportunities for improving national comparative effectiveness research (CER) translation through dissemination and implementation (D&I) via NIH-funded Clinical and Translational Science Award (CTSA) institutions. Materials & methods Key informant interviews were conducted with 18 CTSA grantees sampled to represent a range of D&I efforts. Results & conclusions The institutional representatives endorsed fostering CER translation nationally via the CTSA Consortium. However, five themes emerged from the interviews as barriers to CER D&I: lack of institutional awareness, insufficient capacity, lack of established D&I methods, confusion among stakeholders about what CER actually is and limited funding opportunities. Interviewees offered two key recommendations to improve CER translation: development of a centralized clearing house to facilitate the diffusion of CER D&I resources and methods across CTSA institutions; and formalization of the national CTSA network to leverage existing community engagement relationships and resources for the purpose of adapting and disseminating robust CER evidence locally with providers, patients and healthcare systems. PMID:24236560

  20. Autoshaping of key pecking in pigeons with negative reinforcement.

    PubMed

    Rachlin, H

    1969-07-01

    Pigeons exposed to gradually increasing intensities of pulsing electric shock pecked a key and thereby reduced the intensity of shock to zero for 2 min. Acquisition of key pecking was brought about through an autoshaping process in which periodic brief keylight presentations immediately preceded automatic reduction of the shock. On the occasions of such automatic reduction of shock preceding the first measured key peck, little or no orientation to the key was observed. Observations of pigeons with autoshaping of positive reinforcement also revealed little evidence of orientation toward the key.

  1. The Arctic Observing Network (AON)Cooperative Arctic Data and Information Service (CADIS)

    NASA Astrophysics Data System (ADS)

    Moore, J.; Fetterer, F.; Middleton, D.; Ramamurthy, M.; Barry, R.

    2007-12-01

    The Arctic Observing Network (AON) is intended to be a federation of 34 land, atmosphere and ocean observation sites, some already operating and some newly funded by the U.S. National Science Foundation. This International Polar Year (IPY) initiative will acquire a major portion of the data coming from the interagency Study of Environmental Arctic Change (SEARCH). AON will succeed in supporting the science envisioned by its planners only if it functions as a system and not as a collection of independent observation programs. Development and implementation of a comprehensive data management strategy will key a key to the success of this effort. AON planners envision an ideal data management system that includes a portal through which scientists can submit metadata and datasets at a single location; search the complete archive and find all data relevant to a location or process; all data have browse imagery and complete documentation; time series or fields can be plotted on line, and all data are in a relational database so that multiple data sets and sources can be queried and retrieved. The Cooperative Arctic Data and Information Service (CADIS) will provide near-real-time data delivery, a long-term repository for data, a portal for data discovery, and tools to manipulate data by building on existing tools like the Unidata Integrated Data Viewer (IDV). Our approach to the data integration challenge is to start by asking investigators to provide metadata via a general purpose user interface. An entry tool assists PIs in writing metadata and submitting data. Data can be submitted to the archive in NetCDF with Climate and Forecast conventions or in one of several other standard formats where possible. CADIS is a joint effort of the University Corporation for Atmospheric Research (UCAR), the National Snow and Ice Data Center (NSIDC), and the National Center for Atmospheric Research (NCAR). In the first year, we are concentrating on establishing metadata protocols that

  2. Key Management Infrastructure Increment 2 (KMI Inc 2)

    DTIC Science & Technology

    2016-03-01

    2016 Major Automated Information System Annual Report Key Management Infrastructure Increment 2 (KMI Inc 2) Defense Acquisition Management...PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then...Assigned: April 6, 2015 Program Information Program Name Key Management Infrastructure Increment 2 (KMI Inc 2) DoD Component DoD The acquiring DoD

  3. Prevalence and causes of severe visual impairment and blindness among children in the lorestan province of iran, using the key informant method.

    PubMed

    Razavi, Hessom; Kuper, Hannah; Rezvan, Farhad; Amelie, Khatere; Mahboobi-Pur, Hassan; Oladi, Mohammad Reza; Muhit, Mohammad; Hashemi, Hassan

    2010-03-01

    To estimate the prevalence and causes of severe visual impairment and blindness among children in Lorestan province of Iran, and to assess the feasibility of the Key Informant Method in this setting. Potential cases were identified using the Key Informant Method, in 3 counties of Lorestan province during June through August 2008, and referred for examination. Causes of severe visual impairment/blindness were determined and categorized using standard World Health Organization methods. Of 123 children referred for examination, 27 children were confirmed to have severe visual impairment/blindness or blindness. The median age was11 years (interquartile range 6-13), and 59% were girls. After adjusting for non-attenders, the estimated prevalence of severe visual impairment/blindness was 0.04% (0.03-0.05). The main site of abnormality was retina (44%), followed by disorders of the whole eye (33%). The majority of causes had a hereditary etiology (70%), which was associated with a family history of blindness (P = 0.002). Potentially avoidable causes of severe visual impairment/blindness were found in 14 children (52%). Almost all children with severe visual impairment/blindness had a history of parental consanguinity (93%). Our findings suggest a moderate prevalence of childhood blindness in the Lorestan province of Iran, a high proportion of which may be avoidable, given improved access to ophthalmic and genetic counselling services in rural areas. The Key Informant Method is feasible in Iran; future research is discussed.

  4. Scientific information and the Tongass land management plan: key findings derived from the scientific literature, species assessments, resource analyses, workshops, and risk assessment panels.

    Treesearch

    Douglas N. Swanston; Charles G. Shaw; Winston P. Smith; Kent R. Julin; Guy A. Cellier; Fred H. Everest

    1996-01-01

    This document highlights key items of information obtained from the published literature and from specific assessments, workshops, resource analyses, and various risk assessment panels conducted as part of the Tongass land management planning process. None of this information dictates any particular decision; however, it is important to consider during decisionmaking...

  5. Strategic development of medicines information: Expanding key global initiatives.

    PubMed

    Hämeen-Anttila, Katri

    2016-01-01

    Medicines information (MI) is a broad concept that includes information targeted to health care professionals as well as to patients. It may be in written, electronic or verbal forms. The internet is becoming more widely used as a source for MI, even though research shows that health care professionals and patient information leaflets are still the most common sources for medicine users. As patients are increasingly looking for the information they need themselves, the role of health care professionals in providing information is evolving, and there exists a need for greater health literacy skills among the patients. Medicines information as a concept is often defined and understood differently. Furthermore, it is such an integral part of pharmacy practice that it is rarely discussed as a separate entity. However, there is a growing recognition of a need to discuss MI in a broader sense and consider national strategies to meet consumer needs for medicines information. It also has been recognized that provision of MI should be a shared responsibility of all stakeholders in health care. This commentary gives an example of national level strategic development of MI, and calls for international collaboration. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. A Note on the Equivalence between Observed and Expected Information Functions with Polytomous IRT Models

    ERIC Educational Resources Information Center

    Magis, David

    2015-01-01

    The purpose of this note is to study the equivalence of observed and expected (Fisher) information functions with polytomous item response theory (IRT) models. It is established that observed and expected information functions are equivalent for the class of divide-by-total models (including partial credit, generalized partial credit, rating…

  7. XMM Observations of X-Ray Emission from Supernovae

    NASA Technical Reports Server (NTRS)

    Immler, Stefan; Lewin, Walter

    2003-01-01

    Of the six proposed targets, only one observation was performed. The observation resulted in a 28ks observation of SN 1998S. At the time of writing the proposal, our target list only contained previously unknown X-ray supernovae. Between submission of the proposal and the actual observation, a Chandra DDT observation resulted in the detection of SN 1998S. Since SN 1998S was observed with Chandra five times before the XMM-Newton observation was made, the data did not yield enough new information to warrant a separate SN 1998S publication. The key science results of that observation were presented in a review article (by Immler and Lewin); the results were also presented at two conferences.

  8. The comparison and analysis of extracting video key frame

    NASA Astrophysics Data System (ADS)

    Ouyang, S. Z.; Zhong, L.; Luo, R. Q.

    2018-05-01

    Video key frame extraction is an important part of the large data processing. Based on the previous work in key frame extraction, we summarized four important key frame extraction algorithms, and these methods are largely developed by comparing the differences between each of two frames. If the difference exceeds a threshold value, take the corresponding frame as two different keyframes. After the research, the key frame extraction based on the amount of mutual trust is proposed, the introduction of information entropy, by selecting the appropriate threshold values into the initial class, and finally take a similar mean mutual information as a candidate key frame. On this paper, several algorithms is used to extract the key frame of tunnel traffic videos. Then, with the analysis to the experimental results and comparisons between the pros and cons of these algorithms, the basis of practical applications is well provided.

  9. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    PubMed

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security

  10. NREL Makes Key Appointments

    Science.gov Websites

    Makes Key Appointments Staffing for Distributed Energy and Tech Management Announced For more information contact: Gary Schmitz, 303-275-4050 email: Gary Schmitz Golden, Colo., Feb. 28, 2001 - Two reorganized Planning and Technology Management Division. Anthony Schaffhauser has been selected to become

  11. Reconstruction of normal forms by learning informed observation geometries from data.

    PubMed

    Yair, Or; Talmon, Ronen; Coifman, Ronald R; Kevrekidis, Ioannis G

    2017-09-19

    The discovery of physical laws consistent with empirical observations is at the heart of (applied) science and engineering. These laws typically take the form of nonlinear differential equations depending on parameters; dynamical systems theory provides, through the appropriate normal forms, an "intrinsic" prototypical characterization of the types of dynamical regimes accessible to a given model. Using an implementation of data-informed geometry learning, we directly reconstruct the relevant "normal forms": a quantitative mapping from empirical observations to prototypical realizations of the underlying dynamics. Interestingly, the state variables and the parameters of these realizations are inferred from the empirical observations; without prior knowledge or understanding, they parametrize the dynamics intrinsically without explicit reference to fundamental physical quantities.

  12. Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2004-05-01

    Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.

  13. The effect of touch-key size on the usability of In-Vehicle Information Systems and driving safety during simulated driving.

    PubMed

    Kim, Heejin; Kwon, Sunghyuk; Heo, Jiyoon; Lee, Hojin; Chung, Min K

    2014-05-01

    Investigating the effect of touch-key size on usability of In-Vehicle Information Systems (IVISs) is one of the most important research issues since it is closely related to safety issues besides its usability. This study investigated the effects of the touch-key size of IVISs with respect to safety issues (the standard deviation of lane position, the speed variation, the total glance time, the mean glance time, the mean time between glances, and the mean number of glances) and the usability of IVISs (the task completion time, error rate, subjective preference, and NASA-TLX) through a driving simulation. A total of 30 drivers participated in the task of entering 5-digit numbers with various touch-key sizes while performing simulated driving. The size of the touch-key was 7.5 mm, 12.5 mm, 17.5 mm, 22.5 mm and 27.5 mm, and the speed of driving was set to 0 km/h (stationary state), 50 km/h and 100 km/h. As a result, both the driving safety and the usability of the IVISs increased as the touch-key size increased up to a certain size (17.5 mm in this study), at which they reached asymptotes. We performed Fitts' law analysis of our data, and this revealed that the data from the dual task experiment did not follow Fitts' law. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  14. A Naturalistic Observational Study of Informal Segregation: Seating Patterns in Lectures

    ERIC Educational Resources Information Center

    Koen, Jennifer; Durrheim, Kevin

    2010-01-01

    In spite of the removal of legislated racial segregation, a number of observational studies in South Africa and elsewhere have shown that "informal," nonlegislated segregation persists in spaces of everyday interaction. Most of these have been case studies of segregation at single sites. The authors seek to quantify segregation in a…

  15. Server-Controlled Identity-Based Authenticated Key Exchange

    NASA Astrophysics Data System (ADS)

    Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun

    We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.

  16. Lean Information Management: Criteria For Selecting Key Performance Indicators At Shop Floor

    NASA Astrophysics Data System (ADS)

    Iuga, Maria Virginia; Kifor, Claudiu Vasile; Rosca, Liviu-Ion

    2015-07-01

    Most successful organizations worldwide use key performance indicators as an important part of their corporate strategy in order to forecast, measure and plan their businesses. Performance metrics vary in their purpose, definition and content. Therefore, the way organizations select what they think are the optimal indicators for their businesses varies from company to company, sometimes even from department to department. This study aims to answer the question of what is the most suitable way to define and select key performance indicators. More than that, it identifies the right criteria to select key performance indicators at shop floor level. This paper contributes to prior research by analysing and comparing previously researched selection criteria and proposes an original six-criteria-model, which caters towards choosing the most adequate KPIs. Furthermore, the authors take the research a step further by further steps to closed research gaps within this field of study.

  17. Observability and Estimation of Distributed Space Systems via Local Information-Exchange Networks

    NASA Technical Reports Server (NTRS)

    Fathpour, Nanaz; Hadaegh, Fred Y.; Mesbahi, Mehran; Rahmani, Amirreza

    2011-01-01

    Spacecraft formation flying involves the coordination of states among multiple spacecraft through relative sensing, inter-spacecraft communication, and control. Most existing formation-flying estimation algorithms can only be supported via highly centralized, all-to-all, static relative sensing. New algorithms are proposed that are scalable, modular, and robust to variations in the topology and link characteristics of the formation exchange network. These distributed algorithms rely on a local information exchange network, relaxing the assumptions on existing algorithms. Distributed space systems rely on a signal transmission network among multiple spacecraft for their operation. Control and coordination among multiple spacecraft in a formation is facilitated via a network of relative sensing and interspacecraft communications. Guidance, navigation, and control rely on the sensing network. This network becomes more complex the more spacecraft are added, or as mission requirements become more complex. The observability of a formation state was observed by a set of local observations from a particular node in the formation. Formation observability can be parameterized in terms of the matrices appearing in the formation dynamics and observation matrices. An agreement protocol was used as a mechanism for observing formation states from local measurements. An agreement protocol is essentially an unforced dynamic system whose trajectory is governed by the interconnection geometry and initial condition of each node, with a goal of reaching a common value of interest. The observability of the interconnected system depends on the geometry of the network, as well as the position of the observer relative to the topology. For the first time, critical GN&C (guidance, navigation, and control estimation) subsystems are synthesized by bringing the contribution of the spacecraft information-exchange network to the forefront of algorithmic analysis and design. The result is a

  18. The politics of agenda setting at the global level: key informant interviews regarding the International Labour Organization Decent Work Agenda.

    PubMed

    Di Ruggiero, Erica; Cohen, Joanna E; Cole, Donald C

    2014-07-01

    Global labour markets continue to undergo significant transformations resulting from socio-political instability combined with rises in structural inequality, employment insecurity, and poor working conditions. Confronted by these challenges, global institutions are providing policy guidance to protect and promote the health and well-being of workers. This article provides an account of how the International Labour Organization's Decent Work Agenda contributes to the work policy agendas of the World Health Organization and the World Bank. This qualitative study involved semi-structured interviews with representatives from three global institutions--the International Labour Organization (ILO), the World Health Organization and the World Bank. Of the 25 key informants invited to participate, 16 took part in the study. Analysis for key themes was followed by interpretation using selected agenda setting theories. Interviews indicated that through the Decent Work Agenda, the International Labour Organization is shaping the global policy narrative about work among UN agencies, and that the pursuit of decent work and the Agenda were perceived as important goals with the potential to promote just policies. The Agenda was closely linked to the World Health Organization's conception of health as a human right. However, decent work was consistently identified by World Bank informants as ILO terminology in contrast to terms such as job creation and job access. The limited evidence base and its conceptual nature were offered as partial explanations for why the Agenda has yet to fully influence other global institutions. Catalytic events such as the economic crisis were identified as creating the enabling conditions to influence global work policy agendas. Our evidence aids our understanding of how an issue like decent work enters and stays on the policy agendas of global institutions, using the Decent Work Agenda as an illustrative example. Catalytic events and policy

  19. The politics of agenda setting at the global level: key informant interviews regarding the International Labour Organization Decent Work Agenda

    PubMed Central

    2014-01-01

    Background Global labour markets continue to undergo significant transformations resulting from socio-political instability combined with rises in structural inequality, employment insecurity, and poor working conditions. Confronted by these challenges, global institutions are providing policy guidance to protect and promote the health and well-being of workers. This article provides an account of how the International Labour Organization’s Decent Work Agenda contributes to the work policy agendas of the World Health Organization and the World Bank. Methods This qualitative study involved semi-structured interviews with representatives from three global institutions – the International Labour Organization (ILO), the World Health Organization and the World Bank. Of the 25 key informants invited to participate, 16 took part in the study. Analysis for key themes was followed by interpretation using selected agenda setting theories. Results Interviews indicated that through the Decent Work Agenda, the International Labour Organization is shaping the global policy narrative about work among UN agencies, and that the pursuit of decent work and the Agenda were perceived as important goals with the potential to promote just policies. The Agenda was closely linked to the World Health Organization’s conception of health as a human right. However, decent work was consistently identified by World Bank informants as ILO terminology in contrast to terms such as job creation and job access. The limited evidence base and its conceptual nature were offered as partial explanations for why the Agenda has yet to fully influence other global institutions. Catalytic events such as the economic crisis were identified as creating the enabling conditions to influence global work policy agendas. Conclusions Our evidence aids our understanding of how an issue like decent work enters and stays on the policy agendas of global institutions, using the Decent Work Agenda as an illustrative

  20. Key Informants' Perceptions on the Implementation of a National Program for Improving Nutritional Status of Children in Iran.

    PubMed

    Ghodsi, Delaram; Omidvar, Nasrin; Rashidian, Arash; Raghfar, Hossein; Eini-Zinab, Hassan; Ebrahimi, Marziyeh

    2016-01-01

    Childhood malnutrition is a major public health issue. Multidisciplinary approach for Improvement of Nutritional Status of Children in Iran was implemented in order to reduce malnutrition among children. This study aimed to evaluate the implementation aspect of the program and to explore key informants' perceptions and experience regarding the factors affected its implementation. Data were collected through the review of secondary data and semistructured interviews at national, province, and local levels. Four layers of key informants were selected purposefully for interviewing, including policymakers, senior nutrition officers, head of Hygiene, Remedy and Insurance Affairs in Imam Khomeini Relief Foundation, and community health workers. Qualitative content analysis was carried out based on Supporting the Use of Research Evidence framework and Tailored Implementation for Chronic Diseases' checklist to interpret the viewpoints of the study participants. Results showed that the program had successes in improving mother's knowledge on health, nutrition, and child care through health system and increased families' access to food, but there were some aspects that affected program's implementation. Some of these factors are the lack of clarity in the program's protocol and indicators, human shortage and inadequate financial resources, poor facilities, inattention to staff motivation, insufficient commitment among different sections, poor communication and supervision among different executive sections, and program protocols designing regardless of practical condition. Based on the results, top-down approach in policymaking and inadequate financial and human resources were responsible for most of the challenges encountered in the implementation.

  1. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-02-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem (Q P K C) based on the Bell states. By H o l e v o's theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack (C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  2. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  3. NOAA Observing System Integrated Analysis (NOSIA): development and support to the NOAA Satellite Observing System Architecture

    NASA Astrophysics Data System (ADS)

    Reining, R. C.; Cantrell, L. E., Jr.; Helms, D.; LaJoie, M.; Pratt, A. S.; Ries, V.; Taylor, J.; Yuen-Murphy, M. A.

    2016-12-01

    There is a deep relationship between NOSIA-II and the Federal Earth Observation Assessment (EOA) efforts (EOA 2012 and 2016) chartered under the National Science and Technology Council, Committee on Environment, Natural Resources, and Sustainability, co-chaired by the White House Office of Science and Technology Policy, NASA, NOAA, and USGS. NOSIA-1, which was conducted with a limited scope internal to NOAA in 2010, developed the methodology and toolset that was adopted for EOA 2012, and NOAA staffed the team that conducted the data collection, modeling, and analysis effort for EOA 2012. EOA 2012 was the first-ever integrated analysis of the relative impact of 379 observing systems and data sources contributing to the key objectives identified for 13 Societal Benefit Areas (SBA) including Weather, Climate, Disasters, Oceans and Coastal Resources, and Water Resources. This effort culminated in the first National Plan for Civil Earth Observations. NOAA conducted NOSIA-II starting in 2012 to extend the NOSIA methodology across all of NOAA's Mission Service Areas, covering a representative sample (over 1000) of NOAA's products and services. The detailed information from NOSIA-II is being integrated into EOA 2016 to underpin a broad array of Key Products, Services, and (science) Objectives (KPSO) identified by the inter-agency SBA teams. EOA 2016 is expected to provide substantially greater insight into the cross-agency impacts of observing systems contributing to a wide array of KPSOs, and by extension, to societal benefits flowing from these public-facing products. NOSIA-II is being adopted by NOAA as a corporate decision-analysis and support capability to inform leadership decisions on its integrated observing systems portfolio. Application examples include assessing the agency-wide impacts of planned decommissioning of ships and aircraft in NOAA's fleet, and the relative cost-effectiveness of alternative space-based architectures in the post-GOES-R and JPSS era

  4. Autoshaping of key pecking in pigeons with negative reinforcement1

    PubMed Central

    Rachlin, Howard

    1969-01-01

    Pigeons exposed to gradually increasing intensities of pulsing electric shock pecked a key and thereby reduced the intensity of shock to zero for 2 min. Acquisition of key pecking was brought about through an autoshaping process in which periodic brief keylight presentations immediately preceded automatic reduction of the shock. On the occasions of such automatic reduction of shock preceding the first measured key peck, little or no orientation to the key was observed. Observations of pigeons with autoshaping of positive reinforcement also revealed little evidence of orientation toward the key. ImagesFig. 3.Fig. 4. PMID:16811371

  5. Adolescents Searching for Health Information on the Internet: An Observational Study

    PubMed Central

    Derry, Holly A; Resnick, Paul J; Richardson, Caroline R

    2003-01-01

    Background Adolescents' access to health information on the Internet is partly a function of their ability to search for and find answers to their health-related questions. Adolescents may have unique health and computer literacy needs. Although many surveys, interviews, and focus groups have been utilized to understand the information-seeking and information-retrieval behavior of adolescents looking for health information online, we were unable to locate observations of individual adolescents that have been conducted in this context. Objective This study was designed to understand how adolescents search for health information using the Internet and what implications this may have on access to health information. Methods A convenience sample of 12 students (age 12-17 years) from 1 middle school and 2 high schools in southeast Michigan were provided with 6 health-related questions and asked to look for answers using the Internet. Researchers recorded 68 specific searches using software that captured screen images as well as synchronized audio recordings. Recordings were reviewed later and specific search techniques and strategies were coded. A qualitative review of the verbal communication was also performed. Results Out of 68 observed searches, 47 (69%) were successful in that the adolescent found a correct and useful answer to the health question. The majority of sites that students attempted to access were retrieved directly from search engine results (77%) or a search engine's recommended links (10%); only a small percentage were directly accessed (5%) or linked from another site (7%). The majority (83%) of followed links from search engine results came from the first 9 results. Incorrect spelling (30 of 132 search terms), number of pages visited within a site (ranging from 1-15), and overall search strategy (eg, using a search engine versus directly accessing a site), were each important determinants of success. Qualitative analysis revealed that participants

  6. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.

    PubMed

    Zhang, Liping; Zhu, Shaohui; Tang, Shanyu

    2017-03-01

    Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.

  7. Three-party authenticated key agreements for optimal communication

    PubMed Central

    Lee, Tian-Fu; Hwang, Tzonelih

    2017-01-01

    Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253

  8. A rhetorical approach to environmental information sharing

    NASA Astrophysics Data System (ADS)

    Woolf, Andrew

    2014-05-01

    `Faceted search' has recently been widely adopted as a powerful information discovery framework, enabling users to navigate a complex landscape of information by successive refinement along key dimensions. The compelling user experience that results has seen adoption of faceted search by online retailers, media outlets, and encyclopedic publishers. A key challenge with faceted browse is the choice of suitable search dimensions, or facets. Conventional facet analysis adopts principles of exclusivity and exhaustiveness; identifying facets on their relevance to the subject and discrimination ability (Spiteri, 1998). The rhetoricians of ancient Greece defined seven dimensions (`circumstances') of analytical enquiry: who, what, when, where, why, in what way, by what means. These provide a broadly applicable framework that may be seen in Ranganathan's classic (`PMEST') scheme for facet analysis. The utility of the `Five Ws' is also manifest through their adoption in daily discourse and pedagogical frameworks. If we apply the `Five Ws' to environmental information, we arrive at a model very close to the `O&M' (ISO 19156) conceptual model for standardised exchange of environmental observation and measurements data: * who: metadata * what: observed property * when: time of observation * where: feature of interest * why: metadata * how: procedure Thus, we adopt an approach for distributed environmental information sharing which factors the architecture into components aligned with the `Five Ws' (or O&M). We give an overview of this architecture and its information classes, components, interfaces and standards. We also describe how it extends the classic SDI architecture to provide additional specific benefit for environmental information. Finally, we offer a perspective on the architecture which may be seen as a `brokering' overlay to environmental information resources, enabling an O&M-conformant view. The approach to be presented is being adopted by the Australian Bureau

  9. Using Key Informant Method to Determine the Prevalence and Causes of Childhood Blindness in South-Eastern Nigeria.

    PubMed

    Aghaji, Ada E; Ezegwui, Ifeoma R; Shiweobi, Jude O; Mamah, Cyril C; Okoloagu, Mary N; Onwasigwe, Ernest N

    2017-12-01

    To determine the prevalence and causes of childhood blindness in an underserved community in south-eastern Nigeria using the key informant method. This was a descriptive cross-sectional study. Key informants (KI) appointed by their respective communities received 1-day training on identification of blind children in their communities. Two weeks later, the research team visited the agreed sites within the community and examined the identified children. The World Health Organization eye examination record for blind children was used for data collection. Data entry and analysis were done with the Statistical Package for Social Sciences (SPSS) version 17.0. Fifteen blind or severely visually impaired children (age range 3 months to 15 years) were identified in this community; nine of these were brought by the KIs. The prevalence of childhood blindness/severe visual impairment (BL/SVI) was 0.12 per 1000 children. By anatomical classification, operable cataract in 6 (40.0%) was the leading cause of BL/SVI in the series; followed by optic nerve lesions (atrophy/hypoplasia) in 3 (20.0%). The etiology of BL/SVI is unknown for the majority of the children (66.7%). It was presumed hereditary in four children (26.7%). Sixty percent of the blindness was judged avoidable. Only three children (20.0%) were enrolled in the Special Education Centre for the Blind. The prevalence of childhood BL/SVI in our study population is low but over half of the blindness is avoidable. There may be a significant backlog of operable childhood cataract in south-eastern Nigeria. The KI method is a practical method for case finding of blind children in rural communities.

  10. Measuring Sexual Behavior Stigma to Inform Effective HIV Prevention and Treatment Programs for Key Populations

    PubMed Central

    Hargreaves, James R; Sprague, Laurel; Stangl, Anne L; Baral, Stefan D

    2017-01-01

    Background The levels of coverage of human immunodeficiency virus (HIV) treatment and prevention services needed to change the trajectory of the HIV epidemic among key populations, including gay men and other men who have sex with men (MSM) and sex workers, have consistently been shown to be limited by stigma. Objective The aim of this study was to propose an agenda for the goals and approaches of a sexual behavior stigma surveillance effort for key populations, with a focus on collecting surveillance data from 4 groups: (1) members of key population groups themselves (regardless of HIV status), (2) people living with HIV (PLHIV) who are also members of key populations, (3) members of nonkey populations, and (4) health workers. Methods We discuss strengths and weaknesses of measuring multiple different types of stigma including perceived, anticipated, experienced, perpetrated, internalized, and intersecting stigma as measured among key populations themselves, as well as attitudes or beliefs about key populations as measured among other groups. Results With the increasing recognition of the importance of stigma, consistent and validated stigma metrics for key populations are needed to monitor trends and guide immediate action. Evidence-based stigma interventions may ultimately be the key to overcoming the barriers to coverage and retention in life-saving antiretroviral-based HIV prevention and treatment programs for key populations. Conclusions Moving forward necessitates the integration of validated stigma scales in routine HIV surveillance efforts, as well as HIV epidemiologic and intervention studies focused on key populations, as a means of tracking progress toward a more efficient and impactful HIV response. PMID:28446420

  11. Era-Planet the European Network for Observing Our Changing Planet

    NASA Astrophysics Data System (ADS)

    Pirrone, N.; Cinnirella, S.; Nativi, S.; Sprovieri, F.; Hedgecock, I. M.

    2016-06-01

    In the last decade a significant number of projects and programmes in different domains of Earth Observation and environmental monitoring have generated a substantial amount of data and knowledge on different aspects related to environmental quality and sustainability. Big data generated by in-situ or satellite platforms are being collected and archived with a plethora of systems and instruments making difficult the sharing of data and transfer of knowledge to stakeholders and policy makers to support key economic and societal sectors. The overarching goal of ERAPLANET is to strengthen the European Research Area in the domain of Earth Observation in coherence with the European participation in the Group on Earth Observation (GEO) and Copernicus. The expected impact is to strengthen European leadership within the forthcoming GEO 2015-2025 Work Plan. ERA-PLANET is designed to reinforce the interface with user communities, whose needs the Global Earth Observation System of Systems (GEOSS) intends to address. It will provide more accurate, comprehensive and authoritative information to policy and decision-makers in key societal benefit areas, such as Smart Cities and Resilient Societies; Resource efficiency and Environmental management; Global changes and Environmental treaties; Polar areas and Natural resources. ERA-PLANET will provide advanced decision-support tools and technologies aimed to better monitor our global environment and share the information and knowledge available in the different domains of Earth Observation.

  12. Copernicus: a quantum leap in Earth Observation

    NASA Astrophysics Data System (ADS)

    Aschbacher, Josef

    2015-04-01

    Copernicus is the most ambitious, most comprehensive Earth observation system world-wide. It aims at giving decision-makers better information to act upon, at global, continental, national and regional level. The European Union (EU) leads the overall programme, while the European Space Agency (ESA) coordinates the space component. Similar to meteorology, satellite data is combined with data from airborne and ground sensors to provide a holistic view of the state of the planet. All these data are fed into a range of thematic information services designed to benefit the environment and to support policy-makers and other stakeholders to make decisions, coordinate policy areas, and formulate strategies relating to the environment. Moreover, the data will also be used for predicting future climate trends. Never has such a comprehensive Earth-observation based system been in place before. It will be fully integrated into an informed decision making process, thus enabling economic and social benefits through better access to information globally. A key feature of Copernicus is the free and open data policy of the Sentinel satellite data. This will enable that Earth observation based information enters completely new domains of daily life. High quality, regularly updated satellite observations become available for basically everyone. To ensure universal access new ground segment and data access concepts need to be developed. As more data are made available, better decisions can made, more business will be created and science and research can be achieved through the upcoming Sentinel data.

  13. Quantum key distribution with prepare-and-measure Bell test

    PubMed Central

    Tan, Yong-gang

    2016-01-01

    The prepare-and-measure quantum key distribution (QKD) has the merits of fast speed, high key generation rate, and easy implementation. However, the detector side channel attacks greatly undermine the security of the key bits. The eavesdropper, Eve, exploits the flaws of the detectors to obtain illegal information without violating quantum principles. It means that she can intervene in the communication without being detected. A prepare-and-measure Bell test protocol will be proposed. By randomly carrying out Bell test at the side of the information receiver, Bob, Eve’s illegal information gain within the detector side channel attack can be well bounded. This protocol does not require any improvement on the detectors used in available prepare-and-measure QKD. Though we only illustrate its application in the BB84 protocol, it is applicable for any prepare-and-measure QKD. PMID:27733771

  14. High-efficiency reconciliation for continuous variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bai, Zengliang; Yang, Shenshen; Li, Yongmin

    2017-04-01

    Quantum key distribution (QKD) is the most mature application of quantum information technology. Information reconciliation is a crucial step in QKD and significantly affects the final secret key rates shared between two legitimate parties. We analyze and compare various construction methods of low-density parity-check (LDPC) codes and design high-performance irregular LDPC codes with a block length of 106. Starting from these good codes and exploiting the slice reconciliation technique based on multilevel coding and multistage decoding, we realize high-efficiency Gaussian key reconciliation with efficiency higher than 95% for signal-to-noise ratios above 1. Our demonstrated method can be readily applied in continuous variable QKD.

  15. Use of Propensity Score Matching for Training Research with Observational Data

    ERIC Educational Resources Information Center

    Gemici, Sinan; Rojewski, Jay W.; Lee, In Heok

    2012-01-01

    Evaluations of vocational education and training (VET) programs play a key role in informing training policy in Australia and elsewhere. Increasingly, such evaluations use observational data from surveys or administrative collections to assess the effectiveness of VET programs and interventions. The difficulty associated with using observational…

  16. Informing urban carbon emissions with atmospheric observations: motivation, methods, and reducing uncertainties.

    NASA Astrophysics Data System (ADS)

    Kort, E. A.; Ware, J.; Duren, R. M.; Schimel, D.; Miller, C. E.; Decola, P.

    2014-12-01

    Urban regions play a dominant role in the anthropogenic perturbation to atmospheric carbon dioxide and methane. With increasing urbanization (notably in developing nations) and increasing emissions, quantitative observational information on emissions of CO2 and CH4 becomes critical for improved understanding of the global carbon cycle and for carbon management/policy decisions. In this presentation, we will discuss the impact uncertainty in anthropogenic emissions has on global carbon-climate understanding, providing broad geophysical motivation for urban studies. We will further discuss observations of urban regions at different scales (satellite vs. in-situ), and investigate the information content of these complementary methods for answering targeted questions on both global carbon fluxes and regional management decisions. Finally, we will present new attempts at reducing uncertainty in high-resolution inversions leveraging remotely sensed aerosol profiles to constrain both mixing depths and vertical distributions of trace gases.

  17. NASA's Carbon Cycle OSSE Initiative - Informing future space-based observing strategies through advanced modeling and data assimilation

    NASA Astrophysics Data System (ADS)

    Ott, L.; Sellers, P. J.; Schimel, D.; Moore, B., III; O'Dell, C.; Crowell, S.; Kawa, S. R.; Pawson, S.; Chatterjee, A.; Baker, D. F.; Schuh, A. E.

    2017-12-01

    Satellite observations of carbon dioxide (CO2) and methane (CH4) are critically needed to improve understanding of the contemporary carbon budget and carbon-climate feedbacks. Though current carbon observing satellites have provided valuable data in regions not covered by surface in situ measurements, limited sampling of key regions and small but spatially coherent biases have limited the ability to estimate fluxes at the time and space scales needed for improved process-level understanding and informed decision-making. Next generation satellites will improve coverage in data sparse regions, either through use of active remote sensing, a geostationary vantage point, or increased swath width, but all techniques have limitations. The relative strengths and weaknesses of these approaches and their synergism have not previously been examined. To address these needs, a significant subset of the US carbon modeling community has come together with support from NASA to conduct a series of coordinated observing system simulation experiments (OSSEs), with close collaboration in framing the experiments and in analyzing the results. Here, we report on the initial phase of this initiative, which focused on creating realistic, physically consistent synthetic CO2 and CH4 observational datasets for use in inversion and signal detection experiments. These datasets have been created using NASA's Goddard Earth Observing System Model (GEOS) to represent the current state of atmospheric carbon as well as best available estimates of expected flux changes. Scenarios represented include changes in urban emissions, release of permafrost soil carbon, changes in carbon uptake in tropical and mid-latitude forests, changes in the Southern Ocean sink, and changes in both anthropogenic and natural methane emissions. This GEOS carbon `nature run' was sampled by instrument simulators representing the most prominent observing strategies with a focus on consistently representing the impacts of

  18. Pull vs. Push: How OmniEarth Delivers Better Earth Observation Information to Subscribers

    NASA Astrophysics Data System (ADS)

    Fish, C.; Slagowski, S.; Dyrud, L.; Fentzke, J.; Hargis, B.; Steerman, M.

    2015-04-01

    Until very recently, the commercialization of Earth observation systems has largely occurred in two ways: either through the detuning of government satellites or the repurposing of NASA (or other science) data for commercial use. However, the convergence of cloud computing and low-cost satellites is enabling Earth observation companies to tailor observation data to specific markets. Now, underserved constituencies, such as agriculture and energy, can tap into Earth observation data that is provided at a cadence, resolution and cost that can have a real impact to their bottom line. To connect with these markets, OmniEarth fuses data from a variety of sources, synthesizes it into useful and valuable business information, and delivers it to customers via web or mobile interfaces. The "secret sauce" is no longer about having the highest resolution imagery, but rather it is about using that imagery - in conjunction with a number of other sources - to solve complex problems that require timely and contextual information about our dynamic and changing planet. OmniEarth improves subscribers' ability to visualize the world around them by enhancing their ability to see, analyze, and react to change in real time through a solutions-as-a-service platform.

  19. Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Rasoolzadegan, Abbas

    2016-11-01

    Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.

  20. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    NASA Astrophysics Data System (ADS)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  1. Music performance and the perception of key.

    PubMed

    Thompson, W F; Cuddy, L L

    1997-02-01

    The effect of music performance on perceived key movement was examined. Listeners judged key movement in sequences presented without performance expression (mechanical) in Experiment 1 and with performance expression in Experiment 2. Modulation distance varied. Judgments corresponded to predictions based on the cycle of fifths and toroidal models of key relatedness, with the highest correspondence for performed versions with the toroidal model. In Experiment 3, listeners compared mechanical sequences with either performed sequences or modifications of performed sequences. Modifications preserved expressive differences between chords, but not between voices. Predictions from Experiments 1 and 2 held only for performed sequences, suggesting that differences between voices are informative of key movement. Experiment 4 confirmed that modifications did not disrupt musicality. Analyses of performances further suggested a link between performance expression and key.

  2. Key Words in Instruction. The Student Information Scientist, Part I

    ERIC Educational Resources Information Center

    Callison, Daniel

    2005-01-01

    Information literacy standards for student learning, indicators for student performance, and hundreds of collaborative lesson plans around the country give some indication of the skills students are expected to master as effective and efficient users of information. Hopefully the goal is that all involved in information literacy education become…

  3. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.

    PubMed

    Ali, Aftab; Khan, Farrukh Aslam

    2014-05-01

    Information and communication technologies have thrived over the last few years. Healthcare systems have also benefited from this progression. A wireless body area network (WBAN) consists of small, low-power sensors used to monitor human physiological values remotely, which enables physicians to remotely monitor the health of patients. Communication security in WBANs is essential because it involves human physiological data. Key agreement and authentication are the primary issues in the security of WBANs. To agree upon a common key, the nodes exchange information with each other using wireless communication. This information exchange process must be secure enough or the information exchange should be minimized to a certain level so that if information leak occurs, it does not affect the overall system. Most of the existing solutions for this problem exchange too much information for the sake of key agreement; getting this information is sufficient for an attacker to reproduce the key. Set reconciliation is a technique used to reconcile two similar sets held by two different hosts with minimal communication complexity. This paper presents a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The proposed scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from the electrocardiogram (EKG) feature set of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Because of the limited information exchange, if an attacker gets the information in any way, he/she will not be able to reproduce the key. The proposed scheme mitigates replay, selective forwarding, and denial of service attacks using a challenge-response authentication mechanism. The simulation results show that the proposed scheme has a great deal of

  4. Earth Observing Data System Data and Information System (EOSDIS) Overview

    NASA Technical Reports Server (NTRS)

    Klene, Stephan

    2016-01-01

    The National Aeronautics and Space Administration (NASA) acquires and distributes an abundance of Earth science data on a daily basis to a diverse user community worldwide. The NASA Big Earth Data Initiative (BEDI) is an effort to make the acquired science data more discoverable, accessible, and usable. This presentation will provide a brief introduction to the Earth Observing System Data and Information System (EOSDIS) project and the nature of advances that have been made by BEDI to other Federal Users.

  5. 78 FR 67418 - National Plan for Civil Earth Observations; Request for Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-12

    ... OFFICE OF SCIENCE AND TECHNOLOGY POLICY National Plan for Civil Earth Observations; Request for... response to this Notice will inform the Office of Science and Technology Policy (OSTP) as it works with...-6071. Mail: Office of Science and Technology Policy, 1650 Pennsylvania Avenue NW., Washington, DC...

  6. Information for Innovation and Socioeconomic Development

    NASA Astrophysics Data System (ADS)

    Pearlman, F.; Stewart, M. A.

    2013-12-01

    This presentation reviews and extends the results of a workshop held in Florence, Italy in June 2013. This was the latest in a series of workshops on the 'Socioeconomic Benefits of Environmental Information'. The focus of this workshops included: 1. Information (Earth Observation, geospatial data, community generated data) as a driver for economic and social development, including measures of well-being that move beyond GDP as an indicator 2. Economic impact of innovations stemming from Open Data and the re-use of Public Sector Information 3. Importance of communications to reach across disciplines from scientists to citizen-scientists to end-users. Keynote addresses highlighted the state of the art, in this multi-disciplinary field and introduced the three themes above. The workshop included several panel discussions addressing key approaches to analyzing and understanding socioeconomic impacts. . This presentation extracts the key elements from the discussions and analyzes paths forward for improved impact assessments.

  7. Putting Information on the Corporate Agenda as a Key Resource.

    ERIC Educational Resources Information Center

    Piggott, Sylvia E. A.

    To help understand the trends, strategies, structure, and new skills that will be required by the information professional in this changing global environment, this paper examines the future of the library and information profession and the impact that information technology is having on the discipline. The paper focuses on the online delivery of…

  8. Information and professional support: key factors in the provision of family-centred early childhood intervention services.

    PubMed

    Fordham, L; Gibson, F; Bowes, J

    2012-09-01

    Much has been written on the principles of family-centred practice and on the service delivery methods and skills required of its practitioners. Far less has been written from the perspective of families whose children have a disability. The aims of this study were twofold: firstly to understand families' experiences of family-centred early childhood intervention services and secondly to explore other factors that might impact on these experiences. One hundred and thirty families attending two established early childhood intervention services in New South Wales, Australia completed a survey incorporating the Measure of Processes of Care-56, the Family Empowerment Scale, the Family Support Scale and the Parenting Daily Hassles Scale. Consistent with previous research using the Measure of Processes of Care-56, 'respectful and supportive care' was the domain of care families rated to occur most and 'provision of general information' was the domain they rated to occur least. Significant positive relationships existed between families' ratings of family-centred care and feelings of empowerment. Being provided with general information was strongly correlated with family empowerment. Families' social support networks played an important role but support from professionals was most strongly correlated with families' experiences of family-centred care. Finally, families whose children's early intervention services were co-ordinated by a professional experienced significantly better care. The provision of general information and professional support are key components of family-centred early childhood intervention services. © 2011 Blackwell Publishing Ltd.

  9. Authenticated multi-user quantum key distribution with single particles

    NASA Astrophysics Data System (ADS)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  10. Practical quantum key distribution protocol without monitoring signal disturbance.

    PubMed

    Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato

    2014-05-22

    Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

  11. GLOBAL EARTH OBSERVATION SYSTEM OF SYSTEMS (GEOSS) REMOTE SENSING INFORMATION GATEWAY DEMONSTRATION

    EPA Science Inventory

    How do forest fires in a state or country impact the health of residents, living thousands of miles away? How do we better track the effects of heavy urban rain runoff into nearby lakes to provide unprecedented access to and use of global Earth observation information to track, ...

  12. Generalizability and decision studies to inform observational and experimental research in classroom settings.

    PubMed

    Bottema-Beutel, Kristen; Lloyd, Blair; Carter, Erik W; Asmus, Jennifer M

    2014-11-01

    Attaining reliable estimates of observational measures can be challenging in school and classroom settings, as behavior can be influenced by multiple contextual factors. Generalizability (G) studies can enable researchers to estimate the reliability of observational data, and decision (D) studies can inform how many observation sessions are necessary to achieve a criterion level of reliability. We conducted G and D studies using observational data from a randomized control trial focusing on social and academic participation of students with severe disabilities in inclusive secondary classrooms. Results highlight the importance of anchoring observational decisions to reliability estimates from existing or pilot data sets. We outline steps for conducting G and D studies and address options when reliability estimates are lower than desired.

  13. Fundamental quantitative security in quantum key generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yuen, Horace P.

    2010-12-15

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographicmore » context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.« less

  14. Optimizing Requirements Decisions with KEYS

    NASA Technical Reports Server (NTRS)

    Jalali, Omid; Menzies, Tim; Feather, Martin

    2008-01-01

    Recent work with NASA's Jet Propulsion Laboratory has allowed for external access to five of JPL's real-world requirements models, anonymized to conceal proprietary information, but retaining their computational nature. Experimentation with these models, reported herein, demonstrates a dramatic speedup in the computations performed on them. These models have a well defined goal: select mitigations that retire risks which, in turn, increases the number of attainable requirements. Such a non-linear optimization is a well-studied problem. However identification of not only (a) the optimal solution(s) but also (b) the key factors leading to them is less well studied. Our technique, called KEYS, shows a rapid way of simultaneously identifying the solutions and their key factors. KEYS improves on prior work by several orders of magnitude. Prior experiments with simulated annealing or treatment learning took tens of minutes to hours to terminate. KEYS runs much faster than that; e.g for one model, KEYS ran 13,000 times faster than treatment learning (40 minutes versus 0.18 seconds). Processing these JPL models is a non-linear optimization problem: the fewest mitigations must be selected while achieving the most requirements. Non-linear optimization is a well studied problem. With this paper, we challenge other members of the PROMISE community to improve on our results with other techniques.

  15. GLOBIL: WWF's Global Observation and Biodiversity Information Portal

    NASA Astrophysics Data System (ADS)

    Shapiro, A. C.; Nijsten, L.; Schmitt, S.; Tibaldeschi, P.

    2015-04-01

    Despite ever increasing availability of satellite imagery and spatial data, conservation managers, decision makers and planners are often unable to analyze data without special knowledge or software. WWF is bridging this gap by putting extensive spatial data into an easy to use online mapping environment, to allow visualization, manipulation and analysis of large data sets by any user. Consistent, reliable and repeatable ecosystem monitoring information for priority eco-regions is needed to increase transparency in WWF's global conservation work, to measure conservation impact, and to provide communications with the general public and organization members. Currently, much of this monitoring and evaluation data is isolated, incompatible, or inaccessible and not readily usable or available for those without specialized software or knowledge. Launched in 2013 by WWF Netherlands and WWF Germany, the Global Observation and Biodiversity Information Portal (GLOBIL) is WWF's new platform to unite, centralize, standardize and visualize geo-spatial data and information from more than 150 active GIS users worldwide via cloud-based ArcGIS Online. GLOBIL is increasing transparency, providing baseline data for monitoring and evaluation while communicating impacts and conservation successes to the public. GLOBIL is currently being used in the worldwide marine campaign as an advocacy tool for establishing more marine protected areas, and a monitoring interface to track the progress towards ocean protection goals. In the Kavango-Zambezi (KAZA) Transfrontier Conservation area, local partners are using the platform to monitor land cover changes, barriers to species migrations, potential human-wildlife conflict and local conservation impacts in vast wildlife corridor. In East Africa, an early warning system is providing conservation practitioners with real-time alerts of threats particularly to protected areas and World Heritage Sites by industrial extractive activities. And for

  16. Earth observing system. Data and information system. Volume 2A: Report of the EOS Data Panel

    NASA Technical Reports Server (NTRS)

    1986-01-01

    The purpose of this report is to provide NASA with a rationale and recommendations for planning, implementing, and operating an Earth Observing System data and information system that can evolve to meet the Earth Observing System's needs in the 1990s. The Earth Observing System (Eos), defined by the Eos Science and Mission Requirements Working Group, consists of a suite of instruments in low Earth orbit acquiring measurements of the Earth's atmosphere, surface, and interior; an information system to support scientific research; and a vigorous program of scientific research, stressing study of global-scale processes that shape and influence the Earth as a system. The Eos data and information system is conceived as a complete research information system that would transcend the traditional mission data system, and include additional capabilties such as maintaining long-term, time-series data bases and providing access by Eos researchers to relevant non-Eos data. The Working Group recommends that the Eos data and information system be initiated now, with existing data, and that the system evolve into one that can meet the intensive research and data needs that will exist when Eos spacecraft are returning data in the 1990s.

  17. Key Working for Families with Young Disabled Children

    PubMed Central

    Carter, Bernie; Thomas, Megan

    2011-01-01

    For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop). Data were collected from 43 participants (parents, key workers, and other stakeholders). All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals, and other

  18. Establishing security of quantum key distribution without monitoring disturbance

    NASA Astrophysics Data System (ADS)

    Koashi, Masato

    2015-10-01

    In conventional quantum key distribution (QKD) protocols, the information leak to an eavesdropper is estimated through the basic principle of quantum mechanics dictated in the original version of Heisenberg's uncertainty principle. The amount of leaked information on a shared sifted key is bounded from above essentially by using information-disturbance trade-off relations, based on the amount of signal disturbance measured via randomly sampled or inserted probe signals. Here we discuss an entirely different avenue toward the private communication, which does not rely on the information disturbance trade-off relations and hence does not require a monitoring of signal disturbance. The independence of the amount of privacy amplification from that of disturbance tends to give it a high tolerance on the channel noises. The lifting of the burden of precise statistical estimation of disturbance leads to a favorable finite-key-size effect. A protocol based on the novel principle can be implemented by only using photon detectors and classical optics tools: a laser, a phase modulator, and an interferometer. The protocol resembles the differential-phase-shift QKD protocol in that both share a simple binary phase shift keying on a coherent train of weak pulses from a laser. The difference lies in the use of a variable-delay interferometer in the new protocol, which randomly changes the combination of pulse pairs to be superposed. This extra randomness has turned out to be enough to upper-bound the information extracted by the eavesdropper, regardless of how they have disturbed the quantum signal.

  19. Measurement-device-independent semiquantum key distribution

    NASA Astrophysics Data System (ADS)

    He, Jinjun; Li, Qin; Wu, Chunhui; Chan, Wai Hong; Zhang, Shengyu

    Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited quantum capability. Almost all existing SQKD protocols have been proved to be robust in theory, namely that if an eavesdropper tries to gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist in reality and their imperfection may result in side-channel attacks, which can be used by an adversary to get some information on the secret key string. In this paper, we design a measurement-device-independent SQKD protocol for the first time, which can remove the threat of all detector side-channel attacks and show that it is also robust. In addition, we discuss the possible use of the proposed protocol in real-world applications and in QKD networks.

  20. An information measure for class discrimination. [in remote sensing of crop observation

    NASA Technical Reports Server (NTRS)

    Shen, S. S.; Badhwar, G. D.

    1986-01-01

    This article describes a separability measure for class discrimination. This measure is based on the Fisher information measure for estimating the mixing proportion of two classes. The Fisher information measure not only provides a means to assess quantitatively the information content in the features for separating classes, but also gives the lower bound for the variance of any unbiased estimate of the mixing proportion based on observations of the features. Unlike most commonly used separability measures, this measure is not dependent on the form of the probability distribution of the features and does not imply a specific estimation procedure. This is important because the probability distribution function that describes the data for a given class does not have simple analytic forms, such as a Gaussian. Results of applying this measure to compare the information content provided by three Landsat-derived feature vectors for the purpose of separating small grains from other crops are presented.

  1. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2016-03-10

    Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing 2 | P a g e Approved for public release; distribution is...we have continued work calculating the key rates achievable parametrically with receiver performance. In addition, we describe the initial designs

  2. The function of the earth observing system - Data information system Distributed Active Archive Centers

    NASA Technical Reports Server (NTRS)

    Lapenta, C. C.

    1992-01-01

    The functionality of the Distributed Active Archive Centers (DAACs) which are significant elements of the Earth Observing System Data and Information System (EOSDIS) is discussed. Each DAAC encompasses the information management system, the data archival and distribution system, and the product generation system. The EOSDIS DAACs are expected to improve the access to earth science data set needed for global change research.

  3. Eavesdropping on counterfactual quantum key distribution with finite resources

    NASA Astrophysics Data System (ADS)

    Liu, Xingtong; Zhang, Bo; Wang, Jian; Tang, Chaojing; Zhao, Jingjing; Zhang, Sheng

    2014-08-01

    A striking scheme called "counterfactual quantum cryptography" gives a conceptually new approach to accomplish the task of key distribution. It allows two legitimate parties to share a secret even though a particle carrying secret information is not, in fact, transmitted through the quantum channel. Since an eavesdropper cannot directly access the entire quantum system of each signal particle, the protocol seems to provide practical security advantages. However, here we propose an eavesdropping method which works on the scheme in a finite key scenario. We show that, for practical systems only generating a finite number of keys, the eavesdropping can obtain all of the secret information without being detected. We also present a improved protocol as a countermeasure against this attack.

  4. Optimal attacks on qubit-based Quantum Key Recycling

    NASA Astrophysics Data System (ADS)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  5. SCHeMA web-based observation data information system

    NASA Astrophysics Data System (ADS)

    Novellino, Antonio; Benedetti, Giacomo; D'Angelo, Paolo; Confalonieri, Fabio; Massa, Francesco; Povero, Paolo; Tercier-Waeber, Marie-Louise

    2016-04-01

    It is well recognized that the need of sharing ocean data among non-specialized users is constantly increasing. Initiatives that are built upon international standards will contribute to simplify data processing and dissemination, improve user-accessibility also through web browsers, facilitate the sharing of information across the integrated network of ocean observing systems; and ultimately provide a better understanding of the ocean functioning. The SCHeMA (Integrated in Situ Chemical MApping probe) Project is developing an open and modular sensing solution for autonomous in situ high resolution mapping of a wide range of anthropogenic and natural chemical compounds coupled to master bio-physicochemical parameters (www.schema-ocean.eu). The SCHeMA web system is designed to ensure user-friendly data discovery, access and download as well as interoperability with other projects through a dedicated interface that implements the Global Earth Observation System of Systems - Common Infrastructure (GCI) recommendations and the international Open Geospatial Consortium - Sensor Web Enablement (OGC-SWE) standards. This approach will insure data accessibility in compliance with major European Directives and recommendations. Being modular, the system allows the plug-and-play of commercially available probes as well as new sensor probess under development within the project. The access to the network of monitoring probes is provided via a web-based system interface that, being implemented as a SOS (Sensor Observation Service), is providing standard interoperability and access tosensor observations systems through O&M standard - as well as sensor descriptions - encoded in Sensor Model Language (SensorML). The use of common vocabularies in all metadatabases and data formats, to describe data in an already harmonized and common standard is a prerequisite towards consistency and interoperability. Therefore, the SCHeMA SOS has adopted the SeaVox common vocabularies populated by

  6. Number Theory and Public-Key Cryptography.

    ERIC Educational Resources Information Center

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  7. Associations between informant ratings of personality disorder traits, self-reports of personality, and directly observed behavior.

    PubMed

    Kaurin, Aleksandra; Sauerberger, Kyle S; Funder, David C

    2018-03-02

    Diagnoses of personality disorders (PD) must rely on judgments of observers-either clinicians or acquaintances-because personality disorders are primarily defined in terms of maladaptive interpersonal behavior. Little is known, however, about how closely acquaintances' judgments of PD traits relate to self-reports of theoretically relevant Big Five traits or directly observed behavioral outcomes in interpersonal situations. The present study examines associations between judgments of the 10 PD traits provided by close acquaintances, self-reports of PD-relevant Big Five personality traits, and observed interpersonal behaviors across three different three-person laboratory interactions (i.e., unstructured chat, cooperative task, competitive game). The sample consisted of 256 undergraduate students (130 females; M age  = 19.83, SD = 1.25). Four unacquainted observers independently rated participants' behaviors from video recordings. In line with previous work, informant reports of PD traits demonstrate strong convergent validity with relevant self-reported Big Five traits (as identified by Lynam & Widiger, 2001). Directly observed behavior is meaningfully associated with acquaintances' judgments and self-reports of PD-relevant traits, and the associations between these judgments and behavior are strongest for traits associated with histrionic and schizoid PD. Vector correlations between behavioral profiles associated with informant and self-reports show that both assessments have similar behavioral correlates. Associations between PD trait ratings and behavior appeared to differ as a function of gender, with males showing more and stronger correlations. Informants' ratings of PD traits are impressively accurate, converging both with self-reports of relevant traits and directly observed interpersonal behavior. Therefore, a comprehensive understanding of PDs and associated traits can be augmented by information from multiple acquaintances who have the

  8. Quantum-locked key distribution at nearly the classical capacity rate.

    PubMed

    Lupo, Cosmo; Lloyd, Seth

    2014-10-17

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  9. Early experiences in evolving an enterprise-wide information model for laboratory and clinical observations.

    PubMed

    Chen, Elizabeth S; Zhou, Li; Kashyap, Vipul; Schaeffer, Molly; Dykes, Patricia C; Goldberg, Howard S

    2008-11-06

    As Electronic Healthcare Records become more prevalent, there is an increasing need to ensure unambiguous data capture, interpretation, and exchange within and across heterogeneous applications. To address this need, a common, uniform, and comprehensive approach for representing clinical information is essential. At Partners HealthCare System, we are investigating the development and implementation of enterprise-wide information models to specify the representation of clinical information to support semantic interoperability. This paper summarizes our early experiences in: (1) defining a process for information model development, (2) reviewing and comparing existing healthcare information models, (3) identifying requirements for representation of laboratory and clinical observations, and (4) exploring linkages to existing terminology and data standards. These initial findings provide insight to the various challenges ahead and guidance on next steps for adoption of information models at our organization.

  10. Earth Observation, Geographic Information Systems and Plasmodium falciparum Malaria in Sub-Saharan Africa

    PubMed Central

    Hay, S.I.; Omumbo, J.A.; Craig, M.H.; Snow, R. W.

    2011-01-01

    This review highlights the progress and current status of remote sensing (RS) and geographical information systems (GIS) as currently applied to the problem of Plasmodium falciparum malaria in sub-Saharan Africa (SSA). The burden of P. falciparum malaria in SSA is first summarized and then contrasted with the paucity of accurate and recent information on the nature and extent of the disease. This provides perspective on both the global importance of the pathogen and the potential for contribution of RS and GIS techniques. The ecology of P. falciparum malaria and its major anopheline vectors in SSA is then outlined, to provide the epidemiological background for considering disease transmission processes and their environmental correlates. Because RS and GIS are recent techniques in epidemiology, all mosquito-borne diseases are considered in this review in order to convey the range of ideas, insights and innovation provided. To conclude, the impact of these initial studies is assessed and suggestions provided on how these advances could be best used for malaria control in an appropriate and sustainable manner, with key areas for future research highlighted. PMID:10997207

  11. Understanding USGS user needs and Earth observing data use for decision making

    NASA Astrophysics Data System (ADS)

    Wu, Z.

    2016-12-01

    US Geological Survey (USGS) initiated the Requirements, Capabilities and Analysis for Earth Observations (RCA-EO) project in the Land Remote Sensing (LRS) program, collaborating with the National Oceanic and Atmospheric Administration (NOAA) to jointly develop the supporting information infrastructure - The Earth Observation Requirements Evaluation Systems (EORES). RCA-EO enables us to collect information on current data products and projects across the USGS and evaluate the impacts of Earth observation data from all sources, including spaceborne, airborne, and ground-based platforms. EORES allows users to query, filter, and analyze usage and impacts of Earth observation data at different organizational level within the bureau. We engaged over 500 subject matter experts and evaluated more than 1000 different Earth observing data sources and products. RCA-EO provides a comprehensive way to evaluate impacts of Earth observing data on USGS mission areas and programs through the survey of 345 key USGS products and services. We paid special attention to user feedback about Earth observing data to inform decision making on improving user satisfaction. We believe the approach and philosophy of RCA-EO can be applied in much broader scope to derive comprehensive knowledge of Earth observing systems impacts and usage and inform data products development and remote sensing technology innovation.

  12. Key Process Uncertainties in Soil Carbon Dynamics: Comparing Multiple Model Structures and Observational Meta-analysis

    NASA Astrophysics Data System (ADS)

    Sulman, B. N.; Moore, J.; Averill, C.; Abramoff, R. Z.; Bradford, M.; Classen, A. T.; Hartman, M. D.; Kivlin, S. N.; Luo, Y.; Mayes, M. A.; Morrison, E. W.; Riley, W. J.; Salazar, A.; Schimel, J.; Sridhar, B.; Tang, J.; Wang, G.; Wieder, W. R.

    2016-12-01

    Soil carbon (C) dynamics are crucial to understanding and predicting C cycle responses to global change and soil C modeling is a key tool for understanding these dynamics. While first order model structures have historically dominated this area, a recent proliferation of alternative model structures representing different assumptions about microbial activity and mineral protection is providing new opportunities to explore process uncertainties related to soil C dynamics. We conducted idealized simulations of soil C responses to warming and litter addition using models from five research groups that incorporated different sets of assumptions about processes governing soil C decomposition and stabilization. We conducted a meta-analysis of published warming and C addition experiments for comparison with simulations. Assumptions related to mineral protection and microbial dynamics drove strong differences among models. In response to C additions, some models predicted long-term C accumulation while others predicted transient increases that were counteracted by accelerating decomposition. In experimental manipulations, doubling litter addition did not change soil C stocks in studies spanning as long as two decades. This result agreed with simulations from models with strong microbial growth responses and limited mineral sorption capacity. In observations, warming initially drove soil C loss via increased CO2 production, but in some studies soil C rebounded and increased over decadal time scales. In contrast, all models predicted sustained C losses under warming. The disagreement with experimental results could be explained by physiological or community-level acclimation, or by warming-related changes in plant growth. In addition to the role of microbial activity, assumptions related to mineral sorption and protected C played a key role in driving long-term model responses. In general, simulations were similar in their initial responses to perturbations but diverged over

  13. Data Preservation -Progress in NASA's Earth Observing System Data and Information System (EOSDIS)

    NASA Astrophysics Data System (ADS)

    Ramapriyan, H. K.

    2013-12-01

    NASA's Earth Observing System Data and Information System (EOSDIS) has been operational since August 1994, processing, archiving and distributing data from a variety of Earth science missions. The data sources include instruments on-board satellites and aircraft and field campaigns. In addition, EOSDIS manages socio-economic data. The satellite missions whose data are managed by EOSDIS range from the Nimbus series of the 1960s and 1970s to the EOS series launched during 1997 through 2004 to the Suomi National Polar Partnership (SNPP) launched in October 2011. Data from future satellite missions such as the Decadal Survey missions will also be archived and distributed by EOSDIS. NASA is not legislatively mandated to preserve data permanently as are other agencies such as USGS, NOAA and NARA. However, NASA must preserve all the data and associated content beyond the lives of NASA's missions to meet NASA's near-term objective of supporting active scientific research. Also, NASA must ensure that the data and associated content are preserved for transition to permanent archival agencies. The term preservation implies ensuring long-term protection of bits, readability, understandability, usability and reproducibility of results. To ensure preservation of bits, EOSDIS makes sure that data are backed-up adequately. Periodically, the risk of data loss is assessed and corrective action is taken as needed. Data are copied to more modern media on a routine basis to ensure readability. For some of the oldest data within EOSDIS, we have had to go through special data rescue efforts. Data from very old media have been restored and film data have been scanned and digitized. For example, restored data from the Nimbus missions are available for ftp access at the Goddard Earth Sciences Data and Information Services Center (GES DISC). The Earth Science Data and Information System Project, which is responsible for EOSDIS, has been active within the Data Stewardship and Preservation

  14. Lessons Learned from Research about Informal Reading Inventories: Keys to Data-Driven Instructional Recommendations

    ERIC Educational Resources Information Center

    L'Allier, Susan K.

    2013-01-01

    This study examined how effectively candidates in an MSEd in literacy education with a focus on reading program used the results from the Basic Reading Inventory to develop key instructional recommendations. The results indicated that, overall, candidates made about two thirds of the key recommendations suggested by an expert in the area of…

  15. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2015-05-27

    Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...2016 4. TITLE AND SUBTITLE Seaworthy Quantum Key Distribution Design and Validation (SEAKEY) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM

  16. Counterfactual attack on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wnang, Jian; Tang, Chao Jing

    2012-05-01

    It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.

  17. A Geo-Label for Geo-Referenced Information as a Service for Data Users and a Tool for Facilitating Societal Benefits of Earth Observations

    NASA Astrophysics Data System (ADS)

    Plag, H.-P.

    2012-04-01

    Geo-referenced information is increasingly important for many scientific and societal applications. The availability of reliable and applicable spatial data and information is fundamental for addressing pressing problems such as food, water, and energy security; disaster risk reduction; climate change; environmental quality; pandemics; economic crises and wars; population migration; and, in a general sense, sustainability. Today, more than 70% of societal activities in developed countries depend directly or indirectly on geo-referenced information. The rapid development of analysis tools, such as Geographic Information Systems and web-based tools for viewing, accessing, and analyzing of geo-referenced information, and the growing abundance of openly available Earth observations (e.g., through the Global Earth Observation System of Systems, GEOSS) likely will increase the dependency of science and society on geo-referenced information. Increasingly, the tools allow the combination of data sets from various sources. Improvements of interoperability, promoted particularly by GEOSS, will strengthen this trend and lead to more tools for the combinations of data from different sources. What is currently lacking is a service-oriented infrastructure helping to ensure that data quality and applicability are not compromised through modifications and combinations. Most geo-referenced information comes without sufficient information on quality and applicability. The Group on Earth Observations (GEO) has embarked on establishing a so-called GEO Label that would provide easy-to-understand, globally available information on aspects of quality, user rating, relevance, and fit-for-usage of the products and services accessible through GEOSS (with the responsibility for the concept development delegated to Work Plan Task ID-03). In designing a service-oriented architecture that could support a GEO Label, it is important to understand the impact of the goals for the label on the

  18. Information systems: the key to evidence-based health practice.

    PubMed Central

    Rodrigues, R. J.

    2000-01-01

    Increasing prominence is being given to the use of best current evidence in clinical practice and health services and programme management decision-making. The role of information in evidence-based practice (EBP) is discussed, together with questions of how advanced information systems and technology (IS&T) can contribute to the establishment of a broader perspective for EBP. The author examines the development, validation and use of a variety of sources of evidence and knowledge that go beyond the well-established paradigm of research, clinical trials, and systematic literature review. Opportunities and challenges in the implementation and use of IS&T and knowledge management tools are examined for six application areas: reference databases, contextual data, clinical data repositories, administrative data repositories, decision support software, and Internet-based interactive health information and communication. Computerized and telecommunications applications that support EBP follow a hierarchy in which systems, tasks and complexity range from reference retrieval and the processing of relatively routine transactions, to complex "data mining" and rule-driven decision support systems. PMID:11143195

  19. An Iterative Information-Reduced Quadriphase-Shift-Keyed Carrier Synchronization Scheme Using Decision Feedback for Low Signal-to-Noise Ratio Applications

    NASA Technical Reports Server (NTRS)

    Simon, M.; Tkacenko, A.

    2006-01-01

    In a previous publication [1], an iterative closed-loop carrier synchronization scheme for binary phase-shift keyed (BPSK) modulation was proposed that was based on feeding back data decisions to the input of the loop, the purpose being to remove the modulation prior to carrier synchronization as opposed to the more conventional decision-feedback schemes that incorporate such feedback inside the loop. The idea there was that, with sufficient independence between the received data and the decisions on it that are fed back (as would occur in an error-correction coding environment with sufficient decoding delay), a pure tone in the presence of noise would ultimately be produced (after sufficient iteration and low enough error probability) and thus could be tracked without any squaring loss. This article demonstrates that, with some modification, the same idea of iterative information reduction through decision feedback can be applied to quadrature phase-shift keyed (QPSK) modulation, something that was mentioned in the previous publication but never pursued.

  20. Triple symmetric key cryptosystem for data security

    NASA Astrophysics Data System (ADS)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  1. Ten Keys to the Portal

    ERIC Educational Resources Information Center

    Schaffhauser, Dian

    2011-01-01

    Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…

  2. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  3. High key rate continuous-variable quantum key distribution with a real local oscillator.

    PubMed

    Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Ma, Hongxin; Wang, Shiyu; Zeng, Guihua

    2018-02-05

    Continuous-variable quantum key distribution (CVQKD) with a real local oscillator (LO) has been extensively studied recently due to its security and simplicity. In this paper, we propose a novel implementation of a high-key-rate CVQKD with a real LO. Particularly, with the help of the simultaneously generated reference pulse, the phase drift of the signal is tracked in real time and then compensated. By utilizing the time and polarization multiplexing techniques to isolate the reference pulse and controlling the intensity of it, not only the contamination from it is suppressed, but also a high accuracy of the phase compensation can be guaranteed. Besides, we employ homodyne detection on the signal to ensure the high quantum efficiency and heterodyne detection on the reference pulse to acquire the complete phase information of it. In order to suppress the excess noise, a theoretical noise model for our scheme is established. According to this model, the impact of the modulation variance and the intensity of the reference pulse are both analysed theoretically and then optimized according to the experimental data. By measuring the excess noise in the 25km optical fiber transmission system, a 3.14Mbps key rate in the asymptotic regime proves to be achievable. This work verifies the feasibility of the high-key-rate CVQKD with a real LO within the metropolitan area.

  4. Roles and responsibilities of pharmacists with respect to natural health products: key informant interviews.

    PubMed

    Olatunde, Shade; Boon, Heather; Hirschkorn, Kristine; Welsh, Sandy; Bajcar, Jana

    2010-03-01

    Although many pharmacies sell natural health products (NHPs), there is no clear definition as to the roles and responsibilities (if any) of pharmacists with respect to these products. The purpose of this study was to explore pharmacy and stakeholder leaders' perceptions of pharmacists' professional NHP roles and responsibilities. Semi-structured key informant interviews were conducted with pharmacy leaders (n=17) and stakeholder (n=18) leaders representing consumers, complementary and alternative medicine practitioners, conventional health care practitioners, and industry across Canada. All participants believed a main NHP responsibility for pharmacists was in safety monitoring, although a one challenge identified in the interviews was pharmacists' general lack of NHP knowledge; however, stakeholder leaders did not expect pharmacists to be experts, but should have a basic level of knowledge about NHPs. Participants described pharmacists' professional roles and responsibilities for NHPs as similar to those for over-the-counter drugs; more awareness of existing NHP-related pharmacy policies is needed, and pharmacy owners/managers should provide additional training to ensure front-line pharmacists have appropriate knowledge of NHPs sold in the pharmacy. Copyright 2010 Elsevier Inc. All rights reserved.

  5. Study on key techniques for camera-based hydrological record image digitization

    NASA Astrophysics Data System (ADS)

    Li, Shijin; Zhan, Di; Hu, Jinlong; Gao, Xiangtao; Bo, Ping

    2015-10-01

    With the development of information technology, the digitization of scientific or engineering drawings has received more and more attention. In hydrology, meteorology, medicine and mining industry, the grid drawing sheet is commonly used to record the observations from sensors. However, these paper drawings may be destroyed and contaminated due to improper preservation or overuse. Further, it will be a heavy workload and prone to error if these data are manually transcripted into the computer. Hence, in order to digitize these drawings, establishing the corresponding data base will ensure the integrity of data and provide invaluable information for further research. This paper presents an automatic system for hydrological record image digitization, which consists of three key techniques, i.e., image segmentation, intersection point localization and distortion rectification. First, a novel approach to the binarization of the curves and grids in the water level sheet image has been proposed, which is based on the fusion of gradient and color information adaptively. Second, a fast search strategy for cross point location is invented and point-by-point processing is thus avoided, with the help of grid distribution information. And finally, we put forward a local rectification method through analyzing the central portions of the image and utilizing the domain knowledge of hydrology. The processing speed is accelerated, while the accuracy is still satisfying. Experiments on several real water level records show that our proposed techniques are effective and capable of recovering the hydrological observations accurately.

  6. A power information user (PIU) model to promote information integration in Tennessee's public health community.

    PubMed

    Sathe, Nila A; Lee, Patricia; Giuse, Nunzia Bettinsoli

    2004-10-01

    Observation and immersion in the user community are critical factors in designing and implementing informatics solutions; such practices ensure relevant interventions and promote user acceptance. Libraries can adapt these strategies to developing instruction and outreach. While needs assessment is typically a core facet of library instruction, sustained, iterative assessment underlying the development of user-centered instruction is key to integrating resource use into the workflow. This paper describes the Eskind Biomedical Library's (EBL's) recent work with the Tennessee public health community to articulate a training model centered around developing power information users (PIUs). PIUs are community-based individuals with an advanced understanding of information seeking and resource use and are committed to championing information integration. As model development was informed by observation of PIU workflow and information needs, it also allowed for informal testing of the applicability of assessment via domain immersion in library outreach. Though the number of PIUs involved in the project was small, evaluation indicated that the model was useful for promoting information use in PIU workgroups and that the concept of domain immersion was relevant to library-related projects. Moreover, EBL continues to employ principles of domain understanding inherent in the PIU model to develop further interventions for the public health community and library users.

  7. Sources of Information and Behavioral Patterns in Online Health Forums: Observational Study

    PubMed Central

    Friede, Tim; Grabowski, Jens; Koschack, Janka; Makedonski, Philip; Himmel, Wolfgang

    2014-01-01

    Background Increasing numbers of patients are raising their voice in online forums. This shift is welcome as an act of patient autonomy, reflected in the term “expert patient”. At the same time, there is considerable concern that patients can be easily misguided by pseudoscientific research and debate. Little is known about the sources of information used in health-related online forums, how users apply this information, and how they behave in such forums. Objective The intent of the study was to identify (1) the sources of information used in online health-related forums, and (2) the roles and behavior of active forum visitors in introducing and disseminating this information. Methods This observational study used the largest German multiple sclerosis (MS) online forum as a database, analyzing the user debate about the recently proposed and controversial Chronic Cerebrospinal Venous Insufficiency (CCSVI) hypothesis. After extracting all posts and then filtering relevant CCSVI posts between 01 January 2008 and 17 August 2012, we first identified hyperlinks to scientific publications and other information sources used or referenced in the posts. Employing k-means clustering, we then analyzed the users’ preference for sources of information and their general posting habits. Results Of 139,912 posts from 11,997 threads, 8628 posts discussed or at least mentioned CCSVI. We detected hyperlinks pointing to CCSVI-related scientific publications in 31 posts. In contrast, 2829 different URLs were posted to the forum, most frequently referring to social media, such as YouTube or Facebook. We identified a total of 6 different roles of hyperlink posters including Social Media Fans, Organization Followers, and Balanced Source Users. Apart from the large and nonspecific residual category of the “average user”, several specific behavior patterns were identified, such as the small but relevant groups of CCSVI-Focused Responders or CCSVI Activators. Conclusions The bulk

  8. Trustworthiness of detectors in quantum key distribution with untrusted detectors

    DOE PAGES

    Qi, Bing

    2015-02-25

    Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been demonstrated as a viable solution to detector side-channel attacks. One of the main advantages of MDI-QKD is that the security can be proved without making any assumptions about how the measurement device works. The price to pay is the relatively low secure key rate comparing with conventional quantum key distribution (QKD), such as the decoy-state BB84 protocol. Recently a new QKD protocol, aiming at bridging the strong security of MDI-QKD with the high e ciency of conventional QKD, has been proposed. In this protocol, the legitimate receiver employs a trusted linear opticsmore » network to encode information on photons received from an insecure quantum channel, and then performs a Bell state measurement (BSM) using untrusted detectors. One crucial assumption made in most of these studies is that the untrusted BSM located inside the receiver's laboratory cannot send any unwanted information to the outside. Here in this paper, we show that if the BSM is completely untrusted, a simple scheme would allow the BSM to send information to the outside. Combined with Trojan horse attacks, this scheme could allow Eve to gain information of the quantum key without being detected. Ultimately, to prevent the above attack, either countermeasures to Trojan horse attacks or some trustworthiness to the "untrusted" BSM device is required.« less

  9. Earth Observing System: Science Objectives and Challenges

    NASA Technical Reports Server (NTRS)

    King, Michael D.

    1999-01-01

    The Earth Observing System (EOS) is a space-based observing system comprised of a series of satellite sensors by which scientists can monitor the Earth, a Data and Information System (EOSDIS) enabling researchers worldwide to access the satellite data, and an interdisciplinary science research program to interpret the satellite data. In this presentation we review the key areas of scientific uncertainty in understanding climate and global change, and follow that with a description of the EOS goals, objectives, and scientific research elements that comprise the program (instrument science teams and interdisciplinary investigations). Finally, I will describe how scientists and policy makers intend to use EOS data improve our understanding of key global change uncertainties, such as: (i) clouds and radiation, including fossil fuel and natural emissions of sulfate aerosol and its potential impact on cloud feedback, (ii) man's impact on ozone depletion, with examples of ClO and O3 obtained from the UARS satellite during the Austral Spring, and (iii) volcanic eruptions and their impact on climate, with examples from the eruption of Mt. Pinatubo.

  10. Earth Observing System: Science Objectives and Challenges

    NASA Technical Reports Server (NTRS)

    King, Michael D.

    1998-01-01

    The Earth Observing System (EOS) is a space-based observing system comprised of a series of satellite sensors by which scientists can monitor the Earth, a Data and Information System (EOSDIS) enabling researchers worldwide to access the satellite data, and an interdisciplinary science research program to interpret the satellite data. In this presentation I will describe the key areas of scientific uncertainty in understanding climate and global change, and follow that with a description of the EOS goals, objectives, and scientific research elements that comprise the program (instrument science teams and interdisciplinary investigations). Finally, I will describe how scientists and policy makers intend to use EOS data to improve our understanding of key global change uncertainties, such as: (i) clouds and radiation, including fossil fuel and natural emissions of sulfate aerosol and its potential impact on cloud feedback, (ii) man's impact on ozone depletion, with examples of ClO and O3 obtained from the UARS satellite during the Austral Spring, and (iii) volcanic eruptions and their impact on climate, with examples from the eruption of Mt. Pinatubo.

  11. The Relative Influence of Goal and Kinematics on Corticospinal Excitability Depends on the Information Provided to the Observer

    PubMed Central

    Mc Cabe, Sofía I.; Villalta, Jorge Ignacio; Saunier, Ghislain; Grafton, Scott T.; Della-Maggiore, Valeria

    2015-01-01

    Viewing a person perform an action activates the observer's motor system. Whether this phenomenon reflects the action's kinematics or its final goal remains a matter of debate. One alternative to this apparent controversy is that the relative influence of goal and kinematics depends on the information available to the observer. Here, we addressed this possibility. For this purpose, we measured corticospinal excitability (CSE) while subjects viewed 3 different grasping actions with 2 goals: a large and a small object. Actions were directed to the large object, the small object, or corrected online in which case the goal switched during the movement. We first determined the kinematics and dynamics of the 3 actions during execution. This information was used in 2 other experiments to measure CSE while observers viewed videos of the same actions. CSE was recorded prior to movement onset and at 3 time points during the observed action. To discern between goal and kinematics, information about the goal was manipulated across experiments. We found that the goal influenced CSE only when its identity was known before movement onset. In contrast, a kinematic modulation of CSE was observed whether or not information regarding the goal was provided. PMID:24591524

  12. Materializing Heart Regeneration: Biomimicry of Key Observations in Cell Transplantation Therapies and Natural Cardiac Regeneration

    NASA Astrophysics Data System (ADS)

    Kong, Yen P.; Jongpaiboonkit, Leena

    2016-07-01

    New regenerative paradigms are needed to address the growing global problem of heart failure as existing interventions are unsatisfactory. Outcomes from the current paradigm of cell transplantation have not been stellar but the mechanistic knowledge learned from them is instructive in the development of future paradigms. An emerging biomaterial-based approach incorporating key mechanisms and additional ones scrutinized from the process of natural heart regeneration in zebrafish may become the next evolution in cardiac repair. We highlight, with examples, tested key concepts and pivotal ones that may be integrated into a successful therapy.

  13. Study on the security of the authentication scheme with key recycling in QKD

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu

    2016-09-01

    In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.

  14. Bound entangled states with a private key and their classical counterpart.

    PubMed

    Ozols, Maris; Smith, Graeme; Smolin, John A

    2014-03-21

    Entanglement is a fundamental resource for quantum information processing. In its pure form, it allows quantum teleportation and sharing classical secrets. Realistic quantum states are noisy and their usefulness is only partially understood. Bound-entangled states are central to this question--they have no distillable entanglement, yet sometimes still have a private classical key. We present a construction of bound-entangled states with a private key based on classical probability distributions. From this emerge states possessing a new classical analogue of bound entanglement, distinct from the long-sought bound information. We also find states of smaller dimensions and higher key rates than previously known. Our construction has implications for classical cryptography: we show that existing protocols are insufficient for extracting private key from our distributions due to their "bound-entangled" nature. We propose a simple extension of existing protocols that can extract a key from them.

  15. [Application of laboratory information system in the management of the key indicators of quality inspection].

    PubMed

    Guo, Ye; Chen, Qian; Wu, Wei; Cui, Wei

    2015-03-31

    To establish a system of monitoring the key indicator of quality for inspection (KIQI) on a laboratory information system (LIS), and to have a better management of KIQI. Clinical sample made in PUMCH were collected during the whole of 2014. Next, interactive input program were designed to accomplish data collecting of the disqualification rate of samples, the mistake rate of samples and the occasions of losing samples, etc. Then, a series moment of sample collection, laboratory sample arrived, sample test, sample check, response to critical value, namely, trajectory information left on LIS were recorded and the qualification rate of TAT, the notification rate of endangering result were calculated. Finally, the information about quality control were collected to build an internal quality control database and the KIQI, such as the out-of-control rate of quality control and the total error of test items were monitored. The inspection of the sample management shows the disqualification rates in 2014 were all below the target, but the rates in January and February were a little high and the rates of four wards were above 2%. The mistake rates of samples was 0.47 cases/10 000 cases, attaining the target (< 2 cases/10 000 cases). Also, there was no occasion of losing samples in 2014, attaining the target too. The inspection of laboratory reports shows the qualification rates of TAT was within the acceptable range (> 95%), however the rates of blood routine in November (94.75%) was out of range. We have solved the problem by optimizing the processes. The notification rate of endangering result attained the target (≥ 98%), while the rate of timely notification is needed to improve. Quality inspection shows the CV of APTT in August (5.02%) was rising significantly, beyond the accepted CV (5.0%). We have solved the problem by changing the reagent. The CV of TT in 2014 were all below the allowable CV, thus the allowable CV of the next year lower to 10%. It is an objective

  16. Encoding plaintext by Fourier transform hologram in double random phase encoding using fingerprint keys

    NASA Astrophysics Data System (ADS)

    Takeda, Masafumi; Nakano, Kazuya; Suzuki, Hiroyuki; Yamaguchi, Masahiro

    2012-09-01

    It has been shown that biometric information can be used as a cipher key for binary data encryption by applying double random phase encoding. In such methods, binary data are encoded in a bit pattern image, and the decrypted image becomes a plain image when the key is genuine; otherwise, decrypted images become random images. In some cases, images decrypted by imposters may not be fully random, such that the blurred bit pattern can be partially observed. In this paper, we propose a novel bit coding method based on a Fourier transform hologram, which makes images decrypted by imposters more random. Computer experiments confirm that the method increases the randomness of images decrypted by imposters while keeping the false rejection rate as low as in the conventional method.

  17. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  18. National Marine Sanctuaries as Sentinel Sites for a Demonstration Marine Biodiversity Observation Network (MBON)

    NASA Astrophysics Data System (ADS)

    Muller-Karger, F. E.; Chavez, F.; Gittings, S.; Doney, S. C.; Kavanaugh, M.; Montes, E.; Breitbart, M.; Kirkpatrick, B. A.; Anderson, D. M.; Tartt, M.

    2016-02-01

    The U.S. Federal government (NOAA and NASA), academic researchers, and private partners are implementing a Demonstration Marine Biodiversity Observation Network (MBON) to monitor changes in marine biodiversity within two US National Marine Sanctuaries (NMS): Florida Keys and Monterey Bay. The overarching goal is to observe and understand life, from microbes to whales, in different coastal and continental shelf habitats. The specific objectives are to 1) Establish a protocol for MBON information to dynamically update Sanctuary status and trends reports; 2) Define an efficient set of observations required for implementing a useful MBON; 3) Develop technology for biodiversity assessments including emerging environmental DNA (eDNA) and remote sensing to coordinate with classical sampling; 4) Integrate and synthesize information in coordination with other MBON projects, the Smithsonian Institution's Tennenbaum Marine Observatories Network (TMON), the Integrated Ocean Observing System (IOOS), the international Group on Earth Observations Biodiversity Observation Network(GEO BON), and the UNESCO-IOC Ocean Biogeographic Information System (OBIS); and 5) Understand the linkages between marine biodiversity, ecosystem processes, and the social-economic context of a region. Pilot projects have been implemented within the Florida Keys and Monterey Bay NMS. Limited observations will be collected at the Flower Garden Banks NMS. These encompass a range of marine environments, including deep sea, continental shelves, and coastal habitats including estuaries, wetlands, and coral reefs. The program will use novel eDNA techniques and ongoing observations to evaluate diversity. Multidisciplinary remote sensing will be used to evaluate dynamic 'seascapes'. The MBON will facilitate and enable regional biodiversity assessments, and contributes to addressing U.N. Sustainable Development Goal 14 to conserve and sustainably use marine resources.

  19. Coordinating Council. Sixth Meeting: Who Are Our Key Users?

    NASA Technical Reports Server (NTRS)

    1991-01-01

    This NASA Scientific and Technical Information Program Coordinating Council meeting deals with the topic 'Who are our key users?' Presentations were made on the following subtopics: Key users: Who uses the system the most, Who orders the most documents, Users: What do we know about them?, NASA/DOD Aerospace Knowledge Diffusion research project on 'Potential key users', How we meet the user's needs, and STI Council user requirements update. Summaries of discussions after the presentations are included along with visuals for the presentations.

  20. Health-care users, key community informants and primary health care workers' views on health, health promotion, health assets and deficits: qualitative study in seven Spanish regions.

    PubMed

    Pons-Vigués, Mariona; Berenguera, Anna; Coma-Auli, Núria; Pombo-Ramos, Haizea; March, Sebastià; Asensio-Martínez, Angela; Moreno-Peral, Patricia; Mora-Simón, Sara; Martínez-Andrés, Maria; Pujol-Ribera, Enriqueta

    2017-06-13

    Although some articles have analysed the definitions of health and health promotion from the perspective of health-care users and health care professionals, no published studies include the simultaneous participation of health-care users, primary health care professionals and key community informants. Understanding the perception of health and health promotion amongst these different stakeholders is crucial for the design and implementation of successful, equitable and sustainable measures that improve the health and wellbeing of populations. Furthermore, the identification of different health assets and deficits by the different informants will generate new evidence to promote healthy behaviours, improve community health and wellbeing and reduce preventable inequalities. The objective of this study is to explore the concept of health and health promotion and to compare health assets and deficits as identified by health-care users, key community informants and primary health care workers with the ultimate purpose to collect the necessary data for the design and implementation of a successful health promotion intervention. A descriptive-interpretive qualitative research was conducted with 276 participants from 14 primary care centres of 7 Spanish regions. Theoretical sampling was used for selection. We organized 11 discussion groups and 2 triangular groups with health-care users; 30 semi-structured interviews with key community informants; and 14 discussion groups with primary health care workers. A thematic content analysis was carried out. Health-care users and key community informants agree that health is a complex, broad, multifactorial concept that encompasses several interrelated dimensions (physical, psychological-emotional, social, occupational, intellectual, spiritual and environmental). The three participants' profiles consider health promotion indispensable despite defining it as complex and vague. In fact, most health-care users admit to having

  1. Security of quantum key distribution with iterative sifting

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Lo, Hoi-Kwong; Mizutani, Akihiro; Kato, Go; Lim, Charles Ci Wen; Azuma, Koji; Curty, Marcos

    2018-01-01

    Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma’s inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security.

  2. Key Decision Record Creation and Approval Module

    NASA Technical Reports Server (NTRS)

    Hebert, Barrt; Messer, Elizabeth A.; Albasini, Colby; Le, Thang; ORourke, William, Sr.; Stiglets, Tim; Strain, Ted

    2012-01-01

    Retaining good key decision records is critical to ensuring the success of a project or operation. Having adequately documented decisions with supporting documents and rationale can greatly reduce the amount of rework or reinvention over a project's, vehicle's, or facility's lifecycle. Stennis Space Center developed and uses a software tool that automates the Key Decision Record (KDR) process for its engineering and test projects. It provides the ability for a user to log key decisions that are made during the course of a project. By customizing Parametric Technology Corporation's (PTC) Windchill product, the team was able to log all information about a decision, and electronically route that information for approval. Customizing the Windchill product allowed the team to directly connect these decisions to the engineering data that it might affect and notify data owners of the decision. The user interface was created in JSP and Javascript, within the OOTB (Out of the Box) Windchill product, allowing users to create KDRs. Not only does this interface allow users to create and track KDRs, but it also plugs directly into the OOTB ability to associate these decision records with other relevant engineering data such as drawings, designs, models, requirements, or specifications

  3. Workplace wellness programs in Canada: an exploration of key issues.

    PubMed

    Morrison, Erin; MacKinnon, Neil J

    2008-01-01

    Faced with the reality of rising health costs, Canadian employers are thinking beyond traditional notions of responsibility for employee health and have begun to embrace Workplace Wellness Programs (WWPs). This article investigates the critical issues of WWPs in the Canadian context from the perspective of key stakeholders. Using a combination of literature and key informant interviews, seven key themes are presented along with recommendations for wider implementation of WWPs in Canada.

  4. Untapped Potential of Observational Research to Inform Clinical Decision Making: American Society of Clinical Oncology Research Statement.

    PubMed

    Visvanathan, Kala; Levit, Laura A; Raghavan, Derek; Hudis, Clifford A; Wong, Sandra; Dueck, Amylou; Lyman, Gary H

    2017-06-01

    ASCO believes that high-quality observational studies can advance evidence-based practice for cancer care and are complementary to randomized controlled trials (RCTs). Observational studies can generate hypotheses by evaluating novel exposures or biomarkers and by revealing patterns of care and relationships that might not otherwise be discovered. Researchers can then test these hypotheses in RCTs. Observational studies can also answer or inform questions that either have not been or cannot be answered by RCTs. In addition, observational studies can be used for postmarketing surveillance of new cancer treatments, particularly in vulnerable populations. The incorporation of observational research as part of clinical decision making is consistent with the position of many leading institutions. ASCO identified five overarching recommendations to enhance the role of observational research in clinical decision making: (1) improve the quality of electronic health data available for research, (2) improve interoperability and the exchange of electronic health information, (3) ensure the use of rigorous observational research methodologies, (4) promote transparent reporting of observational research studies, and (5) protect patient privacy.

  5. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  6. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  7. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    PubMed Central

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  8. Inter-Observer Agreement on Subjects' Race and Race-Informative Characteristics

    PubMed Central

    Edgar, Heather J. H.; Daneshvari, Shamsi; Harris, Edward F.; Kroth, Philip J.

    2011-01-01

    Health and socioeconomic disparities tend to be experienced along racial and ethnic lines, but investigators are not sure how individuals are assigned to groups, or how consistent this process is. To address these issues, 1,919 orthodontic patient records were examined by at least two observers who estimated each individual's race and the characteristics that influenced each estimate. Agreement regarding race is high for African and European Americans, but not as high for Asian, Hispanic, and Native Americans. The indicator observers most often agreed upon as important in estimating group membership is name, especially for Asian and Hispanic Americans. The observers, who were almost all European American, most often agreed that skin color is an important indicator of race only when they also agreed the subject was European American. This suggests that in a diverse community, light skin color is associated with a particular group, while a range of darker shades can be associated with members of any other group. This research supports comparable studies showing that race estimations in medical records are likely reliable for African and European Americans, but are less so for other groups. Further, these results show that skin color is not consistently the primary indicator of an individual's race, but that other characteristics such as facial features add significant information. PMID:21897865

  9. Combining Passive Microwave Sounders with CYGNSS information for improved retrievals: Observations during Hurricane Harvey

    NASA Astrophysics Data System (ADS)

    Schreier, M. M.

    2017-12-01

    The launch of CYGNSS (Cyclone Global Navigation Satellite System) has added an interesting component to satellite observations: it can provide wind speeds in the tropical area with a high repetition rate. Passive microwave sounders that are overpassing the same region can benefit from this information, when it comes to the retrieval of temperature or water profiles: the uncertainty about wind speeds has a strong impact on emissivity and reflectivity calculations with respect to surface temperature. This has strong influences on the uncertainty of retrieval of temperature and water content, especially under extreme weather conditions. Adding CYGNSS information to the retrieval can help to reduce errors and provide a significantly better sounder retrieval. Based on observations during Hurricane Harvey, we want to show the impact of CYGNSS data on the retrieval of passive microwave sensors. We will show examples on the impact on the retrieval from polar orbiting instruments, like the Advanced Technology Microwave Sounder (ATMS) and AMSU-A/B on NOAA-18 and 19. In addition we will also show the impact on retrievals from HAMSR (High Altitude MMIC Sounding Radiometer), which was flying on the Global Hawk during the EPOCH campaign. We will compare the results with other observations and estimate the impact of additional CYGNSS information on the microwave retrieval, especially on the impact in error and uncertainty reduction. We think, that a synergetic use of these different data sources could significantly help to produce better assimilation products for forecast assimilation.

  10. The influence of sociocultural factors on organ donation and transplantation in Korea: findings from key informant interviews.

    PubMed

    Kim, Jung Ran; Elliott, Doug; Hyde, Cheryl

    2004-04-01

    Although brain death was formally recognized in Korea in 2000 for the purpose of organ donation, traditional Confucian-based thought still prevails. The aim of this study was to explore sociocultural perspectives that influence health professionals' attitudes and perceptions regarding organ donation. Semistructured interviews were conducted with nine key informants from three major hospitals providing transplant services in South Korea. Several themes were identified as barriers to organ donation: Confucianism, misunderstandings and myths, organs as spare for selling, lack of clarity in the definition of death in the new legislation, and limited medical insurance coverage. It remains difficult for brain death to be accepted as true death, and there is currently a poor rate of organ procurement. Findings of the study will help identify socioculturally appropriate strategies to promote acceptance and accessibility of organ transplantation among South Koreans.

  11. An annotated key to the identification of commonly occurring and dominant genera of algae observed in the phytoplankton of the United States

    USGS Publications Warehouse

    Greeson, Phillip E.

    1982-01-01

    In early 1979, a retrieval was made for all phytoplankton data contained in the computerized data file of the U. S. Geological Survey. The retrieval revealed the analytical results of 17,959 samples collected and processed between October 1973 and October 1978. Of the approximately 500 genera of freshwater algae reported in the United States, the U.S. Geological Survey observed 321 genera in the phytoplankton. Fifty-two genera were considered to be commonly occurring and 42 genera were considered to be community dominants. The report lists, describes, and provides a detailed taxonomic key to the identification of 58 genera of algae considered either commonly occurring or dominant. Also included is a summary of environmental conditions under which each algal genus was observed, as well as a glossary and an extensive list of selected references.

  12. Entrepreneurial Librarianship: The Key to Effective Information Services Management. Information Services Management Series.

    ERIC Educational Resources Information Center

    St. Clair, Guy

    The need to approach library management from an entrepreneurial business perspective is vital, whether the information facility is in a corporate, academic, public or school setting. Although librarianship is not a business, library management must be driven by the same characteristics-- responsibility, performance, and control--as any other…

  13. Exploring Measures to Control Road Traffic Injuries in Iran: Key Informants Points of View.

    PubMed

    Salari, Hedayat; Motevalian, Seyed Abbas; Arab, Mohammad; Esfandiari, Atefeh; Akbari Sari, Ali

    2017-05-01

    Injuries and fatalities from road traffic Injuries are global public health concerns, and a major problem in the Iran. This study aimed to explore strategies to control road traffic Injuries (RTI) in Iran. We conducted a qualitative study to explore possible ways to reduce the occurrence of road traffic Injuries in Iran in 2016. Interviewees were purposively sampled from various sectors due to multidisciplinary nature of RTIs. Participants were mainly representatives from the police, Ministry of Road, Municipal, emergency services and Ministry of Health. Besides, public health authorities, researchers, and university professors were interviewed. We conducted in-depth interviews using generic guides. Data was analyzed using MAXQDA 10 software. Through content analysis, we interpreted core themes relevant to the accomplishment of our study objectives. Themes that emerged from our study include; road traffic management, governance, education, improving accident database, enforcement, driving license restrictions, and construction of pedestrian overpass. This study revealed key informants' views regarding available and affordable solutions to reduce RTIs in Iran. Many applicable strategies are identified in the control of RTIs in Iran. Although some solutions such as highway construction and/or expanding rail transportation have been suggested as effective measures for reducing accident, but they are costly and may not be fully applied in developing countries like Iran.

  14. Satellite lidar and radar: Key components of the future climate observing system

    NASA Astrophysics Data System (ADS)

    Winker, D. M.

    2017-12-01

    Cloud feedbacks represent the dominant source of uncertainties in estimates of climate sensitivity and aerosols represent the largest source of uncertainty in climate forcing. Both observation of long-term changes and observational constraints on the processes responsible for those changes are necessary. The existing 30-year record of passive satellite observations has not yet provided constraints to significantly reduce these uncertainties, though. We now have more than a decade of experience with active sensors flying in the A-Train. These new observations have demonstrated the strengths of active sensors and the benefits of continued and more advanced active sensors. This talk will discuss the multiple roles for active sensors as an essential component of a global climate observing system.

  15. CNES developments of key detection technologies to prepare next generation focal planes for high resolution Earth observation

    NASA Astrophysics Data System (ADS)

    Materne, A.; Virmontois, C.; Bardoux, A.; Gimenez, T.; Biffi, J. M.; Laubier, D.; Delvit, J. M.

    2014-10-01

    This paper describes the activities managed by CNES (French National Space Agency) for the development of focal planes for next generation of optical high resolution Earth observation satellites, in low sun-synchronous orbit. CNES has launched a new programme named OTOS, to increase the level of readiness (TRL) of several key technologies for high resolution Earth observation satellites. The OTOS programme includes several actions in the field of detection and focal planes: a new generation of CCD and CMOS image sensors, updated analog front-end electronics and analog-to-digital converters. The main features that must be achieved on focal planes for high resolution Earth Observation, are: readout speed, signal to noise ratio at low light level, anti-blooming efficiency, geometric stability, MTF and line of sight stability. The next steps targeted are presented in comparison to the in-flight measured performance of the PLEIADES satellites launched in 2011 and 2012. The high resolution panchromatic channel is still based upon Backside illuminated (BSI) CCDs operated in Time Delay Integration (TDI). For the multispectral channel, the main evolution consists in moving to TDI mode and the competition is open with the concurrent development of a CCD solution versus a CMOS solution. New CCDs will be based upon several process blocks under evaluation on the e2v 6 inches BSI wafer manufacturing line. The OTOS strategy for CMOS image sensors investigates on one hand custom TDI solutions within a similar approach to CCDs, and, on the other hand, investigates ways to take advantage of existing performance of off-the-shelf 2D arrays CMOS image sensors. We present the characterization results obtained from test vehicles designed for custom TDI operation on several CIS technologies and results obtained before and after radiation on snapshot 2D arrays from the CMOSIS CMV family.

  16. Scientific independence: A key to credibility

    Treesearch

    Leonard F. Ruggiero

    2007-01-01

    Independence and objectivity are key ingredients of scientific credibility, especially in research organizations that are part of a natural resource management agency like the Forest Service. Credibility, in turn, is essential to the utility of scientific information in socio-political processes. In order to develop this thesis further, a basic understanding of Forest...

  17. Vicarious Neural Processing of Outcomes during Observational Learning

    PubMed Central

    Monfardini, Elisabetta; Gazzola, Valeria; Boussaoud, Driss

    2013-01-01

    Learning what behaviour is appropriate in a specific context by observing the actions of others and their outcomes is a key constituent of human cognition, because it saves time and energy and reduces exposure to potentially dangerous situations. Observational learning of associative rules relies on the ability to map the actions of others onto our own, process outcomes, and combine these sources of information. Here, we combined newly developed experimental tasks and functional magnetic resonance imaging (fMRI) to investigate the neural mechanisms that govern such observational learning. Results show that the neural systems involved in individual trial-and-error learning and in action observation and execution both participate in observational learning. In addition, we identified brain areas that specifically activate for others’ incorrect outcomes during learning in the posterior medial frontal cortex (pMFC), the anterior insula and the posterior superior temporal sulcus (pSTS). PMID:24040104

  18. Intelligent Agents: Information Strategies for the Information Society.

    ERIC Educational Resources Information Center

    Garcia-Sierra, A. J.

    In the workplace of today which is increasingly being overloaded with information, the concept of intelligent information agents has been widely prescribed. This paper briefly looks at the United Kingdom Government's Information Society Initiative which has been fueled by the realization that information is the key component of the ongoing…

  19. Value of Earth Observations: NASA Activities with Socioeconomic Analysis

    NASA Astrophysics Data System (ADS)

    Friedl, L.

    2016-12-01

    There is greater emphasis internationally on the social and economic benefits that organizations can derive from applications of Earth observations. A growing set of qualitative, anecdotal examples on the uses of Earth observations across a range of sectors can be complemented by the quantitative substantiation of the socioeconomic benefits. In turn, the expanding breadth of environmental data available and the awareness of their beneficial applications to inform decisions can support new products and services. To support these efforts, there are needs to develop impact assessments, populate the literature, and develop familiarity in the Earth science community with the terms, concepts and methods to assess impacts. Within NASA, the Earth Science Division's Applied Sciences Program has initiated and supported numerous activities in recent years to quantify the socioeconomic benefits from Earth observations applications and to build familiarity within the Earth science community. This paper will present an overview of measuring socioeconomic impacts of Earth observations and how the measures can be translated into a value of Earth observation information. It will address key terms, techniques, principles and applications of socioeconomic impact analyses. It will also discuss activities to support analytic techniques, expand the literature, and promote broader skills and capabilities.

  20. Towards a Preservation Content Standard for Earth Observation Data

    NASA Technical Reports Server (NTRS)

    Ramapriyan, Hampapuram; Lowe, Dawn; Murphy, Kevin

    2017-01-01

    Information from Earth observing missions (remote sensing with airborne and spaceborne instruments, and in situ measurements such as those from field campaigns) is proliferating in the world. Many agencies across the globe are generating important datasets by collecting measurements from instruments on board aircraft and spacecraft, globally and constantly. The data resulting from such measurements are a valuable resource that needs to be preserved for the benefit of future generations. These observations are the primary record of the Earths environment and therefore are the key to understanding how conditions in the future will compare to conditions today. Earth science observational data, derived products and models are used to answer key questions of global significance. In the near-term, as long as the missions data are being used actively for scientific research, it continues to be important to provide easy access to the data and services commensurate with current information technology. For the longer term, when the focus of the research community shifts toward new missions and observations, it is essential to preserve the previous mission data and associated information. This will enable a new user in the future to understand how the data were used for deriving information, knowledge and policy recommendations and to repeat the experiment to ascertain the validity and possible limitations of conclusions reached in the past and to provide confidence in long term trends that depended on data from multiple missions. Organizations that collect, process, and utilize Earth observation data today have a responsibility to ensure that the data and associated content continue to be preserved by them or are gathered and handed off to other organizations for preservation for the benefit of future generations. In order to ensure preservation of complete content necessary for understanding and reusing the data and derived digital products from todays missions, it is

  1. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  2. Are national policies and programs for prevention and management of postpartum hemorrhage and preeclampsia adequate? A key informant survey in 37 countries.

    PubMed

    Smith, Jeffrey Michael; Currie, Sheena; Cannon, Tirza; Armbruster, Deborah; Perri, Julia

    2014-08-01

    Although maternal mortality has declined substantially in recent years, efforts to address postpartum hemorrhage (PPH) and preeclampsia/eclampsia (PE/E) must be systematically scaled up in order for further reduction to take place. In 2012, a key informant survey was conducted to identify both national and global gaps in PPH and PE/E program priorities and to highlight focus areas for future national and global programming. Between January and March 2012, national program teams in 37 countries completed a 44-item survey, consisting mostly of dichotomous yes/no responses and addressing 6 core programmatic areas: policy, training, medication distribution and logistics, national reporting of key indicators, programming, and challenges to and opportunities for scale up. An in-country focal person led the process to gather the necessary information from key local stakeholders. Some countries also provided national essential medicines lists and service delivery guidelines for comparison and further analysis. Most surveyed countries have many elements in place to address PPH and PE/E, but notable gaps remain in both policy and practice. Oxytocin and magnesium sulfate were reported to be regularly available in facilities in 89% and 76% of countries, respectively. Only 27% of countries, however, noted regular availability of misoprostol in health facilities. Midwife scope of practice regarding PPH and PE/E is inconsistent with global norms in a number of countries: 22% of countries do not allow midwives to administer magnesium sulfate and 30% do not allow them to perform manual removal of the placenta. Most countries surveyed have many of the essential policies and program elements to prevent/manage PPH and PE/E, but absence of commodities (especially misoprostol), limitations in scope of practice for midwives, and gaps in inclusion of maternal health indicators in the national data systems have impeded efforts to scale up programs nationally.

  3. Infrared observations of outer planet satellites

    NASA Technical Reports Server (NTRS)

    Johnson, T. V.

    1988-01-01

    This task supports IR observations of the outer planet satellites. These data provide vital information about the thermophysical properties of satellite surfaces, including internal heat sources for Io. Observations include both broad and narrow band measurementsin the 2 to 20 micrometer spectral range. The program in the last year has aimed at obtaining lonitude coverage on Io to establish stability of hot spot patterns previously reported. Several runs produced the most complete data set for an apparition since the start of the program. Unfortunately, bad weather limited coverage of key longitude ranges containing the largest known hot spot Loki. Among the preliminary results is the observation of an outburst in Io's thermal flux that was measured at 4.8, 8.7 and 20 micrometer. Analysis of the data has given the best evidence to date of silicate volcanism on Io; this is one of the most significant pieces of the puzzle as to the relative roles of silicate and sulfur volcanism on Io. Researchers are collaborating with J. Goguen (NRC RRA to finish reduction of mutual event data, which have already improved ephermeris information for the satellites. The data appear to place significant limits on the characteristics of any leading side hot spots.

  4. WaterML, an Information Standard for the Exchange of in-situ hydrological observations

    NASA Astrophysics Data System (ADS)

    Valentine, D.; Taylor, P.; Zaslavsky, I.

    2012-04-01

    The WaterML 2.0 Standards Working Group (SWG), working within the Open Geospatial Consortium (OGC) and in cooperation with the joint OGC-World Meteorological Organization (WMO) Hydrology Domain Working Group (HDWG), has developed an open standard for the exchange of water observation data; WaterML 2.0. The focus of the standard is time-series data, commonly generated from in-situ style monitoring. This is high value data for hydrological applications such as flood forecasting, environmental reporting and supporting hydrological infrastructure (e.g. dams, supply systems), which is commonly exchanged, but a lack of standards inhibits efficient reuse and automation. The process of developing WaterML required doing a harmonization analysis of existing standards to identify overlapping concepts and come to agreement on a harmonized definition. Generally the formats captured similar requirements, all with subtle differences, such as how time-series point metadata was handled. The in-progress standard WaterML 2.0 incorporates the semantics of the hydrologic information: location, procedure, and observations, and is implemented as an application schema of the Geography Markup Language version 3.2.1, making use of the OGC Observations & Measurements standards. WaterML2.0 is designed as an extensible schema to allow encoding of data to be used in a variety of exchange scenarios. Example areas of usage are: exchange of data for operational hydrological monitoring programs; supporting operation of infrastructure (e.g. dams, supply systems); cross-border exchange of observational data; release of data for public dissemination; enhancing disaster management through data exchange; and exchange in support of national reporting The first phase of WaterML2.0 focused on structural definitions allowing for the transfer of time-series, with less work on harmonization of vocabulary items such as quality codes. Vocabularies from various organizations tend to be specific and take time to

  5. Information management

    NASA Technical Reports Server (NTRS)

    Ricks, Wendell; Corker, Kevin

    1990-01-01

    Primary Flight Display (PFD) information management and cockpit display of information management research is presented in viewgraph form. The information management problem in the cockpit, information management burdens, the key characteristics of an information manager, the interface management system handling the flow of information and the dialogs between the system and the pilot, and overall system architecture are covered.

  6. Bridging gaps in health information systems: a case study from Somaliland, Somalia.

    PubMed

    Askar, Ahmed; Ardakani, Malekafzali; Majdzade, Reza

    2018-01-02

    Reliable and timely health information is fundamental for health information systems (HIS) to work effectively. This case study aims to assess Somaliland HIS in terms of its contextual situation, major weaknesses and proposes key evidence-based recommendations. Data were collected through national level key informants' interviews, observations, group discussion and scoring using the HIS framework and assessment tool developed by World Health Organization Health Metrics Network (WHO/HMN). The study found major weaknesses including: no policy, strategic plan and legal framework in place; fragmented sub-information systems; Poor information and communications technology (ICT) infrastructure; poorly motivated and under-skilled personnel; dependence on unsustainable external funds; no census or civil registration in place; data from private health sector not captured; insufficient technical capacity to analyse data collected by HIS; and information is not widely shared, disseminated or utilized for decision-making. We recommend developing a national HIS strategic plan that harmonizes and directs collective efforts to become a more integrated, cost-effective and sustainable HIS.

  7. Online Information Exchanges for Parents of Children With a Rare Health Condition: Key Findings From an Online Support Community

    PubMed Central

    Campo, Shelly; Lowe, John; Andsager, Julie; Morcuende, Jose A

    2013-01-01

    Background The Internet provides new opportunities for parents of children with difficult illnesses and disabilities to find information and support. The Internet is particularly important for caregivers of children with special needs due to numerous health-related decisions they face. For at-risk populations, online support communities can become key settings and channels for health promotion and communication. Objective This study is an initial exploration of the information-seeking and information-provision processes present in an online support community, which is an area of opportunity and interest for Internet-based medical research and practice. The aim of this study was to explore and describe information-related processes of uncertainty management in relationship to clubfoot. Specifically, the study explored interpersonal communication (information seeking and provision) in an online support community serving the needs of parents of children with clubfoot. Methods The study population consisted of messages posted to an online community by caregivers (parents) of children with clubfoot. The theoretical framework informing the study was the Uncertainty Management Theory (UMT). The study used content analysis to explore and categorize the content of 775 messages. Results Women authored 664 of 775 messages (86%) and men authored 47 messages (6%). Caregivers managed uncertainty through information seeking and provision behaviors that were dynamic and multilayered. The ratio of information-seeking messages to information-provision responses was 1 to 4. All five types of information-seeking behaviors proposed by Brashers’ schema were identified, most of them being correlated. Information seeking using direct questions was found to be positively correlated to self-disclosure (r=.538), offering of a candidate answer (r=.318), and passive information seeking (r=.253). Self-disclosure was found to be positively correlated to provision of a candidate answer (r=.324

  8. Implementation and management of a biomedical observation dictionary in a large healthcare information system.

    PubMed

    Vandenbussche, Pierre-Yves; Cormont, Sylvie; André, Christophe; Daniel, Christel; Delahousse, Jean; Charlet, Jean; Lepage, Eric

    2013-01-01

    This study shows the evolution of a biomedical observation dictionary within the Assistance Publique Hôpitaux Paris (AP-HP), the largest European university hospital group. The different steps are detailed as follows: the dictionary creation, the mapping to logical observation identifier names and codes (LOINC), the integration into a multiterminological management platform and, finally, the implementation in the health information system. AP-HP decided to create a biomedical observation dictionary named AnaBio, to map it to LOINC and to maintain the mapping. A management platform based on methods used for knowledge engineering has been put in place. It aims at integrating AnaBio within the health information system and improving both the quality and stability of the dictionary. This new management platform is now active in AP-HP. The AnaBio dictionary is shared by 120 laboratories and currently includes 50 000 codes. The mapping implementation to LOINC reaches 40% of the AnaBio entries and uses 26% of LOINC records. The results of our work validate the choice made to develop a local dictionary aligned with LOINC. This work constitutes a first step towards a wider use of the platform. The next step will support the entire biomedical production chain, from the clinician prescription, through laboratory tests tracking in the laboratory information system to the communication of results and the use for decision support and biomedical research. In addition, the increase in the mapping implementation to LOINC ensures the interoperability allowing communication with other international health institutions.

  9. Implementation and management of a biomedical observation dictionary in a large healthcare information system

    PubMed Central

    Vandenbussche, Pierre-Yves; Cormont, Sylvie; André, Christophe; Daniel, Christel; Delahousse, Jean; Charlet, Jean; Lepage, Eric

    2013-01-01

    Objective This study shows the evolution of a biomedical observation dictionary within the Assistance Publique Hôpitaux Paris (AP-HP), the largest European university hospital group. The different steps are detailed as follows: the dictionary creation, the mapping to logical observation identifier names and codes (LOINC), the integration into a multiterminological management platform and, finally, the implementation in the health information system. Methods AP-HP decided to create a biomedical observation dictionary named AnaBio, to map it to LOINC and to maintain the mapping. A management platform based on methods used for knowledge engineering has been put in place. It aims at integrating AnaBio within the health information system and improving both the quality and stability of the dictionary. Results This new management platform is now active in AP-HP. The AnaBio dictionary is shared by 120 laboratories and currently includes 50 000 codes. The mapping implementation to LOINC reaches 40% of the AnaBio entries and uses 26% of LOINC records. The results of our work validate the choice made to develop a local dictionary aligned with LOINC. Discussion and Conclusions This work constitutes a first step towards a wider use of the platform. The next step will support the entire biomedical production chain, from the clinician prescription, through laboratory tests tracking in the laboratory information system to the communication of results and the use for decision support and biomedical research. In addition, the increase in the mapping implementation to LOINC ensures the interoperability allowing communication with other international health institutions. PMID:23635601

  10. Temporal dynamics and the identification of musical key.

    PubMed

    Farbood, Morwaread Mary; Marcus, Gary; Poeppel, David

    2013-08-01

    A central process in music cognition involves the identification of key; however, little is known about how listeners accomplish this task in real time. This study derives from work that suggests overlap between the neural and cognitive resources underlying the analyses of both music and speech and is the first, to our knowledge, to explore the timescales at which the brain infers musical key. We investigated the temporal psychophysics of key-finding over a wide range of tempi using melodic sequences with strong structural cues, where statistical information about overall key profile was ambiguous. Listeners were able to provide robust judgments within specific limits, at rates as high as 400 beats per minute (bpm; ∼7 Hz) and as low as 30 bpm (0.5 Hz), but not outside those bounds. These boundaries on reliable performance show that the process of key-finding is restricted to timescales that are closely aligned with beat induction and speech processing. 2013 APA, all rights reserved

  11. Beyond the lab: observations on the process by which science successfully informs management and policy decisions

    NASA Astrophysics Data System (ADS)

    Flores, S.

    2012-12-01

    Scientific findings inform management decisions and policy products through various ways, these include: synthesis reports, white papers, in-person and web-based seminars (webinars), communication from specialized staff, and seminal peer-reviewed journal articles. Scientists are often told that if they want their science to inform management decisions and policy products that they must: clearly and simply articulate discreet pieces of scientific information and avoid attaching advocacy messages to the science; however, solely relying on these tenants does not ensure that scientific products will infuse the realms of management and policy. The process by which science successfully informs management decisions and policy products rarely begins at the time the results come out of the lab, but rather, before the research is carried out. Having an understanding of the political climate, management needs, agency research agendas, and funding limitations, as well as developing a working relationship with the intended managers and policy makers are key elements to developing the kind of science results and products that often make an impact in the management and policy world. In my presentation I will provide case-studies from California (USA) to highlight the type of coastal, ocean and climate science that has been successful in informing management decisions and policy documents, as well as provide a state-level agency perspective on the process by which this occurs.

  12. Troglobitic invertebrates: improving the knowledge on the Brazilian subterranean biodiversity through an interactive multi-entry key.

    PubMed

    Parizotto, Daniele R; Pires, Amanda Ciprandi; Mise, Kleber Makoto; Ferreira, Rodrigo Lopes

    2017-12-19

    Troglobitic species are those organisms restricted to caves that frequently present unique morphological features related to these environments. In order to study its ecology, evolution and biogeography, it is first required to properly recognize them. However, especially in Brazil, the basic knowledge is still incipient, with few taxonomic studies such as identification keys for this group of organisms. In addition, since the troglobitic species belong to different taxonomic groups, the information to properly recognize them is often sparse and difficult to access. Considering this, an interactive multi entry taxonomic key available online is an interesting approach, as it makes identifications easier. This study aims to construct a multi-access interactive identification key to the troglobitic invertebrates of Brazil, using morphological characters obtained from literature and direct observations of specimens. The key was made in Lucid version 3.3, containing figures of most characters. It comprises seventy-eight species of troglobitic invertebrates that occur in Brazil, forming a matrix of 231 morphological characters and more than 200 images to support identification. The key is freely available online on lucid central (http://keys.lucidcentral.org/keys/v3/troglobitic_invertebrates/troglobitic_invertebrates.html). Since Brazilian laws regarding cave conservation has change in 2008, allowing even the destruction of caves, this multi-access identification key is step to reduce the existing taxonomic impediment and also an important tool for identification of troglobites, especially for non-specialists.

  13. Information Infrastructure: Organisational Capability for Online Information Provision.

    ERIC Educational Resources Information Center

    Klobas, Jane E.

    This paper identifies aspects of information flow that are affected by online provision of internal information. Reference is made to four case studies of Western Australian government agencies' steps toward becoming Internet information providers, and to the lessons learned from their experiences. Three key interdependent elements of…

  14. Traveler information services in rural tourism areas : appendix C, observations at tourist interactions with kiosks

    DOT National Transportation Integrated Search

    2000-06-30

    This report presents a series of observations of tourists' experiences with kiosks providing traveler information services at rural tourism areas. The kiosks were assessed in five areas: reliability visibility, usability, usefulness, and adaptability...

  15. Space-Based Information Services

    NASA Astrophysics Data System (ADS)

    Lee, C.

    With useful data now beginning to flow from earth observation and navigation satellites, it is an active time for the development of space services - all types of satellites are now being put to work, not just Comsats. However derived products require a blend of innovative software design, low cost operational support and a real insight into the information needs of the customer. Science Systems is meeting this challenge through a series of on-going projects, three of which are summarised here (addressing navigation, communications and earth observation). By demonstrating a broad range of related disciplines; from monitoring and control to back-room billing; from data management to intelligent systems, Science Systems hopes to play a key role in this developing market.

  16. Designing Health Websites Based on Users' Web-Based Information-Seeking Behaviors: A Mixed-Method Observational Study.

    PubMed

    Pang, Patrick Cheong-Iao; Chang, Shanton; Verspoor, Karin; Pearce, Jon

    2016-06-06

    Laypeople increasingly use the Internet as a source of health information, but finding and discovering the right information remains problematic. These issues are partially due to the mismatch between the design of consumer health websites and the needs of health information seekers, particularly the lack of support for "exploring" health information. The aim of this research was to create a design for consumer health websites by supporting different health information-seeking behaviors. We created a website called Better Health Explorer with the new design. Through the evaluation of this new design, we derive design implications for future implementations. Better Health Explorer was designed using a user-centered approach. The design was implemented and assessed through a laboratory-based observational study. Participants tried to use Better Health Explorer and another live health website. Both websites contained the same content. A mixed-method approach was adopted to analyze multiple types of data collected in the experiment, including screen recordings, activity logs, Web browsing histories, and audiotaped interviews. Overall, 31 participants took part in the observational study. Our new design showed a positive result for improving the experience of health information seeking, by providing a wide range of information and an engaging environment. The results showed better knowledge acquisition, a higher number of page reads, and more query reformulations in both focused and exploratory search tasks. In addition, participants spent more time to discover health information with our design in exploratory search tasks, indicating higher engagement with the website. Finally, we identify 4 design considerations for designing consumer health websites and health information-seeking apps: (1) providing a dynamic information scope; (2) supporting serendipity; (3) considering trust implications; and (4) enhancing interactivity. Better Health Explorer provides strong

  17. Satellite missions, global environment, and the concept of a global satellite observation information network. The role of the committee on Earth observation satellites (CEOS)

    NASA Astrophysics Data System (ADS)

    Smith, D. Brent; Williams, David F.; Fujita, Akihiro

    The paper traces the development of the Committee on Earth Observation Satellites (CEOS) since its November 1990 Plenary: its restructuring to include major intergovernmental user and international scientific organizational affiliates; its focus on data sharing issues and completion of a CEOS resolution guaranteeing global change researchers access to satellite data at the cost of filling a user request; unfolding of a CEOS-associated initiative of the UK Prime Minister reporting to UNCED delegations on the relevance of satellite missions to the study of the global environment; development of a "Dossier" providing detailed information on all CEOS agency satellite missions, including sensor specifications, ground systems, standard data products, and other information relevant to users; creation of a permanent CEOS Secretariat; and efforts currently underway to assess the feasibility of a global satellite observation information network. Of particular relevance to developing countries, the paper will discuss CEOS efforts to assure broad user access and to foster acceptance of applications in such important areas as disaster monitoring and mitigation, land cover change, weather forecasting, and long-term climate modeling.

  18. Cooperate to Validate: OBSERVAL-NET Experts' Report on Validation of Non-Formal and Informal Learning (VNIL) 2013

    ERIC Educational Resources Information Center

    Weber Guisan, Saskia; Voit, Janine; Lengauer, Sonja; Proinger, Eva; Duvekot, Ruud; Aagaard, Kirsten

    2014-01-01

    The present publication is one of the outcomes of the OBSERVAL-NET project (follow-up of the OBSERVAL project). The main aim of OBSERVAL-NET was to set up a stakeholder-centric network of organisations supporting the validation of non-formal and informal learning in Europe based on the formation of national working groups in the 8 participating…

  19. Cooperate to Validate. Observal-Net Experts' Report on Validation of Non-Formal and Informal Learning (VNIL) 2013

    ERIC Educational Resources Information Center

    Weber Guisan, Saskia; Voit, Janine; Lengauer, Sonja; Proinger, Eva; Duvekot, Ruud; Aagaard, Kirsten

    2014-01-01

    The present publication is one of the outcomes of the OBSERVAL-NET project (followup of the OBSERVAL project). The main aim of OBSERVAL-NET was to set up a stakeholder centric network of organisations supporting the validation of non-formal and informal learning in Europe based on the formation of national working groups in the 8 participating…

  20. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allowsmore » for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.« less

  1. Comparison of methods of extracting information for meta-analysis of observational studies in nutritional epidemiology.

    PubMed

    Bae, Jong-Myon

    2016-01-01

    A common method for conducting a quantitative systematic review (QSR) for observational studies related to nutritional epidemiology is the "highest versus lowest intake" method (HLM), in which only the information concerning the effect size (ES) of the highest category of a food item is collected on the basis of its lowest category. However, in the interval collapsing method (ICM), a method suggested to enable a maximum utilization of all available information, the ES information is collected by collapsing all categories into a single category. This study aimed to compare the ES and summary effect size (SES) between the HLM and ICM. A QSR for evaluating the citrus fruit intake and risk of pancreatic cancer and calculating the SES by using the HLM was selected. The ES and SES were estimated by performing a meta-analysis using the fixed-effect model. The directionality and statistical significance of the ES and SES were used as criteria for determining the concordance between the HLM and ICM outcomes. No significant differences were observed in the directionality of SES extracted by using the HLM or ICM. The application of the ICM, which uses a broader information base, yielded more-consistent ES and SES, and narrower confidence intervals than the HLM. The ICM is advantageous over the HLM owing to its higher statistical accuracy in extracting information for QSR on nutritional epidemiology. The application of the ICM should hence be recommended for future studies.

  2. The importance of distinguishing information from evidence/observations when formulating propositions.

    PubMed

    Hicks, T; Biedermann, A; de Koeijer, J A; Taroni, F; Champod, C; Evett, I W

    2015-12-01

    The value of forensic results crucially depends on the propositions and the information under which they are evaluated. For example, if a full single DNA profile for a contemporary marker system matching the profile of Mr A is assessed, given the propositions that the DNA came from Mr A and given it came from an unknown person, the strength of evidence can be overwhelming (e.g., in the order of a billion). In contrast, if we assess the same result given that the DNA came from Mr A and given it came from his twin brother (i.e., a person with the same DNA profile), the strength of evidence will be 1, and therefore neutral, unhelpful and irrelevant(1) to the case at hand. While this understanding is probably uncontroversial and obvious to most, if not all practitioners dealing with DNA evidence, the practical precept of not specifying an alternative source with the same characteristics as the one considered under the first proposition may be much less clear in other circumstances. During discussions with colleagues and trainees, cases have come to our attention where forensic scientists have difficulty with the formulation of propositions. It is particularly common to observe that results (e.g., observations) are included in the propositions, whereas-as argued throughout this note-they should not be. A typical example could be a case where a shoe-mark with a logo and the general pattern characteristics of a Nike Air Jordan shoe is found at the scene of a crime. A Nike Air Jordan shoe is then seized at Mr A's house and control prints of this shoe compared to the mark. The results (e.g., a trace with this general pattern and acquired characteristics corresponding to the sole of Mr A's shoe) are then evaluated given the propositions 'The mark was left by Mr A's Nike Air Jordan shoe-sole' and 'The mark was left by an unknown Nike Air Jordan shoe'. As a consequence, the footwear examiner will not evaluate part of the observations (i.e., the mark presents the general

  3. Using Informal Classroom Observations to Improve Instruction

    ERIC Educational Resources Information Center

    Ing, Marsha

    2010-01-01

    Purpose: The purpose of this study is to describe the variability of principals' classroom observations across schools and to relate classroom observations to the schools' instructional climate. This helps identify the conditions under which classroom observations effectively improve instruction in some schools and not in other schools.…

  4. Academic Primer Series: Eight Key Papers about Education Theory.

    PubMed

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M; Krzyzaniak, Sara M; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-02-01

    Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice.

  5. Geo-reCAPTCHA: Crowdsourcing large amounts of geographic information from earth observation data

    NASA Astrophysics Data System (ADS)

    Hillen, Florian; Höfle, Bernhard

    2015-08-01

    The reCAPTCHA concept provides a large amount of valuable information for various applications. First, it provides security, e.g., for a form on a website, by means of a test that only a human could solve. Second, the effort of the user for this test is used to generate additional information, e.g., digitization of books or identification of house numbers. In this work, we present a concept for adapting the reCAPTCHA idea to create user-generated geographic information from earth observation data, and the requirements during the conception and implementation are depicted in detail. Furthermore, the essential parts of a Geo-reCAPTCHA system are described, and afterwards transferred, to a prototype implementation. An empirical user study is conducted to investigate the Geo-reCAPTCHA approach, assessing time and quality of the resulting geographic information. Our results show that a Geo-reCAPTCHA can be solved by the users of our study on building digitization in a short amount of time (19.2 s on average) with an overall average accuracy of the digitizations of 82.2%. In conclusion, Geo-reCAPTCHA has the potential to be a reasonable alternative to the typical reCAPTCHA, and to become a new data-rich channel of crowdsourced geographic information.

  6. An Improved Ocean Observing System for Coastal Louisiana: WAVCIS (WAVE-CURRENT-SURGE Information System )

    NASA Astrophysics Data System (ADS)

    Zhang, X.; Stone, G. W.; Gibson, W. J.; Braud, D.

    2005-05-01

    WAVCIS is a regional ocean observing and forecasting system. It was designed to measure, process, forecast, and distribute oceanographic and meteorological information. WAVCIS was developed and is maintained by the Coastal Studies Institute at Louisiana State University. The in-situ observing stations are distributed along the central Louisiana and Mississippi coast. The forecast region covers the entire Gulf of Mexico with emphasis on offshore Louisiana. By using state-of-the-art instrumentation, WAVCIS measures directional waves, currents, temperature, water level, conductivity, turbidity, salinity, dissolved oxygen, chlorophyll, Meteorological parameters include wind speed and direction, air pressure and temperature visibility and humidity. Through satellite communication links, the measured data are transmitted to the WAVCIS laboratory. After processing, they are available to the public via the internet on a near real-time basis. WAVCIS also includes a forecasting capability. Waves, tides, currents, and winds are forecast daily for up to 80 hours in advance. There are a number of numerical wave and surge models that can be used for forecasts. WAM and SWAN are used for operational purposes to forecast sea state. Tides at each station are predicted based on the harmonic constants calculated from past in-situ observations at respective sites. Interpolated winds from the ETA model are used as input forcing for waves. Both in-situ and forecast information are available online to the users through WWW. Interactive GIS web mapping is implemented on the WAVCIS webpage to visualize the model output and in-situ observational data. WAVCIS data can be queried, retrieved, downloaded, and analyzed through the web page. Near real-time numerical model skill assessment can also be performed by using the data from in-situ observing stations.

  7. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  8. Two-dimensional distributed-phase-reference protocol for quantum key distribution.

    PubMed

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-22

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  9. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    PubMed Central

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-01-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable. PMID:28004821

  10. Space-based observatories providing key data for climate change applications

    NASA Astrophysics Data System (ADS)

    Lecomte, J.; Juillet, J. J.

    2016-12-01

    The Sentinel-1 & 3 mission are part of the Copernicus program, previously known as GMES (Global Monitoring for Environment and Security), whose overall objective is to support Europe's goals regarding sustainable development and global governance of the environment by providing timely and quality data, information, services and knowledge. This European Earth Observation program is led by the European Commission and the space infrastructure is developed under the European Space Agency leadership. Many services will be developed through the Copernicus program among different thematic areas. The climate change is one of this thematic area and the Sentinel-1 & 3 satellites will provide key space-based observations in this area. The Sentinel-1 mission is based on a constellation of 2 identical satellites each one embarking C-SAR Instrument and provides capability for continuous radar mapping of the Earth with enhanced revisit frequency, coverage, timeliness and reliability for operational services and applications requiring long time series. In particular, Sentinel 1 provides all-weather, day-and-night estimates of soil moisture, wind speed and direction, sea ice, continental ice sheets and glaciers. The Sentinel-3 mission will mainly be devoted to the provision of Ocean observation data in routine, long term (20 years of operations) and continuous fashion with a consistent quality and a very high level of availability. Among these data, very accurate surface temperatures and topography measurements will be provided and will constitute key indicators, once ingested in climate change models, for identifying climate drivers and expected climate impacts. The paper will briefly recall the satellite architectures, their main characteristics and performance. The inflight performance and key features of their images or data of the 3 satellites namely Sentinel 1A, 1B and 3A will be reviewed to demonstrate the quality and high scientific potential of the data as well as their

  11. A Novel Multiple-Access Correlation-Delay-Shift-Keying

    NASA Astrophysics Data System (ADS)

    Duan, J. Y.; Jiang, G. P.; Yang, H.

    In Correlation-Delay-Shift-Keying (CDSK), the reference signal and the information-bearing signal are added together during a certain time delay. Because the reference signal is not strictly orthogonal to the information-bearing signal, the cross-correlation between the adjacent chaotic signal (Intra-signal Interference, ISI) will be introduced into the demodulation at the receiver. Therefore, the Bit-Error Ratio (BER) of CDSK is higher than that of Differential-Chaos-Shift-Keying (DCSK). To avoid the ISI component and enhance the BER performance of CDSK in multiuser scenario, Multiple-Access CDSK with No Intra-signal Interference (MA-CDSK-NII) is proposed. By constructing the repeated chaotic generator and applying the Walsh code sequence to modulate the reference signal, in MA-CDSK-NII, the ISI component will be eliminated during the demodulation. Gaussian approximation method is adopted here to obtain the exact performance analysis of MA-CDSK-NII over additive white Gaussian noise (AWGN) channel and Rayleigh multipath fading channels. Results show that, due to no ISI component and lower transmitting power, the BER performance of MA-CDSK-NII can be better than that of multiple-access CDSK and Code-Shifted Differential-Chaos-Shift-Keying (CS-DCSK).

  12. Security enhancement of optical encryption based on biometric array keys

    NASA Astrophysics Data System (ADS)

    Yan, Aimin; Wei, Yang; Zhang, Jingtao

    2018-07-01

    A novel optical image encryption method is proposed by using Dammann grating and biometric array keys. Dammann grating is utilized to create a 2D finite uniform-intensity spot array. In encryption, a fingerprint array is used as private encryption keys. An original image can be encrypted by a scanning Fresnel zone plate array. Encrypted signals are processed by an optical coherent heterodyne detection system. Biometric array keys and optical scanning cryptography are integrated with each other to enhance information security greatly. Numerical simulations are performed to demonstrate the feasibility and validity of this method. Analyses on key sensitivity and the resistance against to possible attacks are provided.

  13. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  14. Representing Geospatial Environment Observation Capability Information: A Case Study of Managing Flood Monitoring Sensors in the Jinsha River Basin

    PubMed Central

    Hu, Chuli; Guan, Qingfeng; Li, Jie; Wang, Ke; Chen, Nengcheng

    2016-01-01

    Sensor inquirers cannot understand comprehensive or accurate observation capability information because current observation capability modeling does not consider the union of multiple sensors nor the effect of geospatial environmental features on the observation capability of sensors. These limitations result in a failure to discover credible sensors or plan for their collaboration for environmental monitoring. The Geospatial Environmental Observation Capability (GEOC) is proposed in this study and can be used as an information basis for the reliable discovery and collaborative planning of multiple environmental sensors. A field-based GEOC (GEOCF) information representation model is built. Quintuple GEOCF feature components and two GEOCF operations are formulated based on the geospatial field conceptual framework. The proposed GEOCF markup language is used to formalize the proposed GEOCF. A prototype system called GEOCapabilityManager is developed, and a case study is conducted for flood observation in the lower reaches of the Jinsha River Basin. The applicability of the GEOCF is verified through the reliable discovery of flood monitoring sensors and planning for the collaboration of these sensors. PMID:27999247

  15. Representing Geospatial Environment Observation Capability Information: A Case Study of Managing Flood Monitoring Sensors in the Jinsha River Basin.

    PubMed

    Hu, Chuli; Guan, Qingfeng; Li, Jie; Wang, Ke; Chen, Nengcheng

    2016-12-16

    Sensor inquirers cannot understand comprehensive or accurate observation capability information because current observation capability modeling does not consider the union of multiple sensors nor the effect of geospatial environmental features on the observation capability of sensors. These limitations result in a failure to discover credible sensors or plan for their collaboration for environmental monitoring. The Geospatial Environmental Observation Capability (GEOC) is proposed in this study and can be used as an information basis for the reliable discovery and collaborative planning of multiple environmental sensors. A field-based GEOC (GEOCF) information representation model is built. Quintuple GEOCF feature components and two GEOCF operations are formulated based on the geospatial field conceptual framework. The proposed GEOCF markup language is used to formalize the proposed GEOCF. A prototype system called GEOCapabilityManager is developed, and a case study is conducted for flood observation in the lower reaches of the Jinsha River Basin. The applicability of the GEOCF is verified through the reliable discovery of flood monitoring sensors and planning for the collaboration of these sensors.

  16. Information-theoretic equilibrium and observable thermalization

    NASA Astrophysics Data System (ADS)

    Anzà, F.; Vedral, V.

    2017-03-01

    A crucial point in statistical mechanics is the definition of the notion of thermal equilibrium, which can be given as the state that maximises the von Neumann entropy, under the validity of some constraints. Arguing that such a notion can never be experimentally probed, in this paper we propose a new notion of thermal equilibrium, focused on observables rather than on the full state of the quantum system. We characterise such notion of thermal equilibrium for an arbitrary observable via the maximisation of its Shannon entropy and we bring to light the thermal properties that it heralds. The relation with Gibbs ensembles is studied and understood. We apply such a notion of equilibrium to a closed quantum system and show that there is always a class of observables which exhibits thermal equilibrium properties and we give a recipe to explicitly construct them. Eventually, an intimate connection with the Eigenstate Thermalisation Hypothesis is brought to light.

  17. Information-theoretic equilibrium and observable thermalization

    PubMed Central

    Anzà, F.; Vedral, V.

    2017-01-01

    A crucial point in statistical mechanics is the definition of the notion of thermal equilibrium, which can be given as the state that maximises the von Neumann entropy, under the validity of some constraints. Arguing that such a notion can never be experimentally probed, in this paper we propose a new notion of thermal equilibrium, focused on observables rather than on the full state of the quantum system. We characterise such notion of thermal equilibrium for an arbitrary observable via the maximisation of its Shannon entropy and we bring to light the thermal properties that it heralds. The relation with Gibbs ensembles is studied and understood. We apply such a notion of equilibrium to a closed quantum system and show that there is always a class of observables which exhibits thermal equilibrium properties and we give a recipe to explicitly construct them. Eventually, an intimate connection with the Eigenstate Thermalisation Hypothesis is brought to light. PMID:28266646

  18. Information-theoretic equilibrium and observable thermalization.

    PubMed

    Anzà, F; Vedral, V

    2017-03-07

    A crucial point in statistical mechanics is the definition of the notion of thermal equilibrium, which can be given as the state that maximises the von Neumann entropy, under the validity of some constraints. Arguing that such a notion can never be experimentally probed, in this paper we propose a new notion of thermal equilibrium, focused on observables rather than on the full state of the quantum system. We characterise such notion of thermal equilibrium for an arbitrary observable via the maximisation of its Shannon entropy and we bring to light the thermal properties that it heralds. The relation with Gibbs ensembles is studied and understood. We apply such a notion of equilibrium to a closed quantum system and show that there is always a class of observables which exhibits thermal equilibrium properties and we give a recipe to explicitly construct them. Eventually, an intimate connection with the Eigenstate Thermalisation Hypothesis is brought to light.

  19. Illicit Drug Users in the Tanzanian Hinterland: Population Size Estimation Through Key Informant-Driven Hot Spot Mapping.

    PubMed

    Ndayongeje, Joel; Msami, Amani; Laurent, Yovin Ivo; Mwankemwa, Syangu; Makumbuli, Moza; Ngonyani, Alois M; Tiberio, Jenny; Welty, Susie; Said, Christen; Morris, Meghan D; McFarland, Willi

    2018-02-12

    We mapped hot spots and estimated the numbers of people who use drugs (PWUD) and who inject drugs (PWID) in 12 regions of Tanzania. Primary (ie, current and past PWUD) and secondary (eg, police, service providers) key informants identified potential hot spots, which we visited to verify and count the number of PWUD and PWID present. Adjustments to counts and extrapolation to regional estimates were done by local experts through iterative rounds of discussion. Drug use, specifically cocaine and heroin, occurred in all regions. Tanga had the largest numbers of PWUD and PWID (5190 and 540, respectively), followed by Mwanza (3300 and 300, respectively). Findings highlight the need to strengthen awareness of drug use and develop prevention and harm reduction programs with broader reach in Tanzania. This exercise provides a foundation for understanding the extent and locations of drug use, a baseline for future size estimations, and a sampling frame for future research.

  20. Security of quantum key distribution with multiphoton components

    PubMed Central

    Yin, Hua-Lei; Fu, Yao; Mao, Yingqiu; Chen, Zeng-Bing

    2016-01-01

    Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be extracted from the two-photon component by modifying the classical post-processing procedure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three-photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works. Besides, we compare the performances of the six-state SARG04 with other prepare-and-measure QKD protocols using decoy states. PMID:27383014

  1. Informal Recyclers' Health Inequities in Vancouver, BC.

    PubMed

    Wittmer, Josie; Parizeau, Kate

    2018-01-01

    We explore informal recyclers' perceptions and experiences of the social determinants of health in Vancouver, Canada, and investigate the factors that contribute to the environmental health inequities they experience. Based on in-depth interviews with 40 informal recyclers and 7 key informants, we used a social determinants of health framework to detail the health threats that informal recyclers associated with their work and the factors that influenced their access to health-related resources and services. Our analysis reveals that the structural factors influencing environmental health inequities included insufficient government resources for low-income urbanites; the potential for stigma, clientization, and discrimination at some health and social service providers; and the legal marginalization of informal recycling and associated activities. We conclude that Vancouver's informal recyclers experience inequitable access to health-related resources and services, and they are knowledgeable observers of the factors that influence their own health and well-being.

  2. Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states

    NASA Astrophysics Data System (ADS)

    Jiang, Dong-Huan; Xu, Guang-Bao

    2018-07-01

    Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.

  3. Key Data on Education in Europe 2009

    ERIC Educational Resources Information Center

    Ranguelov, Stanislav; de Coster, Isabelle; Forsthuber, Bernadette; Noorani, Sogol; Ruffio, Philippe

    2009-01-01

    This seventh edition of "Key Data on Education in Europe" retains its main special feature which is the combination of statistical data and qualitative information to describe the organisation and functioning of education systems in Europe. The present 2009 edition maintains the subject-based structure defined by the previous one but…

  4. Key Data on Education in Europe 2012

    ERIC Educational Resources Information Center

    Ranguelov, Stanislav; De Coster, Isabelle; Norani, Sogol; Paolini, Giulia

    2012-01-01

    Key Data on Education in Europe 2012 is a Eurydice flagship publication tracing the main developments of European education systems over the last decade. The report combines statistical data with qualitative information to describe the organisation, management and functioning of 37 European education systems from pre-primary to higher education.…

  5. Mirror neurons encode the subjective value of an observed action

    PubMed Central

    Caggiano, Vittorio; Fogassi, Leonardo; Rizzolatti, Giacomo; Casile, Antonino; Giese, Martin A.; Thier, Peter

    2012-01-01

    Objects grasped by an agent have a value not only for the acting agent, but also for an individual observing the grasping act. The value that the observer attributes to the object that is grasped can be pivotal for selecting a possible behavioral response. Mirror neurons in area F5 of the monkey premotor cortex have been suggested to play a crucial role in the understanding of action goals. However, it has not been addressed if these neurons are also involved in representing the value of the grasped object. Here we report that observation-related neuronal responses of F5 mirror neurons are indeed modulated by the value that the monkey associates with the grasped object. These findings suggest that during action observation F5 mirror neurons have access to key information needed to shape the behavioral responses of the observer. PMID:22753471

  6. Mirror neurons encode the subjective value of an observed action.

    PubMed

    Caggiano, Vittorio; Fogassi, Leonardo; Rizzolatti, Giacomo; Casile, Antonino; Giese, Martin A; Thier, Peter

    2012-07-17

    Objects grasped by an agent have a value not only for the acting agent, but also for an individual observing the grasping act. The value that the observer attributes to the object that is grasped can be pivotal for selecting a possible behavioral response. Mirror neurons in area F5 of the monkey premotor cortex have been suggested to play a crucial role in the understanding of action goals. However, it has not been addressed if these neurons are also involved in representing the value of the grasped object. Here we report that observation-related neuronal responses of F5 mirror neurons are indeed modulated by the value that the monkey associates with the grasped object. These findings suggest that during action observation F5 mirror neurons have access to key information needed to shape the behavioral responses of the observer.

  7. Emotional Intelligence: A Key to Improving Federal Chief Information Officer Management

    ERIC Educational Resources Information Center

    Borkowski, Tammy M.

    2012-01-01

    The United States Government relies on information technology to provide services to its citizens, spending more than $600 billion on its products and services in the last decade. Given the current fiscal climate, the Executive Branch of the United States Government has a renewed focus on information technology (IT) innovation, requiring federal…

  8. PEM public key certificate cache server

    NASA Astrophysics Data System (ADS)

    Cheung, T.

    1993-12-01

    Privacy Enhanced Mail (PEM) provides privacy enhancement services to users of Internet electronic mail. Confidentiality, authentication, message integrity, and non-repudiation of origin are provided by applying cryptographic measures to messages transferred between end systems by the Message Transfer System. PEM supports both symmetric and asymmetric key distribution. However, the prevalent implementation uses a public key certificate-based strategy, modeled after the X.509 directory authentication framework. This scheme provides an infrastructure compatible with X.509. According to RFC 1422, public key certificates can be stored in directory servers, transmitted via non-secure message exchanges, or distributed via other means. Directory services provide a specialized distributed database for OSI applications. The directory contains information about objects and then provides structured mechanisms for accessing that information. Since directory services are not widely available now, a good approach is to manage certificates in a centralized certificate server. This document describes the detailed design of a centralized certificate cache serve. This server manages a cache of certificates and a cache of Certificate Revocation Lists (CRL's) for PEM applications. PEMapplications contact the server to obtain/store certificates and CRL's. The server software is programmed in C and ELROS. To use this server, ISODE has to be configured and installed properly. The ISODE library 'libisode.a' has to be linked together with this library because ELROS uses the transport layer functions provided by 'libisode.a.' The X.500 DAP library that is included with the ELROS distribution has to be linked in also, since the server uses the DAP library functions to communicate with directory servers.

  9. Quantum-key-distribution protocol with pseudorandom bases

    NASA Astrophysics Data System (ADS)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  10. Security of a single-state semi-quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  11. Developing content for an interprofessional training on fear of cancer recurrence (FCR): Key informant interviews of healthcare professionals, researchers and cancer survivors.

    PubMed

    Berrett-Abebe, Julie; Cadet, Tamara; Vitello, Joan; Maramaldi, Peter

    2018-04-10

    Growing numbers of cancer survivors are receiving healthcare through primary care practitioners, who often lack cancer-specific expertise to effectively treat survivors' concerns. Addressing that gap, this study aimed to develop content for a training on fear of cancer recurrence (FCR), a common concern in survivorship. Grounded in naturalistic inquiry, 42 key-informant interviews were conducted, transcribed, and analyzed for themes. Participants were healthcare professionals, researchers, and cancer survivors Results: Results included themes ranging from: rich conceptualizations of FCR, opportunities and challenges for addressing FCR in healthcare settings, interventions to address FCR, and important information to include in a training on FCR. This paper provides content for an interprofessional training and highlights the importance of developing trainings for interprofessional teams, given identified barriers that physicians face in addressing FCR and other psychosocial concerns of survivors in primary care.

  12. Coherent attacking continuous-variable quantum key distribution with entanglement in the middle

    NASA Astrophysics Data System (ADS)

    Zhang, Zhaoyuan; Shi, Ronghua; Zeng, Guihua; Guo, Ying

    2018-06-01

    We suggest an approach on the coherent attack of continuous-variable quantum key distribution (CVQKD) with an untrusted entangled source in the middle. The coherent attack strategy can be performed on the double links of quantum system, enabling the eavesdropper to steal more information from the proposed scheme using the entanglement correlation. Numeric simulation results show the improved performance of the attacked CVQKD system in terms of the derived secret key rate with the controllable parameters maximizing the stolen information.

  13. A Master Key to Workforce Skills Development

    ERIC Educational Resources Information Center

    Association of Canadian Community Colleges, 2006

    2006-01-01

    Canadian society is undergoing a significant transformation, largely in response to the forces of globalization and the development of the knowledge/information economy. The key to the economic and social well being of Canada's diverse communities lies in the knowledge-and-skills base of its citizens. Canada must design policies and programs which…

  14. Academic Primer Series: Eight Key Papers about Education Theory

    PubMed Central

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M.; Krzyzaniak, Sara M.; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-01-01

    Introduction Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. Methods A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. Results These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. Conclusion This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice. PMID:28210367

  15. Antibiotic distribution channels in Thailand: results of key-informant interviews, reviews of drug regulations and database searches.

    PubMed

    Sommanustweechai, Angkana; Chanvatik, Sunicha; Sermsinsiri, Varavoot; Sivilaikul, Somsajee; Patcharanarumol, Walaiporn; Yeung, Shunmay; Tangcharoensathien, Viroj

    2018-02-01

    To analyse how antibiotics are imported, manufactured, distributed and regulated in Thailand. We gathered information, on antibiotic distribution in Thailand, in in-depth interviews - with 43 key informants from farms, health facilities, pharmaceutical and animal feed industries, private pharmacies and regulators- and in database and literature searches. In 2016-2017, licensed antibiotic distribution in Thailand involves over 700 importers and about 24 000 distributors - e.g. retail pharmacies and wholesalers. Thailand imports antibiotics and active pharmaceutical ingredients. There is no system for monitoring the distribution of active ingredients, some of which are used directly on farms, without being processed. Most antibiotics can be bought from pharmacies, for home or farm use, without a prescription. Although the 1987 Drug Act classified most antibiotics as "dangerous drugs", it only classified a few of them as prescription-only medicines and placed no restrictions on the quantities of antibiotics that could be sold to any individual. Pharmacists working in pharmacies are covered by some of the Act's regulations, but the quality of their dispensing and prescribing appears to be largely reliant on their competences. In Thailand, most antibiotics are easily and widely available from retail pharmacies, without a prescription. If the inappropriate use of active pharmaceutical ingredients and antibiotics is to be reduced, we need to reclassify and restrict access to certain antibiotics and to develop systems to audit the dispensing of antibiotics in the retail sector and track the movements of active ingredients.

  16. Using Observational Journals in an Introductory Astronomy Course

    NASA Astrophysics Data System (ADS)

    Sadler, P.

    2000-05-01

    The might of science is in its power to predict. Yet, students rarely are exposed to anything but others' stories concerning how nature behaves. Students do not experience the frustration and elation that discovery brings. For ten years, our introductory astronomy course has used observational journals as a key component in the learning process. Every night, as the planets, stars, and moon dance by, astronomy students use the opportunity to collect and analyze their own data describing heavenly motions. For most, finding the patterns in original data provides an opportunity to fashion and test their own predictive models for the first time in their lives. Such efforts provide an alternative to lecture and laboratory for mastering key scientific concepts and modifying student misconceptions. Students have learned how to represent visual information through a variety of graphs, built and improved their own measurement instruments, and drawn on artistic and writing skills. We will examine the steps required to make observational journals a productive learning activity: careful recordkeeping, classroom discussion, instructor feedback, and reflective writing. I will show examples of how students' work progress through increasing levels of cognitive sophistication that match well with learning theories.

  17. Information exchange networks for chronic illness care in primary care practices: an observational study

    PubMed Central

    2010-01-01

    Background Information exchange networks for chronic illness care may influence the uptake of innovations in patient care. Valid and feasible methods are needed to document and analyse information exchange networks in healthcare settings. This observational study aimed to examine the usefulness of methods to study information exchange networks in primary care practices, related to chronic heart failure, diabetes and chronic obstructive pulmonary disease. Methods The study was linked to a quality improvement project in the Netherlands. All health professionals in the practices were asked to complete a short questionnaire that documented their information exchange relations. Feasibility was determined in terms of response rates and reliability in terms of reciprocity of reports of receiving and providing information. For each practice, a number of network characteristics were derived for each of the chronic conditions. Results Ten of the 21 practices in the quality improvement project agreed to participate in this network study. The response rates were high in all but one of the participating practices. For the analysis, we used data from 67 health professionals from eight practices. The agreement between receiving and providing information was, on average, 65.6%. The values for density, centralization, hierarchy, and overlap of the information exchange networks showed substantial variation between the practices as well as between the chronic conditions. The most central individual in the information exchange network could be a nurse or a physician. Conclusions Further research is needed to refine the measure of information networks and to test the impact of network characteristics on the uptake of innovations. PMID:20205758

  18. A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays

    PubMed Central

    Jang, Seung-Jae; Lee, Young-Gu; Lee, Kwang-Hyung; Kim, Tai-Hoon; Jun, Moon-Seog

    2011-01-01

    These days, with the emergence of the concept of ubiquitous computing, sensor networks that collect, analyze and process all the information through the sensors have become of huge interest. However, sensor network technology fundamentally has wireless communication infrastructure as its foundation and thus has security weakness and limitations such as low computing capacity, power supply limitations and price. In this paper, and considering the characteristics of the sensor network environment, we propose a group key agreement method using a keyset pre-distribution of two-dimension arrays that should minimize the exposure of key and personal information. The key collision problems are resolved by utilizing a polygonal shape’s center of gravity. The method shows that calculating a polygonal shape’s center of gravity only requires a very small amount of calculations from the users. The simple calculation not only increases the group key generation efficiency, but also enhances the sense of security by protecting information between nodes. PMID:22164072

  19. Computing and Interpreting Fisher Information as a Metric of Sustainability: Regime Changes in the United States Air Quality

    EPA Science Inventory

    As a key tool in information theory, Fisher Information has been used to explore the observable behavior of a variety of systems. In particular, recent work has demonstrated its ability to assess the dynamic order of real and model systems. However, in order to solidify the use o...

  20. Practical private database queries based on a quantum-key-distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less

  1. A Comprehensive Algorithm for Approval of Health Technologies With, Without, or Only in Research: The Key Principles for Informing Coverage Decisions.

    PubMed

    Claxton, Karl; Palmer, Stephen; Longworth, Louise; Bojke, Laura; Griffin, Susan; Soares, Marta; Spackman, Eldon; Rothery, Claire

    The value of evidence about the performance of a technology and the value of access to a technology are central to policy decisions regarding coverage with, without, or only in research and managed entry (or risk-sharing) agreements. We aim to outline the key principles of what assessments are needed to inform "only in research" (OIR) or "approval with research" (AWR) recommendations, in addition to approval or rejection. We developed a comprehensive algorithm to inform the sequence of assessments and judgments that lead to different types of guidance: OIR, AWR, Approve, or Reject. This algorithm identifies the order in which assessments might be made, how similar guidance might be arrived at through different combinations of considerations, and when guidance might change. The key principles are whether the technology is expected to be cost-effective; whether the technology has significant irrecoverable costs; whether additional research is needed; whether research is possible with approval and whether there are opportunity costs that once committed by approval cannot be recovered; and whether there are effective price reductions. Determining expected cost-effectiveness is only a first step. In addition to AWR for technologies expected to be cost-effective and OIR for those not expected to be cost-effective, there are other important circumstances when OIR should be considered. These principles demonstrate that cost-effectiveness is a necessary but not sufficient condition for approval. Even when research is possible with approval, OIR may be appropriate when a technology is expected to be cost-effective due to significant irrecoverable costs. Copyright © 2016 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  2. Empowering Students to Make Sense of an Information-Saturated World: The Evolution of "Information Searching and Analysis"

    ERIC Educational Resources Information Center

    Wittebols, James H.

    2016-01-01

    How well students conduct research online is an increasing concern for educators at all levels, especially higher education. This paper describes the evolution of a course that examines confirmation bias, information searching, and the political economy of information as keys to becoming more information and media literate. After a key assignment…

  3. Report: Improvements Needed in Key EPA Information System Security Practices

    EPA Pesticide Factsheets

    Report #10-P-0146, June 15, 2010. Williams Adley found that EPA program offices lacked evidence that they planned and executed tests of information system security controls as required by federal requirements.

  4. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  5. A Global Capacity Building Vision for Societal Applications of Earth Observing Systems and Data: Key Questions and Recommendations

    NASA Technical Reports Server (NTRS)

    Hossain, Faisal; Serrat-Capdevila, Aleix; Granger, Stephanie; Thomas, Amy; Saah, David; Ganz, David; Mugo, Robinson; Murthy, M. S. R.; Ramos, Victor Hugo; Kirschbaum, Dalia; hide

    2016-01-01

    Capacity building using Earth observing (EO) systems and data (i.e., from orbital and nonorbital platforms) to enable societal applications includes the network of human, nonhuman, technical, nontechnical, hardware, and software dimensions that are necessary to successfully cross the valley [of death; see NRC (2001)] between science and research (port of departure) and societal application (port of arrival). In many parts of the world (especially where ground-based measurements are scarce or insufficient), applications of EO data still struggle for longevity or continuity for a variety of reasons, foremost among them being the lack of resilient capacity. An organization is said to have resilient capacity when it can retain and continue to build capacity in the face of unexpected shocks or stresses. Stresses can include intermittent power and limited Internet bandwidth, constant need for education on ever-increasing complexity of EO systems and data, communication challenges between the ports of departure and arrival (especially across time zones), and financial limitations and instability. Shocks may also include extreme events such as disasters and losing key staff with technical and institutional knowledge.

  6. Evaluation of the MyWellness Key accelerometer.

    PubMed

    Herrmann, S D; Hart, T L; Lee, C D; Ainsworth, B E

    2011-02-01

    to examine the concurrent validity of the Technogym MyWellness Key accelerometer against objective and subjective physical activity (PA) measures. randomised, cross-sectional design with two phases. The laboratory phase compared the MyWellness Key with the ActiGraph GT1M and the Yamax SW200 Digiwalker pedometer during graded treadmill walking, increasing speed each minute. The free-living phase compared the MyWellness Key with the ActiGraph, Digiwalker, Bouchard Activity cord (BAR) and Global Physical Activity Questionnaire (GPAQ) for seven continuous days. Data were analysed using Spearman rank-order correlation coefficients for all comparisons. laboratory and free-living phases. sixteen participants randomly stratified from 41 eligible respondents by sex (n=8 men; n=8 women) and PA levels (n=4 low, n=8 middle and n=4 high active). there was a strong association between the MyWellness Key and the ActiGraph accelerometer during controlled graded treadmill walking (r=0.91, p<0.01) and in free-living settings (r=0.73-0.76 for light to vigorous PA, respectively, p<0.01). No associations were observed between the MyWellness Key and the BAR and GPAQ (p>0.05). the MyWellness Key has a high concurrent validity with the ActiGraph accelerometer to detect PA in both controlled laboratory and free-living settings.

  7. Biologic relativity: Who is the observer and what is observed?

    PubMed

    Torday, John S; Miller, William B

    2016-05-01

    When quantum physics and biological phenomena are analogously explored, it emerges that biologic causation must also be understood independently of its overt appearance. This is similar to the manner in which Bohm characterized the explicate versus the implicate order as overlapping frames of ambiguity. Placed in this context, the variables affecting epigenetic inheritance can be properly assessed as a key mechanistic principle of evolution that significantly alters our understanding of homeostasis, pleiotropy, and heterochrony, and the purposes of sexual reproduction. Each of these become differing manifestations of a new biological relativity in which biologic space-time becomes its own frame. In such relativistic cellular contexts, it is proper to question exactly who has observer status, and who and what are being observed. Consideration within this frame reduces biology to cellular information sharing through cell-cell communication to resolve ambiguities at every scope and scale. In consequence, it becomes implicit that eukaryotic evolution derives from the unicellular state, remaining consistently adherent to it in a continuous evolutionary arc based upon elemental, non-stochastic physiologic first principles. Furthermore, the entire cell including its cytoskeletal apparatus and membranes that participate in the resolution of biological uncertainties must be considered as having equivalent primacy with genomes in evolutionary terms. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Designing Health Websites Based on Users’ Web-Based Information-Seeking Behaviors: A Mixed-Method Observational Study

    PubMed Central

    Pang, Patrick Cheong-Iao; Verspoor, Karin; Pearce, Jon

    2016-01-01

    Background Laypeople increasingly use the Internet as a source of health information, but finding and discovering the right information remains problematic. These issues are partially due to the mismatch between the design of consumer health websites and the needs of health information seekers, particularly the lack of support for “exploring” health information. Objective The aim of this research was to create a design for consumer health websites by supporting different health information–seeking behaviors. We created a website called Better Health Explorer with the new design. Through the evaluation of this new design, we derive design implications for future implementations. Methods Better Health Explorer was designed using a user-centered approach. The design was implemented and assessed through a laboratory-based observational study. Participants tried to use Better Health Explorer and another live health website. Both websites contained the same content. A mixed-method approach was adopted to analyze multiple types of data collected in the experiment, including screen recordings, activity logs, Web browsing histories, and audiotaped interviews. Results Overall, 31 participants took part in the observational study. Our new design showed a positive result for improving the experience of health information seeking, by providing a wide range of information and an engaging environment. The results showed better knowledge acquisition, a higher number of page reads, and more query reformulations in both focused and exploratory search tasks. In addition, participants spent more time to discover health information with our design in exploratory search tasks, indicating higher engagement with the website. Finally, we identify 4 design considerations for designing consumer health websites and health information–seeking apps: (1) providing a dynamic information scope; (2) supporting serendipity; (3) considering trust implications; and (4) enhancing interactivity

  9. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  10. Secret-key-assisted private classical communication capacity over quantum channels

    NASA Astrophysics Data System (ADS)

    Hsieh, Min-Hsiu; Luo, Zhicheng; Brun, Todd

    2008-10-01

    We prove a regularized formula for the secret-key-assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak (e-print arXiv:quant-ph/0512015) on entanglement-assisted quantum communication capacity . This formula provides a family protocol, the private father protocol, under the resource inequality framework that includes private classical communication without secret-key assistance as a child protocol.

  11. Testing the Value of Information of Climate Change Indicators that use Earth Observations

    NASA Astrophysics Data System (ADS)

    Kenney, M. A.

    2012-12-01

    Indicators are usually thought of as measurements or calculations that represent important features of the status, trend, or performance of a system of interest (e.g. the economy, agriculture, air quality). They are often used for the most practical of reasons - one cannot measure everything important about systems of interest, so there is a practical need to identify major features that can be reported periodically and used to guide both research and decisions (National Research Council (NRC). 2000. Ecological Indicators for the Nation. National Academy Press. Washington, DC). The use of indicators to track the status and trends of many features of environmental or economic performance, quality of life, and a host of other social concerns is embedded in the fabric of our everyday lives. Businesses, governments, and consumers regularly use the common economic indices - e.g. the unemployment index or consumer price index - as guides for decision-making on investments and hiring. There is an analogous demand for indicators of environmental conditions and performance - everything from agricultural yields to air and water quality to weather and climate - that are currently less publicly visible than the common economic indicators, but that can have critically important uses in such areas as natural resource management, improvement of environmental quality, emergency planning, and infrastructure development. A number of these environmental indicators, be it physical or ecological, use a range of data sources including earth observations. Despite the extensive development and use of indicators, there is little testing of these indicators to assure that they indeed provide the assumed positive information benefit. This is particularly concerning because if these indicators are systematically misunderstood by the intended audience or a sub-group of that audience, such individuals could make decisions that are consistent with their incorrect understanding of the indicator

  12. Key Factors in Development of Man-Made and Natural Ecosystems

    NASA Astrophysics Data System (ADS)

    Pechurkin, N. S.

    1999-01-01

    Key factors of ecosystem functioning are of the same nature for artificial and natural types. An hierarchical approach gives the opportunity for estimation of the quantitative behavior of both individual links and the system as a whole. At the organismic level we can use interactions of studied macroorganisms (man, animal, higher plant) with selected microorganisms as key indicating factors of the organisms immune status. The most informative factor for the population/community level is an age structure of populations and relationships of domination/elimination. The integrated key factors of the ecosystems level are productivity and rates of cycling of the limiting substances. The key factors approach is of great value for growth regulations and monitoring the state of any ecosystem, including the life support system (LSS)-type.

  13. Measuring the Social Competence of Preschool Children with Specific Language Impairment: Correspondence among Informant Ratings and Behavioral Observations

    ERIC Educational Resources Information Center

    McCabe, Paul C.; Marshall, Debra J.

    2006-01-01

    The correspondence between direct observation and informant ratings of preschool children with specific language impairment (SLI) was investigated. Preschoolers with and without SLI were observed during free play using the "Social Interactive Coding System" (SICS; Rice, Sell, & Hadley, 1990). In addition, teachers and parents…

  14. Practical, computer-aided registration of multiple, three-dimensional, magnetic-resonance observations of the human brain

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Diegert, C.; Sanders, J.A.; Orrison, W.W. Jr.

    1992-12-31

    Researchers working with MR observations generally agree that far more information is available in a volume (3D) observation than is considered for diagnosis. The key to the new alignment method is in basing it on available information on surfaces. Using the skin surface is effective a robust algorithm can reliably extract this surface from almost any scan of the head, and a human operator`s exquisite sensitivity to facial features is allows him to manually align skin surfaces with precision. Following the definitions, we report on a preliminary experiment where we align three MR observations taken during a single MR examination,more » each weighting arterial, venous, and tissue features. When accurately aligned, a neurosurgeon can use these features as anatomical landmarks for planning and executing interventional procedures.« less

  15. Successful Implementation of Clinical Information Technology: Seven Key Lessons from CPOE.

    PubMed

    Gellert, G A; Hill, V; Bruner, K; Maciaz, G; Saucedo, L; Catzoela, L; Ramirez, R; Jacobs, W J; Nguyen, P; Patel, L; Webster, S L

    2015-01-01

    To identify and describe the most critical strategic and operational contributors to the successful implementation of clinical information technologies, as deployed within a moderate sized system of U.S. community hospitals. CHRISTUS Health is a multi-state system comprised of more than 350 services and 60 hospitals with over 9 000 physicians. The Santa Rosa region of CHRISTUS Health, located in greater San Antonio, Texas is comprised of three adult community hospital facilities and one Children's hospital each with bed capacities of 142-180. Computerized Patient Order Entry (CPOE) was first implemented in 2012 within a complex market environment. The Santa Rosa region has 2 417 credentialed physicians and 263 mid-level allied health professionals. This report focuses on the seven most valuable strategies deployed by the Health Informatics team in a large four hospital CHRISTUS region to achieve strong CPOE adoption and critical success lessons learned. The findings are placed within the context of the literature describing best practices in health information technology implementation. While the elements described involved discrete de novo process generation to support implementation and operations, collectively they represent the creation of a new customer-centric service culture in our Health Informatics team, which has served as a foundation for ensuring strong clinical information technology adoption beyond CPOE. The seven success factors described are not limited in their value to and impact on CPOE adoption, but generalize to - and can advance success in - varied other clinical information technology implementations across diverse hospitals. A number of these factors are supported by reports in the literature of other institutions' successful implementations of CPOE and other clinical information technologies, and while not prescriptive to other settings, may be adapted to yield value elsewhere.

  16. Observing and modelling phytoplankton community structure in the North Sea

    NASA Astrophysics Data System (ADS)

    Ford, David A.; van der Molen, Johan; Hyder, Kieran; Bacon, John; Barciela, Rosa; Creach, Veronique; McEwan, Robert; Ruardij, Piet; Forster, Rodney

    2017-03-01

    Phytoplankton form the base of the marine food chain, and knowledge of phytoplankton community structure is fundamental when assessing marine biodiversity. Policy makers and other users require information on marine biodiversity and other aspects of the marine environment for the North Sea, a highly productive European shelf sea. This information must come from a combination of observations and models, but currently the coastal ocean is greatly under-sampled for phytoplankton data, and outputs of phytoplankton community structure from models are therefore not yet frequently validated. This study presents a novel set of in situ observations of phytoplankton community structure for the North Sea using accessory pigment analysis. The observations allow a good understanding of the patterns of surface phytoplankton biomass and community structure in the North Sea for the observed months of August 2010 and 2011. Two physical-biogeochemical ocean models, the biogeochemical components of which are different variants of the widely used European Regional Seas Ecosystem Model (ERSEM), were then validated against these and other observations. Both models were a good match for sea surface temperature observations, and a reasonable match for remotely sensed ocean colour observations. However, the two models displayed very different phytoplankton community structures, with one better matching the in situ observations than the other. Nonetheless, both models shared some similarities with the observations in terms of spatial features and inter-annual variability. An initial comparison of the formulations and parameterizations of the two models suggests that diversity between the parameter settings of model phytoplankton functional types, along with formulations which promote a greater sensitivity to changes in light and nutrients, is key to capturing the observed phytoplankton community structure. These findings will help inform future model development, which should be coupled

  17. Decoy-state quantum key distribution with a leaky source

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Curty, Marcos; Lucamarini, Marco

    2016-06-01

    In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems.

  18. Too much information? A document analysis of sport safety resources from key organisations

    PubMed Central

    Finch, Caroline F

    2016-01-01

    Objectives The field of sport injury prevention has seen a marked increase in published research in recent years, with concomitant proliferation of lay sport safety resources, such as policies, fact sheets and posters. The aim of this study was to catalogue and categorise the number, type and topic focus of sport safety resources from a representative set of key organisations. Design Cataloguing and qualitative document analysis of resources available from the websites of six stakeholder organisations in Australia. Setting This study was part of a larger investigation, the National Guidance for Australian Football Partnerships and Safety (NoGAPS) project. Participants The NoGAPS study provided the context for a purposive sampling of six organisations involved in the promotion of safety in Australian football. These partners are recognised as being highly representative of organisations at national and state level that reflect similarly in their goals around sport safety promotion in Australia. Results The catalogue comprised 284 resources. More of the practical and less prescriptive types of resources, such as fact sheets, than formal policies were found. Resources for the prevention of physical injuries were the predominant sport safety issue addressed, with risk management, environmental issues and social behaviours comprising other categories. Duplication of resources for specific safety issues, within and across organisations, was found. Conclusions People working within sport settings have access to a proliferation of resources, which creates a potential rivalry for sourcing of injury prevention information. Important issues that are likely to influence the uptake of safety advice by the general sporting public include the sheer number of resources available, and the overlap and duplication of resources addressing the same issues. The existence of a large number of resources from reputable organisations does not mean that they are necessarily evidence based

  19. Does observability affect prosociality?

    PubMed Central

    Lawrence, Claire

    2018-01-01

    The observation of behaviour is a key theoretical parameter underlying a number of models of prosociality. However, the empirical findings showing the effect of observability on prosociality are mixed. In this meta-analysis, we explore the boundary conditions that may account for this variability, by exploring key theoretical and methodological moderators of this link. We identified 117 papers yielding 134 study level effects (total n = 788 164) and found a small but statistically significant, positive association between observability and prosociality (r = 0.141, 95% confidence interval = 0.106, 0.175). Moderator analysis showed that observability produced stronger effects on prosociality: (i) in the presence of passive observers (i.e. people whose role was to only observe participants) versus perceptions of being watched, (ii) when participants’ decisions were consequential (versus non-consequential), (iii) when the studies were performed in the laboratory (as opposed to in the field/online), (iv) when the studies used repeated measures (instead of single games), and (v) when the studies involved social dilemmas (instead of bargaining games). These effects show the conditions under which observability effects on prosociality will be maximally observed. We describe the theoretical and practical significance of these results. PMID:29593114

  20. Does observability affect prosociality?

    PubMed

    Bradley, Alex; Lawrence, Claire; Ferguson, Eamonn

    2018-03-28

    The observation of behaviour is a key theoretical parameter underlying a number of models of prosociality. However, the empirical findings showing the effect of observability on prosociality are mixed. In this meta-analysis, we explore the boundary conditions that may account for this variability, by exploring key theoretical and methodological moderators of this link. We identified 117 papers yielding 134 study level effects (total n = 788 164) and found a small but statistically significant, positive association between observability and prosociality ( r = 0.141, 95% confidence interval = 0.106, 0.175). Moderator analysis showed that observability produced stronger effects on prosociality: (i) in the presence of passive observers (i.e. people whose role was to only observe participants) versus perceptions of being watched, (ii) when participants' decisions were consequential (versus non-consequential), (iii) when the studies were performed in the laboratory (as opposed to in the field/online), (iv) when the studies used repeated measures (instead of single games), and (v) when the studies involved social dilemmas (instead of bargaining games). These effects show the conditions under which observability effects on prosociality will be maximally observed. We describe the theoretical and practical significance of these results. © 2018 The Authors.

  1. Medical Device Guidebook: A browser information resource for medical device users.

    PubMed

    Clarkson, Douglas M

    2017-03-01

    A web based information resource - the 'Medical Device Guidebook' - for the enabling of safe use of medical devices is described. Medical devices are described within a 'catalogue' of specific models and information on a specific model is provided within a consistent set of information 'keys'. These include 'user manuals', 'points of caution', 'clinical use framework', 'training/assessment material', 'frequently asked questions', 'authorised user comments' and 'consumables'. The system allows identification of known risk/hazards associated with specific devices, triggered, for example, by national alerts or locally raised safety observations. This provides a mechanism for more effective briefing of equipment users on the associated hazards of equipment. A feature of the system is the inclusion of a specific 'Operational Procedure' for each device, where the lack of this focus is shown in the literature to often be a key factor in equipment misuse and associated patient injury. The 'Guidebook' provides a mechanism for the development of an information resource developed within local clinical networks and encourages a consistent approach to medical device use. Copyright © 2017 IPEM. Published by Elsevier Ltd. All rights reserved.

  2. What Principals Do to Improve Teaching and Learning: Comparing the Use of Informal Classroom Observations in Two School Districts

    ERIC Educational Resources Information Center

    Ing, Marsha

    2013-01-01

    Informally observing classrooms is one way that principals can help improve teaching and learning. This study describes the variability of principals' classroom observations across schools and identifies the conditions under which observations relate to the instructional climate in some schools and not others. Data for this study come from…

  3. Antibiotic distribution channels in Thailand: results of key-informant interviews, reviews of drug regulations and database searches

    PubMed Central

    Chanvatik, Sunicha; Sermsinsiri, Varavoot; Sivilaikul, Somsajee; Patcharanarumol, Walaiporn; Yeung, Shunmay; Tangcharoensathien, Viroj

    2018-01-01

    Abstract Objective To analyse how antibiotics are imported, manufactured, distributed and regulated in Thailand. Methods We gathered information, on antibiotic distribution in Thailand, in in-depth interviews – with 43 key informants from farms, health facilities, pharmaceutical and animal feed industries, private pharmacies and regulators– and in database and literature searches. Findings In 2016–2017, licensed antibiotic distribution in Thailand involves over 700 importers and about 24 000 distributors – e.g. retail pharmacies and wholesalers. Thailand imports antibiotics and active pharmaceutical ingredients. There is no system for monitoring the distribution of active ingredients, some of which are used directly on farms, without being processed. Most antibiotics can be bought from pharmacies, for home or farm use, without a prescription. Although the 1987 Drug Act classified most antibiotics as “dangerous drugs”, it only classified a few of them as prescription-only medicines and placed no restrictions on the quantities of antibiotics that could be sold to any individual. Pharmacists working in pharmacies are covered by some of the Act’s regulations, but the quality of their dispensing and prescribing appears to be largely reliant on their competences. Conclusion In Thailand, most antibiotics are easily and widely available from retail pharmacies, without a prescription. If the inappropriate use of active pharmaceutical ingredients and antibiotics is to be reduced, we need to reclassify and restrict access to certain antibiotics and to develop systems to audit the dispensing of antibiotics in the retail sector and track the movements of active ingredients. PMID:29403113

  4. Quantum key distribution session with 16-dimensional photonic states.

    PubMed

    Etcheverry, S; Cañas, G; Gómez, E S; Nogueira, W A T; Saavedra, C; Xavier, G B; Lima, G

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.

  5. Quantum key distribution session with 16-dimensional photonic states

    NASA Astrophysics Data System (ADS)

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-07-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.

  6. High-resolution urban observation network for user-specific meteorological information service in the Seoul Metropolitan Area, South Korea

    NASA Astrophysics Data System (ADS)

    Park, Moon-Soo; Park, Sung-Hwa; Chae, Jung-Hoon; Choi, Min-Hyeok; Song, Yunyoung; Kang, Minsoo; Roh, Joon-Woo

    2017-04-01

    To improve our knowledge of urban meteorology, including those processes applicable to high-resolution meteorological models in the Seoul Metropolitan Area (SMA), the Weather Information Service Engine (WISE) Urban Meteorological Observation System (UMS-Seoul) has been designed and installed. The UMS-Seoul incorporates 14 surface energy balance (EB) systems, 7 surface-based three-dimensional (3-D) meteorological observation systems and applied meteorological (AP) observation systems, and the existing surface-based meteorological observation network. The EB system consists of a radiation balance system, sonic anemometers, infrared CO2/H2O gas analyzers, and many sensors measuring the wind speed and direction, temperature and humidity, precipitation, and air pressure. The EB-produced radiation, meteorological, and turbulence data will be used to quantify the surface EB according to land use and to improve the boundary-layer and surface processes in meteorological models. The 3-D system, composed of a wind lidar, microwave radiometer, aerosol lidar, or ceilometer, produces the cloud height, vertical profiles of backscatter by aerosols, wind speed and direction, temperature, humidity, and liquid water content. It will be used for high-resolution reanalysis data based on observations and for the improvement of the boundary-layer, radiation, and microphysics processes in meteorological models. The AP system includes road weather information, mosquito activity, water quality, and agrometeorological observation instruments. The standardized metadata for networks and stations are documented and renewed periodically to provide a detailed observation environment. The UMS-Seoul data are designed to support real-time acquisition and display and automatically quality check within 10 min from observation. After the quality check, data can be distributed to relevant potential users such as researchers and policy makers. Finally, two case studies demonstrate that the observed data

  7. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  8. NASA's Earth Observing System Data and Information System - Many Mechanisms for On-Going Evolution

    NASA Astrophysics Data System (ADS)

    Ramapriyan, H. K.

    2012-12-01

    NASA's Earth Observing System Data and Information System has been serving a broad user community since August 1994. As a long-lived multi-mission system serving multiple scientific disciplines and a diverse user community, EOSDIS has been evolving continuously. It has had and continues to have many forms of community input to help with this evolution. Early in its history, it had inputs from the EOSDIS Advisory Panel, benefited from the reviews by various external committees and evolved into the present distributed architecture with discipline-based Distributed Active Archive Centers (DAACs), Science Investigator-led Processing Systems and a cross-DAAC search and data access capability. EOSDIS evolution has been helped by advances in computer technology, moving from an initially planned supercomputing environment to SGI workstations to Linux Clusters for computation and from near-line archives of robotic silos with tape cassettes to RAID-disk-based on-line archives for storage. The network capacities have increased steadily over the years making delivery of data on media almost obsolete. The advances in information systems technologies have been having an even greater impact on the evolution of EOSDIS. In the early days, the advent of the World Wide Web came as a game-changer in the operation of EOSDIS. The metadata model developed for the EOSDIS Core System for representing metadata from EOS standard data products has had an influence on the Federal Geographic Data Committee's metadata content standard and the ISO metadata standards. The influence works both ways. As ISO 19115 metadata standard has developed in recent years, EOSDIS is reviewing its metadata to ensure compliance with the standard. Improvements have been made in the cross-DAAC search and access of data using the centralized metadata clearing house (EOS Clearing House - ECHO) and the client Reverb. Given the diversity of the Earth science disciplines served by the DAACs, the DAACs have developed a

  9. Advanced Information Technology Investments at the NASA Earth Science Technology Office

    NASA Astrophysics Data System (ADS)

    Clune, T.; Seablom, M. S.; Moe, K.

    2012-12-01

    The NASA Earth Science Technology Office (ESTO) regularly makes investments for nurturing advanced concepts in information technology to enable rapid, low-cost acquisition, processing and visualization of Earth science data in support of future NASA missions and climate change research. In 2012, the National Research Council published a mid-term assessment of the 2007 decadal survey for future spacemissions supporting Earth science and applications [1]. The report stated, "Earth sciences have advanced significantly because of existing observational capabilities and the fruit of past investments, along with advances in data and information systems, computer science, and enabling technologies." The report found that NASA had responded favorably and aggressively to the decadal survey and noted the role of the recent ESTO solicitation for information systems technologies that partnered with the NASA Applied Sciences Program to support the transition into operations. NASA's future missions are key stakeholders for the ESTO technology investments. Also driving these investments is the need for the Agency to properly address questions regarding the prediction, adaptation, and eventual mitigation of climate change. The Earth Science Division has championed interdisciplinary research, recognizing that the Earth must be studied as a complete system in order toaddress key science questions [2]. Information technology investments in the low-mid technology readiness level (TRL) range play a key role in meeting these challenges. ESTO's Advanced Information Systems Technology (AIST) program invests in higher risk / higher reward technologies that solve the most challenging problems of the information processing chain. This includes the space segment, where the information pipeline begins, to the end user, where knowledge is ultimatelyadvanced. The objectives of the program are to reduce the risk, cost, size, and development time of Earth Science space-based and ground

  10. Retrieval of land parameters by multi-sensor information using the Earth Observation Land Data Assimilation System

    NASA Astrophysics Data System (ADS)

    Chernetskiy, Maxim; Gobron, Nadine; Gomez-Dans, Jose; Disney, Mathias

    2016-07-01

    Upcoming satellite constellations will substantially increase the amount of Earth Observation (EO) data, and presents us with the challenge of consistently using all these available information to infer the state of the land surface, parameterised through Essential Climate Variables (ECVs). A promising approach to this problem is the use of physically based models that describe the processes that generate the images, using e.g. radiative transfer (RT) theory. However, these models need to be inverted to infer the land surface parameters from the observations, and there is often not enough information in the EO data to satisfactorily achieve this. Data assimilation (DA) approaches supplement the EO data with prior information in the form of models or prior parameter distributions, and have the potential for solving the inversion problem. These methods however are computationally expensive. In this study, we show the use of fast surrogate models of the RT codes (emulators) based on Gaussian Processes (Gomez-Dans et al, 2016) embedded with the Earth Observation Land Data Assimilation System (EO-LDAS) framework (Lewis et al 2012) in order to estimate the surface of the land surface from a heterogeneous set of optical observations. The study uses time series of moderate spatial resolution observations from MODIS (250 m), MERIS (300 m) and MISR (275 m) over one site to infer the temporal evolution of a number of land surface parameters (and associated uncertainties) related to vegetation: leaf area index (LAI), leaf chlorophyll content, etc. These parameter estimates are then used as input to an RT model (semidiscrete or PROSAIL, for example) to calculate fluxes such as broad band albedo or fAPAR. The study demonstrates that blending different sensors in a consistent way using physical models results in a rich and coherent set of land surface parameters retrieved, with quantified uncertainties. The use of RT models also allows for the consistent prediction of fluxes

  11. Considering the Informal Jewish Educator

    ERIC Educational Resources Information Center

    Winer, Laura Novak

    2007-01-01

    Informal Jewish education can and must put greater focus on the goals of education. While socialization is a key component, it is not its sole goal. Informal Jewish education must make more central deep, serious Jewish learning in which learners can experience moments of transcendence, connection, and transformation. A key to reaching this goal…

  12. Key Relation Extraction from Biomedical Publications.

    PubMed

    Huang, Lan; Wang, Ye; Gong, Leiguang; Kulikowski, Casimir; Bai, Tian

    2017-01-01

    Within the large body of biomedical knowledge, recent findings and discoveries are most often presented as research articles. Their number has been increasing sharply since the turn of the century, presenting ever-growing challenges for search and discovery of knowledge and information related to specific topics of interest, even with the help of advanced online search tools. This is especially true when the goal of a search is to find or discover key relations between important concepts or topic words. We have developed an innovative method for extracting key relations between concepts from abstracts of articles. The method focuses on relations between keywords or topic words in the articles. Early experiments with the method on PubMed publications have shown promising results in searching and discovering keywords and their relationships that are strongly related to the main topic of an article.

  13. Uncertainty in Citizen Science observations: from measurement to user perception

    NASA Astrophysics Data System (ADS)

    Lahoz, William; Schneider, Philipp; Castell, Nuria

    2016-04-01

    Citizen Science activities concern general public engagement in scientific research activities when citizens actively contribute to science either with their intellectual effort or surrounding knowledge or with their tools and resources. The advent of technologies such as the Internet and smartphones, and the growth in their usage, has significantly increased the potential benefits from Citizen Science activities. Citizen Science observations from low-cost sensors, smartphones and Citizen Observatories, provide a novel and recent development in platforms for observing the Earth System, with the opportunity to extend the range of observational platforms available to society to spatio-temporal scales (10-100s m; 1 hr or less) highly relevant to citizen needs. The potential value of Citizen Science is high, with applications in science, education, social aspects, and policy aspects, but this potential, particularly for citizens and policymakers, remains largely untapped. Key areas where Citizen Science data start to have demonstrable benefits include GEOSS Societal Benefit Areas such as Health and Weather. Citizen Science observations have many challenges, including simulation of smaller spatial scales, noisy data, combination with traditional observational methods (satellite and in situ data), and assessment, representation and visualization of uncertainty. Within these challenges, that of the assessment and representation of uncertainty and its communication to users is fundamental, as it provides qualitative and/or quantitative information that influences the belief users will have in environmental information. This presentation will discuss the challenges in assessment and representation of uncertainty in Citizen Science observations, its communication to users, including the use of visualization, and the perception of this uncertainty information by users of Citizen Science observations.

  14. Key Odorants Regulate Food Attraction in Drosophila melanogaster

    PubMed Central

    Giang, Thomas; He, Jianzheng; Belaidi, Safaa; Scholz, Henrike

    2017-01-01

    In insects, the search for food is highly dependent on olfactory sensory input. Here, we investigated whether a single key odorant within an odor blend or the complexity of the odor blend influences the attraction of Drosophila melanogaster to a food source. A key odorant is defined as an odorant that elicits a difference in the behavioral response when two similar complex odor blends are offered. To validate that the observed behavioral responses were elicited by olfactory stimuli, we used olfactory co-receptor Orco mutants. We show that within a food odor blend, ethanol functions as a key odorant. In addition to ethanol other odorants might serve as key odorants at specific concentrations. However, not all odorants are key odorants. The intensity of the odor background influences the attractiveness of the key odorants. Increased complexity is only more attractive in a concentration-dependent range for single compounds in a blend. Orco is necessary to discriminate between two similarly attractive odorants when offered as single odorants and in food odor blends, supporting the importance of single odorant recognition in odor blends. These data strongly indicate that flies use more than one strategy to navigate to a food odor source, depending on the availability of key odorants in the odor blend and the alternative odor offered. PMID:28928642

  15. Crew Earth Observations

    NASA Technical Reports Server (NTRS)

    Runco, Susan

    2009-01-01

    Crew Earth Observations (CEO) takes advantage of the crew in space to observe and photograph natural and human-made changes on Earth. The photographs record the Earth's surface changes over time, along with dynamic events such as storms, floods, fires and volcanic eruptions. These images provide researchers on Earth with key data to better understand the planet.

  16. The neural bases of key competencies of emotional intelligence.

    PubMed

    Krueger, Frank; Barbey, Aron K; McCabe, Kevin; Strenziok, Maren; Zamboni, Giovanna; Solomon, Jeffrey; Raymont, Vanessa; Grafman, Jordan

    2009-12-29

    Emotional intelligence (EI) refers to a set of competencies that are essential features of human social life. Although the neural substrates of EI are virtually unknown, it is well established that the prefrontal cortex (PFC) plays a crucial role in human social-emotional behavior. We studied a unique sample of combat veterans from the Vietnam Head Injury Study, which is a prospective, long-term follow-up study of veterans with focal penetrating head injuries. We administered the Mayer-Salovey-Caruso Emotional Intelligence Test as a valid standardized psychometric measure of EI behavior to examine two key competencies of EI: (i) Strategic EI as the competency to understand emotional information and to apply it for the management of the self and of others and (ii) Experiential EI as the competency to perceive emotional information and to apply it for the integration into thinking. The results revealed that key competencies underlying EI depend on distinct neural PFC substrates. First, ventromedial PFC damage diminishes Strategic EI, and therefore, hinders the understanding and managing of emotional information. Second, dorsolateral PFC damage diminishes Experiential EI, and therefore, hinders the perception and integration of emotional information. In conclusion, EI should be viewed as complementary to cognitive intelligence and, when considered together, provide a more complete understanding of human intelligence.

  17. The neural bases of key competencies of emotional intelligence

    PubMed Central

    Krueger, Frank; Barbey, Aron K.; McCabe, Kevin; Strenziok, Maren; Zamboni, Giovanna; Solomon, Jeffrey; Raymont, Vanessa; Grafman, Jordan

    2009-01-01

    Emotional intelligence (EI) refers to a set of competencies that are essential features of human social life. Although the neural substrates of EI are virtually unknown, it is well established that the prefrontal cortex (PFC) plays a crucial role in human social-emotional behavior. We studied a unique sample of combat veterans from the Vietnam Head Injury Study, which is a prospective, long-term follow-up study of veterans with focal penetrating head injuries. We administered the Mayer-Salovey-Caruso Emotional Intelligence Test as a valid standardized psychometric measure of EI behavior to examine two key competencies of EI: (i) Strategic EI as the competency to understand emotional information and to apply it for the management of the self and of others and (ii) Experiential EI as the competency to perceive emotional information and to apply it for the integration into thinking. The results revealed that key competencies underlying EI depend on distinct neural PFC substrates. First, ventromedial PFC damage diminishes Strategic EI, and therefore, hinders the understanding and managing of emotional information. Second, dorsolateral PFC damage diminishes Experiential EI, and therefore, hinders the perception and integration of emotional information. In conclusion, EI should be viewed as complementary to cognitive intelligence and, when considered together, provide a more complete understanding of human intelligence. PMID:20080795

  18. Measurement-Device-Independent Quantum Key Distribution over 200 km

    NASA Astrophysics Data System (ADS)

    Tang, Yan-Lin; Yin, Hua-Lei; Chen, Si-Jing; Liu, Yang; Zhang, Wei-Jun; Jiang, Xiao; Zhang, Lu; Wang, Jian; You, Li-Xing; Guan, Jian-Yu; Yang, Dong-Xu; Wang, Zhen; Liang, Hao; Zhang, Zhen; Zhou, Nan; Ma, Xiongfeng; Chen, Teng-Yun; Zhang, Qiang; Pan, Jian-Wei

    2014-11-01

    Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon detectors. Recently, several proof-of-principle demonstrations of MDIQKD have been achieved. Those experiments, although novel, are implemented through limited distance with a key rate less than 0.1 bit /s . Here, by developing a 75 MHz clock rate fully automatic and highly stable system and superconducting nanowire single-photon detectors with detection efficiencies of more than 40%, we extend the secure transmission distance of MDIQKD to 200 km and achieve a secure key rate 3 orders of magnitude higher. These results pave the way towards a quantum network with measurement-device-independent security.

  19. Faked state attacks on realistic round robin DPS quantum key distribution systems and countermeasure

    NASA Astrophysics Data System (ADS)

    Iwakoshi, T.

    2015-05-01

    In May 2014, a new quantum key distribution protocol named "Round Robin Differential-Phase-Shift Quantum Key Distribution (RR DPS QKD)" was proposed. It has a special feature that the key consumption via privacy amplification is a small constant because RR DPS QKD guarantees its security by information causality, not by information-disturbance trade-off. Therefore, the authors claimed that RR DPS QKD systems does not need to monitor the disturbance by an attacker in the quantum channel. However, this study shows that a modified Faked-State Attack (or so-called bright illumination attack) can hack a RR DPS QKD system almost perfectly if it is implemented with realistic detectors even information-causality guarantees the security of RR DPS QKD protocol. Therefore, this study also proposes a possible Measurement-Device-Independent RR DPS QKD system to avoid the modified Faked-State Attack.

  20. A New Three Dimensional Based Key Generation Technique in AVK

    NASA Astrophysics Data System (ADS)

    Banerjee, Subhasish; Dutta, Manash Pratim; Bhunia, Chandan Tilak

    2017-08-01

    In modern era, ensuring high order security becomes one and only objective of computer networks. From the last few decades, many researchers have given their contributions to achieve the secrecy over the communication channel. In achieving perfect security, Shannon had done the pioneer work on perfect secret theorem and illustrated that secrecy of the shared information can be maintained if the key becomes variable in nature instead of static one. In this regard, a key generation technique has been proposed where the key can be changed every time whenever a new block of data needs to be exchanged. In our scheme, the keys not only vary in bit sequences but also in size. The experimental study is also included in this article to prove the correctness and effectiveness of our proposed technique.

  1. A Detailed Data-Driven Network Model of Prefrontal Cortex Reproduces Key Features of In Vivo Activity

    PubMed Central

    Hass, Joachim; Hertäg, Loreen; Durstewitz, Daniel

    2016-01-01

    The prefrontal cortex is centrally involved in a wide range of cognitive functions and their impairment in psychiatric disorders. Yet, the computational principles that govern the dynamics of prefrontal neural networks, and link their physiological, biochemical and anatomical properties to cognitive functions, are not well understood. Computational models can help to bridge the gap between these different levels of description, provided they are sufficiently constrained by experimental data and capable of predicting key properties of the intact cortex. Here, we present a detailed network model of the prefrontal cortex, based on a simple computationally efficient single neuron model (simpAdEx), with all parameters derived from in vitro electrophysiological and anatomical data. Without additional tuning, this model could be shown to quantitatively reproduce a wide range of measures from in vivo electrophysiological recordings, to a degree where simulated and experimentally observed activities were statistically indistinguishable. These measures include spike train statistics, membrane potential fluctuations, local field potentials, and the transmission of transient stimulus information across layers. We further demonstrate that model predictions are robust against moderate changes in key parameters, and that synaptic heterogeneity is a crucial ingredient to the quantitative reproduction of in vivo-like electrophysiological behavior. Thus, we have produced a physiologically highly valid, in a quantitative sense, yet computationally efficient PFC network model, which helped to identify key properties underlying spike time dynamics as observed in vivo, and can be harvested for in-depth investigation of the links between physiology and cognition. PMID:27203563

  2. Entropy Driven Self-Assembly in Charged Lock-Key Particles.

    PubMed

    Odriozola, Gerardo; Lozada-Cassou, Marcelo

    2016-07-07

    In this work we study the lock-key model successfully used in supramolecular chemistry and particles self-assembly and gain further insight into the infinite diluted limit of the lock and key, depletant mediated, effective attraction. We discuss the depletant forces and entropy approaches to self-assembly and give details on the different contributions to the net force for a charged lock and key pair immersed in a solvent plus a primitive model electrolyte. We show a strong correlation of the force components behavior and the underlying processes of co-ion and solvent release from the cavity. In addition, we put into context the universal behavior observed for the energy-distance curves when changing the lock and key to solvent size ratio. Basically, we now show that this behavior is not always achieved and depends on the particular system geometry. Finally, we present a qualitative good agreement with experiments when changing the electrolyte concentration, valence, and cavity-key size ratio.

  3. Quantum cryptography using coherent states: Randomized encryption and key generation

    NASA Astrophysics Data System (ADS)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  4. Aerosol Retrievals from Proposed Satellite Bistatic Lidar Observations: Algorithm and Information Content

    NASA Astrophysics Data System (ADS)

    Alexandrov, M. D.; Mishchenko, M. I.

    2017-12-01

    Accurate aerosol retrievals from space remain quite challenging and typically involve solving a severely ill-posed inverse scattering problem. We suggested to address this ill-posedness by flying a bistatic lidar system. Such a system would consist of formation flying constellation of a primary satellite equipped with a conventional monostatic (backscattering) lidar and an additional platform hosting a receiver of the scattered laser light. If successfully implemented, this concept would combine the measurement capabilities of a passive multi-angle multi-spectral polarimeter with the vertical profiling capability of a lidar. Thus, bistatic lidar observations will be free of deficiencies affecting both monostatic lidar measurements (caused by the highly limited information content) and passive photopolarimetric measurements (caused by vertical integration and surface reflection).We present a preliminary aerosol retrieval algorithm for a bistatic lidar system consisting of a high spectral resolution lidar (HSRL) and an additional receiver flown in formation with it at a scattering angle of 165 degrees. This algorithm was applied to synthetic data generated using Mie-theory computations. The model/retrieval parameters in our tests were the effective radius and variance of the aerosol size distribution, complex refractive index of the particles, and their number concentration. Both mono- and bimodal aerosol mixtures were considered. Our algorithm allowed for definitive evaluation of error propagation from measurements to retrievals using a Monte Carlo technique, which involves random distortion of the observations and statistical characterization of the resulting retrieval errors. Our tests demonstrated that supplementing a conventional monostatic HSRL with an additional receiver dramatically increases the information content of the measurements and allows for a sufficiently accurate characterization of tropospheric aerosols.

  5. Taming Big Data Variety in the Earth Observing System Data and Information System

    NASA Technical Reports Server (NTRS)

    Lynnes, Christopher; Walter, Jeff

    2015-01-01

    Although the volume of the remote sensing data managed by the Earth Observing System Data and Information System is formidable, an oft-overlooked challenge is the variety of data. The diversity in satellite instruments, science disciplines and user communities drives cost as much or more as the data volume. Several strategies are used to tame this variety: data allocation to distinct centers of expertise; a common metadata repository for discovery, data format standards and conventions; and services that further abstract the variations in data.

  6. Fundamental rate-loss tradeoff for optical quantum key distribution.

    PubMed

    Takeoka, Masahiro; Guha, Saikat; Wilde, Mark M

    2014-10-24

    Since 1984, various optical quantum key distribution (QKD) protocols have been proposed and examined. In all of them, the rate of secret key generation decays exponentially with distance. A natural and fundamental question is then whether there are yet-to-be discovered optical QKD protocols (without quantum repeaters) that could circumvent this rate-distance tradeoff. This paper provides a major step towards answering this question. Here we show that the secret key agreement capacity of a lossy and noisy optical channel assisted by unlimited two-way public classical communication is limited by an upper bound that is solely a function of the channel loss, regardless of how much optical power the protocol may use. Our result has major implications for understanding the secret key agreement capacity of optical channels-a long-standing open problem in optical quantum information theory-and strongly suggests a real need for quantum repeaters to perform QKD at high rates over long distances.

  7. A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra; Srinivas, Jangirala; Mukhopadhyay, Sourav

    2014-10-01

    Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.'s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.'s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.'s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.'s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  8. Research on College English Teachers' Information Literacy in Information Environment

    ERIC Educational Resources Information Center

    Du, Yan-xia

    2017-01-01

    The new technology revolution based on Internet, information and communication technology has triggered an upsurge of educational information in the world, including English learning and teaching. The improvement of teacher's information literacy is the key to the success of the current educational informatization reform. From the perspectives of…

  9. Earth science information: Planning for the integration and use of global change information

    NASA Technical Reports Server (NTRS)

    Lousma, Jack R.

    1992-01-01

    The Consortium for International Earth Science Information Network (CIESIN) was founded in 1989 as a non-profit corporation dedicated to facilitating access to, use and understanding of global change information worldwide. The Consortium was created to cooperate and coordinate with organizations and researchers throughout the global change community to further access the most advanced technology, the latest scientific research, and the best information available for critical environmental decision making. CIESIN study efforts are guided by Congressional mandates to 'convene key present and potential users to assess the need for investment in integration of earth science information,' to 'outline the desirable pattern of interaction with the scientific and policy community,' and to 'develop recommendations and draft plans to achieve the appropriate level of effort in the use of earth science data for research and public policy purposes.' In addition, CIESIN is tasked by NASA to develop a data center that would extend the benefits of Earth Observing System (EOS) to the users of global change information related to human dimensions issues. For FY 1991, CIESIN focused on two main objectives. The first addressed the identification of information needs of global change research and non-research user groups worldwide. The second focused on an evaluation of the most efficient mechanisms for making this information available in usable forms.

  10. Quantum key distribution session with 16-dimensional photonic states

    PubMed Central

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD. PMID:23897033

  11. NASA Earth Observations (NEO): Data Access for Informal Education and Outreach

    NASA Technical Reports Server (NTRS)

    Ward, Kevin; Herring, David

    2005-01-01

    The NEO (NASA Earth Observations) web space is currently under development with the goal of significantly increasing the demand for NASA remote sensing data while dramatically simplifying public access to georeferenced images. NEO will target the unsophisticated, nontraditional data users who are currently underserved by the existing data ordering systems. These users will include formal and informal educators, museum and science center personnel, professional communicators, and citizen scientists and amateur Earth observers. Users will be able to view and manipulate georeferenced browse imagery and, if they desire, download directly or order the source HDF data from the data provider (e.g., NASA DAAC or science team) via a single, integrated interface. NE0 will accomplish this goal by anticipating users expectations and knowledge level, thus providing an interface that presents material to users in a more simplified manner, without relying upon the jargon/technical terminology that make even the identification of the appropriate data set a significant hurdle. NEO will also act as a gateway that manages users expectations by providing specific details about images and data formats, developing tutorials regarding the manipulation of georeferenced imagery and raw data, links to software tools and ensuring that users are able to get the image they want in the format they want as easily as possible.

  12. A Hierarchical Modulation Coherent Communication Scheme for Simultaneous Four-State Continuous-Variable Quantum Key Distribution and Classical Communication

    NASA Astrophysics Data System (ADS)

    Yang, Can; Ma, Cheng; Hu, Linxi; He, Guangqiang

    2018-06-01

    We present a hierarchical modulation coherent communication protocol, which simultaneously achieves classical optical communication and continuous-variable quantum key distribution. Our hierarchical modulation scheme consists of a quadrature phase-shifting keying modulation for classical communication and a four-state discrete modulation for continuous-variable quantum key distribution. The simulation results based on practical parameters show that it is feasible to transmit both quantum information and classical information on a single carrier. We obtained a secure key rate of 10^{-3} bits/pulse to 10^{-1} bits/pulse within 40 kilometers, and in the meantime the maximum bit error rate for classical information is about 10^{-7}. Because continuous-variable quantum key distribution protocol is compatible with standard telecommunication technology, we think our hierarchical modulation scheme can be used to upgrade the digital communication systems to extend system function in the future.

  13. CEOS Contributions to Informing Energy Management and Policy Decision Making Using Space-Based Earth Observations

    NASA Technical Reports Server (NTRS)

    Eckman, Richard S.

    2009-01-01

    Earth observations are playing an increasingly significant role in informing decision making in the energy sector. In renewable energy applications, space-based observations now routinely augment sparse ground-based observations used as input for renewable energy resource assessment applications. As one of the nine Group on Earth Observations (GEO) societal benefit areas, the enhancement of management and policy decision making in the energy sector is receiving attention in activities conducted by the Committee on Earth Observation Satellites (CEOS). CEOS has become the "space arm" for the implementation of the Global Earth Observation System of Systems (GEOSS) vision. It is directly supporting the space-based, near-term tasks articulated in the GEO three-year work plan. This paper describes a coordinated program of demonstration projects conducted by CEOS member agencies and partners to utilize Earth observations to enhance energy management end-user decision support systems. I discuss the importance of engagement with stakeholders and understanding their decision support needs in successfully increasing the uptake of Earth observation products for societal benefit. Several case studies are presented, demonstrating the importance of providing data sets in formats and units familiar and immediately usable by decision makers. These projects show the utility of Earth observations to enhance renewable energy resource assessment in the developing world, forecast space-weather impacts on the power grid, and improve energy efficiency in the built environment.

  14. The Value of Information from a GRACE-Enhanced Drought Severity Index

    NASA Astrophysics Data System (ADS)

    Kuwayama, Y.; Bernknopf, R.; Macauley, M.; Brookshire, D.; Zaitchik, B. F.; Rodell, M.

    2013-12-01

    Water storage anomalies derived from the Gravity Recovery and Climate Experiment Data Assimilation System (GRACE-DAS) have been used to enhance the information contained in drought indicators. The potential value of this information is to inform local and regional decisions to improve economic welfare in the face of drought. Based on a characterization of current drought evaluations, a modeling framework has been structured to analyze the contributed value of the Earth observations in the assessment of the onset and duration of droughts and their regional impacts. The analysis focuses on (1) characterizing how GRACE-DAS provides Earth observation information for a drought warning, (2) assessing how a GRACE-DAS-enhanced U.S. Drought Monitor would improve economic outcomes in a region, and (3) applying this enhancement process in a decision framework to illustrate the potential role of GRACE data products in a recent drought and response scenario for a value-of-information (VOI) analysis. The VOI analysis quantifies the relative contribution of enhanced understanding and communication of the societal benefits associated with GRACE Earth observation science. Our emphasis is to illustrate the role of an enhanced National Integrated Drought Information System outlook on three key societal outcomes: effects on particular economic sectors, changes in land management decisions, and reductions in damages to ecosystem services.

  15. Addressing unmeasured confounding in comparative observational research.

    PubMed

    Zhang, Xiang; Faries, Douglas E; Li, Hu; Stamey, James D; Imbens, Guido W

    2018-04-01

    Observational pharmacoepidemiological studies can provide valuable information on the effectiveness or safety of interventions in the real world, but one major challenge is the existence of unmeasured confounder(s). While many analytical methods have been developed for dealing with this challenge, they appear under-utilized, perhaps due to the complexity and varied requirements for implementation. Thus, there is an unmet need to improve understanding the appropriate course of action to address unmeasured confounding under a variety of research scenarios. We implemented a stepwise search strategy to find articles discussing the assessment of unmeasured confounding in electronic literature databases. Identified publications were reviewed and characterized by the applicable research settings and information requirements required for implementing each method. We further used this information to develop a best practice recommendation to help guide the selection of appropriate analytical methods for assessing the potential impact of unmeasured confounding. Over 100 papers were reviewed, and 15 methods were identified. We used a flowchart to illustrate the best practice recommendation which was driven by 2 critical components: (1) availability of information on the unmeasured confounders; and (2) goals of the unmeasured confounding assessment. Key factors for implementation of each method were summarized in a checklist to provide further assistance to researchers for implementing these methods. When assessing comparative effectiveness or safety in observational research, the impact of unmeasured confounding should not be ignored. Instead, we suggest quantitatively evaluating the impact of unmeasured confounding and provided a best practice recommendation for selecting appropriate analytical methods. Copyright © 2018 John Wiley & Sons, Ltd.

  16. AN INFORMATION-THEORETIC APPROACH TO OPTIMIZE JWST OBSERVATIONS AND RETRIEVALS OF TRANSITING EXOPLANET ATMOSPHERES

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Howe, Alex R.; Burrows, Adam; Deming, Drake, E-mail: arhowe@umich.edu, E-mail: burrows@astro.princeton.edu, E-mail: ddeming@astro.umd.edu

    We provide an example of an analysis to explore the optimization of observations of transiting hot Jupiters with the James Webb Space Telescope ( JWST ) to characterize their atmospheres based on a simple three-parameter forward model. We construct expansive forward model sets for 11 hot Jupiters, 10 of which are relatively well characterized, exploring a range of parameters such as equilibrium temperature and metallicity, as well as considering host stars over a wide range in brightness. We compute posterior distributions of our model parameters for each planet with all of the available JWST spectroscopic modes and several programs ofmore » combined observations and compute their effectiveness using the metric of estimated mutual information per degree of freedom. From these simulations, clear trends emerge that provide guidelines for designing a JWST observing program. We demonstrate that these guidelines apply over a wide range of planet parameters and target brightnesses for our simple forward model.« less

  17. An Information-theoretic Approach to Optimize JWST Observations and Retrievals of Transiting Exoplanet Atmospheres

    NASA Astrophysics Data System (ADS)

    Howe, Alex R.; Burrows, Adam; Deming, Drake

    2017-01-01

    We provide an example of an analysis to explore the optimization of observations of transiting hot Jupiters with the James Webb Space Telescope (JWST) to characterize their atmospheres based on a simple three-parameter forward model. We construct expansive forward model sets for 11 hot Jupiters, 10 of which are relatively well characterized, exploring a range of parameters such as equilibrium temperature and metallicity, as well as considering host stars over a wide range in brightness. We compute posterior distributions of our model parameters for each planet with all of the available JWST spectroscopic modes and several programs of combined observations and compute their effectiveness using the metric of estimated mutual information per degree of freedom. From these simulations, clear trends emerge that provide guidelines for designing a JWST observing program. We demonstrate that these guidelines apply over a wide range of planet parameters and target brightnesses for our simple forward model.

  18. A Recommended Set of Key Arctic Indicators

    NASA Astrophysics Data System (ADS)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  19. Factors associated with patient recall of key information in ambulatory specialty care visits: Results of an innovative methodology

    PubMed Central

    Lee, Yoojin; Taubin, Tatiana; Rogers, William H.; Wilson, Ira B.

    2018-01-01

    While some studies have assessed patient recall of important information from ambulatory care visits, none has done so recently. Furthermore, little is known about features of clinical interactions which are associated with patient understanding and recall, without which shared decision making, a widely shared ideal for patient care, cannot occur. Our objective was to evaluate characteristics of patients and outpatient encounters associated with patient recall of information after one week, along with observation of elements of shared decision making. This was an observational study based on coded transcripts of 189 outpatient encounters, and post-visit interviews with patients 1 week later. Coding used three previously validated systems, adopted for this study. Forty-nine percent of decisions and recommendations were recalled accurately without prompting; 36% recalled with a prompt; 15% recalled erroneously or not at all. Provider behaviors hypothesized to be associated with patient recall, such as open-questioning and “teach back,” were rare. Patients with less than high school education recalled 38% of items freely and accurately, while patients with a college degree recalled 65% (p < .0001). In a multivariate model, the total number of items to be recalled per visit, and percentage of utterances in decision-making processes by the provider (“verbal dominance”), were significant predictors of poorer recall. The item count was associated with poorer recall for lower, but not higher, educated patients. PMID:29389994

  20. Factors associated with patient recall of key information in ambulatory specialty care visits: Results of an innovative methodology.

    PubMed

    Laws, M Barton; Lee, Yoojin; Taubin, Tatiana; Rogers, William H; Wilson, Ira B

    2018-01-01

    While some studies have assessed patient recall of important information from ambulatory care visits, none has done so recently. Furthermore, little is known about features of clinical interactions which are associated with patient understanding and recall, without which shared decision making, a widely shared ideal for patient care, cannot occur. Our objective was to evaluate characteristics of patients and outpatient encounters associated with patient recall of information after one week, along with observation of elements of shared decision making. This was an observational study based on coded transcripts of 189 outpatient encounters, and post-visit interviews with patients 1 week later. Coding used three previously validated systems, adopted for this study. Forty-nine percent of decisions and recommendations were recalled accurately without prompting; 36% recalled with a prompt; 15% recalled erroneously or not at all. Provider behaviors hypothesized to be associated with patient recall, such as open-questioning and "teach back," were rare. Patients with less than high school education recalled 38% of items freely and accurately, while patients with a college degree recalled 65% (p < .0001). In a multivariate model, the total number of items to be recalled per visit, and percentage of utterances in decision-making processes by the provider ("verbal dominance"), were significant predictors of poorer recall. The item count was associated with poorer recall for lower, but not higher, educated patients.

  1. DNA based random key generation and management for OTP encryption.

    PubMed

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  2. Student Information-Age Mindset: A Key to Success in Distance Learning Courses

    ERIC Educational Resources Information Center

    Madrigal, Osiel; Schreiber, Deborah

    2011-01-01

    This study provides empirical evidence that an information-age mindset exists; it is not necessarily age-specific; and it appears to be related to both the student's interaction with a digital environment over time, and the success or failure while online. Eight of ten identified information-age mindset attributes are significant, and represent…

  3. Key Planning Factors for Recovery from a Biological Terrorism Incident

    DTIC Science & Technology

    2012-08-30

    Goals, this document identifies key technical planning areas that may be used to inform subsequent FEMA response and recovery guidance documents. The...expressed herein do not necessarily state or reflect those of their respective organizations or the US Government. The modeling and analysis provided by...responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would

  4. Multi Timescale Multispectral Observation of the Jovian Aurora CYCLE3 High

    NASA Astrophysics Data System (ADS)

    Gerard, Jean-Claude

    1992-06-01

    Previous HST observations made with the FOC have demonstrated the ability of the HST to provide high spatial resolution images of the ultraviolet jovian aurora. They and other IUE and Voyager UVS observations suggest that wavelength dependence and time variations occur with different characteristic times. We propose to image the ultraviolet jovian aurora in several passbands to investigate its temporal variation on timescales ranging from ~10 min to hours. Exposures will be made when the 180 deg (Lambda III) longitude sector, where the aurora is best visible from Earth orbit, faces the Earth. Due to the expected loss of sensitivity in the far UV, this program should be preformed before the COSTAR correction. Coordinated IR measurements of emission connected to the UV aurora but originating from different altitude regions will be obtained in parallel with HST observations. Simultaneous radio observations of decametric jovian emissions and IUE UV spectra will also provide complementary data on energetic particle precipitation. The observed morphology, color ratio and characteristic time of the temporal variations will provide key information to discriminate between the various origins , identity and acceleration mechanisms of the precipitating particles. Theoretical models of particle interaction with the jovian magnetic field and atmosphere available from the proposing team will be used to derive quantitative information on these processes.

  5. Observational Research Opportunities and Limitations

    PubMed Central

    Boyko, Edward J.

    2013-01-01

    Medical research continues to progress in its ability to identify treatments and characteristics associated with benefits and adverse outcomes. The principle engine for the evaluation of treatment efficacy is the randomized controlled trial (RCT). Due to the cost and other considerations, RCTs cannot address all clinically important decisions. Observational research often is used to address issues not addressed or not addressable by RCTs. This article provides an overview of the benefits and limitations of observational research to serve as a guide to the interpretation of this category of research designs in diabetes investigations. The potential for bias is higher in observational research but there are design and analysis features that can address these concerns although not completely eliminate them. Pharmacoepidemiologic research may provide important information regarding relative safety and effectiveness of diabetes pharmaceuticals. Such research must effectively address the important issue of confounding by indication in order to produce clinically meaningful results. Other methods such as instrumental variable analysis are being employed to enable stronger causal inference but these methods also require fulfillment of several key assumptions that may or may not be realistic. Nearly all clinical decisions involve probabilistic reasoning and confronting uncertainly, so a realistic goal for observational research may not be the high standard set by RCTs but instead the level of certainty needed to influence a diagnostic or treatment decision. PMID:24055326

  6. Observational research--opportunities and limitations.

    PubMed

    Boyko, Edward J

    2013-01-01

    Medical research continues to progress in its ability to identify treatments and characteristics associated with benefits and adverse outcomes. The principal engine for the evaluation of treatment efficacy is the randomized controlled trial (RCT). Due to the cost and other considerations, RCTs cannot address all clinically important decisions. Observational research often is used to address issues not addressed or not addressable by RCTs. This article provides an overview of the benefits and limitations of observational research to serve as a guide to the interpretation of this category of research designs in diabetes investigations. The potential for bias is higher in observational research but there are design and analysis features that can address these concerns although not completely eliminate them. Pharmacoepidemiologic research may provide important information regarding relative safety and effectiveness of diabetes pharmaceuticals. Such research must effectively address the important issue of confounding by indication in order to produce clinically meaningful results. Other methods such as instrumental variable analysis are being employed to enable stronger causal inference but these methods also require fulfillment of several key assumptions that may or may not be realistic. Nearly all clinical decisions involve probabilistic reasoning and confronting uncertainly, so a realistic goal for observational research may not be the high standard set by RCTs but instead the level of certainty needed to influence a diagnostic or treatment decision. © 2013.

  7. Commonalities and differences in the implementation of models of care for arthritis: key informant interviews from Canada.

    PubMed

    Cott, Cheryl A; Davis, Aileen M; Badley, Elizabeth M; Wong, Rosalind; Canizares, Mayilee; Li, Linda C; Jones, Allyson; Brooks, Sydney; Ahlwalia, Vandana; Hawker, Gillian; Jaglal, Susan; Landry, Michel; MacKay, Crystal; Mosher, Dianne

    2016-08-19

    Timely access to effective treatments for arthritis is a priority at national, provincial and regional levels in Canada due to population aging coupled with limited health human resources. Models of care for arthritis are being implemented across the country but mainly in local contexts, not from an evidence-informed policy or framework. The purpose of this study is to examine existing models of care for arthritis in Canada at the local level in order to identify commonalities and differences in their implementation that could point to important considerations for health policy and service delivery. Semi-structured key informant interviews were conducted with 70 program managers and/or care providers in three Canadian provinces identified through purposive and snowball sampling followed by more detailed examination of 6 models of care (two per province). Interviews were transcribed verbatim and analyzed thematically using a qualitative descriptive approach. Two broad models of care were identified for Total Joint Replacement and Inflammatory Arthritis. Commonalities included lack of complete and appropriate referrals from primary care physicians and lack of health human resources to meet local demands. Strategies included standardized referrals and centralized intake and triage using non-specialist health care professionals. Differences included the nature of the care and follow-up, the role of the specialist, and location of service delivery. Current models of care are mainly focused on Total Joint Replacement and Inflammatory Arthritis. Given the increasing prevalence of arthritis and that published data report only a small proportion of current service delivery is specialist care; provision of timely, appropriate care requires development, implementation and evaluation of models of care across the continuum of care.

  8. Analyzing key ecological functions for transboundary subbasin assessments.

    Treesearch

    B.G Marcot; T.A. O' Neil; J.B. Nyberg; A. MacKinnon; P.J. Paquet; D.H. Johnson

    2007-01-01

    We present an evaluation of the ecological roles ("key ecological functions" or KEFs) of 618 wildlife species as one facet of subbasin assessment in the Columbia River basin (CRB) of the United States and Canada. Using a wildlife-habitat relationships database (IBIS) and geographic information system, we have mapped KEFs as levels of functional redundancy (...

  9. Cyberinfrastructure Initiatives of the Committee on Earth Observation Satellites (CEOS) Working Group on Information Systems and Services (WGISS)

    NASA Astrophysics Data System (ADS)

    McDonald, K. R.; Faundeen, J. L.; Petiteville, I.

    2005-12-01

    The Committee on Earth Observation Satellites (CEOS) was established in 1984 in response to a recommendation from the Economic Summit of Industrialized Nations Working Group on Growth, Technology, and Employment's Panel of Experts on Satellite Remote Sensing. CEOS participants are Members, who are national or international governmental organizations who operate civil spaceborne Earth observation satellites, and Associates who are governmental organizations with civil space programs in development or international scientific or governmental bodies who have an interest in and support CEOS objectives. The primary objective of CEOS is to optimize benefits of satellite Earth observations through cooperation of its participants in mission planning and in development of compatible data products, formats, services, applications and policies. To pursue its objectives, CEOS establishes working groups and associated subgroups that focus on relevant areas of interest. While the structure of CEOS has evolved over its lifetime, today there are three permanent working groups. One is the Working Group on Calibration and Validation that addresses sensor-specific calibration and validation and geophysical parameter validation. A second is the Working Group on Education, Training, and Capacity Building that facilitates activities that enhance international education and training in Earth observation techniques, data analysis, interpretation and applications, with a particular focus on developing countries. The third permanent working group is the Working Group on Information Systems and Services (WGISS). The purpose of WGISS is to promote collaboration in the development of the systems and services based on international standards that manage and supply the Earth observation data and information from participating agencies' missions. WGISS places great emphasis on the use of demonstration projects involving user groups to solve the critical interoperability issues associated with the

  10. [Informed and empowered citizens: Keys to the full exercise of health rights].

    PubMed

    Gil-Quevedo, Walter; Agurto-Távara, Elvia; Espinoza-Portilla, Elizabeth

    2017-01-01

    Currently, there is a Peruvian legal framework that promotes the dissemination of information on the health rights of the population. Institutions have been created, such as the National Superintendence of Health, which are in charge of promoting health rights and supervising health-care providers. Despite many achievements, such as extending comprehensive health insurance coverage, it is necessary to implement strategies for the population to access information and advice in a timely, quick and complete manner. Some experiences have shown potential for expansion and growth, such as citizens' participation in Health Service User Councils and the Program of Integrated Actions for the Promotion of Health Rights, as well as the formation of decentralized Intendencies of the National Superintendency of Health. The conciliation and arbitration centers, the training of community health agents, the citizen vigilance, and even innovative strategies using information and communication technologies such as free smartphone applications, are important mechanisms for citizens to have more information and knowledge in health, and thus, to be more empowered, having the capacity to exert more control over the decisions taken on their health.

  11. X-Ray Observations of High-Energy Pulsars: PSR B1951+32 and Geminga

    NASA Astrophysics Data System (ADS)

    Ho, Cheng

    Observations at frequencies across a wide range of electromagnetic spectra are key to the understanding of the origin and mechanisms of high-energy emissions from pulsars. We propose to observe the high-energy pulsars PSR B1951+32 and Geminga with XTE. These two sources emit X-rays at low enough count rate that we can acquire high resolution timing and spectral data, allowing us to perform detailed analysis on the ground. Staring integration of 10 ksec for each source is requested. Data obtained in these observations, together with those from ROSAT, GRO and a planned project for optical counterpart study at Los Alamos, will provide crucial information to advance high-energy pulsar research.

  12. Characterization Of Dissolved Organic Mattter In The Florida Keys Ecosystem

    NASA Astrophysics Data System (ADS)

    Adams, D. G.; Shank, G. C.

    2009-12-01

    sources. Information generated by our study will provide a valuable data set for better understanding DOM bio-geochemical dynamics along the Florida Keys ecosystem and information for future studies linking DOM and the coral community.

  13. Providing long-acting reversible contraception services in Seattle school-based health centers: key themes for facilitating implementation.

    PubMed

    Gilmore, Kelly; Hoopes, Andrea J; Cady, Janet; Amies Oelschlager, Anne-Marie; Prager, Sarah; Vander Stoep, Ann

    2015-06-01

    The purpose of this study was to describe the implementation of a program that provides long-acting reversible contraception (LARC) services within school-based health centers (SBHCs) and to identify barriers and facilitators to implementation as reported by SBHC clinicians and administrators, public health officials, and community partners. We conducted 14 semistructured interviews with key informants involved in the implementation of LARC services. Key informants included SBHC clinicians and administrators, public health officials, and community partners. We used a content analysis approach to analyze interview transcripts for themes. We explored barriers to and facilitators of LARC service delivery across and within key informant groups. The most cited barriers across key informant groups were as follows: perceived lack of provider procedural skills and bias and negative attitudes about LARC methods. The most common facilitators identified across groups were as follows: clear communication strategies, contraceptive counseling practice changes, provider trainings, and stakeholder engagement. Two additional barriers emerged in specific key informant groups. Technical and logistical barriers to LARC service delivery were cited heavily by SBHC administrative staff, community partners, and public health officials. Expense and billing was a major barrier to SBHC administrative staff. LARC counseling and procedural services can be implemented in an SBHC setting to promote access to effective contraceptive options for adolescent women. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  14. A Simple Example of ``Quantum Darwinism'': Redundant Information Storage in Many-Spin Environments

    NASA Astrophysics Data System (ADS)

    Blume-Kohout, Robin; Zurek, Wojciech H.

    2005-11-01

    As quantum information science approaches the goal of constructing quantum computers, understanding loss of information through decoherence becomes increasingly important. The information about a system that can be obtained from its environment can facilitate quantum control and error correction. Moreover, observers gain most of their information indirectly, by monitoring (primarily photon) environments of the "objects of interest." Exactly how this information is inscribed in the environment is essential for the emergence of "the classical" from the quantum substrate. In this paper, we examine how many-qubit (or many-spin) environments can store information about a single system. The information lost to the environment can be stored redundantly, or it can be encoded in entangled modes of the environment. We go on to show that randomly chosen states of the environment almost always encode the information so that an observer must capture a majority of the environment to deduce the system's state. Conversely, in the states produced by a typical decoherence process, information about a particular observable of the system is stored redundantly. This selective proliferation of "the fittest information" (known as Quantum Darwinism) plays a key role in choosing the preferred, effectively classical observables of macroscopic systems. The developing appreciation that the environment functions not just as a garbage dump, but as a communication channel, is extending our understanding of the environment's role in the quantum-classical transition beyond the traditional paradigm of decoherence.

  15. Engagement in the HIV Care Continuum among Key Populations in Tijuana, Mexico.

    PubMed

    Smith, Laramie R; Patterson, Thomas L; Magis-Rodriguez, Carlos; Ojeda, Victoria D; Burgos, Jose Luis; Rojas, Sarah A; Zúñiga, María Luisa; Strathdee, Steffanie A

    2016-05-01

    In Tijuana, Mexico, HIV is concentrated in sub-epidemics of key populations: persons who inject drugs (PWID), sex workers (SW), and men who have sex with men (MSM). To date, data on engagement in the HIV care continuum among these key populations, particularly in resource-constrained settings, are sparse. We pooled available epidemiological data from six studies (N = 3368) to examine HIV testing and treatment uptake in these key populations; finding an overall HIV prevalence of 5.7 %. Of the 191 identified HIV-positive persons, only 11.5 % knew their HIV-positive status and 3.7 % were on ART. Observed differences between these HIV-positive key populations suggest PWID (vs. non-PWID) were least likely to have previously tested or initiate HIV care. MSM (vs. non-MSM) were more likely to have previously tested but not more likely to know their HIV-positive status. Of persons aware of their HIV-positive status, SW (vs. non-SW) were more likely to initiate HIV care. Findings suggest engagement of key populations in HIV treatment is far below estimates observed for similarly resource-constrained generalized epidemics in sub-Saharan Africa. These data provide one of the first empirical-snapshots highlighting the extent of HIV treatment disparities in key populations.

  16. From Informal Gatekeeper to Information Counselor: Emergence of a New Professional Role.

    ERIC Educational Resources Information Center

    Dosa, Marta; And Others

    Borrowed from the literature of more than two decades ago--when it alluded to key communicators within organizations--the concept of "gatekeeper" is reintroduced in this report. The role of information counselors, who, like informal gatekeepers, take part in liaison activities, networking, advising, information filtering, transmitting,…

  17. A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

    NASA Astrophysics Data System (ADS)

    Lai, Hong; Luo, Mingxing; Zhang, Jun; Pieprzyk, Josef; Pan, Lei; Orgun, Mehmet A.

    2018-07-01

    The orthogonality of the orbital angular momentum (OAM) eigenstates enables a single photon carry an arbitrary number of bits. Moreover, additional degrees of freedom (DOFs) of OAM can span a high-dimensional Hilbert space, which could greatly increase information capacity and security. Moreover, the use of the spin angular momentum-OAM hybrid entangled state can increase Shannon dimensionality, because photons can be hybrid entangled in multiple DOFs. Based on these observations, we develop a hybrid entanglement quantum key distribution (QKD) protocol to achieve three-party quantum key distribution without classical message exchanges. In our proposed protocol, a communicating party uses a spatial light modulator (SLM) and a specific phase hologram to modulate photons' OAM state. Similarly, the other communicating parties use their SLMs and the fixed different phase holograms to modulate the OAM entangled photon pairs, producing the shared key among the parties Alice, Bob and Charlie without classical message exchanges. More importantly, when the same operation is repeated for every party, our protocol could be extended to a multiple-party QKD protocol.

  18. Integrated QTL detection for key breeding traits in multiple peach progenies.

    PubMed

    Hernández Mora, José R; Micheletti, Diego; Bink, Marco; Van de Weg, Eric; Cantín, Celia; Nazzicari, Nelson; Caprera, Andrea; Dettori, Maria Teresa; Micali, Sabrina; Banchi, Elisa; Campoy, José Antonio; Dirlewanger, Elisabeth; Lambert, Patrick; Pascal, Thierry; Troggio, Michela; Bassi, Daniele; Rossini, Laura; Verde, Ignazio; Quilot-Turion, Bénédicte; Laurens, François; Arús, Pere; Aranzana, Maria José

    2017-06-06

    Peach (Prunus persica (L.) Batsch) is a major temperate fruit crop with an intense breeding activity. Breeding is facilitated by knowledge of the inheritance of the key traits that are often of a quantitative nature. QTLs have traditionally been studied using the phenotype of a single progeny (usually a full-sib progeny) and the correlation with a set of markers covering its genome. This approach has allowed the identification of various genes and QTLs but is limited by the small numbers of individuals used and by the narrow transect of the variability analyzed. In this article we propose the use of a multi-progeny mapping strategy that used pedigree information and Bayesian approaches that supports a more precise and complete survey of the available genetic variability. Seven key agronomic characters (data from 1 to 3 years) were analyzed in 18 progenies from crosses between occidental commercial genotypes and various exotic lines including accessions of other Prunus species. A total of 1467 plants from these progenies were genotyped with a 9 k SNP array. Forty-seven QTLs were identified, 22 coinciding with major genes and QTLs that have been consistently found in the same populations when studied individually and 25 were new. A substantial part of the QTLs observed (47%) would not have been detected in crosses between only commercial materials, showing the high value of exotic lines as a source of novel alleles for the commercial gene pool. Our strategy also provided estimations on the narrow sense heritability of each character, and the estimation of the QTL genotypes of each parent for the different QTLs and their breeding value. The integrated strategy used provides a broader and more accurate picture of the variability available for peach breeding with the identification of many new QTLs, information on the sources of the alleles of interest and the breeding values of the potential donors of such valuable alleles. These results are first-hand information for

  19. Key issues, observations and goals for coupled, thermodynamic/geodynamic models

    NASA Astrophysics Data System (ADS)

    Kelemen, P. B.

    2017-12-01

    In coupled, thermodynamic/geodynamic models, focus should be on processes involving major rock forming minerals and simple fluid compositions, and parameters with first-order effects on likely dynamic processes: In a given setting, will fluid mass increase or decrease? How about solid density? Will flow become localized or diffuse? Will rocks flow or break? How do reactions affect global processes such as formation and evolution of the plates, plate boundary deformation, metamorphism, weathering, climate and geochemical cycles. Important reaction feedbacks in geodynamics include formation of dissolution channels and armored channels; divergence of flow and formation of permeability barriers due to crystallization in pore space; localization of fluid transport and ductile deformation in shear zones; reaction-driven cracking; mechanical channels granular media; shear heating; density instabilities; viscous fluid-weakening; fluid-induced frictional failure; and hydraulic fracture. Density instabilities often lead to melting, and there is an interesting dialectic between porous flow and diapirs. The best models provide a simple but comprehensive framework that can account for the general features in many or most of these phenomena. Ideally, calculations based on thermodynamic data and rheological observations alone should delineate the regimes in which each of these processes will occur and the boundaries between them. These often start with "toy models" and lab experiments on analog systems, with highly approximate scaling to simplified geological conditions and materials. Geologic observations provide the best constraints where `frozen' fluid transport pathways or deformation processes are preserved. Inferences about completed processes based on fluid or solid products alone is more challenging and less unique. Not all important processes have good examples in outcrop, so directed searches for specific phenomena may fail. A highly generalized approach provides a way

  20. Satellite-to-Ground Entanglement-Based Quantum Key Distribution.

    PubMed

    Yin, Juan; Cao, Yuan; Li, Yu-Huai; Ren, Ji-Gang; Liao, Sheng-Kai; Zhang, Liang; Cai, Wen-Qi; Liu, Wei-Yue; Li, Bo; Dai, Hui; Li, Ming; Huang, Yong-Mei; Deng, Lei; Li, Li; Zhang, Qiang; Liu, Nai-Le; Chen, Yu-Ao; Lu, Chao-Yang; Shu, Rong; Peng, Cheng-Zhi; Wang, Jian-Yu; Pan, Jian-Wei

    2017-11-17

    We report on entanglement-based quantum key distribution between a low-Earth-orbit satellite equipped with a space borne entangled-photon source and a ground observatory. One of the entangled photons is measured locally at the satellite, and the other one is sent via a down link to the receiver in the Delingha ground station. The link attenuation is measured to vary from 29 dB at 530 km to 36 dB at 1000 km. We observe that the two-photon entanglement survives after being distributed between the satellite and the ground, with a measured state fidelity of ≥0.86. We then perform the entanglement-based quantum key distribution protocol and obtain an average final key rate of 3.5  bits/s at the distance range of 530-1000 km.

  1. Measurement-device-independent entanglement-based quantum key distribution

    NASA Astrophysics Data System (ADS)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Liu, Hongwei; Yin, Zhenqiang; Li, Zuohan; Lian, Shibin; Du, Yungang; Wu, Lingan

    2016-05-01

    We present a quantum key distribution protocol in a model in which the legitimate users gather statistics as in the measurement-device-independent entanglement witness to certify the sources and the measurement devices. We show that the task of measurement-device-independent quantum communication can be accomplished based on monogamy of entanglement, and it is fairly loss tolerate including source and detector flaws. We derive a tight bound for collective attacks on the Holevo information between the authorized parties and the eavesdropper. Then with this bound, the final secret key rate with the source flaws can be obtained. The results show that long-distance quantum cryptography over 144 km can be made secure using only standard threshold detectors.

  2. Peer Observation: A Key Factor to Improve Iranian EFL Teachers' Professional Development

    ERIC Educational Resources Information Center

    Motallebzadeh, Khalil; Hosseinnia, Mansooreh; Domskey, Javad G. H.

    2017-01-01

    This study reports on the perspectives of a group of Iranian EFL teachers about peer observation effects. The aim was to investigate if peer observation as a reflective tool could significantly affect EFL teachers' professional development. It has been done based on a mixed method approach. The participants have stated their viewpoints on the…

  3. Synergistic Information Processing Encrypts Strategic Reasoning in Poker.

    PubMed

    Frey, Seth; Albino, Dominic K; Williams, Paul L

    2018-06-14

    There is a tendency in decision-making research to treat uncertainty only as a problem to be overcome. But it is also a feature that can be leveraged, particularly in social interaction. Comparing the behavior of profitable and unprofitable poker players, we reveal a strategic use of information processing that keeps decision makers unpredictable. To win at poker, a player must exploit public signals from others. But using public inputs makes it easier for an observer to reconstruct that player's strategy and predict his or her behavior. How should players trade off between exploiting profitable opportunities and remaining unexploitable themselves? Using a recent multivariate approach to information theoretic data analysis and 1.75 million hands of online two-player No-Limit Texas Hold'em, we find that the important difference between winning and losing players is not in the amount of information they process, but how they process it. In particular, winning players are better at integrative information processing-creating new information from the interaction between their cards and their opponents' signals. We argue that integrative information processing does not just produce better decisions, it makes decision-making harder for others to reverse engineer, as an expert poker player's cards act like the private key in public-key cryptography. Poker players encrypt their reasoning with the way they process information. The encryption function of integrative information processing makes it possible for players to exploit others while remaining unexploitable. By recognizing the act of information processing as a strategic behavior in its own right, we offer a detailed account of how experts use endemic uncertainty to conceal their intentions in high-stakes competitive environments, and we highlight new opportunities between cognitive science, information theory, and game theory. Copyright © 2018 Cognitive Science Society, Inc.

  4. Quantum key distribution in a multi-user network at gigahertz clock rates

    NASA Astrophysics Data System (ADS)

    Fernandez, Veronica; Gordon, Karen J.; Collins, Robert J.; Townsend, Paul D.; Cova, Sergio D.; Rech, Ivan; Buller, Gerald S.

    2005-07-01

    In recent years quantum information research has lead to the discovery of a number of remarkable new paradigms for information processing and communication. These developments include quantum cryptography schemes that offer unconditionally secure information transport guaranteed by quantum-mechanical laws. Such potentially disruptive security technologies could be of high strategic and economic value in the future. Two major issues confronting researchers in this field are the transmission range (typically <100km) and the key exchange rate, which can be as low as a few bits per second at long optical fiber distances. This paper describes further research of an approach to significantly enhance the key exchange rate in an optical fiber system at distances in the range of 1-20km. We will present results on a number of application scenarios, including point-to-point links and multi-user networks. Quantum key distribution systems have been developed, which use standard telecommunications optical fiber, and which are capable of operating at clock rates of up to 2GHz. They implement a polarization-encoded version of the B92 protocol and employ vertical-cavity surface-emitting lasers with emission wavelengths of 850 nm as weak coherent light sources, as well as silicon single-photon avalanche diodes as the single photon detectors. The point-to-point quantum key distribution system exhibited a quantum bit error rate of 1.4%, and an estimated net bit rate greater than 100,000 bits-1 for a 4.2 km transmission range.

  5. Too much information? A document analysis of sport safety resources from key organisations.

    PubMed

    Bekker, Sheree; Finch, Caroline F

    2016-05-06

    The field of sport injury prevention has seen a marked increase in published research in recent years, with concomitant proliferation of lay sport safety resources, such as policies, fact sheets and posters. The aim of this study was to catalogue and categorise the number, type and topic focus of sport safety resources from a representative set of key organisations. Cataloguing and qualitative document analysis of resources available from the websites of six stakeholder organisations in Australia. This study was part of a larger investigation, the National Guidance for Australian Football Partnerships and Safety (NoGAPS) project. The NoGAPS study provided the context for a purposive sampling of six organisations involved in the promotion of safety in Australian football. These partners are recognised as being highly representative of organisations at national and state level that reflect similarly in their goals around sport safety promotion in Australia. The catalogue comprised 284 resources. More of the practical and less prescriptive types of resources, such as fact sheets, than formal policies were found. Resources for the prevention of physical injuries were the predominant sport safety issue addressed, with risk management, environmental issues and social behaviours comprising other categories. Duplication of resources for specific safety issues, within and across organisations, was found. People working within sport settings have access to a proliferation of resources, which creates a potential rivalry for sourcing of injury prevention information. Important issues that are likely to influence the uptake of safety advice by the general sporting public include the sheer number of resources available, and the overlap and duplication of resources addressing the same issues. The existence of a large number of resources from reputable organisations does not mean that they are necessarily evidence based, fully up to date or even effective in supporting sport

  6. Redundant imprinting of information in non-ideal environments: Quantum Darwinism via a noisy channel

    NASA Astrophysics Data System (ADS)

    Zwolak, Michael; Quan, Haitao; Zurek, Wojciech

    2011-03-01

    Quantum Darwinism provides an information-theoretic framework for the emergence of the classical world from the quantum substrate. It recognizes that we - the observers - acquire our information about the ``systems of interest'' indirectly from their imprints on the environment. Objectivity, a key property of the classical world, arises via the proliferation of redundant information into the environment where many observers can then intercept it and independently determine the state of the system. While causing a system to decohere, environments that remain nearly invariant under the Hamiltonian dynamics, such as very mixed states, have a diminished ability to transmit information about the system, yet can still acquire redundant information about the system [1,2]. Our results show that Quantum Darwinism is robust with respect to non-ideal initial states of the environment. This research is supported by the U.S. Department of Energy through the LANL/LDRD Program.

  7. Summary of Key Operating Statistics: Data Collected from the 2009 Annual Institutional Report

    ERIC Educational Resources Information Center

    Accrediting Council for Independent Colleges and Schools, 2010

    2010-01-01

    The Accrediting Council for Independent Colleges and Schools (ACICS) provides the Summary of Key Operating Statistics (KOS) as an annual review of the performance and key measurements of the more than 800 private post-secondary institutions we accredit. This edition of the KOS contains information based on the 2009 Annual Institutional Reports…

  8. Physical key-protected one-time pad

    PubMed Central

    Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei

    2013-01-01

    We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925

  9. Key experimental information on intermediate-range atomic structures in amorphous Ge2Sb2Te5 phase change material

    NASA Astrophysics Data System (ADS)

    Hosokawa, Shinya; Pilgrim, Wolf-Christian; Höhle, Astrid; Szubrin, Daniel; Boudet, Nathalie; Bérar, Jean-François; Maruyama, Kenji

    2012-04-01

    Laser-induced crystalline-amorphous phase change of Ge-Sb-Te alloys is the key mechanism enabling the fast and stable writing/erasing processes in rewritable optical storage devices, such as digital versatile disk (DVD) or blu-ray disk. Although the structural information in the amorphous phase is essential for clarifying this fast process, as well as long lasting stabilities of both the phases, experimental works were mostly limited to the short-range order by x ray absorption fine structure. Here we show both the short and intermediate-range atomic structures of amorphous DVD material, Ge2Sb2Te5 (GST), investigated by a combination of anomalous x ray scattering and reverse Monte Carlo modeling. From the obtained atomic configurations of amorphous GST, we have found that the Sb atoms and half of the Ge atoms play roles in the fast phase change process of order-disorder transition, while the remaining Ge atoms act for the proper activation energy of barriers between the amorphous and crystalline phases.

  10. Getting something out of nothing in the measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tan, Yong-Gang; Cai, Qing-Yu; Yang, Hai-Feng; Hu, Yao-Hua

    2015-11-01

    Because of the monogamy of entanglement, the measurement-device-independent quantum key distribution is immune to the side-information leaking of the measurement devices. When the correlated measurement outcomes are generated from the dark counts, no entanglement is actually obtained. However, secure key bits can still be proven to be generated from these measurement outcomes. Especially, we will give numerical studies on the contributions of dark counts to the key generation rate in practical decoy state MDI-QKD where a signal source, a weaker decoy source and a vacuum decoy source are used by either legitimate key distributer.

  11. Institutional Data Management in Higher Education. ECAR Key Findings

    ERIC Educational Resources Information Center

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  12. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  13. Near-Earth asteroids: Observer alert network and physical observations

    NASA Technical Reports Server (NTRS)

    Davis, Donald R.; Chapman, Clark R.

    1992-01-01

    This project strives to obtain physical observations on newly discovered Near-Earth Objects (NEO's) in order to provide fundamental data needed to assess the resources available in the population. The goal is acquiring data on all objects brighter than magnitude V= 17.0. To accomplish this, an electronic mail alert and observer information service that informs observers around the world as to the status of physical observations on currently observable NEO's was established. Such data is also acquired ourselves through a cooperative program with European colleagues that uses telescopes on La Palma to obtain spectra of NEO's and through observations made from a local telescope on Tumamoc Hill. This latter telescope has the advantage that large amounts of observing time are available, so that whenever a new NEO's discovered, we can be assured of getting time to observe it.

  14. Community health information sources--a survey in three disparate communities.

    PubMed

    Dart, Jared; Gallois, Cindy; Yellowlees, Peter

    2008-02-01

    To determine the current utilisation, importance, trust and future preference for contemporary sources of health information in three different socioeconomic groups. A pilot study including key informant interviews and direct observation was conducted in a low socioeconomic community. From this work a survey questionnaire was designed and implemented across three different communities. Semi-structured key informant interviews and focus groups capturing 52 respondents. Paper-based surveys were left in community organisations and local health practices in a low socioeconomic (LSE) community on the outskirts of Ipswich, Queensland, a mid-high socioeconomic (MSE) community in the western suburbs of Brisbane, and at a local university. Rank of current and preferred future sources of health information, importance and trustworthiness of health information sources. Across all three communities the local doctor was the most currently used, important, trusted and preferred future source of health information. The most striking difference between the three communities related to the current use and preferred future use of the internet. The internet was a more currently used source of health information and more important source in the university population than the LSE or MSE populations. It was also a less preferred source of future health information in the LSE population than the MSE or university populations. Importantly, currently used sources of health information did not reflect community members' preferred sources of health information. People in different socioeconomic communities obtain health information from various sources. This may reflect access issues, education and awareness of the internet as a source of health information, less health information seeking as well as a reluctance by the e-health community to address the specific needs of this group.

  15. Free-Space Quantum Key Distribution using Polarization Entangled Photons

    NASA Astrophysics Data System (ADS)

    Kurtsiefer, Christian

    2007-06-01

    We report on a complete experimental implementation of a quantum key distribution protocol through a free space link using polarization-entangled photon pairs from a compact parametric down-conversion source [1]. Based on a BB84-equivalent protocol, we generated without interruption over 10 hours a secret key free-space optical link distance of 1.5 km with a rate up to 950 bits per second after error correction and privacy amplification. Our system is based on two time stamp units and relies on no specific hardware channel for coincidence identification besides an IP link. For that, initial clock synchronization with an accuracy of better than 2 ns is achieved, based on a conventional NTP protocol and a tiered cross correlation of time tags on both sides. Time tags are used to servo a local clock, allowing a streamed measurement on correctly identified photon pairs. Contrary to the majority of quantum key distribution systems, this approach does not require a trusted large-bandwidth random number generator, but integrates that into the physical key generation process. We discuss our current progress of implementing a key distribution via an atmospherical link during daylight conditions, and possible attack scenarios on a physical timing information side channel to a entanglement-based key distribution system. [1] I. Marcikic, A. Lamas-Linares, C. Kurtsiefer, Appl. Phys. Lett. 89, 101122 (2006).

  16. The information needs of women who have undergone breast reconstruction. Part II: Information giving and content of information.

    PubMed

    Wolf, Lisa

    2004-12-01

    Women diagnosed with breast cancer treated by mastectomy can choose breast reconstruction. The information needs of women undergoing this procedure have only been addressed in the research literature to a limited extent. A qualitative approach was used to explore the experiences of women who had undergone breast reconstruction with a specific focus on their views on how they considered their information needs could best be met. A purposeful sample of eight women was recruited to participate in two focus groups, each lasting 2 hours. Framework analysis was used to develop an index of key themes and sub themes which transformed the data into a structured record which facilitated systematic analysis. This paper will present the emergent key themes regarding information giving and the content of information that women perceive as important when preparing for breast reconstruction. Process, delivery and patient factors are presented in the category of information giving. Several sub themes are discussed concerning the content of information considered to be relevant. Those involved in imparting information to women about such surgery should be aware of the type of information that is considered relevant, the manner in which it should be delivered and timing factors that implicate on the process.

  17. Communicating Herschel Key Programs in Solar System Studies to the Public

    NASA Astrophysics Data System (ADS)

    Rengel, M.; Hartogh, P.; Müller, T.

    2011-10-01

    The Herschel Space Observatory, one of the cornerstone missions of the European Space Agency (ESA) with participation from NASA, is delivering a wealth of far-infrared and sub-millimeter observations of the cold Universe. A considerable part of the observing time for the nominal three year mission lifetime has been awarded in the form of Key Programs. Between the 42 key programs (guaranteed and open times), only two key programs are dedicated to study the Solar System: "Water and Related Chemistry in the Solar System", also known as Herschel Solar System Observations (HssO) project [1], and "TNOs are Cool: A Survey of the Transneptunian Region" [2]. In the framework of these Programs, a serie of public outreach activities and efforts of its results are being carried out. We present some of the outreach strategies developed (e.g. press releases, web pages, logos, public lectures, exhibitions, interviews, reports, etc.) and some plans in this direction. Our activities introduce people to knowledge and beauty of solar system research and wider the opportunities for the public to become more involved in topics like solar system studies, specially in the times of frequent exo-planet discoveries.

  18. COPERNICUS - The European Union Earth Observation Programme - State of play and way ahead

    NASA Astrophysics Data System (ADS)

    Koch, Astrid-Christina

    2015-04-01

    Copernicus is the new name of the European Earth Observation Programme, GMES (Global Monitoring for Environment and Security). Copernicus or rather its predecessor was established as an EU programme. It covers all the activities for ensuring an uninterrupted provision of accurate and reliable data and information on environmental issues and security matters to users in charge of policy making, implementation and monitoring, in the EU and its Member States. Copernicus aims at providing Europe with a continuous, independent and reliable access to observation data and information. The EU investment aims at filling the observation gaps, providing access to existing assets and developing operational services. The data policy of the Copernicus programme supports an open, full and free of charge data access that is in line with the data sharing principles of the Group for Earth Observation (GEO). Copernicus is structured in six Services: Marine, Atmosphere, Land and Climate change monitoring as well as support to Emergency and Security. Copernicus uses data from satellites and in-situ sensors such as buoys, balloons or air sensors to provide timely and reliable added-value information and forecasting to support for example, agriculture and fisheries, land use and urban planning, the fight against forest fires, disaster response, maritime transport or air pollution monitoring. The need for continuing such observations is becoming critical, considering the increasing political pressure on public authorities to take informed decisions in the field of environment, security and climate change and the need to respect international agreements. Copernicus also contributes to economic stability and growth by boosting commercial applications (the so-called downstream services) in many different sectors through a full and open access to Copernicus observation data and information products. KEY WORDS: Sentinels, big data, data access, Emergency, Marine, Atmosphere.

  19. Impact of an IEC (Information, Education and Communication) intervention on key family practices of mothers related to child health in Jamshoro, Sindh.

    PubMed

    Shaikh, Salma; Memon, Shazia; Ahmed, Imran; Amna; Manzoor, Rabia; Shaikh, Saleem

    2014-05-01

    To determine change in practice of mothers having children less than five years of age in five key areas related to child health, growth and development including immunization, feeding during illness, appropriate home treatment for infections and care seeking behavior. This was a community based interventional study of Information, Education and Communication (IEC) intervention in the UC Jamshoro, Taluka Kotri, district Jamshoro of 15 months duration from March 2011 to June 2012. Ninety five mothers having children less than five years of age were selected by systematic random sampling for house hold based survey by questionnaire designed by EPP evaluation and health section of UNICEF during baseline and post-intervention phases. Base line data was collected from the interventional area then health education messages were given through written and pictorial material by LHWs for 9 months. To measure the impact helath education messages, data was again collected by same questionnaire are from the same union council during post-intervention phase. During baseline survey except immunization all other key family practices were poor. After 9 months of intervention of repeated heath education sessions through LHW during their routine visits all practices were improved with statistically significant difference. Regarding the comparison of the results between baseline and post-intervention surveys we found that except immunization which was already better, all those practices which requires mother's knowledge and practice were improved after our intervention with significant P-values. Improving the mother's education level is very important, to empower the first care provider of child in the community. However, in the mean time, health educational messages related to the limited number of key family practices should be disseminated.

  20. Following Experts at Work in Their Own Information Spaces: Using Observational Methods To Develop Tools for the Digital Library.

    ERIC Educational Resources Information Center

    Gorman, Paul; Lavelle, Mary; Delcambre, Lois; Maier, David

    2002-01-01

    Offers an overview of the authors' experience using several observational methods to better understand one class of users, expert clinicians treating patients in hospital settings. Shows the evolution of understanding of the users and their information-handling tasks based on observations made in the field by a multidisciplinary research team, and…

  1. Multi-party quantum key agreement with five-qubit brown states

    NASA Astrophysics Data System (ADS)

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  2. Two-party quantum key agreement with five-particle entangled states

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  3. Information Content Analysis for Selection of Optimal JWST  Observing Modes for Transiting Exoplanet Atmospheres

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Batalha, Natasha E.; Line, M. R., E-mail: neb149@psu.edu

    The James Webb Space Telescope ( JWST ) is nearing its launch date of 2018, and is expected to revolutionize our knowledge of exoplanet atmospheres. In order to specifically identify which observing modes will be most useful for characterizing a diverse range of exoplanetary atmospheres, we use an information content (IC) based approach commonly used in the studies of solar system atmospheres. We develop a system based upon these IC methods to trace the instrumental and atmospheric model phase space in order to identify which observing modes are best suited for particular classes of planets, focusing on transmission spectra. Specifically,more » the atmospheric parameter space we cover is T  = 600–1800 K, C/O = 0.55–1, [M/H] = 1–100 × Solar for an R  = 1.39 R{sub J}, M  = 0.59 M{sub J} planet orbiting a WASP-62-like star. We also explore the influence of a simplified opaque gray cloud on the IC. We find that obtaining broader wavelength coverage over multiple modes is preferred over higher precision in a single mode given the same amount of observing time. Regardless of the planet temperature and composition, the best modes for constraining terminator temperatures, C/O ratios, and metallicity are NIRISS SOSS+NIRSpec G395. If the target’s host star is dim enough such that the NIRSpec prism is applicable, then it can be used instead of NIRISS SOSS+NIRSpec G395. Lastly, observations that use more than two modes should be carefully analyzed because sometimes the addition of a third mode results in no gain of information. In these cases, higher precision in the original two modes is favorable.« less

  4. Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters.

    PubMed

    Gonzalez, Elias; Kish, Laszlo B; Balog, Robert S; Enjeti, Prasad

    2013-01-01

    We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions.

  5. Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters

    PubMed Central

    2013-01-01

    We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions. PMID:23936164

  6. Rapid Detection of Small Movements with GNSS Doppler Observables

    NASA Astrophysics Data System (ADS)

    Hohensinn, Roland; Geiger, Alain

    2017-04-01

    High-alpine terrain reacts very sensitively to varying environmental conditions. As an example, increasing temperatures cause thawing of permafrost areas. This, in turn causes an increasing threat by natural hazards like debris flow (e.g. rock glaciers) or rockfalls. The Institute of Geodesy and Photogrammetry is contributing to alpine mass-movement monitoring systems in different project areas in the Swiss Alps. A main focus lies on providing geodetic mass-movement information derived from GNSS static solutions on a daily and a sub-daily basis, obtained with low-cost and autonomous GNSS stations. Another focus is set on rapidly providing reliable geodetic information in real-time i.e. for an integration in early warning systems. One way to achieve this is the estimation of accurate station velocities from observations of range rates, which can be obtained as Doppler observables from time derivatives of carrier phase measurements. The key for this method lies in a precise modeling of prominent effects contributing to the observed range rates, which are satellite velocity, atmospheric delay rates and relativistic effects. A suitable observation model is then devised, which accounts for these predictions. The observation model, combined with a simple kinematic movement model forms the basis for the parameter estimation. Based on the estimated station velocities, movements are then detected using a statistical test. To improve the reliablity of the estimated parameters, another spotlight is set on an on-line quality control procedure. We will present the basic algorithms as well as results from first tests which were carried out with a low-cost GPS L1 phase receiver. With a u-blox module and a sampling rate of 5 Hz, accuracies on the mm/s level can be obtained and velocities down to 1 cm/s can be detected. Reliable and accurate station velocities and movement information can be provided within seconds.

  7. Priorities and developments of sensors, samplers and methods for key marine biological observations.

    NASA Astrophysics Data System (ADS)

    Simmons, Samantha; Chavez, Francisco; Pearlman, Jay

    2016-04-01

    Over the last two decades or more, physical oceanography has seen a significant growth in in-situ sensors and platforms including fixed point and cable observatories, Argo floats, gliders and AUVs to supplement satellites for creating a 3-D view of the time-varying global ocean temperature and salinity structures. There are important developments recently for biogeochemists for monitoring nitrate, chemical contaminants, oxygen and pH that can now be added to these autonomous systems. Biologists are still lagging. Given the importance of biology to ocean health and the future earth, and the present reliance on humans and ships for observing species and abundance, it is paramount that new biological sensor systems be developed. Some promising sensor systems based on, but not limited to acoustic, chemical, genomic or imaging techniques, can sense from microbes to whales, are on the horizon. These techniques can be applied in situ with either real time or recorded data and can be captured and returned to the laboratory using the autonomous systems. The number of samples is limiting, requiring adaptive and smart systems. Two steps are envisioned to meeting the challenges. The first is to identify the priority biological variables to focus observation requirements and planning. The second is to address new sensors that can fill the gaps in current capabilities for biological observations. This abstract will review recent efforts to identify core biological variables for the US Integrated Ocean Observing System and address new sensors and innovations for observing these variables, particularly focused on availability and maturity of sensors.

  8. Key Concepts in Microbial Oceanography

    NASA Astrophysics Data System (ADS)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  9. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Wang, Chao; Song, Xiao-Tian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2015-10-01

    Measurement-device-independent quantum key distribution (MDI QKD) is a substantial step toward practical information-theoretic security for key sharing between remote legitimate users (Alice and Bob). As with other standard device-dependent quantum key distribution protocols, such as BB84, MDI QKD assumes that the reference frames have been shared between Alice and Bob. In practice, a nontrivial alignment procedure is often necessary, which requires system resources and may significantly reduce the secure key generation rate. Here, we propose a phase-coding reference-frame-independent MDI QKD scheme that requires no phase alignment between the interferometers of two distant legitimate parties. As a demonstration, a proof-of-principle experiment using Faraday-Michelson interferometers is presented. The experimental system worked at 1 MHz, and an average secure key rate of 8.309 bps was obtained at a fiber length of 20 km between Alice and Bob. The system can maintain a positive key generation rate without phase compensation under normal conditions. The results exhibit the feasibility of our system for use in mature MDI QKD devices and its value for network scenarios.

  10. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  11. Developing Key Competencies for Sustainable Development in Higher Education

    ERIC Educational Resources Information Center

    Barth, Matthias; Godemann, Jasmin; Rieckmann, Marco; Stoltenberg, Ute

    2007-01-01

    Purpose: To date, little attention has been given to the circumstances in which the process of developing key competencies for sustainable development may take place. The purpose of this paper is to consider, the possibilities both of formal and informal learning and their relationship to competence development within higher education.…

  12. Analysis of counterfactual quantum key distribution using error-correcting theory

    NASA Astrophysics Data System (ADS)

    Li, Yan-Bing

    2014-10-01

    Counterfactual quantum key distribution is an interesting direction in quantum cryptography and has been realized by some researchers. However, it has been pointed that its insecure in information theory when it is used over a high lossy channel. In this paper, we retry its security from a error-correcting theory point of view. The analysis indicates that the security flaw comes from the reason that the error rate in the users' raw key pair is as high as that under the Eve's attack when the loss rate exceeds 50 %.

  13. Meeting the needs of parents around the time of diagnosis of disability among their children: evaluation of a novel program for information, support, and liaison by key workers.

    PubMed

    Rahi, Jugnoo S; Manaras, Irene; Tuomainen, Helena; Hundt, Gillian Lewando

    2004-10-01

    Key worker programs for families of children with disabilities, to promote information provision, emotional support, and liaisons among different agencies, have long been advocated but not extensively implemented. We report the impact on the experiences of parents and the practices of health care professionals of a novel, hospital-based, key worker service (Community Link Team [CLT]), implemented in the pediatric ophthalmology department of Great Ormond Street Hospital (London, United Kingdom). The CLT included 2 members, 1 of whom was present during the first outpatient assessment by the consultant ophthalmologist of any child newly diagnosed as visually impaired (corrected acuity of 6/18 or worse in the better eye) and accompanied the family during other assessments performed during that visit. A dedicated room was used by the CLT members to spend time with each family after completion of the clinical assessments. The CLT members reiterated and/or clarified clinical information already provided, specifically advised the families about visual stimulation programs and the benefits and purpose of visual impairment certification, and provided information about educational and social services. The same CLT member met the family at subsequent visits to the department and acted as the first point of contact for parents. Parents of children newly diagnosed with visual impairment and/or ophthalmic disorders at Great Ormond Street Hospital participated in a 2-stage study to assess their needs, their views about the processes of care, and their overall satisfaction. The study included a questionnaire survey with 2 standard instruments, ie, the Measure of Processes of Care, specifically developed and used to assess parents' views of the degree to which health services for a range of childhood disorders are family-centered, and the short form of the Client Satisfaction Questionnaire, used to assess overall parental satisfaction or dissatisfaction with services in the

  14. Key Strengths of an Innovative Volunteer Training Workshop

    ERIC Educational Resources Information Center

    Sellick, Angelika; Bournot-Trites, Monique; Reeder, Ken; Scales, Andrew; Smith, Mark; Zappa-Hollman, Sandra

    2011-01-01

    The study involved 14 volunteer facilitators, four UBC staff members, and the researcher as participant; the data collected were observation notes, questionnaires, results from focus groups, and interviews. The study revealed that the key strengths of the training workshop lay in its approach to training, its focus on confidence and capacity…

  15. An Integrative Model of "Information Visibility" and "Information Seeking" on the Web

    ERIC Educational Resources Information Center

    Mansourian, Yazdan; Ford, Nigel; Webber, Sheila; Madden, Andrew

    2008-01-01

    Purpose: This paper aims to encapsulate the main procedure and key findings of a qualitative research on end-users' interactions with web-based search tools in order to demonstrate how the concept of "information visibility" emerged and how an integrative model of information visibility and information seeking on the web was constructed.…

  16. Decision-making contexts involving Earth observations in federal and state government agencies

    NASA Astrophysics Data System (ADS)

    Kuwayama, Y.; Thompson, A.

    2017-12-01

    National and international organizations are placing greater emphasis on the societal and economic benefits that can be derived from applications of Earth observations, yet improvements are needed to connect to the decision processes that produce actions with direct societal benefits. The Consortium for the Valuation of Applications Benefits Linked with Earth Science (VALUABLES), a cooperative agreement between Resources for the Future (RFF) and the National Aeronautics and Space Administration (NASA), has the goal of advancing methods for the valuation and communication of the applied benefits linked with Earth observations. One of the Consortium's activities is a set of Policy Briefs that document the use of Earth observations for decision making in federal and state government agencies. In developing these Policy Briefs, we pay special attention to documenting the entire information value chain associated with the use of Earth observations in government decision making, namely (a) the specific data product, modeling capability, or information system used by the agency, (b) the decision context that employs the Earth observation information and translates it into an agency action, (c) the outcomes that are realized as a result of the action, and (d) the beneficiaries associated with the outcomes of the decision. Two key examples include the use of satellite data for informing the US Drought Monitor (USDM), which is used to determine the eligibility of agricultural communities for drought disaster assistance programs housed at the US Department of Agriculture (USDA), and the use of satellite data by the Florida Department of Environmental Protection to develop numeric nutrient water quality standards and monitoring methods for chlorophyll-a, which is codified in Florida state code (62-302.532).

  17. General Information about Melanoma

    MedlinePlus

    ... Screening Research Melanoma Treatment (PDQ®)–Patient Version General Information About Melanoma Go to Health Professional Version Key ... the PDQ Adult Treatment Editorial Board . Clinical Trial Information A clinical trial is a study to answer ...

  18. "Key to Freshwater Algae": A Web-Based Tool to Enhance Understanding of Microscopic Biodiversity

    ERIC Educational Resources Information Center

    Shayler, Hannah A.; Siver, Peter A.

    2006-01-01

    The Freshwater Ecology Laboratory at Connecticut College has developed an interactive, Web-based identification key to freshwater algal genera using the Lucid Professional and Lucid 3 software developed by the Centre for Biological Information Technology at the University of Queensland, Brisbane, Australia. The "Key to Freshwater Algae"…

  19. GIS environmental information analysis of the Darro River basin as the key for the management and hydrological forest restoration.

    PubMed

    Fernandez, Paz; Delgado, Expectación; Lopez-Alonso, Mónica; Poyatos, José Manuel

    2018-02-01

    This article presents analyses of soil and environmental information for the Darro River basin (Granada-Spain) preliminary to its hydrological and forestry restoration. These analyses were carried out using a geographical information system (GIS) and employing a new procedure that adapts hydrological forest-restoration methods. The complete analysis encompasses morphological conditions, soil and climate characteristics as well as vegetation and land use. The study investigates soil erosion in the basin by using Universal Soil Loss Equation (USLE) and by mapping erosion fragility units. The results are presented in a set of maps and their analysis, providing the starting point for river basin management and the hydrological and forestry-restoration project that was approved at the end of 2015. The presence of soft substrates (e.g. gravel and sand) indicates that the area is susceptible to erosion, particularly the areas that are dominated by human activity and have little soil protection. Finally, land use and vegetation cover were identified as key factors in the soil erosion in the basin. According to the results, river authorities have included several measures in the restoration project aimed at reducing the erosion and helping to recover the environmental value of this river basin and to include it in recreation possibilities for the community of Granada. The presented analytical approach, designed by the authors, would be useful as a tool for environmental restoration in other small Mediterranean river basins. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Work Keys USA.

    ERIC Educational Resources Information Center

    Work Keys USA, 1998

    1998-01-01

    "Work Keys" is a comprehensive program for assessing and teaching workplace skills. This serial "special issue" features 18 first-hand reports on Work Keys projects in action in states across North America. They show how the Work Keys is helping businesses and educators solve the challenge of building a world-class work force.…

  1. Satellite Observations of Tropospheric Chemistry

    NASA Technical Reports Server (NTRS)

    Singh, Hanwant B.; Jacob, Daniel J.; Hipskind, R. Stephen (Technical Monitor)

    2001-01-01

    The troposphere is an essential component of the earth's life support system as well as the gateway for the exchange of chemicals between different geochemical reservoirs of the earth. The chemistry of the troposphere is sensitive to perturbation from a wide range of natural phenomena and human activities. The societal concern has been greatly enhanced in recent decades due to ever increasing pressures of population growth and industrialization. Chemical changes within the troposphere control a vast array of processes that impact human health, the biosphere, and climate. A main goal of tropospheric chemistry research is to measure and understand the response of atmospheric composition to natural and anthropogenic perturbations, and to develop the capability to predict future change. Atmospheric chemistry measurements are extremely challenging due to the low concentrations of critical species and the vast scales over which the observations must be made. Available tropospheric data are mainly from surface sites and aircraft missions. Because of the limited temporal extent of aircraft observations, we have very limited information on tropospheric composition above the surface. This situation can be contrasted to the stratosphere, where satellites have provided critical and detailed chemical data on the global distribution of key trace gases.

  2. Meteor Observational Data Visualisation in the Equatorial Coordinate System Using Information Technology

    NASA Astrophysics Data System (ADS)

    Golovashchenko, V. A.; Kolomiyets, S. V.

    As a result of dynamic evolution of IT industry and astronomical research in the XXI century, which have resulted in obtaining large and complex data sets known as Big Data (e.g. data from the European Space Agency missions, such as GAIA mission, etc.), as well as due to rapid development of computer technologies, astronomy and computer science have become closely linked to each other. In the XXI century, Information technology has become an essential part of understanding the world around. This paper presents a solution to the problem of meteor data representation in the second equatorial coordinate (RA-Dec) system using Information Technology. Such a visualisation solution is needed to analyse the results of experiments based on the radar observations conducted in 1972-1978 (stage 1 - the data obtained in 1972 comprise 10,247 meteor orbits), which have been accumulated and stored in the Meteor Database of the Kharkiv National University of Radio Electronics (KNURE). A sample set of data with their characteristics and details about their delivery has been presented by (Kashcheyev & Tkachuk, 1980). An electronic calculator application was developed by employing the model of data visualisation in the form of celestial hemispheres using the object-oriented programming language C#.

  3. Study on the key technology of optical encryption based on compressive ghost imaging with double random-phase encoding

    NASA Astrophysics Data System (ADS)

    Zhang, Leihong; Pan, Zilan; Liang, Dong; Ma, Xiuhua; Zhang, Dawei

    2015-12-01

    An optical encryption method based on compressive ghost imaging (CGI) with double random-phase encoding (DRPE), named DRPE-CGI, is proposed. The information is first encrypted by the sender with DRPE, the DRPE-coded image is encrypted by the system of computational ghost imaging with a secret key. The key of N random-phase vectors is generated by the sender and will be shared with the receiver who is the authorized user. The receiver decrypts the DRPE-coded image with the key, with the aid of CGI and a compressive sensing technique, and then reconstructs the original information by the technique of DRPE-decoding. The experiments suggest that cryptanalysts cannot get any useful information about the original image even if they eavesdrop 60% of the key at a given time, so the security of DRPE-CGI is higher than that of the security of conventional ghost imaging. Furthermore, this method can reduce 40% of the information quantity compared with ghost imaging while the qualities of reconstructing the information are the same. It can also improve the quality of the reconstructed plaintext information compared with DRPE-GI with the same sampling times. This technique can be immediately applied to encryption and data storage with the advantages of high security, fast transmission, and high quality of reconstructed information.

  4. ESA's Earth Observation Programmes in the Changing Anthropocene

    NASA Astrophysics Data System (ADS)

    Liebig, Volker

    2016-07-01

    The intervention will present ESA's Earth Observation programmes and their relevance to studying the anthropocene. ESA's Earth observation missions are mainly grouped into three categories: The Sentinel satellites in the context of the European Copernicus Programme, the scientific Earth Explorers and the meteorological missions. Developments, applications and scientific results for the different mission types will be addressed, along with overall trends and strategies. The Earth Explorers, who form the science and research element of ESA's Living Planet Programme, focus on the atmosphere, biosphere, hydrosphere, cryosphere and Earth's interior. The Earth Explorers also aim at learning more about the interactions between these components and the impact that human activity is having on natural Earth processes. The Sentinel missions provide accurate, timely, long term and uninterrupted data to provide key information services, improving the way the environment is managed, and helping to mitigate the effects of climate change. The operational Sentinel satellites can also be exploited for scientific studies of the anthropocene. In the anthropocene human activities affect the whole planet and space is a very efficient means to measure their impact, but for relevant endeavours to be successful they can only be carried out in international cooperation. ESA maintains long-standing partnerships with other space agencies and institutions worldwide. In running its Earth observation programmes, ESA responds to societal needs and challenges and to requirements resulting from political priorities set by decision makers. Activities related to Climate Change are a prime example. Within ESA's Climate Change Initiative, 13 Essential Climate Variables are constantly monitored to create a long-term record of key geophysical parameters.

  5. Online Sources for Competitor Information.

    ERIC Educational Resources Information Center

    Weiss, Arthur

    Competitor information gathering is a key aspect of business planning. Information can be collected from either published or unpublished sources. Unpublished information will often be verified based on material from published sources. Published information is more likely to be factual and includes financial, stockmarket, press, market and…

  6. Access Control to Information in Pervasive Computing Environments

    DTIC Science & Technology

    2005-08-01

    for foo’s public key. (Digital signatures are omitted.) indicate a set of location and time intervals. A service will return location information only...stands for foo’s public key. (Digital signatures are omitted.) it describes the resource to which access is granted. Currently, we allow only resources...information relationship. Alice’s location information is bun- dled in her personal information. (The digital signature is omitted.) We use extended

  7. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  8. Psychometric Comparison of Self- and Informant-Reports of Personality

    PubMed Central

    Olino, Thomas M.; Klein, Daniel N.

    2017-01-01

    Self-reports are the most relied on assessment method in psychology. In the area of personality, informant-reports are a reasonable alternative assessment strategy. However, agreement between self- and informant-reports of personality is only moderately good. A portion of the observed discrepancies between self- and informant-reports of personality may come from differences in psychometric measurement across raters. That is, it is unknown whether the constructs assessed via self- and informant-reports are psychometrically identical. We examined four key personality scales—Well-Being, Social Closeness, Stress Reaction, and Harm Avoidance—in male and female dyads who provided self- and informant-reports for their partner. Similarities in self- and informant-reports of personality were evaluated by testing measurement invariance. Overall, models supported configural, metric, and scalar invariance for each of the four personality dimensions. These results suggest that the same psychometric constructs are assessed via self- and informant-reports of these personality dimensions. Informant-reports can be used in studies to avoid biases from relying solely on self-reports. PMID:25612626

  9. Key-peck durations under behavioral contrast and differential reinforcement

    PubMed Central

    Whipple, William R.; Fantino, Edmund

    1980-01-01

    Pigeons were maintained on a multiple schedule in which both components were variable-interval one-minute schedules. When they were switched to a condition in which one component was extinction, behavioral contrast was observed. The median durations of the key pecks in the unchanged component did not decrease in size. The results are incompatible with a theory of behavioral contrast which considers the added pecks to be short-duration responses. In a second experiment, pigeons were required to emit short-duration key pecks in one component of a multiple schedule, and long-duration pecks in the other. Two of three pigeons learned to emit responses appropriate to the requirements of the component in effect, suggesting that the duration of the key-peck response is sensitive to differential reinforcement. PMID:16812185

  10. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.

    PubMed

    Zheng, Ran; Yao, Chuanwei; Jin, Hai; Zhu, Lei; Zhang, Qin; Deng, Wei

    2015-01-01

    Surveillance video service (SVS) is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units) to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.

  11. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  12. Keys to Scholarship

    ERIC Educational Resources Information Center

    Hebert, Terri

    2011-01-01

    Up ahead, a foreboding wooden door showing wear from passage of earlier travelers is spotted. As the old porch light emits a pale yellow glow, a key ring emerges from deep inside the coat pocket. Searching for just the right key, the voyager settles on one that also shows age. As the key enters its receptacle and begins to turn, a clicking noise…

  13. Partial Adaptation of Obtained and Observed Value Signals Preserves Information about Gains and Losses

    PubMed Central

    Baddeley, Michelle; Tobler, Philippe N.; Schultz, Wolfram

    2016-01-01

    Given that the range of rewarding and punishing outcomes of actions is large but neural coding capacity is limited, efficient processing of outcomes by the brain is necessary. One mechanism to increase efficiency is to rescale neural output to the range of outcomes expected in the current context, and process only experienced deviations from this expectation. However, this mechanism comes at the cost of not being able to discriminate between unexpectedly low losses when times are bad versus unexpectedly high gains when times are good. Thus, too much adaptation would result in disregarding information about the nature and absolute magnitude of outcomes, preventing learning about the longer-term value structure of the environment. Here we investigate the degree of adaptation in outcome coding brain regions in humans, for directly experienced outcomes and observed outcomes. We scanned participants while they performed a social learning task in gain and loss blocks. Multivariate pattern analysis showed two distinct networks of brain regions adapt to the most likely outcomes within a block. Frontostriatal areas adapted to directly experienced outcomes, whereas lateral frontal and temporoparietal regions adapted to observed social outcomes. Critically, in both cases, adaptation was incomplete and information about whether the outcomes arose in a gain block or a loss block was retained. Univariate analysis confirmed incomplete adaptive coding in these regions but also detected nonadapting outcome signals. Thus, although neural areas rescale their responses to outcomes for efficient coding, they adapt incompletely and keep track of the longer-term incentives available in the environment. SIGNIFICANCE STATEMENT Optimal value-based choice requires that the brain precisely and efficiently represents positive and negative outcomes. One way to increase efficiency is to adapt responding to the most likely outcomes in a given context. However, too strong adaptation would result

  14. Towards Improving our Understanding on the Retrievals of Key Parameters Characterising Land Surface Interactions from Space: Introduction & First Results from the PREMIER-EO Project

    NASA Astrophysics Data System (ADS)

    Ireland, Gareth; North, Matthew R.; Petropoulos, George P.; Srivastava, Prashant K.; Hodges, Crona

    2015-04-01

    Acquiring accurate information on the spatio-temporal variability of soil moisture content (SM) and evapotranspiration (ET) is of key importance to extend our understanding of the Earth system's physical processes, and is also required in a wide range of multi-disciplinary research studies and applications. The utility and applicability of Earth Observation (EO) technology provides an economically feasible solution to derive continuous spatio-temporal estimates of key parameters characterising land surface interactions, including ET as well as SM. Such information is of key value to practitioners, decision makers and scientists alike. The PREMIER-EO project recently funded by High Performance Computing Wales (HPCW) is a research initiative directed towards the development of a better understanding of EO technology's present ability to derive operational estimations of surface fluxes and SM. Moreover, the project aims at addressing knowledge gaps related to the operational estimation of such parameters, and thus contribute towards current ongoing global efforts towards enhancing the accuracy of those products. In this presentation we introduce the PREMIER-EO project, providing a detailed overview of the research aims and objectives for the 1 year duration of the project's implementation. Subsequently, we make available the initial results of the work carried out herein, in particular, related to an all-inclusive and robust evaluation of the accuracy of existing operational products of ET and SM from different ecosystems globally. The research outcomes of this project, once completed, will provide an important contribution towards addressing the knowledge gaps related to the operational estimation of ET and SM. This project results will also support efforts ongoing globally towards the operational development of related products using technologically advanced EO instruments which were launched recently or planned be launched in the next 1-2 years. Key Words: PREMIER

  15. Extracting More Information from Passive Optical Tracking Observations for Reliable Orbit Element Generation

    NASA Astrophysics Data System (ADS)

    Bennett, J.; Gehly, S.

    2016-09-01

    This paper presents results from a preliminary method for extracting more orbital information from low rate passive optical tracking data. An improvement in the accuracy of the observation data yields more accurate and reliable orbital elements. A comparison between the orbit propagations from the orbital element generated using the new data processing method is compared with the one generated from the raw observation data for several objects. Optical tracking data collected by EOS Space Systems, located on Mount Stromlo, Australia, is fitted to provide a new orbital element. The element accuracy is determined from a comparison between the predicted orbit and subsequent tracking data or reference orbit if available. The new method is shown to result in a better orbit prediction which has important implications in conjunction assessments and the Space Environment Research Centre space object catalogue. The focus is on obtaining reliable orbital solutions from sparse data. This work forms part of the collaborative effort of the Space Environment Management Cooperative Research Centre which is developing new technologies and strategies to preserve the space environment (www.serc.org.au).

  16. Impact of an IEC (Information, Education and Communication) intervention on key family practices of mothers related to child health in Jamshoro, Sindh

    PubMed Central

    Shaikh, Salma; Memon, Shazia; Ahmed, Imran; Amna; Manzoor, Rabia; Shaikh, Saleem

    2014-01-01

    Objective: To determine change in practice of mothers having children less than five years of age in five key areas related to child health, growth and development including immunization, feeding during illness, appropriate home treatment for infections and care seeking behavior. Methods: This was a community based interventional study of Information, Education and Communication (IEC) intervention in the UC Jamshoro, Taluka Kotri, district Jamshoro of 15 months duration from March 2011 to June 2012. Ninety five mothers having children less than five years of age were selected by systematic random sampling for house hold based survey by questionnaire designed by EPP evaluation and health section of UNICEF during baseline and post-intervention phases. Base line data was collected from the interventional area then health education messages were given through written and pictorial material by LHWs for 9 months. To measure the impact helath education messages, data was again collected by same questionnaire are from the same union council during post-intervention phase. Results: During baseline survey except immunization all other key family practices were poor. After 9 months of intervention of repeated heath education sessions through LHW during their routine visits all practices were improved with statistically significant difference. Regarding the comparison of the results between baseline and post-intervention surveys we found that except immunization which was already better, all those practices which requires mother’s knowledge and practice were improved after our intervention with significant P-values. Conclusions: Improving the mother’s education level is very important, to empower the first care provider of child in the community. However, in the mean time, health educational messages related to the limited number of key family practices should be disseminated. PMID:24948990

  17. An investigation into the differentiating characteristics between car key burglars and regular burglars.

    PubMed

    Chapman, Rachel; Smith, Lisa L; Bond, John W

    2012-07-01

    Car key burglary has recently become the focus of empirical investigation as offenders, no longer able to steal vehicles without first obtaining their keys, resort to "burgling" target properties. Research surrounding the modus operandi of these offenses is beginning to emerge; however, little attention has been paid to investigating the characteristics of car key burglary offenders. Challenging the assumption that car key burglary offenses are perpetrated by regular burglars, this study aims to differentiate between offenders. Logistic regression analysis of 110 car key and 110 regular burglary offenders revealed that car key burglars are more likely to have previous vehicle theft convictions and are also more likely to be detected on information supplied to the police than regular burglars. Regular burglars are more likely to have previous shoplifting convictions. It was concluded that car key burglars are a distinct sample of offenders and the implications of these findings are discussed. © 2012 American Academy of Forensic Sciences.

  18. Improving specialist drug prescribing in primary care using task and error analysis: an observational study.

    PubMed

    Chana, Narinder; Porat, Talya; Whittlesea, Cate; Delaney, Brendan

    2017-03-01

    Electronic prescribing has benefited from computerised clinical decision support systems (CDSSs); however, no published studies have evaluated the potential for a CDSS to support GPs in prescribing specialist drugs. To identify potential weaknesses and errors in the existing process of prescribing specialist drugs that could be addressed in the development of a CDSS. Semi-structured interviews with key informants followed by an observational study involving GPs in the UK. Twelve key informants were interviewed to investigate the use of CDSSs in the UK. Nine GPs were observed while performing case scenarios depicting requests from hospitals or patients to prescribe a specialist drug. Activity diagrams, hierarchical task analysis, and systematic human error reduction and prediction approach analyses were performed. The current process of prescribing specialist drugs by GPs is prone to error. Errors of omission due to lack of information were the most common errors, which could potentially result in a GP prescribing a specialist drug that should only be prescribed in hospitals, or prescribing a specialist drug without reference to a shared care protocol. Half of all possible errors in the prescribing process had a high probability of occurrence. A CDSS supporting GPs during the process of prescribing specialist drugs is needed. This could, first, support the decision making of whether or not to undertake prescribing, and, second, provide drug-specific parameters linked to shared care protocols, which could reduce the errors identified and increase patient safety. © British Journal of General Practice 2017.

  19. Informing Carbon Dynamics in the Community Land Model with Observations from Across Timescales

    NASA Astrophysics Data System (ADS)

    Fox, A. M.; Hoar, T. J.

    2014-12-01

    Correct simulation of carbon dynamics in Earth System Models is required to accurately predict both short and long-term land carbon-cycle climate and concentration feedbacks. As new model structures and parameterizations of increasing complexity are introduced there is an ever present need for data to inform these developments, either indirectly through benchmarking activities, or directly through model-data fusion techniques. Here we briefly describe a very rich source of data that will come from the National Ecological Observatory Network (NEON), a continental-scale facility that will collect freely available biogeochemical and biophysical data from 60 sites representative of a full range of ecosystems across the USA over 30 years. Relevant data at each site include a full suite of micrometeorology measurements, profiles of CO2 and H2O vapor isotopes, soil temperature, moisture and CO2 flux, fine root images, and plot-based NPP, leaf area and litterfall estimates. This is accompanied by Lidar and hyperspectral derived biomass, leaf area and canopy chemistry at < 1m resolution of 100s km2. Critically, these observations are well calibrated and highly standardized across sites allowing comparisons, whilst plot and site selection has been designed to optimize representativeness and spatial scaling opportunities. To illustrate the potential utility of these data in constraining models, we show the range of Community Land Model (CLM) output at NEON site locations, and in model-space look at a number of different functional responses that characterize the model in space and time and could be tested with data. These observations can be used most directly through a data assimilation (DA) system and we demonstrate how we have developed support for CLM within the Data Assimilation Research Testbed (DART) that uses ensemble techniques for state estimation. Using an observing system experiment, we investigate how infrequent observations of carbon stocks constrain model

  20. Information Systems Plan.

    ERIC Educational Resources Information Center

    Tulsa Public Schools, OK.

    A task force sought to determine the information needs of the Tulsa Public Schools (Oklahoma) by studying goals of the school district, identifying all processes necessary for operation of the school system, and conducting interviews with 48 key members. A detailed information systems matrix was constructed to show the interrelationships between…