Sample records for private network design

  1. Internet firewalls: questions and answers

    NASA Astrophysics Data System (ADS)

    Ker, Keith

    1996-03-01

    As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.

  2. Private Peer-to-Peer Networks

    NASA Astrophysics Data System (ADS)

    Rogers, Michael; Bhatti, Saleem

    This chapter offers a survey of the emerging field of private peer-to-peer networks, which can be defined as internet overlays in which the resources and infrastructure are provided by the users, and which new users may only join by personal invitation. The last few years have seen rapid developments in this field. We describe deployed systems, classify them architecturally, and identify some technical and social tradeoffs in the design of private peer-to-peer networks.

  3. Enterprise virtual private network (VPN) with dense wavelength division multiplexing (DWDM) design

    NASA Astrophysics Data System (ADS)

    Carranza, Aparicio

    An innovative computer simulation and modeling tool for metropolitan area optical data communication networks is presented. These models address the unique requirements of Virtual Private Networks for enterprise data centers, which may comprise a mixture of protocols including ESCON, FICON, Fibre Channel, Sysplex protocols (ETR, CLO, ISC); and other links interconnected over dark fiber using Dense Wavelength Division Multiplexing (DWDM). Our models have the capability of designing a network with minimal inputs; to compute optical link budgets; suggest alternative configurations; and also optimize the design based on user-defined performance metrics. The models make use of Time Division Multiplexing (TDM) wherever possible for lower data rate traffics. Simulation results for several configurations are presented and they have been validated by means of experiments conducted on the IBM enterprise network testbed in Poughkeepsie, N.Y.

  4. 47 CFR 27.1305 - Shared wireless broadband network.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Shared wireless broadband network. 27.1305... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network. At...

  5. 47 CFR 90.1405 - Shared wireless broadband network.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Shared wireless broadband network. 90.1405... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network. At...

  6. 47 CFR 27.1305 - Shared wireless broadband network.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Shared wireless broadband network. 27.1305... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network. At...

  7. 47 CFR 90.1405 - Shared wireless broadband network.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Shared wireless broadband network. 90.1405... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network. At...

  8. 47 CFR 27.1305 - Shared wireless broadband network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 2 2012-10-01 2012-10-01 false Shared wireless broadband network. 27.1305... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network. At...

  9. 47 CFR 90.1405 - Shared wireless broadband network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Shared wireless broadband network. 90.1405... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network. At...

  10. Form Factor Evaluation of Open Body Area Network (OBAN) Physiological Status Monitoring (PSM) System Prototype Designs

    DTIC Science & Technology

    2018-05-11

    SYSTEM PROTOTYPE DESIGNS DISCLAIMERS The opinions or assertions contained herein are the private views of the author(s) and are not to be construed as...FORM FACTOR EVALUATION OF OPEN BODY AREA NETWORK (OBAN) PHYSIOLOGICAL STATUS MONITORING (PSM) SYSTEM PROTOTYPE DESIGNS William J...security; and is designed to function for 72 hours or more. The test described in this report assesses proposed form-factor designs . Feedback using

  11. Social Network Analysis Identifies Key Participants in Conservation Development.

    PubMed

    Farr, Cooper M; Reed, Sarah E; Pejchar, Liba

    2018-05-01

    Understanding patterns of participation in private lands conservation, which is often implemented voluntarily by individual citizens and private organizations, could improve its effectiveness at combating biodiversity loss. We used social network analysis (SNA) to examine participation in conservation development (CD), a private land conservation strategy that clusters houses in a small portion of a property while preserving the remaining land as protected open space. Using data from public records for six counties in Colorado, USA, we compared CD participation patterns among counties and identified actors that most often work with others to implement CDs. We found that social network characteristics differed among counties. The network density, or proportion of connections in the network, varied from fewer than 2 to nearly 15%, and was higher in counties with smaller populations and fewer CDs. Centralization, or the degree to which connections are held disproportionately by a few key actors, was not correlated strongly with any county characteristics. Network characteristics were not correlated with the prevalence of wildlife-friendly design features in CDs. The most highly connected actors were biological and geological consultants, surveyors, and engineers. Our work demonstrates a new application of SNA to land-use planning, in which CD network patterns are examined and key actors are identified. For better conservation outcomes of CD, we recommend using network patterns to guide strategies for outreach and information dissemination, and engaging with highly connected actor types to encourage widespread adoption of best practices for CD design and stewardship.

  12. Choosing the route to traveler information systems deployment : decision factors for creating public-private business plans : an action guide

    DOT National Transportation Integrated Search

    1998-01-01

    This document presents a guide designed to help public private partnerships in their efforts to provide Advanced Traveler Information Systems (ATIS) services. It first examines why ATIS can be useful in managing transportation networks and increasing...

  13. Design and Construction of a High-speed Network Connecting All the Protein Crystallography Beamlines at the Photon Factory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Matsugaki, Naohiro; Yamada, Yusuke; Igarashi, Noriyuki

    2007-01-19

    A private network, physically separated from the facility network, was designed and constructed which covered all the four protein crystallography beamlines at the Photon Factory (PF) and Structural Biology Research Center (SBRC). Connecting all the beamlines in the same network allows for simple authentication and a common working environment for a user who uses multiple beamlines. Giga-bit Ethernet wire-speed was achieved for the communication among the beamlines and SBRC buildings.

  14. Insights Into Collaborative Networks Of Nonprofit, Private, And Public Organizations That Address Complex Health Issues.

    PubMed

    Hogg, Rachel A; Varda, Danielle

    2016-11-01

    Community networks that include nonprofit, public, and private organizations have formed around many health issues, such as chronic disease management and healthy living and eating. Despite the increases in the numbers of and funding for cross-sector networks, and the growing literature about them, there are limited data and methods that can be used to assess their effectiveness and analyze their designs. We addressed this gap in knowledge by analyzing the characteristics of 260 cross-sector community health networks that collectively consisted of 7,816 organizations during the period 2008-15. We found that nonprofit organizations were more prevalent than private firms or government agencies in these networks. Traditional types of partners in community health networks such as hospitals, community health centers, and public health agencies were the most trusted and valued by other members of their networks. However, nontraditional partners, such as employer or business groups and colleges or universities, reported contributing relatively high numbers of resources to their networks. Further evidence is needed to inform collaborative management processes and policies as a mechanism for building what the Robert Wood Johnson Foundation describes as a culture of health. Project HOPE—The People-to-People Health Foundation, Inc.

  15. Optimization of turbine positioning in water distribution networks. A Sicilian case study

    NASA Astrophysics Data System (ADS)

    Milici, Barbara; Messineo, Simona; Messineo, Antonio

    2017-11-01

    The potential energy of water in Water Distribution Networks (WDNs), is usually dissipated by Pressure Reduction Valves (PRVs), thanks to which water utilities manage the pressure level in selected nodes of the network. The present study explores the use of economic hydraulic machines, pumps as turbines (PATs), to produce energy in a small network with the aim to avoid dissipation in favour of renewable energy production. The proposed study is applied to a WDN located in a town close to Palermo (Sicily), where users often install private tanks, to collect water during the period of water scarcity conditions. As expected, the economic benefit of PATs installation in WDNs is affected by the presence of private tanks, whose presence deeply modifies the network from designed condition. The analysis is carried out by means of a mathematical model, which is able to simulate dynamically water distribution networks with private tanks and PATs. As expected, the advantage of PATs' installation in terms of renewable energy recovery is strictly conditioned by their placement in the WDN.

  16. Contrasting Intermediation Practices in Various Advisory Service Networks in the Case of the French Ecophyto Plan

    ERIC Educational Resources Information Center

    Cerf, M.; Bail, Le; Lusson, J. M.; Omon, B.

    2017-01-01

    Purpose: To highlight the way a public policy aiming to achieve a 50% decrease of pesticides use in France reframed advice provision in public and private networks. Design/methodology/approach: We developed a framework to analyze intermediation in a public funded network, a farmers' association, and a network of co-operatives. The framework…

  17. Stochastic Dual Algorithm for Voltage Regulation in Distribution Networks with Discrete Loads: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dall-Anese, Emiliano; Zhou, Xinyang; Liu, Zhiyuan

    This paper considers distribution networks with distributed energy resources and discrete-rate loads, and designs an incentive-based algorithm that allows the network operator and the customers to pursue given operational and economic objectives, while concurrently ensuring that voltages are within prescribed limits. Four major challenges include: (1) the non-convexity from discrete decision variables, (2) the non-convexity due to a Stackelberg game structure, (3) unavailable private information from customers, and (4) different update frequency from two types of devices. In this paper, we first make convex relaxation for discrete variables, then reformulate the non-convex structure into a convex optimization problem together withmore » pricing/reward signal design, and propose a distributed stochastic dual algorithm for solving the reformulated problem while restoring feasible power rates for discrete devices. By doing so, we are able to statistically achieve the solution of the reformulated problem without exposure of any private information from customers. Stability of the proposed schemes is analytically established and numerically corroborated.« less

  18. Design and implementation considerations of a MSAT packet data network

    NASA Technical Reports Server (NTRS)

    Karam, Fouad G.; Hearn, Terry; Rohr, Doug; Guibord, Arthur F.

    1993-01-01

    The Mobile Data System, which is intended to provide for packet switched data services is currently under development. The system is based on a star network topology consisting of a centralized Data Hub (DH) serving a large number of mobile terminals. Through the Data Hub, end-to-end connections can be established between terrestrial users on public or private data networks and mobile users. The MDS network will be capable of offering a variety of services some of which are based on the standard X.25 network interface protocol, and others optimized for short messages and broadcast messages. A description of these services and the trade-offs in the DH design are presented.

  19. A Community-based Partnership for a Sustainable GNSS Geodetic Network

    NASA Astrophysics Data System (ADS)

    Dokka, R. K.

    2009-12-01

    Geodetic networks offer unparalleled opportunities to monitor and understand many of the rhythms of the Earth most vital to the sustainability of modern and future societies, i.e., crustal motions, sea-level, and the weather. For crustal deformation studies, the advantage is clear. Modern measurements allow us to document not only the permanent strains incurred over a seismic cycle, for example, but also the ephemeral strains that are critical for understanding the underlying physical mechanism. To be effective for science, however, geodetic networks must be properly designed, capitalized, and maintained over sufficient time intervals to fully capture the processes in action. Unfortunately, most networks lack interoperability and lack a business plan to ensure long term sustainability. The USA, for example, lacks a unified nation-wide GNSS network that can sustain its self over the coming years, decades, and century. Current federal priorities do not yet envision such a singular network. Publicly and privately funded regional networks exist, but tend to be parochial in scope, and optimized for a special user community, e.g., surveying, crustal motions, etc. Data sharing is common, but the lack of input at the beginning limits the functionality of the system for non-primary users. Funding for private networks depend heavily on the user demand, business cycle, and regulatory requirements. Agencies funding science networks offer no guarantee of sustained support. An alternative model (GULFNet) developed in Louisiana is meeting user needs, is sustainable, and is helping engineers, surveyors, and geologists become more spatially enabled. The common denominator among all participants is the view that accurate, precise, and timely geodetic data have tangible value for all segments of society. Although operated by a university (LSU), GULFNet is a community-based partnership between public and private sectors. GULFNet simultaneously achieves scientific goals by providing data to multiple user communities, supports National Spatial Reference System needs through NGS CORS, and serves the private sector by helping to make it become more profitable. The private sector participates through direct support that sustains operations, but most importantly by raising awareness among policy makers and federal and state appropriators.

  20. Public/Private Sector Interactions: The Implications for Networking. A Discussion Report Prepared by the Network Advisory Committee.

    ERIC Educational Resources Information Center

    Network Planning Paper, 1983

    1983-01-01

    At a 2-day meeting in October 1982, the Library of Congress Network Advisory Committee (NAC) members discussed the complex issues involved in public and private sector interactions and their relationship to networking activities. The report, "Public Sector/Private Sector Interaction in Providing Information Services," prepared by the…

  1. Development of mini VSAT system

    NASA Astrophysics Data System (ADS)

    Lu, Shyue-Ching; Chiu, Wu-Jhy; Lin, Hen-Dao; Shih, Mu-Piao

    1992-03-01

    This paper presents the mini VSAT (very small aperture terminal) system, which is a low cost networking system providing economical alternatives to the business world's datacom needs. The system is designed to achieve the highest possible performance/price ratio for private VSAT networks that range from a few tens of remote terminals to large networks of several thousands remote terminals. The paper describes the system architecture, major features, hardware and software structure, access protocol and performance of the developed system.

  2. Network survivability performance

    NASA Astrophysics Data System (ADS)

    1993-11-01

    This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunications networks to user expectations for network survivability and a foundation for continuing industry activities in the subject area. This report focuses on the survivability of both public and private networks and covers a wide range of users. Two frameworks are established for quantifying and categorizing service outages, and for classifying network survivability techniques and measures. The performance of the network survivability techniques is considered; however, recommended objectives are not established for network survivability performance.

  3. Manufacturing Consent for Privatization in Public Education: The Rise of a Social Finance Network in Canada

    ERIC Educational Resources Information Center

    Poole, Wendy; Sen, Vicheth; Fallon, Gerald

    2016-01-01

    Multiple forms of privatization are emerging in the Canadian public sector, including public-private partnerships. This article focuses on one approach to public-private partnerships called "social finance," and a network of public, private, and not-for-profit organizations that promotes social finance as a means of funding public…

  4. The Joint Fire Science Program Fire Exchange Network: Facilitating Knowledge Exchange About Wildland Fire Science Across the U.S.

    NASA Astrophysics Data System (ADS)

    York, A.; Blocksome, C.; Cheng, T.; Creighton, J.; Edwards, G.; Frederick, S.; Giardina, C. P.; Goebel, P. C.; Gucker, C.; Kobziar, L.; Lane, E.; Leis, S.; Long, A.; Maier, C.; Marschall, J.; McGowan-Stinski, J.; Mohr, H.; MontBlanc, E.; Pellant, M.; Pickett, E.; Seesholtz, D.; Skowronski, N.; Stambaugh, M. C.; Stephens, S.; Thode, A.; Trainor, S. F.; Waldrop, T.; Wolfson, B.; Wright, V.; Zedler, P.

    2014-12-01

    The Joint Fire Science Program's (JFSP) Fire Exchange Network is actively working to accelerate the awareness, understanding, and adoption of wildland fire science information by federal, tribal, state, local, and private stakeholders within ecologically similar regions. Our network of 15 regional exchanges provides timely, accurate, and regionally relevant science-based information to assist with fire management challenges. Regional activities, through which we engage fire and resource managers, scientists, and private landowners, include online newsletters and announcements, social media, regionally focused web-based clearinghouses of relevant science, field trips and demonstration sites, workshops and conferences, webinars and online training, and syntheses and fact sheets. Exchanges also help investigators design research that is relevant to regional management needs and assist with technology transfer to management audiences. This poster provides an introduction to and map of the regional exchanges.

  5. The Globalstar mobile satellite system for worldwide personal communications

    NASA Astrophysics Data System (ADS)

    Wiedeman, Robert A.; Viterbi, Andrew J.

    Loral Aerospace Corporation along with Qualcomm Inc. have developed a satellite system which offers global mobile voice and data services to and from handheld and mobile user terminals with omni-directional antennas. By combining the use of low-earth orbit (LEO) satellites with existing terrestrial communications systems and innovative, highly efficient spread spectrum techniques, the Globalstar system provides users with low-cost, reliable communications throughout the world. The Globalstar space segment consists of a constellation of 48 LEO satellites in circular orbits with 750 NM (1389 km) altitude. Each satellite communicates with the mobile users via the satellite-user links and with gateway stations. The gateway stations handle the interface between the Globalstar network and the OSTN/PLMN systems. Globalstar transceivers are similar to currently proposed digital cellular telephones in size and have a serial number that will allow the end user to make and receive calls from or to that device anywhere in the world. The Globalstar system is designed to operate as a complement to existing local, long-distance, public, private and specialized telecommunications networks. Service is primarily designed to serve the rural and thin route communications needs of consumers, government users, and private networks.

  6. The Globalstar mobile satellite system for worldwide personal communications

    NASA Technical Reports Server (NTRS)

    Wiedeman, Robert A.; Viterbi, Andrew J.

    1993-01-01

    Loral Aerospace Corporation along with Qualcomm Inc. have developed a satellite system which offers global mobile voice and data services to and from handheld and mobile user terminals with omni-directional antennas. By combining the use of low-earth orbit (LEO) satellites with existing terrestrial communications systems and innovative, highly efficient spread spectrum techniques, the Globalstar system provides users with low-cost, reliable communications throughout the world. The Globalstar space segment consists of a constellation of 48 LEO satellites in circular orbits with 750 NM (1389 km) altitude. Each satellite communicates with the mobile users via the satellite-user links and with gateway stations. The gateway stations handle the interface between the Globalstar network and the OSTN/PLMN systems. Globalstar transceivers are similar to currently proposed digital cellular telephones in size and have a serial number that will allow the end user to make and receive calls from or to that device anywhere in the world. The Globalstar system is designed to operate as a complement to existing local, long-distance, public, private and specialized telecommunications networks. Service is primarily designed to serve the rural and thin route communications needs of consumers, government users, and private networks.

  7. Hebertisme.

    ERIC Educational Resources Information Center

    Cousineau, Claude

    Designed to be of use to outdoor education centers, camp set-ups, or even public or private schools, this guide to the development of an "hebertisme" site presents the following: (1) definition ("an opportunity to discover one's own potential and limitations in moving about in the natural environment" using a network of natural…

  8. Open for business: private networks create a marketplace for health information exchange.

    PubMed

    Dimick, Chris

    2012-05-01

    Large health systems and their IT vendors are creating private information exchange networks at a time when federally funded state operations are gearing up for launch, Is there room for private and public offerings in the new HIE marketplace?

  9. An information model for a virtual private optical network (OVPN) using virtual routers (VRs)

    NASA Astrophysics Data System (ADS)

    Vo, Viet Minh Nhat

    2002-05-01

    This paper describes a virtual private optical network architecture (Optical VPN - OVPN) based on virtual router (VR). It improves over architectures suggested for virtual private networks by using virtual routers with optical networks. The new things in this architecture are necessary changes to adapt to devices and protocols used in optical networks. This paper also presents information models for the OVPN: at the architecture level and at the service level. These are extensions to the DEN (directory enable network) and CIM (Common Information Model) for OVPNs using VRs. The goal is to propose a common management model using policies.

  10. Setting Access Permission through Transitive Relationship in Web-based Social Networks

    NASA Astrophysics Data System (ADS)

    Hong, Dan; Shen, Vincent Y.

    The rising popularity of various social networking websites has created a huge problem on Internet privacy. Although it is easy to post photos, comments, opinions on some events, etc. on the Web, some of these data (such as a person’s location at a particular time, criticisms of a politician, etc.) are private and should not be accessed by unauthorized users. Although social networks facilitate sharing, the fear of sending sensitive data to a third party without knowledge or permission of the data owners discourages people from taking full advantage of some social networking applications. We exploit the existing relationships on social networks and build a ‘‘trust network’’ with transitive relationship to allow controlled data sharing so that the privacy and preferences of data owners are respected. The trust network linking private data owners, private data requesters, and intermediary users is a directed weighted graph. The permission value for each private data requester can be automatically assigned in this network based on the transitive relationship. Experiments were conducted to confirm the feasibility of constructing the trust network from existing social networks, and to assess the validity of permission value assignments in the query process. Since the data owners only need to define the access rights of their closest contacts once, this privacy scheme can make private data sharing easily manageable by social network participants.

  11. A Public-Private Partnership Improves Clinical Performance In A Hospital Network In Lesotho.

    PubMed

    McIntosh, Nathalie; Grabowski, Aria; Jack, Brian; Nkabane-Nkholongo, Elizabeth Limakatso; Vian, Taryn

    2015-06-01

    Health care public-private partnerships (PPPs) between a government and the private sector are based on a business model that aims to leverage private-sector expertise to improve clinical performance in hospitals and other health facilities. Although the financial implications of such partnerships have been analyzed, few studies have examined the partnerships' impact on clinical performance outcomes. Using quantitative measures that reflected capacity, utilization, clinical quality, and patient outcomes, we compared a government-managed hospital network in Lesotho, Africa, and the new PPP-managed hospital network that replaced it. In addition, we used key informant interviews to help explain differences in performance. We found that the PPP-managed network delivered more and higher-quality services and achieved significant gains in clinical outcomes, compared to the government-managed network. We conclude that health care public-private partnerships may improve hospital performance in developing countries and that changes in management and leadership practices might account for differences in clinical outcomes. Project HOPE—The People-to-People Health Foundation, Inc.

  12. 47 CFR 90.1410 - Network sharing agreement.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Network sharing agreement. 90.1410 Section 90... PRIVATE LAND MOBILE RADIO SERVICES 700 MHz Public/Private Partnership § 90.1410 Network sharing agreement... related entities as the Commission may require or allow will be governed by the Network Sharing Agreement...

  13. 47 CFR 90.1410 - Network sharing agreement.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Network sharing agreement. 90.1410 Section 90... PRIVATE LAND MOBILE RADIO SERVICES 700 MHz Public/Private Partnership § 90.1410 Network sharing agreement... related entities as the Commission may require or allow will be governed by the Network Sharing Agreement...

  14. 47 CFR 90.1410 - Network sharing agreement.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Network sharing agreement. 90.1410 Section 90... PRIVATE LAND MOBILE RADIO SERVICES 700 MHz Public/Private Partnership § 90.1410 Network sharing agreement... related entities as the Commission may require or allow will be governed by the Network Sharing Agreement...

  15. Packet-aware transport for video distribution [Invited

    NASA Astrophysics Data System (ADS)

    Aguirre-Torres, Luis; Rosenfeld, Gady; Bruckman, Leon; O'Connor, Mannix

    2006-05-01

    We describe a solution based on resilient packet rings (RPR) for the distribution of broadcast video and video-on-demand (VoD) content over a packet-aware transport network. The proposed solution is based on our experience in the design and deployment of nationwide Triple Play networks and relies on technologies such as RPR, multiprotocol label switching (MPLS), and virtual private LAN service (VPLS) to provide the most efficient solution in terms of utilization, scalability, and availability.

  16. 47 CFR 27.1307 - Spectrum use in the network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ....1307 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1307 Spectrum use in the network. (a) Spectrum use. The shared wireless broadband network developed by the 700 MHz Public/Private...

  17. Human recognition in a video network

    NASA Astrophysics Data System (ADS)

    Bhanu, Bir

    2009-10-01

    Video networks is an emerging interdisciplinary field with significant and exciting scientific and technological challenges. It has great promise in solving many real-world problems and enabling a broad range of applications, including smart homes, video surveillance, environment and traffic monitoring, elderly care, intelligent environments, and entertainment in public and private spaces. This paper provides an overview of the design of a wireless video network as an experimental environment, camera selection, hand-off and control, anomaly detection. It addresses challenging questions for individual identification using gait and face at a distance and present new techniques and their comparison for robust identification.

  18. Design of a patient-centered, multi-institutional healthcare information network using peer-to-peer communication in a highly distributed architecture.

    PubMed

    Geissbuhler, Antoine; Spahni, Stéphane; Assimacopoulos, André; Raetzo, Marc-André; Gobet, Gérard

    2004-01-01

    to design a community healthcare information network for all 450,000 citizen in the State of Geneva, Switzerland, connecting public and private healthcare professionals. Requirements include the decentralized storage of information at the source of its production, the creation of a virtual patient record at the time of the consultation, the control by the patient of the access rights to the information, and the interoperability with other similar networks at the national and european level. a participative approach and real-world pilot projects are used to design, test and validate key components of the network, including its technical architecture and the strategy for the management of access rights by the patients. a distributed architecture using peer-to-peer communication of information mediators can implement the various requirements while limiting to an absolute minimum the amount of centralized information. Access control can be managed by the patient with the help of a medical information mediator, the physician of trust.

  19. Analysis of Feeder Bus Network Design and Scheduling Problems

    PubMed Central

    Almasi, Mohammad Hadi; Karim, Mohamed Rehan

    2014-01-01

    A growing concern for public transit is its inability to shift passenger's mode from private to public transport. In order to overcome this problem, a more developed feeder bus network and matched schedules will play important roles. The present paper aims to review some of the studies performed on Feeder Bus Network Design and Scheduling Problem (FNDSP) based on three distinctive parts of the FNDSP setup, namely, problem description, problem characteristics, and solution approaches. The problems consist of different subproblems including data preparation, feeder bus network design, route generation, and feeder bus scheduling. Subsequently, descriptive analysis and classification of previous works are presented to highlight the main characteristics and solution methods. Finally, some of the issues and trends for future research are identified. This paper is targeted at dealing with the FNDSP to exhibit strategic and tactical goals and also contributes to the unification of the field which might be a useful complement to the few existing reviews. PMID:24526890

  20. Crosstalk cancellation on linearly and circularly polarized communications satellite links

    NASA Technical Reports Server (NTRS)

    Overstreet, W. P.; Bostian, C. W.

    1979-01-01

    The paper discusses the cancellation network approach for reducing crosstalk caused by depolarization on a dual-polarized communications satellite link. If the characteristics of rain depolarization are sufficiently well known, the cancellation network can be designed in a way that reduces system complexity, the most important parameter being the phase of the cross-polarized signal. Relevant theoretical calculations and experimental data are presented. The simplicity of the cancellation system proposed makes it ideal for use with small domestic or private earth terminals.

  1. [Local communalization of clinical records between the municipal community hospital and local medical institutes by using information technology].

    PubMed

    Iijima, Shohei; Shinoki, Keiji; Ibata, Takeshi; Nakashita, Chisako; Doi, Seiko; Hidaka, Kumi; Hata, Akiko; Matsuoka, Mio; Waguchi, Hideko; Mito, Saori; Komuro, Ryutaro

    2012-12-01

    We introduced the electronic health record system in 2002. We produced a community medical network system to consolidate all medical treatment information from the local institute in 2010. Here, we report on the present status of this system that has been in use for the previous 2 years. We obtained a private server, set up a virtual private network(VPN)in our hospital, and installed dedicated terminals to issue an electronic certificate in 50 local institutions. The local institute applies for patient agreement in the community hospital(hospital designation style). They are then entitled to access the information of the designated patient via this local network server for one year. They can access each original medical record, sorted on the basis of the medical attendant and the chief physician; a summary of hospital stay; records of medication prescription; and the results of clinical examinations. Currently, there are approximately 80 new registrations and accesses per month. Information is provided in real time allowing up to date information, helping prescribe the medical treatment at the local institute. However, this information sharing system is read-only, and there is no cooperative clinical pass system. Therefore, this system has a limit to meet the demand for cooperation with the local clinics.

  2. Not Just Figureheads: Trustees as Microfoundations of Higher Education Institutions

    ERIC Educational Resources Information Center

    Barringer, Sondra N.; Riffe, Karley A.

    2018-01-01

    Despite the importance of trustees for higher education institutions, few studies address how they influence the institutions they steward. To address this gap, we used a social network approach within a comparative case study design to evaluate how trustees interacted with two private, elite universities: Harvard University and the Massachusetts…

  3. An Impact Evaluation of the Resource Access Projects, 1981-1982.

    ERIC Educational Resources Information Center

    Empson, Judith V.; And Others

    In 1976, the Administration for Children, Youth, and Families (ACYF) designed the Resource Access Project (RAP) to strengthen services that Head Start programs provide to handicapped preschool children. Today, 15 RAPs are sponsored by public and private agencies and universities throughout the country. The ACYF-funded network of projects links…

  4. The Politics of Pipes: The Persistence of Small Water Networks in Post-Privatization Manila

    NASA Astrophysics Data System (ADS)

    Cheng, Deborah

    This project examines the politics of water provision in low-income areas of large, developing cities. In the last two decades, water privatization has become a global paradigm, emerging as a potential means for addressing the urban water crisis. In Manila, the site of the world's largest water privatization project, service to low-income areas has improved significantly in the post-privatization era. But whereas expansion of a water utility typically involves the replacement of informal providers, the experience in Manila demonstrates that the rapid connection of low-income areas actually hinges, in part, on the selective inclusion and exclusion of these smaller actors. Based on an ethnography of the private utilities and community-based providers, I use the persistence of small water networks as a lens for exploring the limits of water privatization in Manila. I focus on what I call micro-networks---community-built infrastructure that extends the formal, private utilities into low-income neighborhoods that the utilities do not wish to serve directly. In such a setup, the utility provides water only as far as the community boundary; beyond that, the micro-network operator constructs internal infrastructure, monitors for leakage and theft, and collects bills. But while these communities may gain access to safer water, they are also subject to higher costs and heightened disciplinary measures. By tracing the ways in which the utilities selectively use micro-networks to manage sub-populations, I show how the utilities make low-income spaces more governable. Delegating localized water management to micro-network operators depoliticizes the utilities' roles, shifting the sociopolitical difficulties of water provision to community organizations, while allowing the utilities to claim that these areas are served. This research leads to three related arguments. First, the persistence of small water networks highlights lingering inequities in access to water, for micro-network consumers are subject to disparities in cost, materials, and personal freedoms. Though Manila's water privatization project has resulted in significant improvements to the centralized system, its success must be tempered by the inequalities that remain. Second, the two utilities are largely able to shape both the geographies of water access and the production of knowledge. For this reason, the utilities typically use micro-networks where cost recovery may be difficult---such as in areas with uncertain land tenure or where higher levels of nonpayment are perceived---while including these areas in their aggregate coverage statistics. Third, the presence of multiple providers of water and other basic services blurs the boundaries between public, private, and community. But that blurriness serves to consolidate the private utilities' power, while increasing the opacity by which citizens navigate processes related to urban water provision. The persistence of micro-networks thus allows us to understand the ways in which low-income spaces are made more governable. By focusing on this peri-urban frontier, this project asserts that differentiation and discipline serve simultaneously as tools of governance and as points of contestation. What emerges is a waterscape consisting not of one type of privatization---where service and access are uniformly provided---but multiple, coexisting, and differentiated privatizations.

  5. Open source system OpenVPN in a function of Virtual Private Network

    NASA Astrophysics Data System (ADS)

    Skendzic, A.; Kovacic, B.

    2017-05-01

    Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.

  6. Quality of Service Control Based on Virtual Private Network Services in a Wide Area Gigabit Ethernet Optical Test Bed

    NASA Astrophysics Data System (ADS)

    Rea, Luca; Pompei, Sergio; Valenti, Alessandro; Matera, Francesco; Zema, Cristiano; Settembre, Marina

    We report an experimental investigation about the Virtual Private LAN Service technique to guarantee the quality of service in the metro/core network and also in the presence of access bandwidth bottleneck. We also show how the virtual private network can be set up for answering to a user request in a very fast way. The tests were performed in a GMPLS test bed with GbE core routers linked with long (tens of kilometers) GbE G.652 fiber links.

  7. The Development of the Command and Control Centre for Trial Kondari

    DTIC Science & Technology

    2010-07-01

    the C2 centre inside a blue bubble whose modems have privately assigned IP addresses which are authenticated by Telstra’s radius server. No other sim...cards can communicate on this private network unless authorised by the radius server. The Next IP network is a network bubble within the larger Next...for all machines on the network.  EPLRS Network Manager (ENM) radio – authenticates and manages all the EPLRS radios. The basic plan’s final

  8. Shaping Collective Functions in Privatized Agricultural Knowledge and Information Systems: The Positioning and Embedding of a Network Broker in the Dutch Dairy Sector

    ERIC Educational Resources Information Center

    Klerkx, Laurens; Leeuwis, Cees

    2009-01-01

    This paper examines new organizational arrangements that have emerged in the context of a privatized extension system. It investigates the positioning and embedding of a network broker aimed at enhancing interaction in the privatized agricultural knowledge and information system (AKIS), to assess whether tensions reported in other sectors also…

  9. 29 CFR 825.310 - Certification for leave taken to care for a covered servicemember (military caregiver leave).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...”) health care provider; (3) A DOD TRICARE network authorized private health care provider; (4) A DOD non..., and appropriate contact information (telephone number, fax number, and/or email address) of the health... DOD TRICARE network authorized private health care provider; (iv) A DOD non-network TRICARE authorized...

  10. 29 CFR 825.310 - Certification for leave taken to care for a covered servicemember (military caregiver leave).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...”) health care provider; (3) A DOD TRICARE network authorized private health care provider; or (4) A DOD non... name, address, and appropriate contact information (telephone number, fax number, and/or email address... provider; (iii) A DOD TRICARE network authorized private health care provider; or (iv) A DOD non-network...

  11. 29 CFR 825.310 - Certification for leave taken to care for a covered servicemember (military caregiver leave).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...”) health care provider; (3) A DOD TRICARE network authorized private health care provider; (4) A DOD non..., and appropriate contact information (telephone number, fax number, and/or email address) of the health... DOD TRICARE network authorized private health care provider; (iv) A DOD non-network TRICARE authorized...

  12. 29 CFR 825.310 - Certification for leave taken to care for a covered servicemember (military caregiver leave).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...”) health care provider; (3) A DOD TRICARE network authorized private health care provider; or (4) A DOD non... name, address, and appropriate contact information (telephone number, fax number, and/or email address... provider; (iii) A DOD TRICARE network authorized private health care provider; or (iv) A DOD non-network...

  13. TD-LTE Wireless Private Network QoS Transmission Protection

    NASA Astrophysics Data System (ADS)

    Zhang, Jianming; Cheng, Chao; Wu, Zanhong

    With the commencement of construction of the smart grid, the demand power business for reliability and security continues to improve, the reliability transmission of power TD-LTE Wireless Private Network are more and more attention. For TD-LTE power private network, it can provide different QoS services according to the user's business type, to protect the reliable transmission of business. This article describes in detail the AF module of PCC in the EPC network, specifically introduces set up AF module station and QoS mechanisms in the EPS load, fully considers the business characteristics of the special power network, establishing a suitable architecture for mapping QoS parameters, ensuring the implementation of each QoS business. Through using radio bearer management, we can achieve the reliable transmission of each business on physical channel.

  14. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  15. Ubiquitous virtual private network: a solution for WSN seamless integration.

    PubMed

    Villa, David; Moya, Francisco; Villanueva, Félix Jesús; Aceña, Óscar; López, Juan Carlos

    2014-01-06

    Sensor networks are becoming an essential part of ubiquitous systems and applications. However, there are no well-defined protocols or mechanisms to access the sensor network from the enterprise information system. We consider this issue as a heterogeneous network interconnection problem, and as a result, the same concepts may be applied. Specifically, we propose the use of object-oriented middlewares to provide a virtual private network in which all involved elements (sensor nodes or computer applications) will be able to communicate as if all of them were in a single and uniform network.

  16. Inequity in ecosystem service delivery: Socioeconomic gaps in the public-private conservation network

    USGS Publications Warehouse

    Villamagna, Amy M.; Mogollón, Beatriz; Angermeier, Paul L.

    2017-01-01

    Conservation areas, both public and private, are critical tools to protect biodiversity and deliver important ecosystem services (ES) to society. Although societal benefits from such ES are increasingly used to promote public support of conservation, the number of beneficiaries, their identity, and the magnitude of benefits are largely unknown for the vast majority of conservation areas in the United States public-private conservation network. The location of conservation areas in relation to people strongly influences the direction and magnitude of ES flows as well as the identity of beneficiaries. We analyzed benefit zones, the areas to which selected ES could be conveyed to beneficiaries, to assess who benefits from a typical conservation network. Better knowledge of ES flows and beneficiaries will help land conservationists make a stronger case for the broad collateral benefits of conservation and help to address issues of social-environmental justice. To evaluate who benefits the most from the current public-private conservation network, we delineated the benefit zones for local ES (within 16 km) that are conveyed along hydrological paths from public (federal and state) and private (easements) conservation lands in the states of North Carolina and Virginia, USA. We also discuss the challenges and demonstrate an approach for delineating nonhydrological benefits that are passively conveyed to beneficiaries. We mapped and compared the geographic distribution of benefit zones within and among conservation area types. We further compared beneficiary demographics across benefit zones of the conservation area types and found that hydrological benefit zones of federal protected areas encompass disproportionately fewer minority beneficiaries compared to statewide demographic patterns. In contrast, benefit zones of state protected areas and private easements encompassed a much greater proportion of minority beneficiaries (~22–25%). Benefit zones associated with private conservation lands included beneficiaries of significantly greater household income than benefit zones of other types of conservation areas. Our analysis of ES flows revealed significant socioeconomic gaps in how the current public-private conservation network benefits the public. These gaps warrant consideration in regional conservation plans and suggest that private conservation initiatives may be best suited for responding to the equity challenge. Enhancing the ecosystem benefits and the equity of benefit delivery from private conservation networks could build public and political support for long-term conservation strategies and ultimately enhance conservation efficacy.

  17. Design and implementation of a high performance network security processor

    NASA Astrophysics Data System (ADS)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  18. Privacy-Preserving Integration of Medical Data : A Practical Multiparty Private Set Intersection.

    PubMed

    Miyaji, Atsuko; Nakasho, Kazuhisa; Nishida, Shohei

    2017-03-01

    Medical data are often maintained by different organizations. However, detailed analyses sometimes require these datasets to be integrated without violating patient or commercial privacy. Multiparty Private Set Intersection (MPSI), which is an important privacy-preserving protocol, computes an intersection of multiple private datasets. This approach ensures that only designated parties can identify the intersection. In this paper, we propose a practical MPSI that satisfies the following requirements: The size of the datasets maintained by the different parties is independent of the others, and the computational complexity of the dataset held by each party is independent of the number of parties. Our MPSI is based on the use of an outsourcing provider, who has no knowledge of the data inputs or outputs. This reduces the computational complexity. The performance of the proposed MPSI is evaluated by implementing a prototype on a virtual private network to enable parallel computation in multiple threads. Our protocol is confirmed to be more efficient than comparable existing approaches.

  19. Network integration modelling of feeder and BRT(bus rapid transit) to reduce the usage of private vehicles in Palembang’s suburban area

    NASA Astrophysics Data System (ADS)

    Nur'afalia, D.; Afifa, F.; Rubianto, L.; Handayeni, K. D. M. E.

    2018-01-01

    The aim of this research is to determine the optimal feeder network route that integrates with BRT (Bus Rapid Transit). Palembang, a high growing population city with unresolved transportation demand sector. BRT as main public transportation could not fulfill people’s demand in transportation, especially in Alang-Alang Lebar sub-district. As an impact, the usage of private vehicles increases along the movement toward the city center. The concept of Network Integration that integrates feeder network with BRT is expected to be a solution to suppress the rate of private vehicles’ usage and to improve public transportation service, so that the use of BRT will be increased in the suburban area of Palembang. The method used to identifying the optimal route using Route Analysis method is route analysis using Tranetsim 0.4. The best route is obtained based on 156 movement samples. The result is 58,7% from 199 mobility’s potency of private vehicle usage’s can be reduced if there is a feeder network’s route in Alang-Alang Lebar’s sub-district. From the result, the existance of integration between feeder network and BRT is potential enough to reduce the usage of private vehicles and supports the sustainability of transportation mobility in Palembang City.

  20. New Schools for the Cities: Designs for Equality and Excellence. A Working Paper prepared for the Citizens' Crusade Against Poverty.

    ERIC Educational Resources Information Center

    Pressman, Harvey

    This paper outlines several schemes for developing quality private schools for inner city students. The basic assumption justifying the proposal that such schools be independently managed is that the urban public school systems have patently failed to educate poor children. Therefore, a new national network of independent schools should be…

  1. Developmental Studies: The Study Skill Competency Program Course for Grades 7 through 12.

    ERIC Educational Resources Information Center

    Wilson, Sally J. S.

    "The Study Skill Competency Program of the Tri-County Master Tutors Network of South Carolina" (ED 347 145) was designed to equip students with study skills that will improve the quality of their academic work. That document, originally written for use by professional educators within a private tutoring environment, has been tailored for use in…

  2. 47 CFR 32.2341 - Large private branch exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 32.2341 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES..., Intrabuilding Network Cable. (c) The cost of outside plant, whether or not on private property, used with intrabuilding, network cable shall be charged to the appropriate outside plant accounts. (d)-(e) [Reserved] (f...

  3. Emergency Communications Network for Disasters Management in Venezuela

    NASA Astrophysics Data System (ADS)

    Burguillos, C.; Deng, H.

    2018-04-01

    The integration and use of different space technology applications for disasters management, play an important role at the time of prevents the causes and mitigates the effects of the natural disasters. Nevertheless, the space technology counts with the appropriate technological resources to provide the accurate and timely information required to support in the decision making in case of disasters. Considering the aforementioned aspects, in this research is presented the design and implementation of an Emergency Communications Network for Disasters Management in Venezuela. Network based on the design of a topology that integrates the satellites platforms in orbit operation under administration of Venezuelan state, such as: the communications satellite VENESAT-1 and the remote sensing satellites VRSS-1 and VRSS-2; as well as their ground stations with the aim to implement an emergency communications network to be activated in case of disasters which affect the public and private communications infrastructures in Venezuela. In this regard, to design the network several technical and operational specifications were formulated, between them: Emergency Strategies to Maneuver the VRSS-1 and VRSS-2 satellites for optimal images capture and processing, characterization of the VENESAT-1 transponders and radiofrequencies for emergency communications services, technologies solutions formulation and communications links design for disaster management. As result, the emergency network designed allows to put in practice diverse communications technologies solutions and different scheme or media for images exchange between the areas affected for disasters and the entities involved in the disasters management tasks, providing useful data for emergency response and infrastructures recovery.

  4. Comparing public and private hospitals in China: evidence from Guangdong.

    PubMed

    Eggleston, Karen; Lu, Mingshan; Li, Congdong; Wang, Jian; Yang, Zhe; Zhang, Jing; Quan, Hude

    2010-03-23

    The literature comparing private not-for-profit, for-profit, and government providers mostly relies on empirical evidence from high-income and established market economies. Studies from developing and transitional economies remain scarce, especially regarding patient case-mix and quality of care in public and private hospitals, even though countries such as China have expanded a mixed-ownership approach to service delivery. The purpose of this study is to compare the operations and performance of public and private hospitals in Guangdong Province, China, focusing on differences in patient case-mix and quality of care. We analyze survey data collected from 362 government-owned and private hospitals in Guangdong Province in 2005, combining mandatorily reported administrative data with a survey instrument designed for this study. We use univariate and multi-variate regression analyses to compare hospital characteristics and to identify factors associated with simple measures of structural quality and patient outcomes. Compared to private hospitals, government hospitals have a higher average value of total assets, more pieces of expensive medical equipment, more employees, and more physicians (controlling for hospital beds, urban location, insurance network, and university affiliation). Government and for-profit private hospitals do not statistically differ in total staffing, although for-profits have proportionally more support staff and fewer medical professionals. Mortality rates for non-government non-profit and for-profit hospitals do not statistically differ from those of government hospitals of similar size, accreditation level, and patient mix. In combination with other evidence on health service delivery in China, our results suggest that changes in ownership type alone are unlikely to dramatically improve or harm overall quality. System incentives need to be designed to reward desired hospital performance and protect vulnerable patients, regardless of hospital ownership type.

  5. Comparing public and private hospitals in China: Evidence from Guangdong

    PubMed Central

    2010-01-01

    Background The literature comparing private not-for-profit, for-profit, and government providers mostly relies on empirical evidence from high-income and established market economies. Studies from developing and transitional economies remain scarce, especially regarding patient case-mix and quality of care in public and private hospitals, even though countries such as China have expanded a mixed-ownership approach to service delivery. The purpose of this study is to compare the operations and performance of public and private hospitals in Guangdong Province, China, focusing on differences in patient case-mix and quality of care. Methods We analyze survey data collected from 362 government-owned and private hospitals in Guangdong Province in 2005, combining mandatorily reported administrative data with a survey instrument designed for this study. We use univariate and multi-variate regression analyses to compare hospital characteristics and to identify factors associated with simple measures of structural quality and patient outcomes. Results Compared to private hospitals, government hospitals have a higher average value of total assets, more pieces of expensive medical equipment, more employees, and more physicians (controlling for hospital beds, urban location, insurance network, and university affiliation). Government and for-profit private hospitals do not statistically differ in total staffing, although for-profits have proportionally more support staff and fewer medical professionals. Mortality rates for non-government non-profit and for-profit hospitals do not statistically differ from those of government hospitals of similar size, accreditation level, and patient mix. Conclusions In combination with other evidence on health service delivery in China, our results suggest that changes in ownership type alone are unlikely to dramatically improve or harm overall quality. System incentives need to be designed to reward desired hospital performance and protect vulnerable patients, regardless of hospital ownership type. PMID:20331886

  6. Geospatial Authentication

    NASA Technical Reports Server (NTRS)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  7. Ubiquitous Virtual Private Network: A Solution for WSN Seamless Integration

    PubMed Central

    Villa, David; Moya, Francisco; Villanueva, Félix Jesús; Aceña, Óscar; López, Juan Carlos

    2014-01-01

    Sensor networks are becoming an essential part of ubiquitous systems and applications. However, there are no well-defined protocols or mechanisms to access the sensor network from the enterprise information system. We consider this issue as a heterogeneous network interconnection problem, and as a result, the same concepts may be applied. Specifically, we propose the use of object-oriented middlewares to provide a virtual private network in which all involved elements (sensor nodes or computer applications) will be able to communicate as if all of them were in a single and uniform network. PMID:24399154

  8. Public and Private Interests in Networking Educational Services for Schools, Households, Communities.

    ERIC Educational Resources Information Center

    Sheekey, Arthur D.

    1997-01-01

    Discusses the networking of educational services for schools, homes, and communities. Highlights include equal access; the development of digital technologies; visions for electronic information services; the public sector; the private sector; creating learning communities; and future possibilities, including funding strategies. (LRW)

  9. Lessons drawn from 2 existing satellite networks: ARABSAT and EUTELSAT. Application to the Pacific basin projects

    NASA Astrophysics Data System (ADS)

    Bloch, Jean-Jacques

    The Arabsat and Eutelsat systems are described. The Arabsat belongs to an organization which includes 20 countries of the Arab League. The Eutelsat belongs to the European telecommunication system which includes 29 countries, and is based op the Intelsat model. The current use of their payload is reviewed and compared with their respective planning stage predictions. From this perspective, some teachings are drawn which could be profitable for emerging region Pacific basin networks, now in the planning stage. In the Pacific basin several private and governmental regional satellite networks either newly existing or in the design phase are vying to deliver services to potential customers. These services include national television, commercial television, VSAT (Very Small Aperture Terminal) networks, and regional or domestic telephony.

  10. Usability Evaluation of a Private Social Network on Mental Health for Relatives.

    PubMed

    Toribio-Guzmán, José Miguel; García-Holgado, Alicia; Soto Pérez, Felipe; García-Peñalvo, Francisco J; Franco Martín, Manuel

    2017-09-01

    Usability is one of the most prominent criteria that must be fulfilled by a software product. This study aims to evaluate the usability of SocialNet, a private social network for monitoring the daily progress of patients by their relatives, using a mixed usability approach: heuristic evaluation conducted by experts and user testing. A double heuristic evaluation with one expert evaluator identified the issues related to consistency, design, and privacy. User testing was conducted on 20 users and one evaluator using observation techniques and questionnaires. The main usability problems were found to be related to the structure of SocialNet, and the users presented some difficulties in locating the buttons or links. The results show a high level of usability and satisfaction with the product. This evaluation provides data on the usability of SocialNet based on the difficulties experienced by the users and the expert. The results help in redesigning the tool to resolve the identified problems as part of an iterative process.

  11. Women, Work and Wages: How To Get the Job and Pay You Want. Facts on Working Women.

    ERIC Educational Resources Information Center

    Women's Bureau (DOL), Washington, DC.

    This guide is designed to provide women job seekers with tools to help them obtain the job and salary they want and deserve. It begins with information about the labor market in general. These sources of information about jobs are described: networking; private employers; one-stop career centers; America's Job Bank; federal, state, and local…

  12. ADS pilot program Plan

    NASA Technical Reports Server (NTRS)

    Clauson, J.; Heuser, J.

    1981-01-01

    The Applications Data Service (ADS) is a system based on an electronic data communications network which will permit scientists to share the data stored in data bases at universities and at government and private installations. It is designed to allow users to readily locate and access high quality, timely data from multiple sources. The ADS Pilot program objectives and the current plans for accomplishing those objectives are described.

  13. Convergence

    NASA Astrophysics Data System (ADS)

    Darcie, Thomas E.; Doverspike, Robert; Zirngibl, Martin; Korotky, Steven K.

    2005-08-01

    Call for Papers: Convergence The Journal of Optical Networking (JON) invites submissions to a special issue on Convergence. Convergence has become a popular theme in telecommunications, one that has broad implications across all segments of the industry. Continual evolution of technology and applications continues to erase lines between traditionally separate lines of business, with dramatic consequences for vendors, service providers, and consumers. Spectacular advances in all layers of optical networking-leading to abundant, dynamic, cost-effective, and reliable wide-area and local-area connections-have been essential drivers of this evolution. As services and networks continue to evolve towards some notion of convergence, the continued role of optical networks must be explored. One vision of convergence renders all information in a common packet (especially IP) format. This vision is driven by the proliferation of data services. For example, time-division multiplexed (TDM) voice becomes VoIP. Analog cable-television signals become MPEG bits streamed to digital set-top boxes. T1 or OC-N private lines migrate to Ethernet virtual private networks (VPNs). All these packets coexist peacefully within a single packet-routing methodology built on an optical transport layer that combines the flexibility and cost of data networks with telecom-grade reliability. While this vision is appealing in its simplicity and shared widely, specifics of implementation raise many challenges and differences of opinion. For example, many seek to expand the role of Ethernet in these transport networks, while massive efforts are underway to make traditional TDM networks more data friendly within an evolved but backward-compatible SDH/SONET (synchronous digital hierarchy and synchronous optical network) multiplexing hierarchy. From this common underlying theme follow many specific instantiations. Examples include the convergence at the physical, logical, and operational levels of voice and data, video and data, private-line and virtual private-line, fixed and mobile, and local and long-haul services. These trends have many consequences for consumers, vendors, and carriers. Faced with large volumes of low-margin data traffic mixed with traditional voice services, the need for capital conservation and operational efficiency drives carriers away from today's separate overlay networks for each service and towards "converged" platforms. For example, cable operators require transport of multiple services over both hybrid fiber coax (HFC) and DWDM transport technologies. Local carriers seek an economical architecture to deliver integrated services on optically enabled broadband-access networks. Services over wireless-access networks must coexist with those from wired networks. In each case, convergence of networks and services inspires an important set of questions and challenges, driven by the need for low cost, operational efficiency, service performance requirements, and optical transport technology options. This Feature Issue explores the various interpretations and implications of network convergence pertinent to optical networking. How does convergence affect the evolution of optical transport-layer and control approaches? Are the implied directions consistent with research vision for optical networks? Substantial challenges remain. Papers are solicited across the broad spectrum of interests. These include, but are not limited to: Architecture, design and performance of optical wide-area-network (WAN), metro, and access networks Integration strategies for multiservice transport platforms Access methods that bridge traditional and emerging services Network signaling and control methodologies All-optical packet routing and switching techniques

  14. Convergence

    NASA Astrophysics Data System (ADS)

    Darcie, Thomas E.; Doverspike, Robert; Zirngibl, Martin; Korotky, Steven K.

    2005-06-01

    Call for Papers: Convergence The Journal of Optical Networking (JON) invites submissions to a special issue on Convergence. Convergence has become a popular theme in telecommunications, one that has broad implications across all segments of the industry. Continual evolution of technology and applications continues to erase lines between traditionally separate lines of business, with dramatic consequences for vendors, service providers, and consumers. Spectacular advances in all layers of optical networking-leading to abundant, dynamic, cost-effective, and reliable wide-area and local-area connections-have been essential drivers of this evolution. As services and networks continue to evolve towards some notion of convergence, the continued role of optical networks must be explored. One vision of convergence renders all information in a common packet (especially IP) format. This vision is driven by the proliferation of data services. For example, time-division multiplexed (TDM) voice becomes VoIP. Analog cable-television signals become MPEG bits streamed to digital set-top boxes. T1 or OC-N private lines migrate to Ethernet virtual private networks (VPNs). All these packets coexist peacefully within a single packet-routing methodology built on an optical transport layer that combines the flexibility and cost of data networks with telecom-grade reliability. While this vision is appealing in its simplicity and shared widely, specifics of implementation raise many challenges and differences of opinion. For example, many seek to expand the role of Ethernet in these transport networks, while massive efforts are underway to make traditional TDM networks more data friendly within an evolved but backward-compatible SDH/SONET (synchronous digital hierarchy and synchronous optical network) multiplexing hierarchy. From this common underlying theme follow many specific instantiations. Examples include the convergence at the physical, logical, and operational levels of voice and data, video and data, private-line and virtual private-line, fixed and mobile, and local and long-haul services. These trends have many consequences for consumers, vendors, and carriers. Faced with large volumes of low-margin data traffic mixed with traditional voice services, the need for capital conservation and operational efficiency drives carriers away from today's separate overlay networks for each service and towards "converged" platforms. For example, cable operators require transport of multiple services over both hybrid fiber coax (HFC) and DWDM transport technologies. Local carriers seek an economical architecture to deliver integrated services on optically enabled broadband-access networks. Services over wireless-access networks must coexist with those from wired networks. In each case, convergence of networks and services inspires an important set of questions and challenges, driven by the need for low cost, operational efficiency, service performance requirements, and optical transport technology options. This Feature Issue explores the various interpretations and implications of network convergence pertinent to optical networking. How does convergence affect the evolution of optical transport-layer and control approaches? Are the implied directions consistent with research vision for optical networks? Substantial challenges remain. Papers are solicited across the broad spectrum of interests. These include, but are not limited to: Architecture, design and performance of optical wide-area-network (WAN), metro, and access networks Integration strategies for multiservice transport platforms Access methods that bridge traditional and emerging services Network signaling and control methodologies All-optical packet routing and switching techniques

  15. Convergence

    NASA Astrophysics Data System (ADS)

    Darcie, Thomas E.; Doverspike, Robert; Zirngibl, Martin; Korotky, Steven K.

    2005-05-01

    Call for Papers: Convergence The Journal of Optical Networking (JON) invites submissions to a special issue on Convergence. Convergence has become a popular theme in telecommunications, one that has broad implications across all segments of the industry. Continual evolution of technology and applications continues to erase lines between traditionally separate lines of business, with dramatic consequences for vendors, service providers, and consumers. Spectacular advances in all layers of optical networking-leading to abundant, dynamic, cost-effective, and reliable wide-area and local-area connections-have been essential drivers of this evolution. As services and networks continue to evolve towards some notion of convergence, the continued role of optical networks must be explored. One vision of convergence renders all information in a common packet (especially IP) format. This vision is driven by the proliferation of data services. For example, time-division multiplexed (TDM) voice becomes VoIP. Analog cable-television signals become MPEG bits streamed to digital set-top boxes. T1 or OC-N private lines migrate to Ethernet virtual private networks (VPNs). All these packets coexist peacefully within a single packet-routing methodology built on an optical transport layer that combines the flexibility and cost of data networks with telecom-grade reliability. While this vision is appealing in its simplicity and shared widely, specifics of implementation raise many challenges and differences of opinion. For example, many seek to expand the role of Ethernet in these transport networks, while massive efforts are underway to make traditional TDM networks more data friendly within an evolved but backward-compatible SDH/SONET (synchronous digital hierarchy and synchronous optical network) multiplexing hierarchy. From this common underlying theme follow many specific instantiations. Examples include the convergence at the physical, logical, and operational levels of voice and data, video and data, private-line and virtual private-line, fixed and mobile, and local and long-haul services. These trends have many consequences for consumers, vendors, and carriers. Faced with large volumes of low-margin data traffic mixed with traditional voice services, the need for capital conservation and operational efficiency drives carriers away from today's separate overlay networks for each service and towards "converged" platforms. For example, cable operators require transport of multiple services over both hybrid fiber coax (HFC) and DWDM transport technologies. Local carriers seek an economical architecture to deliver integrated services on optically enabled broadband-access networks. Services over wireless-access networks must coexist with those from wired networks. In each case, convergence of networks and services inspires an important set of questions and challenges, driven by the need for low cost, operational efficiency, service performance requirements, and optical transport technology options. This Feature Issue explores the various interpretations and implications of network convergence pertinent to optical networking. How does convergence affect the evolution of optical transport-layer and control approaches? Are the implied directions consistent with research vision for optical networks? Substantial challenges remain. Papers are solicited across the broad spectrum of interests. These include, but are not limited to: Architecture, design and performance of optical wide-area-network (WAN), metro, and access networks Integration strategies for multiservice transport platforms Access methods that bridge traditional and emerging services Network signaling and control methodologies All-optical packet routing and switching techniques

  16. Convergence

    NASA Astrophysics Data System (ADS)

    Darcie, Thomas E.; Doverspike, Robert; Zirngibl, Martin; Korotky, Steven K.

    2005-04-01

    Call for Papers: Convergence The Journal of Optical Networking (JON) invites submissions to a special issue on Convergence. Convergence has become a popular theme in telecommunications, one that has broad implications across all segments of the industry. Continual evolution of technology and applications continues to erase lines between traditionally separate lines of business, with dramatic consequences for vendors, service providers, and consumers. Spectacular advances in all layers of optical networking-leading to abundant, dynamic, cost-effective, and reliable wide-area and local-area connections-have been essential drivers of this evolution. As services and networks continue to evolve towards some notion of convergence, the continued role of optical networks must be explored. One vision of convergence renders all information in a common packet (especially IP) format. This vision is driven by the proliferation of data services. For example, time-division multiplexed (TDM) voice becomes VoIP. Analog cable-television signals become MPEG bits streamed to digital set-top boxes. T1 or OC-N private lines migrate to Ethernet virtual private networks (VPNs). All these packets coexist peacefully within a single packet-routing methodology built on an optical transport layer that combines the flexibility and cost of data networks with telecom-grade reliability. While this vision is appealing in its simplicity and shared widely, specifics of implementation raise many challenges and differences of opinion. For example, many seek to expand the role of Ethernet in these transport networks, while massive efforts are underway to make traditional TDM networks more data friendly within an evolved but backward-compatible SDH/SONET (synchronous digital hierarchy and synchronous optical network) multiplexing hierarchy. From this common underlying theme follow many specific instantiations. Examples include the convergence at the physical, logical, and operational levels of voice and data, video and data, private-line and virtual private-line, fixed and mobile, and local and long-haul services. These trends have many consequences for consumers, vendors, and carriers. Faced with large volumes of low-margin data traffic mixed with traditional voice services, the need for capital conservation and operational efficiency drives carriers away from today's separate overlay networks for each service and towards "converged" platforms. For example, cable operators require transport of multiple services over both hybrid fiber coax (HFC) and DWDM transport technologies. Local carriers seek an economical architecture to deliver integrated services on optically enabled broadband-access networks. Services over wireless-access networks must coexist with those from wired networks. In each case, convergence of networks and services inspires an important set of questions and challenges, driven by the need for low cost, operational efficiency, service performance requirements, and optical transport technology options. This Feature Issue explores the various interpretations and implications of network convergence pertinent to optical networking. How does convergence affect the evolution of optical transport-layer and control approaches? Are the implied directions consistent with research vision for optical networks? Substantial challenges remain. Papers are solicited across the broad spectrum of interests. These include, but are not limited to: Architecture, design and performance of optical wide-area-network (WAN), metro, and access networks Integration strategies for multiservice transport platforms Access methods that bridge traditional and emerging services Network signaling and control methodologies All-optical packet routing and switching techniques

  17. Field testing of a remote controlled robotic tele-echo system in an ambulance using broadband mobile communication technology.

    PubMed

    Takeuchi, Ryohei; Harada, Hiroshi; Masuda, Kohji; Ota, Gen-ichiro; Yokoi, Masaki; Teramura, Nobuyasu; Saito, Tomoyuki

    2008-06-01

    We report the testing of a mobile Robotic Tele-echo system that was placed in an ambulance and successfully transmitted clear real time echo imaging of a patient's abdomen to the destination hospital from where this device was being remotely operated. Two-way communication between the paramedics in this vehicle and a doctor standing by at the hospital was undertaken. The robot was equipped with an ultrasound probe which was remotely controlled by the clinician at the hospital and ultrasound images of the patient were transmitted wirelessly. The quality of the ultrasound images that were transmitted over the public mobile telephone networks and those transmitted over the Multimedia Wireless Access Network (a private networks) were compared. The transmission rate over the public networks and the private networks was approximately 256 Kbps, 3 Mbps respectively. Our results indicate that ultrasound images of far higher definition could be obtained through the private networks.

  18. Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Singh, Surya V.; Thronas, Aaron I.

    2010-01-01

    This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.

  19. Essays on incomplete contracts in regulatory activities

    NASA Astrophysics Data System (ADS)

    Saavedra, Eduardo Humberto

    This dissertation consists of three essays. The first essay, The Hold-Up Problem in Public Infrastructure Franchising, characterizes the equilibria of the investment decisions in public infrastructure franchising under incomplete contracting and ex-post renegotiation. The parties (government and a firm) are unable to credibly commit to the contracted investment plan, so that a second step investment is renegotiated by the parties at the revision stage. As expected, the possibility of renegotiation affects initial non-verifiable investments. The main conclusion of this essay is that not only underinvestment but also overinvestment in infrastructure may arise in equilibrium, compared to the complete contracting case. The second essay, Alternative Institutional Arrangements in Network Utilities: An Incomplete Contracting Approach, presents a theoretical assessment of the efficiency implications of privatizing natural monopolies which are vertically related to potential competitive firms. Based on the incomplete contracts and asymmetric information paradigm. I develop a model that analyzes the relative advantages of different institutional arrangements---alternative ownership and market structures in the industry--- in terms of their allocative and productive efficiencies. The main policy conclusion of this essay is that both ownership and the existence of conglomerates in network industries matter. Among other conclusions, this essay provides an economic rationale for a mixed economy in which the network is public and vertical separation of the industry when the natural monopoly is under private ownership. The last essay, Opportunistic Behavior and Legal Disputes in the Chilean Electricity Sector, analyzes post-contractual disputes in this newly privatized industry. It discusses the presumption that opportunistic behavior and disputes arise due to inadequate market design, ambiguous regulation, and institutional weaknesses. This chapter also assesses the presumption that a large number of legal disputes are inhibited by the nonexistence of institutions able to verify and enforce contracts. An in-depth analysis of six cases of open conflict provides support for such a presumption and highlights the crucial role of an adequate market design.

  20. Network Upgrade for the SLC: PEP II Network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crane, M.; Call, M.; Clark, S.

    2011-09-09

    The PEP-II control system required a new network to support the system functions. This network, called CTLnet, is an FDDI/Ethernet based network using only TCP/IP protocols. An upgrade of the SLC Control System micro communications to use TCP/IP and SLCNET would allow all PEP-II control system nodes to use TCP/IP. CTLnet is private and separate from the SLAC public network. Access to nodes and control system functions is provided by multi-homed application servers with connections to both the private CTLnet and the SLAC public network. Monitoring and diagnostics are provided using a dedicated system. Future plans and current status informationmore » is included.« less

  1. Education Management Organisations and the Privatisation of Public Education: A Cross-National Comparison of the USA and Britain.

    ERIC Educational Resources Information Center

    Fitz, John; Beers, Bryan

    2002-01-01

    British government policies promoting public-private partnerships enabled the privatization of failing schools. In the U.S., the private sector has drawn upon a political network of well-financed institutions to advance privatized education, most recently among charter schools. Privatization has not yet been very successful, but promises to be…

  2. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    PubMed

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-08-28

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  3. Distributed generation of shared RSA keys in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  4. Clinical training alone is not sufficient for reducing barriers to IUD provision among private providers in Pakistan

    PubMed Central

    2011-01-01

    Background IUD uptake remains low in Pakistan, in spite of three major efforts to introduce the IUD since the 1960s, the most recent of these being through the private sector. This study examines barriers to IUD recommendation and provision among private providers in Pakistan. Methods A facility-based survey was conducted among randomly selected private providers who were members of the Greenstar network and among similar providers located within 2 Kilometers. In total, 566 providers were interviewed in 54 districts of Pakistan. Logistic regression analysis was conducted to determine whether correct knowledge regarding the IUD, self-confidence in being able to insert the IUD, attitudes towards suitability of candidates for the IUD and medical safety concerns were influenced by provider type (physician vs. Lady Health Visitor), whether the provider had received clinical training in IUD insertion in the last three years, membership of the Greenstar network and experience in IUD insertion. OLS regression was used to identify predictors of provider productivity (measured by IUD insertions conducted in the month before the survey). Results Private providers consider women with children and in their peak reproductive years to be ideal candidates for the IUD. Women below age 19, above age 40 and nulliparous women are not considered suitable IUD candidates. Provider concerns about medical safety, side-effects and client satisfaction associated with the IUD are substantial. Providers' experience in terms of the number of IUDs inserted in their careers, appears to improve knowledge, self-confidence in the ability provide the IUD and to lower age-related attitudinal barriers towards IUD recommendation. Physicians have greater medical safety concerns about the IUD than Lady Health Visitors. Clinical training does not have a consistent positive effect on lowering barriers to IUD recommendation. Membership of the Greenstar network also has little effect on lowering these barriers. Providers' barriers to IUD recommendation significantly lower their monthly IUD insertions. Conclusions Technical training interventions do not reduce providers' attitudinal barriers towards IUD provision. Formative research is needed to better understand reasons for the high levels of provider barriers to IUD provision. "Non-training" interventions should be designed to lower these barriers. PMID:22208449

  5. The impact of a quality-improvement package on reproductive health services delivered by private providers in Uganda.

    PubMed

    Agha, Sohail

    2010-09-01

    This study assesses the effectiveness of a quality-improvement (QI) package designed to enable small-scale commercial reproductive health (RH) service providers to improve the services they offer. The study was conducted among midwives who are members of the Uganda Private Midwives Association. A pretest-post-test quasi-experimental panel study design was used wherein midwife clinics were allocated to two experimental groups and one control group. Baseline and follow-up measurements of structural and process attributes of quality were taken at the clinics by means of a facility inventory, interviews with midwives, and observations of client-provider interactions. Nearly 70 percent of the midwives who were trained to use the package reported that it was easy to use. Among clinics in which midwives received training in the use of the self-assessment tool and in developing action plans, structural and process attributes of quality improved only among those clinics in which the midwives' supervisors received training in finding solutions to the problems identified through self-assessments. The QI package may be implemented with small-scale private providers of RH services who are part of a professional association, network, or franchise that supervises their performance.

  6. A private-sector preferred provider network model for public health screening of newly resettled refugees.

    PubMed

    Geltman, Paul L; Cochran, Jennifer

    2005-02-01

    US law and regulations stipulate a process for the health screening of refugees. The responsibility of caring for refugees resettled in the United States rests, in part, with public health or welfare departments. Massachusetts has met its screening responsibilities through the innovative creation of a network of private preferred providers. We explore the Massachusetts model of public-private collaboration within the context of federal refugee health priorities and current state fiscal restraints affecting public health programs, and demonstrate the model's accomplishments.

  7. Investigating Factors Related to Virtual Private Network Adoption in Small Businesses

    ERIC Educational Resources Information Center

    Lederer, Karen

    2012-01-01

    The purpose of this quantitative study was to investigate six factors that may influence adoption of virtual private network (VPN) technologies in small businesses with fewer than 100 employees. Prior research indicated small businesses employing fewer than 100 workers do not adopt VPN technology at the same rate as larger competitors, and the…

  8. An overview of the technical design of MSAT mobile satellite communications services

    NASA Astrophysics Data System (ADS)

    Davies, N. George

    The Canadian MSAT mobile satellite communications system is being implemented in cooperation with the American Mobile Satellite Consortium (AMSC). Two satellites are to be jointly acquired and each satellite is expected to backup the other. This paper describes the technical concepts of the services to be offered and the baseline planning of the infrastructure for the ground segment. MSAT service requirements are analyzed for mobile radio, telephone, data, and aeronautical services. The MSAT system will use nine beams in a narrow range of L-band frequencies with frequency reuse. Beams may be added to cover flight information areas in the Atlantic and Pacific oceans. The elements of the network architecture are: a network control centre, data hub stations, gateway stations, base stations, mobile terminals, and a signalling system to interconnect the elements of the system. The network control center will manage the network and allocate space segment capacity; data hub stations will support a switched packet mobile data service; the gateway stations will provide interconnection to the public telephone system and data networks; and the base stations will support private circuit switched voice and data services. Several alternative designs for the signalling system are described.

  9. International, private-public, multi-mission, next-generation Lunar/Martian laser retroreflectors

    NASA Astrophysics Data System (ADS)

    Dellagnello, S.

    2017-09-01

    We describe an international, private-public, multi-mission effort to deploy on the Moon next-generation lunar laser retroreflectors to extend (also to the far side) the existing passive Lunar Geophysical Network (LNG) consisting of the three Apollo and the two Lunokhod payloads. We also describe important applications and extension of this program to Mars Geophysical Network (MGN).

  10. Addiction to Social Networks and Social Skills in Students from a Private Educational Institution

    ERIC Educational Resources Information Center

    Domínguez-Vergara, Julio A.; Ybañez-Carranza, Jessenia

    2016-01-01

    This research aims to determine the relationship between addiction to social networks and social skills in students of a private educational centre. A correlational descriptive study where the sample was represented by 205 students from 1st to 5th grade of junior high school was conducted. Two instruments were used: "Goldstein Social Skills…

  11. Group-multicast capable optical virtual private ring with contention avoidance

    NASA Astrophysics Data System (ADS)

    Peng, Yunfeng; Du, Shu; Long, Keping

    2008-11-01

    A ring based optical virtual private network (OVPN) employing contention sensing and avoidance is proposed to deliver multiple-to-multiple group-multicast traffic. The network architecture is presented and its operation principles as well as performance are investigated. The main contribution of this article is the presentation of an innovative group-multicast capable OVPN architecture with technologies available today.

  12. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    PubMed Central

    Marin, Leandro; Piotr Pawlowski, Marcin; Jara, Antonio

    2015-01-01

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol. PMID:26343677

  13. Peer Influence on Ethnic-Racial Identity Development: A Multi-Site Investigation.

    PubMed

    Santos, Carlos E; Kornienko, Olga; Rivas-Drake, Deborah

    2017-05-01

    The peer context features prominently in theory, and increasingly in empirical research, about ethnic-racial identity (ERI) development, but no studies have assessed peer influence on ERI using methods designed to properly assess peer influence. We examined peer influence on ERI centrality, private, and public regard using longitudinal social network analysis. Data were drawn from two sites: a predominantly Latina/o Southwestern (SW) school (N = 1034; Mage = 12.10) and a diverse Midwestern (MW) school (N = 513; Mage = 11.99). Findings showed that peers influenced each other's public regard over time at both sites. However, peer influence on centrality was evident in the SW site, whereas peer influence on private regard was evident in the MW site. Importantly, peer influence was evident after controlling for selection effects. Our integration of developmental, contextual, and social network perspectives offers a fruitful approach to explicate how ERI content may shift in early adolescence as a function of peer influence. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.

  14. TWC and AWG based optical switching structure for OVPN in WDM-PON

    NASA Astrophysics Data System (ADS)

    Bai, Hui-feng; Chen, Yu-xin; Wang, Qin

    2015-03-01

    With the rapid development of optical elements with large capacity and high speed, the network architecture is of great importance in determing the performance of wavelength division multiplexing passive optical network (WDM-PON). This paper proposes a switching structure based on the tunable wavelength converter (TWC) and the arrayed-waveguide grating (AWG) for WDM-PON, in order to provide the function of opitcal virtual private network (OVPN). Using the tunable wavelength converter technology, this switch structure is designed and works between the optical line terminal (OLT) and optical network units (ONUs) in the WDM-PON system. Moreover, the wavelength assignment of upstream/downstream can be realized and direct communication between ONUs is also allowed by privite wavelength channel. Simulation results show that the proposed TWC and AWG based switching structure is able to achieve OVPN function and to gain better performances in terms of bite error rate (BER) and time delay.

  15. Accessing files in an Internet: The Jade file system

    NASA Technical Reports Server (NTRS)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  16. Accessing files in an internet - The Jade file system

    NASA Technical Reports Server (NTRS)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  17. FireFly: reconfigurable optical wireless networking data centers

    NASA Astrophysics Data System (ADS)

    Kavehrad, Mohsen; Deng, Peng; Gupta, H.; Longtin, J.; Das, S. R.; Sekar, V.

    2017-01-01

    We explore a novel, free-space optics based approach for building data center interconnects. Data centers (DCs) are a critical piece of today's networked applications in both private and public sectors. The key factors that have driven this trend are economies of scale, reduced management costs, better utilization of hardware via statistical multiplexing, and the ability to elastically scale applications in response to changing workload patterns. A robust DC network fabric is fundamental to the success of DCs and to ensure that the network does not become a bottleneck for high-performance applications. In this context, DC network design must satisfy several goals: high performance (e.g., high throughput and low latency), low equipment and management cost, robustness to dynamic traffic patterns, incremental expandability to add new servers or racks, and other practical concerns such as cabling complexity, and power and cooling costs. Current DC network architectures do not seem to provide a satisfactory solution, with respect to the above requirements. In particular, traditional static (wired) networks are either overprovisioned or oversubscribed. Recent works have tried to overcome the above limitations by augmenting a static (wired) "core" with some flexible links (RF-wireless or optical). These augmented architectures show promise, but offer only incremental improvement in performance. Specifically, RFwireless based augmented solutions also offer only limited performance improvement, due to inherent interference and range constraints of RF links. This paper explores an alternative design point—a fully flexible and all-wireless DC interrack network based on free-space optical (FSO) links. We call this FireFly as in; Free-space optical Inter-Rack nEtwork with high FLexibilitY. We will present our designs and tests using various configurations that can help the performance and reliability of the FSO links.

  18. Virtual private networks can provide reliable IT connections.

    PubMed

    Kabachinski, Jeff

    2006-01-01

    A VPN is a private network that uses a public network, such as the Internet, to connect remote sites and users together. Instead of using a dedicated hard-wired connection as in a trusted connection or leased lines, a VPN uses a virtual connection routed through the Internet from the organization's private network to the remote site or employee. Typical VPN services allow for security in terms of data encryption as well as means to authenticate, authorize, and account for all the traffic. VPN services allow the organization to use whatever network operating system they wish as it also encapsulate your data into the protocols needed to transport data across public lines. The intention of this IT World article was to give the reader an introduction to VPNs. Keep in mind that there are no standard models for a VPN. You're likely to come across many vendors presenting the virtues of their VPN applications and devices when you Google "VPN." However the general uses, concepts, and principles outlined here should give you a fighting chance to read through the marketing language in the online ads and "white papers."

  19. An Examination of a Virtual Private Network Implementation to Support a Teleworking Initiative: The Marcus Food Company Inc. Case Study

    ERIC Educational Resources Information Center

    Ferguson, Jason W.

    2010-01-01

    In this dissertation, the author examined the capabilities of virtual private networks (VPNs) in supporting teleworking environments for small businesses in the food marketing sector. The goal of this research was to develop an implementation model for small businesses in the food marketing sector that use a VPN solution to support teleworker…

  20. Enhanced networked server management with random remote backups

    NASA Astrophysics Data System (ADS)

    Kim, Song-Kyoo

    2003-08-01

    In this paper, the model is focused on available server management in network environments. The (remote) backup servers are hooked up by VPN (Virtual Private Network) and replace broken main severs immediately. A virtual private network (VPN) is a way to use a public network infrastructure and hooks up long-distance servers within a single network infrastructure. The servers can be represent as "machines" and then the system deals with main unreliable and random auxiliary spare (remote backup) machines. When the system performs a mandatory routine maintenance, auxiliary machines are being used for backups during idle periods. Unlike other existing models, the availability of auxiliary machines is changed for each activation in this enhanced model. Analytically tractable results are obtained by using several mathematical techniques and the results are demonstrated in the framework of optimized networked server allocation problems.

  1. Software Defined Networking challenges and future direction: A case study of implementing SDN features on OpenStack private cloud

    NASA Astrophysics Data System (ADS)

    Shamugam, Veeramani; Murray, I.; Leong, J. A.; Sidhu, Amandeep S.

    2016-03-01

    Cloud computing provides services on demand instantly, such as access to network infrastructure consisting of computing hardware, operating systems, network storage, database and applications. Network usage and demands are growing at a very fast rate and to meet the current requirements, there is a need for automatic infrastructure scaling. Traditional networks are difficult to automate because of the distributed nature of their decision making process for switching or routing which are collocated on the same device. Managing complex environments using traditional networks is time-consuming and expensive, especially in the case of generating virtual machines, migration and network configuration. To mitigate the challenges, network operations require efficient, flexible, agile and scalable software defined networks (SDN). This paper discuss various issues in SDN and suggests how to mitigate the network management related issues. A private cloud prototype test bed was setup to implement the SDN on the OpenStack platform to test and evaluate the various network performances provided by the various configurations.

  2. Relations that affect the probability and prediction of nitrate concentration in private wells in the glacial aquifer system in the United States

    USGS Publications Warehouse

    Warner, Kelly L.; Arnold, Terri L.

    2010-01-01

    Nitrate in private wells in the glacial aquifer system is a concern for an estimated 17 million people using private wells because of the proximity of many private wells to nitrogen sources. Yet, less than 5 percent of private wells sampled in this study contained nitrate in concentrations that exceeded the U.S. Environmental Protection Agency (USEPA) Maximum Contaminant Level (MCL) of 10 mg/L (milligrams per liter) as N (nitrogen). However, this small group with nitrate concentrations above the USEPA MCL includes some of the highest nitrate concentrations detected in groundwater from private wells (77 mg/L). Median nitrate concentration measured in groundwater from private wells in the glacial aquifer system (0.11 mg/L as N) is lower than that in water from other unconsolidated aquifers and is not strongly related to surface sources of nitrate. Background concentration of nitrate is less than 1 mg/L as N. Although overall nitrate concentration in private wells was low relative to the MCL, concentrations were highly variable over short distances and at various depths below land surface. Groundwater from wells in the glacial aquifer system at all depths was a mixture of old and young water. Oxidation and reduction potential changes with depth and groundwater age were important influences on nitrate concentrations in private wells. A series of 10 logistic regression models was developed to estimate the probability of nitrate concentration above various thresholds. The threshold concentration (1 to 10 mg/L) affected the number of variables in the model. Fewer explanatory variables are needed to predict nitrate at higher threshold concentrations. The variables that were identified as significant predictors for nitrate concentration above 4 mg/L as N included well characteristics such as open-interval diameter, open-interval length, and depth to top of open interval. Environmental variables in the models were mean percent silt in soil, soil type, and mean depth to saturated soil. The 10-year mean (1992-2001) application rate of nitrogen fertilizer applied to farms was included as the potential source variable. A linear regression model also was developed to predict mean nitrate concentrations in well networks. The model is based on network averages because nitrate concentrations are highly variable over short distances. Using values for each of the predictor variables averaged by network (network mean value) from the logistic regression models, the linear regression model developed in this study predicted the mean nitrate concentration in well networks with a 95 percent confidence in predictions.

  3. Evaluation of Workload and its Impact on Satisfaction Among Pharmacy Academicians in Southern India.

    PubMed

    Ahmad, Akram; Khan, Muhammad Umair; Srikanth, Akshaya B; Patel, Isha; Nagappa, Anantha Naik; Jamshed, Shazia Qasim

    2015-06-01

    The purpose of this study was to determine the level of workload among pharmacy academicians working in public and private sector universities in India. The study also aimed to assess the satisfaction of academicians towards their workload. A cross-sectional study was conducted for a period of 2 months among pharmacy academicians in Karnataka state of Southern India. Convenience sampling was used to select a sample and was contacted via email and/or social networking sites. Questionnaire designed by thorough review literature was used as a tool to collect data on workload (teaching, research, extracurricular services) and satisfaction. Of 214 participants, 95 returned the filled questionnaire giving the response rate of 44.39%. Private sector academicians had more load of teaching (p=0.046) and they appeared to be less involved in research activities (p=0.046) as compared to public sector academicians. More than half of the respondents (57.9%) were satisfied with their workload with Assistant Professors were least satisfied as compared to Professors (p=0.01). Overall, private sector academicians are more burdened by teaching load and also are less satisfied of their workload. Revision of private universities policies may aid in addressing this issue.

  4. Convergence

    NASA Astrophysics Data System (ADS)

    Darcie, Thomas E.; Doverspike, Robert; Zirngibl, Martin; Korotky, Steven K.

    2005-09-01

    Call for Papers: Convergence The Journal of Optical Networking (JON) invites submissions to a special issue on Convergence. Convergence has become a popular theme in telecommunications, one that has broad implications across all segments of the industry. Continual evolution of technology and applications continues to erase lines between traditionally separate lines of business, with dramatic consequences for vendors, service providers, and consumers. Spectacular advances in all layers of optical networking-leading to abundant, dynamic, cost-effective, and reliable wide-area and local-area connections-have been essential drivers of this evolution. As services and networks continue to evolve towards some notion of convergence, the continued role of optical networks must be explored. One vision of convergence renders all information in a common packet (especially IP) format. This vision is driven by the proliferation of data services. For example, time-division multiplexed (TDM) voice becomes VoIP. Analog cable-television signals become MPEG bits streamed to digital set-top boxes. T1 or OC-N private lines migrate to Ethernet virtual private networks (VPNs). All these packets coexist peacefully within a single packet-routing methodology built on an optical transport layer that combines the flexibility and cost of data networks with telecom-grade reliability. While this vision is appealing in its simplicity and shared widely, specifics of implementation raise many challenges and differences of opinion. For example, many seek to expand the role of Ethernet in these transport networks, while massive efforts are underway to make traditional TDM networks more data friendly within an evolved but backward-compatible SDH/SONET (synchronous digital hierarchy and synchronous optical network) multiplexing hierarchy. From this common underlying theme follow many specific instantiations. Examples include the convergence at the physical, logical, and operational levels of voice and data, video and data, private-line and virtual private-line, fixed and mobile, and local and long-haul services. These trends have many consequences for consumers, vendors, and carriers. Faced with large volumes of low-margin data traffic mixed with traditional voice services, the need for capital conservation and operational efficiency drives carriers away from today's separate overlay networks for each service and towards "converged" platforms. For example, cable operators require transport of multiple services over both hybrid fiber coax (HFC) and DWDM transport technologies. Local carriers seek an economical architecture to deliver integrated services on optically enabled broadband-access networks. Services over wireless-access networks must coexist with those from wired networks. In each case, convergence of networks and services inspires an important set of questions and challenges, driven by the need for low cost, operational efficiency, service performance requirements, and optical transport technology options. This Feature Issue explores the various interpretations and implications of network convergence pertinent to optical networking. How does convergence affect the evolution of optical transport-layer and control approaches? Are the implied directions consistent with research vision for optical networks? Substantial challenges remain. Papers are solicited across the broad spectrum of interests. These include, but are not limited to: Architecture, design and performance of optical wide-area-network (WAN), metro, and access networks Integration strategies for multiservice transport platforms Access methods that bridge traditional and emerging services Network signaling and control methodologies All-optical packet routing and switching techniques To submit to this special issue, follow the normal procedure for submission to JON, indicating "Convergence feature" in the "Comments" field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line "Convergence." Additional information can be found on the JON website: http://www.osa-jon.org/submission/ Submission Deadline: 1 October 2005

  5. Convergence

    NASA Astrophysics Data System (ADS)

    Darcie, Thomas E.; Doverspike, Robert; Zirngibl, Martin; Korotky, Steven K.

    2004-12-01

    Convergence has become a popular theme in telecommunications, one that has broad implications across all segments of the industry. Continual evolution of technology and applications continues to erase lines between traditionally separate lines of business, with dramatic consequences for vendors, service providers, and consumers. Spectacular advances in all layers of optical networking-leading to abundant, dynamic, cost-effective, and reliable wide-area and local-area connections-have been essential drivers of this evolution. As services and networks continue to evolve towards some notion of convergence, the continued role of optical networks must be explored. One vision of convergence renders all information in a common packet (especially IP) format. This vision is driven by the proliferation of data services. For example, time-division multiplexed (TDM) voice becomes VoIP. Analog cable-television signals become MPEG bits streamed to digital set-top boxes. T1 or OC-N private lines migrate to Ethernet virtual private networks (VPNs). All these packets coexist peacefully within a single packet-routing methodology built on an optical transport layer that combines the flexibility and cost of data networks with telecom-grade reliability. While this vision is appealing in its simplicity and shared widely, specifics of implementation raise many challenges and differences of opinion. For example, many seek to expand the role of Ethernet in these transport networks, while massive efforts are underway to make traditional TDM networks more data friendly within an evolved but backward-compatible SDH/SONET (synchronous digital hierarchy and synchronous optical network) multiplexing hierarchy. From this common underlying theme follow many specific instantiations. Examples include the convergence at the physical, logical, and operational levels of voice and data, video and data, private-line and virtual private-line, fixed and mobile, and local and long-haul services. These trends have many consequences for consumers, vendors, and carriers. Faced with large volumes of low-margin data traffic mixed with traditional voice services, the need for capital conservation and operational efficiency drives carriers away from today's separate overlay networks for each service and towards "converged" platforms. For example, cable operators require transport of multiple services over both hybrid fiber coax (HFC) and DWDM transport technologies. Local carriers seek an economical architecture to deliver integrated services on optically enabled broadband-access networks. Services over wireless-access networks must coexist with those from wired networks. In each case, convergence of networks and services inspires an important set of questions and challenges, driven by the need for low cost, operational efficiency, service performance requirements, and optical transport technology options. This Feature Issue explores the various interpretations and implications of network convergence pertinent to optical networking. How does convergence affect the evolution of optical transport-layer and control approaches? Are the implied directions consistent with research vision for optical networks? Substantial challenges remain. Papers are solicited across the broad spectrum of interests. These include, but are not limited to:

    • Architecture, design and performance of optical wide-area-network (WAN), metro, and access networks
    • Integration strategies for multiservice transport platforms
    • Access methods that bridge traditional and emerging services
    • Network signaling and control methodologies
    • All-optical packet routing and switching techniques

    Manuscript Submission

    To submit to this special issue, follow the normal procedure for submission to JON, indicating "Convergence feature" in the "Comments" field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line "Convergence." Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 July 2005

  6. Food Acquisition through Private and Public Social Networks and Its Relationship with Household Food Security among Various Socioeconomic Statuses in South Korea

    PubMed Central

    Park, Sohyun; Kim, Kirang

    2018-01-01

    This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants’ mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses. PMID:29370127

  7. Food Acquisition through Private and Public Social Networks and Its Relationship with Household Food Security among Various Socioeconomic Statuses in South Korea.

    PubMed

    Park, Sohyun; Kim, Kirang

    2018-01-25

    This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants' mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses.

  8. The Lesotho Hospital PPP experience: catalyst for integrated service delivery.

    PubMed

    Coelho, Carla Faustino; O'Farrell, Catherine Commander

    2011-01-01

    For many years, Lesotho urgently needed to replace its main public hospital, Queen Elizabeth II. The project was initially conceived as a single replacement hospital, but eventually included the design and construction of a new 425 bed public hospital and adjacent primary care clinic, the renovation and expansion of three strategically located primary care clinics in the region and the management of all facilities, equipment and delivery of all clinical services in the health network by a private operator under contract for 18 years. The project's design was influenced by the recognition that a new facility alone would not address the underlying issues in service provision. The creation of this PPP health network and the contracting mechanism has increased accountability for service quality, shifted Government to a more strategic role and may also benefit other public facilities and providers in Lesotho. The county is considering the PPP approach for other health facilities.

  9. Name-Based Address Mapping for Virtual Private Networks

    NASA Astrophysics Data System (ADS)

    Surányi, Péter; Shinjo, Yasushi; Kato, Kazuhiko

    IPv4 private addresses are commonly used in local area networks (LANs). With the increasing popularity of virtual private networks (VPNs), it has become common that a user connects to multiple LANs at the same time. However, private address ranges for LANs frequently overlap. In such cases, existing systems do not allow the user to access the resources on all LANs at the same time. In this paper, we propose name-based address mapping for VPNs, a novel method that allows connecting to hosts through multiple VPNs at the same time, even when the address ranges of the VPNs overlap. In name-based address mapping, rather than using the IP addresses used on the LANs (the real addresses), we assign a unique virtual address to each remote host based on its domain name. The local host uses the virtual addresses to communicate with remote hosts. We have implemented name-based address mapping for layer 3 OpenVPN connections on Linux and measured its performance. The communication overhead of our system is less than 1.5% for throughput and less than 0.2ms for each name resolution.

  10. 2010 Staff Organization for Optimum C2: A Private Sector Analysis

    DTIC Science & Technology

    1998-02-13

    control over business operations. Warfighting CINCs can benefit from the lessons learned in the private sector by adapting those lessons to future military... private sector analysis. Through the use of a networked command and control system and a "matrix" staff structure, the model consolidates the JFC staff

  11. Multifunctional Mesoscale Observing Networks.

    NASA Astrophysics Data System (ADS)

    Dabberdt, Walter F.; Schlatter, Thomas W.; Carr, Frederick H.; Friday, Elbert W. Joe; Jorgensen, David; Koch, Steven; Pirone, Maria; Ralph, F. Martin; Sun, Juanzhen; Welsh, Patrick; Wilson, James W.; Zou, Xiaolei

    2005-07-01

    More than 120 scientists, engineers, administrators, and users met on 8 10 December 2003 in a workshop format to discuss the needs for enhanced three-dimensional mesoscale observing networks. Improved networks are seen as being critical to advancing numerical and empirical modeling for a variety of mesoscale applications, including severe weather warnings and forecasts, hydrology, air-quality forecasting, chemical emergency response, transportation safety, energy management, and others. The participants shared a clear and common vision for the observing requirements: existing two-dimensional mesoscale measurement networks do not provide observations of the type, frequency, and density that are required to optimize mesoscale prediction and nowcasts. To be viable, mesoscale observing networks must serve multiple applications, and the public, private, and academic sectors must all actively participate in their design and implementation, as well as in the creation and delivery of value-added products. The mesoscale measurement challenge can best be met by an integrated approach that considers all elements of an end-to-end solution—identifying end users and their needs, designing an optimal mix of observations, defining the balance between static and dynamic (targeted or adaptive) sampling strategies, establishing long-term test beds, and developing effective implementation strategies. Detailed recommendations are provided pertaining to nowcasting, numerical prediction and data assimilation, test beds, and implementation strategies.


  12. A New Design of Seismic Stations Deployed in South Tyrol

    NASA Astrophysics Data System (ADS)

    Melichar, P.; Horn, N.

    2007-05-01

    When designing the seismic network in South Tyrol, the seismic service of Austria and the Civil defense in South Tyrol combined more that 10 years experience in running seismic networks and private communication systems. In recent years the high data return rate of > 99% and network uptime of > 99.% is achieved by the combination of high quality station design and equipment, and the use of the Antelope data acquisition and processing software which comes with suite of network monitoring & alerting tools including Nagios, etc. The new Data Center is located in city of Bolzano and is connected to the other Data Centers in Austria, Switzerland, and Italy for data back up purposes. Each Data Center uses also redundant communication system if the primary system fails. When designing the South Tyrol network, new improvements were made in seismometer installations, grounding, lighting protection and data communications in order to improve quality of data recorded as well as network up-time, and data return. The new 12 stations are equipped with 6 Channels Q330+PB14f connected to STS2 + EpiSensor sensor. One of the key achievements was made in the grounding concept for the whole seismic station - and aluminum boxes were introduced which delivered Faraday cage isolation. Lightning protection devices are used for the equipment inside the aluminum housing where seismometer and data logger are housed. For the seismometer cables a special shielding was introduced. The broadband seismometer and strong-motion sensor are placed on a thick glass plate and therefore isolated from the ground. The precise seismometer orientation was done by a special groove on the glass plate and in case of a strong earthquake; the seismometer is tide up to the base plate. Temperature stability was achieved by styrofoam sheets inside the seismometer aluminum protection box.

  13. Do You Lock Your Network Doors? Some Network Management Precautions.

    ERIC Educational Resources Information Center

    Neray, Phil

    1997-01-01

    Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…

  14. WINDENG - a new network in Europe

    NASA Astrophysics Data System (ADS)

    Sempreviva, A. M.; Barthelmie, R.; Landberg, L.; Heinemann, D.; Strack, M.; Christensen, L.; Stefanatos, N.; Svenson, J.; Lavagnini, A.; Tammelin, B.

    2003-04-01

    A European training-through-research network is underway in which wind conditions relevant to wind turbine and wind farm design for the implementation of the wind energy in Europe are being studied. The network is based on:- - The success of a previous network within the EU Human Capital and Mobility programme in establishing links among European institutes through the co-operative effort of young scientists working in countries other than their own. - The need to foster the necessary exchange of experiences and personal contacts in order to produce a fruitful collaboration for the academic and research institutions and private companies involved. The aim of the network is to bring together young and experienced researchers to work jointly to define the basis for the design of wind turbines and wind fans in different environments. The goals are:- - To define reliable values for turbulence descriptors to be used in modelling the turbulent wind fields, spectra, coherence in homogeneous and complex terrain and offshore, to offer guidelines for wind turbine design. - To improve existing methods used for modelling wind climates under the different situations existing within Europe to offer reliable tools for wind farm designers in complex terrain and offshore. - To address all European climates from the cold Baltic and nearby North Sea to warmer Mediterranean regions. - To supply knowledge of use to EU energy policies, to local authorities or national and international energy agencies and authorities. Furthermore it will offer guidelines for the best turbine design and best sitting procedures for isolated generators or turbine parks. The project got underway in September 2002 and the first positions for young researchers are expected to begin in early 2003. This poster will present the first scientific and practical results.

  15. Power, influence and structure in Natura 2000 governance networks. A comparative analysis of two protected areas in Romania.

    PubMed

    Manolache, Steluta; Nita, Andreea; Ciocanea, Cristiana M; Popescu, Viorel D; Rozylowicz, Laurentiu

    2018-04-15

    Successful management of complex social-ecological landscapes overlapping Natura 2000 sites requires collaboration between various actors such as law enforcement agencies, NGOs and enterprises. Natura 2000 governance is stimulated by central actors (e.g., Natura 2000 administrators), with successes and failures of management activities depending on the capacity of the network leader to implement a collaborative approach to environmental governance. By using social network analysis, we analysed the cooperation, information flow and capacity for collective action within Natura 2000 governance networks within two Romanian protected areas: Lower Siret Floodplain and Iron Gates Natural Park. The two networks represent protected areas managed by different types of organisations (i.e., Lower Siret Floodplain - by an NGO, Iron Gates Natural Park - by a public entity). Taking into consideration that NGOs may favour an adaptive co-management, while the public bodies may take a top-down management approach, we hypothesize that Lower Siret Floodplain will have a more cohesive and collaborating network compared to Iron Gates Natural Park, and that there will be a greater representation of private and NGO sector in the network coordinated by Lower Siret Floodplain. Contrary to our expectations, the results show that collaboration patterns are similar in the two networks, although they are governed by two different types of institutions, both being less participative than expected, with low involvement of NGOs and private stakeholders. Furthermore, Lower Siret Floodplain network is surprisingly more centralized around a small number of public authorities, and the pre-existing power of public bodies likely inhibit the capacity of the NGO to collaborate with private stakeholders. We also found lower collaboration levels between actors in the network periphery with other organisations from the same cluster, denoting a clear top-down approach of the management in both networks. Our findings suggest that delegating the protected areas administration to NGOs, a solution to increase the use of co-management in protected areas, does not solve the poor representation of private stakeholders. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. Social Networking Sites as Virtual Communities of Practice: A Mixed Method Study

    ERIC Educational Resources Information Center

    Davis, Lorretta J.

    2010-01-01

    Membership in social networking sites is increasing rapidly. Social networking sites serve many purposes including networking, communication, recruitment, and sharing knowledge. Social networking sites, public or private, may be hosted on applications such as Facebook and LinkedIn. As individuals begin to follow and participate in social…

  17. Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks

    DTIC Science & Technology

    2002-01-01

    Submitted to ICN 2002 Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks1 Ranga S. Ramanujan ...using these techniques is also described. Contact author: Dr. Ranga S. Ramanujan Architecture Technology Corporation 9971 Valley View Road Eden Prairie...OF ABSTRACT 18. NUMBER OF PAGES 15 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c . THIS PAGE unclassified

  18. The role of protected area wetlands in waterfowl habitat conservation: implications for protected area network design

    USGS Publications Warehouse

    Beatty, William S.; Kesler, Dylan C.; Webb, Elisabeth B.; Raedeke, Andrew H.; Naylor, Luke W.; Humburg, Dale D.

    2014-01-01

    The principal goal of protected area networks is biodiversity preservation, but efficacy of such networks is directly linked to animal movement within and outside area boundaries. We examined wetland selection patterns of mallards (Anas platyrhynchos) during non-breeding periods from 2010 to 2012 to evaluate the utility of protected areas to migratory waterfowl in North America. We tracked 33 adult females using global positioning system (GPS) satellite transmitters and implemented a use-availability resource selection design to examine mallard use of wetlands under varying degrees of protection. Specifically, we examined effects of proximities to National Wildlife Refuges, private land, state wildlife management areas, Wetland Reserve Program easements (WRP), and waterfowl sanctuaries on mallard wetland selection. In addition, we included landscape-level variables that measured areas of sanctuary and WRP within the surrounding landscape of each used and available wetland. We developed 8 wetland selection models according to season (autumn migration, winter, spring migration), hunting season (present, absent), and time period (diurnal, nocturnal). Model averaged parameter estimates indicated wetland selection patterns varied across seasons and time periods, but ducks consistently selected wetlands with greater areas of sanctuary and WRP in the surrounding landscape. Consequently, WRP has the potential to supplement protected area networks in the midcontinent region. Additionally, seasonal variation in wetland selection patterns indicated considering the effects of habitat management and anthropogenic disturbances on migratory waterfowl during the non-breeding period is essential in designing protected area networks.

  19. Intercontinental Multi-Domain Monitoring for LHC with perfSONAR

    NASA Astrophysics Data System (ADS)

    Vicinanza, D.

    2012-12-01

    The Large Hadron Collider (LHC) is currently running at CERN in Geneva, Switzerland. Physicists are using LHC to recreate the conditions just after the Big Bang, by colliding two beams of particles and heavy ions head-on at very high energy. The project is generating more than 15 TB of raw data per year, plus 10 TB of “event summary data”. This data is sent out from CERN to eleven Tier 1 research centres in Europe, Asia, and North America using a multi-gigabits Optical Private Network (OPN), the LHCOPN. Tier 1 sites are then connected to 100+ academic and research institutions in the world (the Tier 2s) through a Multipoint to Multipoint network, the LHC Open Network Environment (LHCONE). Network monitoring on such complex network architecture to ensure robust and reliable operation is of crucial importance. The chosen approach for monitoring the OPN and ONE is based on the perfSONAR framework, which is designed for multi-domain monitoring environments. perfSONAR (www.perfsonar.net) is an infrastructure for performance monitoring data exchange between networks, making it easier to solve performance problems occurring between network measurement points interconnected through several network domains.

  20. TRUSS: An intelligent design system for aircraft wings

    NASA Technical Reports Server (NTRS)

    Bates, Preston R.; Schrage, Daniel P.

    1989-01-01

    Competitive leadership in the international marketplace, superiority in national defense, excellence in productivity, and safety of both private and public systems are all national defense goals which are dependent on superior engineering design. In recent years, it has become more evident that early design decisions are critical, and when only based on performance often result in products which are too expensive, hard to manufacture, or unsupportable. Better use of computer-aided design tools and information-based technologies is required to produce better quality United States products. A program is outlined here to explore the use of knowledge based expert systems coupled with numerical optimization, database management techniques, and designer interface methods in a networked design environment to improve and assess design changes due to changing emphasis or requirements. The initial structural design of a tiltrotor aircraft wing is used as a representative example to demonstrate the approach being followed.

  1. [Private foundations Global Health Philanthropy: the problem of conflicts of interest].

    PubMed

    2011-01-01

    Private foundations Global Health Philanthropy: the problem of conflicts of interest. Private foundations are in a position where they are granted several privileges and are very powerful and able to influence global health. A recent article published on Plos Medicine, analyzing five of the largest health foundations highlights the network of interests and conflicts. Many private health foundations have associations with private food and pharmaceutical corporations. In some instances, these corporations directly benefit from foundations grants, and foundations in turn are invested in the corporations to which they award these grants.

  2. Implementing a public-private mix model for tuberculosis treatment in urban Pakistan: lessons and experiences.

    PubMed

    Naqvi, S A; Naseer, M; Kazi, A; Pethani, A; Naeem, I; Zainab, S; Fatmi, Z

    2012-06-01

    Six towns of Karachi, Pakistan. 1) To strengthen the capacity of general practitioners (GPs) in providing tuberculosis (TB) treatment through DOTS; and 2) to enhance collaboration between the public and private sectors in TB management and case reporting. A quasi-experimental study design was adopted to ensure enrolment of TB patients through trained GPs with the support of laboratory networks and to improve the case detection rate. The following challenges were faced during implementation of the model in urban settings: no systematic list of GPs was available; the majority of the GPs were untrained health practitioners working in squatter settlements, where formally trained GPs are most needed; the motivation of GPs with high patient loads is very low; and access to a laboratory is difficult. Of 35 patients enrolled in the first quarter (third quarter 2009), 87% completed their treatment successfully. Public-private mix (PPM) DOTS is feasible in the cities of Pakistan. However, the cost, time and effort required to establish the programme is higher than in many other developing countries.

  3. The Collaboration Challenge: Global Partnerships to Achieve Global Goals.

    PubMed

    Bzdak, Michael

    2017-01-01

    As capitalism is being re-invented and the voices of multiple stakeholders are becoming more prevalent and demanding, it is the perfect time for the private sector to embrace large-scale collaboration and a shared sense of purpose. Since the explosive growth of Corporate Social Responsibility (CSR) in the 1990s, a new era of responsibility, purpose and a re-envisioned capitalism are dramatically apparent. Beyond financial support, business leaders have the opportunity to galvanize networks, advocate for regulation and policy change, and form supporting consortia to support global development. The role of the private sector in development has changed significantly from a model of benevolent contributor to a model of collaborator, investor, business partner and exponential value creator. The new era of collaboration should move beyond a shared value mindset to new models of partnership where each contributor plays an equal role in defining challenges and designing solutions with the greater goal of sustainable value creation. Non-Governmental Organizations (NGOs) have the unprecedented opportunity to take leadership roles in engaging the private sector in more game-changing collaborations.

  4. 47 CFR 27.1307 - Spectrum use in the network.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Spectrum use in the network. 27.1307 Section 27... network. (a) Spectrum use. The shared wireless broadband network developed by the 700 MHz Public/Private... from the primary public safety operations in the 763-768 MHz and 793-798 MHz bands. The network...

  5. 47 CFR 27.1307 - Spectrum use in the network.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Spectrum use in the network. 27.1307 Section 27... network. (a) Spectrum use. The shared wireless broadband network developed by the 700 MHz Public/Private... from the primary public safety operations in the 763-768 MHz and 793-798 MHz bands. The network...

  6. Principle and verification of novel optical virtual private networks over multiprotocol label switching/optical packet switching networks

    NASA Astrophysics Data System (ADS)

    Zhang, Chongfu; Wang, Zhengsuan; Jin, Wei; Qiu, Kun

    2012-11-01

    A novel realization method of the optical virtual private networks (OVPN) over multiprotocol label switching/optical packet switching (MPLS/OPS) networks is proposed. In this scheme, the introduction of MPLS control plane makes OVPN over OPS networks more reliable and easier; OVPN makes use of the concept of high reconfiguration of light-paths offered by MPLS, to set up secure tunnels of high bandwidth across intelligent OPS networks. Through resource management, the signal mechanism, connection control, and the architecture of the creation and maintenance of OVPN are efficiently realized. We also present an OVPN architecture with two traffic priorities, which is used to analyze the capacity, throughput, delay time of the proposed networks, and the packet loss rate performance of the OVPN over MPLS/OPS networks based on full mesh topology. The results validate the applicability of such reliable connectivity to high quality services in the OVPN over MPLS/OPS networks. Along with the results, the feasibility of the approach as the basis for the next generation networks is demonstrated and discussed.

  7. 47 CFR 27.1310 - Network sharing agreement.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Network sharing agreement. 27.1310 Section 27... MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1310 Network sharing..., and related entities as the Commission may require or allow will be governed by the Network Sharing...

  8. 47 CFR 27.1310 - Network sharing agreement.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Network sharing agreement. 27.1310 Section 27... MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1310 Network sharing..., and related entities as the Commission may require or allow will be governed by the Network Sharing...

  9. 47 CFR 27.1310 - Network sharing agreement.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 2 2012-10-01 2012-10-01 false Network sharing agreement. 27.1310 Section 27... MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1310 Network sharing..., and related entities as the Commission may require or allow will be governed by the Network Sharing...

  10. WaterNet:The NASA Water Cycle Solutions Network

    NASA Astrophysics Data System (ADS)

    Belvedere, D. R.; Houser, P. R.; Pozzi, W.; Imam, B.; Schiffer, R.; Schlosser, C. A.; Gupta, H.; Martinez, G.; Lopez, V.; Vorosmarty, C.; Fekete, B.; Matthews, D.; Lawford, R.; Welty, C.; Seck, A.

    2008-12-01

    Water is essential to life and directly impacts and constrains society's welfare, progress, and sustainable growth, and is continuously being transformed by climate change, erosion, pollution, and engineering. Projections of the effects of such factors will remain speculative until more effective global prediction systems and applications are implemented. NASA's unique role is to use its view from space to improve water and energy cycle monitoring and prediction, and has taken steps to collaborate and improve interoperability with existing networks and nodes of research organizations, operational agencies, science communities, and private industry. WaterNet is a Solutions Network, devoted to the identification and recommendation of candidate solutions that propose ways in which water-cycle related NASA research results can be skillfully applied by partner agencies, international organizations, state, and local governments. It is designed to improve and optimize the sustained ability of water cycle researchers, stakeholders, organizations and networks to interact, identify, harness, and extend NASA research results to augment Decision Support Tools that address national needs.

  11. Text Messaging and Social Network Site Use to Facilitate Alcohol Involvement: A Comparison of U.S. and Korean College Students.

    PubMed

    Jensen, Michaeline; Hussong, Andrea M; Baik, Jeesook

    2018-05-01

    Alcohol-related content on public social networking sites (SNS) has been linked to collegiate alcohol use, but we know little about whether and how private forms of computer-mediated communication (CMC), like text messaging, are related to collegiate drinking, nor how alcohol-related CMC content and drinking are associated in non-Western cultures. We examined the ways in which private text messaging and SNS are used to facilitate alcohol involvement among U.S. (n = 575) and Korean (n = 462) college students (total N = 1037), two technologically wired cultures with prevalent collegiate alcohol misuse. Results show that college students prefer private text messaging over SNS to find parties and facilitate alcohol involvement, and this preference tends to be stronger in Korea than the United States. Private text messaging is more consistently and strongly associated with alcohol use frequency and heavy episodic drinking than SNS posts in both countries, with particularly robust associations between private text messaging and drinking in the United States. Findings underscore the role of CMCs in facilitating alcohol involvement and highlight the potential for analysis of private message content to further understand computer-mediated social processes in college student drinking.

  12. Evaluation of Workload and its Impact on Satisfaction Among Pharmacy Academicians in Southern India

    PubMed Central

    Khan, Muhammad Umair; Srikanth, Akshaya B.; Patel, Isha; Nagappa, Anantha Naik; Jamshed, Shazia Qasim

    2015-01-01

    Objective The purpose of this study was to determine the level of workload among pharmacy academicians working in public and private sector universities in India. The study also aimed to assess the satisfaction of academicians towards their workload. Materials and Methods A cross-sectional study was conducted for a period of 2 months among pharmacy academicians in Karnataka state of Southern India. Convenience sampling was used to select a sample and was contacted via email and/or social networking sites. Questionnaire designed by thorough review literature was used as a tool to collect data on workload (teaching, research, extracurricular services) and satisfaction. Results Of 214 participants, 95 returned the filled questionnaire giving the response rate of 44.39%. Private sector academicians had more load of teaching (p=0.046) and they appeared to be less involved in research activities (p=0.046) as compared to public sector academicians. More than half of the respondents (57.9%) were satisfied with their workload with Assistant Professors were least satisfied as compared to Professors (p=0.01). Conclusion Overall, private sector academicians are more burdened by teaching load and also are less satisfied of their workload. Revision of private universities policies may aid in addressing this issue. PMID:26266133

  13. Quality of service policy control in virtual private networks

    NASA Astrophysics Data System (ADS)

    Yu, Yiqing; Wang, Hongbin; Zhou, Zhi; Zhou, Dongru

    2004-04-01

    This paper studies the QoS of VPN in an environment where the public network prices connection-oriented services based on source, destination and grade of service, and advertises these prices to its VPN customers (users). As different QoS technologies can produce different QoS, there are according different traffic classification rules and priority rules. The internet service provider (ISP) may need to build complex mechanisms separately for each node. In order to reduce the burden of network configuration, we need to design policy control technologies. We considers mainly directory server, policy server, policy manager and policy enforcers. Policy decision point (PDP) decide its control according to policy rules. In network, policy enforce point (PEP) decide its network controlled unit. For InterServ and DiffServ, we will adopt different policy control methods as following: (1) In InterServ, traffic uses resource reservation protocol (RSVP) to guarantee the network resource. (2) In DiffServ, policy server controls the DiffServ code points and per hop behavior (PHB), its PDP distributes information to each network node. Policy server will function as following: information searching; decision mechanism; decision delivering; auto-configuration. In order to prove the effectiveness of QoS policy control, we make the corrective simulation.

  14. 47 CFR 90.1415 - Establishment, execution, and application of the network sharing agreement.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the network sharing agreement. 90.1415 Section 90.1415 Telecommunication FEDERAL COMMUNICATIONS.../Private Partnership § 90.1415 Establishment, execution, and application of the network sharing agreement... to the NSA must also include the Upper 700 MHz D Block licensee, the Network Assets Holder, and the...

  15. 47 CFR 27.1315 - Establishment, execution, and application of the network sharing agreement.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the network sharing agreement. 27.1315 Section 27.1315 Telecommunication FEDERAL COMMUNICATIONS.../Private Partnership § 27.1315 Establishment, execution, and application of the network sharing agreement... Upper 700 MHz D Block licensee, the Network Assets Holder, and the Operating Company, as these entities...

  16. 47 CFR 27.1315 - Establishment, execution, and application of the network sharing agreement.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the network sharing agreement. 27.1315 Section 27.1315 Telecommunication FEDERAL COMMUNICATIONS.../Private Partnership § 27.1315 Establishment, execution, and application of the network sharing agreement... Upper 700 MHz D Block licensee, the Network Assets Holder, and the Operating Company, as these entities...

  17. 47 CFR 90.1415 - Establishment, execution, and application of the network sharing agreement.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the network sharing agreement. 90.1415 Section 90.1415 Telecommunication FEDERAL COMMUNICATIONS.../Private Partnership § 90.1415 Establishment, execution, and application of the network sharing agreement... to the NSA must also include the Upper 700 MHz D Block licensee, the Network Assets Holder, and the...

  18. Spatial Distribution Characteristics of Healthcare Facilities in Nanjing: Network Point Pattern Analysis and Correlation Analysis.

    PubMed

    Ni, Jianhua; Qian, Tianlu; Xi, Changbai; Rui, Yikang; Wang, Jiechen

    2016-08-18

    The spatial distribution of urban service facilities is largely constrained by the road network. In this study, network point pattern analysis and correlation analysis were used to analyze the relationship between road network and healthcare facility distribution. The weighted network kernel density estimation method proposed in this study identifies significant differences between the outside and inside areas of the Ming city wall. The results of network K-function analysis show that private hospitals are more evenly distributed than public hospitals, and pharmacy stores tend to cluster around hospitals along the road network. After computing the correlation analysis between different categorized hospitals and street centrality, we find that the distribution of these hospitals correlates highly with the street centralities, and that the correlations are higher with private and small hospitals than with public and large hospitals. The comprehensive analysis results could help examine the reasonability of existing urban healthcare facility distribution and optimize the location of new healthcare facilities.

  19. Racial disparities in travel time to radiotherapy facilities in the Atlanta metropolitan area

    PubMed Central

    Peipins, Lucy A.; Graham, Shannon; Young, Randall; Lewis, Brian; Flanagan, Barry

    2018-01-01

    Low-income women with breast cancer who rely on public transportation may have difficulty in completing recommended radiation therapy due to inadequate access to radiation facilities. Using a geographic information system (GIS) and network analysis we quantified spatial accessibility to radiation treatment facilities in the Atlanta, Georgia metropolitan area. We built a transportation network model that included all bus and rail routes and stops, system transfers and walk and wait times experienced by public transportation system travelers. We also built a private transportation network to model travel times by automobile. We calculated travel times to radiation therapy facilities via public and private transportation from a population-weighted center of each census tract located within the study area. We broadly grouped the tracts by low, medium and high household access to a private vehicle and by race. Facility service areas were created using the network model to map the extent of areal coverage at specified travel times (30, 45 and 60 min) for both public and private modes of transportation. The median public transportation travel time to the nearest radiotherapy facility was 56 min vs. approximately 8 min by private vehicle. We found that majority black census tracts had longer public transportation travel times than white tracts across all categories of vehicle access and that 39% of women in the study area had longer than 1 h of public transportation travel time to the nearest facility. In addition, service area analyses identified locations where the travel time barriers are the greatest. Spatial inaccessibility, especially for women who must use public transportation, is one of the barriers they face in receiving optimal treatment. PMID:23726213

  20. Racial disparities in travel time to radiotherapy facilities in the Atlanta metropolitan area.

    PubMed

    Peipins, Lucy A; Graham, Shannon; Young, Randall; Lewis, Brian; Flanagan, Barry

    2013-07-01

    Low-income women with breast cancer who rely on public transportation may have difficulty in completing recommended radiation therapy due to inadequate access to radiation facilities. Using a geographic information system (GIS) and network analysis we quantified spatial accessibility to radiation treatment facilities in the Atlanta, Georgia metropolitan area. We built a transportation network model that included all bus and rail routes and stops, system transfers and walk and wait times experienced by public transportation system travelers. We also built a private transportation network to model travel times by automobile. We calculated travel times to radiation therapy facilities via public and private transportation from a population-weighted center of each census tract located within the study area. We broadly grouped the tracts by low, medium and high household access to a private vehicle and by race. Facility service areas were created using the network model to map the extent of areal coverage at specified travel times (30, 45 and 60 min) for both public and private modes of transportation. The median public transportation travel time to the nearest radiotherapy facility was 56 min vs. approximately 8 min by private vehicle. We found that majority black census tracts had longer public transportation travel times than white tracts across all categories of vehicle access and that 39% of women in the study area had longer than 1 h of public transportation travel time to the nearest facility. In addition, service area analyses identified locations where the travel time barriers are the greatest. Spatial inaccessibility, especially for women who must use public transportation, is one of the barriers they face in receiving optimal treatment. Published by Elsevier Ltd.

  1. Southern California Seismic Network: New Design and Implementation of Redundant and Reliable Real-time Data Acquisition Systems

    NASA Astrophysics Data System (ADS)

    Saleh, T.; Rico, H.; Solanki, K.; Hauksson, E.; Friberg, P.

    2005-12-01

    The Southern California Seismic Network (SCSN) handles more than 2500 high-data rate channels from more than 380 seismic stations distributed across southern California. These data are imported real-time from dataloggers, earthworm hubs, and partner networks. The SCSN also exports data to eight different partner networks. Both the imported and exported data are critical for emergency response and scientific research. Previous data acquisition systems were complex and difficult to operate, because they grew in an ad hoc fashion to meet the increasing needs for distributing real-time waveform data. To maximize reliability and redundancy, we apply best practices methods from computer science for implementing the software and hardware configurations for import, export, and acquisition of real-time seismic data. Our approach makes use of failover software designs, methods for dividing labor diligently amongst the network nodes, and state of the art networking redundancy technologies. To facilitate maintenance and daily operations we seek to provide some separation between major functions such as data import, export, acquisition, archiving, real-time processing, and alarming. As an example, we make waveform import and export functions independent by operating them on separate servers. Similarly, two independent servers provide waveform export, allowing data recipients to implement their own redundancy. The data import is handled differently by using one primary server and a live backup server. These data import servers, run fail-over software that allows automatic role switching in case of failure from primary to shadow. Similar to the classic earthworm design, all the acquired waveform data are broadcast onto a private network, which allows multiple machines to acquire and process the data. As we separate data import and export away from acquisition, we are also working on new approaches to separate real-time processing and rapid reliable archiving of real-time data. Further, improved network security is an integral part of the new design. Redundant firewalls will provide secure data imports, exports, and acquisition as well as DMZ zones for web servers and other publicly available servers. We will present the detailed design of this new configuration that is currently being implemented by the SCSN at Caltech. The design principals are general enough to be of use to most regional seismic networks.

  2. On the reliability of Quake-Catcher Network earthquake detections

    USGS Publications Warehouse

    Yildirim, Battalgazi; Cochran, Elizabeth S.; Chung, Angela I.; Christensen, Carl M.; Lawrence, Jesse F.

    2015-01-01

    Over the past two decades, there have been several initiatives to create volunteer‐based seismic networks. The Personal Seismic Network, proposed around 1990, used a short‐period seismograph to record earthquake waveforms using existing phone lines (Cranswick and Banfill, 1990; Cranswicket al., 1993). NetQuakes (Luetgert et al., 2010) deploys triaxial Micro‐Electromechanical Systems (MEMS) sensors in private homes, businesses, and public buildings where there is an Internet connection. Other seismic networks using a dense array of low‐cost MEMS sensors are the Community Seismic Network (Clayton et al., 2012; Kohler et al., 2013) and the Home Seismometer Network (Horiuchi et al., 2009). One main advantage of combining low‐cost MEMS sensors and existing Internet connection in public and private buildings over the traditional networks is the reduction in installation and maintenance costs (Koide et al., 2006). In doing so, it is possible to create a dense seismic network for a fraction of the cost of traditional seismic networks (D’Alessandro and D’Anna, 2013; D’Alessandro, 2014; D’Alessandro et al., 2014).

  3. 3 CFR - Designation of Officers of the Overseas Private Investment Corporation To Act as President of the...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 3 The President 1 2012-01-01 2012-01-01 false Designation of Officers of the Overseas Private Investment Corporation To Act as President of the Overseas Private Investment Corporation Presidential Documents Other Presidential Documents Memorandum of June 6, 2011 Designation of Officers of the Overseas Private Investment Corporation To Act as...

  4. Communication and cooperation in networked environments: an experimental analysis.

    PubMed

    Galimberti, C; Ignazi, S; Vercesi, P; Riva, G

    2001-02-01

    Interpersonal communication and cooperation do not happen exclusively face to face. In work contexts, as in private life, there are more and more situations of mediated communication and cooperation in which new online tools are used. However, understanding how to use the Internet to support collaborative interaction presents a substantial challenge for the designers and users of this emerging technology. First, collaborative Internet environments are designed to serve a purpose, so must be designed with intended users' tasks and goals explicitly considered. Second, in cooperative activities the key content of communication is the interpretation of the situations in which actors are involved. So, the most effective way of clarifying the meaning of messages is to connect them to a shared context of meaning. However, this is more difficult in the Internet than in other computer-based activities. This paper tries to understand the characteristics of cooperative activities in networked environments--shared 3D virtual worlds--through two different studies. The first used the analysis of conversations to explore the characteristics of the interaction during the cooperative task; the second analyzed whether and how the level of immersion in the networked environments influenced the performance and the interactional process. The results are analyzed to identify the psychosocial roots used to support cooperation in a digital interactive communication.

  5. Disaster-hardened imaging POD for PACS

    NASA Astrophysics Data System (ADS)

    Honeyman-Buck, Janice; Frost, Meryll

    2005-04-01

    After the events of 9/11, many people questioned their ability to keep critical services operational in the face of massive infrastructure failure. Hospitals increased their backup and recovery power, made plans for emergency water and food, and operated on a heightened alert awareness with more frequent disaster drills. In a film-based radiology department, if a portable X-ray unit, a CT unit, an Ultrasound unit, and an film processor could be operated on emergency power, a limited, but effective number of studies could be performed. However, in a digital department, there is a reliance on the network infrastructure to deliver images to viewing locations. The system developed for our institution uses several imaging PODS, a name we chose because it implied to us a safe, contained environment. Each POD is a stand-alone emergency powered network capable of generating images and displaying them in the POD or printing them to a DICOM printer. The technology we used to create a POD consists of a computer with dual network interface cards joining our private, local POD network, to the hospital network. In the case of an infrastructure failure, each POD can and does work independently to produce CTs, CRs, and Ultrasounds. The system has been tested during disaster drills and works correctly, producing images using equipment technologists are comfortable using with very few emergency switch-over tasks. Purpose: To provide imaging capabilities in the event of a natural or man-made disaster with infrastructure failure. Method: After the events of 9/11, many people questioned their ability to keep critical services operational in the face of massive infrastructure failure. Hospitals increased their backup and recovery power, made plans for emergency water and food, and operated on a heightened alert awareness with more frequent disaster drills. In a film-based radiology department, if a portable X-ray unit, a CT unit, an Ultrasound unit, and an film processor could be operated on emergency power, a limited, but effective number of studies could be performed. However, in a digital department, there is a reliance on the network infrastructure to deliver images to viewing locations. The system developed for our institution uses several imaging PODS, a name we chose because it implied to us a safe, contained environment. Each POD is on both the standard and the emergency power systems. All the vendor equipment that produces images is on a private, stand-alone network controlled either by a simple or a managed switch. Included in each POD is a dry-process DICOM printer that is rarely used during normal operations and a display workstation. One node on the private network is a PACS application processor (AP) with two network interface cards, one for the private network, one for the standard PACS network. During ordinary daily operations, all acquired images pass through this AP and are routed to the PACS archives, web servers, and workstations. However, if the power and network to much of the hospital were to fail, the stand-alone POD could still function. Images are routed to the AP, but cannot forward to the main network. However, they can be routed to the printer and display in the POD. They are also stored on the AP to continue normal routing when the infrastructure is restored. Results: The imaging PODS have been tested in actual disaster testing where the infrastructure was intentionally removed and worked as designed. To date, we have not had to use them in a real-life scenario and we hope we never do, but we feel we have a reasonable level of emergency imaging capability if we ever need it. Conclusions: Our testing indicates our PODS are a viable way to continue medical imaging in the face of an emergency with a major part of our network and electrical infrastructure destroyed.

  6. [Datanet 1 and the convergence of the computer and telecommunications].

    PubMed

    de Wit, Onno

    2008-01-01

    This article describes the efforts of the Dutch national company for telecommunication, PTT, in introducing and developing a public network for data communication in the Netherlands in the last decades of the twentieth century. As early as the 1960s, private companies started to connect their local computers. As a result, small private computer networks started to emerge. As the state company offering general access to public services in telephony, the PTT strove to develop a public data network, accessible to every user and telephone subscriber. This ambition was realized with Datanet 1, the public data network which was officially opened in 1982. In the years that followed, Datanet became the dominant network for data transmission, despite competing efforts by private companies and computer manufacturers. The large-scale application of Datanet in public municipal administration serves as a case study for the development of data communication in practice, that shows that there was a gradual migration from X-25 to TCP/IP protocols. The article concludes by stating that the introduction and development of data transmission transformed the role of the PTT in Dutch society, brought new working practices, new services and new responsibilities, and resulted in a whole new phase in the history of the computer.

  7. 7 CFR 3430.603 - Eligibility.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... community-based and nongovernmental organization; (d) A college or university (including a junior college offering an associate's degree) or foundation maintained by a college or university; (e) A private for... State, tribal, local, or regionally-based network or partnership of public or private entities...

  8. 47 CFR 32.5040 - Private line revenue.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS... communications between specific locations (e.g., point-to-point communications. It includes revenue from subvoice grade, voice grade, audio and video program grade, digital transmission and local private network...

  9. Convergence

    NASA Astrophysics Data System (ADS)

    Darcie, Thomas E.; Doverspike, Robert; Zirngibl, Martin; Korotky, Steven K.

    2005-01-01

    Call for Papers: Convergence

    Guest Editors: Thomas E. Darcie, University of Victoria Robert Doverspike, AT&T Martin Zirngibl, Lucent Technologies

    Coordinating Associate Editor: Steven K. Korotky, Lucent Technologies

    The Journal of Optical Networking (JON) invites submissions to a special issue on Convergence. Convergence has become a popular theme in telecommunications, one that has broad implications across all segments of the industry. Continual evolution of technology and applications continues to erase lines between traditionally separate lines of business, with dramatic consequences for vendors, service providers, and consumers. Spectacular advances in all layers of optical networking-leading to abundant, dynamic, cost-effective, and reliable wide-area and local-area connections-have been essential drivers of this evolution. As services and networks continue to evolve towards some notion of convergence, the continued role of optical networks must be explored. One vision of convergence renders all information in a common packet (especially IP) format. This vision is driven by the proliferation of data services. For example, time-division multiplexed (TDM) voice becomes VoIP. Analog cable-television signals become MPEG bits streamed to digital set-top boxes. T1 or OC-N private lines migrate to Ethernet virtual private networks (VPNs). All these packets coexist peacefully within a single packet-routing methodology built on an optical transport layer that combines the flexibility and cost of data networks with telecom-grade reliability. While this vision is appealing in its simplicity and shared widely, specifics of implementation raise many challenges and differences of opinion. For example, many seek to expand the role of Ethernet in these transport networks, while massive efforts are underway to make traditional TDM networks more data friendly within an evolved but backward-compatible SDH/SONET (synchronous digital hierarchy and synchronous optical network) multiplexing hierarchy. From this common underlying theme follow many specific instantiations. Examples include the convergence at the physical, logical, and operational levels of voice and data, video and data, private-line and virtual private-line, fixed and mobile, and local and long-haul services. These trends have many consequences for consumers, vendors, and carriers. Faced with large volumes of low-margin data traffic mixed with traditional voice services, the need for capital conservation and operational efficiency drives carriers away from today's separate overlay networks for each service and towards "converged" platforms. For example, cable operators require transport of multiple services over both hybrid fiber coax (HFC) and DWDM transport technologies. Local carriers seek an economical architecture to deliver integrated services on optically enabled broadband-access networks. Services over wireless-access networks must coexist with those from wired networks. In each case, convergence of networks and services inspires an important set of questions and challenges, driven by the need for low cost, operational efficiency, service performance requirements, and optical transport technology options. This Feature Issue explores the various interpretations and implications of network convergence pertinent to optical networking. How does convergence affect the evolution of optical transport-layer and control approaches? Are the implied directions consistent with research vision for optical networks? Substantial challenges remain. Papers are solicited across the broad spectrum of interests. These include, but are not limited to:
    • Architecture, design and performance of optical wide-area-network (WAN), metro, and access networks
    • Integration strategies for multiservice transport platforms
    • Access methods that bridge traditional and emerging services
    • Network signaling and control methodologies
    • All-optical packet routing and switching techniques

    Manuscript Submission

    To submit to this special issue, follow the normal procedure for submission to JON, indicating "Convergence feature" in the "Comments" field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line "Convergence." Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 July 2005

  10. Using game theory to analyze green stormwater infrastructure implementation policies

    NASA Astrophysics Data System (ADS)

    William, R. K.; Garg, J.; Stillwell, A. S.

    2017-12-01

    While green stormwater infrastructure is a useful approach in addressing multiple challenges facing the urban environment, little consensus exists on how to best incentivize its adoption by private landowners. Game theory, a field of study designed to model conflict and cooperation between two or more agents, is well-suited to address this policy question. We used a cooperative game theory framework to analyze the impacts of three different policy approaches frequently used to incentivize the uptake of green infrastructure by private landowners: municipal regulation, direct grants, and stormwater fees. The results indicate that municipal regulation leads to the greatest environmental benefits; however, the choice of "best" regulatory approach is dependent on a variety of different factors including political and financial considerations. Policy impacts are also highly dependent on agents' spatial positions within the stormwater network. This finding leads to important questions of social equity and environmental justice.

  11. 7 CFR 3430.603 - Eligibility.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... college or university (including a junior college offering an associate's degree) or foundation maintained by a college or university; (e) A private for-profit organization; or (f) Any other appropriate... network or partnership of public or private entities, including: (a) A State cooperative extension service...

  12. 7 CFR 3430.603 - Eligibility.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... college or university (including a junior college offering an associate's degree) or foundation maintained by a college or university; (e) A private for-profit organization; or (f) Any other appropriate... network or partnership of public or private entities, including: (a) A State cooperative extension service...

  13. 7 CFR 3430.603 - Eligibility.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... college or university (including a junior college offering an associate's degree) or foundation maintained by a college or university; (e) A private for-profit organization; or (f) Any other appropriate... network or partnership of public or private entities, including: (a) A State cooperative extension service...

  14. 7 CFR 3430.603 - Eligibility.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... college or university (including a junior college offering an associate's degree) or foundation maintained by a college or university; (e) A private for-profit organization; or (f) Any other appropriate... network or partnership of public or private entities, including: (a) A State cooperative extension service...

  15. Dense wavelength division multiplexing devices for metropolitan-area datacom and telecom networks

    NASA Astrophysics Data System (ADS)

    DeCusatis, Casimer M.; Priest, David G.

    2000-12-01

    Large data processing environments in use today can require multi-gigabyte or terabyte capacity in the data communication infrastructure; these requirements are being driven by storage area networks with access to petabyte data bases, new architecture for parallel processing which require high bandwidth optical links, and rapidly growing network applications such as electronic commerce over the Internet or virtual private networks. These datacom applications require high availability, fault tolerance, security, and the capacity to recover from any single point of failure without relying on traditional SONET-based networking. These requirements, coupled with fiber exhaust in metropolitan areas, are driving the introduction of dense optical wavelength division multiplexing (DWDM) in data communication systems, particularly for large enterprise servers or mainframes. In this paper, we examine the technical requirements for emerging nextgeneration DWDM systems. Protocols for storage area networks and computer architectures such as Parallel Sysplex are presented, including their fiber bandwidth requirements. We then describe two commercially available DWDM solutions, a first generation 10 channel system and a recently announced next generation 32 channel system. Technical requirements, network management and security, fault tolerant network designs, new network topologies enabled by DWDM, and the role of time division multiplexing in the network are all discussed. Finally, we present a description of testing conducted on these networks and future directions for this technology.

  16. [The contracting process and outsourcing in health: the scenario for dispute between public and private interests].

    PubMed

    Albuquerque, Maria do Socorro Veloso; Morais, Heloísa Maria Mendonça de; Lima, Luci Praciano

    2015-06-01

    This research analyzed the public-private composition in the municipal health network and aspects of the contracting/outsourcing process for services over the period from 2001 to 2008. The research method used was a case study with documentary research and interviews. The interviewees were former secretaries of health, directors of regulation and district managers. The categories of analysis used were public funds, care networks and public control. The results showed that the contracting was restricted to philanthropic units. With respect to the other private establishments linked to the public care network, non-compliance with programmatic aspects was detected, such as the lack of regulation of bidding processes required for contracting. Management authorities did not actively pursue building up state public services, or the formation of care networks. The contracted establishments conducted their activities without effective external and internal control mechanisms, which are paramount for the proper use of public resources. The authors conclude that the contracting process does not significantly alter the standard of buying and selling of services and indeed does not enhance the empowering process of the role of the public domain.

  17. Methicillin-resistant Staphylococcus aureus among a network of French private-sector community-based-medical laboratories.

    PubMed

    Maugat, S; de Rougemont, A; Aubry-Damon, H; Reverdy, M-E; Georges, S; Vandenesch, F; Etienne, J; Coignard, B

    2009-05-01

    The aim of this study was to estimate the frequency of methicillin-resistant Staphylococcus aureus (MRSA) strains in the French community and the proportion of Panton-Valentine (PVL)-MRSA. A cross-sectional study was made during a 3-month period in 2003 through a network of private-sector, community-based medical laboratories selected throughout France: the Labville network. Each MRSA isolate was included and characterized by French National Reference Center for Staphylococci. The total number of S. aureus isolates was also collected. Among the 283 patients infected or colonized by MRSA, 166 (59%) were considered as healthcare-associated, 14 (5%) as nursing-associated and 39 (14%) as community-acquired. The proportion of methicillin resistance among S. aureus was 14%. Taking into account the sampling design, the incidence of MRSA cases in French outpatients was estimated to be 0.50 [CI95%: 0.41-0.60] per 10,000 inhabitants. The molecular analysis confirmed that 80.6% belong to the Lyon clone, the most prevalent hospital MRSA clone spreading in France and 10.6% to a closely related clone. An emerging MRSA clone containing the tst1 gene was detected in six patients and the PVL-positive ST80 clone only in one, 22-year-old, patient. Most of MRSA cases diagnosed in the community in France, in 2003, were elderly with specific risk factors and harbored hospital strains. The prevalence of PVL-MRSA remained low.

  18. All-optical OFDM network coding scheme for all-optical virtual private communication in PON

    NASA Astrophysics Data System (ADS)

    Li, Lijun; Gu, Rentao; Ji, Yuefeng; Bai, Lin; Huang, Zhitong

    2014-03-01

    A novel optical orthogonal frequency division multiplexing (OFDM) network coding scheme is proposed over passive optical network (PON) system. The proposed scheme for all-optical virtual private network (VPN) does not only improve transmission efficiency, but also realize full-duplex communication mode in a single fiber. Compared with the traditional all-optical VPN architectures, the all-optical OFDM network coding scheme can support higher speed, more flexible bandwidth allocation, and higher spectrum efficiency. In order to reduce the difficulty of alignment for encoding operation between inter-communication traffic, the width of OFDM subcarrier pulse is stretched in our proposed scheme. The feasibility of all-optical OFDM network coding scheme for VPN is verified, and the relevant simulation results show that the full-duplex inter-communication traffic stream can be transmitted successfully. Furthermore, the tolerance of misalignment existing in inter-ONUs traffic is investigated and analyzed for all-optical encoding operation, and the difficulty of pulse alignment is proved to be lower.

  19. An efficient quantum scheme for Private Set Intersection

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very suitable for big data services in Cloud or large-scale client-server networks.

  20. Flywheel-Based Fast Charging Station - FFCS for Electric Vehicles and Public Transportation

    NASA Astrophysics Data System (ADS)

    Gabbar, Hossam A.; Othman, Ahmed M.

    2017-08-01

    This paper demonstrates novel Flywheel-based Fast Charging Station (FFCS) for high performance and profitable charging infrastructures for public electric buses. The design criteria will be provided for fast charging stations. The station would support the private and open charging framework. Flywheel Energy storage system is utilized to offer advanced energy storage for charging stations to achieve clean public transportation, including electric buses with reducing GHG, including CO2 emission reduction. The integrated modelling and management system in the station is performed by a decision-based control platform that coordinates the power streams between the quick chargers, the flywheel storage framework, photovoltaic cells and the network association. There is a tidy exchange up between the capacity rate of flywheel framework and the power rating of the network association.”

  1. Case Study: Does training of private networks of Family Planning clinicians in urban Pakistan affect service utilization?

    PubMed Central

    2010-01-01

    Background To determine whether training of providers participating in franchise clinic networks is associated with increased Family Planning service use among low-income urban families in Pakistan. Methods The study uses 2001 survey data consisting of interviews with 1113 clinical and non-clinical providers working in public and private hospitals/clinics. Data analysis excludes non-clinical providers reducing sample size to 822. Variables for the analysis are divided into client volume, and training in family planning. Regression models are used to compute the association between training and service use in franchise versus private non-franchise clinics. Results In franchise clinic networks, staff are 6.5 times more likely to receive family planning training (P = 0.00) relative to private non-franchises. Service use was significantly associated with training (P = 0.00), franchise affiliation (P = 0.01), providers' years of family planning experience (P = 0.02) and the number of trained staff working at government owned clinics (P = 0.00). In this setting, nurses are significantly less likely to receive training compared to doctors (P = 0.00). Conclusions These findings suggest that franchises recruit and train various cadres of health workers and training maybe associated with increased service use through improvement in quality of services. PMID:21062460

  2. Case Study: Does training of private networks of Family Planning clinicians in urban Pakistan affect service utilization?

    PubMed

    Qureshi, Asma M

    2010-11-09

    To determine whether training of providers participating in franchise clinic networks is associated with increased Family Planning service use among low-income urban families in Pakistan. The study uses 2001 survey data consisting of interviews with 1113 clinical and non-clinical providers working in public and private hospitals/clinics. Data analysis excludes non-clinical providers reducing sample size to 822. Variables for the analysis are divided into client volume, and training in family planning. Regression models are used to compute the association between training and service use in franchise versus private non-franchise clinics. In franchise clinic networks, staff are 6.5 times more likely to receive family planning training (P = 0.00) relative to private non-franchises. Service use was significantly associated with training (P = 0.00), franchise affiliation (P = 0.01), providers' years of family planning experience (P = 0.02) and the number of trained staff working at government owned clinics (P = 0.00). In this setting, nurses are significantly less likely to receive training compared to doctors (P = 0.00). These findings suggest that franchises recruit and train various cadres of health workers and training maybe associated with increased service use through improvement in quality of services.

  3. Tradeoffs between costs and greenhouse gas emissions in the design of urban transit systems

    NASA Astrophysics Data System (ADS)

    Griswold, Julia B.; Madanat, Samer; Horvath, Arpad

    2013-12-01

    Recent investments in the transit sector to address greenhouse gas emissions have concentrated on purchasing efficient replacement vehicles and inducing mode shift from the private automobile. There has been little focus on the potential of network and operational improvements, such as changes in headways, route spacing, and stop spacing, to reduce transit emissions. Most models of transit system design consider user and agency cost while ignoring emissions and the potential environmental benefit of operational improvements. We use a model to evaluate the user and agency costs as well as greenhouse gas benefit of design and operational improvements to transit systems. We examine how the operational characteristics of urban transit systems affect both costs and greenhouse gas emissions. The research identifies the Pareto frontier for designing an idealized transit network. Modes considered include bus, bus rapid transit (BRT), light rail transit (LRT), and metro (heavy) rail, with cost and emissions parameters appropriate for the United States. Passenger demand follows a many-to-many travel pattern with uniformly distributed origins and destinations. The approaches described could be used to optimize the network design of existing bus service or help to select a mode and design attributes for a new transit system. The results show that BRT provides the lowest cost but not the lowest emissions for our large city scenarios. Bus and LRT systems have low costs and the lowest emissions for our small city scenarios. Relatively large reductions in emissions from the cost-optimal system can be achieved with only minor increases in user travel time.

  4. 76 FR 76475 - Employment Network (EN) Report Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-07

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0096] Employment Network (EN) Report Card... Work Consumer Employment Network Report Card. SUMMARY: We are soliciting the input of beneficiaries... revised EN Report Card. An EN is a private or public entity that participates in the Ticket to Work (TTW...

  5. Environmental Response Laboratory Network

    EPA Pesticide Factsheets

    The ERLN as a national network of laboratories that can be ramped up as needed to support large scale environmental responses. It integrates capabilities of existing public and private sector labs, providing consistent capacity and quality data.

  6. Kootenai River Focus Watershed Coordination, 2003-2004 Annual Report.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kootenai River Network,

    2006-02-01

    The Kootenai River Network (KRN) was contracted by the Bonneville Power Administration; PPA Project Number 96087200 for the period June 1, 2003 to May 31, 2004 to provide Kootenai River basin watershed coordination services. The prime focus of the KRN is coordinating activities and disseminating information related to watershed improvement and education and outreach with other interest groups in the Kootenai River basin. To this end, the KRN primarily focuses on maintaining communication networks among private and public watershed improvement groups in the Columbia River Basin. The KRN willing shares its resources with these groups. The 2003-2004 BPA contract extendedmore » the original Montana Fish, Wildlife and Parks contract, which was transferred to the Kootenai River Network through a Memorandum of Understanding in November 2001. The KRN objectives of this contract were carried out through Watershed Coordinator position. The highly successful Kootenai River Network Annual General Meeting in Bonners Ferry in May 2003 demonstrated the tremendous gains that the Kootenai River Network has made in trans-boundary networking of watershed issues and accomplishments. The Annual General Meeting included seventy five participants representing more than forty US and Canadian citizen groups, tribes, first nations, agencies, ministries, businesses and private land owners from Montana, British Columbia, Idaho and Alberta. The International Restoration Tour in July 2004 featured the Grave Creek and Therriault Wetlands restoration projects in Montana and the Sand Creek and Wolf Creek restoration projects in British Columbia. The tour was attended by more than thirty people representing US and Canadian Federal and State/Provincial agencies, schools, colleges, conservation groups, private land owners, consultants, tribes, first nations, and politicians. These exciting trans-boundary successes encouraged the KRN to establish half-time Watershed Coordinator positions in both the United States and Canada. In September 2004 Kim Laub was hired as US-Watershed Coordinator and Jim and Laura Duncan were hired as Canadian Watershed Coordinators. To rejuvenate and revitalize the KRN, the Board conducted a strategic thinking and planning meeting in November 2004. All Board, staff and Advisory members participated in a combined effort to clearly define the goals of the KRN and to design ways of achieving those goals. Affirming and integrating board policy was a primary focus and it included writing accurate job descriptions for all KRN positions. KRN committee goals, the BPA contract and the Statement of Work plan were reviewed to establish future directions for a complex organization.« less

  7. Psychiatric Patients Tracking Through a Private Social Network for Relatives: Development and Pilot Study.

    PubMed

    García-Peñalvo, Francisco J; Martín, Manuel Franco; García-Holgado, Alicia; Guzmán, José Miguel Toribio; Antón, Jesús Largo; Sánchez-Gómez, Ma Cruz

    2016-07-01

    The treatment of psychiatric patients requires different health care from that of patients from other medical specialties. In particular, in the case of Department of Psychiatry from the Zamora Hospital (Spain), the period of time which patients require institutionalized care is a tiny part of their treatment. A large part of health care provided to the patient is aimed at his/her rehabilitation and social integration through day-care centres, supervised flats or activities. Conversely, several reports reveal that approximately 50 % of Internet users use the network as a source of health information, which has led to the emergence of virtual communities where patients, relatives or health professionals share their knowledge concerning an illness, health problem or specific health condition. In this context, we have identified that the relatives have a lack of information regarding the daily activities of patients under psychiatric treatment. The social networks or the virtual communities regarding health problems do not provide a private space where relatives can follow the patient's progress, despite being in different places. The goal of the study was to use technologies to develop a private social network for being used by severe mental patients (mainly schizophrenic patients). SocialNet is a pioneer social network in the health sector because it provides a social interaction context restricted to persons authorized by the patient or his/her legal guardian in such a way that they can track his/her daily activity. Each patient has a private area only accessible to authorized persons and their caregivers, where they can share pictures, videos or texts regarding his/her progress. A preliminary study of usability of the system has been made for increasing the usefulness and usability of SocialNet. SocialNet is the first system for promoting personal interactions among formal caregivers, family, close friends and patient, promoting the recovery of schizophrenic patients. Future studies should study the network's potential usefulness for improving the prognosis and recovery of schizophrenia.

  8. Research on private cloud computing based on analysis on typical opensource platform: a case study with Eucalyptus and Wavemaker

    NASA Astrophysics Data System (ADS)

    Yu, Xiaoyuan; Yuan, Jian; Chen, Shi

    2013-03-01

    Cloud computing is one of the most popular topics in the IT industry and is recently being adopted by many companies. It has four development models, as: public cloud, community cloud, hybrid cloud and private cloud. Except others, private cloud can be implemented in a private network, and delivers some benefits of cloud computing without pitfalls. This paper makes a comparison of typical open source platforms through which we can implement a private cloud. After this comparison, we choose Eucalyptus and Wavemaker to do a case study on the private cloud. We also do some performance estimation of cloud platform services and development of prototype software as cloud services.

  9. Transport link scanner: simulating geographic transport network expansion through individual investments

    NASA Astrophysics Data System (ADS)

    Jacobs-Crisioni, C.; Koopmans, C. C.

    2016-07-01

    This paper introduces a GIS-based model that simulates the geographic expansion of transport networks by several decision-makers with varying objectives. The model progressively adds extensions to a growing network by choosing the most attractive investments from a limited choice set. Attractiveness is defined as a function of variables in which revenue and broader societal benefits may play a role and can be based on empirically underpinned parameters that may differ according to private or public interests. The choice set is selected from an exhaustive set of links and presumably contains those investment options that best meet private operator's objectives by balancing the revenues of additional fare against construction costs. The investment options consist of geographically plausible routes with potential detours. These routes are generated using a fine-meshed regularly latticed network and shortest path finding methods. Additionally, two indicators of the geographic accuracy of the simulated networks are introduced. A historical case study is presented to demonstrate the model's first results. These results show that the modelled networks reproduce relevant results of the historically built network with reasonable accuracy.

  10. Adoption of Social Networking in Education: A Study of the Use of Social Networks by Higher Education Students in Oman

    ERIC Educational Resources Information Center

    Al-Mukhaini, Elham M.; Al-Qayoudhi, Wafa S.; Al-Badi, Ali H.

    2014-01-01

    The use of social networks is a growing phenomenon, being increasingly important in both private and academic life. Social networks are used as tools to enable users to have social interaction. The use of social networks (SNs) complements and enhances the teaching in traditional classrooms. For example, YouTube, Facebook, wikis, and blogs provide…

  11. Unified Communications: Simplifying DoD Communication Methods

    DTIC Science & Technology

    2013-04-18

    private key to encrypt the hash. The encrypted hash, together with some other information, such as the hashing algorithm , is known as a digital...virtual private network (VPN). The use of a VPN would allow users to access corporate data while encrypting traffic.35 Another layer of protection would...sign and encrypt emails as well as controlling access to restricted sites. PKI uses a combination of public and private keys for encryption and

  12. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network

    PubMed Central

    Rajagopalan, S. P.

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290

  13. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    PubMed

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  14. Ties that Bind: A Social Network Approach To Understanding Student Integration and Persistence.

    ERIC Educational Resources Information Center

    Thomas, Scott L.

    2000-01-01

    This study used a social network paradigm to examine college student integration of 329 college freshmen at a private liberal arts college. Analysis of the structural aspects of students' on-campus associations found differential effects of various social network characteristics on student commitment and persistence. (DB)

  15. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...

  16. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...

  17. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...

  18. 31 CFR 1026.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Due diligence programs for private banking accounts. 1026.620 Section 1026.620 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR FUTURES...

  19. 31 CFR 1026.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Due diligence programs for private banking accounts. 1026.620 Section 1026.620 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR FUTURES...

  20. 31 CFR 1026.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Due diligence programs for private banking accounts. 1026.620 Section 1026.620 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR FUTURES...

  1. 31 CFR 1026.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Due diligence programs for private banking accounts. 1026.620 Section 1026.620 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR FUTURES...

  2. Think before You Share

    ERIC Educational Resources Information Center

    Read, Brock

    2006-01-01

    Students in the US are increasingly discovering that online socializing is far from private and that sharing personal details on social-networking Web sites, such as Facebook, can have unintended consequences. A growing number of colleges are moving to disabuse students of the notion that the Internet is their private playground and what they type…

  3. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...

  4. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...

  5. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...

  6. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...

  7. Meeting the Needs of Rural Special Education in the Information Age: Using TI-IN Network's Interactive Satellite Based Educational Network.

    ERIC Educational Resources Information Center

    Pease, Pamela S.; Kitchen, Lillian

    The TI-IN Network is an interactive, satellite-based educational system offering a technological alternative to face-to-face classroom instruction. Developed through a cooperative venture between private enterprise and public education agencies, the TI-IN Network offers a total systems approach by providing the entire programming and hardware…

  8. Inter-BSs virtual private network for privacy and security enhanced 60 GHz radio-over-fiber system

    NASA Astrophysics Data System (ADS)

    Zhang, Chongfu; Chen, Chen; Zhang, Wei; Jin, Wei; Qiu, Kun; Li, Changchun; Jiang, Ning

    2013-06-01

    A novel inter-basestations (inter-BSs) based virtual private network (VPN) for the privacy and security enhanced 60 GHz radio-over-fiber (RoF) system using optical code-division multiplexing (OCDM) is proposed and demonstrated experimentally. By establishing inter-BSs VPN overlaying the network structure of a 60 GHz RoF system, the express and private paths for the communication of end-users under different BSs can be offered. In order to effectively establish the inter-BSs VPN, the OCDM encoding/decoding technology is employed in the RoF system. In each BS, a 58 GHz millimeter-wave (MMW) is used as the inter-BSs VPN channel, while a 60 GHz MMW is used as the common central station (CS)-BSs communication channel. The optical carriers used for the downlink, uplink and VPN link transmissions are all simultaneously generated in a lightwave-centralized CS, by utilizing four-wave mixing (FWM) effect in a semiconductor optical amplifier (SOA). The obtained results properly verify the feasibility of our proposed configuration of the inter-BSs VPN in the 60 GHz RoF system.

  9. Implementation of the Brazilian Breastfeeding Network and prevalence of exclusive breastfeeding

    PubMed Central

    Passanha, Adriana; Benício, Maria Helena D'Aquino; Venâncio, Sônia Isoyama; dos Reis, Márcia Cristina Guerreiro

    2013-01-01

    OBJECTIVE To evaluate the association between the level of implementation of the Brazilian Breastfeeding Network and the prevalence of exclusive breastfeeding. METHODS Cross-sectional study of a representative sample of 916 infants < 6 months, in Ribeirao Preto, SP, Southeastern Brazil, in 2011. Data on breastfeeding, place of outpatient care and other characteristics were collected during the National Vaccination Campaign. The factor studied is where outpatient care took place: Private; Non-Network Public; Public with Network Workshop; and Public certified by Network. The individualized effect of the factor studied on the outcome was analyzed using Poisson regression with robust variance. RESULTS The comparison between private (reference category) and other outpatient care showed significant dose-response relationship with a progressive increase in the prevalence of exclusive breastfeeding in public non-Network, public with Network Workshop and public accredited by Network outpatient care (p = 0.047). As regards the Basic Health Units accredited by Network category, the Prevalence Ratio of exclusive breastfeeding was equal to 1.47 (95%CI 1.00;2.17), after adjustment for confounding variables. CONCLUSIONS The prevalence of exclusive breastfeeding for infants < 6 months was higher in places accredited by the Brazilian Breastfeeding Network, which evinces the importance of investing in accreditation of Basic Units of Health by this strategy. PMID:24626552

  10. Mobile-PKI Service Model for Ubiquitous Environment

    NASA Astrophysics Data System (ADS)

    Jeun, Inkyung; Chun, Kilsoo

    One of the most important things in PKI(Public Key Infrastructure) is the private key management issue. The private key must be deal with safely for secure PKI service. Even though PKI service is usually used for identification and authentication of user in e-commerce, PKI service has many inconvenient factors. Especially, the fact that storage media of private key for PKI service is limited to PC hard disk drive or smart card users must always carry, gives an inconvenience to user and is not suitable in ubiquitous network. This paper suggests the digital signature service using a mobile phone(m-PKI service) which is suitable in future network. A mobile phone is the most widely used for personal communication means and has a characteristic of high movability. We can use the PKI service anytime and anywhere using m-PKI.

  11. Efficiency disparities among community hospitals in Tennessee: do size, location, ownership, and network matter?

    PubMed

    Roh, Chul-Young; Moon, M Jae; Jung, Kwangho

    2013-11-01

    This study examined the impact of ownership, size, location, and network on the relative technical efficiency of community hospitals in Tennessee for the 2002-2006 period, by applying data envelopment analysis (DEA) to measure technical efficiency (decomposed into scale efficiency and pure technical efficiency). Data envelopment analysis results indicate that medium-size hospitals (126-250 beds) are more efficient than their counterparts. Interestingly, public hospitals are significantly more efficient than private and nonprofit hospitals in Tennessee, and rural hospitals are more efficient than urban hospitals. This is the first study to investigate whether hospital networks with other health care providers affect hospital efficiency. Results indicate that community hospitals with networks are more efficient than non-network hospitals. From a management and policy perspective, this study suggests that public policies should induce hospitals to downsize or upsize into optional size, and private hospitals and nonprofit hospitals should change their organizational objectives from profit-driven to quality-driven.

  12. Learnings from the Monitoring of Induced Seismicity in Western Canada over the Past Three Years

    NASA Astrophysics Data System (ADS)

    Yenier, E.; Moores, A. O.; Baturan, D.; Spriggs, N.

    2017-12-01

    In response to induced seismicity observed in western Canada, existing public networks have been densified and a number of private networks have been deployed to closely monitor the earthquakes induced by hydraulic fracturing operations in the region. These networks have produced an unprecedented volume of seismic data, which can be used to map pre-existing geological structures and understand their activation mechanisms. Here, we present insights gained over the past three years from induced seismicity monitoring (ISM) for some of the most active operators in Canada. First, we discuss the benefits of high-quality ISM data sets for making operational decisions and how their value largely depends on choice of instrumentation, seismic network design and data processing techniques. Using examples from recent research studies, we illustrate the key role of robust modeling of regional source, attenuation and site attributes on the accuracy of event magnitudes, ground motion estimates and induced seismicity hazard assessment. Finally, acknowledging that the ultimate goal of ISM networks is assisting operators to manage induced seismic risk, we share some examples of how ISM data products can be integrated into existing protocols for developing effective risk management strategies.

  13. All-optical virtual private network and ONUs communication in optical OFDM-based PON system.

    PubMed

    Zhang, Chongfu; Huang, Jian; Chen, Chen; Qiu, Kun

    2011-11-21

    We propose and demonstrate a novel scheme, which enables all-optical virtual private network (VPN) and all-optical optical network units (ONUs) inter-communications in optical orthogonal frequency-division multiplexing-based passive optical network (OFDM-PON) system using the subcarrier bands allocation for the first time (to our knowledge). We consider the intra-VPN and inter-VPN communications which correspond to two different cases: VPN communication among ONUs in one group and in different groups. The proposed scheme can provide the enhanced security and a more flexible configuration for VPN users compared to the VPN in WDM-PON or TDM-PON systems. The all-optical VPN and inter-ONU communications at 10-Gbit/s with 16 quadrature amplitude modulation (16 QAM) for the proposed optical OFDM-PON system are demonstrated. These results verify that the proposed scheme is feasible. © 2011 Optical Society of America

  14. From Lurker to Active Participant

    NASA Astrophysics Data System (ADS)

    Sloep, Peter; Kester, Liesbeth

    For the purposes of this chapter and section, we conceive of a Learning Network as a particular kind of online social network that is designed to support non-formal learning in a particular domain. The ‘social’ implies that we will focus on interactions between people, the ‘non-formal’ that we will not assume the presence of cohorts, curricula, etc. A Learning Network thus becomes a rather haphazard collection of people who share an interest in a particular topic about which they want to further educate themselves professionally or privately. These people, we assume, do not know of each other’s existence. In actual fact this may be different, they may be accidental or even deliberate acquaintances, for instance if they decide to join as a group. However, for the case of the emergence of sociability, we’ll take the worst-case scenario of a collection of unconnected individuals. If sociability can be made to emerge in an environment that resembles a social desert, it always will, is the argument.

  15. Measuring what we manage - the importance of hydrological data to water resources management

    NASA Astrophysics Data System (ADS)

    Stewart, B.

    2015-04-01

    Water resources cannot be managed, unless we know where they are, in what quantity and quality, and how variable they are likely to be in the foreseeable future. Data from hydrological networks are used by public and private sectors for a variety of different applications. This paper discusses the value proposition behind the collection, analysis and use of hydrological data in support of these applications. The need for hydrological data and the requirements for the data are outlined, and information is provided on topics such as status of networks and data access and sharing. This paper outlines elements of the contribution by the World Meteorological Organization (WMO) to hydrological data collection and covers aspects related to quality management in the collection of hydrological data, especially regarding streamflow gauging, network design and capacity building for services delivery. It should be noted that the applications which make use of hydrological data may also be significantly impacted by climate change.

  16. Privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks.

    PubMed

    Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions.

  17. Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

    PubMed Central

    Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions. PMID:25126107

  18. Convergence

    NASA Astrophysics Data System (ADS)

    Darcie, Thomas E.; Doverspike, Robert; Zirngibl, Martin; Korotky, Steven K.

    2005-02-01

    Call for Papers: Convergence Convergence has become a popular theme in telecommunications, one that has broad implications across all segments of the industry. Continual evolution of technology and applications continues to erase lines between traditionally separate lines of business, with dramatic consequences for vendors, service providers, and consumers. Spectacular advances in all layers of optical networking-leading to abundant, dynamic, cost-effective, and reliable wide-area and local-area connections-have been essential drivers of this evolution. As services and networks continue to evolve towards some notion of convergence, the continued role of optical networks must be explored. One vision of convergence renders all information in a common packet (especially IP) format. This vision is driven by the proliferation of data services. For example, time-division multiplexed (TDM) voice becomes VoIP. Analog cable-television signals become MPEG bits streamed to digital set-top boxes. T1 or OC-N private lines migrate to Ethernet virtual private networks (VPNs). All these packets coexist peacefully within a single packet-routing methodology built on an optical transport layer that combines the flexibility and cost of data networks with telecom-grade reliability. While this vision is appealing in its simplicity and shared widely, specifics of implementation raise many challenges and differences of opinion. For example, many seek to expand the role of Ethernet in these transport networks, while massive efforts are underway to make traditional TDM networks more data friendly within an evolved but backward-compatible SDH/SONET (synchronous digital hierarchy and synchronous optical network) multiplexing hierarchy. From this common underlying theme follow many specific instantiations. Examples include the convergence at the physical, logical, and operational levels of voice and data, video and data, private-line and virtual private-line, fixed and mobile, and local and long-haul services. These trends have many consequences for consumers, vendors, and carriers. Faced with large volumes of low-margin data traffic mixed with traditional voice services, the need for capital conservation and operational efficiency drives carriers away from today's separate overlay networks for each service and towards "converged" platforms. For example, cable operators require transport of multiple services over both hybrid fiber coax (HFC) and DWDM transport technologies. Local carriers seek an economical architecture to deliver integrated services on optically enabled broadband-access networks. Services over wireless-access networks must coexist with those from wired networks. In each case, convergence of networks and services inspires an important set of questions and challenges, driven by the need for low cost, operational efficiency, service performance requirements, and optical transport technology options. This Feature Issue explores the various interpretations and implications of network convergence pertinent to optical networking. How does convergence affect the evolution of optical transport-layer and control approaches? Are the implied directions consistent with research vision for optical networks? Substantial challenges remain. Papers are solicited across the broad spectrum of interests. These include, but are not limited to:

  19. Convergence

    NASA Astrophysics Data System (ADS)

    Darcie, Thomas E.; Doverspike, Robert; Zirngibl, Martin; Korotky, Steven K.

    2005-03-01

    Call for Papers: Convergence Convergence has become a popular theme in telecommunications, one that has broad implications across all segments of the industry. Continual evolution of technology and applications continues to erase lines between traditionally separate lines of business, with dramatic consequences for vendors, service providers, and consumers. Spectacular advances in all layers of optical networking-leading to abundant, dynamic, cost-effective, and reliable wide-area and local-area connections-have been essential drivers of this evolution. As services and networks continue to evolve towards some notion of convergence, the continued role of optical networks must be explored. One vision of convergence renders all information in a common packet (especially IP) format. This vision is driven by the proliferation of data services. For example, time-division multiplexed (TDM) voice becomes VoIP. Analog cable-television signals become MPEG bits streamed to digital set-top boxes. T1 or OC-N private lines migrate to Ethernet virtual private networks (VPNs). All these packets coexist peacefully within a single packet-routing methodology built on an optical transport layer that combines the flexibility and cost of data networks with telecom-grade reliability. While this vision is appealing in its simplicity and shared widely, specifics of implementation raise many challenges and differences of opinion. For example, many seek to expand the role of Ethernet in these transport networks, while massive efforts are underway to make traditional TDM networks more data friendly within an evolved but backward-compatible SDH/SONET (synchronous digital hierarchy and synchronous optical network) multiplexing hierarchy. From this common underlying theme follow many specific instantiations. Examples include the convergence at the physical, logical, and operational levels of voice and data, video and data, private-line and virtual private-line, fixed and mobile, and local and long-haul services. These trends have many consequences for consumers, vendors, and carriers. Faced with large volumes of low-margin data traffic mixed with traditional voice services, the need for capital conservation and operational efficiency drives carriers away from today's separate overlay networks for each service and towards "converged" platforms. For example, cable operators require transport of multiple services over both hybrid fiber coax (HFC) and DWDM transport technologies. Local carriers seek an economical architecture to deliver integrated services on optically enabled broadband-access networks. Services over wireless-access networks must coexist with those from wired networks. In each case, convergence of networks and services inspires an important set of questions and challenges, driven by the need for low cost, operational efficiency, service performance requirements, and optical transport technology options. This Feature Issue explores the various interpretations and implications of network convergence pertinent to optical networking. How does convergence affect the evolution of optical transport-layer and control approaches? Are the implied directions consistent with research vision for optical networks? Substantial challenges remain. Papers are solicited across the broad spectrum of interests. These include, but are not limited to:

  20. Urban Teacher Curriculum Networks and Systemic Change.

    ERIC Educational Resources Information Center

    Useem, Elizabeth; And Others

    Among the best examples of the professional development of teachers that has become a key component of systemic educational reform are the curriculum-based teacher networks that have been created and nurtured in public schools by external private and public funders. This study examined the impact of four such networks on teacher renewal and…

  1. Dynamically allocated virtual clustering management system

    NASA Astrophysics Data System (ADS)

    Marcus, Kelvin; Cannata, Jess

    2013-05-01

    The U.S Army Research Laboratory (ARL) has built a "Wireless Emulation Lab" to support research in wireless mobile networks. In our current experimentation environment, our researchers need the capability to run clusters of heterogeneous nodes to model emulated wireless tactical networks where each node could contain a different operating system, application set, and physical hardware. To complicate matters, most experiments require the researcher to have root privileges. Our previous solution of using a single shared cluster of statically deployed virtual machines did not sufficiently separate each user's experiment due to undesirable network crosstalk, thus only one experiment could be run at a time. In addition, the cluster did not make efficient use of our servers and physical networks. To address these concerns, we created the Dynamically Allocated Virtual Clustering management system (DAVC). This system leverages existing open-source software to create private clusters of nodes that are either virtual or physical machines. These clusters can be utilized for software development, experimentation, and integration with existing hardware and software. The system uses the Grid Engine job scheduler to efficiently allocate virtual machines to idle systems and networks. The system deploys stateless nodes via network booting. The system uses 802.1Q Virtual LANs (VLANs) to prevent experimentation crosstalk and to allow for complex, private networks eliminating the need to map each virtual machine to a specific switch port. The system monitors the health of the clusters and the underlying physical servers and it maintains cluster usage statistics for historical trends. Users can start private clusters of heterogeneous nodes with root privileges for the duration of the experiment. Users also control when to shutdown their clusters.

  2. Bootstrapping disaster: The challenge of growing and maintaining a cross-sector collaborative network.

    PubMed

    Wachhaus, Aaron

    This article examines the interaction of nonprofit and private actors with the traditional bureaucratic structures of government in central Pennsylvania&s recovery from hurricane Irene and tropical storm Lee. That effort relied heavily on private and nonprofit organizations as drivers of the response and recovery. The author maps the organizations involved in the recovery effort and explores the impact of the recovery effort on those organizations. A social network analysis was conducted and complemented with follow-up interviews with key actors. The network analysis reveals weak communication between sectors and a reliance on nonprofits to deliver services; interviews uncover the challenges of intersectoral collaboration. The author addresses the successes and limitations of the means by which a network of nonprofit efforts were coordinated with federal and state relief efforts and draw lessons for improving future practices. The author finds that this case deviates from theory in several ways that complicated community response and recovery. In particular, the challenges of developing and maintaining a recovery network while simultaneously delivering services placed great strain on several organizations, as well as on the fledgling network as a whole.

  3. A correlation study of social network usage among health care students.

    PubMed

    Suit, Louise; Winkler, Patricia; Campbell, Linda; Pennington, Karen; Szutenbach, Mary Pat; Haight, Robert; Roybal, Deborah; McCollum, Marianne

    2015-04-01

    Due to anecdotal concerns about adequacy of health professions students' communication skills, health professions faculty at a private university formed an interprofessional research team. The study was designed to explore whether the use of social networking services (SNS) influenced health care students' written and oral communication skills. One hundred thirty-two students participated in the study. Communication skills were assessed by using assignments from a health care ethics course required of all students. Use of SNS was measured with an information technology questionnaire. Contrary to expected findings, this exploratory correlation study found no meaningful relationship between the frequency of SNS usage and oral and written communication skills in health professions students. Future studies of SNS would benefit from a younger and more homogeneous study population to assess the use of SNS for learning versus leisure. Copyright 2015, SLACK Incorporated.

  4. Converging Redundant Sensor Network Information for Improved Building Control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dale Tiller; D. Phil; Gregor Henze

    2007-09-30

    This project investigated the development and application of sensor networks to enhance building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, but current sensor technology and control algorithms limit the effectiveness of these systems. For example, most of these systems rely on single monitoring points to detect occupancy, when more than one monitoring point could improve system performance. Phase I of the project focused on instrumentation and data collection. During the initial project phase, a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-planmore » office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. Phase II of the project demonstrated that a network of several sensors provides a more accurate measure of occupancy than is possible using systems based on single monitoring points. This phase also established that analysis algorithms could be applied to the sensor network data stream to improve the accuracy of system performance in energy management and security applications. In Phase III of the project, the sensor network from Phase I was complemented by a control strategy developed based on the results from the first two project phases: this controller was implemented in a small sample of work areas, and applied to lighting control. Two additional technologies were developed in the course of completing the project. A prototype web-based display that portrays the current status of each detector in a sensor network monitoring building occupancy was designed and implemented. A new capability that enables occupancy sensors in a sensor network to dynamically set the 'time delay' interval based on ongoing occupant behavior in the space was also designed and implemented.« less

  5. Design of a high-speed high-resolution teleradiology system

    NASA Astrophysics Data System (ADS)

    Stewart, Brent K.; Dwyer, Samuel J., III; Huang, H. K.; Kangarloo, Hooshang

    1992-07-01

    A teleradiology system acquires radiographic images from one location and transmits them to one or more distant sites where they are displayed and/or converted to hardcopy film recordings. The long term goal of this research is to demonstrate that teleradiology systems can provide diagnostically equivalent results when compared to conventional radiographic film interpretation. If this hypothesis is proven, the following radiology tasks will be improved: (1) providing for primary interpretation of radiological images for patients in under served areas as well as other medical facilities; (2) integration of radiological services for multi- hospital/clinic health care provides consortiums (HMOs); (3) improving emergency service and intensive care unit coverage; (4) offering consulting-at-a-distance with sub-speciality radiologists; and (5) providing radiologists in the community or in rural areas immediate access to large academic centers for help in the interpretation of difficult and problematic cases. We are designing a high-speed, high-resolution teleradiology system between our level I medical center and several outlying medical centers within the metropolitan area. CT, MR and screen-film examinations will be digitized to 2 K or 4 K at the remote sites, transmitted to the central referral facility and sent to a laser film printer, reproducing the original film. The film can then be used for primary diagnosis, overreading/consultative purposes or for emergency room preparation. Inherently digital modality data (e.g. MR and CT) can be sent without digitization of the multi-format film is desired. A teleradiology system using a Wide Area Network (WAN) is to be connected to the following sites: (1) Olive View Medical Center; (2) Harbor General Medical Center; (3) UCLA Department of Radiological Sciences; and (4) two radiologist''s private residences. The wide area network (WAN) consists of a local carrier (GTE California Incorporated) and an inter-exchange carrier (US Sprint). Each affiliated hospital site is equipped with: (1) a radiographic film digitizer; (2) an interactive grayscale display workstation; (3) a computer system with teleradiology application software; (4) a local area network (LAN); (5) a LAN-WAN router; and (6) and dial-up (multiple switched N X 56 kbps lines) DS-1 WAN interfaces. The UCLA site is equipped with a local area image management network (PACS) for archiving, displaying, laser printed film hardcopy recordings, and WAN interfaces. The radiologists private residence is equipped with a grayscale station and a DS-0 56 kbps modem. We estimate the hardware costs at each remote site to be DLR160,000, DLR200,000 for the central referring facility, and under $DLR20,000 for the radiologist private residence.

  6. Smart Valley Infrastructure.

    ERIC Educational Resources Information Center

    Maule, R. William

    1994-01-01

    Discusses prototype information infrastructure projects in northern California's Silicon Valley. The strategies of the public and private telecommunications carriers vying for backbone services and industries developing end-user infrastructure technologies via office networks, set-top box networks, Internet multimedia, and "smart homes"…

  7. 3 CFR - Designation of Officers To Act as President of the Overseas Private Investment Corporation

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Designation of Officers To Act as President of the Overseas Private Investment Corporation Presidential Documents Other Presidential Documents Memorandum of January 16, 2009 Designation of Officers To Act as President of the Overseas Private Investment Corporation Memorandum for the President of the...

  8. Getting on Board: The Private Sector and Learning Readiness.

    ERIC Educational Resources Information Center

    Koprowicz, Constance; Myers, John

    Developed by the Women's NETWORK, a group representing women serving in state legislatures in the United States, this report examines how the private sector is involved in promoting learning readiness at the preschool level. The report begins with an introduction and a discussion of the importance of learning readiness as a national goal. The…

  9. 75 FR 62424 - EDS, an HP Company (Re-Branded as HP-Enterprise Services) Including On-Site Workers From: Abel...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-08

    ... Floyd and Company, Trinity Government SYS a Private Co, Verizon Network Integration Corp, Vision... Provider Inc., Teksystems, The Experts Inc., TM Floyd and Company, Trinity Government SYS a Private Co... Compuware Corp Comsys Information Technology SVC, Diversified Systems Inc., E- Corn LLC, Farrington...

  10. The Voucher Veneer: The Deeper Agenda To Privatize Public Education. Special Report.

    ERIC Educational Resources Information Center

    Jacob, Matt

    This paper asserts that government responsibilities in education and the strong connection of Americans with their public schools are being tested, as a network of Religious Right groups, free-market economists, ultraconservative columnists, and others use vouchers as a vehicle to achieve their ultimate goal of privatizing education. Their…

  11. Low-power secure body area network for vital sensors toward IEEE802.15.6.

    PubMed

    Kuroda, Masahiro; Qiu, Shuye; Tochikubo, Osamu

    2009-01-01

    Many healthcare/medical services have started using personal area networks, such as Bluetooth and ZigBee; these networks consist of various types of vital sensors. These works focus on generalized functions for sensor networks that expect enough battery capacity and low-power CPU/RF (Radio Frequency) modules, but less attention to easy-to-use privacy protection. In this paper, we propose a commercially-deployable secure body area network (S-BAN) with reduced computational burden on a real sensor that has limited RAM/ROM sizes and CPU/RF power consumption under a light-weight battery. Our proposed S-BAN provides vital data ordering among sensors that are involved in an S-BAN and also provides low-power networking with zero-administration security by automatic private key generation. We design and implement the power-efficient media access control (MAC) with resource-constraint security in sensors. Then, we evaluate the power efficiency of the S-BAN consisting of small sensors, such as an accessory type ECG and ring-type SpO2. The evaluation of power efficiency of the S-BAN using real sensors convinces us in deploying S-BAN and will also help us in providing feedbacks to the IEEE802.15.6 MAC, which will be the standard for BANs.

  12. A century of sprawl in the United States

    PubMed Central

    Barrington-Leigh, Christopher; Millard-Ball, Adam

    2015-01-01

    The urban street network is one of the most permanent features of cities. Once laid down, the pattern of streets determines urban form and the level of sprawl for decades to come. We present a high-resolution time series of urban sprawl, as measured through street network connectivity, in the United States from 1920 to 2012. Sprawl started well before private car ownership was dominant and grew steadily until the mid-1990s. Over the last two decades, however, new streets have become significantly more connected and grid-like; the peak in street-network sprawl in the United States occurred in ∼1994. By one measure of connectivity, the mean nodal degree of intersections, sprawl fell by ∼9% between 1994 and 2012. We analyze spatial variation in these changes and demonstrate the persistence of sprawl. Places that were built with a low-connectivity street network tend to stay that way, even as the network expands. We also find suggestive evidence that local government policies impact sprawl, as the largest increases in connectivity have occurred in places with policies to promote gridded streets and similar New Urbanist design principles. We provide for public use a county-level version of our street-network sprawl dataset comprising a time series of nearly 100 y. PMID:26080422

  13. A century of sprawl in the United States.

    PubMed

    Barrington-Leigh, Christopher; Millard-Ball, Adam

    2015-07-07

    The urban street network is one of the most permanent features of cities. Once laid down, the pattern of streets determines urban form and the level of sprawl for decades to come. We present a high-resolution time series of urban sprawl, as measured through street network connectivity, in the United States from 1920 to 2012. Sprawl started well before private car ownership was dominant and grew steadily until the mid-1990s. Over the last two decades, however, new streets have become significantly more connected and grid-like; the peak in street-network sprawl in the United States occurred in ∼ 1994. By one measure of connectivity, the mean nodal degree of intersections, sprawl fell by ∼ 9% between 1994 and 2012. We analyze spatial variation in these changes and demonstrate the persistence of sprawl. Places that were built with a low-connectivity street network tend to stay that way, even as the network expands. We also find suggestive evidence that local government policies impact sprawl, as the largest increases in connectivity have occurred in places with policies to promote gridded streets and similar New Urbanist design principles. We provide for public use a county-level version of our street-network sprawl dataset comprising a time series of nearly 100 y.

  14. [Public interactions, private censorship: the case of Facebook].

    PubMed

    Silveira, Sergio Amadeu da

    2015-12-01

    Facebook is examined as a transnational online social networking platform where public discussions and interactions take place. The study surveys the private control of cultural and political expressions exercised by the platform's managers, which can be defined as private censorship. Cases of removal of content are presented and Facebook's political control policies discussed. The article also shows how Facebook rules display highly discretionary components and an aesthetic that can be portrayed as a kind of biopolitics of the information-age society.

  15. Modular architectures for quantum networks

    NASA Astrophysics Data System (ADS)

    Pirker, A.; Wallnöfer, J.; Dür, W.

    2018-05-01

    We consider the problem of generating multipartite entangled states in a quantum network upon request. We follow a top-down approach, where the required entanglement is initially present in the network in form of network states shared between network devices, and then manipulated in such a way that the desired target state is generated. This minimizes generation times, and allows for network structures that are in principle independent of physical links. We present a modular and flexible architecture, where a multi-layer network consists of devices of varying complexity, including quantum network routers, switches and clients, that share certain resource states. We concentrate on the generation of graph states among clients, which are resources for numerous distributed quantum tasks. We assume minimal functionality for clients, i.e. they do not participate in the complex and distributed generation process of the target state. We present architectures based on shared multipartite entangled Greenberger–Horne–Zeilinger states of different size, and fully connected decorated graph states, respectively. We compare the features of these architectures to an approach that is based on bipartite entanglement, and identify advantages of the multipartite approach in terms of memory requirements and complexity of state manipulation. The architectures can handle parallel requests, and are designed in such a way that the network state can be dynamically extended if new clients or devices join the network. For generation or dynamical extension of the network states, we propose a quantum network configuration protocol, where entanglement purification is used to establish high fidelity states. The latter also allows one to show that the entanglement generated among clients is private, i.e. the network is secure.

  16. Photograph use on social network sites among South Korean college students: the role of public and private self-consciousness.

    PubMed

    Shim, Minsun; Lee, Min Ju; Park, Sang Hee

    2008-08-01

    This study challenges theories of computer-mediated communication (CMC) that typically assume a lack of visual cues in CMC and conceptualize them as a situational factor. We examine individual differences in photo use on social network sites and link them to the dispositional tendency of self-consciousness (SC). Included were 231 students from one university in South Korea, who owned and maintained Cyworld profiles (called "mini-homepages"). Findings suggest that public SC, but not private SC, was positively associated with the higher frequency of posting photos, replying to comments on the photos, and scrapping photos on their mini-homepages. The frequency of posting specific content types of photos (concerning social relationships or life events) was also determined by participants' public SC but not by private SC. Implications of the findings for CMC theories are discussed.

  17. Does the internet change how we die and mourn? Overview and analysis.

    PubMed

    Walter, Tony; Hourizi, Rachid; Moncur, Wendy; Pitsillides, Stacey

    The article outlines the issues that the internet presents to death studies. Part 1 describes a range of online practices that may affect dying, the funeral, grief and memorialization, inheritance and archaeology; it also summarizes the kinds of research that have been done in these fields. Part 2 argues that these new online practices have implications for, and may be illuminated by, key concepts in death studies: the sequestration (or separation from everyday life) of death and dying, disenfranchisement of grief, private grief, social death, illness and grief narratives, continuing bonds with the dead, and the presence of the dead in society. In particular, social network sites can bring dying and grieving out of both the private and public realms and into the everyday life of social networks beyond the immediate family, and provide an audience for once private communications with the dead.

  18. Enterprise networks. Strategies for integrated delivery systems.

    PubMed

    Siwicki, B

    1997-02-01

    More integrated delivery systems are making progress toward building computer networks that link all their care delivery sites so they can efficiently and economically coordinate care. A growing number of these systems are turning to intranets--private computer networks that use Internet-derived protocols and technologies--to move information that's essential to managing scare health care resources.

  19. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    NASA Astrophysics Data System (ADS)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  20. Myths on Bi-direction Communication of Web 2.0 Based Social Networks: Is Social Network Truly Interactive?

    DTIC Science & Technology

    2011-03-10

    more and more social interactions are happening on the on-line. Especially recent uptake of the social network sites (SNSs), such as Facebook (http...results give overviews on social interactions on a popular social network site . As each twitter account has different characteristics based on...the public and individuals post their private stories on their blogs and share their interests using social network sites . On the other hand, people

  1. The development of a framework for high-quality, sustainable and accessible rural private therapy under the Australian National Disability Insurance Scheme.

    PubMed

    Dew, Angela; Barton, Rebecca; Ragen, Jo; Bulkeley, Kim; Iljadica, Alexandra; Chedid, Rebecca; Brentnall, Jennie; Bundy, Anita; Lincoln, Michelle; Gallego, Gisselle; Veitch, Craig

    2016-12-01

    The Australian National Disability Insurance Scheme (NDIS) will provide people with individual funding with which to purchase services such as therapy from private providers. This study developed a framework to support rural private therapists to meet the anticipated increase in demand. The study consisted of three stages utilizing focus groups, interviews and an online expert panel. Participants included private therapists delivering services in rural New South Wales (n = 28), disability service users (n = 9) and key representatives from a range of relevant consumer and service organizations (n = 16). We conducted a thematic analysis of focus groups and interview data and developed a draft framework which was subsequently refined based on feedback from stakeholders. The framework highlights the need for a 'rural-proofed' policy context in which service users, therapists and communities engage collaboratively in a therapy pathway. This collaborative engagement is supported by enablers, including networks, resources and processes which are influenced by the drivers of time, cost, opportunity and motivation. The framework identifies factors that will facilitate delivery of high-quality, sustainable, individualized private therapy services for people with a disability in rural Australia under the NDIS and emphasizes the need to reconceptualize the nature of private therapy service delivery. Implications for Rehabilitation Rural private therapists need upskilling to work with individuals with disability who have individual funding such as that provided by the Australian National Disability Insurance Scheme. Therapists working in rural communities need to consider alternative ways of delivering therapy to individuals with disability beyond the traditional one-on-one therapy models. Rural private therapists need support to work collaboratively with individuals with disability and the local community. Rural private therapists should harness locally available and broader networks, resources and processes to meet the needs and goals of individuals with disability.

  2. Privatizing Schooling and Policy Making: The American Legislative Exchange Council and New Political and Discursive Strategies of Education Governance

    ERIC Educational Resources Information Center

    Anderson, Gary L.; Donchik, Liliana Montoro

    2016-01-01

    In this article, we examine the American Legislative Exchange Council (ALEC) as an example of a unique node within larger policy networks composed of new policy entrepreneurs (e.g., venture philanthropists, think tanks, private "edubusinesses" and their lobbyists, advocacy organizations, and social entrepreneurs). These new policy…

  3. Moral Mondays and the Defense of Public Education: The Fusion Movement against ALEC-Influenced Legislation in North Carolina

    ERIC Educational Resources Information Center

    Marshall, Catherine; Tichnor-Wagner, Ariel; Johnson, Mark

    2017-01-01

    A barrage of pro-privatization policies that cascaded into North Carolina education statutes during the 2013-2014 legislative session helped spark a series of organized protests known as the Moral Monday Movement. Powerful and strategic policy networks, such as the American Legislative Exchange Council (ALEC), have made privatization and…

  4. The Effects of Catholic Schooling on Civic Participation. CIRCLE Working Paper 09

    ERIC Educational Resources Information Center

    Dee, Thomas S.

    2003-01-01

    The United States has an extensive network of publicly financed and managed schools and provides almost no financial support to private schools. One of the most fundamental justifications for the status quo is the hypothesis that the regulation of private schools cannot adequately ensure that the desired social benefits of schooling will be…

  5. A Multirelational Social Network Analysis of an Online Health Community for Smoking Cessation.

    PubMed

    Zhao, Kang; Wang, Xi; Cha, Sarah; Cohn, Amy M; Papandonatos, George D; Amato, Michael S; Pearson, Jennifer L; Graham, Amanda L

    2016-08-25

    Online health communities (OHCs) provide a convenient and commonly used way for people to connect around shared health experiences, exchange information, and receive social support. Users often interact with peers via multiple communication methods, forming a multirelational social network. Use of OHCs is common among smokers, but to date, there have been no studies on users' online interactions via different means of online communications and how such interactions are related to smoking cessation. Such information can be retrieved in multirelational social networks and could be useful in the design and management of OHCs. To examine the social network structure of an OHC for smoking cessation using a multirelational approach, and to explore links between subnetwork position (ie, centrality) and smoking abstinence. We used NetworkX to construct 4 subnetworks based on users' interactions via blogs, group discussions, message boards, and private messages. We illustrated topological properties of each subnetwork, including its degree distribution, density, and connectedness, and compared similarities among these subnetworks by correlating node centrality and measuring edge overlap. We also investigated coevolution dynamics of this multirelational network by analyzing tie formation sequences across subnetworks. In a subset of users who participated in a randomized, smoking cessation treatment trial, we conducted user profiling based on users' centralities in the 4 subnetworks and identified user groups using clustering techniques. We further examined 30-day smoking abstinence at 3 months postenrollment in relation to users' centralities in the 4 subnetworks. The 4 subnetworks have different topological characteristics, with message board having the most nodes (36,536) and group discussion having the highest network density (4.35×10(-3)). Blog and message board subnetworks had the most similar structures with an in-degree correlation of .45, out-degree correlation of .55, and Jaccard coefficient of .23 for edge overlap. A new tie in the group discussion subnetwork had the lowest probability of triggering subsequent ties among the same two users in other subnetworks: 6.33% (54,142/855,893) for 2-tie sequences and 2.13% (18,207/855,893) for 3-tie sequences. Users' centralities varied across the 4 subnetworks. Among a subset of users enrolled in a randomized trial, those with higher centralities across subnetworks generally had higher abstinence rates, although high centrality in the group discussion subnetwork was not associated with higher abstinence rates. A multirelational approach revealed insights that could not be obtained by analyzing the aggregated network alone, such as the ineffectiveness of group discussions in triggering social ties of other types, the advantage of blogs, message boards, and private messages in leading to subsequent social ties of other types, and the weak connection between one's centrality in the group discussion subnetwork and smoking abstinence. These insights have implications for the design and management of online social networks for smoking cessation.

  6. A Multirelational Social Network Analysis of an Online Health Community for Smoking Cessation

    PubMed Central

    Wang, Xi; Cha, Sarah; Cohn, Amy M; Papandonatos, George D; Amato, Michael S; Pearson, Jennifer L; Graham, Amanda L

    2016-01-01

    Background Online health communities (OHCs) provide a convenient and commonly used way for people to connect around shared health experiences, exchange information, and receive social support. Users often interact with peers via multiple communication methods, forming a multirelational social network. Use of OHCs is common among smokers, but to date, there have been no studies on users’ online interactions via different means of online communications and how such interactions are related to smoking cessation. Such information can be retrieved in multirelational social networks and could be useful in the design and management of OHCs. Objective To examine the social network structure of an OHC for smoking cessation using a multirelational approach, and to explore links between subnetwork position (ie, centrality) and smoking abstinence. Methods We used NetworkX to construct 4 subnetworks based on users’ interactions via blogs, group discussions, message boards, and private messages. We illustrated topological properties of each subnetwork, including its degree distribution, density, and connectedness, and compared similarities among these subnetworks by correlating node centrality and measuring edge overlap. We also investigated coevolution dynamics of this multirelational network by analyzing tie formation sequences across subnetworks. In a subset of users who participated in a randomized, smoking cessation treatment trial, we conducted user profiling based on users’ centralities in the 4 subnetworks and identified user groups using clustering techniques. We further examined 30-day smoking abstinence at 3 months postenrollment in relation to users’ centralities in the 4 subnetworks. Results The 4 subnetworks have different topological characteristics, with message board having the most nodes (36,536) and group discussion having the highest network density (4.35×10−3). Blog and message board subnetworks had the most similar structures with an in-degree correlation of .45, out-degree correlation of .55, and Jaccard coefficient of .23 for edge overlap. A new tie in the group discussion subnetwork had the lowest probability of triggering subsequent ties among the same two users in other subnetworks: 6.33% (54,142/855,893) for 2-tie sequences and 2.13% (18,207/855,893) for 3-tie sequences. Users’ centralities varied across the 4 subnetworks. Among a subset of users enrolled in a randomized trial, those with higher centralities across subnetworks generally had higher abstinence rates, although high centrality in the group discussion subnetwork was not associated with higher abstinence rates. Conclusions A multirelational approach revealed insights that could not be obtained by analyzing the aggregated network alone, such as the ineffectiveness of group discussions in triggering social ties of other types, the advantage of blogs, message boards, and private messages in leading to subsequent social ties of other types, and the weak connection between one’s centrality in the group discussion subnetwork and smoking abstinence. These insights have implications for the design and management of online social networks for smoking cessation. PMID:27562640

  7. Information technology as tool for change.

    PubMed

    Itkonen, P

    1999-12-01

    It looks that networking welfare thinking and implementations of network projects only follow the development of data transfer possibilities. It is a danger that seamless chain of care in health care is just a data transferring generator based on easy connections, only creating needs for new data transferring. This is an 'illusion of core skills' that does not extend to the development of the contents of services. Easy access to the system makes more contacts and need for more also clinical services. New needs for data transfer burden the personnel with unnecessary information and networking functional model does not emancipate them to use their substantial skills. It means more costs and it is also a danger that normal life will be medicated. Public sector cannot finance all these new possibilities and consequences of modern technology. Does all this create a new combination of public and private sector and push them to allocate responsibilities in developing work? If the public and private sectors do not find the balance in controlling this development, also actors outside health care get to influence the choices and health care loses its autonomy. It becomes a business means for companies producing data transfer and network services. From the prioritization point of view this is not a good vision for financing and delivery of health care services either in public or private sector.

  8. Sustainable use of renewable resources in a stylized social-ecological network model under heterogeneous resource distribution

    NASA Astrophysics Data System (ADS)

    Barfuss, Wolfram; Donges, Jonathan F.; Wiedermann, Marc; Lucht, Wolfgang

    2017-04-01

    Human societies depend on the resources ecosystems provide. Particularly since the last century, human activities have transformed the relationship between nature and society at a global scale. We study this coevolutionary relationship by utilizing a stylized model of private resource use and social learning on an adaptive network. The latter process is based on two social key dynamics beyond economic paradigms: boundedly rational imitation of resource use strategies and homophily in the formation of social network ties. The private and logistically growing resources are harvested with either a sustainable (small) or non-sustainable (large) effort. We show that these social processes can have a profound influence on the environmental state, such as determining whether the private renewable resources collapse from overuse or not. Additionally, we demonstrate that heterogeneously distributed regional resource capacities shift the critical social parameters where this resource extraction system collapses. We make these points to argue that, in more advanced coevolutionary models of the planetary social-ecological system, such socio-cultural phenomena as well as regional resource heterogeneities should receive attention in addition to the processes represented in established Earth system and integrated assessment models.

  9. Economic impact of off-line PC viewer for private folder management

    NASA Astrophysics Data System (ADS)

    Song, Koun-Sik; Shin, Myung J.; Lee, Joo Hee; Auh, Yong H.

    1999-07-01

    We developed a PC-based clinical workstation and implemented at Asan Medical Center in Seoul, Korea, Hardwares used were Pentium-II, 8M video memory, 64-128 MB RAM, 19 inch color monitor, and 10/100Mbps network adaptor. One of the unique features of this workstation is management tool for folders reside both in PACS short-term storage unit and local hard disk. Users can copy the entire study or part of the study to local hard disk, removable storages, or CD recorder. Even the images in private folders in PACS short-term storage can be copied to local storage devices. All images are saved as DICOM 3.0 file format with 2:1 lossless compression. We compared the prices of copy films and storage medias considering the possible savings of expensive PACS short- term storage and network traffic. Price savings of copy film is most remarkable in MR exam. Price savings arising from minimal use of short-term unit was 50,000 dollars. It as hard to calculate the price savings arising from the network usage. Off-line PC viewer is a cost-effective way of handling private folder management under the PACS environment.

  10. Exploring sustainability transitions in households: insights from real-life experiments

    NASA Astrophysics Data System (ADS)

    Baedeker, Carolin; Buhl, Johannes; Greiff, Kathrin; Hasselkuß, Marco; Liedtke, Christa; Lukas, Melanie

    2016-04-01

    Societal transformation towards sustainable consumption and production, especially in urban areas, is a key challenge. The design and implementation of sustainable product service systems (PSS) might be the initial point, in which private households play a major role. The Sustainable LivingLab research infrastructure was developed as an experimental setting for investigating consumption and production patterns in private households, especially to explore socio-technical innovations which are helpful to guide sustainability transitions. The suggested presentation describes results of several real-life experiments conducted in German households, e.g. the project SusLabNRW (North-Rhine Westphalia as part of the European SusLabNWE-Project), the EnerTransRuhr project as well as the PATHWAYS project that explore patterns of action, time use, social practices and the related resource use in private households. The presentation gives an overview of the employed methods and analysed data (qualitative interviews, social network analysis, survey on household activities and inventories and a sustainability assessment (resource profiles - MIPS household analysis). Households' resource consumption was calculated in all fields of activity to analyse social practices' impact. The presentation illustrates how aggregated data can inform scenario analysis and concludes with an outlook onto transition pathways at household level and socio-technical innovations in the fields of housing, nutrition and mobility.

  11. 76 FR 33613 - Designation of Officers of the Overseas Private Investment Corporation To Act as President of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-09

    ...; (f) Vice President, External Affairs; (g) Vice President, Investment Funds; (h) Vice President... of June 6, 2011 Designation of Officers of the Overseas Private Investment Corporation To Act as President of the Overseas Private Investment Corporation Memorandum for the President of the Overseas...

  12. Information Computer Communications Policy, 2: The Usage of International Data Networks in Europe.

    ERIC Educational Resources Information Center

    Organisation for Economic Cooperation and Development, Paris (France).

    This study of the development of international data networks, a phenomena of the 1970's, and policy issues arising from their use is an in depth investigation of 24 private and six public European networks commissioned from Logica Limited and sponsored by the governments of France, Germany, the Netherlands, Norway, Spain, and Sweden. The report…

  13. Reaching Rural Schools Using an Interactive Satellite Based Educational Network: Evaluating TI-IN Network's First Year.

    ERIC Educational Resources Information Center

    Pease, Pamela S.; Tinsley, Patsy J.

    The paper details development, implementation, and user research/evaluation of TI-IN Network, Inc., the first private, interactive satellite based educational system in the United States developed for public schools and offering a total systems approach by providing both user technology and a wide range of course offerings. An overview of specific…

  14. A metro-access integrated network with all-optical virtual private network function using DPSK/ASK modulation format

    NASA Astrophysics Data System (ADS)

    Tian, Yue; Leng, Lufeng; Su, Yikai

    2008-11-01

    All-optical virtual private network (VPN), which offers dedicated optical channels to connect users within a VPN group, is considered a promising approach to efficient internetworking with low latency and enhanced security implemented in the physical layer. On the other hand, time-division multiplexed (TDM) / wavelength-division multiplexed (WDM) network architecture based on a feeder-ring with access-tree topology, is considered a pragmatic migration scenario from current TDM-PONs to future WDM-PONs and a potential convergence scheme for access and metropolitan networks, due to its efficiently shared hardware and bandwidth resources. All-optical VPN internetworking in such a metro-access integrated structure is expected to cover a wider service area and therefore is highly desirable. In this paper, we present a TDM/WDM metro-access integrated network supporting all-optical VPN internetworking among ONUs in different sub- PONs based on orthogonal differential-phase-shift keying (DPSK) / amplitude-shift keying (ASK) modulation format. In each ONU, no laser but a single Mach-Zehnder modulator (MZM) is needed for the upstream and VPN signal generation, which is cost-effective. Experiments and simulations are performed to verify its feasibility as a potential solution to the future access service.

  15. The study and implementation of the wireless network data security model

    NASA Astrophysics Data System (ADS)

    Lin, Haifeng

    2013-03-01

    In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.

  16. Multimedia telehomecare system using standard TV set.

    PubMed

    Guillén, S; Arredondo, M T; Traver, V; García, J M; Fernández, C

    2002-12-01

    Nowadays, there are a very large number of patients that need specific health support at home. The deployment of broadband communication networks is making feasible the provision of home care services with a proper quality of service. This paper presents a telehomecare multimedia platform that runs over integrated services digital network and internet protocol using videoconferencing standards H.320 and H.323, and standard TV set for patient interaction. This platform allows online remote monitoring: ECG, heart sound, blood pressure. Usability, affordability, and interoperability were considered for the design and development of its hardware and software components. A first evaluation of technical and usability aspects were carried forward with 52 patients of a private clinic and 10 students in the University. Results show a high rate (mean = 4.33, standard deviation--SD = 1.63 in a five-points Likert scale) in the global perception of users on the quality of images, voice, and feeling of virtual presence.

  17. Complex Failure Forewarning System - DHS Conference Proceedings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Hively, Lee M; Prowell, Stacy J

    2011-01-01

    As the critical infrastructures of the United States have become more and more dependent on public and private networks, the potential for widespread national impact resulting from disruption or failure of these networks has also increased. Securing the nation s critical infrastructures requires protecting not only their physical systems but, just as important, the cyber portions of the systems on which they rely. A failure is inclusive of random events, design flaws, and instabilities caused by cyber (and/or physical) attack. One such domain, aging bridges, is used to explain the Complex Structure Failure Forewarning System. We discuss the workings ofmore » such a system in the context of the necessary sensors, command and control and data collection as well as the cyber security efforts that would support this system. Their application and the implications of this computing architecture are also discussed, with respect to our nation s aging infrastructure.« less

  18. Forewarning of Failure in Complex Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Hively, Lee M; Prowell, Stacy J

    2011-01-01

    As the critical infrastructures of the United States have become more and more dependent on public and private networks, the potential for widespread national impact resulting from disruption or failure of these networks has also increased. Securing the nation s critical infrastructures requires protecting not only their physical systems but, just as important, the cyber portions of the systems on which they rely. A failure is inclusive of random events, design flaws, and instabilities caused by cyber (and/or physical) attack. One such domain is failure in critical equipment. A second is aging bridges. We discuss the workings of such amore » system in the context of the necessary sensors, command and control and data collection as well as the cyber security efforts that would support this system. Their application and the implications of this computing architecture are also discussed, with respect to our nation s aging infrastructure.« less

  19. Cybersecurity in radiology: Access of public hot spots and public Wi-Fi and prevention of cybercrimes and HIPAA violations.

    PubMed

    Gerard, Perry; Kapadia, Neil; Acharya, Jay; Chang, Patricia T; Lefkovitz, Zvi

    2013-12-01

    The purpose of this article is to review the steps that can be taken to ensure secure transfer of information over public and home networks, given the increasing utilization of mobile devices in radiology. With the rapid technologic developments in radiology, knowledge of various technical aspects is crucial for any practicing radiologist. Utilization of mobile devices, such as laptops, tablets, and even cellular phones, for reading radiologic studies has become increasingly prevalent. With such usage comes a need to ensure that both the user's and the patient's private information is protected. There are several steps that can be taken to protect sensitive information while using public networks. These steps include being diligent in reviewing the networks to which one connects, ensuring encrypted connections to web-sites, using strong passwords, and using a virtual private network and a firewall. As the role of information technology in modern radiology practice becomes more critical, these safety mechanisms must be addressed when viewing studies on any mobile device.

  20. (Net)Working out: social capital in a private health club.

    PubMed

    Crossley, Nick

    2008-09-01

    In Bowling Alone Robert Putnam considers the possibility that the growth of private health clubs and the rising rates of membership to such clubs might represent a counter-trend to his thesis on the decline in social capital. In this paper I explore this idea using ethnographic data and social network analysis. I show both that and how networks form in health clubs and I discuss the ways in which these networks constitute social capital for their members. In addition, however, I explore the 'dark side' of this form of social capital. I argue that high integration amongst some members of a fitness class can generate a power differential between those members and other, less integrated members who experience this negatively. Furthermore, with an eye on Burt's (2005) important thesis on brokerage and closure, I argue that brokerage between relatively closed clusters of agents can lead to inter-group rivalry and conflict, which, in turn, is experienced negatively by those involved.

  1. Performance Evaluation of a Field Programmable Gate Array-Based System for Detecting and Tracking Peer-to-Peer Protocols on a Gigabit Ethernet Network

    DTIC Science & Technology

    2010-06-01

    Ron’s Code 4 . . . . . . . . . . . . . . . . . . . 18 2.3.3 Virtual Private Network and Secure Shell Tunnels 19 2.3.4 Darknets ...created using Iodine. 2.2 Analyzing and Classifying Network Traffic Before the advent of Darknets and anonymizers like Tor (see Section 2.3), ana... darknets , and the Tor network. 2.3.1 Byte Padding. Byte padding is the most primitive obfuscation method used to hide payloads in network traffic. When byte

  2. Physical-Layer Network Coding for VPN in TDM-PON

    NASA Astrophysics Data System (ADS)

    Wang, Qike; Tse, Kam-Hon; Chen, Lian-Kuan; Liew, Soung-Chang

    2012-12-01

    We experimentally demonstrate a novel optical physical-layer network coding (PNC) scheme over time-division multiplexing (TDM) passive optical network (PON). Full-duplex error-free communications between optical network units (ONUs) at 2.5 Gb/s are shown for all-optical virtual private network (VPN) applications. Compared to the conventional half-duplex communications set-up, our scheme can increase the capacity by 100% with power penalty smaller than 3 dB. Synchronization of two ONUs is not required for the proposed VPN scheme

  3. The conduct of practice-based research in community clinics compared to private practices: similarities, differences, and challenges

    PubMed Central

    Gillette, Jane; Cunha-Cruz, Joana; Gilbert, Ann; Speed-McIntyre, Pollene; Zhou, Lingmei; DeRouen, Timothy

    2013-01-01

    Practice-based research should be performed in all practice settings if the results are to be applied to all settings. However, some practice settings, such as community clinics, have unique features that may make the conduct of such research more challenging. The purpose of this article is to describe and compare the similarities and unique challenges related to conducting research in community clinics compared to private practices within the Northwest Practice-Based REsearch Collaborative in Evidence-Based DENTistry (PRECEDENT) network. Information was obtained from meetings with general dentists, a survey of general dentists (N = 253), and a clinical examination and record review of a systemic random sample of patients visiting community clinics and private practices. (N = 1903)—all part of a dental practice-based research network. The processes of conducting research, the dentist and patient sociodemographic characteristics, the prevalence of oral diseases, and the dental treatments received in community clinics and private practices were compared. Both community clinics and private practices have the clinical treatment of the patients as their priority and have time constraints on research. The processes of research training, obtaining informed consent, and collecting, transmitting, and securely maintaining research data are also similar. The patient populations and treatment needs differ substantially between community clinics and private practices, with a higher prevalence of dental caries and higher restorative treatment needs in the community clinic patients. The process of study participant selection and follow-up for research and the dentist and staff work arrangements also vary between the two practice settings. Although community clinic patients and their dental healthcare providers have different research needs and challenges than their counterparts in private practice, practice-based research can be successfully PMID:25429251

  4. The Relationship between Health Plan Performance Measures and Physician Network Overlap: Implications for Measuring Plan Quality

    PubMed Central

    Maeng, Daniel D; Scanlon, Dennis P; Chernew, Michael E; Gronniger, Tim; Wodchis, Walter P; McLaughlin, Catherine G

    2010-01-01

    Objective To examine the extent to which health plan quality measures capture physician practice patterns rather than plan characteristics. Data Source We gathered and merged secondary data from the following four sources: a private firm that collected information on individual physicians and their health plan affiliations, The National Committee for Quality Assurance, InterStudy, and the Dartmouth Atlas. Study Design We constructed two measures of physician network overlap for all health plans in our sample and linked them to selected measures of plan performance. Two linear regression models were estimated to assess the relationship between the measures of physician network overlap and the plan performance measures. Principal Findings The results indicate that in the presence of a higher degree of provider network overlap, plan performance measures tend to converge to a lower level of quality. Conclusions Standard health plan performance measures reflect physician practice patterns rather than plans' effort to improve quality. This implies that more provider-oriented measurement, such as would be possible with accountable care organizations or medical homes, may facilitate patient decision making and provide further incentives to improve performance. PMID:20403064

  5. A proposed ground-water quality monitoring network for Idaho

    USGS Publications Warehouse

    Whitehead, R.L.; Parliman, D.J.

    1979-01-01

    A ground water quality monitoring network is proposed for Idaho. The network comprises 565 sites, 8 of which will require construction of new wells. Frequencies of sampling at the different sites are assigned at quarterly, semiannual, annual, and 5 years. Selected characteristics of the water will be monitored by both laboratory- and field-analysis methods. The network is designed to: (1) Enable water managers to keep abreast of the general quality of the State 's ground water, and (2) serve as a warning system for undesirable changes in ground-water quality. Data were compiled for hydrogeologic conditions, ground-water quality, cultural elements, and pollution sources. A ' hydrologic unit priority index ' is used to rank 84 hydrologic units (river basins or segments of river basins) of the State for monitoring according to pollution potential. Emphasis for selection of monitoring sites is placed on the 15 highest ranked units. The potential for pollution is greatest in areas of privately owned agricultural land. Other areas of pollution potential are residential development, mining and related processes, and hazardous waste disposal. Data are given for laboratory and field analyses, number of site visits, manpower, subsistence, and mileage, from which costs for implementing the network can be estimated. Suggestions are made for data storage and retrieval and for reporting changes in water quality. (Kosco-USGS)

  6. Cyber Security Considerations for Autonomous Tactical Wheeled Vehicles

    DTIC Science & Technology

    2016-04-01

    extraordinarily significant (Office of the Press Secretary, 2015). The White House added that cybersecurity is a shared responsibility between the...cannot, nor would Americans want it to, provide cybersecurity for every private network. Therefore, the private sector plays a crucial role in our... Cybersecurity Initiative,” that established the procedures the Acquisition community should use to manage future of Acquisition programs. Cyber Security

  7. Landsat Technology Transfer to the Private and Public Sectors through Community Colleges and Other Locally Available Institutions, Phase II Program. Final Report.

    ERIC Educational Resources Information Center

    Rogers, Robert H.

    In 1979, the National Aeronautics and Space Administration (NASA) and the Environmental Research Institute of Michigan (ERIM) initiated a program to investigate methods of making Landsat (satellite imagery) technology available to private sector firms through a network comprising NASA, a university or research institute, local community colleges,…

  8. 76 FR 28964 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ...' Social Security Number (SSN).'' * * * * * Retrievability: Delete entry and replace with ``Name, date of... site--The eMarine system is a protected network that will employ data encryption, data masking, secure virtual private network (VPN) and DoD approved methods for safeguarding and ensuring compliance. The...

  9. FloVis: Leveraging Visualization to Protect Sensitive Network Infrastructure

    DTIC Science & Technology

    2010-11-01

    words, we are clustering the hourly web surfing patterns of users on a small private network. The data in this case is filtered NetFlow records...Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior. In Goodall et al. (eds.), Mathematics and Visualization (Proceedings

  10. The Debate of Evolution versus Intelligent Design: Is Critical Thinking Occurring among K-12 Students?

    ERIC Educational Resources Information Center

    Hoodman, Kyle Nathan

    2010-01-01

    This study investigates how evolution versus intelligent design is handled in the public, private Christian, private Jewish, and Christian Home-school K-12 settings through a review of the current literature and by interviewing teachers in these educational venues. Fourteen public, private, and homeschool educators responded to an interview…

  11. Correlating Inferred Data Plane IPV6 Reboot Events With Control Plane BGP Activity

    DTIC Science & Technology

    2016-03-01

    22 Figure 3.6 Example Border Gateway Protocol (BGP) update message . . . . 23 Figure 3.7 Customer-provider relationship with border...government USN U.S. Navy VPN Virtual Private Network xiv Acknowledgments First, I would like to thank my family for their love , support, and...network outages when they restart . Network outages occur for many reasons: hardware failure, severe weather, misconfiguration, patching, upgrades

  12. Internet Telephony

    DTIC Science & Technology

    1999-12-01

    compression technology . The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the...mid- 󈨞s, data and voice began to merge, propelled by advances in compression technology . The ubiquity of routed Internet Protocol (IP) networks...transmit voice over IP networks that are privately owned or publicly utilized. If we have the technology to transmit Voice over the Internet then why not

  13. Communication about childhood obesity on Twitter.

    PubMed

    Harris, Jenine K; Moreland-Russell, Sarah; Tabak, Rachel G; Ruhr, Lindsay R; Maier, Ryan C

    2014-07-01

    Little is known about the use of social media as a tool for health communication. We used a mixed-methods design to examine communication about childhood obesity on Twitter. NodeXL was used to collect tweets sent in June 2013 containing the hashtag #childhoodobesity. Tweets were coded for content; tweeters were classified by sector and health focus. Data were also collected on the network of follower connections among the tweeters. We used descriptive statistics and exponential random graph modeling to examine tweet content, characteristics of tweeters, and the composition and structure of the network of connections facilitating communication among tweeters. We collected 1110 tweets originating from 576 unique Twitter users. More individuals (65.6%) than organizations (32.9%) tweeted. More tweets focused on individual behavior than environment or policy. Few government and educational tweeters were in the network, but they were more likely than private individuals to be followed by others. There is an opportunity to better disseminate evidence-based information to a broad audience through Twitter by increasing the presence of credible sources in the #childhoodobesity conversation and focusing the content of tweets on scientific evidence.

  14. Enabling Research Network Connectivity to Clouds with Virtual Router Technology

    NASA Astrophysics Data System (ADS)

    Seuster, R.; Casteels, K.; Leavett-Brown, CR; Paterson, M.; Sobie, RJ

    2017-10-01

    The use of opportunistic cloud resources by HEP experiments has significantly increased over the past few years. Clouds that are owned or managed by the HEP community are connected to the LHCONE network or the research network with global access to HEP computing resources. Private clouds, such as those supported by non-HEP research funds are generally connected to the international research network; however, commercial clouds are either not connected to the research network or only connect to research sites within their national boundaries. Since research network connectivity is a requirement for HEP applications, we need to find a solution that provides a high-speed connection. We are studying a solution with a virtual router that will address the use case when a commercial cloud has research network connectivity in a limited region. In this situation, we host a virtual router in our HEP site and require that all traffic from the commercial site transit through the virtual router. Although this may increase the network path and also the load on the HEP site, it is a workable solution that would enable the use of the remote cloud for low I/O applications. We are exploring some simple open-source solutions. In this paper, we present the results of our studies and how it will benefit our use of private and public clouds for HEP computing.

  15. The design of a new laser acupuncture instrument based on internet

    NASA Astrophysics Data System (ADS)

    Li, Chengwei; Liu, Jiguang; Huang, Zhen; Jin, Zhigao

    2006-06-01

    Laser acupuncture defined as the stimulation of traditional acupuncture points with low-intensity, non-thermal laser irradiation and the therapeutic use of laser acupuncture is rapidly gaining in popularity. As recovery instrument, physiotherapy instrument has a long curing period but perfect curative effect; furthermore, the treatment scheme needs to he revised on the basis of exchanges between patients and medical staff. In this paper a new laser acupuncture instrument based on Internet is designed. This multi-functional visual physiotherapy system based on embedded TCP/IP protocol, is further developed, which can realize visual real-time communication between patients and doctors with the help of Internet. Patients can enjoy professional medical care at home. Therefore, the equipment is suitable to those where specialists are needed; such as villages, towns, communities, small private clinics, and those families applicable. For such equipment, the key is to design an embedded networked module. The solution of this paper is to design the Ethernet interface based on DSP.

  16. West Hills College Cooperative Training Network. Final Performance and Financial Status Report.

    ERIC Educational Resources Information Center

    West Hills Community Coll., Coalinga, CA.

    A cooperative training network was developed by West Hills Community College (Coalinga, California), in conjunction with government agencies/private businesses, to train students in truck driving skills. Emphasis was placed on training women, members of minority groups, and disadvantaged persons. During the project, an advisory council was…

  17. From County Roads to Superhighway: Keeping Pace with the New Business and Legal Turns on the Information Superhighway.

    ERIC Educational Resources Information Center

    Gordon, Mark L.; McKenzie, Diana J. P.

    1994-01-01

    Discusses the development of a national information superhighway. Highlights include the National Information Infrastructure; NREN (National Research and Education Network); private networks, including Prodigy; repositioning in the telecommunications industry, including telephone, cable, and entertainment companies; government regulations;…

  18. Protecting Personal Information on Social Networking Sites

    ERIC Educational Resources Information Center

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  19. Power and Networks in Worldwide Knowledge Coordination: The Case of Global Science

    ERIC Educational Resources Information Center

    King, Roger

    2011-01-01

    The article considers the global governance of knowledge systems, exploring concepts of power, networks, standards (defined as normative practices), and structuration. The focus is on science as a form of predominantly private global governance, particularly the self-regulatory and collaborative processes stretching across time and space. These…

  20. Protesting on Twitter: Citizenship and Empowerment from Public Education

    ERIC Educational Resources Information Center

    Saura, Geo; Muñoz-Moreno, José-Luis; Luengo-Navas, Julián; Martos, José-Manuel

    2017-01-01

    The use of social networks for protest purposes has been an essential element in recent global protests against the economic measures of privatization of public services. Social networks are changing political communication, mobilization and organization of collective protests. Taking into account the relationship between collective protests and…

  1. 77 FR 22286 - NCAnet: Building a Network of Networks in Support of the National Climate Assessment (NCA)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-13

    ... effects of global change on the natural environment, agriculture, energy production and use, land and..., NCADAC recognizes and seeks to leverage the important and growing distributed science capabilities and... communities, professional societies, and private industry represent currently untapped assets and diverse...

  2. West Hills College Cooperative Training Network. Truck Driving Program. Dissemination Workbook.

    ERIC Educational Resources Information Center

    West Hills Community Coll., Coalinga, CA.

    A cooperative training network was developed by West Hills Community College (Coalinga, California) in conjunction with government agencies/private businesses to train students in truck driving skills. Emphasis was placed on training women, members of minority groups, and disadvantaged persons. During the project, an advisory council was…

  3. Strategies for engaging the private sector in sexual and reproductive health: how effective are they?

    PubMed

    Peters, David H; Mirchandani, Gita G; Hansen, Peter M

    2004-10-01

    The private health sector provides a significant portion of sexual and reproductive health (SRH) services in developing countries. Yet little is known about which strategies for intervening with private providers can improve quality or coverage of services. We conducted a systematic review of the literature through PubMed from 1980 to 2003 to assess the effectiveness of private sector strategies for SRH services in developing countries. The strategies examined were regulating, contracting, financing, franchising, social marketing, training and collaborating. Over 700 studies were examined, though most were descriptive papers, with only 71 meeting our inclusion criteria of having a private sector strategy for one or more SRH services and the measurement of an outcome in the provider or the beneficiary. Nearly all studies (96%) had at least one positive association between SRH and the private sector strategy. About three-quarters of the studies involved training private providers, though combinations of strategies tended to give better results. Maternity services were most commonly addressed (55% of studies), followed by prevention and treatment of sexually transmitted diseases (32%). Using study design to rate the strength of evidence, we found that the evidence about effectiveness of private sector strategies on SRH services is weak. Most studies did not use comparison groups, or they relied on cross-sectional designs. Nearly all studies examined short-term effects, largely measuring changes in providers rather than changes in health status or other effects on beneficiaries. Five studies with more robust designs (randomized controlled trials) demonstrated that contraceptive use could be increased through supporting private providers, and showed cases where the knowledge and practices of private providers could be improved through training, regulation and incentives. Although tools to work with the private sector offer considerable promise, without stronger research designs, key questions regarding their feasibility and impact remain unanswered. Copyright 2004 Oxford University Press

  4. U.S. Geological Survey Business Partner Program

    USGS Publications Warehouse

    ,

    1999-01-01

    The Business Partner Program is composed of a network of private sector organizations that distribute U.S. Geological Survey (USGS) products. By engaging the private sector, State and local government, and academic and nonprofit organizations in product dissemination, the USGS expects to increase the availability of its products to end users, locate customer service closer to the user, and provide cost savings to the Federal Government.

  5. Onion Routing for Anonymous and Private Internet Connections

    DTIC Science & Technology

    1999-01-28

    Onion Routing for Anonymous and Private Internet Connections David Goldschlag Michael Reedy Paul Syversony January 28, 1999 1 Introduction...Onion Routing operates by dynamically building anonymous connections within a network of real-time Chaum Mixes [3]. A Mix is a store and forward device...Commerce Workshop , August 1998. [3] D. Chaum . \\Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communications of the ACM , v. 24

  6. Evaluation of New Jersey After 3: Reaching and Engaging New Jersey's Youth through Afterschool Programs, 2005-2008

    ERIC Educational Resources Information Center

    Walking Eagle, Karen P.; Miller, Tiffany D.; Cooc, North; LaFleur, Jennifer; Reisner, Elizabeth R.

    2009-01-01

    New Jersey After 3 (NJ After 3) is a private, nonprofit organization whose mission is to expand and improve afterschool opportunities for New Jersey's youth. Using both public and private resources, it supports a network of youth-service providers that deliver afterschool services based on NJ After 3's program model. Under an agreement with NJ…

  7. Determinants of Motivation in Teachers: A Study of Private Secondary Schools Chain Networks in Bahawalpur

    ERIC Educational Resources Information Center

    Nawaz, Nosheen; Yasin, Hina

    2015-01-01

    Retaining quality employees is the dream of every organization. This research focuses on a big issue arising in the education sector. A large number of teachers are incoming and leaving the private schools of Bahawalpur. Lack of motivation is a major cause of teachers' turnover. Aspire of this research is to find the factors which can motivate…

  8. The Jade File System. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Rao, Herman Chung-Hwa

    1991-01-01

    File systems have long been the most important and most widely used form of shared permanent storage. File systems in traditional time-sharing systems, such as Unix, support a coherent sharing model for multiple users. Distributed file systems implement this sharing model in local area networks. However, most distributed file systems fail to scale from local area networks to an internet. Four characteristics of scalability were recognized: size, wide area, autonomy, and heterogeneity. Owing to size and wide area, techniques such as broadcasting, central control, and central resources, which are widely adopted by local area network file systems, are not adequate for an internet file system. An internet file system must also support the notion of autonomy because an internet is made up by a collection of independent organizations. Finally, heterogeneity is the nature of an internet file system, not only because of its size, but also because of the autonomy of the organizations in an internet. The Jade File System, which provides a uniform way to name and access files in the internet environment, is presented. Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Because of autonomy, Jade is designed under the restriction that the underlying file systems may not be modified. In order to avoid the complexity of maintaining an internet-wide, global name space, Jade permits each user to define a private name space. In Jade's design, we pay careful attention to avoiding unnecessary network messages between clients and file servers in order to achieve acceptable performance. Jade's name space supports two novel features: (1) it allows multiple file systems to be mounted under one direction; and (2) it permits one logical name space to mount other logical name spaces. A prototype of Jade was implemented to examine and validate its design. The prototype consists of interfaces to the Unix File System, the Sun Network File System, and the File Transfer Protocol.

  9. Just between us: Exclusive communications in online social networks.

    PubMed

    Carpenter, Jordan; Green, Melanie; Laflam, Jeff

    2018-01-01

    Social media websites such as Facebook are used for relationship development and maintenance often through self-disclosure and sharing of personal information. However, not all forms of social media communication may be equally suitable for this task. This paper explores users' norms about the appropriateness of using private vs. public Facebook messages to communicate different kinds of personal information, and the effectiveness of these types of communication in building relationships. Study 1, a survey, revealed that users endorse conflicting expectations about preferences for receiving information publicly or privately. Study 2, a field experiment testing the effects of private versus public Facebook communications on actual relationship development using participants' own Facebook pages, suggested that private messages lead to greater closeness.

  10. Quantum solution to a class of two-party private summation problems

    NASA Astrophysics Data System (ADS)

    Shi, Run-Hua; Zhang, Shun

    2017-09-01

    In this paper, we define a class of special two-party private summation (S2PPS) problems and present a common quantum solution to S2PPS problems. Compared to related classical solutions, our solution has advantages of higher security and lower communication complexity, and especially it can ensure the fairness of two parties without the help of a third party. Furthermore, we investigate the practical applications of our proposed S2PPS protocol in many privacy-preserving settings with big data sets, including private similarity decision, anonymous authentication, social networks, secure trade negotiation, secure data mining.

  11. Evaluating the Social Media Performance of Hospitals in Spain: A Longitudinal and Comparative Study.

    PubMed

    Martinez-Millana, Antonio; Fernandez-Llatas, Carlos; Basagoiti Bilbao, Ignacio; Traver Salcedo, Manuel; Traver Salcedo, Vicente

    2017-05-23

    Social media is changing the way in which citizens and health professionals communicate. Previous studies have assessed the use of Health 2.0 by hospitals, showing clear evidence of growth in recent years. In order to understand if this happens in Spain, it is necessary to assess the performance of health care institutions on the Internet social media using quantitative indicators. The study aimed to analyze how hospitals in Spain perform on the Internet and social media networks by determining quantitative indicators in 3 different dimensions: presence, use, and impact and assess these indicators on the 3 most commonly used social media - Facebook, Twitter, YouTube. Further, we aimed to find out if there was a difference between private and public hospitals in their use of the aforementioned social networks. The evolution of presence, use, and impact metrics is studied over the period 2011- 2015. The population studied accounts for all the hospitals listed in the National Hospitals Catalog (NHC). The percentage of hospitals having Facebook, Twitter, and YouTube profiles has been used to show the presence and evolution of hospitals on social media during this time. Usage was assessed by analyzing the content published on each social network. Impact evaluation was measured by analyzing the trend of subscribers for each social network. Statistical analysis was performed using a lognormal transformation and also using a nonparametric distribution, with the aim of comparing t student and Wilcoxon independence tests for the observed variables. From the 787 hospitals identified, 69.9% (550/787) had an institutional webpage and 34.2% (269/787) had at least one profile in one of the social networks (Facebook, Twitter, and YouTube) in December 2015. Hospitals' Internet presence has increased by more than 450.0% (787/172) and social media presence has increased ten times since 2011. Twitter is the preferred social network for public hospitals, whereas private hospitals showed better performance on Facebook and YouTube. The two-sided Wilcoxon test and t student test at a CI of 95% show that the use of Twitter distribution is higher (P<.001) for private and public hospitals in Spain, whereas other variables show a nonsignificant different distribution. The Internet presence of Spanish hospitals is high; however, their presence on the 3 main social networks is still not as high compared to that of hospitals in the United States and Western Europe. Public hospitals are found to be more active on Twitter, whereas private hospitals show better performance on Facebook and YouTube. This study suggests that hospitals, both public and private, should devote more effort to and be more aware of social media, with a clear strategy as to how they can foment new relationships with patients and citizens. ©Antonio Martinez-Millana, Carlos Fernandez-Llatas, Ignacio Basagoiti Bilbao, Manuel Traver Salcedo, Vicente Traver Salcedo. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 23.05.2017.

  12. Evaluating the Social Media Performance of Hospitals in Spain: A Longitudinal and Comparative Study

    PubMed Central

    2017-01-01

    Background Social media is changing the way in which citizens and health professionals communicate. Previous studies have assessed the use of Health 2.0 by hospitals, showing clear evidence of growth in recent years. In order to understand if this happens in Spain, it is necessary to assess the performance of health care institutions on the Internet social media using quantitative indicators. Objectives The study aimed to analyze how hospitals in Spain perform on the Internet and social media networks by determining quantitative indicators in 3 different dimensions: presence, use, and impact and assess these indicators on the 3 most commonly used social media - Facebook, Twitter, YouTube. Further, we aimed to find out if there was a difference between private and public hospitals in their use of the aforementioned social networks. Methods The evolution of presence, use, and impact metrics is studied over the period 2011- 2015. The population studied accounts for all the hospitals listed in the National Hospitals Catalog (NHC). The percentage of hospitals having Facebook, Twitter, and YouTube profiles has been used to show the presence and evolution of hospitals on social media during this time. Usage was assessed by analyzing the content published on each social network. Impact evaluation was measured by analyzing the trend of subscribers for each social network. Statistical analysis was performed using a lognormal transformation and also using a nonparametric distribution, with the aim of comparing t student and Wilcoxon independence tests for the observed variables. Results From the 787 hospitals identified, 69.9% (550/787) had an institutional webpage and 34.2% (269/787) had at least one profile in one of the social networks (Facebook, Twitter, and YouTube) in December 2015. Hospitals’ Internet presence has increased by more than 450.0% (787/172) and social media presence has increased ten times since 2011. Twitter is the preferred social network for public hospitals, whereas private hospitals showed better performance on Facebook and YouTube. The two-sided Wilcoxon test and t student test at a CI of 95% show that the use of Twitter distribution is higher (P<.001) for private and public hospitals in Spain, whereas other variables show a nonsignificant different distribution. Conclusions The Internet presence of Spanish hospitals is high; however, their presence on the 3 main social networks is still not as high compared to that of hospitals in the United States and Western Europe. Public hospitals are found to be more active on Twitter, whereas private hospitals show better performance on Facebook and YouTube. This study suggests that hospitals, both public and private, should devote more effort to and be more aware of social media, with a clear strategy as to how they can foment new relationships with patients and citizens. PMID:28536091

  13. Location Privacy Protection on Social Networks

    NASA Astrophysics Data System (ADS)

    Zhan, Justin; Fang, Xing

    Location information is considered as private in many scenarios. Protecting location information on mobile ad-hoc networks has attracted much research in past years. However, location information protection on social networks has not been paid much attention. In this paper, we present a novel location privacy protection approach on the basis of user messages in social networks. Our approach grants flexibility to users by offering them multiple protecting options. To the best of our knowledge, this is the first attempt to protect social network users' location information via text messages. We propose five algorithms for location privacy protection on social networks.

  14. A Study on Market-based Strategic Procurement Planning in Convergent Supply Networks

    NASA Astrophysics Data System (ADS)

    Opadiji, Jayeola Femi; Kaihara, Toshiya

    We present a market-based decentralized approach which uses a market-oriented programming algorithm to obtain Pareto-optimal allocation of resources traded among agents which represent enterprise units in a supply network. The proposed method divides the network into a series of Walrsian markets in order to obtain procurement budgets for enterprises in the network. An interaction protocol based on market value propagation is constructed to coordinate the flow of resources across the network layers. The method mitigates the effect of product complementarity in convergent network by allowing for enterprises to hold private valuations of resources in the markets.

  15. Implementation of Motivational Interviewing in Substance Use Disorder Treatment: Research Network Participation and Organizational Compatibility.

    PubMed

    Rieckmann, Traci R; Abraham, Amanda J; Bride, Brian E

    Despite considerable empirical evidence that psychosocial interventions improve addiction treatment outcomes across populations, implementation remains problematic. A small body of research points to the importance of research network participation as a facilitator of implementation; however, studies examined limited numbers of evidence-based practices. To address this gap, the present study examined factors impacting implementation of motivational interviewing (MI). This study used data from a national sample of privately funded treatment programs (n = 345) and programs participating in the National Drug Abuse Treatment Clinical Trials Network (CTN) (n = 156). Data were collected via face-to-face interviews with program administrators and clinical directors (2007-2009). Analysis included bivariate t tests and chi-square tests to compare private and CTN programs, and multivariable logistic regression of MI implementation. A majority (68.0%) of treatment programs reported use of MI. Treatment programs participating in the CTN (88.9%) were significantly more likely to report use of MI compared with non-CTN programs (58.5%; P < 0.01). CTN programs (82.1%) also were more likely to use trainers from the Motivational Interviewing Network of Trainers as compared with private programs (56.1%; P < 0.05). Multivariable logistic regression models reveal that CTN-affiliated programs and programs with a psychiatrist on staff were more likely to use MI. Programs that used the Stages of Change Readiness and Treatment Eagerness Scale assessment tool were more likely to use MI, whereas programs placing greater emphasis on confrontational group therapy were less likely to use MI. Findings suggest the critical role of research network participation, access to psychiatrists, and organizational compatibility in adoption and sustained use of MI.

  16. ISDN Application in the Army Environment

    DTIC Science & Technology

    1992-02-01

    Signalling System Number 7 ( SS7 ). SS7 is a packet switched signalling network operating in parallel with the traffic bearing network. The current, in...for example, require SS7 . Further into the future, broadband ISDN (B-ISDN) is expected to provide high-quality, full-motion video, High Definition...smaller business offices, ISDN could be a viable alternative to private networks, especially when switches are connected through SS7 . ISDN, in combination

  17. Real-Time Speaker Detection for User-Device Binding

    DTIC Science & Technology

    2010-12-01

    31 xi THIS PAGE INTENTIONALLY LEFT BLANK xii CHAPTER 1: Introduction The roll-out of commercial wireless networks continues to rise worldwide...in a secured facility. It could also be connected to the call server via a Virtual Private Network (VPN) or public lines if security is not a top...communications network [25]. Yet, James Arden Barnett, Jr., Chief of the Public Safety and Homeland Security Bureau, argues that emergency communications

  18. Innovation Networks to Stimulate Public and Private Sector Collaboration for Advisory Services Innovation and Coordination: The Case of Pasture Performance Issues in the New Zealand Dairy Industry

    ERIC Educational Resources Information Center

    Rijswijk, K.; Brazendale, R.

    2017-01-01

    Purpose: An innovation network, called the Pasture Improvement Leadership Group (PILG), was formed to improve the quality and consistency of advice provided to dairy farmers in New Zealand, after they expressed dissatisfaction with their pastures. The aim of this paper is to better understand the challenges of forming and maintaining networks to…

  19. Using and joining a franchised private sector provider network in Myanmar.

    PubMed

    O'Connell, Kathryn; Hom, Mo; Aung, Tin; Theuss, Marc; Huntington, Dale

    2011-01-01

    Quality is central to understanding provider motivations to join and remain within a social franchising network. Quality also appears as a key issue from the client's perspective, and may influence why a client chooses to use a franchised provider over another type of provider. The dynamic relationships between providers of social franchising clinics and clients who use these services have not been thoroughly investigated in the context of Myanmar, which has an established social franchising network. This study examines client motivations to use a Sun Quality Health network provider and provider motivations to join and remain in the Sun Quality Health network. Taken together, these two aims provide an opportunity to explore the symbiotic relationship between client satisfaction and provider incentives to increase the utilization of reproductive health care services. Results from a series of focus group discussions with clients of reproductive health services and franchised providers shows that women chose health services provided by franchised private sector general practitioners because of its perceived higher quality, associated with the availability of effective, affordable, drugs. A key finding of the study is associated with providers. Provider focus group discussions indicate that a principle determinate for joining and remaining in the Sun Quality Health Network was serving the poor.

  20. Using and Joining a Franchised Private Sector Provider Network in Myanmar

    PubMed Central

    O'Connell, Kathryn; Hom, Mo; Aung, Tin; Theuss, Marc; Huntington, Dale

    2011-01-01

    Background Quality is central to understanding provider motivations to join and remain within a social franchising network. Quality also appears as a key issue from the client's perspective, and may influence why a client chooses to use a franchised provider over another type of provider. The dynamic relationships between providers of social franchising clinics and clients who use these services have not been thoroughly investigated in the context of Myanmar, which has an established social franchising network. This study examines client motivations to use a Sun Quality Health network provider and provider motivations to join and remain in the Sun Quality Health network. Taken together, these two aims provide an opportunity to explore the symbiotic relationship between client satisfaction and provider incentives to increase the utilization of reproductive health care services. Methods and Findings Results from a series of focus group discussions with clients of reproductive health services and franchised providers shows that women chose health services provided by franchised private sector general practitioners because of its perceived higher quality, associated with the availability of effective, affordable, drugs. A key finding of the study is associated with providers. Provider focus group discussions indicate that a principle determinate for joining and remaining in the Sun Quality Health Network was serving the poor. PMID:22180781

  1. A comparison of private and public sector intensive care unit infrastructure in South Africa.

    PubMed

    Mahomed, S; Sturm, A W; Moodley, P

    2017-11-27

    Intensive care units (ICUs) are designed to care for patients who are often at increased risk of acquiring healthcare-associated infections. The structure of ICUs should be optimally designed to facilitate the care of these critically ill patients, and minimise their risk of infection. National regulations (R158) were developed to govern the building and registration of private hospitals, and until recently equivalent regulations were not available for public hospitals. To assess and compare the compliance of ICUs in the private and public sectors with the R158 regulations. A cross-sectional study design was used to assess the infrastructure of 25 private sector and 6 public sector ICUs in eThekwini Health District, KwaZulu-Natal Province, South Africa. We used the R158 checklist, which was developed by the KwaZulu-Natal Department of Health Private Licensing Unit and Infection Prevention and Control Unit. The aspects covered in the R158 checklist were categorised into the design, general safety and patient services of the ICUs. Most of the ICUs in both sectors met the general safety requirements. There were varying levels of compliance with the design criteria. Only 7 (28.0%) and 1 (16.7%) of the private and public ICUs, respectively, had sufficient space around the beds. Twenty-two private ICUs (88.0%) and 4 public ICUs (66.7%) had isolation rooms, but only some of these isolation rooms (15 private and 2 public) had appropriate mechanical ventilation. None of the ICUs had clinical hand-wash basins in the nurse stations and dirty utility rooms. The majority of the ICUs had the required number of oxygen and electric outlets at the bedside. None of the public ICUs met the light intensity requirement over the bed area. Adequate spacing in ICUs is an issue in many cases. Interventions need to be put in place to ensure that ICUs meet the relevant design standards. There is an urgent need to revise the R158 regulations to reflect current best practices, particularly with regard to infection control. The same standards should be applied to ICUs in the private and public health sectors to maintain quality of care to patients.

  2. [The health system of Argentina].

    PubMed

    Belló, Mariana; Becerril-Montekio, Victor M

    2011-01-01

    This paper describes the health system of Argentina.This system has three sectors: public, social security and private.The public sector includes the national and provincial ministries as well as the network of public hospitals and primary health care units which provide care to the poor and uninsured population. This sector is financed with taxes and payments made by social security beneficiaries that use public health care facilities. The social security sector or Obras Sociales (OS) covers all workers of the formal economy and their families. Most OS operate through contracts with private providers and are financed with payroll contributions of employers and employees. Finally, the private sector includes all those private providers offering services to individuals, OS beneficiaries and all those with private health insurance.This sector also includes private insurance agencies called Prepaid Medicine Enterprises, financed mostly through premiums paid by families and/or employers.This paper also discusses some of the recent innovations implemented in Argentina, including the program Remediar.

  3. Connecting pills and people: an ethnography of the pharmaceutical nexus in Odisha, India.

    PubMed

    Seeberg, Jens

    2012-06-01

    This article explores the impact of intensive competition within the pharmaceutical industry and among private providers on health care in an Indian city. In-depth interviewing and clinical observation were used over a period of 18 months. Private practitioners and chemists who provided regular services to inhabitants of a poor neighborhood in central Bhubaneswar were included. Fierce competition in private health in Odisha, India, reduced quality of care for the poor. The pharmaceutical industry exploited weak links in the health system to push drugs aggressively, including through illegal channels. The private health market is organized in small "network molecules" that maximize profit at the cost of health. The large private share of health care in India and stiff competition are detrimental for primary care in urban India. Free government services are urgently needed and a planned health insurance scheme should be linked to quality control measures.

  4. Reforming private drug coverage in Canada: inefficient drug benefit design and the barriers to change in unionized settings.

    PubMed

    O'Brady, Sean; Gagnon, Marc-André; Cassels, Alan

    2015-02-01

    Prescription drugs are the highest single cost component for employees' benefits packages in Canada. While industry literature considers cost-containment for prescription drug costs to be a priority for insurers and employers, the implementation of cost-containment measures for private drug plans in Canada remains more of a myth than a reality. Through 18 semi-structured phone interviews conducted with experts from private sector companies, unions, insurers and plan advisors, this study explores the reasons behind this incapacity to implement cost-containment measures by examining how private sector employers negotiate drug benefit design in unionized settings. Respondents were asked questions on how employee benefits are negotiated; the relationships between the players who influence drug benefit design; the role of these players' strategies in influencing plan design; the broad system that underpins drug benefit design; and the potential for a universal pharmacare program in Canada. The study shows that there is consensus about the need to educate employees and employers, more collaboration and data-sharing between these two sets of players, and for external intervention from government to help transform established norms in terms of private drug plan design. Copyright © 2014 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  5. Private sector participation in domestic waste management in informal settlements in Lagos, Nigeria.

    PubMed

    Opoko, Akunnaya P; Oluwatayo, Adedapo A

    2016-12-01

    Lagos is one of the fastest growing cities in Africa, which is grappling with the challenges of poorly managed urbanisation. With an estimated population of about 17.5 million, solid waste management is one of the most pressing environmental challenges currently faced in the city. It is estimated that more than 9071847.4kg of urban waste is generated every day in the city. The city lacks the capacity to deal with such magnitude of waste. Consequently, the city has involved the private sector (private sector participation) in its waste management drive. This article examines the effectiveness of this public-private sector collaboration model in waste management in informal settlements in Lagos using empirical data. Major findings of the article include the irregularity of waste collection owing to a poor road network, an inadequate transport infrastructure and the desire to maximise profit, as well as poor waste handling and disposal methods by the private sector participation operators who are not chosen based on competence and capacity to perform. Another major finding is the lack of cooperation from residents evidenced in non-payment of bills and poor packaging of wastes, resulting in wastes being littered. The article concludes on the need to restructure the scheme through proper sensitisation of residents, selection of operators with demonstrable delivery capacity and provision of a well-maintained road network to facilitate access of operators to settlements. © The Author(s) 2016.

  6. Gender Differences in the Structure and Support Characteristics of Black Adolescents' Social Networks.

    ERIC Educational Resources Information Center

    Coates, Deborah L.

    1987-01-01

    Examination of 390 Black American adolescents demonstrates that males and females experience very different structured forms of social support. Females report more frequent contact with network members, who were both male and female, slightly older, and met in private settings. Males report larger groups of intimate friends, who are overwhelmingly…

  7. The Critical Challenge: Policy Networks and Market Models for Education

    ERIC Educational Resources Information Center

    Lubienski, Christopher

    2018-01-01

    This paper reviews a number of approaches to considering how policy transfers through advocacy networks, focusing on education issues in general, and market-based policies in particular. While policymakers and private funders are demanding evidence on the effectiveness of proposed interventions in education, it is not at all clear that they…

  8. Early Detection Research Network (EDRN) | Division of Cancer Prevention

    Cancer.gov

    http://edrn.nci.nih.gov/EDRN is a collaborative network that maintains comprehensive infrastructure and resources critical to the discovery, development and validation of biomarkers for cancer risk and early detection. The program comprises a public/private sector consortium to accelerate the development of biomarkers that will change medical practice, ensure data

  9. Local Area Networks in Education: Overview, Applications, and Current Limitations.

    ERIC Educational Resources Information Center

    Piele, Philip K.

    Local area networks (LAN) are privately owned communication systems that connect multivendor devices at high speed. As microcomputers become more common in schools, user interest in sharing information, software, and peripherals will increase. A basic understanding of the operation of all LAN's can be gained by knowing four elements: media,…

  10. Mapping the Terrain: Teach for America, Charter School Reform, and Corporate Sponsorship

    ERIC Educational Resources Information Center

    Kretchmar, Kerry; Sondel, Beth; Ferrare, Joseph J.

    2014-01-01

    In this paper we illustrate the relationships between Teach For America (TFA) and federal charter school reform to interrogate how policy decisions are shaped by networks of individuals, organizations, and private corporations. We use policy network analysis to create a visual representation of TFA's key role in developing and connecting…

  11. Social network typologies and mortality risk among older people in China, India, and Latin America: A 10/66 Dementia Research Group population-based cohort study.

    PubMed

    Santini, Ziggi Ivan; Koyanagi, Ai; Tyrovolas, Stefanos; Haro, Josep M; Fiori, Katherine L; Uwakwa, Richard; Thiyagarajan, Jotheeswaran A; Webber, Martin; Prince, Martin; Prina, A Matthew

    2015-12-01

    Restricted social networks have been associated with higher mortality in several developed countries but there are no studies on this topic from developing countries. This gap exists despite potentially greater dependence on social networks for support and survival due to various barriers to health care and social protection schemes in this setting. Thus, this study aims to examine how social network type at baseline predicts all-cause mortality among older adults in six Latin American countries, China, and India. Population-based surveys were conducted of all individuals aged 65+ years in eight countries (Cuba, Dominican Republic, Peru, Venezuela, Mexico, Puerto Rico, China, and India). Data on mortality were obtained at follow-up (mean 3.8 years after cohort inception). Follow-up data for 13,891 individuals were analysed. Social network types were assessed using Wenger's Practitioner Assessment of Network Type (PANT). Cox proportional hazard models were constructed to estimate the impact of social network type on mortality risk in each country, adjusting for socio-demographics, receipt of pension, disability, medical conditions, and depression. Meta-analysis was performed to obtain pooled estimates. The prevalence of private network type was 64.4% in urban China and 1.6% in rural China, while the prevalence of locally integrated type was 6.6% in urban China and 86.8% in rural China. The adjusted pooled estimates across (a) all countries and (b) Latin America showed that, compared to the locally integrated social network type, the locally self-contained [(b) HR = 1.24, 95% CI 1.01-1.51], family dependent [(a) HR = 1.13, 95% CI 1.01-1.26; (b) HR = 1.13, 95% CI 1.001-1.28], and private [(a) HR = 1.36, 95% CI 1.06-1.73; (b) HR = 1.45, 95% CI 1.20-1.75] social network types were significantly associated with higher mortality risk. Survival time is significantly reduced in individuals embedded in restricted social networks (i.e. locally self-contained, family dependent, and private network types). Social care interventions may be enhanced by addressing the needs of those most at risk of neglect and deteriorating health. Health policy makers in developing countries may use this information to plan efficient use of limited resources by targeting those embedded in restricted social networks. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  12. Actors and networks in resource conflict resolution under climate change in rural Kenya

    NASA Astrophysics Data System (ADS)

    Ngaruiya, Grace W.; Scheffran, Jürgen

    2016-05-01

    The change from consensual decision-making arrangements into centralized hierarchical chieftaincy schemes through colonization disrupted many rural conflict resolution mechanisms in Africa. In addition, climate change impacts on land use have introduced additional socio-ecological factors that complicate rural conflict dynamics. Despite the current urgent need for conflict-sensitive adaptation, resolution efficiency of these fused rural institutions has hardly been documented. In this context, we analyse the Loitoktok network for implemented resource conflict resolution structures and identify potential actors to guide conflict-sensitive adaptation. This is based on social network data and processes that are collected using the saturation sampling technique to analyse mechanisms of brokerage. We find that there are three different forms of fused conflict resolution arrangements that integrate traditional institutions and private investors in the community. To effectively implement conflict-sensitive adaptation, we recommend the extension officers, the council of elders, local chiefs and private investors as potential conduits of knowledge in rural areas. In conclusion, efficiency of these fused conflict resolution institutions is aided by the presence of holistic resource management policies and diversification in conflict resolution actors and networks.

  13. Seeking lower prices where providers are consolidated: an examination of market and policy strategies.

    PubMed

    Ginsburg, Paul B; Pawlson, L Gregory

    2014-06-01

    The ongoing consolidation between and among hospitals and physicians tends to raise prices for health care services, which poses increasing challenges for private purchasers and payers. This article examines strategies that these purchasers and payers can pursue to combat provider leverage to increase prices. It also examines opportunities for governments to either support or constrain these strategies. In response to higher prices, payers are developing new approaches to benefit and network design, some of which may be effective in moderating prices and, in some cases, volume. These approaches interact with public policy because regulation can either facilitate or constrain them. Federal and state governments also have opportunities to limit consolidation's effect on prices by developing antitrust policies that better address current market environments and by fostering the development of physician organizations that can increase competition and contract with payers under shared-savings approaches. The success of these private- and public-sector initiatives likely will determine whether governments shift from supporting competition to directly regulating payment rates. Project HOPE—The People-to-People Health Foundation, Inc.

  14. 34 CFR 76.652 - Consultation with representatives of private school students.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Consultation with representatives of private school... Enrolled in Private Schools § 76.652 Consultation with representatives of private school students. (a) An... schools during all phases of the development and design of the project covered by the application...

  15. 34 CFR 76.652 - Consultation with representatives of private school students.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 34 Education 1 2011-07-01 2011-07-01 false Consultation with representatives of private school... Enrolled in Private Schools § 76.652 Consultation with representatives of private school students. (a) An... schools during all phases of the development and design of the project covered by the application...

  16. Building the Bridge from War to Peace: Defining Interagency Roles in Rebuilding a Nation

    DTIC Science & Technology

    2009-11-01

    Politics of Strategic Assessment. Princeton: Princeton UP, 2008. (JF 195 .B76 2008) Carafano, James Jay. Private Sector , Public Wars: Contractors in... Private Security Companies in Iraq." Third World Quarterly 26.4-5 (June 2005): 777-96. Erdmann, Martin, Ambassador. "A Comprehensive Approach to Modern... Sectoral Comparisons. Washington: World Bank, Conflict Prevention & Reconstruction, Environmentally and Socially Sustainable Development Network, 2005

  17. Secure and interoperable communication infrastructures for PPDR organisations

    NASA Astrophysics Data System (ADS)

    Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David

    2016-05-01

    The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.

  18. Development and Implementation of a Novel Prehospital Care System in the State of Kerala, India.

    PubMed

    Brown, Heather A; Douglass, Katherine A; Ejas, Shafi; Poovathumparambil, Venugopalan

    2016-12-01

    Most low- and middle-income countries (LMICs) have struggled to find a system for prehospital care that can provide adequate patient care and geographical coverage while maintaining a feasible price tag. The emergency medical systems of the Western world are not necessarily relevant in developing economic systems, given the lack of strict legislation, the scarcity of resources, and the limited number of trained personnel. Meanwhile, most efforts to provide prehospital care in India have taken the form of adapting Western models to the Indian context with limited success. Described here is a novel approach to prehospital care designed for and implemented in the State of Kerala, India. The Active Network Group of Emergency Life Savers (ANGELS) was launched in 2011 in Calicut City, the third largest city in the Indian State of Kerala. The ANGELS integrated an existing fleet of private and state-owned ambulances into a single network utilizing Global Positioning System (GPS) technology and a single statewide call number. A total of 85 volunteer emergency medical certified technicians (EMCTs) were trained in basic first aid and trauma care principles. Public awareness campaigns accompanied all activities to raise awareness amongst community members. Funding was provided via public-private partnership, aimed to minimize costs to patients for service utilization. Over a two-year period from March 2011 to April 2013, 8,336 calls were recorded, of which 54.8% (4,569) were converted into actual ambulance run sheets. The majority of calls were for medical emergencies and most patients were transported to Medical College Hospital in Calicut. This unique public-private partnership has been responsive to the needs of the population while sustaining low operational costs. This system may provide a relevant template for Emergency Medical Services (EMS) development in other resource-limited settings. Brown HA , Douglass KA , Ejas S , Poovathumparambil V . Development and implementation of a novel prehospital care system in the State of Kerala, India. Prehosp Disaster Med. 2016;31(6):663-666.

  19. Application of the dynamically allocated virtual clustering management system to emulated tactical network experimentation

    NASA Astrophysics Data System (ADS)

    Marcus, Kelvin

    2014-06-01

    The U.S Army Research Laboratory (ARL) has built a "Network Science Research Lab" to support research that aims to improve their ability to analyze, predict, design, and govern complex systems that interweave the social/cognitive, information, and communication network genres. Researchers at ARL and the Network Science Collaborative Technology Alliance (NS-CTA), a collaborative research alliance funded by ARL, conducted experimentation to determine if automated network monitoring tools and task-aware agents deployed within an emulated tactical wireless network could potentially increase the retrieval of relevant data from heterogeneous distributed information nodes. ARL and NS-CTA required the capability to perform this experimentation over clusters of heterogeneous nodes with emulated wireless tactical networks where each node could contain different operating systems, application sets, and physical hardware attributes. Researchers utilized the Dynamically Allocated Virtual Clustering Management System (DAVC) to address each of the infrastructure support requirements necessary in conducting their experimentation. The DAVC is an experimentation infrastructure that provides the means to dynamically create, deploy, and manage virtual clusters of heterogeneous nodes within a cloud computing environment based upon resource utilization such as CPU load, available RAM and hard disk space. The DAVC uses 802.1Q Virtual LANs (VLANs) to prevent experimentation crosstalk and to allow for complex private networks. Clusters created by the DAVC system can be utilized for software development, experimentation, and integration with existing hardware and software. The goal of this paper is to explore how ARL and the NS-CTA leveraged the DAVC to create, deploy and manage multiple experimentation clusters to support their experimentation goals.

  20. PNNI Performance Validation Test Report

    NASA Technical Reports Server (NTRS)

    Dimond, Robert P.

    1999-01-01

    Two Private Network-Network Interface (PNNI) neighboring peers were monitored with a protocol analyzer to understand and document how PNNI works with regards to initialization and recovery processes. With the processes documented, pertinent events were found and measured to determine the protocols behavior in several environments, which consisted of congestion and/or delay. Subsequent testing of the protocol in these environments was conducted to determine the protocol's suitability for use in satellite-terrestrial network architectures.

  1. Characteristics of practitioners in a private managed behavioral health plan.

    PubMed

    Reif, Sharon; Torres, Maria E; Horgan, Constance M; Merrick, Elizabeth L

    2012-08-28

    Little is known about the practitioners in managed behavioral healthcare organization (MBHO) networks who are treating mental and substance use disorders among privately insured patients in the United States. It is likely that the role of the private sector in treating behavioral health will increase due to the recent implementation of federal parity legislation and the inclusion of behavioral health as a required service in the insurance exchange plans created under healthcare reform. Further, the healthcare reform legislation has highlighted the need to ensure a qualified workforce in order to improve access to quality healthcare, and provides an additional focus on the behavioral health workforce. To expand understanding of treatment of mental and substance use disorders among privately insured patients, this study examines practitioner types, experience, specialized expertise, and demographics of in-network practitioners providing outpatient care in one large national MBHO. Descriptive analyses used 2004 practitioner credentialing and other administrative data for one MBHO. The sample included 28,897 practitioners who submitted at least one outpatient claim in 2004. Chi-square and t-tests were used to compare findings across types of practitioners. About half of practitioners were female, 12% were bilingual, and mean age was 53, with significant variation by practitioner type. On average, practitioners report 15.3 years of experience (SD = 9.4), also with significant variation by practitioner type. Many practitioners reported specialized expertise, with about 40% reporting expertise for treating children and about 60% for treating adolescents. Overall, these results based on self-report indicate that the practitioner network in this large MBHO is experienced and has specialized training, but echo concerns about the aging of this workforce. These data should provide us with a baseline of practitioner characteristics as we enter an era that anticipates great change in the behavioral health workforce.

  2. Establishing and Scaling-Up Clinical Social Franchise Networks: Lessons Learned From Marie Stopes International and Population Services International

    PubMed Central

    Thurston, Sarah; Chakraborty, Nirali M; Hayes, Brendan; Mackay, Anna; Moon, Pierre

    2015-01-01

    In many low- and middle-income countries, a majority of people seek health care from the private sector. However, fragmentation, poor economies of scale, inadequate financing, political opposition, a bias toward curative services, and weak regulatory and quality control systems pose serious challenges for the private sector. Social franchising addresses a number of these challenges by organizing small, independent health care businesses into quality-assured networks. Global franchisors Marie Stopes International (MSI) and Population Services International (PSI) have rapidly scaled their family planning social franchising programs in recent years, jointly delivering over 10.8 million couple-years of protection (CYPs) in 2014—up 26% from 8.6 million CYPs just 1 year prior. Drawing on experience across MSI’s 17 and PSI’s 25 social franchise networks across Africa, Asia, and Latin America and the Caribbean, this article documents the organizations’ operational approaches, challenges faced, and solutions implemented. The organizations provide intensive capacity building and support for private-sector providers, including clinical training, branding, monitoring quality of franchised services, and commodity support. In addition, franchising programs engage providers and clients through behavior change communication (BCC) and demand generation activities to raise awareness and to attract clients, and they implement initiatives to ensure services are affordable for the lowest-income clients. Social franchise programs offer the private sector a collective platform to better engage government in health policy advocacy and for integrating into new public health care financing and procurement mechanisms. The future of social franchising will require developing approaches to scale-up and sustain the model cost-effectively, selectively integrating other health services into the franchise package, and being responsive to evolving health care financing approaches with the potential to contribute to universal health coverage. PMID:26085017

  3. A material flow analysis on current electrical and electronic waste disposal from Hong Kong households

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lau, Winifred Ka-Yan; Chung, Shan-Shan, E-mail: sschung@hkbu.edu.hk; Zhang, Chan

    2013-03-15

    Highlights: ► Most household TWARC waste is sold directly to private e-waste collectors in HK. ► The current e-waste recycling network is popular with HK households. ► About 80% of household generated TWARC is exported overseas each year. ► Over 7000 tonnes/yr of household generated TWARC reach landfills. ► It is necessary to upgrade safety and awareness in HK’s e-waste recycling industry. - Abstract: A material flow study on five types of household electrical and electronic equipment, namely television, washing machine, air conditioner, refrigerator and personal computer (TWARC) was conducted to assist the Government of Hong Kong to establish anmore » e-waste take-back system. This study is the first systematic attempt on identifying key TWARC waste disposal outlets and trade practices of key parties involved in Hong Kong. Results from two questionnaire surveys, on local households and private e-waste traders, were used to establish the material flow of household TWARC waste. The study revealed that the majority of obsolete TWARC were sold by households to private e-waste collectors and that the current e-waste collection network is efficient and popular with local households. However, about 65,000 tonnes/yr or 80% of household generated TWARC waste are being exported overseas by private e-waste traders, with some believed to be imported into developing countries where crude recycling methods are practiced. Should Hong Kong establish a formal recycling network with tight regulatory control on imports and exports, the potential risks of current e-waste recycling practices on e-waste recycling workers, local residents and the environment can be greatly reduced.« less

  4. Impact of Chest Pain Protocol with Access to Telemedicine on Implementation of Pharmacoinvasive Strategy in a Private Hospital Network.

    PubMed

    Macedo, Thiago Andrade; de Barros E Silva, Pedro Gabriel Melo; Simões, Sheila Aparecida; Okada, Mariana Yumi; Garcia, José Carlos Teixeira; Sampaio, Marcio Campos; Dantas, Roberto Nery; Oliveira, Roger Pereira; Rocha, Liliane Gomes; da Cunha Lopes, Bernardo Baptista; Frigini, Tiago; Furlan, Valter

    2016-07-01

    Brazilian registries have shown a gap between evidence-based therapies and real treatments. We aim to compare the use of the pharmacoinvasive strategy and mortality in patients with ST elevation myocardial infarction (STEMI) transferred pre- and post-chest pain protocol with access to telemedicine (CPPT) in a private hospital network. A CPPT was implemented in 22 private emergency departments in 2012. Emergency physicians and nurses of all facilities were trained to disseminate the information to comply with a chest pain protocol focusing on reperfusion therapy (pharmacoinvasive strategy) for STEMI. To conduct clinical discussions using telemedicine, a cardiologist from a reference hospital in cardiology (RHC) was available 24 h/day, 7 days/week. Using the database of all consecutive admissions, we compared the data of patients with STEMI transferred to the RHC in 2011 (pre-CPPT) and 2013-2014 (post-CPPT). We included 376 patients (113 pre-CPPT and 263 post-CPPT) with STEMI. All patients admitted in the RHC were transferred from the 22 emergency departments. Comparing pre-CPPT and post-CPPT, we did not find differences regarding age, gender, hypertension, dyslipidemia, diabetes, smoking, previous myocardial infarction, or Killip classification. However, the use of CPPT was associated with a greater use of pharmacoinvasive strategy (55.8% versus 38%; p = 0.002) and a trend toward lower in-hospital mortality (3% versus 8%; p = 0.06). The implementation of a CPPT was associated with a significant increase in the use of pharmacoinvasive strategy in patients with STEMI and a trend toward reduced in-hospital mortality in a private hospital network.

  5. Social Media as Avenue for Personal Learning for Educators: Personal Learning Networks Encourage Application of Knowledge and Skills

    ERIC Educational Resources Information Center

    Eller, Linda S.

    2012-01-01

    Social media sites furnish an online space for a community of practice to create relationships and trust, collaboration and connections, and a personal learning environment. Social networking sites, both public and private, have common elements: member profiles, groups, discussions, and forums. A community of practice brings participants together…

  6. Comparative Analysis of University-Government-Enterprise Co-Authorship Networks in Three Scientific Domains in the Region of Madrid

    ERIC Educational Resources Information Center

    Olmeda-Gomez, Carlos; Perianes-Rodriguez, Antonio; Ovalle-Perandones, Maria Antonia; Moya-Anegon, Felix

    2008-01-01

    Introduction: In an economy geared to innovation and competitiveness in research and development activities, inter-relationships between the university, private enterprise and government are of considerable interest. Networking constitutes a priority strategy to attain this strategic objective and a tool in knowledge-based economies. Method:…

  7. Facebook Usage as a Predictor of Retention at a Private 4-Year Institution

    ERIC Educational Resources Information Center

    Morris, Jason; Reese, Jeff; Beck, Richard; Mattis, Charles

    2010-01-01

    Computer-based social networking has become ubiquitous on college and university campuses. However, little is known about how this form of networking reflects social integration which is considered to be an integral component of student persistence. To address this topic, a random sample of 375 entering freshman were used to evaluate the…

  8. Programs That Work, from the Promising Practices Network on Children, Families and Communities. RAND Tool

    ERIC Educational Resources Information Center

    Kilburn, M. Rebecca, Ed.

    2014-01-01

    The Promising Practices Network (PPN) on Children, Families and Communities (www.promisingpractices.net) began as a partnership between four state-level organizations that help public and private organizations improve the well-being of children and families. The PPN website, archived in June 2014, featured summaries of programs and practices that…

  9. Network analysis of wildfire transmission and implications for risk governance

    Treesearch

    Alan A. Ager; Cody R. Evers; Michelle A. Day; Haiganoush K. Preisler; Ana M. G. Barros; Max Nielsen-Pincus

    2017-01-01

    We characterized wildfire transmission and exposure within a matrix of large land tenures (federal, state, and private) surrounding 56 communities within a 3.3 million ha fire prone region of central Oregon US. Wildfire simulation and network analysis were used to quantify the exchange of fire among land tenures and communities and analyze the relative contributions of...

  10. Social Networking Privacy Control: Exploring University Variables Related to Young Adults' Sharing of Personally Identifiable Information

    ERIC Educational Resources Information Center

    Zimmerman, Melisa S.

    2014-01-01

    The growth of the Internet, and specifically social networking sites (SNSs) like Facebook, create opportunities for individuals to share private and identifiable information with a closed or open community. Internet crime has been on the rise and research has shown that criminals are using individuals' personal information pulled from social…

  11. Organizing for North Carolina: Social Movement Unionism in a Southern State

    ERIC Educational Resources Information Center

    Johnson, Mark

    2017-01-01

    Across the United States, a counter-network of teacher activists is engaged in the development of grassroots organizing structures to advocate for social justice, resist the privatization of public education, and increase union democracy. The United Caucuses of Rank and File Educators (UCORE) is a national network of more than 20 union reform…

  12. Characterizing the sustainable forestry issue network in thc United States

    Treesearch

    Steverson O. Moffat; Frederick W. Cubbage; Thomas P. Holmes; Elizabethann O' Sullivan

    2001-01-01

    Issue network analysis techniques were applied to the issue sustainable forestry in the United States to identify potential public and private outcomes for the issue. A quantitative approach based on work by Laumann and Knoke [(The Organizational State (1987)] was utilized in conjunction with the Delphi method. Results suggest that the parity in the distribution of...

  13. Does the Wage Gap between Private and Public Sectors Encourage Political Corruption?

    PubMed Central

    Podobnik, Boris; Vukovic, Vuk; Stanley, H. Eugene

    2015-01-01

    We present a dynamic network model of corrupt and noncorrupt employees representing two states in the public and private sector. Corrupt employees are more connected to one another and are less willing to change their attitudes regarding corruption than noncorrupt employees. This behavior enables them to prevail and become the majority in the workforce through a first-order phase transition even though they initially represented a minority. In the model, democracy—understood as the principle of majority rule—does not create corruption, but it serves as a mechanism that preserves corruption in the long run. The motivation for our network model is a paradox that exists on the labor market. Although economic theory indicates that higher risk investments should lead to larger rewards, in many developed and developing countries workers in lower-risk public sector jobs are paid more than workers in higher-risk private sector jobs. To determine the long-run sustainability of this economic paradox, we study data from 28 EU countries and find that the public sector wage premium increases with the level of corruption. PMID:26495847

  14. Does the Wage Gap between Private and Public Sectors Encourage Political Corruption?

    PubMed

    Podobnik, Boris; Vukovic, Vuk; Stanley, H Eugene

    2015-01-01

    We present a dynamic network model of corrupt and noncorrupt employees representing two states in the public and private sector. Corrupt employees are more connected to one another and are less willing to change their attitudes regarding corruption than noncorrupt employees. This behavior enables them to prevail and become the majority in the workforce through a first-order phase transition even though they initially represented a minority. In the model, democracy-understood as the principle of majority rule-does not create corruption, but it serves as a mechanism that preserves corruption in the long run. The motivation for our network model is a paradox that exists on the labor market. Although economic theory indicates that higher risk investments should lead to larger rewards, in many developed and developing countries workers in lower-risk public sector jobs are paid more than workers in higher-risk private sector jobs. To determine the long-run sustainability of this economic paradox, we study data from 28 EU countries and find that the public sector wage premium increases with the level of corruption.

  15. AUCTION MECHANISMS FOR IMPLEMENTING TRADABLE NETWORK PERMIT MARKETS

    NASA Astrophysics Data System (ADS)

    Wada, Kentaro; Akamatsu, Takashi

    This paper proposes a new auction mechanism for implementing the tradable network permit markets. Assuming that each user makes a trip from an origin to a destination along a path in a specific time period, we design an auction mechanism that enables each user to purchase a bundle of permits corresponding to a set of links in the user's preferred path. The objective of the proposed mechanism is to achieve a socially optimal state with minimal revelation of users' private information. In order to achieve this, the mechanism employs an evolutionary approach that has an auction phase and a path capacity adjustment phase, which are repeated on a day-to-day basis. We prove that the proposed mechanism has the following desirable properties: (1) truthful bidding is the dominant strategy for each user and (2) the proposed mechanism converges to an approximate socially optimal state in the sense that the achieved value of the social surplus reaches its maximum value when the number of users is large.

  16. A computer-assisted data collection system for use in a multicenter study of American Indians and Alaska Natives: SCAPES.

    PubMed

    Edwards, Roger L; Edwards, Sandra L; Bryner, James; Cunningham, Kelly; Rogers, Amy; Slattery, Martha L

    2008-04-01

    We describe a computer-assisted data collection system developed for a multicenter cohort study of American Indian and Alaska Native people. The study computer-assisted participant evaluation system or SCAPES is built around a central database server that controls a small private network with touch screen workstations. SCAPES encompasses the self-administered questionnaires, the keyboard-based stations for interviewer-administered questionnaires, a system for inputting medical measurements, and administrative tasks such as data exporting, backup and management. Elements of SCAPES hardware/network design, data storage, programming language, software choices, questionnaire programming including the programming of questionnaires administered using audio computer-assisted self-interviewing (ACASI), and participant identification/data security system are presented. Unique features of SCAPES are that data are promptly made available to participants in the form of health feedback; data can be quickly summarized for tribes for health monitoring and planning at the community level; and data are available to study investigators for analyses and scientific evaluation.

  17. MONET 2009 PC Co-chairs' Message

    NASA Astrophysics Data System (ADS)

    Grifoni, Patrizia; Ferri, Fernando; Kondratova, Irina; D'Ulizia, Arianna

    The research areas of mobile technologies, social networking and mobile services applications are receiving wide interest from private and public companies as well as from academic and research institutions.

  18. Design and deployment of hybrid-telemedicine applications

    NASA Astrophysics Data System (ADS)

    Ikhu-Omoregbe, N. A.; Atayero, A. A.; Ayo, C. K.; Olugbara, O. O.

    2005-01-01

    With advances and availability of information and communication technology infrastructures in some nations and institutions, patients are now able to receive healthcare services from doctors and healthcare centers even when they are physically separated. The availability and transfer of patient data which often include medical images for specialist opinion is invaluable both to the patient and the medical practitioner in a telemedicine session. Two existing approaches to telemedicine are real-time and stored-and-forward. The real-time requires the availability or development of video-conferencing infrastructures which are expensive especially for most developing nations of the world while stored-and-forward could allow data transmission between any hospital with computer and telephone by landline link which is less expensive but with delays. We therefore propose a hybrid design of applications using hypermedia database capable of harnessing the features of real-time and stored-and-forward deployed over a wireless Virtual Private Network for the participating centers and healthcare providers.

  19. Public-private partnership oversight : how FHWA reviews P3s.

    DOT National Transportation Integrated Search

    2015-01-01

    A growing number of State and local transportation agencies are considering the use of public-private partnerships (P3s), in which a private entity is involved in designing, financing, constructing, operating, and maintaining a transportation facilit...

  20. Cost-efficiency of highway operations and maintenance of public-private partnerships.

    DOT National Transportation Integrated Search

    2014-08-01

    While the literature on public-private partnerships (PPPs) argues that the private sectors life-cycle : approach to design and construction results in operational cost efficiencies, empirical support is : missing. This study explored that issue by...

  1. 34 CFR 300.134 - Consultation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... private school children with disabilities during the design and development of special education and..., including— (1) How parentally-placed private school children suspected of having a disability can... of parentally-placed private school children with disabilities, including how the process will...

  2. Cooperative Convex Optimization in Networked Systems: Augmented Lagrangian Algorithms With Directed Gossip Communication

    NASA Astrophysics Data System (ADS)

    Jakovetic, Dusan; Xavier, João; Moura, José M. F.

    2011-08-01

    We study distributed optimization in networked systems, where nodes cooperate to find the optimal quantity of common interest, x=x^\\star. The objective function of the corresponding optimization problem is the sum of private (known only by a node,) convex, nodes' objectives and each node imposes a private convex constraint on the allowed values of x. We solve this problem for generic connected network topologies with asymmetric random link failures with a novel distributed, decentralized algorithm. We refer to this algorithm as AL-G (augmented Lagrangian gossiping,) and to its variants as AL-MG (augmented Lagrangian multi neighbor gossiping) and AL-BG (augmented Lagrangian broadcast gossiping.) The AL-G algorithm is based on the augmented Lagrangian dual function. Dual variables are updated by the standard method of multipliers, at a slow time scale. To update the primal variables, we propose a novel, Gauss-Seidel type, randomized algorithm, at a fast time scale. AL-G uses unidirectional gossip communication, only between immediate neighbors in the network and is resilient to random link failures. For networks with reliable communication (i.e., no failures,) the simplified, AL-BG (augmented Lagrangian broadcast gossiping) algorithm reduces communication, computation and data storage cost. We prove convergence for all proposed algorithms and demonstrate by simulations the effectiveness on two applications: l_1-regularized logistic regression for classification and cooperative spectrum sensing for cognitive radio networks.

  3. Violence on Canadian Television Networks

    PubMed Central

    Paquette, Guy

    2004-01-01

    Introduction Over the past twenty years, the question of the effects of violence on television has figured prominently in public opinion and hundreds of studies have been devoted to this subject. Many researchers have determined that violence has a negative impact on behavior. The public, broadcasters and political figures all support the idea of reducing the total amount of violence on television - in particular in shows for children. A thousand programs aired between 1993 and 2001 on major non-specialty television networks in Canada were analyzed: TVA, TQS, as well as CTV and Global, private French and English networks, as well as the English CBC Radio and French Radio-Canada for the public networks. Method The methodology consists of a classic analysis of content where an act of violence constitutes a unit of analysis. Results The data collected revealed that the amount of violence has increased regularly since 1993 despite the stated willingness on the part of broadcasters to produce programs with less violence. The total number of violent acts, as well as the number of violent acts per hour, is increasing. Private networks deliver three times more violence than public networks. Researchers have also noted that a high proportion of violence occurs in programs airing before 21:00 hours, thereby exposing a large number of children to this violence. Conclusion Psychological violence is taking on a more significant role in Canadian Television. PMID:19030148

  4. Violence on canadian television networks.

    PubMed

    Paquette, Guy

    2004-02-01

    Over the past twenty years, the question of the effects of violence on television has figured prominently in public opinion and hundreds of studies have been devoted to this subject. Many researchers have determined that violence has a negative impact on behavior. The public, broadcasters and political figures all support the idea of reducing the total amount of violence on television - in particular in shows for children. A thousand programs aired between 1993 and 2001 on major non-specialty television networks in Canada were analyzed: TVA, TQS, as well as CTV and Global, private French and English networks, as well as the English CBC Radio and French Radio-Canada for the public networks. The methodology consists of a classic analysis of content where an act of violence constitutes a unit of analysis. The data collected revealed that the amount of violence has increased regularly since 1993 despite the stated willingness on the part of broadcasters to produce programs with less violence. The total number of violent acts, as well as the number of violent acts per hour, is increasing. Private networks deliver three times more violence than public networks. Researchers have also noted that a high proportion of violence occurs in programs airing before 21:00 hours, thereby exposing a large number of children to this violence. Psychological violence is taking on a more significant role in Canadian Television.

  5. A Statewide Private Microwave Wide Area Network for Real-time Natural Hazard Monitoring

    NASA Astrophysics Data System (ADS)

    Williams, M. C.; Kent, G.; Smith, K. D.; Plank, G.; Slater, D.; Torrisi, J.; Presser, R.; Straley, K.

    2013-12-01

    The Nevada Seismological Laboratory (NSL) at the University of Nevada, Reno, operates the Nevada Seismic Network, a collection of ground motion instruments installed throughout Nevada and California, for the purposes of detecting, locating, and notifying the public of earthquakes in the state. To perform these tasks effectively, NSL has designed and built a statewide wireless microwave wide-area network (WAN) in order to receive ground motion data in near real-time. This network consists of radio access points, backhauls, and backbone communication sites transmitting time-series, images, and datalogger diagnostics to our data center servers in Reno. This privately managed communication network greatly reduces the dependence on third-party infrastructure (e.g. commercial cellular networks), and is vital for emergency management response and system uptime. Any individual seismograph or data collection device is networked through a wireless point-to-multipoint connection to a remote access point (AP) using a low-cost radio/routerboard combination. Additional point-to-point connections from AP's to radio backhauls and/or mountaintop backbone sites allow the Data Center in Reno to communicate with and receive data directly from each datalogger. Dataloggers, radios, and routers can be configured using tablets on-site, or via desktop computers at the Data Center. Redundant mountaintop links can be added to the network and facilitate the re-routing of data (similar to a meshed network) in the event of a faulty, failing, or noisy communication site. All routers, radios, and servers, including those at the Data Center, have redundant power and can operate independently in the event of a grid power or public Internet outage. A managed server room at the Data Center processes earthquake data for notifications and acts as a data source for remote users. Consisting of about 500 hosts, and spanning hundreds of miles, this WAN provides network operators access to each router and datalogger in our seismic network not only for data collection, but also for maintenance and quality control. This has resulted in several partnerships with other agencies. In addition to our seismic station network for earthquake monitoring, we currently manage ~400 more channels of data (many running at 500 Hz) for the National Center for Nuclear Security (NCNS) Source Physics Experiments, a series of chemical explosions at the Nevada National Security Site. Some of our mountaintop stations have been experimentally equipped with near-infrared high-definition fire cameras for wildfire monitoring, and have recently recorded the Bison and Pedlar fires in northwest Nevada. Data for the Nevada EPSCor climate program also utilizes the NSL WAN. Real-time access to data for these experiments greatly reduces the effort required for data archival, quality control, and monitoring equipment failures. Future plans include increasing density of stations in urban areas such as Reno and Las Vegas, and expanding coverage to Tahoe and eastern Nevada.

  6. Ways and Means to Utilize Private Practitioners for Tuberculosis Care in India.

    PubMed

    Samal, Janmejaya

    2017-02-01

    The growing interest of utilizing the private practitioners in improving the outreach of public health services including Tuberculosis (TB) control programme stemmed out of people's preference for private health facilities in situations where public health facilities fail to meet the expectations. In different parts of India, many models of Public Private Partnership have been tried and tested and proved successful in providing quality TB care in the concerned community. In this paper, several ways and means have been proposed to effectively utilize private practitioners for TB care in India. These strategies are discussed under different headings: (1) identification of potential private practitioners: (2) orientation of private practitioners: (3) networking of private practitioners with patients and Directly Observed Treatment Short course (DOTS) provider: (4) follow-up and sensitization of patients by private practitioners: (5) let the word of mouth work: and (6) evaluation of the involvement of private practitioners in TB care. However the following points must be addressed before utilizing the private practitioners for TB care: time constraints in notifying the disease, adherence to DOTS regime/alternative to DOTS regime, referral of patients to public health facilities for diagnosis and treatment, follow-up and sensitization of the patients and behaviour change communication and awareness in the community by the private practitioners. Few of these are mandatory for the private practitioners; most are practicable. With the effective utilization of private practitioners many problems can be sorted out that are currently plaguing the system such as irrational and excessive use of certain drugs, over reliance on chest X-ray for diagnosis, under use of sputum microscopy, lack of knowledge regarding standard treatment protocols and varied prescription practices.

  7. [Improving the physician-dental surgeon relationship to improve patient care].

    PubMed

    Tenenbaum, Annabelle; Folliguet, Marysette; Berdougo, Brice; Hervé, Christian; Moutel, Grégoire

    2008-04-01

    This study had two aims: to assess the nature of the relationship between general practitioners (GPs) and dental surgeons in relation to patient care and to evaluate qualitatively their interest in the changes that health networks and shared patient medical files could bring. Questionnaires were completed by 12 GPs belonging to ASDES, a private practitioner-hospital health network that seeks to promote a partnership between physicians and dental surgeons, and by 13 private dental surgeons in the network catchment area. The GPs and dentists had quite different perceptions of their relationship. Most dentists rated their relationship with GPs as "good" to "excellent" and did not wish to modify it, while GPs rated their relationship with dentists as nonexistent and expressed a desire to change the situation. Some GPs and some dentists supported data exchange by sharing personal medical files through the network. Many obstacles hinder communication between GPs and dentists. There is insufficient coordination between professionals. Health professionals must be made aware of how changes in the health care system (health networks, personal medical files, etc) can help to provide patients with optimal care. Technical innovations in medicine will not be beneficial to patients unless medical education and training begins to include interdisciplinary and holistic approaches to health care and preventive care.

  8. Medicare privatization and the erosion of retirement security.

    PubMed

    Polivka, Larry; Kwak, Jung

    2008-01-01

    This paper describes initiatives to privatize the Medicare program over the last 10 years and the implications of these initiatives for the future of retirement security. Our analysis focuses on the privatization provisions of the Medicare Modernization Act, which is largely designed to benefit the corporate health care sector without containing costs or significantly reducing the threat of rising health care costs to the economic security of current and future retirees. In fact, as designed, the Medicare Modernization Act is likely to increase the threat to retirement security in the years ahead. We conclude with a series of policy alternatives to the neoliberal agenda for the privatization of Medicare.

  9. Primary health care service delivery networks for the prevention and management of type 2 diabetes: using social network methods to describe interorganisational collaboration in a rural setting.

    PubMed

    McDonald, Julie; Jayasuriya, Rohan; Harris, Mark Fort

    2011-01-01

    Adults with type 2 diabetes or with behavioural risk factors require comprehensive and well coordinated responses from a range of health care providers who often work in different organisational settings. This study examines three types of collaborative links between organisations involved in a rural setting. Social network methods were employed using survey data on three types of links, and data was collected from a purposive sample of 17 organisations representing the major provider types. The analysis included a mix of unconfirmed and confirmed links, and network measures. General practices were the most influential provider group in initiating referrals, and they referred to the broadest range of organisations in the network. Team care arrangements formed a small part of the general practice referral network. They were used more for access to private sector allied health care providers and less for sharing care with public sector health services. Involvement in joint programs/activities was limited to public and non-government sector services, with no participation from the private sector. The patterns of interactions suggest that informal referral networks provide access to services and coordination of care for individual patients with diabetes. Two population subgroups would benefit from more proactive approaches to ensure equitable access to services and coordination of care across organisational boundaries: people with more complex health care needs and people at risk of developing diabetes.

  10. Safety management of Ethernet broadband access based on VLAN aggregation

    NASA Astrophysics Data System (ADS)

    Wang, Li

    2004-04-01

    With broadband access network development, the Ethernet technology is more and more applied access network now. It is different from the private network -LAN. The differences lie in four points: customer management, safety management, service management and count-fee management. This paper mainly discusses the safety management related questions. Safety management means that the access network must secure the customer data safety, isolate the broad message which brings the customer private information, such as ARP, DHCP, and protect key equipment from attack. Virtue LAN (VLAN) technology can restrict network broadcast flow. We can config each customer port with a VLAN, so each customer is isolated with others. The IP address bound with VLAN ID can be routed rightly. But this technology brings another question: IP address shortage. VLAN aggregation technology can solve this problem well. Such a mechanism provides several advantages over traditional IPv4 addressing architectures employed in large switched LANs today. With VLAN aggregation technology, we introduce the notion of sub-VLANs and super-VLANs, a much more optimal approach to IP addressing can be realized. This paper will expatiate the VLAN aggregation model and its implementation in Ethernet access network. It is obvious that the customers in different sub-VLANs can not communication to each other because the ARP packet is isolated. Proxy ARP can enable the communication among them. This paper will also expatiate the proxy ARP model and its implementation in Ethernet access network.

  11. Characteristics of Private Schools in the United States: Results From the 2007-08 Private School Universe Survey--First Look. NCES 2009-313

    ERIC Educational Resources Information Center

    Broughman, Stephen P.; Swaim, Nancy L.; Keaton, Patrick W.

    2009-01-01

    Since 1989, the U.S. Bureau of the Census has conducted the biennial Private School Universe Survey (PSS) for the National Center for Education Statistics (NCES). The PSS is designed to generate biennial data on the total number of private schools, students, and teachers, and to build a universe of private schools in the 50 states and the District…

  12. 48 CFR 225.370-4 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... private security functions; (A) All armored vehicles, helicopters, and other military vehicles must be... personnel performing private security functions in designated areas are addressed in Department of Defense... performance of private security functions or other supplies or services. (c) DoD requires contractors...

  13. 48 CFR 25.302-4 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... performing private security functions in designated areas are addressed at 32 CFR part 159, entitled “Private... for weapons; registering and identifying armored vehicles, helicopters, and other military vehicles; and reporting specified incidents in which personnel performing private security functions under a...

  14. Game-theoretic approach for improving cooperation in wireless multihop networks.

    PubMed

    Ng, See-Kee; Seah, Winston K G

    2010-06-01

    Traditional networks are built on the assumption that network entities cooperate based on a mandatory network communication semantic to achieve desirable qualities such as efficiency and scalability. Over the years, this assumption has been eroded by the emergence of users that alter network behavior in a way to benefit themselves at the expense of others. At one extreme, a malicious user/node may eavesdrop on sensitive data or deliberately inject packets into the network to disrupt network operations. The solution to this generally lies in encryption and authentication. In contrast, a rational node acts only to achieve an outcome that he desires most. In such a case, cooperation is still achievable if the outcome is to the best interest of the node. The node misbehavior problem would be more pronounced in multihop wireless networks like mobile ad hoc and sensor networks, which are typically made up of wireless battery-powered devices that must cooperate to forward packets for one another. However, cooperation may be hard to maintain as it consumes scarce resources such as bandwidth, computational power, and battery power. This paper applies game theory to achieve collusive networking behavior in such network environments. In this paper, pricing, promiscuous listening, and mass punishments are avoided altogether. Our model builds on recent work in the field of Economics on the theory of imperfect private monitoring for the dynamic Bertrand oligopoly, and adapts it to the wireless multihop network. The model derives conditions for collusive packet forwarding, truthful routing broadcasts, and packet acknowledgments under a lossy wireless multihop environment, thus capturing many important characteristics of the network layer and link layer in one integrated analysis that has not been achieved previously. We also provide a proof of the viability of the model under a theoretical wireless environment. Finally, we show how the model can be applied to design a generic protocol which we call the Selfishness Resilient Resource Reservation protocol, and validate the effectiveness of this protocol in ensuring cooperation using simulations.

  15. Ambiguity in Social Network Data for Presence, Sensitive-Attribute, Degree and Relationship Privacy Protection.

    PubMed

    Rajaei, Mehri; Haghjoo, Mostafa S; Miyaneh, Eynollah Khanjari

    2015-01-01

    Maintaining privacy in network data publishing is a major challenge. This is because known characteristics of individuals can be used to extract new information about them. Recently, researchers have developed privacy methods based on k-anonymity and l-diversity to prevent re-identification or sensitive label disclosure through certain structural information. However, most of these studies have considered only structural information and have been developed for undirected networks. Furthermore, most existing approaches rely on generalization and node clustering so may entail significant information loss as all properties of all members of each group are generalized to the same value. In this paper, we introduce a framework for protecting sensitive attribute, degree (the number of connected entities), and relationships, as well as the presence of individuals in directed social network data whose nodes contain attributes. First, we define a privacy model that specifies privacy requirements for the above private information. Then, we introduce the technique of Ambiguity in Social Network data (ASN) based on anatomy, which specifies how to publish social network data. To employ ASN, individuals are partitioned into groups. Then, ASN publishes exact values of properties of individuals of each group with common group ID in several tables. The lossy join of those tables based on group ID injects uncertainty to reconstruct the original network. We also show how to measure different privacy requirements in ASN. Simulation results on real and synthetic datasets demonstrate that our framework, which protects from four types of private information disclosure, preserves data utility in tabular, topological and spectrum aspects of networks at a satisfactory level.

  16. Ambiguity in Social Network Data for Presence, Sensitive-Attribute, Degree and Relationship Privacy Protection

    PubMed Central

    Rajaei, Mehri; Haghjoo, Mostafa S.; Miyaneh, Eynollah Khanjari

    2015-01-01

    Maintaining privacy in network data publishing is a major challenge. This is because known characteristics of individuals can be used to extract new information about them. Recently, researchers have developed privacy methods based on k-anonymity and l-diversity to prevent re-identification or sensitive label disclosure through certain structural information. However, most of these studies have considered only structural information and have been developed for undirected networks. Furthermore, most existing approaches rely on generalization and node clustering so may entail significant information loss as all properties of all members of each group are generalized to the same value. In this paper, we introduce a framework for protecting sensitive attribute, degree (the number of connected entities), and relationships, as well as the presence of individuals in directed social network data whose nodes contain attributes. First, we define a privacy model that specifies privacy requirements for the above private information. Then, we introduce the technique of Ambiguity in Social Network data (ASN) based on anatomy, which specifies how to publish social network data. To employ ASN, individuals are partitioned into groups. Then, ASN publishes exact values of properties of individuals of each group with common group ID in several tables. The lossy join of those tables based on group ID injects uncertainty to reconstruct the original network. We also show how to measure different privacy requirements in ASN. Simulation results on real and synthetic datasets demonstrate that our framework, which protects from four types of private information disclosure, preserves data utility in tabular, topological and spectrum aspects of networks at a satisfactory level. PMID:26110762

  17. Consumer cost sharing in private health insurance: on the threshold of change.

    PubMed

    Goff, Veronica

    2004-05-14

    Employers are asking employees to pay more for health care through higher premium contributions, share of contribution, and out-of-pocket maximums, along with variations in deductibles, co-pays, and coinsurance based on choice of providers, networks, drugs, and other services. This issue brief examines consumer cost-sharing trends in private insurance, discusses the outlook for cost sharing in employment-based benefits, and considers public policies to support health care markets for consumers.

  18. Thalassemia

    MedlinePlus

    ... 19/2018 Updated by: Richard LoCicero, MD, private practice specializing in hematology and medical oncology, Longstreet Cancer Center, Gainesville, GA. Review provided by VeriMed Healthcare Network. Also reviewed by David Zieve, MD, MHA, Medical ...

  19. A Proposal for Public and Private Partnership in Extension.

    PubMed

    Krell, Rayda K; Fisher, Marc L; Steffey, Kevin L

    2016-01-01

    Public funding for Extension in the United States has been decreasing for many years, but farmers' need for robust information on which to make management decisions has not diminished. The current Extension funding challenges provide motivation to explore a different model for developing and delivering extension. The private sector has partnered with the public sector to fund and conduct agricultural research, but partnering on extension delivery has occurred far less frequently. The fundamental academic strength and established Extension network of the public sector combined with the ability of the private sector to encourage and deliver practical, implementable solutions has the potential to provide measurable benefits to farmers. This paper describes the current Extension climate, presents data from a survey about Extension and industry relationships, presents case studies of successful public- and private-sector extension partnerships, and proposes a framework for evaluating the state of effective partnerships. Synergistic public-private extension efforts could ensure that farmers receive the most current and balanced information available to help with their management decisions.

  20. A Proposal for Public and Private Partnership in Extension

    PubMed Central

    Krell, Rayda K.; Fisher, Marc L.; Steffey, Kevin L.

    2016-01-01

    Public funding for Extension in the United States has been decreasing for many years, but farmers’ need for robust information on which to make management decisions has not diminished. The current Extension funding challenges provide motivation to explore a different model for developing and delivering extension. The private sector has partnered with the public sector to fund and conduct agricultural research, but partnering on extension delivery has occurred far less frequently. The fundamental academic strength and established Extension network of the public sector combined with the ability of the private sector to encourage and deliver practical, implementable solutions has the potential to provide measurable benefits to farmers. This paper describes the current Extension climate, presents data from a survey about Extension and industry relationships, presents case studies of successful public- and private-sector extension partnerships, and proposes a framework for evaluating the state of effective partnerships. Synergistic public–private extension efforts could ensure that farmers receive the most current and balanced information available to help with their management decisions. PMID:26949567

  1. A Conceptual Framework for Tactical Private Satellite Networks

    DTIC Science & Technology

    2008-09-01

    will be deployed on a controlled basis so as not to consume valuable bandwidth during critical time windows. Faults inside the network can be tracked ... attitude control , timing, and navigation - More precise station keeping - Optical LANs and inter-satellite links - Inter satellite links - New...Cluster operations, such as electromagnetic formation flying systems and remote attitude determination systems. • Distributed spacecraft computing

  2. From Government to Governance: Teach for India and New Networks of Reform in School Education

    ERIC Educational Resources Information Center

    Subramanian, Vidya K.

    2018-01-01

    The Teach for India (TFI) programme, an important offshoot of the Teach for All/Teach for America global education network, began as a public-private partnership in 2009 in poorly functioning municipal schools in Pune and Mumbai. Like its American counterpart, the programme in India has similar ideas of reform and recruits college graduates and…

  3. Public/Private Partnerships in Aging. Working with the Business Community on Eldercare. A Primer for the Aging Network.

    ERIC Educational Resources Information Center

    Levin, Robert; And Others

    This manual is intended to assist network agencies dealing with aging to educate and develop programs for the business community to address the needs of employed caregivers and their dependents. Chapter I defines "eldercare," discusses the role of caregivers in the work force, describes caregiver tasks and relationships, and outlines basic needs…

  4. The Power of the Network: Teach for America's Impact on the Deregulation of Teacher Education

    ERIC Educational Resources Information Center

    Kretchmar, Kerry; Sondel, Beth; Ferrare, Joseph J.

    2018-01-01

    In this article, we illustrate the relationships between Teach For America (TFA) and the deregulation of university-based teacher education programs. We use policy network analysis to create a visual representation of TFA's connections to individuals, organizations, and private corporations who are working to shift the way teachers are prepared.…

  5. Training and Jobs Programs in Action: Case Studies in Private-Sector Initiatives for the Hard-to-Employ.

    ERIC Educational Resources Information Center

    Robison, David

    This book contains fifty-three case studies covering a wide variety of private-sector activities and public-private partnerships designed to increase training and employment opportunities for the hard-to-employ and speed the transition of the unemployed from government support and subsidized jobs to permanent private employment. Compiled from a…

  6. Exploring Factors Affecting Voluntary Adoption of Electronic Medical Records Among Physicians and Clinical Assistants of Small or Solo Private General Practice Clinics.

    PubMed

    Or, Calvin; Tong, Ellen; Tan, Joseph; Chan, Summer

    2018-05-29

    The health care reform initiative led by the Hong Kong government's Food and Health Bureau has started the implementation of an electronic sharing platform to provide an information infrastructure that enables public hospitals and private clinics to share their electronic medical records (EMRs) for improved access to patients' health care information. However, previous attempts to convince the private clinics to adopt EMRs to document health information have faced challenges, as the EMR adoption has been voluntary. The lack of electronic data shared by private clinics carries direct impacts to the efficacy of electronic record sharing between public and private healthcare providers. To increase the likelihood of buy-in, it is essential to proactively identify the users' and organizations' needs and capabilities before large-scale implementation. As part of the reform initiative, this study examined factors affecting the adoption of EMRs in small or solo private general practice clinics, by analyzing the experiences and opinions of the physicians and clinical assistants during the pilot implementation of the technology, with the purpose to learn from it before full-scale rollout. In-depth, semistructured interviews were conducted with 23 physicians and clinical assistants from seven small or solo private general practice clinics to evaluate their experiences, expectations, and opinions regarding the deployment of EMRs. Interview transcripts were content analyzed to identify key factors. Factors affecting the adoption of EMRs to record and manage health care information were identified as follows: system interface design; system functions; stability and reliability of hardware, software, and computing networks; financial and time costs; task and outcome performance, work practice, and clinical workflow; physical space in clinics; trust in technology; users' information technology literacy; training and technical support; and social and organizational influences. The factors are interrelated with the others. The adoption factors identified are multifaceted, ranging from technological characteristics, clinician-technology interactions, skills and knowledge, and the user-workflow-technology fit. Other findings, which have been relatively underrepresented in previous studies, contribute unique insights about the influence of work and social environment on the adoption of EMRs, including limited clinic space and the effects of physicians' decision to use the technology on clinical staffs' adoption decisions. Potential strategies to address the concerns, overcome adoption barriers, and define relevant policies are discussed.

  7. 23 CFR 636.107 - May contracting agencies use geographic preference in Federal-aid design-build or public-private...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 23 Highways 1 2011-04-01 2011-04-01 false May contracting agencies use geographic preference in Federal-aid design-build or public-private partnership projects? 636.107 Section 636.107 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION ENGINEERING AND TRAFFIC OPERATIONS DESIGN-BUILD CONTRACTING General § 636.107 May contractin...

  8. 48 CFR 225.370-4 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... personnel performing private security functions in designated areas are addressed in Department of Defense... contract is for the performance of private security functions or other supplies or services. (c) DoD... of the contractor who are responsible for performing private security functions comply with orders...

  9. Mathematical defense method of networked servers with controlled remote backups

    NASA Astrophysics Data System (ADS)

    Kim, Song-Kyoo

    2006-05-01

    The networked server defense model is focused on reliability and availability in security respects. The (remote) backup servers are hooked up by VPN (Virtual Private Network) with high-speed optical network and replace broken main severs immediately. The networked server can be represent as "machines" and then the system deals with main unreliable, spare, and auxiliary spare machine. During vacation periods, when the system performs a mandatory routine maintenance, auxiliary machines are being used for back-ups; the information on the system is naturally delayed. Analog of the N-policy to restrict the usage of auxiliary machines to some reasonable quantity. The results are demonstrated in the network architecture by using the stochastic optimization techniques.

  10. The Long-Term Agro-Ecosystem Research (LTAR) Network: A New In-Situ Data Network For Agriculture

    NASA Astrophysics Data System (ADS)

    Walbridge, M. R.

    2014-12-01

    Agriculture in the 21st Century faces significant challenges due to increases in the demand for agricultural products from a global population expected to reach 9.5 billion by 2050, changes in land use that are reducing the area of arable land worldwide, and the uncertainties associated with increasing climate variability and change. There is broad agreement that meeting these challenges will require significant changes in agro-ecosystem management at the landscape scale. In 2012, the USDA/ARS announced the reorganization of 10 existing benchmark watersheds, experimental ranges, and research farms into a Long-Term Agro-ecosystem Research (LTAR) network. Earlier this year, the LTAR network expanded to 18 sites, including 3 led by land grant universities and/or private foundations. The central question addressed by the LTAR network is, "How do we sustain or enhance productivity, profitability, and ecosystem services in agro-ecosystems and agricultural landscapes"? All 18 LTAR sites possess rich historical databases that extend up to 100 years into the past. However as LTAR moves forward, the focus is on collecting a core set of common measurements over the next 30-50 years that can be used to draw inferences regarding the nature of agricultural sustainability and how it varies across regional and continental-scale gradients. As such, LTAR is part long-term research network and part observatory network. Rather than focusing on a single site, each LTAR has developed regional partnerships that allow it to address agro-ecosystem function in the large basins and eco-climatic zones that underpin regional food production systems. Partners include other long-term in-situ data networks (e.g., Ameriflux, CZO, GRACEnet, LTER, NEON). 'Next steps' include designing and implementing a cross-site experiment addressing LTAR's central question.

  11. Planning and deployment of DWDM systems: a reality

    NASA Astrophysics Data System (ADS)

    Mishra, Data S.

    2001-10-01

    The new definition and implementation of new communication network architectures and elements in the present data-centric world are due to dramatic change in technology, explosive growth in bandwidth requirement and de-regulated, privatized and competitive telecommunication market. Network Convergence, Disruptive Technology and Convulsive Market are the basic forces who are pushing the future network towards Packet based Optical Core Network and varieties of Access Network along with integrated NMS. Well-known Moore's law governs the result of progress in silicon processing and accordingly the present capacity of network must be multiplied by 100 times in 10 years. To build a global network which is 100 times powerful than present one by scaling up today's technology can not be a practical solution due to requirement of 100 fold increase in cost, power and size. Today's two network (Low delay, fixed bandwidth, Poisson voice traffic based, circuit-switched PSTN/PLMN and variable delay, variable bandwidth, no-guaranteed QoS based packet switched internet) are converging towards two-layer network (IP and ATM in lower layer; DWDM in network layer). SDH Network which was well drafted before explosive data traffic and was best suitable for Interoperability, Survivability, Reliability and Manageability will be taken over by DWDM Network by 2005 due to 90% of data traffic. This paper describes the way to build the Communication Network (either by migration or by overlay) with an overview of the equipment and technologies required to design the DWDM Network. Service Providers are facing tough challenges for selection of emerging technologies and advances in network standard for bandwidth hungry, valued customers. The reduction of cost of services due to increased competition , explosive growth of internet and 10GbE Ethernet (which is being considered as an end-to-end network solution) have given surprise to many network architects and designers. To provide transparency to data-rate and data-format the gap between electrical layer and Optical backbone layer has to be filled. By partitioning the Optical Bandwidth of Optical Fibre Cable into the wavelengths (32 to 120) Wavelength Division Multiplexing can transport data rate from 10MB/s to 10GB/s on each wavelength. In this paper we will analyze the difficult strategies of suppliers and obstacles in the way of service providers to make DWDM a reality in the field either as Upgrade or Overlay or New Network. The difficult constraint of protection scheme with respect to compatibility with existing network and network under development has to sorted out along with present standard of Optical Fibre to carry DWDM signal in cost effective way to Access , Edge and Metro part of our network. The future of IP under DWDM is going to be key element for Network Planners in future. Fundamental limitation of bit manipulation in Photonic domain will have implication on the network design, cost and migration to all optical network because Photons are computer un-friendly and not mature enough to give memory and logic devices. In the environment of heterogeneous traffic the DWDM based All Optical Network should behave as per expectation of users whose primary traffic will be multi-media IP type. The quality of service (QoS), Virtual Path Network (VPN) over DWDM, OXC and intelligence at the edge will play a major role in future deployment of DWDM in our network . The development of improved fiber characteristics, EDFAs and Photonic component has led the carriers to go for Dense WDM Network.

  12. Using Patient Pathway Analysis to Design Patient-centered Referral Networks for Diagnosis and Treatment of Tuberculosis: The Case of the Philippines

    PubMed Central

    Garfin, Celine; Mantala, Mariquita; Yadav, Rajendra; Hanson, Christy L; Osberg, Mike; Hymoff, Aaron; Makayova, Julia

    2017-01-01

    Abstract Background Tuberculosis (TB) is the 8th leading cause of death in the Philippines. A recent prevalence survey found that there were nearly 70% more cases of tuberculosis than previously estimated. Given these new data, the National TB Program (NTP), operating through a decentralized health system, identified about 58% of the estimated new drug-sensitive (DS) TB patients in 2016. However, the NTP only identified and commenced treatment for around 17% of estimated new drug-resistant patients. In order to reach the remaining 42% of drug-sensitive patients and 83% of drug-resistant patients, it is necessary to develop a better understanding of where patients seek care. Methods National and regional patient pathway analyses (PPAs) were undertaken using existing national survey and NTP data. The PPA assessed the alignment between patient care seeking and the availability of TB diagnostic and treatment services. Results Systemic referral networks from the community-level Barangay Health Stations (BHSs) to diagnostic facilities have enabled more efficient detection of drug-sensitive tuberculosis in the public sector. Approximately 36% of patients initiated care in the private sector, where there is limited coverage of appropriate diagnostic technologies. Important differences in the alignment between care seeking patterns and diagnostic and treatment availability were found between regions. Conclusions The PPA identified opportunities for strengthening access to care for all forms of tuberculosis and for accelerating the time to diagnosis by aligning services to where patients initiate care. Geographic variations in care seeking may guide prioritization of some regions for intensified engagement with the private sector. PMID:29117352

  13. Private randomness expansion with untrusted devices

    NASA Astrophysics Data System (ADS)

    Colbeck, Roger; Kent, Adrian

    2011-03-01

    Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.

  14. System architecture for an advanced Canadian communications satellite demonstration mission

    NASA Astrophysics Data System (ADS)

    Takats, P.; Irani, S.

    1992-03-01

    An advanced communications satellite system that provides single hop interconnectivity and interworking for both a personal communications network and an advanced private business network in the Ka and Ku bands respectively, is presented. An overall network perspective is discussed that studies the interface of such an advanced satellite communication system to the terrestrial network in the context of the Open Systems Interconnection model. It is shown that this proposed satellite system can dynamically establish links and efficiently allocate the satellite resource amongst the user terminal population for a mix of data and voice traffic.

  15. 13 CFR 130.200 - Eligible entities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... operate an SBDC network: (1) A public or private institution of higher education; (2) A land-grant college or university; (3) A college or school of business, engineering, commerce or agriculture; (4) A...

  16. 13 CFR 130.200 - Eligible entities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... operate an SBDC network: (1) A public or private institution of higher education; (2) A land-grant college or university; (3) A college or school of business, engineering, commerce or agriculture; (4) A...

  17. 13 CFR 130.200 - Eligible entities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... operate an SBDC network: (1) A public or private institution of higher education; (2) A land-grant college or university; (3) A college or school of business, engineering, commerce or agriculture; (4) A...

  18. 13 CFR 130.200 - Eligible entities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... operate an SBDC network: (1) A public or private institution of higher education; (2) A land-grant college or university; (3) A college or school of business, engineering, commerce or agriculture; (4) A...

  19. Securing Mobile Networks in an Operational Setting

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Paulsen, Phillip E.; Shell, Dan

    2004-01-01

    This paper describes a network demonstration and three month field trial of mobile networking using mobile-IPv4. The network was implemented as part of the US Coast Guard operational network which is a ".mil" network and requires stringent levels of security. The initial demonstrations took place in November 2002 and a three month field trial took place from July through September of 2003. The mobile network utilized encryptors capable of NSA-approved Type 1 algorithms, mobile router from Cisco Systems and 802.11 and satellite wireless links. This paper also describes a conceptual architecture for wide-scale deployment of secure mobile networking in operational environments where both private and public infrastructure is used. Additional issues presented include link costs, placement of encryptors and running routing protocols over layer-3 encryption devices.

  20. What Will We Actually Do On the Moon?

    NASA Astrophysics Data System (ADS)

    Sherwood, Brent

    2007-01-01

    Descriptions are provided for eleven specific, representative lunar activity scenarios selected from among hundreds that arose in 2006 from the NASA-sponsored development of a "global lunar strategy." The scenarios are: pave for dust control; establish a colony of continuously active robots; kitchen science; designer biology; tend the machinery; search for pieces of ancient Earth; build simple observatories that open new wavelength regimes; establish a virtual real-time network to enable public engagement; institute a public-private lunar development corporation; rehearse planetary protection protocols for Mars; and expand life and intelligence beyond Earth through settlement of the Moon. Evocative scenarios such as these are proposed as a communications tool to help win public understanding and support of the Vision for Space Exploration.

  1. Fixing unfair advantages? Providers hope to see more transparency, networks with Medicare private fee-for-service plans in wake of veto override.

    PubMed

    Lubell, Jennifer

    2008-07-21

    The new Medicare law delivers a raft of changes. But physicians are cheering the loudest for the rollback of the 10.6% reimbursement cut and the revamping of Medicare Advantage. "It doesn't make any sense that these private plans are paid 17% more than traditional Medicare and don't have to share a dime with the hospitals or physicians," says Albert Fisk, left, a Washington state physician.

  2. Collecting and Connecting the Dots: Leveraging Technology to Enhance the Collection of Information and the Dissemination of Intelligence

    DTIC Science & Technology

    2009-09-01

    explore govern ment information sharing initiatives with the public and private sectors. 3. Immediate Consumers The immediate benefit of this thesis...comm unity as a whole should consider the benefits of for ming collaborative information sharing networks with both public and private partners to...fusion efforts as well as the benefits of staffing both JTTF and national operations centers. If not prac tical due to the size or reso urces of the

  3. Predictors of Academics' Career Advancement at Malaysian Private Universities

    ERIC Educational Resources Information Center

    Arokiasamy, Lawrence; Ismail, Maimunah; Ahmad, Aminah; Othman, Jamilah

    2011-01-01

    Purpose: This paper aims to examine the influence of individual and organizational variables on the career advancement of academics in Malaysian private universities. Design/methodology/approach: A correlation study was conducted in six private universities. Data were collected using a structured self-administered questionnaire. The dependent…

  4. All-optical VPN utilizing DSP-based digital orthogonal filters access for PONs

    NASA Astrophysics Data System (ADS)

    Zhang, Xiaoling; Zhang, Chongfu; Chen, Chen; Jin, Wei; Qiu, Kun

    2018-04-01

    Utilizing digital filtering-enabled signal multiplexing and de-multiplexing, a cost-effective all-optical virtual private network (VPN) system is proposed, for the first time to our best knowledge, in digital filter multiple access passive optical networks (DFMA-PONs). Based on the DFMA technology, the proposed system can be easily designed to meet the requirements of next generation network's flexibility, elasticity, adaptability and compatibility. Through dynamic digital filter allocation and recycling, the proposed all-optical VPN system can provide dynamic establishments and cancellations of multiple VPN communications with arbitrary traffic volumes. More importantly, due to the employment of DFMA technology, the system is not limited to a fixed signal format and different signal formats such as pulse amplitude modulation (PAM), quadrature amplitude modulation (QAM) and orthogonal frequency division multiplexing (OFDM) can be used. Moreover, one transceiver is sufficient to simultaneously transmit upstream (US)/VPN data to optical line terminal (OLT) or other VPN optical network units (ONUs), thus leading to great reduction in network constructions and operation expenditures. The proposed all-optical VPN system is demonstrated with the transceiver incorporating the formats of QAM and OFDM, which can be made transparent to downstream (DS), US and VPN communications. The bit error rates (BERs) of DS, US and VPN for OFDM signals are below the forward-error-correction (FEC) limit of 3 . 8 × 10-3 when the received optical powers are about -16.8 dBm, -14.5 dBm and -15.7 dBm, respectively.

  5. A Deterministic and Random Propagation Study with the Design of an Open Path 320 GHz to 340 GHz Transmissometer

    NASA Astrophysics Data System (ADS)

    Scally, Lawrence J.

    This program was implemented by Lawrence J. Scally for a Ph.D. under the EECE department at the University of Colorado at Boulder with most funding provided by the U.S. Army. Professor Gasiewski is the advisor and guider for the entire program; he has a strong history decades ago in this type of program. This program is developing a more advanced than previous years transmissometer, called Terahertz Atmospheric and Ionospheric Propagation, Absorption and Scattering System (TAIPAS), on an open path between the University of Colorado EE building roof and the mesa on owned by National Institute of Standards and Technology (NIST); NIST has invested money, location and support for the program. Besides designing and building the transmissometer, that has never be accomplished at this level, the system also analyzes the atmospheric propagation of frequencies by scanning between 320 GHz and 340 GHz, which includes the peak absorption frequency at 325.1529 GHz due to water absorption. The processing and characterization of the deterministic and random propagation characteristics of the atmosphere in the real world was significantly started; this will be executed with varies aerosols for decades on the permanently mounted system that is accessible 24/7 via a network over the CU Virtual Private Network (VPN).

  6. Successful public-private partnerships: The NYPD shield model.

    PubMed

    Amadeo, Vincent; Iannone, Stephen

    2017-12-01

    This article will identify the challenges that post 9/11 law enforcement faces regarding privatepublic partnerships and describe in detail the NYPD Shield programme, created to combat those challenges. Recommendations made by the 911 Commission included the incorporation of the private sector into future homeland security strategies. One such strategy is NYPD Shield. This programme is a nationally recognized award-winning public-private partnership dedicated to providing counterterrorism training and information sharing with government agencies, non-government organizations, private businesses, and the community. Information is shared through several platforms that include a dedicated website, instruction of counterterrorism training curricula, e-mail alerts, intelligence assessments and the hosting of quarterly conferences. This article also details how the NYPD Shield is providing its successful template to other law enforcement agencies enabling them to initiate similar programmes in their respective jurisdictions, and in doing so joining a National Shield Network.

  7. Struggling for a Balanced Life as a President.

    ERIC Educational Resources Information Center

    Basinger, Julianne

    2001-01-01

    Describes how women who lead colleges are forming networks to find moral support and develop their own strategies for solving professional problems and addressing the issues of juggling work and private demands. (EV)

  8. Powering the Network: The Forgotten Infrastructure.

    ERIC Educational Resources Information Center

    Learn, Larry L., Ed.

    1995-01-01

    Discusses systems that power the telecommunications infrastructure. Highlights include power for central telephone company offices; private branch exchange systems; power interruptions and power irregularities; uninterruptible power systems; problems in the systems; and photovoltaic systems. (LRW)

  9. 31 CFR 1024.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR MUTUAL FUNDS Special Standards of Diligence; Prohibitions; and Special Measures for Mutual Funds § 1024.620 Due...

  10. Cyber Hygiene for Control System Security

    DOE PAGES

    Oliver, David

    2015-10-08

    There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.

  11. JSOU and NDIA SO/LIC Division Essays (2007)

    DTIC Science & Technology

    2007-04-01

    Create several content-rich Darknet environments—a private virtual network where users connect only to people they trust7—that offer e-mail, file...chat rooms, and Darknets ). Moon: Cyber-Herding Cyber-Herding Nodes and Relationship Network Gatherer Construction Demolition Structure of Cyber-Herding...the extrem- ist messages, concentrating Web sites, and developing Darknets . A visual illustration of the entire process follows Phase 7. Phase 5

  12. A Visual Language for Situational Awareness

    DTIC Science & Technology

    2016-12-01

    listening. The arrival of the information age has delivered the ability to transfer larger volumes of data at far greater rates. Wireless digital... wireless infrastructure for use in large-scale events where domestic power and private wireless networks are overloaded or unavailable. States should...lacking by responders using ANSI INCITS 415 symbols sets.226 When combined with the power of a wireless network, a situational awareness metalanguage is

  13. To Infinity and Beyond ...: Heterarchical Governance, the Teach for All Network in Europe and the Making of Profits and Minds

    ERIC Educational Resources Information Center

    Olmedo, Antonio; Bailey, Patrick L. J.; Ball, Stephen J.

    2013-01-01

    This article explores the increasing commercialisation of education through the empirical case of Teach For All, a network of social enterprises which is spreading a new model of teacher training across Europe and around the world. This model, which is supported and funded by a heterogeneous mix of public institutions and private sector…

  14. Preserving Differential Privacy in Degree-Correlation based Graph Generation

    PubMed Central

    Wang, Yue; Wu, Xintao

    2014-01-01

    Enabling accurate analysis of social network data while preserving differential privacy has been challenging since graph features such as cluster coefficient often have high sensitivity, which is different from traditional aggregate functions (e.g., count and sum) on tabular data. In this paper, we study the problem of enforcing edge differential privacy in graph generation. The idea is to enforce differential privacy on graph model parameters learned from the original network and then generate the graphs for releasing using the graph model with the private parameters. In particular, we develop a differential privacy preserving graph generator based on the dK-graph generation model. We first derive from the original graph various parameters (i.e., degree correlations) used in the dK-graph model, then enforce edge differential privacy on the learned parameters, and finally use the dK-graph model with the perturbed parameters to generate graphs. For the 2K-graph model, we enforce the edge differential privacy by calibrating noise based on the smooth sensitivity, rather than the global sensitivity. By doing this, we achieve the strict differential privacy guarantee with smaller magnitude noise. We conduct experiments on four real networks and compare the performance of our private dK-graph models with the stochastic Kronecker graph generation model in terms of utility and privacy tradeoff. Empirical evaluations show the developed private dK-graph generation models significantly outperform the approach based on the stochastic Kronecker generation model. PMID:24723987

  15. INFORMAS (International Network for Food and Obesity/non-communicable diseases Research, Monitoring and Action Support): overview and key principles.

    PubMed

    Swinburn, B; Sacks, G; Vandevijvere, S; Kumanyika, S; Lobstein, T; Neal, B; Barquera, S; Friel, S; Hawkes, C; Kelly, B; L'abbé, M; Lee, A; Ma, J; Macmullan, J; Mohan, S; Monteiro, C; Rayner, M; Sanders, D; Snowdon, W; Walker, C

    2013-10-01

    Non-communicable diseases (NCDs) dominate disease burdens globally and poor nutrition increasingly contributes to this global burden. Comprehensive monitoring of food environments, and evaluation of the impact of public and private sector policies on food environments is needed to strengthen accountability systems to reduce NCDs. The International Network for Food and Obesity/NCDs Research, Monitoring and Action Support (INFORMAS) is a global network of public-interest organizations and researchers that aims to monitor, benchmark and support public and private sector actions to create healthy food environments and reduce obesity, NCDs and their related inequalities. The INFORMAS framework includes two 'process' modules, that monitor the policies and actions of the public and private sectors, seven 'impact' modules that monitor the key characteristics of food environments and three 'outcome' modules that monitor dietary quality, risk factors and NCD morbidity and mortality. Monitoring frameworks and indicators have been developed for 10 modules to provide consistency, but allowing for stepwise approaches ('minimal', 'expanded', 'optimal') to data collection and analysis. INFORMAS data will enable benchmarking of food environments between countries, and monitoring of progress over time within countries. Through monitoring and benchmarking, INFORMAS will strengthen the accountability systems needed to help reduce the burden of obesity, NCDs and their related inequalities. © 2013 The Authors. Obesity Reviews published by John Wiley & Sons Ltd on behalf of the International Association for the Study of Obesity.

  16. Natural Hazards and Supply Chain Disruptions

    NASA Astrophysics Data System (ADS)

    Haraguchi, M.

    2016-12-01

    Natural hazards distress the global economy through disruptions in supply chain networks. Moreover, despite increasing investment to infrastructure for disaster risk management, economic damages and losses caused by natural hazards are increasing. Manufacturing companies today have reduced inventories and streamlined logistics in order to maximize economic competitiveness. As a result, today's supply chains are profoundly susceptible to systemic risks, which are the risk of collapse of an entire network caused by a few node of the network. For instance, the prolonged floods in Thailand in 2011 caused supply chain disruptions in their primary industries, i.e. electronic and automotive industries, harming not only the Thai economy but also the global economy. Similar problems occurred after the Great East Japan Earthquake and Tsunami in 2011, the Mississippi River floods and droughts during 2011 - 2013, and the Earthquake in Kumamoto Japan in 2016. This study attempts to discover what kind of effective measures are available for private companies to manage supply chain disruptions caused by floods. It also proposes a method to estimate potential risks using a Bayesian network. The study uses a Bayesian network to create synthetic networks that include variables associated with the magnitude and duration of floods, major components of supply chains such as logistics, multiple layers of suppliers, warehouses, and consumer markets. Considering situations across different times, our study shows desirable data requirements for the analysis and effective measures to improve Value at Risk (VaR) for private enterprises and supply chains.

  17. Security Issues for Mobile Medical Imaging: A Primer.

    PubMed

    Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George

    2015-10-01

    The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.

  18. The CIRTL Network: A Professional Development Network for Future STEM Faculty

    NASA Astrophysics Data System (ADS)

    Herbert, B. E.

    2011-12-01

    The Center for the Integration of Research, Teaching, and Learning (CIRTL) is an NSF Center for Learning and Teaching in higher education using the professional development of graduate students and post-doctoral scholars as the leverage point to develop a national STEM faculty committed to implementing and advancing effective teaching practices for diverse student audiences as part of successful professional careers. The goal of CIRTL is to improve the STEM learning of all students at every college and university, and thereby to increase the diversity in STEM fields and the STEM literacy of the nation. The CIRTL network seeks to support change at a number of levels to support its goals: individual, classroom, institutional, and national. To bring about change, which is never easy, the CIRTL network has developed a conceptual model or change model that is thought to support the program objectives. Three central concepts, Teaching-as-Research, Learning Communities, and Learning-through-Diversity, underlie the design of all CIRTL activities. STEM faculty use research methods to systematically and reflectively improve learning outcomes. This work is done within a community of shared learning and discovery, and explicitly recognizes that effective teaching capitalizes on the rich array of experiences, backgrounds, and skills among the students and instructors to enhance the learning of all. This model is being refined and tested through a networked-design experiment, where the model is tested in diverse settings. Established in fall 2006, the CIRTL Network comprises the University of Colorado at Boulder (CU), Howard University, Michigan State University, Texas A&M University, Vanderbilt University, and the University of Wisconsin-Madison. The diversity of these institutions is by design: private/public; large/moderate size; majority-/minority-serving; geographic location. This talk will describe the theoretical constructs and efficacy of Teaching-as Research as a central design element of the CIRTL network model. Teaching-as-Research involves the deliberate, systematic, and reflective use of research methods to develop and implement teaching practices that advance the learning experiences and outcomes of students. CIRTL envision three types of learning outcomes for CIRTL participants: CIRTL Fellow, CIRTL Practitioner, and CIRTL Scholar. These three, tiered learning outcomes recognize the role of the CIRTL pillars in effective teaching (Fellow), scholarly teaching that builds on the CIRTL pillars to demonstrably improve learning and make the results public (Practitioner), and finally scholarship that advances teaching and learning under peer review (Scholar). CIRTL program outcomes conceived in this way permit anyone to enter the CIRTL Network learning community from a wide variety of disciplines, needs, and past experiences, and to achieve success as an instructor in diverse contexts.

  19. Factors influencing physiotherapists' attitudes and beliefs toward chronic low back pain: Impact of a care network belonging.

    PubMed

    Petit, Audrey; Begue, Cyril; Richard, Isabelle; Roquelaure, Yves

    2018-03-09

    To assess the attitudes and beliefs of physiotherapists (PTs) regarding the management of chronic LBP and to investigate the factors which influence them. A cross-sectional study conducted in the French Loire Valley region by a questionnaire sent to the private PTs between June and September 2014. Demographic data and modalities of practices were collected in association with the Pain Attitudes and Beliefs Scale (PABS) which is a specific self-administered questionnaire designed to assess the "biomedical" or "behavioral" (i.e., biopsychosocial) management orientation of PTs toward chronic LBP. One hundred and sixty-eight of the 704 PTs entirely completed the questionnaire (63% of men, 58% >40 years of age) of whom 15 were involved in a LBP care network. A higher biomechanical score was observed with a higher age and lower with full-time employment, less than 20 years of length of practice and a recent LBP-specific training (p < 0.005). Belonging to a LBP care network was associated with a lower biomedical score (p < 0.01) and a higher biopsychosocial score (p < 0.005). Belonging to a LBP care network, which implies closer collaboration with multidisciplinary rehabilitation teams, was the most significant factor associated with higher biopsychosocial beliefs in PTs toward chronic LBP management.

  20. Network Computing Infrastructure to Share Tools and Data in Global Nuclear Energy Partnership

    NASA Astrophysics Data System (ADS)

    Kim, Guehee; Suzuki, Yoshio; Teshima, Naoya

    CCSE/JAEA (Center for Computational Science and e-Systems/Japan Atomic Energy Agency) integrated a prototype system of a network computing infrastructure for sharing tools and data to support the U.S. and Japan collaboration in GNEP (Global Nuclear Energy Partnership). We focused on three technical issues to apply our information process infrastructure, which are accessibility, security, and usability. In designing the prototype system, we integrated and improved both network and Web technologies. For the accessibility issue, we adopted SSL-VPN (Security Socket Layer-Virtual Private Network) technology for the access beyond firewalls. For the security issue, we developed an authentication gateway based on the PKI (Public Key Infrastructure) authentication mechanism to strengthen the security. Also, we set fine access control policy to shared tools and data and used shared key based encryption method to protect tools and data against leakage to third parties. For the usability issue, we chose Web browsers as user interface and developed Web application to provide functions to support sharing tools and data. By using WebDAV (Web-based Distributed Authoring and Versioning) function, users can manipulate shared tools and data through the Windows-like folder environment. We implemented the prototype system in Grid infrastructure for atomic energy research: AEGIS (Atomic Energy Grid Infrastructure) developed by CCSE/JAEA. The prototype system was applied for the trial use in the first period of GNEP.

  1. Divergent modes of integration: the Canadian way.

    PubMed

    Jiwani, Izzat; Fleury, Marie-Josée

    2011-01-01

    The paper highlights key trajectories and outcomes of the recent policy developments toward integrated health care delivery systems in Quebec and Ontario in the primary care sector and in the development of regional networks of health and social services. It particularly explores how policy legacies, interests and cultures may be mitigated to develop and sustain different models of integrated health care that are pertinent to the local contexts. In Quebec, three decades of iterative developments in health and social services evolved in 2005 into integrated centres for health and social services at the local levels (CSSSs). Four integrated university-based health care networks provide ultra-specialised services. Family Medicine Groups and network clinics are designed to enhance access and continuity of care. Ontario's Family Health Teams (2004) constitute an innovative public funding for private delivery model that is set up to enhance the capacity of primary care and to facilitate patient-based care. Ontario's Local Health Integration Networks (LHINs) with autonomous boards of provider organisations are intended to coordinate and integrate care. Integration strategies in Quebec and Ontario yield clinical autonomy and power to physicians while simultaneously making them key partners in change. Contextual factors combined with increased and varied forms of physician remunerations and incentives mitigated some of the challenges from policy legacies, interests and cultures. Virtual partnerships and accountability agreements between providers promise positive but gradual movement toward integrated health service systems.

  2. Working with the private sector for child health.

    PubMed

    Waters, Hugh; Hatt, Laurel; Peters, David

    2003-06-01

    Private sector providers are the most commonly consulted source of care for child illnesses in many countries, offering significant opportunities to expand the reach of essential child health services and products. Yet collaboration with private providers presents major challenges - the suitability and quality of the services they provide is often questionable and governments' capacity to regulate them is limited. This article assesses the actual and potential contributions of the private sector to child health, and classifies and evaluates public sector strategies to promote and rationalize the contributions of private sector actors. Governments and international organizations can use a variety of strategies to collaborate with and influence private sector actors to improve child health - including contracting, regulating, financing and social marketing, training, coordinating and informing the public. These mutually reinforcing strategies can both improve the quality of services currently delivered in the private sector, and expand and rationalize the coverage of these services. One lesson from this review is that the private sector is very heterogeneous. At the country level, feasible strategies depend on the potential of the different components of the private sector and the capacity of governments and their partners for collaboration. To date, experience with private sector strategies offers considerable promise for children's health, but also raises many questions about the feasibility and impact of these strategies. Where possible, future interventions should be designed as experiments, with careful assessment of the intervention design and the environment in which they are implemented.

  3. Public/Private Partnership Programs.

    ERIC Educational Resources Information Center

    District of Columbia Public Schools, Washington, DC.

    This document presents the Public/Private Partnership Programs, a school-community project developed in 1981 by the District of Columbia public schools and the private sector community to provide career-focused high school programs. The project was designed to motivate and support young people to stay in school, graduate from high school, and…

  4. Answers to the 50 Most Important Questions about Private Mental Health Practice.

    ERIC Educational Resources Information Center

    Forman, Bruce D.; Silverman, Wade H.

    Designed for anyone contemplating or presently established in private mental health practice, this book provides the answers to 50 pertinent questions concerning private practice. Questions were culled from a survey of graduate students in psychology, as well as experienced psychotherapists, psychiatrists, social workers, mental health counselors,…

  5. The Current Use of Social Media in Neurosurgery.

    PubMed

    Alotaibi, Naif M; Badhiwala, Jetan H; Nassiri, Farshad; Guha, Daipayan; Ibrahim, George M; Shamji, Mohammed F; Lozano, Andres M

    2016-04-01

    To measure the presence and popularity of neurosurgical departments, journals, and nonprofit organizations on 3 major social networks. A systematic 2-pronged search strategy was used in June 2015 to identify all accounts on Facebook, Twitter, and YouTube that were relevant to neurosurgery. Online search was conducted by 2 independent authors. All accounts were ranked according to their popularity data. Our search yielded 158 social media accounts (86 Facebook, 59 Twitter, and 13 YouTube) of neurosurgical private and academic practice departments. Of the 158 accounts we retrieved, 117 were for private practice centers (74%). Accounts of academic and private departments had a similar median number of "likes" and "followers" on Facebook and Twitter, respectively. Seven neurosurgical journals only had active Facebook and Twitter accounts (of 20 screened journals). When compared with studies of social media in other medical subspecialties, the use of these networks in neurosurgery followed a similar pattern in their presence and popularity. The current study shows different uses of social media platforms and numbers of users of the online neurosurgical community. Content optimization, advanced metrics of user engagement, and their subsequent effects on academic impact remain unanswered queries and require further prospective study. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. [Emergency care for victims of violence and accidents: differences in the epidemiological profile between the public and private health services. VIVA--Campinas, São Paulo, Brazil, 2009].

    PubMed

    Belon, Ana Paula; da Silveira, Naoko Yanagizawa Jardim; Barros, Marilisa Berti de Azevedo; Baldo, Caroline; da Silva, Marta Maria Alves

    2012-09-01

    The scope of this study is to analyze the differences in the profile of emergency care for external causes between public and private emergency departments. With data come from VIVA-Campinas 2009, the association between the nature of healthcare and the characteristics of the victims was verified using the chi-square test. Using Poisson regression, proportion ratios of care in the public and private network were estimated. In the sample of 1094 victims, 67.8% were treated by public health. Traffic accidents, animal-related accidents, and assaults were 2 times higher in public units, whereas collisions with objects and sprains were 75% and 2.7 times higher in private units. Cranium-encephalic trauma/polytrauma and cuts/lacerations were 3.8 times and 61% more frequent in public care, while victims with no injuries, with dislocations/sprains or fractures being predominant in private care. Head and multiple organ injuries, road accident and work-related injuries, the use of public transport or mobile emergency care services/ambulances were predominant in public care. Revealing significant differences in care in public and private care can contribute to the organization of healthcare.

  7. Institutionalisation in a Newly Created Private University

    ERIC Educational Resources Information Center

    Hodson, Peter; Connolly, Michael; Younes, Said

    2008-01-01

    Purpose: The purpose of this paper is to examine the introduction of a quality assurance system in a new, private university in Syria, and considers the extent to which the theoretical model based on institutional theory and isomorphism is reflected in practice. Design/methodology/approach: A five year longitudinal study which reviews the design,…

  8. Online Tutoring and Emotional Labour in the Private Sector

    ERIC Educational Resources Information Center

    Webb, Sue

    2012-01-01

    Purpose: What happens when computer software is designed to replace the teacher and the human role is to service the relationship between the software and the learner? Specifically, this paper aims to consider whether or not emotional labour is performed in contexts mediated by technology in the private sector. Design/methodology/approach: The…

  9. The Need for Private Universities in Japan to Be Agents of Change

    ERIC Educational Resources Information Center

    Zhang, Rong; McCornac, Dennis C.

    2013-01-01

    Purpose: The purpose of this paper is to examine a number of current innovations made by private higher educational institutions in Japan to counter decreased enrollments and financial constraints. Design/methodology/approach: The design of this study is both descriptive and conceptual, based on the latest data available. Additional information…

  10. Developing Countries Vaccine Manufacturers Network: doing good by making high-quality vaccines affordable for all.

    PubMed

    Pagliusi, Sonia; Leite, Luciana C C; Datla, Mahima; Makhoana, Morena; Gao, Yongzhong; Suhardono, Mahendra; Jadhav, Suresh; Harshavardhan, Gutla V J A; Homma, Akira

    2013-04-18

    The Developing Countries Vaccine Manufacturers Network (DCVMN) is a unique model of a public and private international alliance. It assembles governmental and private organizations to work toward a common goal of manufacturing and supplying high-quality vaccines at affordable prices to protect people around the world from known and emerging infectious diseases. Together, this group of manufacturers has decades of experience in manufacturing vaccines, with technologies, know-how, and capacity to produce more than 40 vaccines types. These manufacturers have already contributed more than 30 vaccines in various presentations that have been prequalified by the World Health Organization for use by global immunization programmes. Furthermore, more than 45 vaccines are in the pipeline. Recent areas of focus include vaccines to protect against rotavirus, human papillomavirus (HPV), Japanese encephalitis, meningitis, hepatitis E, poliovirus, influenza, and pertussis, as well as combined pentavalent vaccines for children. The network has a growing number of manufacturers that produce a growing number of products to supply the growing demand for vaccines in developing countries. Copyright © 2013. Published by Elsevier Ltd.

  11. Health Insurance Trajectories and Long-Term Survival After Heart Transplantation.

    PubMed

    Tumin, Dmitry; Foraker, Randi E; Smith, Sakima; Tobias, Joseph D; Hayes, Don

    2016-09-01

    Health insurance status at heart transplantation influences recipient survival, but implications of change in insurance for long-term outcomes are unclear. Adults aged 18 to 64 receiving first-time orthotopic heart transplants between July 2006 and December 2013 were identified in the United Network for Organ Sharing registry. Patients surviving >1 year were categorized according to trajectory of insurance status (private compared with public) at wait listing, transplantation, and 1-year follow-up. The most common insurance trajectories were continuous private coverage (44%), continuous public coverage (27%), and transition from private to public coverage (11%). Among patients who survived to 1 year (n=9088), continuous public insurance (hazard ratio =1.36; 95% confidence interval 1.19, 1.56; P<0.001) and transition from private to public insurance (hazard ratio =1.25; 95% confidence interval 1.04, 1.50; P=0.017) were associated with increased mortality hazard relative to continuous private insurance. Supplementary analyses of 11 247 patients included all durations of post-transplant survival and examined post-transplant private-to-public and public-to-private transitions as time-varying covariates. In these analyses, transition from private to public insurance was associated with increased mortality hazard (hazard ratio =1.25; 95% confidence interval 1.07, 1.47; P=0.005), whereas transition from public to private insurance was associated with lower mortality hazard (hazard ratio =0.78; 95% confidence interval 0.62, 0.97; P=0.024). Transition from private to public insurance after heart transplantation is associated with worse long-term outcomes, compounding disparities in post-transplant survival attributed to insurance status at transplantation. By contrast, post-transplant gain of private insurance among patients receiving publicly funded heart transplants was associated with improved outcomes. © 2016 American Heart Association, Inc.

  12. Evaluation of available data sources to prioritize parishes for arsenic monitoring and outreach related to private well drinking water.

    PubMed

    Katner, Adrienne; Lackovic, Michelle; Streva, Kate; Paul, Vanessa; Trachtman, William Clay

    2015-01-01

    The objective of this assessment was to identify and evaluate data sets for use in the surveillance of arsenic hazards and private well drinking water use in Louisiana. Features, strengths, and limitations of the data sets are described, and prioritization criteria are applied to identify areas in need of further monitoring or outreach. Recent efforts have been made by the Environmental Public Health Tracking Network to evaluate the quality of private well water data for the purpose of supporting state and national surveillance activities. Like most states, Louisiana does not collect or mandate reporting of private well water quality data. Therefore, responding to public concerns about private well water quality requires an identification and evaluation of existing data. Data evaluated include measures of arsenic in groundwater and soil, private well water use, and biomonitoring results. The Environmental Protection Agency's Safe Drinking Water Information System and the US Geological Survey's Water Use data set were the most informative, nationally available data sets for conducting private well water arsenic surveillance. Three priority parishes were identified on the basis of a selection criteria, although all parishes require more private well sampling data. While the data reviewed enabled preliminary identification of parishes in need of monitoring and outreach, data limitations (particularly, a lack of statewide well water quality data) prevent a comprehensive evaluation of well water arsenic hazards and private well water use. A large number of unregistered wells further impede risk determination. Reliance on existing data sources is necessary, but development of metadata documentation is essential to prevent data misinterpretation. Increased outreach and policies to promote or mandate private well testing and reporting are needed to enable a comprehensive private well water tracking system.

  13. 76 FR 5178 - Statement of Organization, Functions, and Delegations of Authority

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-28

    ... and advocacy network to serve eligible beneficiaries of the program; paying benefits and handling... coordinating with a number of public and private entities, including the Department of the Treasury, the Social...

  14. System Access | High-Performance Computing | NREL

    Science.gov Websites

    ) systems. Photo of man looking at a large computer monitor with a colorful, visual display of data. System secure shell gateway (SSH) or virtual private network (VPN). User Accounts Request a user account

  15. Characteristics of private partners in Chiranjeevi Yojana, a public-private-partnership to promote institutional births in Gujarat, India - Lessons for universal health coverage.

    PubMed

    Iyer, Veena; Sidney, Kristi; Mehta, Rajesh; Mavalankar, Dileep; De Costa, Ayesha

    2017-01-01

    The Chiranjeevi Yojana (CY) is a Public-Private-Partnership between the state and private obstetricians in Gujarat, India, since 2007. The state pays for institutional births of the most vulnerable households (below-poverty-line and tribal) in private hospitals. An innovative remuneration package has been designed to disincentivise unnecessary cesareans. This study examines characteristics of private facilities which participated in the program. We conducted a cross-sectional survey of all facilities which had conducted any births between June 2012 and April 2013 in three districts. We identified 111 private and 47 public facilities. Ninety of the 111 private facilities did caesarean sections in the last three months and were eligible to participate in the CY program. Of these, 40 (44%) participated in the CY program. We conducted descriptive and bivariate analyses followed by a Poisson regression model to estimate prevalence ratios of facility characteristics that predicted participation. We found that facilities participating in the CY program had a significantly higher likelihood of being general facilities (PR 1.9, 95% CI 1.3-2.9), or conducting lower proportion of cesarean births (PR 2.1, 95% CI 1.2-3.5) or having obstetricians new in private practice (PR 1.9, 95% CI 1.2-3.1) or being less expensive (PR 1.8, 95% CI 1.1-3.0). But none of these factors retained significance in a multi variable model. Private obstetricians who participate in the CY program tend to be new to private practice, provide general services, conduct fewer caesareans and are also less expensive. This is advantageous to the PPP and widens the target beneficiary groups that can be serviced by the PPP. The state should design remuneration packages with the aim of attracting relatively new obstetricians to set up practices in more remote areas. It is possible that the CY remuneration package design is effective in keeping caesarean rates in check, and needs to be studied further.

  16. The Brazilian health system between norms and facts: mitigated universalization and subsidized stratification.

    PubMed

    Bahia, Lígia

    2009-01-01

    This paper will focus on recent changes in the relationships between the public and the private sector within the health assistance network, by analyzing selected information on health services and on legal rules related to supporting the private assistance subsystem. This approach recasts analyses which articulate the simultaneous examination of both the material and political instances that permanently redefine the range of activity of SUS. Considering the limitations of the empirical bases here analyzed, one questions the implied assumptions in the meanings of autonomy sustained both in the public and in the private components, departing from hypotheses on the delineation of independent tendencies toward the expansion of universal coverage and he restratification of supply and demand.

  17. Making "social" safer: are Facebook and other online networks becoming less hazardous for health professionals?

    PubMed

    George, Daniel R

    2012-01-01

    Major concerns about privacy have limited health professionals' usage of popular social networking sites such as Facebook. However, the landscape of social media is changing in favor of more sophisticated privacy controls that enable users to more carefully manage public and private information. This evolution in technology makes it potentially less hazardous for health professionals to consider accepting colleagues and patients into their online networks, and invites medicine to think constructively about how social media may add value to contemporary healthcare.

  18. Evaluation of Tools for Protection of Interest against Hacking and Cracking

    NASA Astrophysics Data System (ADS)

    Jahankhani, Hossein; Antonijevic, Branko; Walcott, Terry

    The internet considered a tool that effectively ensures communication globally has been hindered by hackers and crackers continuously. In so doing, a multitude of network facilitated tools such as firewalls, virtual private networks (VPN) and a variety of antivirus software packages has been enabled for dealing with such predicaments. However, more often than not these facilitated tools are marketed as perfect solutions to the ever culminating problems such as loss of data and privacy in networked and world wide intercommunications. We provide a forum for addressing these perceived problems in this paper.

  19. 17 CFR 230.405 - Definitions of terms.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... purchased for the account of plan participants, at prices not in excess of current market prices at the time...) Once an issuer qualifies as a foreign private issuer, it will immediately be able to use the forms and... foreign private issuer governs its eligibility to use the forms and rules designated for foreign private...

  20. 45 CFR 261.12 - What is an individual responsibility plan?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...: (a) Should set an employment goal and a plan for moving immediately into private-sector employment... doing other things that will help the individual become or remain employed in the private sector; (c) Should be designed to move the individual into whatever private-sector employment he or she is capable of...

  1. Teachers' Organisational Behaviour in Public and Private Funded Schools

    ERIC Educational Resources Information Center

    Honingh, M. E.; Oort, F. J.

    2009-01-01

    Purpose: The purpose of this paper is to compare teachers' organisational behaviour in publicly- and privately-funded schools in the Dutch Vocational Education and Training (VET) sector. Design/methodology/approach: A percentage of all middle managers in publicly and privately funded schools (72 per cent and 43 per cent respectively) distributed…

  2. Perspectives of Increase of University Education Effectiveness: Use of Private Educational Resources

    ERIC Educational Resources Information Center

    Tyurina, Yulia; Troyanskaya, Maria

    2017-01-01

    Purpose: The purpose of this paper is to determine the perspectives of increase of effectiveness of university education, related to the use of private educational resources. Design/Methodology/ Approach: In order to determine the dependence of effectiveness of university education on the use of private educational resources, this work uses the…

  3. Using Pesticides: Private Applicator Manual, Texas.

    ERIC Educational Resources Information Center

    Texas A and M Univ., College Station. Texas Agricultural Extension Service.

    This manual is designed by the Texas Department of Agriculture as a training program for private pesticide applicators to certify them on a voluntary basis, and to apply restricted-use pesticides in compliance with federal law. An introduction with federal and state laws and regulations regarding pesticide use and private applicators is presented.…

  4. The Academic and Social Life Styles of Students and Teachers of Higher Education Institutions in Bangladesh as Consequences of Using Social Network Sites

    ERIC Educational Resources Information Center

    Clement, Che Kum

    2014-01-01

    With the emergence of social network sites (SNS), students and teachers of higher education institutions all over the world have been making efforts to meet up with the demands of these information and communication technology (ICT) tools. This paper presents the findings of a study conducted at four private universities in Bangladesh with the aim…

  5. Automatic Identification System modular receiver for academic purposes

    NASA Astrophysics Data System (ADS)

    Cabrera, F.; Molina, N.; Tichavska, M.; Araña, V.

    2016-07-01

    The Automatic Identification System (AIS) standard is encompassed within the Global Maritime Distress and Safety System (GMDSS), in force since 1999. The GMDSS is a set of procedures, equipment, and communication protocols designed with the aim of increasing the safety of sea crossings, facilitating navigation, and the rescue of vessels in danger. The use of this system not only is increasingly attractive to security issues but also potentially creates intelligence products throughout the added-value information that this network can transmit from ships on real time (identification, position, course, speed, dimensions, flag, among others). Within the marine electronics market, commercial receivers implement this standard and allow users to access vessel-broadcasted information if in the range of coverage. In addition to satellite services, users may request actionable information from private or public AIS terrestrial networks where real-time feed or historical data can be accessed from its nodes. This paper describes the configuration of an AIS receiver based on a modular design. This modular design facilitates the evaluation of specific modules and also a better understanding of the standard and the possibility of changing hardware modules to improve the performance of the prototype. Thus, the aim of this paper is to describe the system's specifications, its main hardware components, and to present educational didactics on the setup and use of a modular and terrestrial AIS receiver. The latter is for academic purposes and in undergraduate studies such as electrical engineering, telecommunications, and maritime studies.

  6. 20 CFR 669.370 - What intensive services may be provided to eligible MSFW's?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... activities; (2) Allowance payments; (3) Work experience, which: (i) Is designed to promote the development of good work habits and basic work skills at the work-site (work experience may be conducted with the public and private non-profit sectors and with the private for-profit sector when the design for this...

  7. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does notmore » consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.« less

  8. Quantifying patron needs at intermodal facilities.

    DOT National Transportation Integrated Search

    2011-07-01

    New Jersey has a varied network of commuter rail, light rail, bus, paratransit, county and private : shuttle services. These services meet a range of needs including commuter travel to major : employment centers, local bus service for various trip pu...

  9. Transit Fare Prepayment Distribution Methods in Sacramento, CA

    DOT National Transportation Integrated Search

    1985-06-01

    This demonstration tested the use of new methods to distribute transit fare prepayment (TFP) instruments at the Sacramento Regional Transit district (RT). Five new distribution methods were implemented to supplement a network of public, private, and ...

  10. An overview of the DII-HEP OpenStack based CMS data analysis

    NASA Astrophysics Data System (ADS)

    Osmani, L.; Tarkoma, S.; Eerola, P.; Komu, M.; Kortelainen, M. J.; Kraemer, O.; Lindén, T.; Toor, S.; White, J.

    2015-05-01

    An OpenStack based private cloud with the Cluster File System has been built and used with both CMS analysis and Monte Carlo simulation jobs in the Datacenter Indirection Infrastructure for Secure High Energy Physics (DII-HEP) project. On the cloud we run the ARC middleware that allows running CMS applications without changes on the job submission side. Our test results indicate that the adopted approach provides a scalable and resilient solution for managing resources without compromising on performance and high availability. To manage the virtual machines (VM) dynamically in an elastic fasion, we are testing the EMI authorization service (Argus) and the Execution Environment Service (Argus-EES). An OpenStackplugin has been developed for Argus-EES. The Host Identity Protocol (HIP) has been designed for mobile networks and it provides a secure method for IP multihoming. HIP separates the end-point identifier and locator role for IP address which increases the network availability for the applications. Our solution leverages HIP for traffic management. This presentation gives an update on the status of the work and our lessons learned in creating an OpenStackbased cloud for HEP.

  11. Introductory Overview of the Natural Experiments for Translation in Diabetes 2.0 (NEXT-D2) Network: Examining the Impact of US Health Policies and Practices to Prevent Diabetes and Its Complications.

    PubMed

    Duru, O Kenrik; Mangione, Carol M; Rodriguez, Hector P; Ross-Degnan, Dennis; Wharam, J Frank; Black, Bernard; Kho, Abel; Huguet, Nathalie; Angier, Heather; Mayer, Victoria; Siscovick, David; Kraschnewski, Jennifer L; Shi, Lizheng; Nauman, Elizabeth; Gregg, Edward W; Ali, Mohammed K; Thornton, Pamela; Clauser, Steven

    2018-02-05

    Diabetes incidence is rising among vulnerable population subgroups including minorities and individuals with limited education. Many diabetes-related programs and public policies are unevaluated while others are analyzed with research designs highly susceptible to bias which can result in flawed conclusions. The Natural Experiments for Translation in Diabetes 2.0 (NEXT-D2) Network includes eight research centers and three funding agencies using rigorous methods to evaluate natural experiments in health policy and program delivery. NEXT-D2 research studies use quasi-experimental methods to assess three major areas as they relate to diabetes: health insurance expansion; healthcare financing and payment models; and innovations in care coordination. The studies will report on preventive processes, achievement of diabetes care goals, and incidence of complications. Some studies assess healthcare utilization while others focus on patient-reported outcomes. NEXT-D2 examines the effect of public and private policies on diabetes care and prevention at a critical time, given ongoing and rapid shifts in the US health policy landscape.

  12. Correlation between Thermodynamic Efficiency and Ecological Cyclicity for Thermodynamic Power Cycles

    PubMed Central

    Layton, Astrid; Reap, John; Bras, Bert; Weissburg, Marc

    2012-01-01

    A sustainable global community requires the successful integration of environment and engineering. In the public and private sectors, designing cyclical (“closed loop”) resource networks increasingly appears as a strategy employed to improve resource efficiency and reduce environmental impacts. Patterning industrial networks on ecological ones has been shown to provide significant improvements at multiple levels. Here, we apply the biological metric cyclicity to 28 familiar thermodynamic power cycles of increasing complexity. These cycles, composed of turbines and the like, are scientifically very different from natural ecosystems. Despite this difference, the application results in a positive correlation between the maximum thermal efficiency and the cyclic structure of the cycles. The immediate impact of these findings results in a simple method for comparing cycles to one another, higher cyclicity values pointing to those cycles which have the potential for a higher maximum thermal efficiency. Such a strong correlation has the promise of impacting both natural ecology and engineering thermodynamics and provides a clear motivation to look for more fundamental scientific connections between natural and engineered systems. PMID:23251638

  13. The letter: private text or public place? The Mattioli-Gesner controversy about the aconitum primum.

    PubMed

    Delisle, Candice

    2004-01-01

    From 1555 to 1565, Pietro Andrea Mattioli and Conrad Gesner were locked in controversy over the veracity of Mattioli's picture of aconitum primum. This dispute led to numerous vehement publications and to intensive exchanges of letters, not only between the protagonists but also within their own and sometimes inter-connected networks of correspondence. This dispute illustrates how 16th-century scholars played upon the ambiguous place of these letters between private and public space to deal with controversy in the Republic of Letters.

  14. Public-private partnerships in practice: collaborating to improve health finance policy in Ghana and Kenya.

    PubMed

    Suchman, Lauren; Hart, Elizabeth; Montagu, Dominic

    2018-06-13

    Social health insurance (SHI), one mechanism for achieving universal health coverage, has become increasingly important in low- and middle-income countries (LMICs) as they work to achieve this goal. Although small private providers supply a significant proportion of healthcare in LMICs, integrating these providers into SHI systems is often challenging. Public-private partnerships in health are one way to address these challenges, but we know little about how these collaborations work, how effectively, and why. Drawing on semi-structured interviews conducted with National Health Insurance (NHI) officials in Kenya and Ghana, as well as with staff from several international NGOs (INGOs) representing social franchise networks that are partnering to increase private provider accreditation into the NHIs, this article examines one example of public-private collaboration in practice. We found that interviewees initially had incomplete knowledge about the potential for cross-sector synergy, but both sides were motivated to work together around shared goals and the potential for mutual benefit. The public-private relationship then evolved over time through regular face-to-face interactions, reciprocal feedback, and iterative workplan development. This process led to a collegial relationship that also has given small private providers more voice in the health system. In order to sustain this relationship, we recommend that both public and private sector representatives develop formalized protocols for working together, as well as less formal open channels for communication. Models for aggregating small private providers and delivering them to government programmes as a package have potential to facilitate public-private partnerships as well, but there is little evidence on how these models work in LMICs thus far.

  15. NASA/DOD Aerospace Knowledge Diffusion Research Project. Paper 39: The role of computer networks in aerospace engineering

    NASA Technical Reports Server (NTRS)

    Bishop, Ann P.; Pinelli, Thomas E.

    1994-01-01

    This paper presents selected results from an empirical investigation into the use of computer networks in aerospace engineering. Such networks allow aerospace engineers to communicate with people and access remote resources through electronic mail, file transfer, and remote log-in. The study drew its subjects from private sector, government and academic organizations in the U.S. aerospace industry. Data presented here were gathered in a mail survey, conducted in Spring 1993, that was distributed to aerospace engineers performing a wide variety of jobs. Results from the mail survey provide a snapshot of the current use of computer networks in the aerospace industry, suggest factors associated with the use of networks, and identify perceived impacts of networks on aerospace engineering work and communication.

  16. cisPath: an R/Bioconductor package for cloud users for visualization and management of functional protein interaction networks.

    PubMed

    Wang, Likun; Yang, Luhe; Peng, Zuohan; Lu, Dan; Jin, Yan; McNutt, Michael; Yin, Yuxin

    2015-01-01

    With the burgeoning development of cloud technology and services, there are an increasing number of users who prefer cloud to run their applications. All software and associated data are hosted on the cloud, allowing users to access them via a web browser from any computer, anywhere. This paper presents cisPath, an R/Bioconductor package deployed on cloud servers for client users to visualize, manage, and share functional protein interaction networks. With this R package, users can easily integrate downloaded protein-protein interaction information from different online databases with private data to construct new and personalized interaction networks. Additional functions allow users to generate specific networks based on private databases. Since the results produced with the use of this package are in the form of web pages, cloud users can easily view and edit the network graphs via the browser, using a mouse or touch screen, without the need to download them to a local computer. This package can also be installed and run on a local desktop computer. Depending on user preference, results can be publicized or shared by uploading to a web server or cloud driver, allowing other users to directly access results via a web browser. This package can be installed and run on a variety of platforms. Since all network views are shown in web pages, such package is particularly useful for cloud users. The easy installation and operation is an attractive quality for R beginners and users with no previous experience with cloud services.

  17. cisPath: an R/Bioconductor package for cloud users for visualization and management of functional protein interaction networks

    PubMed Central

    2015-01-01

    Background With the burgeoning development of cloud technology and services, there are an increasing number of users who prefer cloud to run their applications. All software and associated data are hosted on the cloud, allowing users to access them via a web browser from any computer, anywhere. This paper presents cisPath, an R/Bioconductor package deployed on cloud servers for client users to visualize, manage, and share functional protein interaction networks. Results With this R package, users can easily integrate downloaded protein-protein interaction information from different online databases with private data to construct new and personalized interaction networks. Additional functions allow users to generate specific networks based on private databases. Since the results produced with the use of this package are in the form of web pages, cloud users can easily view and edit the network graphs via the browser, using a mouse or touch screen, without the need to download them to a local computer. This package can also be installed and run on a local desktop computer. Depending on user preference, results can be publicized or shared by uploading to a web server or cloud driver, allowing other users to directly access results via a web browser. Conclusions This package can be installed and run on a variety of platforms. Since all network views are shown in web pages, such package is particularly useful for cloud users. The easy installation and operation is an attractive quality for R beginners and users with no previous experience with cloud services. PMID:25708840

  18. Hybrid information privacy system: integration of chaotic neural network and RSA coding

    NASA Astrophysics Data System (ADS)

    Hsu, Ming-Kai; Willey, Jeff; Lee, Ting N.; Szu, Harold H.

    2005-03-01

    Electronic mails are adopted worldwide; most are easily hacked by hackers. In this paper, we purposed a free, fast and convenient hybrid privacy system to protect email communication. The privacy system is implemented by combining private security RSA algorithm with specific chaos neural network encryption process. The receiver can decrypt received email as long as it can reproduce the specified chaos neural network series, so called spatial-temporal keys. The chaotic typing and initial seed value of chaos neural network series, encrypted by the RSA algorithm, can reproduce spatial-temporal keys. The encrypted chaotic typing and initial seed value are hidden in watermark mixed nonlinearly with message media, wrapped with convolution error correction codes for wireless 3rd generation cellular phones. The message media can be an arbitrary image. The pattern noise has to be considered during transmission and it could affect/change the spatial-temporal keys. Since any change/modification on chaotic typing or initial seed value of chaos neural network series is not acceptable, the RSA codec system must be robust and fault-tolerant via wireless channel. The robust and fault-tolerant properties of chaos neural networks (CNN) were proved by a field theory of Associative Memory by Szu in 1997. The 1-D chaos generating nodes from the logistic map having arbitrarily negative slope a = p/q generating the N-shaped sigmoid was given first by Szu in 1992. In this paper, we simulated the robust and fault-tolerance properties of CNN under additive noise and pattern noise. We also implement a private version of RSA coding and chaos encryption process on messages.

  19. Job Values in Today's Workforce: A Comparison of Public and Private Sector Employees.

    ERIC Educational Resources Information Center

    Karl, Katherine A.; Sutton, Cynthia L.

    1998-01-01

    A comparison of 47 public- and 170 private-sector workers revealed private-sector workers value good wages most and public-sector workers value interesting work. Results suggest that employers must keep in touch with employee values to design jobs, reward systems, and human-resource policies that will result in maximum job satisfaction. (JOW)

  20. Multiple Choice: How Public School Leaders in New Orleans' Saturated Market View Private School Competitors

    ERIC Educational Resources Information Center

    Jabbar, Huriya; Li, Dongmei M.

    2016-01-01

    School choice policies, such as charter schools and vouchers, are in part designed to induce competition between schools. While several studies have examined the impact of private school competition on public schools, few studies have explored school leaders' perceptions of private school competitors. This study examines the extent to which public…

  1. Prevalence for Private Tuition among Parents, Teachers and Pupils in Public Primary Schools in Machakos County

    ERIC Educational Resources Information Center

    Kirigwi, Lucy Wambui; Maithya, Redempta

    2016-01-01

    Private tuition refers to tutoring offered outside mainstream teaching. The study sought to establish the difference in prevalence for private tuition among parents, teachers and pupils in public primary schools in Machakos County. The study employed descriptive survey design. The target populations were all teachers, parents and pupils of public…

  2. The Views of New Teachers at Private Teaching Institutions about Working Conditions

    ERIC Educational Resources Information Center

    Yilmaz, Kursad; Altinkurt, Yahya

    2011-01-01

    The main purpose of the research was to determine the views of teachers about working conditions working at private teaching institutions for 5 years or less. The research was designed as a phenomenology model. The data were collected by focus group interview technique of qualitative research method. 10 teachers from private teaching institutions…

  3. Harnessing private sector expertise to improve complementary feeding within a regulatory framework: Where is the evidence?

    PubMed

    van Liere, Marti J; Tarlton, Dessie; Menon, Ravi; Yellamanda, M; Reerink, Ietje

    2017-10-01

    Global recognition that the complex and multicausal problems of malnutrition require all players to collaborate and to invest towards the same objective has led to increased private sector engagement as exemplified through the Scaling Up Nutrition Business Network and mechanisms for blended financing and matched funding, such as the Global Nutrition for Growth Compact. The careful steps made over the past 5 to 10 years have however not taken away or reduced the hesitation and scepticism of the public sector actors towards commercial or even social businesses. Evidence of impact or even a positive contribution of a private sector approach to intermediate nutrition outcomes is still lacking. This commentary aims to discuss the multiple ways in which private sector can leverage its expertise to improve nutrition in general, and complementary feeding in particular. It draws on specific lessons learned in Bangladesh, Côte d'Ivoire, India, Indonesia, and Madagascar on how private sector expertise has contributed, within the boundaries of a regulatory framework, to improve availability, accessibility, affordability, and adequate use of nutritious foods. It concludes that a solid evidence base regarding the contribution of private sector to complementary feeding is still lacking and that the development of a systematic learning agenda is essential to make progress in the area of private sector engagement in nutrition. © 2017 John Wiley & Sons Ltd.

  4. No survival benefit to gaining private health insurance coverage for post-lung transplant care in adults with cystic fibrosis.

    PubMed

    Tumin, Dmitry; Foraker, Randi E; Tobias, Joseph D; Hayes, Don

    2016-03-01

    The use of public insurance is associated with diminished survival in patients with cystic fibrosis (CF) following lung transplantation. No data exist on benefits of gaining private health insurance for post-transplant care among such patients previously using public insurance. The United Network for Organ Sharing database was used to identify first-time lung transplant recipients participating in Medicare or Medicaid, diagnosed with CF, and transplanted between 2005 and 2015. Survival outcomes were compared between recipients gaining private insurance after transplantation and those maintaining public coverage throughout follow-up. Since implementation of the lung allocation score, 575 adults with CF received lung transplantation funded by Medicare or Medicaid and contributed data on insurance status post-transplant. There were 128 (22%) patients who gained private insurance. Multivariable analysis of time-varying insurance status found no survival benefit of gaining private insurance (HR = 0.822; 95% CI = 0.525, 1.286; p = 0.390). Further analysis demonstrated that resuming public insurance coverage was detrimental, relative to gaining and keeping private insurance (HR = 2.315; 95% CI = 1.020, 5.258; p = 0.045). Survival disadvantages of lung transplant recipients with CF who have public health insurance were not ameliorated by a switch to private coverage for post-transplant care. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  5. Private sector, human resources and health franchising in Africa.

    PubMed

    Prata, Ndola; Montagu, Dominic; Jefferys, Emma

    2005-04-01

    In much of the developing world, private health care providers and pharmacies are the most important sources of medicine and medical care and yet these providers are frequently not considered in planning for public health. This paper presents the available evidence, by socioeconomic status, on which strata of society benefit from publicly provided care and which strata use private health care. Using data from The World Bank's Health Nutrition and Population Poverty Thematic Reports on 22 countries in Africa, an assessment was made of the use of public and private health services, by asset quintile groups, for treatment of diarrhoea and acute respiratory infections, proxies for publicly subsidized services. The evidence and theory on using franchise networks to supplement government programmes in the delivery of public health services was assessed. Examples from health franchises in Africa and Asia are provided to illustrate the potential for franchise systems to leverage private providers and so increase delivery-point availability for public-benefit services. We argue that based on the established demand for private medical services in Africa, these providers should be included in future planning on human resources for public health. Having explored the range of systems that have been tested for working with private providers, from contracting to vouchers to behavioural change and provider education, we conclude that franchising has the greatest potential for integration into large-scale programmes in Africa to address critical illnesses of public health importance.

  6. Conceptualizing Geosexual Archetypes: Mapping the Sexual Travels and Egocentric Sexual Networks of Gay and Bisexual Men in Toronto, Canada.

    PubMed

    Gesink, Dionne; Wang, Susan; Guimond, Tim; Kimura, Lauren; Connell, James; Salway, Travis; Gilbert, Mark; Mishra, Sharmistha; Tan, Darrell; Burchell, Ann N; Brennan, David J; Logie, Carmen H; Grace, Daniel

    2018-06-01

    There are complex, synergistic, and persistent sexually transmitted infection (STI) epidemics affecting gay, bisexual and other men who have sex with men (gbMSM) in every major urban centre across North America. We explored the spatial architecture of egocentric sexual networks for gbMSM in Toronto, Canada. Our integrative mixed methods study included in-depth interviews with 31 gbMSM between May and July 2016. During interviews, participants mapped their egocentric sexual network for the preceding 3 months geographically. At the end, a self-administered survey was used to collect sociodemographic characteristics, online technology use, and STI testing and history. We identified 6 geosexual archetypes: hosters, house-callers, privates, rovers, travellers, and geoflexibles. Hosters always, or almost always (≥80%), hosted sex at their home. House-callers always, or almost always (≥80%), had sex at their partner's home. Rovers always or almost always (≥80%) had sex at public venues (eg, bath houses, sex clubs) and other public spaces (eg, parks, cruising sites). Privates had sex in private-their own home or their partner's (part hoster, part house-caller). Travellers had sex away from their home, either at a partner's home or some other venue or public space (part house-caller, part rover). Geoflexibles had sex in a variety of locations-their home, their partner's home, or public venues. All hosters and rovers, and to a lesser extent, geoflexibles, reported a history of syphilis and human immunodeficiency virus. Prioritizing interventions to hosters, rovers, and geoflexibles may have an important impact on reducing STI transmission.

  7. The Governance of Indigenous Natural Products in Namibia: A Policy Network Analysis.

    PubMed

    Ndeinoma, Albertina; Wiersum, K Freerk; Arts, Bas

    2018-01-09

    At the end of the 20th century, optimism existed that non-timber forest products (NTFPs) can form an integral part in conservation and development strategies. However, there is limited knowledge on how the different stakeholders could relate to the state or to each other in promoting commercialization of NTFPs. Applying the policy network as an analytical framework, we investigated the structural patterns of actor relations in the governance structure of indigenous natural products (INPs) in Namibia, to understand the implications of such relations on INP policy process. The findings indicate that the INP policy network in Namibia is multi-dimensional, consisting of the Indigenous Plant Task Team (IPTT)-the key governance structure for resource mobilization and information sharing; and functional relations which serve specific roles in the INP value chain. The existing relations have facilitated policy development particularly for heavily regulated species, such as devil's claw; but for other species, only incremental changes are observed in terms of small-scale processing facilities for value addition and exclusive purchase agreements for sustainable sourcing of INPs. Participation of primary producers, private actors and quality standardization bodies is limited in INPs governance structures, which narrow the scope of information sharing. Consequently, despite that the IPTT has fostered publicly funded explorative pilot projects, ranging from production to marketing of INPs, there are no clear guidelines how these projects results can be transferred to private entities for possible commercialization. Further collaboration and information sharing is needed to guide public sector relations with the private entities and cooperatives.

  8. Using Patient Pathway Analysis to Design Patient-centered Referral Networks for Diagnosis and Treatment of Tuberculosis: The Case of the Philippines.

    PubMed

    Garfin, Celine; Mantala, Mariquita; Yadav, Rajendra; Hanson, Christy L; Osberg, Mike; Hymoff, Aaron; Makayova, Julia

    2017-11-06

    Tuberculosis (TB) is the 8th leading cause of death in the Philippines. A recent prevalence survey found that there were nearly 70% more cases of tuberculosis than previously estimated. Given these new data, the National TB Program (NTP), operating through a decentralized health system, identified about 58% of the estimated new drug-sensitive (DS) TB patients in 2016. However, the NTP only identified and commenced treatment for around 17% of estimated new drug-resistant patients. In order to reach the remaining 42% of drug-sensitive patients and 83% of drug-resistant patients, it is necessary to develop a better understanding of where patients seek care. National and regional patient pathway analyses (PPAs) were undertaken using existing national survey and NTP data. The PPA assessed the alignment between patient care seeking and the availability of TB diagnostic and treatment services. Systemic referral networks from the community-level Barangay Health Stations (BHSs) to diagnostic facilities have enabled more efficient detection of drug-sensitive tuberculosis in the public sector. Approximately 36% of patients initiated care in the private sector, where there is limited coverage of appropriate diagnostic technologies. Important differences in the alignment between care seeking patterns and diagnostic and treatment availability were found between regions. The PPA identified opportunities for strengthening access to care for all forms of tuberculosis and for accelerating the time to diagnosis by aligning services to where patients initiate care. Geographic variations in care seeking may guide prioritization of some regions for intensified engagement with the private sector. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  9. Transportable satellite voice terminals in Canada's north: Benefits from the users' perspectives

    NASA Astrophysics Data System (ADS)

    Sivertz, Christopher B.

    Infosat Telecommunications has developed a series of Ku-band transportable terminals for toll-quality telecommunications applications. These terminals are designed to provide reliable telephone, Group III facsimile, and computer data to users needing communications on short notice. The terminals are capable of providing full duplex service interconnecting into the public switched network or operating as an off-premise extension of an office private branch exchange. The terminals use a 1.8 m antenna and can be deployed from the back of a pick-up truck, single axle trailer or surface-mounted metal base. They operate reliable in extreme conditions and are very satellite efficient. This paper describes the features and performance of these terminals. Highlights of a number of remote installations are also discussed.

  10. Regulating the for-profit private healthcare providers towards universal health coverage: A qualitative study of legal and organizational framework in Mongolia.

    PubMed

    Tsevelvaanchig, Uranchimeg; Narula, Indermohan S; Gouda, Hebe; Hill, Peter S

    2018-01-01

    Regulating the behavior of private providers in the context of mixed health systems has become increasingly important and challenging in many developing countries moving towards universal health coverage including Mongolia. This study examines the current regulatory architecture for private healthcare in Mongolia exploring its role for improving accessibility, affordability, and quality of private care and identifies gaps in policy design and implementation. Qualitative research methods were used including documentary review, analysis, and in-depth interviews with 45 representatives of key actors involved in and affected by regulations in Mongolia's mixed health system, along with long-term participant observation. There has been extensive legal documentation developed regulating private healthcare, with specific organizations assigned to conduct health regulations and inspections. However, the regulatory architecture for healthcare in Mongolia is not optimally designed to improve affordability and quality of private care. This is not limited only to private care: important regulatory functions targeted to quality of care do not exist at the national level. The imprecise content and details of regulations in laws inviting increased political interference, governance issues, unclear roles, and responsibilities of different government regulatory bodies have contributed to failures in implementation of existing regulations. Copyright © 2017 John Wiley & Sons, Ltd.

  11. PRIVATE MANUFACTURERS’ THRESHOLDS TO INVEST IN COMPARATIVE EFFECTIVENESS TRIALS

    PubMed Central

    Basu, Anirban; Meltzer, David

    2015-01-01

    The recent rush of enthusiasm for public investment in comparative effectiveness research (CER) in the United States has focused attention on these public investments. However, little attention has been given to how changing public investment in CER may affect private manufacturers’ incentives for CER, which has long been a major source of CER. In this work, based on a simple revenue maximizing economic framework, we generate predictions on thresholds to invest in CER for a private manufacturer that compares its own product to its competitor’s in head to head trials. Our analysis shows that private incentives to invest in CER are determined by how the results of CER may affect the price and quantity of the product sold and the duration over which resulting changes in revenue would accrue given the time required to complete CER and the time from the completion of CER to the time of patent expiration. We highlight the result that private incentives may often be less than public incentives to invest in CER and may even be negative if the likelihood of adverse findings is sufficient. We find that these incentives imply a number of predictions about patterns of CER and how they will be affected by changes in public financing of CER and CER methods. For example, these incentives imply that incumbent patent holders may be less likely to invest in CER than entrants and that public investments in CER may crowd out similar private investments. In contrast, newer designs and methods for CER, such as Bayesian adaptive trials, which can reduce ex-post risk of unfavorable results and shorten the time for the production of CER, may increase the expected benefits of CER and may tend to increase private investment in CER as long as the costs of such innovative designs are not excessive. Bayesian approaches to design also naturally highlight the dynamic aspects of CER, allowing less expensive initial studies to guide decisions about future investments and thereby encouraging greater initial investments in CER. However, whether the potential effects we highlight of public funding of CER and of Bayesian approaches to trial design actually produce changes in private investment in CER remains an empirical question. PMID:22901018

  12. Private manufacturers' thresholds to invest in comparative effectiveness trials.

    PubMed

    Basu, Anirban; Meltzer, David

    2012-10-01

    The recent rush of enthusiasm for public investment in comparative effectiveness research (CER) in the US has focussed attention on these public investments. However, little attention has been given to how changing public investment in CER may affect private manufacturers' incentives for CER, which has long been a major source of CER. In this work, based on a simple revenue maximizing economic framework, we generate predictions on thresholds to invest in CER for a private manufacturer that compares its own product to a competitor's product in head-to-head trials. Our analysis shows that private incentives to invest in CER are determined by how the results of CER may affect the price and quantity of the product sold and the duration over which resulting changes in revenue would accrue, given the time required to complete CER and the time from the completion of CER to the time of patent expiration. We highlight the result that private incentives may often be less than public incentives to invest in CER and may even be negative if the likelihood of adverse findings is sufficient. We find that these incentives imply a number of predictions about patterns of CER and how they will be affected by changes in public financing of CER and CER methods. For example, these incentives imply that incumbent patent holders may be less likely to invest in CER than entrants and that public investments in CER may crowd out similar private investments. In contrast, newer designs and methods for CER, such as Bayesian adaptive trials, which can reduce ex post risk of unfavourable results and shorten the time for the production of CER, may increase the expected benefits of CER and may tend to increase private investment in CER as long as the costs of such innovative designs are not excessive. Bayesian approaches to design also naturally highlight the dynamic aspects of CER, allowing less expensive initial studies to guide decisions about future investments and thereby encouraging greater initial investments in CER. However, whether the potential effects we highlight of public funding of CER and of Bayesian approaches to trial design actually produce changes in private investment in CER remains an empirical question.

  13. Robust Pricing of Transportation Networks Under Uncertainty

    DOT National Transportation Integrated Search

    2010-09-01

    Both public and private entities are concerned with the impacts of future toll revenue, and the effects of tolled facilities on system congestion. Due to the inherent complexity of transportation systems, it is impossible to predict travel demand and...

  14. The Information Highway.

    ERIC Educational Resources Information Center

    Gore, Al

    1994-01-01

    The new information marketplace is based on a network of wide, two-way highways comprised of private owners and developers, makers of information appliances (televisions, telephones, computers, and combinations of all three), information providers (local broadcasters, digital libraries, information service providers, and entrepreneurs), and…

  15. 49 CFR 37.49 - Designation of responsible person(s) for intercity and commuter rail stations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) designated in accordance with this section shall bear the legal and financial responsibility for making a key... party. (c) In the case of a station more than fifty percent of which is owned by a private entity the... of which no entity owns more than fifty percent, the owners of the station (other than private entity...

  16. 49 CFR 37.49 - Designation of responsible person(s) for intercity and commuter rail stations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) designated in accordance with this section shall bear the legal and financial responsibility for making a key... party. (c) In the case of a station more than fifty percent of which is owned by a private entity the... of which no entity owns more than fifty percent, the owners of the station (other than private entity...

  17. 49 CFR 37.49 - Designation of responsible person(s) for intercity and commuter rail stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) designated in accordance with this section shall bear the legal and financial responsibility for making a key... party. (c) In the case of a station more than fifty percent of which is owned by a private entity the... of which no entity owns more than fifty percent, the owners of the station (other than private entity...

  18. 49 CFR 37.49 - Designation of responsible person(s) for intercity and commuter rail stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) designated in accordance with this section shall bear the legal and financial responsibility for making a key... party. (c) In the case of a station more than fifty percent of which is owned by a private entity the... of which no entity owns more than fifty percent, the owners of the station (other than private entity...

  19. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... waterway for marine navigation, in general terms; an appropriate chart or sketch of the area; and a general... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false State waters for private aids to navigation; designations; revisions, and revocations. 66.05-10 Section 66.05-10 Navigation and Navigable...

  20. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... waterway for marine navigation, in general terms; an appropriate chart or sketch of the area; and a general... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false State waters for private aids to navigation; designations; revisions, and revocations. 66.05-10 Section 66.05-10 Navigation and Navigable...

  1. Differences in public and private sector adoption of telemedicine: Indian case study for sectoral adoption.

    PubMed

    Sood, Sanjay P; Negash, Solomon; Mbarika, Victor W A; Kifle, Mengistu; Prakash, Nupur

    2007-01-01

    Telemedicine is the use of communication networks to exchange medical information for providing healthcare services and medical education from one site to another. The application of telemedicine is more promising in economically developing countries with agrarian societies. The American Telemedicine Association (ATA) identifies three healthcare services: clinical medical services, health and medical education, and consumer health information. However, it is not clear how these services can be adopted by different sectors: public and private. This paper looks at four Indian case studies, two each in public and private sectors to understand two research questions: Are there differences in telemedicine adoption between public and private hospitals. If there are differences: What are the differences in telemedicine adoption between public and private sectors? Authors have used the extant literature in telemedicine and healthcare to frame theoretical background, describe the research setting, present the case studies, and provide discussion and conclusions about their findings. Authors believe that as India continues to develop its telemedicine infrastructures, especially with continued government support through subsidies to private telemedicine initiatives, its upward trend in healthcare will continue. This is expected to put India on the path to increase its life expectancy rates, especially for it rural community which constitute over 70% of its populace.

  2. Establishment of National Laboratory Standards in Public and Private Hospital Laboratories

    PubMed Central

    ANJARANI, Soghra; SAFADEL, Nooshafarin; DAHIM, Parisa; AMINI, Rana; MAHDAVI, Saeed; MIRAB SAMIEE, Siamak

    2013-01-01

    In September 2007 national standard manual was finalized and officially announced as the minimal quality requirements for all medical laboratories in the country. Apart from auditing laboratories, Reference Health Laboratory has performed benchmarking auditing of medical laboratory network (surveys) in provinces. 12th benchmarks performed in Tehran and Alborz provinces, Iran in 2010 in three stages. We tried to compare different processes, their quality and accordance with national standard measures between public and private hospital laboratories. The assessment tool was a standardized checklist consists of 164 questions. Analyzing process show although in most cases implementing the standard requirements are more prominent in private laboratories, there is still a long way to complete fulfillment of requirements, and it takes a lot of effort. Differences between laboratories in public and private sectors especially in laboratory personnel and management process are significant. Probably lack of motivation, plays a key role in obtaining less desirable results in laboratories in public sectors. PMID:23514840

  3. A material flow analysis on current electrical and electronic waste disposal from Hong Kong households.

    PubMed

    Lau, Winifred Ka-Yan; Chung, Shan-Shan; Zhang, Chan

    2013-03-01

    A material flow study on five types of household electrical and electronic equipment, namely television, washing machine, air conditioner, refrigerator and personal computer (TWARC) was conducted to assist the Government of Hong Kong to establish an e-waste take-back system. This study is the first systematic attempt on identifying key TWARC waste disposal outlets and trade practices of key parties involved in Hong Kong. Results from two questionnaire surveys, on local households and private e-waste traders, were used to establish the material flow of household TWARC waste. The study revealed that the majority of obsolete TWARC were sold by households to private e-waste collectors and that the current e-waste collection network is efficient and popular with local households. However, about 65,000 tonnes/yr or 80% of household generated TWARC waste are being exported overseas by private e-waste traders, with some believed to be imported into developing countries where crude recycling methods are practiced. Should Hong Kong establish a formal recycling network with tight regulatory control on imports and exports, the potential risks of current e-waste recycling practices on e-waste recycling workers, local residents and the environment can be greatly reduced. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. [Success factors in the German healthcare market. Hospitals between cluster formation and privatisation].

    PubMed

    Schmidt, C; Möller, J; Hardt, F; Gabbert, T; Bauer, M

    2007-12-01

    The German hospital market is in a state of transition due to the introduction of diagnosis-related groups (DRGs) and a constant change of the reimbursement, demographic, economical and technical framework. To date mainly public hospitals were bought by private hospital chains, but this trend has currently reached university hospitals. During recent months a consolidation within the market of private hospitals took place, while new market players such as foreign hospital chains, US universities and private equity firms emerged on the scene. The target of the privatisation process, however, turns more and more to larger hospitals. Central key values remain the cluster formation and centralisation of key competences such as food supply, purchasing and pharmacy. Within a network of clinics the representation of different care components (basic, regular and maximum care provider) and care levels (low, normal, intermediate and intensive care) remain important elements of efficient hospital management. Today, successful hospital operation is based on the successful competition for patients and even more for qualified staff. In this aspect, university hospitals could play a decisive role, because of their combination of maximum acute care provision and educational mandate. No such network has yet been formed due to the different interests of the owners, however, given the new market situation this alternative concept could become more attractive.

  5. The Development of Local Private Primary and Secondary Schooling in Hong Kong, 1841-2012

    ERIC Educational Resources Information Center

    Cheung, Alan C. K.; Randall, E. Vance; Tam, Man Kwan

    2016-01-01

    Purpose: This paper is a historical review of the development of private primary and secondary education in Hong Kong from 1841-2012. The purpose of this paper is to examine the evolving relationship between the state and private schools in Hong Kong. Design/methodology/approach: This paper utilizes sources from published official documents,…

  6. Private Prayer and Optimism in Middle-Aged and Older Patients Awaiting Cardiac Surgery

    ERIC Educational Resources Information Center

    Ai, Amy L.; Peterson, Christopher; Bolling, Steven F.; Koenig, Harold

    2002-01-01

    Purpose: This study investigated the use of private prayer among middle-aged and older patients as a way of coping with cardiac surgery and prayer's relationship to optimism. Design and Methods: The measure of prayer included three aspects: (a) belief in the importance of private prayer, (b) faith in the efficacy of prayer on the basis of previous…

  7. The Price of Admission: Who Gets into Private School, and How Much Do They Pay?

    ERIC Educational Resources Information Center

    Walton, Nina

    2010-01-01

    I analyze how elementary and secondary private schools decide which students to admit from their applicant pool using mechanism design theory. The problem for an individual private school of who to admit and how much to charge in tuition, is complicated by the existence of peer-effects: the value students place on attending school is increasing…

  8. Social Networking—Another Breach In The Wall

    NASA Astrophysics Data System (ADS)

    Bamnote, Gajendra; Patil, Gajendra; Shejole, Amol

    2010-11-01

    With the increasing popularity of social networks like Facebook and MySpace, such sites have lately become the favourite destinations for spammers and attackers. Social networks have experienced complex social engineering attacks, massive spam and aggressive malware distribution in the recent past. This paper presents a practical case study of social engineering, malware distribution and phishing attacks against social networking sites that are identified over last few months. It is explained how private data of the users are exposed to attackers and how easily their privacy is compromised as a result of these attacks and their own careless behaviour.

  9. Risk-sharing integration efforts in the hospital sector.

    PubMed

    Jantzen, R; Loubeau, P R

    1999-01-01

    The extent of hospital involvement in integrated delivery systems (IDSs) during 1996 was assessed by a national sample of 235 short-term private general hospitals. Two out of five hospitals were participating in networks with some financial risk sharing, and another third reported membership in IDS networks without financial obligations. Managed care's presence was the only significant factor moving hospitals from a stand-alone status to network membership. The decision to share financial risk was influenced not only by managed care pressures, but also by the level of local hospital competition and the severity of the inpatient case mix.

  10. 47 CFR 32.5100 - Long distance message revenue.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Instructions For Revenue Accounts § 32.5100..., signaling, remote metering, and supervisory services. (2) Private network circuits and facilities (including..., supervisory control, miscellaneous signaling and channels furnished for the purpose of extending customer...

  11. 47 CFR 32.5100 - Long distance message revenue.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Instructions For Revenue Accounts § 32.5100..., signaling, remote metering, and supervisory services. (2) Private network circuits and facilities (including..., supervisory control, miscellaneous signaling and channels furnished for the purpose of extending customer...

  12. The National Information Infrastructure: Agenda for Action.

    ERIC Educational Resources Information Center

    Microcomputers for Information Management, 1995

    1995-01-01

    Discusses the National Information Infrastructure and the role of the government. Topics include private sector investment; universal service; technological innovation; user orientation; information security and network reliability; management of the radio frequency spectrum; intellectual property rights; coordination with other levels of…

  13. Choosing the route to traveler information systems deployment : decision factors for creating public/private business plans

    DOT National Transportation Integrated Search

    2012-08-01

    The United States Department of Transportation (U.S. DOT) has initiated a multimodal connected vehicle research initiative (hereafter referred to as the Initiative) that aims to enable safe, interoperable, networked, wireless communications amo...

  14. Women as Managers.

    ERIC Educational Resources Information Center

    Moore, Linda L.

    1981-01-01

    Discusses theories that socialization or "the system" cause women's problems in management, contending that both contribute. Analyzes women manager's problems in using and misusing power and coping with stress. Discusses public/private sector differences. Suggests that networking and constructive self-analysis can alleviate some problems. (AYC)

  15. Organizing for intelligent transportation systems : case study of emergency operations in San Francisco Bay area

    DOT National Transportation Integrated Search

    1997-01-01

    Computer-integrated transportation (CIT) is envisioned as an integrated network of public and private transportation organizations, each with unique responsibilities but working toward a common mission of facilitating travel across all modes of trans...

  16. Insider Threat Attributes and Mitigation Strategies

    DTIC Science & Technology

    2013-07-01

    Monitor and Control External Access and Data Downloads Organizations commonly use Virtual Private Networks (VPNs) for teleworking , allowing...gateways—An added benefit of two-factor authentication is that the access token can be collected if the employee leaves the organization. Without the

  17. A Framework for Integration of Heterogeneous Medical Imaging Networks

    PubMed Central

    Viana-Ferreira, Carlos; Ribeiro, Luís S; Costa, Carlos

    2014-01-01

    Medical imaging is increasing its importance in matters of medical diagnosis and in treatment support. Much is due to computers that have revolutionized medical imaging not only in acquisition process but also in the way it is visualized, stored, exchanged and managed. Picture Archiving and Communication Systems (PACS) is an example of how medical imaging takes advantage of computers. To solve problems of interoperability of PACS and medical imaging equipment, the Digital Imaging and Communications in Medicine (DICOM) standard was defined and widely implemented in current solutions. More recently, the need to exchange medical data between distinct institutions resulted in Integrating the Healthcare Enterprise (IHE) initiative that contains a content profile especially conceived for medical imaging exchange: Cross Enterprise Document Sharing for imaging (XDS-i). Moreover, due to application requirements, many solutions developed private networks to support their services. For instance, some applications support enhanced query and retrieve over DICOM objects metadata. This paper proposes anintegration framework to medical imaging networks that provides protocols interoperability and data federation services. It is an extensible plugin system that supports standard approaches (DICOM and XDS-I), but is also capable of supporting private protocols. The framework is being used in the Dicoogle Open Source PACS. PMID:25279021

  18. A framework for integration of heterogeneous medical imaging networks.

    PubMed

    Viana-Ferreira, Carlos; Ribeiro, Luís S; Costa, Carlos

    2014-01-01

    Medical imaging is increasing its importance in matters of medical diagnosis and in treatment support. Much is due to computers that have revolutionized medical imaging not only in acquisition process but also in the way it is visualized, stored, exchanged and managed. Picture Archiving and Communication Systems (PACS) is an example of how medical imaging takes advantage of computers. To solve problems of interoperability of PACS and medical imaging equipment, the Digital Imaging and Communications in Medicine (DICOM) standard was defined and widely implemented in current solutions. More recently, the need to exchange medical data between distinct institutions resulted in Integrating the Healthcare Enterprise (IHE) initiative that contains a content profile especially conceived for medical imaging exchange: Cross Enterprise Document Sharing for imaging (XDS-i). Moreover, due to application requirements, many solutions developed private networks to support their services. For instance, some applications support enhanced query and retrieve over DICOM objects metadata. This paper proposes anintegration framework to medical imaging networks that provides protocols interoperability and data federation services. It is an extensible plugin system that supports standard approaches (DICOM and XDS-I), but is also capable of supporting private protocols. The framework is being used in the Dicoogle Open Source PACS.

  19. Expanding malaria diagnosis and treatment in Lao PDR: lessons learned from a public-private mix initiative.

    PubMed

    Simmalavong, Nouannipha; Phommixay, Sengkham; Kongmanivong, Phoudaliphone; Sichanthongthip, Odai; Hongvangthong, Bouasy; Gopinath, Deyer; Sintasath, David M

    2017-11-13

    As in other countries of the Greater Mekong Sub-region (GMS), the private health sector constitutes a significant avenue where malaria services are provided and presents a unique opportunity for public-private collaboration. In September 2008, a public-private mix (PPM) strategy was launched initially in four northern and southern provinces in Lao PDR to increase access to rapid diagnostic tests (RDTs) and artemisinin-based combination therapy (ACT), improve quality of care, and collect routine malaria data from the private sector. Throughout the process, key stakeholders were involved in the planning, monitoring and supervision of project sites. Following an initial assessment in 2009, the PPM initiative expanded to an additional 14 district sites to a total of 245 private pharmacies and 16 clinics covering 8 provinces and 22 districts. By June 2016, a total of 317 pharmacies, 30 clinics in 32 districts of the 8 provinces were participating in the PPM network and reported monthly malaria case data. This descriptive study documented the process of initiating and maintaining the PPM network in Lao PDR. Epidemiological data reported through the routine surveillance system from January 2009 to June 2016 were analyzed to illustrate the contribution of case reporting from the private sector. A total of 2,301,676 malaria tests were performed in the PPM districts, which included all the PPM pharmacies and clinics (176,224, 7.7%), proportion of patients tested from 14,102 (4.6%) in 2009 to 29,554 (10.4%) in 2015. Over the same period of 90 months, a total of 246,091 positive cases (10.7%) were detected in PPM pharmacies and clinics (33,565; 13.6%), in the same districts as the PPM sites. The results suggest that the PPM sites contributed to a significant increasing proportion of patients positive for malaria from 1687 (7.4%) in 2009 to 5697 (15.8%) in 2015. Ensuring adequate and timely supplies of RDTs and ACT to PPM sites is critical. Frequent refresher training is necessary to maintain data quality, motivation and feedback. In the context of malaria elimination, the PPM initiative should be expanded further to ensure that all febrile cases seen through the private sector in malaria transmission areas are tested for malaria and treated appropriately. Results from the PPM must be integrated into a centralized registry of malaria cases that should prompt required case and foci investigations and responses to be conducted as part of elimination efforts.

  20. Exploring a public-private partnership new-graduate physiotherapy recruitment program: a qualitative study.

    PubMed

    Schmidt, David; Dmytryk, Neil

    2014-12-01

    Difficulty in attracting allied health staff to rural areas is well known. In 2012, a small rural health facility and local private practice created an informal public-private partnership to recruit two new-graduate physiotherapists. Graduates were employed part-time in both the public and private sectors. This qualitative case study employed an appreciative enquiry framework to explore this partnership model. Three focus groups were held, and a combination of content and thematic analysis was used to derive and organise themes arising from the data. A regional public health service and private physiotherapy practice in the Bega Valley region of south-eastern New South Wales, Australia. New-graduate and second-year physiotherapists (n = 5), private sector managers (n = 3), and public sector managers (n = 4). Perceived benefits of the partnership model and improvements that could be made to further develop the model. Organisational benefits of a shared public-private role included the ability to attract high-quality applicants to difficult-to-fill positions, reduced the risk of new-graduate attrition due to social isolation, enhanced networking between sectors, and enhanced staff skill development through a broad range of clinical and non-clinical experiences. The model relied on management flexibility and has potential to expand to other areas and professions. Dedicated funding support, targeted recruitment strategies and increased planning to ease the transition into the workplace would further enhance the model. An informal public-private partnership to overcome established workforce shortages has proven successful to the benefit of the new graduates and both the public and private sectors. © 2014 National Rural Health Alliance Inc.

  1. Change in Health Insurance Coverage After Liver Transplantation Can Be Associated with Worse Outcomes.

    PubMed

    Akateh, Clifford; Tumin, Dmitry; Beal, Eliza W; Mumtaz, Khalid; Tobias, Joseph D; Hayes, Don; Black, Sylvester M

    2018-06-01

    Health insurance coverage changes for many patients after liver transplantation, but the implications of this change on long-term outcomes are unclear. To assess post-transplant patient and graft survival according to change in insurance coverage within 1 year of transplantation. We queried the United Network for Organ Sharing for patients between ages 18-64 years undergoing liver transplantation in 2002-2016. Patients surviving > 1 year were categorized by insurance coverage at transplantation and the 1-year transplant anniversary. Multivariable Cox regression characterized the association between coverage pattern and long-term patient or graft survival. Among 34,487 patients in the analysis, insurance coverage patterns included continuous private coverage (58%), continuous public coverage (29%), private to public transition (8%) and public to private transition (4%). In multivariable analysis of patient survival, continuous public insurance (HR 1.29, CI 1.22, 1.37, p < 0.001), private to public transition (HR 1.17, CI 1.07, 1.28, p < 0.001), and public to private transition (HR 1.14, CI 1.00, 1.29, p = 0.044), were associated with greater mortality hazard, compared to continuous private coverage. After disaggregating public coverage by source, mortality hazard was highest for patients transitioning from private insurance to Medicaid (HR vs. continuous private coverage = 1.32; 95% CI 1.14, 1.52; p < 0.001). Similar differences by insurance category were found for death-censored graft failure. Post-transplant transition to public insurance coverage is associated with higher risk of adverse outcomes when compared to retaining private coverage.

  2. Mapping Engagement in Twitter-Based Support Networks for Adult Smoking Cessation

    PubMed Central

    Pechmann, Cornelia; Wang, Cheng; Pan, Li; Delucchi, Kevin; Prochaska, Judith J.

    2016-01-01

    We examined engagement in novel quit-smoking private social support networks on Twitter, January 2012 to April 2014. We mapped communication patterns within 8 networks of adult smokers (n = 160) with network ties defined by participants’ tweets over 3 time intervals, and examined tie reciprocity, tie strength, in-degree centrality (popularity), 3-person triangles, 4-person cliques, network density, and abstinence status. On average, more than 50% of ties were reciprocated in most networks and most ties were between abstainers and nonabstainers. Tweets formed into more aggregated patterns especially early in the study. Across networks, 35.00% (7 days after the quit date), 49.38% (30 days), and 46.88% (60 days) abstained from smoking. We demonstrated that abstainers and nonabstainers engaged with one another in dyads and small groups. This study preliminarily suggests potential for Twitter as a platform for adult smoking-cessation interventions. PMID:27310342

  3. Mapping Engagement in Twitter-Based Support Networks for Adult Smoking Cessation.

    PubMed

    Lakon, Cynthia M; Pechmann, Cornelia; Wang, Cheng; Pan, Li; Delucchi, Kevin; Prochaska, Judith J

    2016-08-01

    We examined engagement in novel quit-smoking private social support networks on Twitter, January 2012 to April 2014. We mapped communication patterns within 8 networks of adult smokers (n = 160) with network ties defined by participants' tweets over 3 time intervals, and examined tie reciprocity, tie strength, in-degree centrality (popularity), 3-person triangles, 4-person cliques, network density, and abstinence status. On average, more than 50% of ties were reciprocated in most networks and most ties were between abstainers and nonabstainers. Tweets formed into more aggregated patterns especially early in the study. Across networks, 35.00% (7 days after the quit date), 49.38% (30 days), and 46.88% (60 days) abstained from smoking. We demonstrated that abstainers and nonabstainers engaged with one another in dyads and small groups. This study preliminarily suggests potential for Twitter as a platform for adult smoking-cessation interventions.

  4. Joint Operations 2030 - Phase III Report: The JO 2030 Capability Set (Operations interarmees 2030 - Rapport Phase III: L’ensemble capacitaire JO 2030)

    DTIC Science & Technology

    2011-04-01

    a ‘strategy as process’ manner to develop capabilities that are flexible, adaptable and robust. 3.4 Future structures The need for agile...to develop models of the future security environment 3.4.10 Planning Under Deep Uncertainty Future structures The need for agile, flexible and... Organisation NEC Network Enabled Capability NGO Non Government Organisation NII Networking and Information Infrastructure PVO Private Voluntary

  5. A Dedicated Computational Platform for Cellular Monte Carlo T-CAD Software Tools

    DTIC Science & Technology

    2015-07-14

    computer that establishes an encrypted Virtual Private Network ( OpenVPN [44]) based on the Secure Socket Layer (SSL) paradigm. Each user is given a...security certificate for each device used to connect to the computing nodes. Stable OpenVPN clients are available for Linux, Microsoft Windows, Apple OSX...platform is granted by an encrypted connection base on the Secure Socket Layer (SSL) protocol, and implemented in the OpenVPN Virtual Personal Network

  6. Texas Tech University's "Models of Teaching" over Satellite: A Description and Evaluation of College Credit Coursework Delivered via the TI-IN Interactive Satellite Network. A Report Submitted to the Office of the Academic Vice President.

    ERIC Educational Resources Information Center

    Platten, Marvin R.; Barker, Bruce O.

    The Texas Interactive Instructional Network (TI-IN), a private satellite system that provides one-way video and two-way audio communication, was used for a two-year pilot project which was conducted to determine if satellite instruction could be used successfully to share educational resources among institutions. Models of Teaching, a graduate…

  7. Role of Private Enterprise in Cancer Control in Low to Middle Income Countries

    PubMed Central

    Mahoney, Martin; Okoye, Ifeoma; Ejiogu, Kenneth; George, Saby; Dy, Grace; Jimoh, Mutiu; Salako, Omolola; Ilegbune, Oge; Chugani, Bindiya; Ezeome, Emmanuel; Popoola, Abiodun O.; Michalek, Arthur M.

    2016-01-01

    Background. About 65% of cancer deaths globally occur in low to middle income countries (LMICs) where prioritization and allocation of resources to cancer care are often quite poor. In the absence of governmental focus on this problem, public-private partnerships may be an avenue to provide effective cancer control. Methods. This manuscript highlights the establishment of a nongovernmental organization (NGO) to stimulate the development of partnerships between oncology professionals, private enterprise, and academic institutions, both locally and internationally. Examples of capacity building, grant support, establishment of collaborative networks, and the development of a facility to provide clinical care are highlighted. Results. Collaborations were established between oncology professionals at academic institutions in the US and Nigeria. Cancer control workshops were conducted in Nigeria with grant support from the Union for International Cancer Control (UICC). A monthly tumor board conference was established at LASUTH in Lagos, and further capacity building is underway with grant support from the United States NCI. An outpatient, privately funded oncology clinic in Lagos has been launched. Conclusion. In LMICs, effective partnership between public and private institutions can lead to tangible strides in cancer control. The use of creative healthcare financing models can also support positive change. PMID:28070189

  8. CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nielsen, Roy S.

    3d Imagination is a new company that bases its business on selling and improving 3d open source related hardware. The devices that they sell include 3d imagers, 3d printers, pick and place machines and laser etchers. They have a fast company intranet for ease in sharing, storing and printing large, complex 3d designs. They have an employee set that requires a variety of operating systems including Windows, Mac and a variety of Linux both for running business services as well as design and test machines. There are a wide variety of private networks for testing transfer rates to and frommore » the 3d devices, without interference with other network tra c. They do video conferencing conferencing with customers and other designers. One of their machines is based on the project found at delta.firepick.org(Krassenstein, 2014; Biggs, 2014), which in future, will perform most of those functions. Their devices all include embedded systems, that may have full blown operating systems. Most of their systems are designed to have swappable parts, so when a new technology is born, it can be quickly adopted by people with 3d Imagination hardware. This company is producing a fair number of systems and components, however to get the funding they need to mass produce quality parts, so they are preparing for an IPO to raise the funds they need. They would like to have a cyber-security audit performed so they can give their investors con dence that they are protecting their data, customers information and printers in a proactive manner.« less

  9. Semantic-JSON: a lightweight web service interface for Semantic Web contents integrating multiple life science databases.

    PubMed

    Kobayashi, Norio; Ishii, Manabu; Takahashi, Satoshi; Mochizuki, Yoshiki; Matsushima, Akihiro; Toyoda, Tetsuro

    2011-07-01

    Global cloud frameworks for bioinformatics research databases become huge and heterogeneous; solutions face various diametric challenges comprising cross-integration, retrieval, security and openness. To address this, as of March 2011 organizations including RIKEN published 192 mammalian, plant and protein life sciences databases having 8.2 million data records, integrated as Linked Open or Private Data (LOD/LPD) using SciNetS.org, the Scientists' Networking System. The huge quantity of linked data this database integration framework covers is based on the Semantic Web, where researchers collaborate by managing metadata across public and private databases in a secured data space. This outstripped the data query capacity of existing interface tools like SPARQL. Actual research also requires specialized tools for data analysis using raw original data. To solve these challenges, in December 2009 we developed the lightweight Semantic-JSON interface to access each fragment of linked and raw life sciences data securely under the control of programming languages popularly used by bioinformaticians such as Perl and Ruby. Researchers successfully used the interface across 28 million semantic relationships for biological applications including genome design, sequence processing, inference over phenotype databases, full-text search indexing and human-readable contents like ontology and LOD tree viewers. Semantic-JSON services of SciNetS.org are provided at http://semanticjson.org.

  10. Speeding decisions. Social security's information exchange program.

    PubMed

    Winter, Kitt; Hastings, Bob

    2011-05-01

    The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.

  11. Lung-MAP Launches: First Precision Medicine Trial From National Clinical Trials Network

    Cancer.gov

    A unique public-private collaboration today announced the initiation of the Lung Cancer Master Protocol (Lung-MAP) trial, a multi-drug, multi-arm, biomarker-driven clinical trial for patients with advanced squamous cell lung cancer. Squamous cell carcinom

  12. Quantifying the effects of network improvement actions on the value of new and existing toll road projects.

    DOT National Transportation Integrated Search

    2010-02-01

    Development, delivery, and operation of public infrastructure are becoming increasingly dependent on : participation of the private sector. While revenue generating projects, such as toll roads, were traditionally : developed and funded from the publ...

  13. 20 CFR 411.115 - Definitions of terms used in this part.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... network or EN means a qualified public or private entity that has entered into an agreement with us to... (§§ 411.300-411.330). A State vocational rehabilitation agency may choose, on a case-by-case basis, to...

  14. Economic Dimensions of Security in Central Asia

    DTIC Science & Technology

    2006-01-01

    are minimal prospects for gainful employment and entrepreneurship in the formal economy. Corruption Corruption is the use of public office for private...perception among southern elites that former President Akayev’s patronage networks were resulting in their economic disen- franchisement and a widening

  15. Private sector, human resources and health franchising in Africa.

    PubMed Central

    Prata, Ndola; Montagu, Dominic; Jefferys, Emma

    2005-01-01

    In much of the developing world, private health care providers and pharmacies are the most important sources of medicine and medical care and yet these providers are frequently not considered in planning for public health. This paper presents the available evidence, by socioeconomic status, on which strata of society benefit from publicly provided care and which strata use private health care. Using data from The World Bank's Health Nutrition and Population Poverty Thematic Reports on 22 countries in Africa, an assessment was made of the use of public and private health services, by asset quintile groups, for treatment of diarrhoea and acute respiratory infections, proxies for publicly subsidized services. The evidence and theory on using franchise networks to supplement government programmes in the delivery of public health services was assessed. Examples from health franchises in Africa and Asia are provided to illustrate the potential for franchise systems to leverage private providers and so increase delivery-point availability for public-benefit services. We argue that based on the established demand for private medical services in Africa, these providers should be included in future planning on human resources for public health. Having explored the range of systems that have been tested for working with private providers, from contracting to vouchers to behavioural change and provider education, we conclude that franchising has the greatest potential for integration into large-scale programmes in Africa to address critical illnesses of public health importance. PMID:15868018

  16. New EVSE Analytical Tools/Models: Electric Vehicle Infrastructure Projection Tool (EVI-Pro)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wood, Eric W; Rames, Clement L; Muratori, Matteo

    This presentation addresses the fundamental question of how much charging infrastructure is needed in the United States to support PEVs. It complements ongoing EVSE initiatives by providing a comprehensive analysis of national PEV charging infrastructure requirements. The result is a quantitative estimate for a U.S. network of non-residential (public and workplace) EVSE that would be needed to support broader PEV adoption. The analysis provides guidance to public and private stakeholders who are seeking to provide nationwide charging coverage, improve the EVSE business case by maximizing station utilization, and promote effective use of private/public infrastructure investments.

  17. Spaceport Processing System Development Lab

    NASA Technical Reports Server (NTRS)

    Dorsey, Michael

    2013-01-01

    The Spaceport Processing System Development Lab (SPSDL), developed and maintained by the Systems Hardware and Engineering Branch (NE-C4), is a development lab with its own private/restricted networks. A private/restricted network is a network with restricted or no communication with other networks. This allows users from different groups to work on their own projects in their own configured environment without interfering with others utilizing their resources in the lab. The different networks being used in the lab have no way to talk with each other due to the way they are configured, so how a user configures his software, operating system, or the equipment doesn't interfere or carry over on any of the other networks in the lab. The SPSDL is available for any project in KSC that is in need of a lab environment. My job in the SPSDL was to assist in maintaining the lab to make sure it's accessible for users. This includes, but is not limited to, making sure the computers in the lab are properly running and patched with updated hardware/software. In addition to this, I also was to assist users who had issues in utilizing the resources in the lab, which may include helping to configure a restricted network for their own environment. All of this was to ensure workers were able to use the SPSDL to work on their projects without difficulty which would in turn, benefit the work done throughout KSC. When I wasn't working in the SPSDL, I would instead help other coworkers with smaller tasks which included, but wasn't limited to, the proper disposal, moving of, or search for essential equipment. I also, during the free time I had, used NASA's resources to increase my knowledge and skills in a variety of subjects related to my major as a computer engineer, particularly in UNIX, Networking, and Embedded Systems.

  18. [Teledermatology in Midi-Pyrenees].

    PubMed

    Bazex, Jacques

    2006-02-01

    Telemedicine has become commonplace since the creation of the European Center of Telemedicine, and dermatology was a pioneering discipline in this new technology. The Division of Dermatology is now involved at three different levels--The Midi-Pyrénées regional network, which allows doctors in the private and public sectors to seek expert advice, in real time, from university hospital specialists.--He Division of Dermatology pioneered telemedicine sessions devoted to file review, histological/clinical diagnosis, and information exchanges among subspecialists in dermatology. Both French and foreign specialists attend these sessions.--Teaching, particularly for students and private practitioners. Telemedicine has clear benefits for patients, doctors and society as a whole. The private and hospital community of the Midi-Pyrénées region is constantly seeking to improve its health services, and ensures that all new approaches are subject to strict quality controls.

  19. Establishing and Scaling-Up Clinical Social Franchise Networks: Lessons Learned From Marie Stopes International and Population Services International.

    PubMed

    Thurston, Sarah; Chakraborty, Nirali M; Hayes, Brendan; Mackay, Anna; Moon, Pierre

    2015-06-17

    In many low- and middle-income countries, a majority of people seek health care from the private sector. However, fragmentation, poor economies of scale, inadequate financing, political opposition, a bias toward curative services, and weak regulatory and quality control systems pose serious challenges for the private sector. Social franchising addresses a number of these challenges by organizing small, independent health care businesses into quality-assured networks. Global franchisors Marie Stopes International (MSI) and Population Services International (PSI) have rapidly scaled their family planning social franchising programs in recent years, jointly delivering over 10.8 million couple-years of protection (CYPs) in 2014-up 26% from 8.6 million CYPs just 1 year prior. Drawing on experience across MSI's 17 and PSI's 25 social franchise networks across Africa, Asia, and Latin America and the Caribbean, this article documents the organizations' operational approaches, challenges faced, and solutions implemented. The organizations provide intensive capacity building and support for private-sector providers, including clinical training, branding, monitoring quality of franchised services, and commodity support. In addition, franchising programs engage providers and clients through behavior change communication (BCC) and demand generation activities to raise awareness and to attract clients, and they implement initiatives to ensure services are affordable for the lowest-income clients. Social franchise programs offer the private sector a collective platform to better engage government in health policy advocacy and for integrating into new public health care financing and procurement mechanisms. The future of social franchising will require developing approaches to scale-up and sustain the model cost-effectively, selectively integrating other health services into the franchise package, and being responsive to evolving health care financing approaches with the potential to contribute to universal health coverage. © Thurston et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are properly cited. To view a copy of the license, visit http://creativecommons.org/licenses/by/3.0/

  20. Creating collaboration opportunities for marine research across the Arctic: The SEARCH-ACCESS partnership and an emerging sea ice prediction research network

    NASA Astrophysics Data System (ADS)

    Eicken, H.; Bitz, C. M.; Gascard, J.; Kaminski, T.; Karcher, M. J.; Kauker, F.; Overland, J. E.; Stroeve, J. C.; Wiggins, H. V.

    2013-12-01

    Rapid Arctic environmental and socio-economic change presents major challenges and opportunities to Arctic residents, government agencies and the private sector. The Arctic Ocean and its ice cover, in particular, are in the midst of transformative change, ranging from declines in sea-ice thickness and summer ice extent to threats to coastal communities and increases in maritime traffic and offshore resource development. The US interagency Study of Environmental Arctic Change (SEARCH) and the European Arctic Climate Change, Economy and Society (ACCESS) project are addressing both scientific research needs and stakeholder information priorities to improve understanding and responses to Arctic change. Capacity building, coordination and integration of activities at the international level and across sectors and stakeholder groups are major challenges that have to be met. ACCESS and SEARCH build on long-standing collaborations with a focus on environmental change in the Arctic ocean-ice-atmosphere system and the most pressing research needs to inform marine policy, resource management and threats to Arctic coastal communities. To illustrate the approach, key results and major conclusions from this international coordination and collaboration effort, we focus on a nascent sea-ice prediction research network. This activity builds on the Arctic Sea Ice Outlook that was initiated by SEARCH and the European DAMOCLES project (a precursor to ACCESS) and has now grown into an international community of practice that synthesizes, evaluates and discusses sea-ice predictions on seasonal to interannual scales. Key goals of the effort which is now entering into a new phase include the comparative evaluation of different prediction approaches, including the combination of different techniques, the compilation of reference datasets and model output, guidance on the design and implementation of observing system efforts to improve predictions and information transfer into private industry and the broader public. The latter relies on informal focus groups convened by ACCESS that help identify stakeholder priorities and provide feedback on science and policy documents resulting from this work. Most important, the research network effort explores the nature and ramifications of sea ice in an ice-diminished Arctic.

  1. Representation of Ecological Systems within the Protected Areas Network of the Continental United States

    PubMed Central

    Aycrigg, Jocelyn L.; Davidson, Anne; Svancara, Leona K.; Gergely, Kevin J.; McKerrow, Alexa; Scott, J. Michael

    2013-01-01

    If conservation of biodiversity is the goal, then the protected areas network of the continental US may be one of our best conservation tools for safeguarding ecological systems (i.e., vegetation communities). We evaluated representation of ecological systems in the current protected areas network and found insufficient representation at three vegetation community levels within lower elevations and moderate to high productivity soils. We used national-level data for ecological systems and a protected areas database to explore alternative ways we might be able to increase representation of ecological systems within the continental US. By following one or more of these alternatives it may be possible to increase the representation of ecological systems in the protected areas network both quantitatively (from 10% up to 39%) and geographically and come closer to meeting the suggested Convention on Biological Diversity target of 17% for terrestrial areas. We used the Landscape Conservation Cooperative framework for regional analysis and found that increased conservation on some private and public lands may be important to the conservation of ecological systems in Western US, while increased public-private partnerships may be important in the conservation of ecological systems in Eastern US. We have not assessed the pros and cons of following the national or regional alternatives, but rather present them as possibilities that may be considered and evaluated as decisions are made to increase the representation of ecological systems in the protected areas network across their range of ecological, geographical, and geophysical occurrence in the continental US into the future. PMID:23372754

  2. Representation of ecological systems within the protected areas network of the continental United States

    USGS Publications Warehouse

    Aycrigg, Jocelyn L.; Davidson, Anne; Svancara, Leona K.; Gergely, Kevin J.; McKerrow, Alexa; Scott, J. Michael

    2013-01-01

    If conservation of biodiversity is the goal, then the protected areas network of the continental US may be one of our best conservation tools for safeguarding ecological systems (i.e., vegetation communities). We evaluated representation of ecological systems in the current protected areas network and found insufficient representation at three vegetation community levels within lower elevations and moderate to high productivity soils. We used national-level data for ecological systems and a protected areas database to explore alternative ways we might be able to increase representation of ecological systems within the continental US. By following one or more of these alternatives it may be possible to increase the representation of ecological systems in the protected areas network both quantitatively (from 10% up to 39%) and geographically and come closer to meeting the suggested Convention on Biological Diversity target of 17% for terrestrial areas. We used the Landscape Conservation Cooperative framework for regional analysis and found that increased conservation on some private and public lands may be important to the conservation of ecological systems in Western US, while increased public-private partnerships may be important in the conservation of ecological systems in Eastern US. We have not assessed the pros and cons of following the national or regional alternatives, but rather present them as possibilities that may be considered and evaluated as decisions are made to increase the representation of ecological systems in the protected areas network across their range of ecological, geographical, and geophysical occurrence in the continental US into the future.

  3. Parallel implementation of D-Phylo algorithm for maximum likelihood clusters.

    PubMed

    Malik, Shamita; Sharma, Dolly; Khatri, Sunil Kumar

    2017-03-01

    This study explains a newly developed parallel algorithm for phylogenetic analysis of DNA sequences. The newly designed D-Phylo is a more advanced algorithm for phylogenetic analysis using maximum likelihood approach. The D-Phylo while misusing the seeking capacity of k -means keeps away from its real constraint of getting stuck at privately conserved motifs. The authors have tested the behaviour of D-Phylo on Amazon Linux Amazon Machine Image(Hardware Virtual Machine)i2.4xlarge, six central processing unit, 122 GiB memory, 8  ×  800 Solid-state drive Elastic Block Store volume, high network performance up to 15 processors for several real-life datasets. Distributing the clusters evenly on all the processors provides us the capacity to accomplish a near direct speed if there should arise an occurrence of huge number of processors.

  4. Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels

    PubMed Central

    Dunn, Alan M.; Lee, Michael Z.; Jana, Suman; Kim, Sangman; Silberstein, Mark; Xu, Yuanzhong; Shmatikov, Vitaly; Witchel, Emmett

    2014-01-01

    Modern systems keep long memories. As we show in this paper, an adversary who gains access to a Linux system, even one that implements secure deallocation, can recover the contents of applications’ windows, audio buffers, and data remaining in device drivers—long after the applications have terminated. We design and implement Lacuna, a system that allows users to run programs in “private sessions.” After the session is over, all memories of its execution are erased. The key abstraction in Lacuna is an ephemeral channel, which allows the protected program to talk to peripheral devices while making it possible to delete the memories of this communication from the host. Lacuna can run unmodified applications that use graphics, sound, USB input devices, and the network, with only 20 percentage points of additional CPU utilization. PMID:24755709

  5. Federal procurement metrication appropriateness and methods

    NASA Astrophysics Data System (ADS)

    Coella, M. A.

    1982-09-01

    This study was designed to provide the USMB with a clearer understanding of the basic relationships between the Federal procurement process and private sector suppliers. This was done to gain an understanding of the ways in which Federal procurement can encourage and accommodate initiatives of the private sector and to ensure that the effects of conversion on the Federal and private sectors are understood prior to implementation of procurement decisions and actions.

  6. Understanding Student Recommendations to Attend NIACC

    ERIC Educational Resources Information Center

    Morrison, Michael C.

    2008-01-01

    Successful organizations, both public and private, rely heavily on "word-of-mouth recommendations" for their products and services. Financial viability of any organization depends profoundly on formal and informal networks of customers who pass their assessments of an organization's performance to acquaintances, friends and families.…

  7. Disentangling road network impacts: The need for a holistic approach

    USDA-ARS?s Scientific Manuscript database

    Traditional and alternative energy development, logging and mining activities, together with off-highway vehicles (OHV) and exurban development, have increased the density of linear disturbances on public and private lands throughout the world. We argue that the dramatic increase in linear disturba...

  8. Shared resources : sharing right-of-way for telecommunications : identificaiton, review and analysis of legal and institutional issues

    DOT National Transportation Integrated Search

    1996-04-01

    The advent of fiber-optic communications technology coupled with continued rapid growth in demand for communications capacity have led private communications companies to seek to build new, and extend existing, fiber-optics networks. There is increas...

  9. 76 FR 81991 - National Spectrum Sharing Research Experimentation, Validation, Verification, Demonstration and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... non-federal community, including the academic, commercial, and public safety sectors, to implement a..., Verification, Demonstration and Trials: Technical Workshop II on Coordinating Federal Government/Private Sector Spectrum Innovation Testing Needs AGENCY: The National Coordination Office (NCO) for Networking and...

  10. Unit III: International Conflict.

    ERIC Educational Resources Information Center

    Maxey, Phyllis

    1983-01-01

    This lesson helps students understand the global network involved in international events. Students have an opportunity to examine the impact of international law and the role of international organizations, national governments, and private individuals in the effort to secure the release of United States hostages in Iran. (AM)

  11. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...

  12. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...

  13. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...

  14. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lesperance, Ann M.; Olson, Jarrod; Godinez, Melanie A.

    On March 10, 2010 the workshop titled Social Networking for Emergency Management and Public Safety was held in Seattle, WA. The objective of this workshop was to showcase ways social media networking technologies can be used to support emergency management and public safety operations. The workshop highlighted the current state of social networking and where this dynamic engagement is heading, demonstrated some of the more commonly used technologies, highlighted case studies on how these tools have been used in a variety of jurisdictions and engaged the private sector on how these tools might serve as a conduit for two waymore » communication between with the public sector to address regional recovery issues and decision making.« less

  16. Utilizing Weak Indicators to Detect Anomalous Behaviors in Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Egid, Adin

    We consider the use of a novel weak in- dicator alongside more commonly used weak indicators to help detect anomalous behavior in a large computer network. The data of the network which we are studying in this research paper concerns remote log-in information (Virtual Private Network, or VPN sessions) from the internal network of Los Alamos National Laboratory (LANL). The novel indicator we are utilizing is some- thing which, while novel in its application to data science/cyber security research, is a concept borrowed from the business world. The Her ndahl-Hirschman Index (HHI) is a computationally trivial index which provides amore » useful heuristic for regulatory agencies to ascertain the relative competitiveness of a particular industry. Using this index as a lagging indicator in the monthly format we have studied could help to detect anomalous behavior by a particular or small set of users on the network.« less

  17. A methodology for design of a linear referencing system for surface transportation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vonderohe, A.; Hepworth, T.

    1997-06-01

    The transportation community has recently placed significant emphasis on development of data models, procedural standards, and policies for management of linearly-referenced data. There is an Intelligent Transportation Systems initiative underway to create a spatial datum for location referencing in one, two, and three dimensions. Most recently, a call was made for development of a unified linear reference system to support public, private, and military surface transportation needs. A methodology for design of the linear referencing system was developed from geodetic engineering principles and techniques used for designing geodetic control networks. The method is founded upon the law of propagation ofmore » random error and the statistical analysis of systems of redundant measurements, used to produce best estimates for unknown parameters. A complete mathematical development is provided. Example adjustments of linear distance measurement systems are included. The classical orders of design are discussed with regard to the linear referencing system. A simple design example is provided. A linear referencing system designed and analyzed with this method will not only be assured of meeting the accuracy requirements of users, it will have the potential for supporting delivery of error estimates along with the results of spatial analytical queries. Modeling considerations, alternative measurement methods, implementation strategies, maintenance issues, and further research needs are discussed. Recommendations are made for further advancement of the unified linear referencing system concept.« less

  18. Factors which motivate the use of social networks by students.

    PubMed

    González Sanmamed, Mercedes; Muñoz Carril, Pablo C; Dans Álvarez de Sotomayor, Isabel

    2017-05-01

    The aim of this research was to identify those factors which motivate the use of social networks by 4th year students in Secondary Education between the ages of 15 and 18. 1,144 students from 29 public and private schools took part. The data were analysed using Partial Least Squares Structural Equation Modelling technique. Versatility was confirmed to be the variable which most influences the motivation of students in their use of social networks. The positive relationship between versatility in the use of social networks and educational uses was also significant. The characteristics of social networks are analysed according to their versatility and how this aspect makes them attractive to students. The positive effects of social networks are discussed in terms of educational uses and their contribution to school learning. There is also a warning about the risks associated with misuse of social networks, and finally, the characteristics and conditions for the development of good educational practice through social networks are identified.

  19. Health impact and cost-effectiveness of a private sector bed net distribution: experimental evidence from Zambia.

    PubMed

    Sedlmayr, Richard; Fink, Günther; Miller, John M; Earle, Duncan; Steketee, Richard W

    2013-03-18

    Relatively few programmes have attempted to actively engage the private sector in national malaria control efforts. This paper evaluates the health impact of a large-scale distribution of insecticide-treated nets (ITNs) conducted in partnership with a Zambian agribusiness, and its cost-effectiveness from the perspective of the National Malaria Control Programme (NMCP). The study was designed as a cluster-randomized controlled trial. A list of 81,597 cotton farmers was obtained from Dunavant, a contract farming company in Zambia's cotton sector, in December 2010. 39,963 (49%) were randomly selected to obtain one ITN each. Follow-up interviews were conducted with 438 farmers in the treatment and 458 farmers in the control group in June and July 2011. Treatment and control households were compared with respect to bed net ownership, bed net usage, self-reported fever, and self-reported confirmed malaria. Cost data was collected throughout the programme. The distribution effectively reached target beneficiaries, with approximately 95% of households in the treatment group reporting that they had received an ITN through the programme. The average increase in the fraction of household members sleeping under an ITN the night prior to the interview was 14.6 percentage points (p-value <0.001). Treatment was associated with a 42 percent reduction in the odds of self-reported fever (p-value <0.001) and with a 49 percent reduction in the odds of self-reported malaria (p-value 0.002). This was accomplished at a cost of approximately five US$ per ITN to Zambia's NMCP. The results illustrate that existing private sector networks can efficiently control malaria in remote rural regions. The intra-household allocation of ITNs distributed through this channel was comparable to that of ITNs received from other sources, and the health impact remained substantial.

  20. Prediction of employer-employee relationships from sociodemographic variables and social values in Brunei public and private sector workers.

    PubMed

    Mundia, Lawrence; Mahalle, Salwa; Matzin, Rohani; Nasir Zakaria, Gamal Abdul; Abdullah, Nor Zaiham Midawati; Abdul Latif, Siti Norhedayah

    2017-01-01

    The purpose of the study was to identify the sociodemographic variables and social value correlates and predictors of employer-employee relationship problems in a random sample of 860 Brunei public and private sector workers of both genders. A quantitative field survey design was used and data were analyzed by correlation and logistic regression. The rationale and justification for using this approach is explained. The main sociodemographic correlates and predictors of employer-employee relationship problems in this study were educational level and the district in which the employee resided and worked. Other correlates, but not necessarily predictors, of employer-employee relationship problems were seeking help from the Bomo (traditional healer); obtaining help from online social networking; and workers with children in the family. The two best and most significant social value correlates and predictors of employer-employee relationship problems included interpersonal communications; and self-regulation and self-direction. Low scorers on the following variables were also associated with high likelihood for possessing employer-employee relationship problems: satisfaction with work achievements; and peace and security, while low scorers on work stress had lower odds of having employer-employee relationship problems. Other significant social value correlates, but not predictors of employer-employee relationship problems were self-presentation; interpersonal trust; peace and security; and general anxiety. Consistent with findings of relevant previous studies conducted elsewhere, there were the variables that correlated with and predicted employer-employee relationship problems in Brunei public and private sector workers. Having identified these, the next step, efforts and priority should be directed at addressing the presenting issues via counseling and psychotherapy with affected employees. Further research is recommended to understand better the problem and its possible solutions.

Top