Sample records for public information embedding

  1. Many Experts, Many Audiences: Public Engagement with Science and Informal Science Education. A CAISE Inquiry Group Report. Executive Summary

    ERIC Educational Resources Information Center

    McCallie, Ellen; Bell, Larry; Lohwater, Tiffany; Falk, John H.; Lehr, Jane L.; Lewenstein, Bruce V.; Needham, Cynthia; Wiehe, Ben

    2009-01-01

    Science and technology are embedded in every aspect of modern life. This executive summary describes how Public Engagement with Science (PES), in the context of informal science education (ISE), can provide opportunities for public awareness of and participation in science and technology. PES is an approach that has developed in the last 10 years…

  2. Linkages to Public Land Framework: toward embedding humans in ecosystem analyses by using “inside-out social assessment.”

    Treesearch

    Joanna Endter-Wada; Dale J. Blahna

    2011-01-01

    This article presents the " Linkages to Public Land" (LPL) Framework, a general but comprehensive data-gathering and analysis approach aimed at informing citizen and agency decision making about the social environment of public land. This social assessment and planning approach identifies and categorizes various types of linkages that people have to public...

  3. Public Presentations of Professional Change in Academic Research Library Strategic Plans

    ERIC Educational Resources Information Center

    Bracke, Paul J.

    2012-01-01

    Academic librarianship is a profession in the midst of change. Embedded within multiple social spheres, academic librarians are adapting to changes in higher education, the sociotechnical environment of information, and the system of professions. This research investigates the ways in which academic librarians publicly present the ways in which…

  4. Feature Genes Selection Using Supervised Locally Linear Embedding and Correlation Coefficient for Microarray Classification

    PubMed Central

    Wang, Yun; Huang, Fangzhou

    2018-01-01

    The selection of feature genes with high recognition ability from the gene expression profiles has gained great significance in biology. However, most of the existing methods have a high time complexity and poor classification performance. Motivated by this, an effective feature selection method, called supervised locally linear embedding and Spearman's rank correlation coefficient (SLLE-SC2), is proposed which is based on the concept of locally linear embedding and correlation coefficient algorithms. Supervised locally linear embedding takes into account class label information and improves the classification performance. Furthermore, Spearman's rank correlation coefficient is used to remove the coexpression genes. The experiment results obtained on four public tumor microarray datasets illustrate that our method is valid and feasible. PMID:29666661

  5. Feature Genes Selection Using Supervised Locally Linear Embedding and Correlation Coefficient for Microarray Classification.

    PubMed

    Xu, Jiucheng; Mu, Huiyu; Wang, Yun; Huang, Fangzhou

    2018-01-01

    The selection of feature genes with high recognition ability from the gene expression profiles has gained great significance in biology. However, most of the existing methods have a high time complexity and poor classification performance. Motivated by this, an effective feature selection method, called supervised locally linear embedding and Spearman's rank correlation coefficient (SLLE-SC 2 ), is proposed which is based on the concept of locally linear embedding and correlation coefficient algorithms. Supervised locally linear embedding takes into account class label information and improves the classification performance. Furthermore, Spearman's rank correlation coefficient is used to remove the coexpression genes. The experiment results obtained on four public tumor microarray datasets illustrate that our method is valid and feasible.

  6. Beyond information access: Support for complex cognitive activities in public health informatics tools.

    PubMed

    Sedig, Kamran; Parsons, Paul; Dittmer, Mark; Ola, Oluwakemi

    2012-01-01

    Public health professionals work with a variety of information sources to carry out their everyday activities. In recent years, interactive computational tools have become deeply embedded in such activities. Unlike the early days of computational tool use, the potential of tools nowadays is not limited to simply providing access to information; rather, they can act as powerful mediators of human-information discourse, enabling rich interaction with public health information. If public health informatics tools are designed and used properly, they can facilitate, enhance, and support the performance of complex cognitive activities that are essential to public health informatics, such as problem solving, forecasting, sense-making, and planning. However, the effective design and evaluation of public health informatics tools requires an understanding of the cognitive and perceptual issues pertaining to how humans work and think with information to perform such activities. This paper draws on research that has examined some of the relevant issues, including interaction design, complex cognition, and visual representations, to offer some human-centered design and evaluation considerations for public health informatics tools.

  7. 77 FR 29336 - Agency Information Collection Activities; Submission to OMB for Review and Approval; Comment...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-17

    ... electronically or in paper, will be made available for public viewing at http://www.regulations.gov , as EPA... grinding mills at hot mix asphalt facilities that reduce the size of nonmetallic minerals embedded in...

  8. Implementing Student Information Systems in High Schools: An Embedded Single Case Study

    ERIC Educational Resources Information Center

    Rhodes-O'Neill, Tamyra LaShawn

    2014-01-01

    As new technologies are developed for teaching and learning, they hold the potential to transform education but have yet to be fully integrated into K-12 classrooms in the United States. The purpose of this study was to explore how a student information system was implemented in 2 urban public high schools and how stakeholders perceived that…

  9. Securing resource constraints embedded devices using elliptic curve cryptography

    NASA Astrophysics Data System (ADS)

    Tam, Tony; Alfasi, Mohamed; Mozumdar, Mohammad

    2014-06-01

    The use of smart embedded device has been growing rapidly in recent time because of miniaturization of sensors and platforms. Securing data from these embedded devices is now become one of the core challenges both in industry and research community. Being embedded, these devices have tight constraints on resources such as power, computation, memory, etc. Hence it is very difficult to implement traditional Public Key Cryptography (PKC) into these resource constrained embedded devices. Moreover, most of the public key security protocols requires both public and private key to be generated together. In contrast with this, Identity Based Encryption (IBE), a public key cryptography protocol, allows a public key to be generated from an arbitrary string and the corresponding private key to be generated later on demand. While IBE has been actively studied and widely applied in cryptography research, conventional IBE primitives are also computationally demanding and cannot be efficiently implemented on embedded system. Simplified version of the identity based encryption has proven its competence in being robust and also satisfies tight budget of the embedded platform. In this paper, we describe the choice of several parameters for implementing lightweight IBE in resource constrained embedded sensor nodes. Our implementation of IBE is built using elliptic curve cryptography (ECC).

  10. Embedded Course Reserves: Piecing the Puzzle Together

    ERIC Educational Resources Information Center

    Clumpner, Krista E.; Burgmeier, Michael; Gillespie, Thomas J.

    2011-01-01

    Northern Michigan University (NMU) is a public 4-year undergraduate institution of higher education with an enrollment of approximately 9,500 students. The university's Division of Academic Information Services encompasses both the staff of the library, which includes authors Clumpner and Burgmeier, and the instructional technology areas, where…

  11. Contract-Based Integration of Cyber-Physical Analyses

    DTIC Science & Technology

    2014-10-14

    Conference on Embedded Software Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the ...data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this

  12. The architecture of the management system of complex steganographic information

    NASA Astrophysics Data System (ADS)

    Evsutin, O. O.; Meshcheryakov, R. V.; Kozlova, A. S.; Solovyev, T. M.

    2017-01-01

    The aim of the study is to create a wide area information system that allows one to control processes of generation, embedding, extraction, and detection of steganographic information. In this paper, the following problems are considered: the definition of the system scope and the development of its architecture. For creation of algorithmic maintenance of the system, classic methods of steganography are used to embed information. Methods of mathematical statistics and computational intelligence are used to identify the embedded information. The main result of the paper is the development of the architecture of the management system of complex steganographic information. The suggested architecture utilizes cloud technology in order to provide service using the web-service via the Internet. It is meant to provide streams of multimedia data processing that are streams with many sources of different types. The information system, built in accordance with the proposed architecture, will be used in the following areas: hidden transfer of documents protected by medical secrecy in telemedicine systems; copyright protection of online content in public networks; prevention of information leakage caused by insiders.

  13. Public accountants' field dependence: Canadian evidence.

    PubMed

    Hicks, Elizabeth; Bagg, Robert; Doyle, Wendy; Young, Jeffrey D

    2007-12-01

    The cognitive styles of 113 practicing, professional accountants from Nova Scotia, Canada were examined using the Group Embedded Figures Test. They completed a demographic survey for descriptive information as well as their rank in the firm and preferred area of professional practice. Analysis suggested professional accountants tend to be more analytical than intuitive in cognitive style and, consistent with recent findings in other fields, men and women in accounting do not appear to be different in cognitive style. No statistically significant differences were found on the embedded figures scores across ranks of trainee, manager, and partner or across select, preferred areas of professional practice.

  14. QuEST: Robust Quantum Gadgets

    DTIC Science & Technology

    2013-02-28

    the size of the entangled states. Publications for 2011-12: S . T. Flammia , A. W. Harrow and J. Shi. “Local Embeddings of Quantum Codes” in...Publications (published) during reporting period: S . T. Flammia , A. W. Harrow and J. Shi. "Local Embeddings of Quantum Codes," in preparation, 2013. A. W...Publications: S . T. Flammia , A. W. Harrow and J. Shi. "Local Embeddings of Quantum Codes," in preparation, 2013. A. W. Harrow. "Testing Entanglement

  15. 31 CFR 560.538 - Authorized transactions necessary and ordinarily incident to publishing.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... publication in electronic format, the addition of embedded software necessary for reading, browsing, navigating, or searching the written publication; (ii) Exporting embedded software necessary for reading, browsing, navigating, or searching a written publication in electronic format, provided that the software...

  16. 31 CFR 560.538 - Authorized transactions necessary and ordinarily incident to publishing.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... publication in electronic format, the addition of embedded software necessary for reading, browsing, navigating, or searching the written publication; (ii) Exporting embedded software necessary for reading, browsing, navigating, or searching a written publication in electronic format, provided that the software...

  17. Public health policy decisions on medical innovations: what role can early economic evaluation play?

    PubMed

    Hartz, Susanne; John, Jürgen

    2009-02-01

    Our contribution aims to explore the different ways in which early economic data can inform public health policy decisions on new medical technologies. A literature research was conducted to detect methodological contributions covering the health policy perspective. Early economic data on new technologies can support public health policy decisions in several ways. Embedded in horizon scanning and HTA activities, it adds to monitoring and assessment of innovations. It can play a role in the control of technology diffusion by informing coverage and reimbursement decisions as well as the direct public promotion of healthcare technologies, leading to increased efficiency. Major problems include the uncertainty related to economic data at early stages as well as the timing of the evaluation of an innovation. Decision-makers can benefit from the information supplied by early economic data, but the actual use in practice is difficult to determine. Further empirical evidence should be gathered, while the use could be promoted by further standardization.

  18. What's in a name? How we define nanotech shapes public reactions

    NASA Astrophysics Data System (ADS)

    Anderson, Ashley A.; Kim, Jiyoun; Scheufele, Dietram A.; Brossard, Dominique; Xenos, Michael A.

    2013-02-01

    Audiences are most likely to form their opinions about issues based on the aspects that are primed and easily available in their minds (Hastie and Park, Psychol Rev 93:258-268, 1986; Tversky and Kahneman, Cogn Psychol 5:207-232, 1973). In this study, we examine how priming people with various definitions of nanotechnology differently shapes public perceptions of and engagement with the technology. Using a randomized experimental design embedded in a representative survey of the U.S. population ( n = 1,736), we find that defining nanotechnology in terms of novel applications increases public support for nanotechnology but does not motivate audiences to gather more information about it. In contrast, definitions highlighting the potential risks and benefits of nanotechnology can increase likelihood of future information seeking.

  19. Promoting Teaching, Learning and Informed Decision-Making through the Lenses of International Large-Scale Assessment: Looking beyond Numbers

    ERIC Educational Resources Information Center

    Säljö, Roger; Radišic, Jelena

    2018-01-01

    Public discussion on the quality of education in different corners of the world very much relies on the data provided by the international large-scale assessment (ILSA) studies. While aware of different methodological keystones and technicalities embedded in these, the idea behind this special issue is to contribute to the understanding of how…

  20. Starting a Learning Progression for Agricultural Literacy: A Qualitative Study of Urban Elementary Student Understandings of Agricultural and Science Education Benchmarks

    ERIC Educational Resources Information Center

    Hess, Alexander Jay

    2010-01-01

    Science and agriculture professional organizations have argued for agricultural literacy as a goal for K-12 public education. Due to the complexity of our modern agri-food system, with social, economic, and environmental concerns embedded, an agriculturally literate society is needed for informed decision making, democratic participation, and…

  1. Content-independent embedding scheme for multi-modal medical image watermarking.

    PubMed

    Nyeem, Hussain; Boles, Wageeh; Boyd, Colin

    2015-02-04

    As the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow significantly. Such use of medical images raises serious concerns for their continuous security protection, which digital watermarking has shown great potential to address. We present a content-independent embedding scheme for medical image watermarking. We observe that the perceptual content of medical images varies widely with their modalities. Recent medical image watermarking schemes are image-content dependent and thus they may suffer from inconsistent embedding capacity and visual artefacts. To attain the image content-independent embedding property, we generalise RONI (region of non-interest, to the medical professionals) selection process and use it for embedding by utilising RONI's least significant bit-planes. The proposed scheme thus avoids the need for RONI segmentation that incurs capacity and computational overheads. Our experimental results demonstrate that the proposed embedding scheme performs consistently over a dataset of 370 medical images including their 7 different modalities. Experimental results also verify how the state-of-the-art reversible schemes can have an inconsistent performance for different modalities of medical images. Our scheme has MSSIM (Mean Structural SIMilarity) larger than 0.999 with a deterministically adaptable embedding capacity. Our proposed image-content independent embedding scheme is modality-wise consistent, and maintains a good image quality of RONI while keeping all other pixels in the image untouched. Thus, with an appropriate watermarking framework (i.e., with the considerations of watermark generation, embedding and detection functions), our proposed scheme can be viable for the multi-modality medical image applications and distant medical services such as teleradiology and eHealth.

  2. Contract-Based Integration of Cyber-Physical Analyses

    DTIC Science & Technology

    2014-10-14

    for cyber-physical systems , 2013 [3] Torngren et al. Integrating viewpoints in the development of mechatronic products, 2013 [4] Rajhans et al...Conference on Embedded Software Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is...failures 5 Analytic aspect of integration Sensor Sampling PID Controller Actuator Controller Communication bus Sensor board CPU Actuator board System Bin

  3. Assessment of the DoD Embedded Media Program

    DTIC Science & Technology

    2004-09-01

    Classified and Sensitive Information ................... VII-22 3. Weapons Systems Video, Gun Camera Video, and Lipstick Cameras...Weapons Systems Video, Gun Camera Video, and Lipstick Cameras A SECDEF and CJCS message to commanders stated, “Put in place mechanisms and processes...of public communication activities.”126 The 10 February 2003 PAG stated, “Use of lipstick and helmet-mounted cameras on combat sorties is approved

  4. Embodied, Embedded Language Use

    PubMed Central

    Fowler, Carol A.

    2011-01-01

    Language use has a public face that is as important to study as the private faces under intensive psycholinguistic study. In the domain of phonology, public use of speech must meet an interpersonal “parity” constraint if it is to serve to communicate. That is, spoken language forms must reliably be identified by listeners. To that end, language forms are embodied, at the lowest level of description, as phonetic gestures of the vocal tract that lawfully structure informational media such as air and light. Over time, under the parity constraint, sound inventories emerge over communicative exchanges that have the property of sufficient identifiability. Communicative activities involve more than vocal tract actions. Talkers gesture and use facial expressions and eye gaze to communicate. Listeners embody their language understandings, exhibiting dispositions to behave in ways related to language understanding. Moreover, linguistic interchanges are embedded in the larger context of language use. Talkers recruit the environment in their communicative activities, for example, in using deictic points. Moreover, in using language as a “coordination device,” interlocutors mutually entrain. PMID:21243080

  5. Secure Communication Based on a Hybrid of Chaos and Ica Encryptions

    NASA Astrophysics Data System (ADS)

    Chen, Wei Ching; Yuan, John

    Chaos and independent component analysis (ICA) encryptions are two novel schemes for secure communications. In this paper, a new scheme combining chaos and ICA techniques is proposed to enhance the security level during communication. In this scheme, a master chaotic system is embedded at the transmitter. The message signal is mixed with a chaotic signal and a Gaussian white noise into two mixed signals and then transmitted to the receiver through the public channels. A signal for synchronization is transmitted through another public channel to the receiver where a slave chaotic system is embedded to reproduce the chaotic signal. A modified ICA is used to recover the message signal at the receiver. Since only two of the three transmitted signals contain the information of message signal, a hacker would not be able to retrieve the message signal by using ICA even though all the transmitted signals are intercepted. Spectrum analyses are used to prove that the message signal can be securely hidden under this scheme.

  6. 78 FR 29392 - Embedded Digital Devices in Safety-Related Systems, Systems Important to Safety, and Items Relied...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ... NUCLEAR REGULATORY COMMISSION [NRC-2013-0098] Embedded Digital Devices in Safety-Related Systems... (NRC) is issuing for public comment Draft Regulatory Issue Summary (RIS) 2013-XX, ``Embedded Digital... requirements for the quality and reliability of basic components with embedded digital devices. DATES: Submit...

  7. 31 CFR 560.538 - Authorized transactions necessary and ordinarily incident to publishing.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... written publication in electronic format, the addition of embedded software necessary for reading, browsing, navigating, or searching the written publication; and (ii) Exporting embedded software necessary... that the software is designated as “EAR99” under the Export Administration Regulations, 15 CFR parts...

  8. 31 CFR 538.529 - Authorized transactions necessary and ordinarily incident to publishing.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... written publication in electronic format, the addition of embedded software necessary for reading, browsing, navigating, or searching the written publication; (ii) Exporting embedded software necessary for... software is classified as “EAR 99” under the Export Administration Regulations, 15 CFR parts 730-774 (the...

  9. 31 CFR 560.538 - Authorized transactions necessary and ordinarily incident to publishing.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... written publication in electronic format, the addition of embedded software necessary for reading, browsing, navigating, or searching the written publication; and (ii) Exporting embedded software necessary... that the software is designated as “EAR99” under the Export Administration Regulations, 15 CFR parts...

  10. 31 CFR 538.529 - Authorized transactions necessary and ordinarily incident to publishing.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... written publication in electronic format, the addition of embedded software necessary for reading, browsing, navigating, or searching the written publication; (ii) Exporting embedded software necessary for... software is classified as “EAR 99” under the Export Administration Regulations, 15 CFR parts 730-774 (the...

  11. 31 CFR 538.529 - Authorized transactions necessary and ordinarily incident to publishing.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... written publication in electronic format, the addition of embedded software necessary for reading, browsing, navigating, or searching the written publication; (ii) Exporting embedded software necessary for... software is classified as “EAR 99” under the Export Administration Regulations, 15 CFR parts 730-774 (the...

  12. 31 CFR 538.529 - Authorized transactions necessary and ordinarily incident to publishing.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... written publication in electronic format, the addition of embedded software necessary for reading, browsing, navigating, or searching the written publication; (ii) Exporting embedded software necessary for... software is classified as “EAR 99” under the Export Administration Regulations, 15 CFR parts 730-774 (the...

  13. Outposts of science; the knowledge trade and the expansion of scientific community in post-Civil War America.

    PubMed

    Goldstein, Daniel

    2008-09-01

    By the second half of the nineteenth century, local and regional voluntary societies were among the most widespread, accessible, and familiar public scientific institutions in America. Collectively, they made up an institutional network that converted individuals' private interest in science into a public activity. They played an essential role in the dissemination of scientific information, the growth of a scientifically literate population, and the extension of public support for science in the decades after the Civil War. This essay delineates and maps the spread of these societies throughout the country, as well as the flow of scientific information both among societies and between a society and its regional hinterland. Using the Davenport [Iowa] Academy of Natural Sciences as an example, it demonstrates how local societies were embedded in a national scientific community and mediated between it and local scientific enthusiasts, to the benefit of both.

  14. Categorizing biomedicine images using novel image features and sparse coding representation

    PubMed Central

    2013-01-01

    Background Images embedded in biomedical publications carry rich information that often concisely summarize key hypotheses adopted, methods employed, or results obtained in a published study. Therefore, they offer valuable clues for understanding main content in a biomedical publication. Prior studies have pointed out the potential of mining images embedded in biomedical publications for automatically understanding and retrieving such images' associated source documents. Within the broad area of biomedical image processing, categorizing biomedical images is a fundamental step for building many advanced image analysis, retrieval, and mining applications. Similar to any automatic categorization effort, discriminative image features can provide the most crucial aid in the process. Method We observe that many images embedded in biomedical publications carry versatile annotation text. Based on the locations of and the spatial relationships between these text elements in an image, we thus propose some novel image features for image categorization purpose, which quantitatively characterize the spatial positions and distributions of text elements inside a biomedical image. We further adopt a sparse coding representation (SCR) based technique to categorize images embedded in biomedical publications by leveraging our newly proposed image features. Results we randomly selected 990 images of the JPG format for use in our experiments where 310 images were used as training samples and the rest were used as the testing cases. We first segmented 310 sample images following the our proposed procedure. This step produced a total of 1035 sub-images. We then manually labeled all these sub-images according to the two-level hierarchical image taxonomy proposed by [1]. Among our annotation results, 316 are microscopy images, 126 are gel electrophoresis images, 135 are line charts, 156 are bar charts, 52 are spot charts, 25 are tables, 70 are flow charts, and the remaining 155 images are of the type "others". A serial of experimental results are obtained. Firstly, each image categorizing results is presented, and next image categorizing performance indexes such as precision, recall, F-score, are all listed. Different features which include conventional image features and our proposed novel features indicate different categorizing performance, and the results are demonstrated. Thirdly, we conduct an accuracy comparison between support vector machine classification method and our proposed sparse representation classification method. At last, our proposed approach is compared with three peer classification method and experimental results verify our impressively improved performance. Conclusions Compared with conventional image features that do not exploit characteristics regarding text positions and distributions inside images embedded in biomedical publications, our proposed image features coupled with the SR based representation model exhibit superior performance for classifying biomedical images as demonstrated in our comparative benchmark study. PMID:24565470

  15. Coffee Shops, Classrooms and Conversations: public engagement and outreach in a large interdisciplinary research Hub

    NASA Astrophysics Data System (ADS)

    Holden, Jennifer A.

    2014-05-01

    Public engagement and outreach activities are increasingly using specialist staff for co-ordination, training and support for researchers, they are also becoming expected for large investments. Here, the experience of public engagement and outreach a large, interdisciplinary Research Hub is described. dot.rural, based at the University of Aberdeen UK, is a £11.8 million Research Councils UK Rural Digital Economy Hub, funded as part of the RCUK Digital Economy Theme (2009-2015). Digital Economy research aims to realise the transformational impact of digital technologies on aspects of the environment, community life, cultural experiences, future society, and the economy. The dot.rural Hub involves 92 researchers from 12 different disciplines, including Geography, Hydrology and Ecology. Public Engagement and Outreach is embedded in the dot.rural Digital Economy Hub via an Outreach Officer. Alongside this position, public engagement and outreach activities are compulsory part of PhD student contracts. Public Engagement and Outreach activities at the dot.rural Hub involve individuals and groups in both formal and informal settings organised by dot.rural and other organisations. Activities in the realms of Education, Public Engagement, Traditional and Social Media are determined by a set of Underlying Principles designed for the Hub by the Outreach Officer. The underlying Engagement and Outreach principles match funding agency requirements and expectations alongside researcher demands and the user-led nature of Digital Economy Research. All activities include researchers alongside the Outreach Officer are research informed and embedded into specific projects that form the Hub. Successful public engagement activities have included participation in Café Scientifique series, workshops in primary and secondary schools, and online activities such as I'm a Scientist Get Me Out of Here. From how to engage 8 year olds with making hydrographs more understandable to members of the public to blogging birds and engaging with remote, rural communities to Spiegeltents. This presentation will share successful public engagement and outreach events alongside some less successful experiences and lessons learnt along the way.

  16. Embedding the results of focussed Bayesian fusion into a global context

    NASA Astrophysics Data System (ADS)

    Sander, Jennifer; Heizmann, Michael

    2014-05-01

    Bayesian statistics offers a well-founded and powerful fusion methodology also for the fusion of heterogeneous information sources. However, except in special cases, the needed posterior distribution is not analytically derivable. As consequence, Bayesian fusion may cause unacceptably high computational and storage costs in practice. Local Bayesian fusion approaches aim at reducing the complexity of the Bayesian fusion methodology significantly. This is done by concentrating the actual Bayesian fusion on the potentially most task relevant parts of the domain of the Properties of Interest. Our research on these approaches is motivated by an analogy to criminal investigations where criminalists pursue clues also only locally. This publication follows previous publications on a special local Bayesian fusion technique called focussed Bayesian fusion. Here, the actual calculation of the posterior distribution gets completely restricted to a suitably chosen local context. By this, the global posterior distribution is not completely determined. Strategies for using the results of a focussed Bayesian analysis appropriately are needed. In this publication, we primarily contrast different ways of embedding the results of focussed Bayesian fusion explicitly into a global context. To obtain a unique global posterior distribution, we analyze the application of the Maximum Entropy Principle that has been shown to be successfully applicable in metrology and in different other areas. To address the special need for making further decisions subsequently to the actual fusion task, we further analyze criteria for decision making under partial information.

  17. Public Affairs: Inform, Educate, and Influence

    DTIC Science & Technology

    2009-06-12

    directed towards domestic target audiences. Outside of the military and scholarly material, there is a large amount of news and opinion articles, books ...program, which began in earnest during Operation Iraqi Freedom in 2003, has been discussed in great lengths in scores of books , studies and editorials...few examples of books about the DOD‘s embed program follows: Embedded: The Media at War in Iraq by Bill Katovsky and Timothy Carlson - Lyons Press

  18. The data embedding method

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits,more » is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.« less

  19. Data embedding method

    NASA Astrophysics Data System (ADS)

    Sandford, Maxwell T., II; Bradley, Jonathan N.; Handel, Theodore G.

    1996-01-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in MicrosoftTM bitmap (BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed `steganography.' Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or `lossy' compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is derived from the original host data by an analysis algorithm.

  20. 76 FR 1603 - Agency Information Collection Activities: Proposed Collection, Comment Request: Reporting of Pre...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-11

    ...The Commodity Futures Trading Commission (``Commission'' or ``CFTC'') is announcing an opportunity for public comment on the proposed collection of certain information by the agency. Under the Paperwork Reduction Act (``PRA''), 44 U.S.C. 3501 et seq., Federal agencies are required to publish notice in the Federal Register concerning each proposed collection of information and to allow 60 days for public comment. The Commission recently adopted an interim final rule, as required by the Wall Street Reform and Consumer Protection Act (``Dodd-Frank Act''), requiring counterparties to a pre-enactment unexpired swap to report such swaps according to such rules as the Commission may in the future adopt. This notice solicits comments on the record retention requirement that is embedded in the interim final rule's reporting requirement, which was recognized by the Commission in an interpretive note to the final rule.

  1. Development and Implementation of Production Area of Agricultural Product Data Collection System Based on Embedded System

    NASA Astrophysics Data System (ADS)

    Xi, Lei; Guo, Wei; Che, Yinchao; Zhang, Hao; Wang, Qiang; Ma, Xinming

    To solve problems in detecting the origin of agricultural products, this paper brings about an embedded data-based terminal, applies middleware thinking, and provides reusable long-range two-way data exchange module between business equipment and data acquisition systems. The system is constructed by data collection node and data center nodes. Data collection nodes taking embedded data terminal NetBoxII as the core, consisting of data acquisition interface layer, controlling information layer and data exchange layer, completing the data reading of different front-end acquisition equipments, and packing the data TCP to realize the data exchange between data center nodes according to the physical link (GPRS / CDMA / Ethernet). Data center node consists of the data exchange layer, the data persistence layer, and the business interface layer, which make the data collecting durable, and provide standardized data for business systems based on mapping relationship of collected data and business data. Relying on public communications networks, application of the system could establish the road of flow of information between the scene of origin certification and management center, and could realize the real-time collection, storage and processing between data of origin certification scene and databases of certification organization, and could achieve needs of long-range detection of agricultural origin.

  2. Modified Embedded Atom Method Study of the Mechanical Properties of Carbon Nanotube Reinforced Nickel Composites

    DTIC Science & Technology

    2010-01-01

    0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing...body screening effect. In addition, a radial cutoff function is also applied to reduce calculation time . The MEAM for an alloy system is based on the...moduli Real materials are usually polycrystalline aggregates of randomly oriented single-crystal grains, each exhibiting single-crystalline elastic

  3. Y2K, embedded chips, casualty hazards and due diligence in healthcare risk management.

    PubMed

    Childers, J R

    1998-01-01

    Y2K raises challenges for healthcare risk managers that go beyond information technology issues. This article explains that (1) too little public attention is being paid to equipment which may well have Y2K faults and (2) few standards have been articulated for dealing with problems. Healthcare risk managers therefore must return to basic due diligence principles and develop their own standards and protocols. The article explains how to do due diligence and outlines suggested steps for dealing with the non-information technology side of compliance due diligence.

  4. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  5. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  6. Critical Friendship and Critical Orphanship: Embedded Research of an English Local Authority Initiative

    ERIC Educational Resources Information Center

    Duggan, James R.

    2014-01-01

    The article engages with the opportunities and constraints raised by embedded research during times of rapid and extensive organisational change. Embedded research is an increasingly common approach for funding PhD studentships. The rapid and extensive reforms of the English public sector pose significant and underexplored challenges for embedded…

  7. Culture and the Trajectories of Developmental Pathology: Insights from Control and Information Theories.

    PubMed

    Wallace, Rodrick

    2018-06-01

    Cognition in living entities-and their social groupings or institutional artifacts-is necessarily as complicated as their embedding environments, which, for humans, includes a particularly rich cultural milieu. The asymptotic limit theorems of information and control theories permit construction of a new class of empirical 'regression-like' statistical models for cognitive developmental processes, their dynamics, and modes of dysfunction. Such models may, as have their simpler analogs, prove useful in the study and re-mediation of cognitive failure at and across the scales and levels of organization that constitute and drive the phenomena of life. These new models particularly focus on the roles of sociocultural environment and stress, in a large sense, as both trigger for the failure of the regulation of bio-cognition and as 'riverbanks' determining the channels of pathology, with implications across life-course developmental trajectories. We examine the effects of an embedding cultural milieu and its socioeconomic implementations using the 'lenses' of metabolic optimization, control system theory, and an extension of symmetry-breaking appropriate to information systems. A central implication is that most, if not all, human developmental disorders are fundamentally culture-bound syndromes. This has deep implications for both individual treatment and public health policy.

  8. Informed consent in a multicultural cancer patient population: implications for nursing practice.

    PubMed

    Barnes, D M; Davis, A J; Moran, T; Portillo, C J; Koenig, B A

    1998-09-01

    Obtaining informed consent, an ethical obligation of nurses and other health care providers, occurs routinely when patients make health care decisions. The values underlying informed consent (promotion of patients' well-being and respect for their self-determination) are embedded in the dominant American culture. Nurses who apply the USA's cultural values of informed consent when caring for patients who come from other cultures encounter some ethical dilemmas. This descriptive study, conducted with Latino, Chinese and Anglo-American cancer patients in a large, public, west-coast clinic, describes constraints on the informed consent process in a multicultural setting, including language barriers, the clinical environment, control in decision making, and conflicting desired health outcomes for health care providers and patients, and suggests some implications for nursing practice.

  9. Climate Change, Capitalism, and Citizen Science: Developing a dialectical framework for examining volunteer participation in climate change research

    NASA Astrophysics Data System (ADS)

    Wixom, Joshua A.

    This dissertation discusses the complex social relations that link citizen science, scientific literacy, and the dissemination of information to the public. Scientific information is not produced in value-neutral settings by people removed from their social context. Instead, science is a social pursuit and the scientist's social context is embedded in the knowledge produced. Additionally, the dissemination of this information via numerous media outlets is filtered through institutional lenses and subject to journalistic norms. As a result, the general public must be able to recognize the inherent biases in this information. Yet, the rates of scientific literacy in the U.S. are quite low, which suggests that people may not be capable of fully understanding the biases present. Furthermore, people tend to seek out sources that reinforce their values and personal perspectives, thus reinforcing their own biases. Improving scientific literacy allows people to see past these biases and translate media narratives in order to comprehend the facts and evidence presented to them. Citizen science is both an epistemological tool used by scientists to collect and interpret scientific data and a means to improve the scientific literacy of participants. Citizen science programs have the ability to generate real knowledge and improve the critical thinking skills necessary for the general public to interpret scientific information.

  10. Neuroscience cannot answer these questions: a response to G. and R. Murrow's essay hypothesizing a link between dehumanization, human rights abuses and public policy

    PubMed Central

    Hoffman, Morris B.

    2015-01-01

    The Murrows' paper, ‘A hypothetical link between dehumanization and human rights abuses’, in which they propose that neuroscience may answer some difficult public policy questions, including questions about the First Amendment, is an unfortunate foray into law and public policy unjustified by the current state of neuroscience. Neuroscientific insights may one day have important implications for the law, and for some of the folk psychological assumptions embedded in the law, but they will never change the words of the written Constitution, or answer difficult policy questions in the interstices of those words. Suggesting that neuroscience can today inform these questions does a disservice to science, law and the complexity of the human condition. PMID:27774237

  11. PUBLIC POLICY, CHILD DEVELOPMENT RESEARCH AND BOYS AT RISK: CHALLENGING, ENDURING AND NECESSARY PARTNERSHIP.

    PubMed

    Mckinney, Marvin; Fitzgerald, Hiram E; Winn, Donna-Marie; Babcock, Patrick

    2017-01-01

    Research findings documenting the issues and challenges of boys prebirth through age 5 years have barely penetrated the arena of public policy making nor has it permeated the public agenda of politicians, government, or other funding stakeholders. The purpose of this article is to articulate pathways for researchers to enter into the policy-making process. We review critical issues related to implementing the process of public policy. We argue that the policy process needs to be informed by more dynamic theoretical models of human development, and that researchers and clinicians need to be exposed more deeply to the processes required to inform and subsequently change public policy. We contend that most quantitative research on boys at risk occurs at the micro- and the mesosystem level rather than at the exo- and the macrosystem levels where structural societal policies embedded in economic and racial inequities contribute to risk. Researchers, clinicians, and policy makers need to create collaborative partnerships designed to develop, advocate, and implement more evidence-based policies designed to enhance the quality of life for boys at risk. © 2017 Michigan Association for Infant Mental Health.

  12. Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application

    NASA Astrophysics Data System (ADS)

    Zhang, De-gan; Zhang, Xiao-dan

    2012-11-01

    With the growth of the amount of information manipulated by embedded application systems, which are embedded into devices and offer access to the devices on the internet, the requirements of saving the information systemically is necessary so as to fulfil access from the client and the local processing more efficiently. For supporting mobile applications, a design and implementation solution of embedded un-interruptible power supply (UPS) system (in brief, EUPSS) is brought forward for long-distance monitoring and controlling of UPS based on Web. The implementation of system is based on ATmega161, RTL8019AS and Arm chips with TCP/IP protocol suite for communication. In the embedded UPS system, an embedded file system is designed and implemented which saves the data and index information on a serial EEPROM chip in a structured way and communicates with a microcontroller unit through I2C bus. By embedding the file system into UPS system or other information appliances, users can access and manipulate local data on the web client side. Embedded file system on chips will play a major role in the growth of IP networking. Based on our experiment tests, the mobile users can easily monitor and control UPS in different places of long-distance. The performance of EUPSS has satisfied the requirements of all kinds of Web-based mobile applications.

  13. To Be or Not to Be: The Roles of the Unilateral and Embedded Reporter during Wartime

    DTIC Science & Technology

    2009-12-11

    the military disseminate information, employ the use of modern communication means, and engage the public and the media. The Pattern of Censorship A...correspondent attached to the 21st Lancers, evaded censorship by sending his stories as letters instead of using the telegraph. When the Boer War...advances and societal changes, censorship in today‟s world is not as easy as it used to be which has created a more open environment that will probably

  14. Becoming business critical: Knowledge for Healthcare.

    PubMed

    Lacey Bryant, Sue; Stewart, David; Goswami, Louise; Grant, Maria J

    2016-09-01

    Significant progress has been made in implementing Knowledge for Healthcare. This editorial reports the central contribution of effective partnerships and the involvement of librarians and knowledge specialists in this work. There are compelling business priorities. Key elements of work-streams on demonstrating impact, workforce development and streamlining are indicated, along with areas of growing importance - knowledge management, embedded roles and health information for the public and patients. Knowledge, and the skills to help people to use it, are business critical. © 2016 Health Libraries Group.

  15. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.

    PubMed

    Wang, Maocai; Dai, Guangming; Choo, Kim-Kwang Raymond; Jayaraman, Prem Prakash; Ranjan, Rajiv

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al.

  16. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

    PubMed Central

    Dai, Guangming

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user’s public key based on the user’s identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al. PMID:27564373

  17. Embedding strategies for effective use of information from multiple sequence alignments.

    PubMed Central

    Henikoff, S.; Henikoff, J. G.

    1997-01-01

    We describe a new strategy for utilizing multiple sequence alignment information to detect distant relationships in searches of sequence databases. A single sequence representing a protein family is enriched by replacing conserved regions with position-specific scoring matrices (PSSMs) or consensus residues derived from multiple alignments of family members. In comprehensive tests of these and other family representations, PSSM-embedded queries produced the best results overall when used with a special version of the Smith-Waterman searching algorithm. Moreover, embedding consensus residues instead of PSSMs improved performance with readily available single sequence query searching programs, such as BLAST and FASTA. Embedding PSSMs or consensus residues into a representative sequence improves searching performance by extracting multiple alignment information from motif regions while retaining single sequence information where alignment is uncertain. PMID:9070452

  18. "Excuse Me, but What Is a Research Paper?": Embedded Librarian Program and Information Literacy Skills of Community College Students

    ERIC Educational Resources Information Center

    Kim, Miseon; Dolan, Michael

    2015-01-01

    This paper examines the embedded librarian program and its impact on the information literacy skills of community college students at Queensborough Community College (QCC). It is a collaboration between an embedded librarian and an English instructor at QCC. The study participants are QCC students enrolled in seven sections of English 101 and…

  19. Breaking down the barriers of using strong authentication and encryption in resource constrained embedded systems

    NASA Astrophysics Data System (ADS)

    Knobler, Ron; Scheffel, Peter; Jackson, Scott; Gaj, Kris; Kaps, Jens Peter

    2013-05-01

    Various embedded systems, such as unattended ground sensors (UGS), are deployed in dangerous areas, where they are subject to compromise. Since numerous systems contain a network of devices that communicate with each other (often times with commercial off the shelf [COTS] radios), an adversary is able to intercept messages between system devices, which jeopardizes sensitive information transmitted by the system (e.g. location of system devices). Secret key algorithms such as AES are a very common means to encrypt all system messages to a sufficient security level, for which lightweight implementations exist for even very resource constrained devices. However, all system devices must use the appropriate key to encrypt and decrypt messages from each other. While traditional public key algorithms (PKAs), such as RSA and Elliptic Curve Cryptography (ECC), provide a sufficiently secure means to provide authentication and a means to exchange keys, these traditional PKAs are not suitable for very resource constrained embedded systems or systems which contain low reliability communication links (e.g. mesh networks), especially as the size of the network increases. Therefore, most UGS and other embedded systems resort to pre-placed keys (PPKs) or other naïve schemes which greatly reduce the security and effectiveness of the overall cryptographic approach. McQ has teamed with the Cryptographic Engineering Research Group (CERG) at George Mason University (GMU) to develop an approach using revolutionary cryptographic techniques that provides both authentication and encryption, but on resource constrained embedded devices, without the burden of large amounts of key distribution or storage.

  20. Privacy-Preserving Predictive Modeling: Harmonization of Contextual Embeddings From Different Sources.

    PubMed

    Huang, Yingxiang; Lee, Junghye; Wang, Shuang; Sun, Jimeng; Liu, Hongfang; Jiang, Xiaoqian

    2018-05-16

    Data sharing has been a big challenge in biomedical informatics because of privacy concerns. Contextual embedding models have demonstrated a very strong representative capability to describe medical concepts (and their context), and they have shown promise as an alternative way to support deep-learning applications without the need to disclose original data. However, contextual embedding models acquired from individual hospitals cannot be directly combined because their embedding spaces are different, and naive pooling renders combined embeddings useless. The aim of this study was to present a novel approach to address these issues and to promote sharing representation without sharing data. Without sacrificing privacy, we also aimed to build a global model from representations learned from local private data and synchronize information from multiple sources. We propose a methodology that harmonizes different local contextual embeddings into a global model. We used Word2Vec to generate contextual embeddings from each source and Procrustes to fuse different vector models into one common space by using a list of corresponding pairs as anchor points. We performed prediction analysis with harmonized embeddings. We used sequential medical events extracted from the Medical Information Mart for Intensive Care III database to evaluate the proposed methodology in predicting the next likely diagnosis of a new patient using either structured data or unstructured data. Under different experimental scenarios, we confirmed that the global model built from harmonized local models achieves a more accurate prediction than local models and global models built from naive pooling. Such aggregation of local models using our unique harmonization can serve as the proxy for a global model, combining information from a wide range of institutions and information sources. It allows information unique to a certain hospital to become available to other sites, increasing the fluidity of information flow in health care. ©Yingxiang Huang, Junghye Lee, Shuang Wang, Jimeng Sun, Hongfang Liu, Xiaoqian Jiang. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 16.05.2018.

  1. Moving Object Detection in Heterogeneous Conditions in Embedded Systems.

    PubMed

    Garbo, Alessandro; Quer, Stefano

    2017-07-01

    This paper presents a system for moving object exposure, focusing on pedestrian detection, in external, unfriendly, and heterogeneous environments. The system manipulates and accurately merges information coming from subsequent video frames, making small computational efforts in each single frame. Its main characterizing feature is to combine several well-known movement detection and tracking techniques, and to orchestrate them in a smart way to obtain good results in diversified scenarios. It uses dynamically adjusted thresholds to characterize different regions of interest, and it also adopts techniques to efficiently track movements, and detect and correct false positives. Accuracy and reliability mainly depend on the overall receipt, i.e., on how the software system is designed and implemented, on how the different algorithmic phases communicate information and collaborate with each other, and on how concurrency is organized. The application is specifically designed to work with inexpensive hardware devices, such as off-the-shelf video cameras and small embedded computational units, eventually forming an intelligent urban grid. As a matter of fact, the major contribution of the paper is the presentation of a tool for real-time applications in embedded devices with finite computational (time and memory) resources. We run experimental results on several video sequences (both home-made and publicly available), showing the robustness and accuracy of the overall detection strategy. Comparisons with state-of-the-art strategies show that our application has similar tracking accuracy but much higher frame-per-second rates.

  2. Moving Object Detection in Heterogeneous Conditions in Embedded Systems

    PubMed Central

    Garbo, Alessandro

    2017-01-01

    This paper presents a system for moving object exposure, focusing on pedestrian detection, in external, unfriendly, and heterogeneous environments. The system manipulates and accurately merges information coming from subsequent video frames, making small computational efforts in each single frame. Its main characterizing feature is to combine several well-known movement detection and tracking techniques, and to orchestrate them in a smart way to obtain good results in diversified scenarios. It uses dynamically adjusted thresholds to characterize different regions of interest, and it also adopts techniques to efficiently track movements, and detect and correct false positives. Accuracy and reliability mainly depend on the overall receipt, i.e., on how the software system is designed and implemented, on how the different algorithmic phases communicate information and collaborate with each other, and on how concurrency is organized. The application is specifically designed to work with inexpensive hardware devices, such as off-the-shelf video cameras and small embedded computational units, eventually forming an intelligent urban grid. As a matter of fact, the major contribution of the paper is the presentation of a tool for real-time applications in embedded devices with finite computational (time and memory) resources. We run experimental results on several video sequences (both home-made and publicly available), showing the robustness and accuracy of the overall detection strategy. Comparisons with state-of-the-art strategies show that our application has similar tracking accuracy but much higher frame-per-second rates. PMID:28671582

  3. Shared decision-making.

    PubMed

    Godolphin, William

    2009-01-01

    Shared decision-making has been called the crux of patient-centred care and identified as a key part of change for improved quality and safety in healthcare. However, it rarely happens, is hard to do and is not taught - for many reasons. Talking with patients about options is not embedded in the attitudes or communication skills training of most healthcare professionals. Information tools such as patient decision aids, personal health records and the Internet will help to shift this state, as will policy that drives patient and public involvement in healthcare delivery and training.

  4. Evaluation of guardrail embedded lighting system in Trinidad, Colorado.

    DOT National Transportation Integrated Search

    2014-02-01

    This report provides information on the design considerations of the embedded highway lighting : design on Interstate-25 in Trinidad, Colorado, in terms of visibility. The information is based on : visibility characterizations of small targets using ...

  5. Embedded Librarians: Just-in-Time or Just-in-Case? A Research Study

    ERIC Educational Resources Information Center

    Heathcock, Kristin

    2015-01-01

    Embedded librarians in online courses provide a wealth of service and information to students. Though students indicate that these services are valuable, the librarians providing embedded services frequently note that these projects are very time consuming. This study examines the provision of a less time-intensive model of embedded librarianship…

  6. The use of tacit and explicit knowledge in public health: a qualitative study

    PubMed Central

    2012-01-01

    Background Planning a public health initiative is both a science and an art. Public health practitioners work in a complex, often time-constrained environment, where formal research literature can be unavailable or uncertain. Consequently, public health practitioners often draw upon other forms of knowledge. Methods Through use of one-on-one interviews and focus groups, we aimed to gain a better understanding of how tacit knowledge is used to inform program initiatives in public health. This study was designed as a narrative inquiry, which is based on the assumption that we make sense of the world by telling stories. Four public health units were purposively selected for maximum variation, based on geography and academic affiliation. Results Analysis revealed different ways in which tacit knowledge was used to plan the public health program or initiative, including discovering the opportunity, bringing a team together, and working out program details (such as partnering, funding). Conclusions The findings of this study demonstrate that tacit knowledge is drawn upon, and embedded within, various stages of the process of program planning in public health. The results will be useful in guiding the development of future knowledge translation strategies for public health organizations and decision makers. PMID:22433980

  7. Extracting similar terms from multiple EMR-based semantic embeddings to support chart reviews.

    PubMed

    Cheng Ye, M S; Fabbri, Daniel

    2018-05-21

    Word embeddings project semantically similar terms into nearby points in a vector space. When trained on clinical text, these embeddings can be leveraged to improve keyword search and text highlighting. In this paper, we present methods to refine the selection process of similar terms from multiple EMR-based word embeddings, and evaluate their performance quantitatively and qualitatively across multiple chart review tasks. Word embeddings were trained on each clinical note type in an EMR. These embeddings were then combined, weighted, and truncated to select a refined set of similar terms to be used in keyword search and text highlighting. To evaluate their quality, we measured the similar terms' information retrieval (IR) performance using precision-at-K (P@5, P@10). Additionally a user study evaluated users' search term preferences, while a timing study measured the time to answer a question from a clinical chart. The refined terms outperformed the baseline method's information retrieval performance (e.g., increasing the average P@5 from 0.48 to 0.60). Additionally, the refined terms were preferred by most users, and reduced the average time to answer a question. Clinical information can be more quickly retrieved and synthesized when using semantically similar term from multiple embeddings. Copyright © 2018. Published by Elsevier Inc.

  8. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    PubMed Central

    Tuckley, Kushal

    2017-01-01

    In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient's information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB) obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image. PMID:29104744

  9. Data Embedding for Covert Communications, Digital Watermarking, and Information Augmentation

    DTIC Science & Technology

    2000-03-01

    proposed an image authentication algorithm based on the fragility of messages embedded in digital images using LSB encoding. In [Walt95], he proposes...Invertibility 2/ 3 SAMPLE DATA EMBEDDING TECHNIQUES 23 3.1 SPATIAL TECHNIQUES 23 LSB Encoding in Intensity Images 23 Data embedding...ATTACK 21 FIGURE 6. EFFECTS OF LSB ENCODING 25 FIGURE 7. ALGORITHM FOR EZSTEGO 28 FIGURE 8. DATA EMBEDDING IN THE FREQUENCY DOMAIN 30 FIGURE 9

  10. Gear Fatigue Crack Diagnosis by Vibration Analysis Using Embedded Modeling

    DTIC Science & Technology

    2001-04-05

    gave references on Wigner - Ville Distribution ( WVD ) and some statistical based methods including FM4, NA4 and NB4. There are limitations for vibration...Embedded Modeling DISTRIBUTION : Approved for public release, distribution unlimited This paper is part of the following report: TITLE: New Frontiers in

  11. Visual content highlighting via automatic extraction of embedded captions on MPEG compressed video

    NASA Astrophysics Data System (ADS)

    Yeo, Boon-Lock; Liu, Bede

    1996-03-01

    Embedded captions in TV programs such as news broadcasts, documentaries and coverage of sports events provide important information on the underlying events. In digital video libraries, such captions represent a highly condensed form of key information on the contents of the video. In this paper we propose a scheme to automatically detect the presence of captions embedded in video frames. The proposed method operates on reduced image sequences which are efficiently reconstructed from compressed MPEG video and thus does not require full frame decompression. The detection, extraction and analysis of embedded captions help to capture the highlights of visual contents in video documents for better organization of video, to present succinctly the important messages embedded in the images, and to facilitate browsing, searching and retrieval of relevant clips.

  12. Recent progress in automatically extracting information from the pharmacogenomic literature

    PubMed Central

    Garten, Yael; Coulet, Adrien; Altman, Russ B

    2011-01-01

    The biomedical literature holds our understanding of pharmacogenomics, but it is dispersed across many journals. In order to integrate our knowledge, connect important facts across publications and generate new hypotheses we must organize and encode the contents of the literature. By creating databases of structured pharmocogenomic knowledge, we can make the value of the literature much greater than the sum of the individual reports. We can, for example, generate candidate gene lists or interpret surprising hits in genome-wide association studies. Text mining automatically adds structure to the unstructured knowledge embedded in millions of publications, and recent years have seen a surge in work on biomedical text mining, some specific to pharmacogenomics literature. These methods enable extraction of specific types of information and can also provide answers to general, systemic queries. In this article, we describe the main tasks of text mining in the context of pharmacogenomics, summarize recent applications and anticipate the next phase of text mining applications. PMID:21047206

  13. Grinding Wheel System

    DOEpatents

    Malkin, Stephen; Gao, Robert; Guo, Changsheng; Varghese, Biju; Pathare, Sumukh

    2003-08-05

    A grinding wheel system includes a grinding wheel with at least one embedded sensor. The system also includes an adapter disk containing electronics that process signals produced by each embedded sensor and that transmits sensor information to a data processing platform for further processing of the transmitted information.

  14. Grinding Wheel System

    DOEpatents

    Malkin, Stephen; Gao, Robert; Guo, Changsheng; Varghese, Biju; Pathare, Sumukh

    2006-01-10

    A grinding wheel system includes a grinding wheel with at least one embedded sensor. The system also includes an adapter disk containing electronics that process signals produced by each embedded sensor and that transmits sensor information to a data processing platform for further processing of the transmitted information.

  15. Adapting Word Embeddings from Multiple Domains to Symptom Recognition from Psychiatric Notes

    PubMed Central

    Zhang, Yaoyun; Li, Hee-Jin; Wang, Jingqi; Cohen, Trevor; Roberts, Kirk; Xu, Hua

    2018-01-01

    Mental health is increasingly recognized an important topic in healthcare. Information concerning psychiatric symptoms is critical for the timely diagnosis of mental disorders, as well as for the personalization of interventions. However, the diversity and sparsity of psychiatric symptoms make it challenging for conventional natural language processing techniques to automatically extract such information from clinical text. To address this problem, this study takes the initiative to use and adapt word embeddings from four source domains – intensive care, biomedical literature, Wikipedia and Psychiatric Forum – to recognize symptoms in the target domain of psychiatry. We investigated four different approaches including 1) only using word embeddings of the source domain, 2) directly combining data of the source and target to generate word embeddings, 3) assigning different weights to word embeddings, and 4) retraining the word embedding model of the source domain using a corpus of the target domain. To the best of our knowledge, this is the first work of adapting multiple word embeddings of external domains to improve psychiatric symptom recognition in clinical text. Experimental results showed that the last two approaches outperformed the baseline methods, indicating the effectiveness of our new strategies to leverage embeddings from other domains. PMID:29888086

  16. Asymmetric distances for binary embeddings.

    PubMed

    Gordo, Albert; Perronnin, Florent; Gong, Yunchao; Lazebnik, Svetlana

    2014-01-01

    In large-scale query-by-example retrieval, embedding image signatures in a binary space offers two benefits: data compression and search efficiency. While most embedding algorithms binarize both query and database signatures, it has been noted that this is not strictly a requirement. Indeed, asymmetric schemes that binarize the database signatures but not the query still enjoy the same two benefits but may provide superior accuracy. In this work, we propose two general asymmetric distances that are applicable to a wide variety of embedding techniques including locality sensitive hashing (LSH), locality sensitive binary codes (LSBC), spectral hashing (SH), PCA embedding (PCAE), PCAE with random rotations (PCAE-RR), and PCAE with iterative quantization (PCAE-ITQ). We experiment on four public benchmarks containing up to 1M images and show that the proposed asymmetric distances consistently lead to large improvements over the symmetric Hamming distance for all binary embedding techniques.

  17. Development of EPA Protocol Information Enquiry Service System Based on Embedded ARM Linux

    NASA Astrophysics Data System (ADS)

    Peng, Daogang; Zhang, Hao; Weng, Jiannian; Li, Hui; Xia, Fei

    Industrial Ethernet is a new technology for industrial network communications developed in recent years. In the field of industrial automation in China, EPA is the first standard accepted and published by ISO, and has been included in the fourth edition IEC61158 Fieldbus of NO.14 type. According to EPA standard, Field devices such as industrial field controller, actuator and other instruments are all able to realize communication based on the Ethernet standard. The Atmel AT91RM9200 embedded development board and open source embedded Linux are used to develop an information inquiry service system of EPA protocol based on embedded ARM Linux in this paper. The system is capable of designing an EPA Server program for EPA data acquisition procedures, the EPA information inquiry service is available for programs in local or remote host through Socket interface. The EPA client can access data and information of other EPA equipments on the EPA network when it establishes connection with the monitoring port of the server.

  18. A Community of First-Year Teachers: Collaboration between Higher Education and Public Schools to Improve Teacher Retention

    ERIC Educational Resources Information Center

    Good, Jennifer; Bennett, Joan

    2005-01-01

    Teacher retention is a critical problem in public education (Ingersoll, 2002), demanding collaboration between universities and local public school systems. Using veteran teacher mentors employed in a public school system to facilitate ongoing monthly support groups, communities of beginning teachers were formed, embedded within the public schools…

  19. Architecture of an E-Learning System with Embedded Authoring Support.

    ERIC Educational Resources Information Center

    Baudry, Andreas; Bungenstock, Michael; Mertsching, Barbel

    This paper introduces an architecture for an e-learning system with an embedded authoring system. Based on the metaphor of a construction kit, this approach offers a general solution for specific content creation and publication. The learning resources are IMS "Content Packages" with a special structure to separate content and presentation. These…

  20. Pharmacovigilance from social media: mining adverse drug reaction mentions using sequence labeling with word embedding cluster features.

    PubMed

    Nikfarjam, Azadeh; Sarker, Abeed; O'Connor, Karen; Ginn, Rachel; Gonzalez, Graciela

    2015-05-01

    Social media is becoming increasingly popular as a platform for sharing personal health-related information. This information can be utilized for public health monitoring tasks, particularly for pharmacovigilance, via the use of natural language processing (NLP) techniques. However, the language in social media is highly informal, and user-expressed medical concepts are often nontechnical, descriptive, and challenging to extract. There has been limited progress in addressing these challenges, and thus far, advanced machine learning-based NLP techniques have been underutilized. Our objective is to design a machine learning-based approach to extract mentions of adverse drug reactions (ADRs) from highly informal text in social media. We introduce ADRMine, a machine learning-based concept extraction system that uses conditional random fields (CRFs). ADRMine utilizes a variety of features, including a novel feature for modeling words' semantic similarities. The similarities are modeled by clustering words based on unsupervised, pretrained word representation vectors (embeddings) generated from unlabeled user posts in social media using a deep learning technique. ADRMine outperforms several strong baseline systems in the ADR extraction task by achieving an F-measure of 0.82. Feature analysis demonstrates that the proposed word cluster features significantly improve extraction performance. It is possible to extract complex medical concepts, with relatively high performance, from informal, user-generated content. Our approach is particularly scalable, suitable for social media mining, as it relies on large volumes of unlabeled data, thus diminishing the need for large, annotated training data sets. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association.

  1. High capacity reversible watermarking for audio by histogram shifting and predicted error expansion.

    PubMed

    Wang, Fei; Xie, Zhaoxin; Chen, Zuo

    2014-01-01

    Being reversible, the watermarking information embedded in audio signals can be extracted while the original audio data can achieve lossless recovery. Currently, the few reversible audio watermarking algorithms are confronted with following problems: relatively low SNR (signal-to-noise) of embedded audio; a large amount of auxiliary embedded location information; and the absence of accurate capacity control capability. In this paper, we present a novel reversible audio watermarking scheme based on improved prediction error expansion and histogram shifting. First, we use differential evolution algorithm to optimize prediction coefficients and then apply prediction error expansion to output stego data. Second, in order to reduce location map bits length, we introduced histogram shifting scheme. Meanwhile, the prediction error modification threshold according to a given embedding capacity can be computed by our proposed scheme. Experiments show that this algorithm improves the SNR of embedded audio signals and embedding capacity, drastically reduces location map bits length, and enhances capacity control capability.

  2. A funding model for health visiting (part 2): impact and implementation.

    PubMed

    Cowley, Sarah

    2007-12-01

    This is the second of two papers offering the information required to work out how to fund a health visiting service. The first paper gave the basic requirements, while this one identifies and explains the separate components of the service along with issues of scope and skillmix. In this way, it starts to describe the programmes embedded within a generic health visiting service, which is helpful in terms of what might be expected in terms of impact and outcomes. These are described with reference to the new Public Service Agreement targets and other relevant policy.

  3. Modular error embedding

    DOEpatents

    Sandford, II, Maxwell T.; Handel, Theodore G.; Ettinger, J. Mark

    1999-01-01

    A method of embedding auxiliary information into the digital representation of host data containing noise in the low-order bits. The method applies to digital data representing analog signals, for example digital images. The method reduces the error introduced by other methods that replace the low-order bits with auxiliary information. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user through use of a digital key. The modular error embedding method includes a process to permute the order in which the host data values are processed. The method doubles the amount of auxiliary information that can be added to host data values, in comparison with bit-replacement methods for high bit-rate coding. The invention preserves human perception of the meaning and content of the host data, permitting the addition of auxiliary data in the amount of 50% or greater of the original host data.

  4. Recurrence plot statistics and the effect of embedding

    NASA Astrophysics Data System (ADS)

    March, T. K.; Chapman, S. C.; Dendy, R. O.

    2005-01-01

    Recurrence plots provide a graphical representation of the recurrent patterns in a timeseries, the quantification of which is a relatively new field. Here we derive analytical expressions which relate the values of key statistics, notably determinism and entropy of line length distribution, to the correlation sum as a function of embedding dimension. These expressions are obtained by deriving the transformation which generates an embedded recurrence plot from an unembedded plot. A single unembedded recurrence plot thus provides the statistics of all possible embedded recurrence plots. If the correlation sum scales exponentially with embedding dimension, we show that these statistics are determined entirely by the exponent of the exponential. This explains the results of Iwanski and Bradley [J.S. Iwanski, E. Bradley, Recurrence plots of experimental data: to embed or not to embed? Chaos 8 (1998) 861-871] who found that certain recurrence plot statistics are apparently invariant to embedding dimension for certain low-dimensional systems. We also examine the relationship between the mutual information content of two timeseries and the common recurrent structure seen in their recurrence plots. This allows time-localized contributions to mutual information to be visualized. This technique is demonstrated using geomagnetic index data; we show that the AU and AL geomagnetic indices share half their information, and find the timescale on which mutual features appear.

  5. The content of social media's shared images about Ebola: a retrospective study.

    PubMed

    Seltzer, E K; Jean, N S; Kramer-Golinkoff, E; Asch, D A; Merchant, R M

    2015-09-01

    Social media have strongly influenced awareness and perceptions of public health emergencies, but a considerable amount of social media content is now carried through images, rather than just text. This study's objective is to explore how image-sharing platforms are used for information dissemination in public health emergencies. Retrospective review of images posted on two popular image-sharing platforms to characterize public discourse about Ebola. Using the keyword '#ebola' we identified a 1% sample of images posted on Instagram and Flickr across two sequential weeks in November 2014. Images from both platforms were independently coded by two reviewers and characterized by themes. We reviewed 1217 images posted on Instagram and Flickr and identified themes. Nine distinct themes were identified. These included: images of health care workers and professionals [308 (25%)], West Africa [75 (6%)], the Ebola virus [59 (5%)], and artistic renderings of Ebola [64 (5%)]. Also identified were images with accompanying embedded text related to Ebola and associated: facts [68 (6%)], fears [40 (3%)], politics [46 (4%)], and jokes [284 (23%)]. Several [273 (22%)] images were unrelated to Ebola or its sequelae. Instagram images were primarily coded as jokes [255 (42%)] or unrelated [219 (36%)], while Flickr images primarily depicted health care workers and other professionals [281 (46%)] providing care or other services for prevention or treatment. Image sharing platforms are being used for information exchange about public health crises, like Ebola. Use differs by platform and discerning these differences can help inform future uses for health care professionals and researchers seeking to assess public fears and misinformation or provide targeted education/awareness interventions. Copyright © 2015 The Royal Institute of Public Health. All rights reserved.

  6. Embedded Information Literacy in the Basic Oral Communication Course: From Conception through Assessment

    ERIC Educational Resources Information Center

    Weaver, Kari D.; Pier, Penni M.

    2010-01-01

    This article explores the process of embedding information literacy into a basic oral communication course. Discussion includes student performance as an impetus for change, collaborative course design between the oral communication teaching team and instructional librarians, and assessment initiatives. Suggestions for future collaborative work…

  7. Clear Resin Casting of Arthropods of Medical Importance for Use in Educational and Outreach Activities

    PubMed Central

    Bejcek, Justin R; Curtis-Robles, Rachel; Riley, Michael; Brundage, Adrienne; Hamer, Gabriel L

    2018-01-01

    Abstract Arthropod-related morbidity and mortality represent a major threat to human and animal health. An important component of reducing vector-borne diseases and injuries is training the next generation of medical entomologists and educating the public in proper identification of arthropods of medical importance. One challenge of student training and public outreach is achieving a safe mounting technique that allows observation of morphological characteristics, while minimizing damage to specimens that are often difficult to replace. Although resin-embedded specimens are available from commercial retailers, there is a need for a published protocol that allows entomologists to economically create high-quality resin-embedded arthropods for use in teaching and outreach activities. We developed a detailed protocol using readily obtained equipment and supplies for creating resin-embedded arthropods of many species for use in teaching and outreach activities. PMID:29718496

  8. Embedding health literacy into health systems: a case study of a regional health service.

    PubMed

    Vellar, Lucia; Mastroianni, Fiorina; Lambert, Kelly

    2017-12-01

    Objective The aim of the present study was to describe how one regional health service the Illawarra Shoalhaven Local Health District embedded health literacy principles into health systems over a 3-year period. Methods Using a case study approach, this article describes the development of key programs and the manner in which clinical incidents were used to create a health environment that allows consumers the right to equitably access quality health services and to participate in their own health care. Results The key outcomes demonstrating successful embedding of health literacy into health systems in this regional health service include the creation of a governance structure and web-based platform for developing and testing plain English consumer health information, a clearly defined process to engage with consumers, development of the health literacy ambassador training program and integrating health literacy into clinical quality improvement processes via a formal program with consumers to guide processes such as improvements to access and navigation around hospital sites. Conclusions The Illawarra Shoalhaven Local Health District has developed an evidence-based health literacy framework, guided by the core principles of universal precaution and organisational responsibility. Health literacy was also viewed as both an outcome and a process. The approach taken by the Illawarra Shoalhaven Local Health District to address poor health literacy in a coordinated way has been recognised by the Australian Commission on Safety and Quality in Health Care as an exemplar of a coordinated approach to embed health literacy into health systems. What is known about the topic? Poor health literacy is a significant national concern in Australia. The leadership, governance and consumer partnership culture of a health organisation can have considerable effects on an individual's ability to access, understand and apply the health-related information and services available to them. Currently, only 40% of consumers in Australia have the health literacy skills needed to understand everyday health information to effectively access and use health services. What does this paper add? Addressing health literacy in a coordinated way has the potential to increase safety and quality of care. This paper outlines the practical and sustainable actions the Illawarra Shoalhaven Local Health District took to partner with consumers to address health literacy and to improve the health experience and health outcomes of consumers. Embedding health literacy into public health services requires a coordinated whole-of-organisation approach; it requires the integration of leadership and governance, revision of consumer health information and revision of consumer and staff processes to effect change and support the delivery of health-literate healthcare services. What are the implications for practitioners? Embedding health literacy into health systems promotes equitable, safe and quality healthcare. Practitioners in a health-literate environment adopt consumer-centred communication and care strategies, provide information in a way that is easy to understand and follow and involve consumers and their families in decisions regarding and management of the consumer's care.

  9. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD) Scheme

    PubMed Central

    Idbeaa, Tarik; Abdul Samad, Salina; Husain, Hafizah

    2016-01-01

    This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES) algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values. PMID:26963093

  10. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD) Scheme.

    PubMed

    Idbeaa, Tarik; Abdul Samad, Salina; Husain, Hafizah

    2016-01-01

    This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES) algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  11. Embedded Advertising on Television: Classic Legal Environment and Business Law Content "Brought to You by ..."

    ERIC Educational Resources Information Center

    Cain, Rita Marie

    2010-01-01

    Students are familiar with some or all depictions of branded products in popular television shows. But they probably have no idea the number of legal and public policy issues these product appearances are generating. This article explains how embedded advertising in television shows can be the attention-grabbing vehicle for teaching numerous…

  12. Embedding Research in a Field-Based Module through Peer Review and Assessment for Learning

    ERIC Educational Resources Information Center

    Nicholson, Dawn T.

    2011-01-01

    A case study is presented of embedding research in a final year undergraduate, field-based, physical geography module. The approach is holistic, whereby research-based learning activities simulate the full life cycle of research from inception through to peer review and publication. The learning, teaching and assessment strategy emphasizes the…

  13. Synthetic Biology between Self-Regulation and Public Discourse: Ethical Issues and the Many Roles of the Ethicist.

    PubMed

    Arnason, Gardar

    2017-04-01

    This article discusses the roles of ethicists in the governance of synthetic biology. I am particularly concerned with the idea of self-regulation of bioscience and its relationship to public discourse about ethical issues in bioscience. I will look at the role of philosophical ethicists at different levels and loci, from the "embedded ethicist" in the laboratory or research project, to ethicists' impact on policy and public discourse. In a democratic society, the development of governance frameworks for emerging technologies, such as synthetic biology, needs to be guided by a well-informed public discourse. In the case of synthetic biology, the public discourse has to go further than merely considering technical issues of biosafety and biosecurity, or risk management, to consider more philosophical issues concerning the meaning and value of "life" between the natural and the synthetic. I argue that ethicists have moral expertise to bring to the public arena, which consists not only in guiding the debate but also in evaluating arguments and moral positions and making normative judgments. When ethicists make normative claims or moral judgments, they must be transparent about their theoretical positions and basic moral standpoints.

  14. Semi-Supervised Tensor-Based Graph Embedding Learning and Its Application to Visual Discriminant Tracking.

    PubMed

    Hu, Weiming; Gao, Jin; Xing, Junliang; Zhang, Chao; Maybank, Stephen

    2017-01-01

    An appearance model adaptable to changes in object appearance is critical in visual object tracking. In this paper, we treat an image patch as a two-order tensor which preserves the original image structure. We design two graphs for characterizing the intrinsic local geometrical structure of the tensor samples of the object and the background. Graph embedding is used to reduce the dimensions of the tensors while preserving the structure of the graphs. Then, a discriminant embedding space is constructed. We prove two propositions for finding the transformation matrices which are used to map the original tensor samples to the tensor-based graph embedding space. In order to encode more discriminant information in the embedding space, we propose a transfer-learning- based semi-supervised strategy to iteratively adjust the embedding space into which discriminative information obtained from earlier times is transferred. We apply the proposed semi-supervised tensor-based graph embedding learning algorithm to visual tracking. The new tracking algorithm captures an object's appearance characteristics during tracking and uses a particle filter to estimate the optimal object state. Experimental results on the CVPR 2013 benchmark dataset demonstrate the effectiveness of the proposed tracking algorithm.

  15. 75 FR 76930 - Real-Time Public Reporting of Swap Transaction Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-10

    ... COMMODITY FUTURES TRADING COMMISSION 17 CFR Part 43 RIN 3038-AD08 Real-Time Public Reporting of Swap Transaction Data Correction In proposed rule document 2010-29994 beginning on page 76140 in the...--Additional Real-Time Public Reporting Data Fields for Options, Swaptions and Swaps with Embedded Options...

  16. Viewpoint: The Challenge of Creating Engaged Public Research Universities

    ERIC Educational Resources Information Center

    Cherwitz, Rick

    2010-01-01

    The quest to create engaged public research universities requires academe to confront a stark reality: inflexible administrative structures, historically embedded practices, status-quo thinking, and inertia. Until these obstacles are overcome, the retreat from public life will not be arrested. In this article, the author provides a sample of the…

  17. A secure and robust information hiding technique for covert communication

    NASA Astrophysics Data System (ADS)

    Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.

    2015-08-01

    The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.

  18. Intelligent Urban Public Transportation for Accessibility Dedicated to People with Disabilities

    PubMed Central

    Zhou, Haiying; Hou, Kun-Mean; Zuo, Decheng; Li, Jian

    2012-01-01

    The traditional urban public transport system generally cannot provide an effective access service for people with disabilities, especially for disabled, wheelchair and blind (DWB) passengers. In this paper, based on advanced information & communication technologies (ICT) and green technologies (GT) concepts, a dedicated public urban transportation service access system named Mobi+ has been introduced, which facilitates the mobility of DWB passengers. The Mobi+ project consists of three subsystems: a wireless communication subsystem, which provides the data exchange and network connection services between buses and stations in the complex urban environments; the bus subsystem, which provides the DWB class detection & bus arrival notification services; and the station subsystem, which implements the urban environmental surveillance & bus auxiliary access services. The Mobi+ card that supports multi-microcontroller multi-transceiver adopts the fault-tolerant component-based hardware architecture, in which the dedicated embedded system software, i.e., operating system micro-kernel and wireless protocol, has been integrated. The dedicated Mobi+ embedded system provides the fault-tolerant resource awareness communication and scheduling mechanism to ensure the reliability in data exchange and service provision. At present, the Mobi+ system has been implemented on the buses and stations of line ‘2’ in the city of Clermont-Ferrand (France). The experiential results show that, on one hand the Mobi+ prototype system reaches the design expectations and provides an effective urban bus access service for people with disabilities; on the other hand the Mobi+ system is easily to deploy in the buses and at bus stations thanks to its low energy consumption and small form factor. PMID:23112622

  19. Intelligent urban public transportation for accessibility dedicated to people with disabilities.

    PubMed

    Zhou, Haiying; Hou, Kun-Mean; Zuo, Decheng; Li, Jian

    2012-01-01

    The traditional urban public transport system generally cannot provide an effective access service for people with disabilities, especially for disabled, wheelchair and blind (DWB) passengers. In this paper, based on advanced information & communication technologies (ICT) and green technologies (GT) concepts, a dedicated public urban transportation service access system named Mobi+ has been introduced, which facilitates the mobility of DWB passengers. The Mobi+ project consists of three subsystems: a wireless communication subsystem, which provides the data exchange and network connection services between buses and stations in the complex urban environments; the bus subsystem, which provides the DWB class detection & bus arrival notification services; and the station subsystem, which implements the urban environmental surveillance & bus auxiliary access services. The Mobi+ card that supports multi-microcontroller multi-transceiver adopts the fault-tolerant component-based hardware architecture, in which the dedicated embedded system software, i.e., operating system micro-kernel and wireless protocol, has been integrated. The dedicated Mobi+ embedded system provides the fault-tolerant resource awareness communication and scheduling mechanism to ensure the reliability in data exchange and service provision. At present, the Mobi+ system has been implemented on the buses and stations of line '2' in the city of Clermont-Ferrand (France). The experiential results show that, on one hand the Mobi+ prototype system reaches the design expectations and provides an effective urban bus access service for people with disabilities; on the other hand the Mobi+ system is easily to deploy in the buses and at bus stations thanks to its low energy consumption and small form factor.

  20. Feature-based component model for design of embedded systems

    NASA Astrophysics Data System (ADS)

    Zha, Xuan Fang; Sriram, Ram D.

    2004-11-01

    An embedded system is a hybrid of hardware and software, which combines software's flexibility and hardware real-time performance. Embedded systems can be considered as assemblies of hardware and software components. An Open Embedded System Model (OESM) is currently being developed at NIST to provide a standard representation and exchange protocol for embedded systems and system-level design, simulation, and testing information. This paper proposes an approach to representing an embedded system feature-based model in OESM, i.e., Open Embedded System Feature Model (OESFM), addressing models of embedded system artifacts, embedded system components, embedded system features, and embedded system configuration/assembly. The approach provides an object-oriented UML (Unified Modeling Language) representation for the embedded system feature model and defines an extension to the NIST Core Product Model. The model provides a feature-based component framework allowing the designer to develop a virtual embedded system prototype through assembling virtual components. The framework not only provides a formal precise model of the embedded system prototype but also offers the possibility of designing variation of prototypes whose members are derived by changing certain virtual components with different features. A case study example is discussed to illustrate the embedded system model.

  1. Information-theoretic model selection for optimal prediction of stochastic dynamical systems from data

    NASA Astrophysics Data System (ADS)

    Darmon, David

    2018-03-01

    In the absence of mechanistic or phenomenological models of real-world systems, data-driven models become necessary. The discovery of various embedding theorems in the 1980s and 1990s motivated a powerful set of tools for analyzing deterministic dynamical systems via delay-coordinate embeddings of observations of their component states. However, in many branches of science, the condition of operational determinism is not satisfied, and stochastic models must be brought to bear. For such stochastic models, the tool set developed for delay-coordinate embedding is no longer appropriate, and a new toolkit must be developed. We present an information-theoretic criterion, the negative log-predictive likelihood, for selecting the embedding dimension for a predictively optimal data-driven model of a stochastic dynamical system. We develop a nonparametric estimator for the negative log-predictive likelihood and compare its performance to a recently proposed criterion based on active information storage. Finally, we show how the output of the model selection procedure can be used to compare candidate predictors for a stochastic system to an information-theoretic lower bound.

  2. One improved LSB steganography algorithm

    NASA Astrophysics Data System (ADS)

    Song, Bing; Zhang, Zhi-hong

    2013-03-01

    It is easy to be detected by X2 and RS steganalysis with high accuracy that using LSB algorithm to hide information in digital image. We started by selecting information embedded location and modifying the information embedded method, combined with sub-affine transformation and matrix coding method, improved the LSB algorithm and a new LSB algorithm was proposed. Experimental results show that the improved one can resist the X2 and RS steganalysis effectively.

  3. Dynamic and Contextual Information in HMM Modeling for Handwritten Word Recognition.

    PubMed

    Bianne-Bernard, Anne-Laure; Menasri, Farès; Al-Hajj Mohamad, Rami; Mokbel, Chafic; Kermorvant, Christopher; Likforman-Sulem, Laurence

    2011-10-01

    This study aims at building an efficient word recognition system resulting from the combination of three handwriting recognizers. The main component of this combined system is an HMM-based recognizer which considers dynamic and contextual information for a better modeling of writing units. For modeling the contextual units, a state-tying process based on decision tree clustering is introduced. Decision trees are built according to a set of expert-based questions on how characters are written. Questions are divided into global questions, yielding larger clusters, and precise questions, yielding smaller ones. Such clustering enables us to reduce the total number of models and Gaussians densities by 10. We then apply this modeling to the recognition of handwritten words. Experiments are conducted on three publicly available databases based on Latin or Arabic languages: Rimes, IAM, and OpenHart. The results obtained show that contextual information embedded with dynamic modeling significantly improves recognition.

  4. Delay differential analysis of time series.

    PubMed

    Lainscsek, Claudia; Sejnowski, Terrence J

    2015-03-01

    Nonlinear dynamical system analysis based on embedding theory has been used for modeling and prediction, but it also has applications to signal detection and classification of time series. An embedding creates a multidimensional geometrical object from a single time series. Traditionally either delay or derivative embeddings have been used. The delay embedding is composed of delayed versions of the signal, and the derivative embedding is composed of successive derivatives of the signal. The delay embedding has been extended to nonuniform embeddings to take multiple timescales into account. Both embeddings provide information on the underlying dynamical system without having direct access to all the system variables. Delay differential analysis is based on functional embeddings, a combination of the derivative embedding with nonuniform delay embeddings. Small delay differential equation (DDE) models that best represent relevant dynamic features of time series data are selected from a pool of candidate models for detection or classification. We show that the properties of DDEs support spectral analysis in the time domain where nonlinear correlation functions are used to detect frequencies, frequency and phase couplings, and bispectra. These can be efficiently computed with short time windows and are robust to noise. For frequency analysis, this framework is a multivariate extension of discrete Fourier transform (DFT), and for higher-order spectra, it is a linear and multivariate alternative to multidimensional fast Fourier transform of multidimensional correlations. This method can be applied to short or sparse time series and can be extended to cross-trial and cross-channel spectra if multiple short data segments of the same experiment are available. Together, this time-domain toolbox provides higher temporal resolution, increased frequency and phase coupling information, and it allows an easy and straightforward implementation of higher-order spectra across time compared with frequency-based methods such as the DFT and cross-spectral analysis.

  5. Diffusion-Based Density-Equalizing Maps: an Interdisciplinary Approach to Visualizing Homicide Rates and Other Georeferenced Statistical Data

    NASA Astrophysics Data System (ADS)

    Mazzitello, Karina I.; Candia, Julián

    2012-12-01

    In every country, public and private agencies allocate extensive funding to collect large-scale statistical data, which in turn are studied and analyzed in order to determine local, regional, national, and international policies regarding all aspects relevant to the welfare of society. One important aspect of that process is the visualization of statistical data with embedded geographical information, which most often relies on archaic methods such as maps colored according to graded scales. In this work, we apply nonstandard visualization techniques based on physical principles. We illustrate the method with recent statistics on homicide rates in Brazil and their correlation to other publicly available data. This physics-based approach provides a novel tool that can be used by interdisciplinary teams investigating statistics and model projections in a variety of fields such as economics and gross domestic product research, public health and epidemiology, sociodemographics, political science, business and marketing, and many others.

  6. Research and Design of Embedded Wireless Meal Ordering System Based on SQLite

    NASA Astrophysics Data System (ADS)

    Zhang, Jihong; Chen, Xiaoquan

    The paper describes features and internal architecture and developing method of SQLite. And then it gives a design and program of meal ordering system. The system realizes the information interaction among the users and embedded devices with SQLite as database system. The embedded database SQLite manages the data and achieves wireless communication by using Bluetooth. A system program based on Qt/Embedded and Linux drivers realizes the local management of environmental data.

  7. "You're just one of the group when you're embedded": report from a mixed-method investigation of the research-embedded health librarian experience.

    PubMed

    Greyson, Devon; Surette, Soleil; Dennett, Liz; Chatterley, Trish

    2013-10-01

    Embedded librarianship has received much attention in recent years. A model of embeddedness rarely discussed to date is that of research-embedded health librarians (REHLs). This study explores the characteristics of Canadian REHLs and the situations in which they are employed. The authors employed a sequential, mixed-method design. An online survey provided descriptive statistics about REHLs' positions and work experiences. This informed a series of focus group interviews that expanded upon the survey. Through constant comparison, we conducted qualitative descriptive analysis of the interviews. Based on twenty-nine survey responses and four group interviews, we created a portrait of a "typical" REHL and discovered themes relevant to REHL work. REHLs may identify more strongly as researchers than as librarians, with corresponding professional needs and rewards. REHLs value "belonging" to the research team, involvement in full project lifecycles, and in-depth relationships with nonlibrarian colleagues. Despite widely expressed job satisfaction, many REHLs struggle with isolation from library and information science peers and relative lack of job security. REHLs differ from non-embedded health librarians, as well as from other types of embedded librarians. REHLs' work also differs from just a decade or two ago, prior to widespread Internet access to digital resources. Given that research-embedded librarianship appears to be a distinct and growing subset of health librarianship, libraries, master's of library and information science programs, and professional associations will need to respond to the support and education needs of REHLs or risk losing them to the health research field.

  8. The impact of embedded support for underprepared students in a college chemistry course

    NASA Astrophysics Data System (ADS)

    Hesser, Tiffany L.

    This quasi-experimental study examined the impact of embedded support on academic success for students requiring remediation in college chemistry. Additional support for underprepared students incorporated within a course is recommended by Connecticut's Public Act 12-40, An Act Concerning College Readiness and Completion. For this study, embedded support consisted of weekly instructional support sessions and introduced the concepts of metacognitive awareness and motivation in learning. Students' progression through the course was measured using a series of standardized questions. Metacognitive awareness and motivation levels were measure at the start and completion of the semester using the Metacognitive Awareness Inventory (MAI) and Motivated Student Learning Questionnaire (MSLQ). It was found that with embedded support, underprepared students performed academically at a level equivalent to that of their college-ready peers. Based on these results, this embedded support model as an evidence-based practice should be considered in class development or policies surrounding students identified as underprepared.

  9. Internet embeddedness: links with online health information seeking, expectancy value/quality of health information websites, and Internet usage patterns.

    PubMed

    Leung, Louis

    2008-10-01

    To see how the Internet is actually embedded in our lives, this exploratory study examines how Internet users search the Web for important information, especially health or medical information, to make critical decisions, and the perception of how intimately our lives are embedded in the Internet intersects with patterns of health information seeking online and the expected quality of health information websites. Data from a probability sample of 569 Internet users found four types of commonly sought health information clusters online which included information on (a) health improvement, (b) medical treatment, (c) family health, and (d) health issues that are difficult to talk about. Results also show that behavior or behavioral intentions in health information seeking are in fact either a function of value expectancy or the evaluation of health information websites. More importantly, people who often go to the Internet for health information and have high expectations of the value and quality of health information websites (especially in terms of reliability, relevance/context, and interaction) tend to be those who are more likely to perceive the Internet as playing an important role in life decisions or rate the Internet as more embedded in their lives.

  10. Will They Use What You Taught Them? Course-Embedded Assessment of Accounting Students' Information Technology Self-Efficacy

    ERIC Educational Resources Information Center

    Moore, John W.; Mitchem, Cheryl E.

    2004-01-01

    This paper provides a model of course-embedded assessment for use in an undergraduate Accounting Information Systems course, and reports the results obtained from implementation. The profession's educational objectives are mapped to specific computer skills and assignments, to provide direct evidence of learning outcomes. Indirect evidence of…

  11. Embedded Librarianship Is Job One: Building on Instructional Synergies

    ERIC Educational Resources Information Center

    Tumbleson, Beth E.; Burke, John J.

    2010-01-01

    Information literacy instruction is provided in five formats: reference, one-shot sessions, credit courses, library Web sites, and embedded librarians. Each method offers distinct merits as well as limitations. Much can be gained by considering the swirl or interplay of all five and how working with one approach informs the others and results in a…

  12. What gets measured gets done: an assessment of local data uses and needs in large urban health departments.

    PubMed

    Castrucci, Brian C; Rhoades, Elizabeth K; Leider, Jonathon P; Hearne, Shelley

    2015-01-01

    The epidemiologic shift in the leading causes of mortality from infectious disease to chronic disease has created significant challenges for public health surveillance at the local level. We describe how the largest US city health departments identify and use data to inform their work and we identify the data and information that local public health leaders have specified as being necessary to help better address specific problems in their communities. We used a mixed-methods design that included key informant interviews, as well as a smaller embedded survey to quantify organizational characteristics related to data capacity. Interview data were independently coded and analyzed for major themes around data needs, barriers, and achievements. Forty-five public health leaders from each of 3 specific positions-local health official, chief of policy, and chief science or medical officer-in 16 large urban health departments. Public health leaders in large urban local health departments reported that timely data and data on chronic disease that are available at smaller geographical units are difficult to obtain without additional resources. Despite departments' successes in creating ad hoc sources of local data to effect policy change, all participants described the need for more timely data that could be geocoded at a neighborhood or census tract level to more effectively target their resources. Electronic health records, claims data, and hospital discharge data were identified as sources of data that could be used to augment the data currently available to local public health leaders. Monitoring the status of community health indicators and using the information to identify priority issues are core functions of all public health departments. Public health professionals must have access to timely "hyperlocal" data to detect trends, allocate resources to areas of greatest priority, and measure the effectiveness of interventions. Although innovations in the largest local health departments in large urban areas have established some methods to obtain local data on chronic disease, leaders recognize that there is an urgent need for more timely and more geographically specific data at the neighborhood or census tract level to efficiently and effectively address the most pressing problems in public health.

  13. Browne's Capgas Delusion: The Destruction of the Public University

    ERIC Educational Resources Information Center

    Holligan, Chris; Chiang, Kuang-Hsu

    2011-01-01

    The recent publication of the UK government's Browne Review 2010 on university and student funding signifies a massive step towards embedding capitalist free-market consumerist values and practices into UK higher education. This paper critically examines that paradigm shift away from public sector provision from the perspective of French Theory,…

  14. Change in the Embedding Dimension as an Indicator of an Approaching Transition

    PubMed Central

    Neuman, Yair; Marwan, Norbert; Cohen, Yohai

    2014-01-01

    Predicting a transition point in behavioral data should take into account the complexity of the signal being influenced by contextual factors. In this paper, we propose to analyze changes in the embedding dimension as contextual information indicating a proceeding transitive point, called OPtimal Embedding tRANsition Detection (OPERAND). Three texts were processed and translated to time-series of emotional polarity. It was found that changes in the embedding dimension proceeded transition points in the data. These preliminary results encourage further research into changes in the embedding dimension as generic markers of an approaching transition point. PMID:24979691

  15. Towards sensor array materials: can failure be delayed?

    PubMed Central

    Mekid, Samir; Saheb, Nouari; Khan, Shafique M A; Qureshi, Khurram K

    2015-01-01

    Further to prior development in enhancing structural health using smart materials, an innovative class of materials characterized by the ability to feel senses like humans, i.e. ‘nervous materials’, is discussed. Designed at all scales, these materials will enhance personnel and public safety, and secure greater reliability of products. Materials may fail suddenly, but any system wishes that failure is known in good time and delayed until safe conditions are reached. Nervous materials are expected to be the solution to this statement. This new class of materials is based on the novel concept of materials capable of feeling multiple structural and external stimuli, e.g. stress, force, pressure and temperature, while feeding information back to a controller for appropriate real-time action. The strain–stress state is developed in real time with the identified and characterized source of stimulus, with optimized time response to retrieve initial specified conditions, e.g. shape and strength. Sensors are volumetrically embedded and distributed, emulating the human nervous system. Immediate applications are in aircraft, cars, nuclear energy and robotics. Such materials will reduce maintenance costs, detect initial failures and delay them with self-healing. This article reviews the common aspects and challenges surrounding this new class of materials with types of sensors to be embedded seamlessly or inherently, including appropriate embedding manufacturing techniques with modeling and simulation methods. PMID:27877794

  16. Towards sensor array materials: can failure be delayed?

    NASA Astrophysics Data System (ADS)

    Mekid, Samir; Saheb, Nouari; Khan, Shafique M. A.; Qureshi, Khurram K.

    2015-06-01

    Further to prior development in enhancing structural health using smart materials, an innovative class of materials characterized by the ability to feel senses like humans, i.e. ‘nervous materials’, is discussed. Designed at all scales, these materials will enhance personnel and public safety, and secure greater reliability of products. Materials may fail suddenly, but any system wishes that failure is known in good time and delayed until safe conditions are reached. Nervous materials are expected to be the solution to this statement. This new class of materials is based on the novel concept of materials capable of feeling multiple structural and external stimuli, e.g. stress, force, pressure and temperature, while feeding information back to a controller for appropriate real-time action. The strain-stress state is developed in real time with the identified and characterized source of stimulus, with optimized time response to retrieve initial specified conditions, e.g. shape and strength. Sensors are volumetrically embedded and distributed, emulating the human nervous system. Immediate applications are in aircraft, cars, nuclear energy and robotics. Such materials will reduce maintenance costs, detect initial failures and delay them with self-healing. This article reviews the common aspects and challenges surrounding this new class of materials with types of sensors to be embedded seamlessly or inherently, including appropriate embedding manufacturing techniques with modeling and simulation methods.

  17. Robust Arm and Hand Tracking by Unsupervised Context Learning

    PubMed Central

    Spruyt, Vincent; Ledda, Alessandro; Philips, Wilfried

    2014-01-01

    Hand tracking in video is an increasingly popular research field due to the rise of novel human-computer interaction methods. However, robust and real-time hand tracking in unconstrained environments remains a challenging task due to the high number of degrees of freedom and the non-rigid character of the human hand. In this paper, we propose an unsupervised method to automatically learn the context in which a hand is embedded. This context includes the arm and any other object that coherently moves along with the hand. We introduce two novel methods to incorporate this context information into a probabilistic tracking framework, and introduce a simple yet effective solution to estimate the position of the arm. Finally, we show that our method greatly increases robustness against occlusion and cluttered background, without degrading tracking performance if no contextual information is available. The proposed real-time algorithm is shown to outperform the current state-of-the-art by evaluating it on three publicly available video datasets. Furthermore, a novel dataset is created and made publicly available for the research community. PMID:25004155

  18. Study and Application of Remote Data Moving Transmission under the Network Convergence

    NASA Astrophysics Data System (ADS)

    Zhiguo, Meng; Du, Zhou

    The data transmission is an important problem in remote applications. Advance of network convergence has help to select and use data transmission model. The embedded system and data management platform is a key of the design. With communication module, interface technology and the transceiver which has independent intellectual property rights connected broadband network and mobile network seamlessly. Using the distribution system of mobile base station to realize the wireless transmission, using public networks to implement the data transmission, making the distant information system break through area restrictions and realizing transmission of the moving data, it has been fully recognized in long-distance medical care applications.

  19. The Legacy of NASA Astrophysics E/PO: Conducting Professional Development, Developing Key Themes & Resources, and Broadening E/PO Audiences

    NASA Astrophysics Data System (ADS)

    Lawton, Brandon L.; Smith, Denise A.; Meinke, Bonnie K.; Bartolone, Lindsay; Manning, Jim; Schultz, Gregory R.; NASA Astrophysics E/PO Community

    2016-01-01

    For the past six years, NASA's Science Mission Directorate (SMD) has coordinated the work of its mission- and program-embedded education and public outreach (E/PO) efforts through four forums representing its four science divisions. The Astrophysics Forum, as the others, has built on SMD's long-standing principle of partnering scientists and educators and embedding E/PO in its missions to encourage and coordinate collaborative efforts to make the most efficient and effective use of NASA resources, personnel, data and discoveries in leveraged ways, in support of the nation's science education. Three priorities established early in the Forum's period of activity were to collaboratively enhance professional development for formal and informal educators, develop key themes & resources centered on astrophysics topics, and broaden the reach of astrophysics E/PO to traditionally underserved audiences in STEM subjects. This presentation will highlight some of the achievements of the Astrophysics E/PO community and Forum in these priority areas. This work constitutes an ongoing legacy--a firm foundation on which the new structure of NASA SMD education efforts will go forward.

  20. An Online Change of Activity in Energy Spectrum for Detection on an Early Intervention Robot

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boudergui, K.; Laine, F.; Montagu, T.

    With the growth of industrial risks and the multiplication of CBRNe (Chemical Biological Radiological and explosive) attacks through toxic chemicals, biological or radiological threats, public services and military authorities face with increasingly critical situations, whose management is strongly conditioned by fast and reliable establishment of an informative diagnostic. Right after an attack, the five first minutes are crucial to define the various scenarios and the most dangerous for a human intervention. Therefore the use of robots is considered essential by all stakeholders of security. In this context, the SISPEO project (Systeme d'Intervention Sapeurs Pompiers Robotise) aims to create/build/design a robustmore » response through a robotic platform for early intervention services such as civil and military security in hostile environments. CEA LIST has proposed an adapted solution to detect and characterize nuclear and radiological risks online and in motion, using a miniature embedded CdZnTe (CZT) crystal Gamma-ray spectrometer. This paper presents experimental results for this miniature embedded CZT spectrometer and its associated mathematical method to detect and characterize radiological threats online and in motion. (authors)« less

  1. Compact FPGA hardware architecture for public key encryption in embedded devices

    PubMed Central

    Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio

    2018-01-01

    Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in GF(p), commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x). PMID:29360824

  2. Compact FPGA hardware architecture for public key encryption in embedded devices.

    PubMed

    Rodríguez-Flores, Luis; Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio

    2018-01-01

    Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in [Formula: see text], commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x).

  3. Digital Libraries with Embedded Values: Combining Insights from LIS and Science and Technology Studies

    ERIC Educational Resources Information Center

    Fleischmann, Kenneth R.

    2007-01-01

    In the digital age, libraries are increasingly being augmented or even replaced by information technology (IT), which is often accompanied by implicit assumptions of objectivity and neutrality, yet the field of science and technology studies (STS) has a long history of studying what values are embedded in IT and how they are embedded. This article…

  4. Discriminative graph embedding for label propagation.

    PubMed

    Nguyen, Canh Hao; Mamitsuka, Hiroshi

    2011-09-01

    In many applications, the available information is encoded in graph structures. This is a common problem in biological networks, social networks, web communities and document citations. We investigate the problem of classifying nodes' labels on a similarity graph given only a graph structure on the nodes. Conventional machine learning methods usually require data to reside in some Euclidean spaces or to have a kernel representation. Applying these methods to nodes on graphs would require embedding the graphs into these spaces. By embedding and then learning the nodes on graphs, most methods are either flexible with different learning objectives or efficient enough for large scale applications. We propose a method to embed a graph into a feature space for a discriminative purpose. Our idea is to include label information into the embedding process, making the space representation tailored to the task. We design embedding objective functions that the following learning formulations become spectral transforms. We then reformulate these spectral transforms into multiple kernel learning problems. Our method, while being tailored to the discriminative tasks, is efficient and can scale to massive data sets. We show the need of discriminative embedding on some simulations. Applying to biological network problems, our method is shown to outperform baselines.

  5. A novel edge based embedding in medical images based on unique key generated using sudoku puzzle design.

    PubMed

    Santhi, B; Dheeptha, B

    2016-01-01

    The field of telemedicine has gained immense momentum, owing to the need for transmitting patients' information securely. This paper puts forth a unique method for embedding data in medical images. It is based on edge based embedding and XOR coding. The algorithm proposes a novel key generation technique by utilizing the design of a sudoku puzzle to enhance the security of the transmitted message. The edge blocks of the cover image alone, are utilized to embed the payloads. The least significant bit of the pixel values are changed by XOR coding depending on the data to be embedded and the key generated. Hence the distortion in the stego image is minimized and the information is retrieved accurately. Data is embedded in the RGB planes of the cover image, thus increasing its embedding capacity. Several measures including peak signal noise ratio (PSNR), mean square error (MSE), universal image quality index (UIQI) and correlation coefficient (R) are the image quality measures that have been used to analyze the quality of the stego image. It is evident from the results that the proposed technique outperforms the former methodologies.

  6. Controlling the Black School-Age Male: Psychotropic Medications and the Circumvention of Public Law 94-142 and Section 504

    ERIC Educational Resources Information Center

    Fitzgerald, Terence D.

    2009-01-01

    Public schools have historically embedded mechanisms for control within their policies and procedures through a variety of means. This article investigates a moderately sized integrated public school system in an upscale to low socioeconomic Big Ten university community in Illinois. Through descriptive measures, the author examines the racial…

  7. Embedding Social Enterprise Approaches in the Operations of Public Higher Education Institutions: An Exploratory Case Study

    ERIC Educational Resources Information Center

    Mohammad, Esam Sohail

    2017-01-01

    In the second decade of the new century, America's public higher education institutions (PHEIs) face several key challenges: rising demands of accountability, a steady drop in public funding, and competition from virtual and for-profit entities. Limited research had been conducted on the applicability of social enterprise theory to these…

  8. Biological embedding: evaluation and analysis of an emerging concept for nursing scholarship.

    PubMed

    Nist, Marliese Dion

    2017-02-01

    The purpose of this paper was to report the analysis of the concept of biological embedding. Research that incorporates a life course perspective is becoming increasingly prominent in the health sciences. Biological embedding is a central concept in life course theory and may be important for nursing theories to enhance our understanding of health states in individuals and populations. Before the concept of biological embedding can be used in nursing theory and research, an analysis of the concept is required to advance it towards full maturity. Concept analysis. PubMed, CINAHL and PsycINFO were searched for publications using the term 'biological embedding' or 'biological programming' and published through 2015. An evaluation of the concept was first conducted to determine the concept's level of maturity and was followed by a concept comparison, using the methods for concept evaluation and comparison described by Morse. A consistent definition of biological embedding - the process by which early life experience alters biological processes to affect adult health outcomes - was found throughout the literature. The concept has been used in several theories that describe the mechanisms through which biological embedding might occur and highlight its role in the development of health trajectories. Biological embedding is a partially mature concept, requiring concept comparison with an overlapping concept - biological programming - to more clearly establish the boundaries of biological embedding. Biological embedding has significant potential for theory development and application in multiple academic disciplines, including nursing. © 2016 John Wiley & Sons Ltd.

  9. Digital Photography: a Tool for Outreach and Science

    NASA Astrophysics Data System (ADS)

    Linder, C. A.

    2008-12-01

    The Live from the Poles project (http://polardiscovery.whoi.edu) is a partnership between polar scientists, media professionals, museums, and the general public. The goal of Live from the Poles is to educate an informal audience about polar science fieldwork using an interactive, photo-driven website and live connections to museum audiences. An embedded media team (photographer and science writer) joins each of the expeditions, reporting on the daily scientific discoveries and life on the ice. This presentation will focus on the use of digital photography not only as a tool to inspire and educate the public, but also as an aid to scientific research. Linder will show photographs from Live from the Poles expeditions to northern Canada, the eastern Arctic Ocean, Antarctica, and Greenland that illustrate the exhilaration and challenges of polar fieldwork. In addition, the presentation will address ways that digital photography, paired with new lightweight GPS receivers, benefit and enhance the research itself.

  10. A novel quantum steganography scheme for color images

    NASA Astrophysics Data System (ADS)

    Li, Panchi; Liu, Xiande

    In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.

  11. A Locality-Constrained and Label Embedding Dictionary Learning Algorithm for Image Classification.

    PubMed

    Zhengming Li; Zhihui Lai; Yong Xu; Jian Yang; Zhang, David

    2017-02-01

    Locality and label information of training samples play an important role in image classification. However, previous dictionary learning algorithms do not take the locality and label information of atoms into account together in the learning process, and thus their performance is limited. In this paper, a discriminative dictionary learning algorithm, called the locality-constrained and label embedding dictionary learning (LCLE-DL) algorithm, was proposed for image classification. First, the locality information was preserved using the graph Laplacian matrix of the learned dictionary instead of the conventional one derived from the training samples. Then, the label embedding term was constructed using the label information of atoms instead of the classification error term, which contained discriminating information of the learned dictionary. The optimal coding coefficients derived by the locality-based and label-based reconstruction were effective for image classification. Experimental results demonstrated that the LCLE-DL algorithm can achieve better performance than some state-of-the-art algorithms.

  12. Mining biomedical images towards valuable information retrieval in biomedical and life sciences

    PubMed Central

    Ahmed, Zeeshan; Zeeshan, Saman; Dandekar, Thomas

    2016-01-01

    Biomedical images are helpful sources for the scientists and practitioners in drawing significant hypotheses, exemplifying approaches and describing experimental results in published biomedical literature. In last decades, there has been an enormous increase in the amount of heterogeneous biomedical image production and publication, which results in a need for bioimaging platforms for feature extraction and analysis of text and content in biomedical images to take advantage in implementing effective information retrieval systems. In this review, we summarize technologies related to data mining of figures. We describe and compare the potential of different approaches in terms of their developmental aspects, used methodologies, produced results, achieved accuracies and limitations. Our comparative conclusions include current challenges for bioimaging software with selective image mining, embedded text extraction and processing of complex natural language queries. PMID:27538578

  13. Shaping Collective Functions in Privatized Agricultural Knowledge and Information Systems: The Positioning and Embedding of a Network Broker in the Dutch Dairy Sector

    ERIC Educational Resources Information Center

    Klerkx, Laurens; Leeuwis, Cees

    2009-01-01

    This paper examines new organizational arrangements that have emerged in the context of a privatized extension system. It investigates the positioning and embedding of a network broker aimed at enhancing interaction in the privatized agricultural knowledge and information system (AKIS), to assess whether tensions reported in other sectors also…

  14. Locally Linear Embedding of Local Orthogonal Least Squares Images for Face Recognition

    NASA Astrophysics Data System (ADS)

    Hafizhelmi Kamaru Zaman, Fadhlan

    2018-03-01

    Dimensionality reduction is very important in face recognition since it ensures that high-dimensionality data can be mapped to lower dimensional space without losing salient and integral facial information. Locally Linear Embedding (LLE) has been previously used to serve this purpose, however, the process of acquiring LLE features requires high computation and resources. To overcome this limitation, we propose a locally-applied Local Orthogonal Least Squares (LOLS) model can be used as initial feature extraction before the application of LLE. By construction of least squares regression under orthogonal constraints we can preserve more discriminant information in the local subspace of facial features while reducing the overall features into a more compact form that we called LOLS images. LLE can then be applied on the LOLS images to maps its representation into a global coordinate system of much lower dimensionality. Several experiments carried out using publicly available face datasets such as AR, ORL, YaleB, and FERET under Single Sample Per Person (SSPP) constraint demonstrates that our proposed method can reduce the time required to compute LLE features while delivering better accuracy when compared to when either LLE or OLS alone is used. Comparison against several other feature extraction methods and more recent feature-learning method such as state-of-the-art Convolutional Neural Networks (CNN) also reveal the superiority of the proposed method under SSPP constraint.

  15. Embedded ubiquitous services on hospital information systems.

    PubMed

    Kuroda, Tomohiro; Sasaki, Hiroshi; Suenaga, Takatoshi; Masuda, Yasushi; Yasumuro, Yoshihiro; Hori, Kenta; Ohboshi, Naoki; Takemura, Tadamasa; Chihara, Kunihiro; Yoshihara, Hiroyuki

    2012-11-01

    A Hospital Information Systems (HIS) have turned a hospital into a gigantic computer with huge computational power, huge storage and wired/wireless local area network. On the other hand, a modern medical device, such as echograph, is a computer system with several functional units connected by an internal network named a bus. Therefore, we can embed such a medical device into the HIS by simply replacing the bus with the local area network. This paper designed and developed two embedded systems, a ubiquitous echograph system and a networked digital camera. Evaluations of the developed systems clearly show that the proposed approach, embedding existing clinical systems into HIS, drastically changes productivity in the clinical field. Once a clinical system becomes a pluggable unit for a gigantic computer system, HIS, the combination of multiple embedded systems with application software designed under deep consideration about clinical processes may lead to the emergence of disruptive innovation in the clinical field.

  16. Transition in Gas Turbine Engine Control System Architecture: Modular, Distributed, Embedded

    DTIC Science & Technology

    2009-08-01

    Design + Development + Certification + Procurement + Life Cycle Cost = Net Savings for our Customers Approved for Public Release 16 Economic ...Supporting Small Quantity Electronics Need Broadly Applicable High Temperature Electronics Supply Base Approved for Public Release 17 Economic ...rc ec ures Approved for Public Release 18 Economic Drivers for New FADEC Designs FADEC Implementation Time Pacing Engine Development Issues • FADEC

  17. Authenticity preservation with histogram-based reversible data hiding and quadtree concepts.

    PubMed

    Huang, Hsiang-Cheh; Fang, Wai-Chi

    2011-01-01

    With the widespread use of identification systems, establishing authenticity with sensors has become an important research issue. Among the schemes for making authenticity verification based on information security possible, reversible data hiding has attracted much attention during the past few years. With its characteristics of reversibility, the scheme is required to fulfill the goals from two aspects. On the one hand, at the encoder, the secret information needs to be embedded into the original image by some algorithms, such that the output image will resemble the input one as much as possible. On the other hand, at the decoder, both the secret information and the original image must be correctly extracted and recovered, and they should be identical to their embedding counterparts. Under the requirement of reversibility, for evaluating the performance of the data hiding algorithm, the output image quality, named imperceptibility, and the number of bits for embedding, called capacity, are the two key factors to access the effectiveness of the algorithm. Besides, the size of side information for making decoding possible should also be evaluated. Here we consider using the characteristics of original images for developing our method with better performance. In this paper, we propose an algorithm that has the ability to provide more capacity than conventional algorithms, with similar output image quality after embedding, and comparable side information produced. Simulation results demonstrate the applicability and better performance of our algorithm.

  18. Galvanic Liquid Applied Coating System for Protection of Embedded Steel Surfaces from Corrosion

    NASA Technical Reports Server (NTRS)

    Curran, Joseph; MacDowell, Louis; Voska, N. (Technical Monitor)

    2002-01-01

    The corrosion of reinforcing steel in concrete is an insidious problem for the Kennedy Space Center, government agencies, and the general public. Existing corrosion protection systems on the market are costly, complex, and time-consuming to install, require continuous maintenance and monitoring, and require specialized skills for installation. NASA's galvanic liquid-applied coating offers companies the ability to conveniently protect embedded steel rebar surfaces from corrosion. Liquid-applied inorganic galvanic coating contains one ore more of the following metallic particles: magnesium, zinc, or indium and may contain moisture attracting compounds that facilitate the protection process. The coating is applied to the outer surface of reinforced concrete so that electrical current is established between metallic particles and surfaces of embedded steel rebar; and electric (ionic) current is responsible for providing the necessary cathodic protection for embedded rebar surfaces.

  19. Frontier Fields: A Cost-Effective Approach to Bringing Authentic Science to the Education Community

    NASA Astrophysics Data System (ADS)

    Eisenhamer, B.; Lawton, B.; Summers, F.; Ryer, H.

    2015-11-01

    For more than two decades, the Hubble EPO program has sought to bring the wonders of the universe to the education community and the public, and to engage audiences in the adventure of scientific discovery. Program components include standards-based, curriculum-support materials, exhibits and exhibit components, and professional development workshops. The main underpinnings of the program's infrastructure are scientist-educator development teams, partnerships, and an embedded program evaluation component. The Space Telescope Science Institute's Office of Public Outreach is leveraging this existing infrastructure to bring the Frontier Fields science program to the education community in a cost-effective way. Frontier Fields observations and results have been, and will continue to be, embedded into existing product lines and professional development offerings. We also are leveraging our new social media strategy to bring the science program to the public in the form of an ongoing blog.

  20. Light Weight MP3 Watermarking Method for Mobile Terminals

    NASA Astrophysics Data System (ADS)

    Takagi, Koichi; Sakazawa, Shigeyuki; Takishima, Yasuhiro

    This paper proposes a novel MP3 watermarking method which is applicable to a mobile terminal with limited computational resources. Considering that in most cases the embedded information is copyright information or metadata, which should be extracted before playing back audio contents, the watermark detection process should be executed at high speed. However, when conventional methods are used with a mobile terminal, it takes a considerable amount of time to detect a digital watermark. This paper focuses on scalefactor manipulation to enable high speed watermark embedding/detection for MP3 audio and also proposes the manipulation method which minimizes audio quality degradation adaptively. Evaluation tests showed that the proposed method is capable of embedding 3 bits/frame information without degrading audio quality and detecting it at very high speed. Finally, this paper describes application examples for authentication with a digital signature.

  1. Tacit knowledge.

    PubMed

    Walker, Alexander Muir

    2017-04-01

    Information that is not made explicit is nonetheless embedded in most of our standard procedures. In its simplest form, embedded information may take the form of prior knowledge held by the researcher and presumed to be agreed to by consumers of the research product. More interesting are the settings in which the prior information is held unconsciously by both researcher and reader, or when the very form of an "effective procedure" incorporates its creator's (unspoken) understanding of a problem. While it may not be productive to exhaustively detail the embedded or tacit knowledge that manifests itself in creative scientific work, at least at the beginning, we may want to routinize methods for extracting and documenting the ways of thinking that make "experts" expert. We should not back away from both expecting and respecting the tacit knowledge the pervades our work and the work of others.

  2. Efficient sidelobe ASK based dual-function radar-communications

    NASA Astrophysics Data System (ADS)

    Hassanien, Aboulnasr; Amin, Moeness G.; Zhang, Yimin D.; Ahmad, Fauzia

    2016-05-01

    Recently, dual-function radar-communications (DFRC) has been proposed as means to mitigate the spectrum congestion problem. Existing amplitude-shift keying (ASK) methods for information embedding do not take full advantage of the highest permissable sidelobe level. In this paper, a new ASK-based signaling strategy for enhancing the signal-to-noise ratio (SNR) at the communication receiver is proposed. The proposed method employs one reference waveform and simultaneously transmits a number of orthogonal waveforms equals to the number of 1's in the binary sequence being embedded. 3 dB SNR gain is achieved using the proposed method as compared to existing sidelobe ASK methods. The effectiveness of the proposed information embedding strategy is verified using simulations examples.

  3. What does "success" in public engagement activities mean? A comparison of goals, motivations and embedded assumptions in four polar outreach activities.

    NASA Astrophysics Data System (ADS)

    Roop, H. A.; Salmon, R. A.

    2015-12-01

    Using four very different polar outreach case studies, we will discuss scientists' motivations, expectations, and institutional incentives (and dis-incentives) to engage with the public, and argue that improved training, evaluation, and academic value needs to be associated with scientist-led communication efforts - as well as clearer fora for sharing best practice in this field. We will illustrate our argument using examples from an Antarctic festival with public lectures and science cafes, outreach associated with an Antarctic expedition, the global launch of a climate change documentary that had a significant focus on Antarctica, and a series of "Polar Weeks" led by an international community of scientists and educators. While there is an excellent culture of accountability in both formal and informal science communication sectors, the same rigour is not applied to the majority of 'outreach' activities that are initiated by the science research community. Many of these activities are undertaken based on 'what feels right' and opportunism, and are proclaimed to be a success based on little or no formal evaluation. As a result, much of this work goes undocumented, is not evaluated from the perspective of the science community, and is rarely subject to peer-review and its associated benefits, including professional rewards. We therefore recommend new opportunities for publication in this field that would encourage science communication theory and practice to better inform each other, and for scientists to gain professional recognition for their efforts in this arena.

  4. Audio Watermark Embedding Technique Applying Auditory Stream Segregation: "G-encoder Mark" Able to Be Extracted by Mobile Phone

    NASA Astrophysics Data System (ADS)

    Modegi, Toshio

    We are developing audio watermarking techniques which enable extraction of embedded data by cell phones. For that we have to embed data onto frequency ranges, where our auditory response is prominent, therefore data embedding will cause much auditory noises. Previously we have proposed applying a two-channel stereo play-back feature, where noises generated by a data embedded left-channel signal will be reduced by the other right-channel signal. However, this proposal has practical problems of restricting extracting terminal location. In this paper, we propose synthesizing the noise reducing right-channel signal with the left-signal and reduces noises completely by generating an auditory stream segregation phenomenon to users. This newly proposed makes the noise reducing right-channel signal unnecessary and supports monaural play-back operations. Moreover, we propose a wide-band embedding method causing dual auditory stream segregation phenomena, which enables data embedding on whole public phone frequency ranges and stable extractions with 3-G mobile phones. From these proposals, extraction precisions become higher than those by the previously proposed method whereas the quality damages of embedded signals become smaller. In this paper we present an abstract of our newly proposed method and experimental results comparing with those by the previously proposed method.

  5. Data Interactive Publications

    NASA Astrophysics Data System (ADS)

    Domenico, B.; Weber, J.

    2012-04-01

    For some years now, the authors have developed examples of online documents that allowed the reader to interact directly with datasets, but there were limitations that restricted the interaction to specific desktop analysis and display tools that were not generally available to all readers of the documents. Recent advances in web service technology and related standards are making it possible to develop systems for publishing online documents that enable readers to access, analyze, and display the data discussed in the publication from the perspective and in the manner from which the author wants it to be represented. By clicking on embedded links, the reader accesses not only the usual textual information in a publication, but also data residing on a local or remote web server as well as a set of processing tools for analyzing and displaying the data. With the option of having the analysis and display processing provided on the server (or in the cloud), there are now a broader set of possibilities on the client side where the reader can interact with the data via a thin web client, a rich desktop application, or a mobile platform "app." The presentation will outline the architecture of data interactive publications along with illustrative examples.

  6. Data Interactive Publications Revisited

    NASA Astrophysics Data System (ADS)

    Domenico, B.; Weber, W. J.

    2011-12-01

    A few years back, the authors presented examples of online documents that allowed the reader to interact directly with datasets, but there were limitations that restricted the interaction to specific desktop analysis and display tools that were not generally available to all readers of the documents. Recent advances in web service technology and related standards are making it possible to develop systems for publishing online documents that enable readers to access, analyze, and display the data discussed in the publication from the perspective and in the manner from which the author wants it to be represented. By clicking on embedded links, the reader accesses not only the usual textual information in a publication, but also data residing on a local or remote web server as well as a set of processing tools for analyzing and displaying the data. With the option of having the analysis and display processing provided on the server, there are now a broader set of possibilities on the client side where the reader can interact with the data via a thin web client, a rich desktop application, or a mobile platform "app." The presentation will outline the architecture of data interactive publications along with illustrative examples.

  7. Active Disaster Response System for a Smart Building

    PubMed Central

    Lin, Chun-Yen; Chu, Edward T.-H; Ku, Lun-Wei; Liu, Jane W. S.

    2014-01-01

    Disaster warning and surveillance systems have been widely applied to help the public be aware of an emergency. However, existing warning systems are unable to cooperate with household appliances or embedded controllers; that is, they cannot provide enough time for preparedness and evacuation, especially for disasters like earthquakes. In addition, the existing warning and surveillance systems are not responsible for collecting sufficient information inside a building for relief workers to conduct a proper rescue action after a disaster happens. In this paper, we describe the design and implementation of a proof of concept prototype, named the active disaster response system (ADRS), which automatically performs emergency tasks when an earthquake happens. ADRS can interpret Common Alerting Protocol (CAP) messages, published by an official agency, and actuate embedded controllers to perform emergency tasks to respond to the alerts. Examples of emergency tasks include opening doors and windows and cutting off power lines and gas valves. In addition, ADRS can maintain a temporary network by utilizing the embedded controllers; hence, victims trapped inside a building are still able to post emergency messages if the original network is disconnected. We conducted a field trial to evaluate the effectiveness of ADRS after an earthquake happened. Our results show that compared to manually operating emergency tasks, ADRS can reduce the operation time by up to 15 s, which is long enough for people to get under sturdy furniture, or to evacuate from the third floor to the first floor, or to run more than 100 m. PMID:25237897

  8. Zika-Virus-Related Photo Sharing on Pinterest and Instagram.

    PubMed

    Fung, Isaac Chun-Hai; Blankenship, Elizabeth B; Goff, M Elizabeth; Mullican, Lindsay A; Chan, Kwun Cheung; Saroha, Nitin; Duke, Carmen H; Eremeeva, Marina E; Fu, King-Wa; Tse, Zion Tsz Ho

    2017-12-01

    Pinterest (San Francisco, CA) and Instagram (Menlo Park, CA) are 2 popular photo-sharing social media platforms among young individuals. We assessed differences between Instagram and Pinterest in relaying photographic information regarding Zika virus. Specifically, we investigated whether the percentage of Zika-virus-related photos with Spanish or Portuguese texts embedded therein was higher for Instagram than for Pinterest and whether the contents of Zika-virus-related photos shared on Pinterest were different from those shared on Instagram. We retrieved and manually coded 616 Pinterest (key words: "zika" AND "virus") and 616 Instagram (hashtag: #zikavirus) photos. Among the manually coded samples, 47% (290/616) of Pinterest photos and 23% (144/616) of Instagram photos were relevant to Zika virus. Words were embedded in 57% (164/290) of relevant Pinterest photos and all 144 relevant Instagram photos. Among the photos with embedded words, photos in Spanish or Portuguese were more prevalent on Instagram (77/144, 53%) than on Pinterest (14/164, 9%). There were more Zika-virus-related photos on Instagram than on Pinterest pertinent to Zika virus prevention (59/144, 41%, versus 41/290, 14%; P<0.0001), the effects of Zika virus on pregnancy (27/144, 19%, versus 32/290, 11%; P=0.04), and Zika-virus-associated deaths (4/144, 2%, versus 0/290, 0%; P=0.01). Pinterest and Instagram are similar platforms for Zika virus prevention communication. (Disaster Med Public Health Preparedness. 2017;11:656-659).

  9. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.

    PubMed

    Muhammad, Khan; Sajjad, Muhammad; Baik, Sung Wook

    2016-05-01

    In this paper, the problem of secure transmission of sensitive contents over the public network Internet is addressed by proposing a novel data hiding method in encrypted images with dual-level security. The secret information is divided into three blocks using a specific pattern, followed by an encryption mechanism based on the three-level encryption algorithm (TLEA). The input image is scrambled using a secret key, and the encrypted sub-message blocks are then embedded in the scrambled image by cyclic18 least significant bit (LSB) substitution method, utilizing LSBs and intermediate LSB planes. Furthermore, the cover image and its planes are rotated at different angles using a secret key prior to embedding, deceiving the attacker during data extraction. The usage of message blocks division, TLEA, image scrambling, and the cyclic18 LSB method results in an advanced security system, maintaining the visual transparency of resultant images and increasing the security of embedded data. In addition, employing various secret keys for image scrambling, data encryption, and data hiding using the cyclic18 LSB method makes the data recovery comparatively more challenging for attackers. Experimental results not only validate the effectiveness of the proposed framework in terms of visual quality and security compared to other state-of-the-art methods, but also suggest its feasibility for secure transmission of diagnostically important keyframes to healthcare centers and gastroenterologists during wireless capsule endoscopy.

  10. Watermarking protocols for authentication and ownership protection based on timestamps and holograms

    NASA Astrophysics Data System (ADS)

    Dittmann, Jana; Steinebach, Martin; Croce Ferri, Lucilla

    2002-04-01

    Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key. Both approaches provide solutions for copyright and authentication watermarking and are introduced for image data but can be easily adopted for video and audio data as well.

  11. [Policy counselling through public health reporting?].

    PubMed

    Brand, H; Michelsen, K

    2007-10-01

    For about 20 years public health reporting has increasingly been developed as a resource in health policy counselling. Both with regard to its use as well as its further development it is important to reflect on the possibilities and limits of this resource. A basis for this is provided by theories, models and hypotheses derived from the discussion about scientific policy counselling. In early conceptual reflections on the organisation of health reporting a technocratic use was rejected. This is reflected by the ideas and views about the institutional embedding of health reporting activities. Against the background of diverging opinions about the political dimensions of health reporting activities, reflections were guided by the decisionistic and pragmatic model of the "scientification of politics". Public health reporting must provide the possibility for being used in a flexible way in order to add a pragmatistic component to its decisionistic and strategic uses. For action-oriented, pragmatistic and scientific policy counselling through the health reporting discipline it is important to link "information about politically relevant facts" with the "targeted processing of knowledge geared towards problems in the field of decision-making processes" (expertise).

  12. Science in Emergency Response at CDC: Structure and Functions.

    PubMed

    Iskander, John; Rose, Dale A; Ghiya, Neelam D

    2017-09-01

    Recent high-profile activations of the US Centers for Disease Control and Prevention (CDC) Emergency Operations Center (EOC) include responses to the West African Ebola and Zika virus epidemics. Within the EOC, emergency responses are organized according to the Incident Management System, which provides a standardized structure and chain of command, regardless of whether the EOC activation occurs in response to an outbreak, natural disaster, or other type of public health emergency. By embedding key scientific roles, such as the associate director for science, and functions within a Scientific Response Section, the current CDC emergency response structure ensures that both urgent and important science issues receive needed attention. Key functions during emergency responses include internal coordination of scientific work, data management, information dissemination, and scientific publication. We describe a case example involving the ongoing Zika virus response that demonstrates how the scientific response structure can be used to rapidly produce high-quality science needed to answer urgent public health questions and guide policy. Within the context of emergency response, longer-term priorities at CDC include both streamlining administrative requirements and funding mechanisms for scientific research.

  13. Fabrication and characterization of novel microsphere-embedded optical devices for enhancing microscopy resolution

    NASA Astrophysics Data System (ADS)

    Darafsheh, Arash

    2018-02-01

    Microsphere-assisted imaging can be incorporated onto conventional light microscopes allowing wide-field and flourescence imaging with enhanced resolution. We demonstrated that imaging of specimens containing subdiffraction-limited features is achievable through high-index microspheres embedded in a transparent thin film placed over the specimen. We fabricated novel microsphere-embedded microscope slides composed of barium titanate glass microspheres (with diameter 10-100 μm and refractive index 1.9-2.2) embedded in a transparent polydimethylsiloxane (PDMS) elastomer layer with controllable thickness. We characterized the imaging performance of such microsphere-embedded devices in white-light microscopies, by measuring the imaging resolution, field-of-view, and magnification as a function of microsphere size. Our results inform on the design of novel optical devices, such as microsphere-embedded microscope slides for imaging applications.

  14. Information management systems for pharmacogenomics.

    PubMed

    Thallinger, Gerhard G; Trajanoski, Slave; Stocker, Gernot; Trajanoski, Zlatko

    2002-09-01

    The value of high-throughput genomic research is dramatically enhanced by association with key patient data. These data are generally available but of disparate quality and not typically directly associated. A system that could bring these disparate data sources into a common resource connected with functional genomic data would be tremendously advantageous. However, the integration of clinical and accurate interpretation of the generated functional genomic data requires the development of information management systems capable of effectively capturing the data as well as tools to make that data accessible to the laboratory scientist or to the clinician. In this review these challenges and current information technology solutions associated with the management, storage and analysis of high-throughput data are highlighted. It is suggested that the development of a pharmacogenomic data management system which integrates public and proprietary databases, clinical datasets, and data mining tools embedded in a high-performance computing environment should include the following components: parallel processing systems, storage technologies, network technologies, databases and database management systems (DBMS), and application services.

  15. Data embedding

    DOEpatents

    Sandford, II, Maxwell T.; Handel, Theodore G.

    1997-01-01

    A method of embedding auxiliary information into a set of host data, such as a photograph, television signal, facsimile transmission, or identification card. All such host data contain intrinsic noise, allowing pixels in the host data which are nearly identical and which have values differing by less than the noise value to be manipulated and replaced with auxiliary data. As the embedding method does not change the elemental values of the host data, the auxiliary data do not noticeably affect the appearance or interpretation of the host data. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user.

  16. Data embedding

    DOEpatents

    Sandford, M.T. II; Handel, T.G.

    1997-08-19

    A method is disclosed for embedding auxiliary information into a set of host data, such as a photograph, television signal, facsimile transmission, or identification card. All such host data contain intrinsic noise, allowing pixels in the host data which are nearly identical and which have values differing by less than the noise value to be manipulated and replaced with auxiliary data. As the embedding method does not change the elemental values of the host data, the auxiliary data do not noticeably affect the appearance or interpretation of the host data. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user. 19 figs.

  17. Embedded importance watermarking for image verification in radiology

    NASA Astrophysics Data System (ADS)

    Osborne, Domininc; Rogers, D.; Sorell, M.; Abbott, Derek

    2004-03-01

    Digital medical images used in radiology are quite different to everyday continuous tone images. Radiology images require that all detailed diagnostic information can be extracted, which traditionally constrains digital medical images to be of large size and stored without loss of information. In order to transmit diagnostic images over a narrowband wireless communication link for remote diagnosis, lossy compression schemes must be used. This involves discarding detailed information and compressing the data, making it more susceptible to error. The loss of image detail and incidental degradation occurring during transmission have potential legal accountability issues, especially in the case of the null diagnosis of a tumor. The work proposed here investigates techniques for verifying the voracity of medical images - in particular, detailing the use of embedded watermarking as an objective means to ensure that important parts of the medical image can be verified. We propose a result to show how embedded watermarking can be used to differentiate contextual from detailed information. The type of images that will be used include spiral hairline fractures and small tumors, which contain the essential diagnostic high spatial frequency information.

  18. Co Modeling and Co Synthesis of Safety Critical Multi threaded Embedded Software for Multi Core Embedded Platforms

    DTIC Science & Technology

    2017-03-20

    computation, Prime Implicates, Boolean Abstraction, real- time embedded software, software synthesis, correct by construction software design , model...types for time -dependent data-flow networks". J.-P. Talpin, P. Jouvelot, S. Shukla. ACM-IEEE Conference on Methods and Models for System Design ...information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing   data sources, gathering and

  19. Security policies and trust in ubiquitous computing.

    PubMed

    Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand

    2008-10-28

    Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

  20. Mining biomedical images towards valuable information retrieval in biomedical and life sciences.

    PubMed

    Ahmed, Zeeshan; Zeeshan, Saman; Dandekar, Thomas

    2016-01-01

    Biomedical images are helpful sources for the scientists and practitioners in drawing significant hypotheses, exemplifying approaches and describing experimental results in published biomedical literature. In last decades, there has been an enormous increase in the amount of heterogeneous biomedical image production and publication, which results in a need for bioimaging platforms for feature extraction and analysis of text and content in biomedical images to take advantage in implementing effective information retrieval systems. In this review, we summarize technologies related to data mining of figures. We describe and compare the potential of different approaches in terms of their developmental aspects, used methodologies, produced results, achieved accuracies and limitations. Our comparative conclusions include current challenges for bioimaging software with selective image mining, embedded text extraction and processing of complex natural language queries. © The Author(s) 2016. Published by Oxford University Press.

  1. Systems architecture: a new model for sustainability and the built environment using nanotechnology, biotechnology, information technology, and cognitive science with living technology.

    PubMed

    Armstrong, Rachel

    2010-01-01

    This report details a workshop held at the Bartlett School of Architecture, University College London, to initiate interdisciplinary collaborations for the practice of systems architecture, which is a new model for the generation of sustainable architecture that combines the discipline of the study of the built environment with the scientific study of complexity, or systems science, and adopts the perspective of systems theory. Systems architecture offers new perspectives on the organization of the built environment that enable architects to consider architecture as a series of interconnected networks with embedded links into natural systems. The public workshop brought together architects and scientists working with the convergence of nanotechnology, biotechnology, information technology, and cognitive science and with living technology to investigate the possibility of a new generation of smart materials that are implied by this approach.

  2. Biomarker-guided translation of brain imaging into disease pathway models

    PubMed Central

    Younesi, Erfan; Hofmann-Apitius, Martin

    2013-01-01

    The advent of state-of-the-art brain imaging technologies in recent years and the ability of such technologies to provide high-resolution information at both structural and functional levels has spawned large efforts to introduce novel non-invasive imaging biomarkers for early prediction and diagnosis of brain disorders; however, their utility in both clinic and drug development at their best resolution remains limited to visualizing and monitoring disease progression. Given the fact that efficient translation of valuable information embedded in brain scans into clinical application is of paramount scientific and public health importance, a strategy is needed to bridge the current gap between imaging and molecular biology, particularly in neurodegenerative diseases. As an attempt to address this issue, we present a novel computational method to link readouts of imaging biomarkers to their underlying molecular pathways with the aim of guiding clinical diagnosis, prognosis and even target identification in drug discovery for Alzheimer's disease. PMID:24287435

  3. Steganography -- The New Intelligence Threat

    DTIC Science & Technology

    2004-01-01

    Information can be embedded within text files, digital music and videos, and digital photographs by simply changing bits and bytes. HOW IT WORKS...International Airport could be embedded in Brittany Spears’ latest music release in MP3 format. The wide range of steganography capabilities has been

  4. Is Embedded Librarianship Right for Your Institution?

    ERIC Educational Resources Information Center

    Muir, Gordon; Heller-Ross, Holly

    2010-01-01

    Embedded librarians, connected with students and faculty inside the classroom, lab and studio, have new opportunities for preparing students for research and for collaborating with faculty on course-integrated information literacy, research assignment design, teaching, assignment interpretation, and timely student assistance. What makes embedded…

  5. “You're just one of the group when you're embedded”: report from a mixed-method investigation of the research-embedded health librarian experience*

    PubMed Central

    Greyson, Devon; Surette, Soleil; Dennett, Liz; Chatterley, Trish

    2013-01-01

    Objective: Embedded librarianship has received much attention in recent years. A model of embeddedness rarely discussed to date is that of research-embedded health librarians (REHLs). This study explores the characteristics of Canadian REHLs and the situations in which they are employed. Methods: The authors employed a sequential, mixed-method design. An online survey provided descriptive statistics about REHLs' positions and work experiences. This informed a series of focus group interviews that expanded upon the survey. Through constant comparison, we conducted qualitative descriptive analysis of the interviews. Results: Based on twenty-nine survey responses and four group interviews, we created a portrait of a “typical” REHL and discovered themes relevant to REHL work. REHLs may identify more strongly as researchers than as librarians, with corresponding professional needs and rewards. REHLs value “belonging” to the research team, involvement in full project lifecycles, and in-depth relationships with nonlibrarian colleagues. Despite widely expressed job satisfaction, many REHLs struggle with isolation from library and information science peers and relative lack of job security. Conclusions: REHLs differ from non-embedded health librarians, as well as from other types of embedded librarians. REHLs' work also differs from just a decade or two ago, prior to widespread Internet access to digital resources. Implications: Given that research-embedded librarianship appears to be a distinct and growing subset of health librarianship, libraries, master's of library and information science programs, and professional associations will need to respond to the support and education needs of REHLs or risk losing them to the health research field. PMID:24163600

  6. Influencing attitudes toward carbon capture and sequestration: a social marketing approach.

    PubMed

    Wong-Parodi, Gabrielle; Dowlatabadi, Hadi; McDaniels, Tim; Ray, Isha

    2011-08-15

    Carbon capture and sequestration (CCS), while controversial, is seen as promising because it will allow the United States to continue using its vast fossil fuel resources in a carbon-constrained world. The public is an important stakeholder in the national debate about whether or not the U.S. should include CCS as a significant part of its climate change strategy. Understanding how to effectively engage with the public about CCS has become important in recent years, as interest in the technology has intensified. We argue that engagement efforts should be focused on places where CCS will first be deployed, i.e., places with many "energy veteran" (EV) citizens. We also argue that, in addition to information on CCS, messages with emotional appeal may be necessary in order to engage the public. In this paper we take a citizen-guided social marketing approach toward understanding how to (positively or negatively) influence EV citizens' attitudes toward CCS. We develop open-ended interview protocols, and a "CCS campaign activity", for Wyoming residents from Gillette and Rock Springs. We conclude that our participants believed expert-informed CCS messages, embedded within an emotionally self-referent (ESR) framework that was relevant to Wyoming, to be more persuasive than the expert messages alone. The appeal to core values of Wyomingites played a significant role in the citizen-guided CCS messages.

  7. Biological Embedding: Evaluation and Analysis of an Emerging Concept for Nursing Scholarship

    PubMed Central

    Nist, Marliese Dion

    2016-01-01

    Aim The purpose of this paper is to report the analysis of the concept of biological embedding. Background Research that incorporates a life course perspective is becoming increasingly prominent in the health sciences. Biological embedding is a central concept in life course theory and may be important for nursing theories to enhance our understanding of health states in individuals and populations. Before the concept of biological embedding can be used in nursing theory and research, an analysis of the concept is required to advance it toward full maturity. Design Concept analysis. Data Sources PubMed, CINAHL and PsycINFO were searched for publications using the term ‘biological embedding’ or ‘biological programming’ and published through 2015. Methods An evaluation of the concept was first conducted to determine the concept’s level of maturity and was followed by a concept comparison, using the methods for concept evaluation and comparison described by Morse. Results A consistent definition of biological embedding – the process by which early life experience alters biological processes to affect adult health outcomes – was found throughout the literature. The concept has been used in several theories that describe the mechanisms through which biological embedding might occur and highlight its role in the development of health trajectories. Biological embedding is a partially mature concept, requiring concept comparison with an overlapping concept – biological programming – to more clearly establish the boundaries of biological embedding. Conclusions Biological embedding has significant potential for theory development and application in multiple academic disciplines, including nursing. PMID:27682606

  8. The Ironies of School Choice: Empowering Parents and Reconceptualizing Public Education

    ERIC Educational Resources Information Center

    Olson Beal, Heather K.; Hendry, Petra Munro

    2012-01-01

    School choice policy, especially as embedded in No Child Left Behind, assumes that empowering parents with choice will improve education by holding schools accountable and will reenergize democratic participation in public education. While parents are seen as critical change agents, little research documents how engaging in school choice affects…

  9. The Firegoose: two-way integration of diverse data from different bioinformatics web resources with desktop applications

    PubMed Central

    Bare, J Christopher; Shannon, Paul T; Schmid, Amy K; Baliga, Nitin S

    2007-01-01

    Background Information resources on the World Wide Web play an indispensable role in modern biology. But integrating data from multiple sources is often encumbered by the need to reformat data files, convert between naming systems, or perform ongoing maintenance of local copies of public databases. Opportunities for new ways of combining and re-using data are arising as a result of the increasing use of web protocols to transmit structured data. Results The Firegoose, an extension to the Mozilla Firefox web browser, enables data transfer between web sites and desktop tools. As a component of the Gaggle integration framework, Firegoose can also exchange data with Cytoscape, the R statistical package, Multiexperiment Viewer (MeV), and several other popular desktop software tools. Firegoose adds the capability to easily use local data to query KEGG, EMBL STRING, DAVID, and other widely-used bioinformatics web sites. Query results from these web sites can be transferred to desktop tools for further analysis with a few clicks. Firegoose acquires data from the web by screen scraping, microformats, embedded XML, or web services. We define a microformat, which allows structured information compatible with the Gaggle to be embedded in HTML documents. We demonstrate the capabilities of this software by performing an analysis of the genes activated in the microbe Halobacterium salinarum NRC-1 in response to anaerobic environments. Starting with microarray data, we explore functions of differentially expressed genes by combining data from several public web resources and construct an integrated view of the cellular processes involved. Conclusion The Firegoose incorporates Mozilla Firefox into the Gaggle environment and enables interactive sharing of data between diverse web resources and desktop software tools without maintaining local copies. Additional web sites can be incorporated easily into the framework using the scripting platform of the Firefox browser. Performing data integration in the browser allows the excellent search and navigation capabilities of the browser to be used in combination with powerful desktop tools. PMID:18021453

  10. The Firegoose: two-way integration of diverse data from different bioinformatics web resources with desktop applications.

    PubMed

    Bare, J Christopher; Shannon, Paul T; Schmid, Amy K; Baliga, Nitin S

    2007-11-19

    Information resources on the World Wide Web play an indispensable role in modern biology. But integrating data from multiple sources is often encumbered by the need to reformat data files, convert between naming systems, or perform ongoing maintenance of local copies of public databases. Opportunities for new ways of combining and re-using data are arising as a result of the increasing use of web protocols to transmit structured data. The Firegoose, an extension to the Mozilla Firefox web browser, enables data transfer between web sites and desktop tools. As a component of the Gaggle integration framework, Firegoose can also exchange data with Cytoscape, the R statistical package, Multiexperiment Viewer (MeV), and several other popular desktop software tools. Firegoose adds the capability to easily use local data to query KEGG, EMBL STRING, DAVID, and other widely-used bioinformatics web sites. Query results from these web sites can be transferred to desktop tools for further analysis with a few clicks. Firegoose acquires data from the web by screen scraping, microformats, embedded XML, or web services. We define a microformat, which allows structured information compatible with the Gaggle to be embedded in HTML documents. We demonstrate the capabilities of this software by performing an analysis of the genes activated in the microbe Halobacterium salinarum NRC-1 in response to anaerobic environments. Starting with microarray data, we explore functions of differentially expressed genes by combining data from several public web resources and construct an integrated view of the cellular processes involved. The Firegoose incorporates Mozilla Firefox into the Gaggle environment and enables interactive sharing of data between diverse web resources and desktop software tools without maintaining local copies. Additional web sites can be incorporated easily into the framework using the scripting platform of the Firefox browser. Performing data integration in the browser allows the excellent search and navigation capabilities of the browser to be used in combination with powerful desktop tools.

  11. The ontology-based answers (OBA) service: a connector for embedded usage of ontologies in applications.

    PubMed

    Dönitz, Jürgen; Wingender, Edgar

    2012-01-01

    The semantic web depends on the use of ontologies to let electronic systems interpret contextual information. Optimally, the handling and access of ontologies should be completely transparent to the user. As a means to this end, we have developed a service that attempts to bridge the gap between experts in a certain knowledge domain, ontologists, and application developers. The ontology-based answers (OBA) service introduced here can be embedded into custom applications to grant access to the classes of ontologies and their relations as most important structural features as well as to information encoded in the relations between ontology classes. Thus computational biologists can benefit from ontologies without detailed knowledge about the respective ontology. The content of ontologies is mapped to a graph of connected objects which is compatible to the object-oriented programming style in Java. Semantic functions implement knowledge about the complex semantics of an ontology beyond the class hierarchy and "partOf" relations. By using these OBA functions an application can, for example, provide a semantic search function, or (in the examples outlined) map an anatomical structure to the organs it belongs to. The semantic functions relieve the application developer from the necessity of acquiring in-depth knowledge about the semantics and curation guidelines of the used ontologies by implementing the required knowledge. The architecture of the OBA service encapsulates the logic to process ontologies in order to achieve a separation from the application logic. A public server with the current plugins is available and can be used with the provided connector in a custom application in scenarios analogous to the presented use cases. The server and the client are freely available if a project requires the use of custom plugins or non-public ontologies. The OBA service and further documentation is available at http://www.bioinf.med.uni-goettingen.de/projects/oba.

  12. The ontology-based answers (OBA) service: a connector for embedded usage of ontologies in applications

    PubMed Central

    Dönitz, Jürgen; Wingender, Edgar

    2012-01-01

    The semantic web depends on the use of ontologies to let electronic systems interpret contextual information. Optimally, the handling and access of ontologies should be completely transparent to the user. As a means to this end, we have developed a service that attempts to bridge the gap between experts in a certain knowledge domain, ontologists, and application developers. The ontology-based answers (OBA) service introduced here can be embedded into custom applications to grant access to the classes of ontologies and their relations as most important structural features as well as to information encoded in the relations between ontology classes. Thus computational biologists can benefit from ontologies without detailed knowledge about the respective ontology. The content of ontologies is mapped to a graph of connected objects which is compatible to the object-oriented programming style in Java. Semantic functions implement knowledge about the complex semantics of an ontology beyond the class hierarchy and “partOf” relations. By using these OBA functions an application can, for example, provide a semantic search function, or (in the examples outlined) map an anatomical structure to the organs it belongs to. The semantic functions relieve the application developer from the necessity of acquiring in-depth knowledge about the semantics and curation guidelines of the used ontologies by implementing the required knowledge. The architecture of the OBA service encapsulates the logic to process ontologies in order to achieve a separation from the application logic. A public server with the current plugins is available and can be used with the provided connector in a custom application in scenarios analogous to the presented use cases. The server and the client are freely available if a project requires the use of custom plugins or non-public ontologies. The OBA service and further documentation is available at http://www.bioinf.med.uni-goettingen.de/projects/oba PMID:23060901

  13. Applications and assessment of QM:QM electronic embedding using generalized asymmetric Mulliken atomic charges.

    PubMed

    Parandekar, Priya V; Hratchian, Hrant P; Raghavachari, Krishnan

    2008-10-14

    Hybrid QM:QM (quantum mechanics:quantum mechanics) and QM:MM (quantum mechanics:molecular mechanics) methods are widely used to calculate the electronic structure of large systems where a full quantum mechanical treatment at a desired high level of theory is computationally prohibitive. The ONIOM (our own N-layer integrated molecular orbital molecular mechanics) approximation is one of the more popular hybrid methods, where the total molecular system is divided into multiple layers, each treated at a different level of theory. In a previous publication, we developed a novel QM:QM electronic embedding scheme within the ONIOM framework, where the model system is embedded in the external Mulliken point charges of the surrounding low-level region to account for the polarization of the model system wave function. Therein, we derived and implemented a rigorous expression for the embedding energy as well as analytic gradients that depend on the derivatives of the external Mulliken point charges. In this work, we demonstrate the applicability of our QM:QM method with point charge embedding and assess its accuracy. We study two challenging systems--zinc metalloenzymes and silicon oxide cages--and demonstrate that electronic embedding shows significant improvement over mechanical embedding. We also develop a modified technique for the energy and analytic gradients using a generalized asymmetric Mulliken embedding method involving an unequal splitting of the Mulliken overlap populations to offer improvement in situations where the Mulliken charges may be deficient.

  14. Efficient embedding of complex networks to hyperbolic space via their Laplacian

    PubMed Central

    Alanis-Lobato, Gregorio; Mier, Pablo; Andrade-Navarro, Miguel A.

    2016-01-01

    The different factors involved in the growth process of complex networks imprint valuable information in their observable topologies. How to exploit this information to accurately predict structural network changes is the subject of active research. A recent model of network growth sustains that the emergence of properties common to most complex systems is the result of certain trade-offs between node birth-time and similarity. This model has a geometric interpretation in hyperbolic space, where distances between nodes abstract this optimisation process. Current methods for network hyperbolic embedding search for node coordinates that maximise the likelihood that the network was produced by the afore-mentioned model. Here, a different strategy is followed in the form of the Laplacian-based Network Embedding, a simple yet accurate, efficient and data driven manifold learning approach, which allows for the quick geometric analysis of big networks. Comparisons against existing embedding and prediction techniques highlight its applicability to network evolution and link prediction. PMID:27445157

  15. Efficient embedding of complex networks to hyperbolic space via their Laplacian

    NASA Astrophysics Data System (ADS)

    Alanis-Lobato, Gregorio; Mier, Pablo; Andrade-Navarro, Miguel A.

    2016-07-01

    The different factors involved in the growth process of complex networks imprint valuable information in their observable topologies. How to exploit this information to accurately predict structural network changes is the subject of active research. A recent model of network growth sustains that the emergence of properties common to most complex systems is the result of certain trade-offs between node birth-time and similarity. This model has a geometric interpretation in hyperbolic space, where distances between nodes abstract this optimisation process. Current methods for network hyperbolic embedding search for node coordinates that maximise the likelihood that the network was produced by the afore-mentioned model. Here, a different strategy is followed in the form of the Laplacian-based Network Embedding, a simple yet accurate, efficient and data driven manifold learning approach, which allows for the quick geometric analysis of big networks. Comparisons against existing embedding and prediction techniques highlight its applicability to network evolution and link prediction.

  16. Determination of Protein Expression Level in Cultured Cells by Immunocytochemistry on Paraffin-embedded Cell Blocks.

    PubMed

    Poojan, Shiv; Kim, Han-Seong; Yoon, Ji-Woon; Sim, Hye Won; Hong, Kyeong-Man

    2018-05-20

    Immunofluorescent staining is currently the method of choice for determination of protein expression levels in cell-culture systems when morphological information is also necessary. The protocol of immunocytochemical staining on paraffin-embedded cell blocks, presented herein, is an excellent alternative to immunofluorescent staining on non-paraffin-embedded fixed cells. In this protocol, a paraffin cell block from HeLa cells was prepared using the thromboplastin-plasma method, and immunocytochemistry was performed for the evaluation of two proliferation markers, CKAP2 and Ki-67. The nuclei and cytoplasmic morphology of the HeLa cells were well preserved in the cell-block slides. At the same time, the CKAP2 and Ki-67 staining patterns in the immunocytochemistry were quite similar to those in immunohistochemical staining in paraffin cancer tissues. With modified cell-culture conditions, including pre-incubation of HeLa cells under serum-free conditions, the effect could be evaluated while preserving architectural information. In conclusion, immunocytochemistry on paraffin-embedded cell blocks is an excellent alternative to immunofluorescent staining.

  17. Music and dance make me feel alive: from Mandela's prison songs and dances to public policy.

    PubMed

    Buis, Johann S

    2013-01-01

    How is it possible for song and dance to exist in political incarceration and manifest itself later as public policy responding to apartheid atrocities? Examining the body of songs, oral history accounts, and eye-witness reports provided by fellow-prisoners of Mandela on Robben Island prison, I uncover a psychological environment mediated through music and dance--within the confines of a political prison. This source of prison music-making by political prisoners in detention, provide us with the artistic expressions of revolutionary songs, parody songs, praise songs, laments, etc. These music genres reflect ontologies embedded in Mandela's juristic imagination. My framework for explaining these ontologies is a theoretical framework I call an aesthetic of function: internal ontologies that speak to the African cultural ground against which external ontologies are expressed in the jurisprudential redress to apartheid atrocities. Examining his external (jurisprudential) ontologies through song and dance, one realizes that the best way for him to have solved the unprecedented public redress of apartheid atrocities is evident in the songs he sang in Robben Island prison. Retribution could have been a logical solution for him. Instead, he turned to truth-telling and reconciliation as public policy. The Truth and Reconciliation Commission's unprecedented breaking of social and jurisprudential boundaries, the claim of agency for both victims and perpetrators, and public policy of South Africa's first democratically elected black president, lie deeply embedded in cultural practices he testified to in his autobiography, "The Long Walk to Freedom". These cultural practices in prison were singing and dancing. This paper complements the music-as-torture trope: here music in detention carries ontological agency. Musical evidence of stylistic features, text, and contextual analyses, and related literary criticism devices, expose Mandela's embedded internal and external ontological cultural practices. Here, song and dance have agency to influence public policy despite the constraints of political detention.

  18. Data embedding employing degenerate clusters of data having differences less than noise value

    DOEpatents

    Sanford, II, Maxwell T.; Handel, Theodore G.

    1998-01-01

    A method of embedding auxiliary information into a set of host data, such as a photograph, television signal, facsimile transmission, or identification card. All such host data contain intrinsic noise, allowing pixels in the host data which are nearly identical and which have values differing by less than the noise value to be manipulated and replaced with auxiliary data. As the embedding method does not change the elemental values of the host data, the auxiliary data do not noticeably affect the appearance or interpretation of the host data. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user.

  19. Validation of the Lung Subtyping Panel in Multiple Fresh-Frozen and Formalin-Fixed, Paraffin-Embedded Lung Tumor Gene Expression Data Sets.

    PubMed

    Faruki, Hawazin; Mayhew, Gregory M; Fan, Cheng; Wilkerson, Matthew D; Parker, Scott; Kam-Morgan, Lauren; Eisenberg, Marcia; Horten, Bruce; Hayes, D Neil; Perou, Charles M; Lai-Goldman, Myla

    2016-06-01

    Context .- A histologic classification of lung cancer subtypes is essential in guiding therapeutic management. Objective .- To complement morphology-based classification of lung tumors, a previously developed lung subtyping panel (LSP) of 57 genes was tested using multiple public fresh-frozen gene-expression data sets and a prospectively collected set of formalin-fixed, paraffin-embedded lung tumor samples. Design .- The LSP gene-expression signature was evaluated in multiple lung cancer gene-expression data sets totaling 2177 patients collected from 4 platforms: Illumina RNAseq (San Diego, California), Agilent (Santa Clara, California) and Affymetrix (Santa Clara) microarrays, and quantitative reverse transcription-polymerase chain reaction. Gene centroids were calculated for each of 3 genomic-defined subtypes: adenocarcinoma, squamous cell carcinoma, and neuroendocrine, the latter of which encompassed both small cell carcinoma and carcinoid. Classification by LSP into 3 subtypes was evaluated in both fresh-frozen and formalin-fixed, paraffin-embedded tumor samples, and agreement with the original morphology-based diagnosis was determined. Results .- The LSP-based classifications demonstrated overall agreement with the original clinical diagnosis ranging from 78% (251 of 322) to 91% (492 of 538 and 869 of 951) in the fresh-frozen public data sets and 84% (65 of 77) in the formalin-fixed, paraffin-embedded data set. The LSP performance was independent of tissue-preservation method and gene-expression platform. Secondary, blinded pathology review of formalin-fixed, paraffin-embedded samples demonstrated concordance of 82% (63 of 77) with the original morphology diagnosis. Conclusions .- The LSP gene-expression signature is a reproducible and objective method for classifying lung tumors and demonstrates good concordance with morphology-based classification across multiple data sets. The LSP panel can supplement morphologic assessment of lung cancers, particularly when classification by standard methods is challenging.

  20. Study of Composite Plate Damages Using Embedded PZT Sensors with Various Center Frequency

    NASA Astrophysics Data System (ADS)

    Kang, Kyoung-Tak; Chun, Heoung-Jae; Son, Ju-Hyun; Byun, Joon-Hyung; Um, Moon-Kwang; Lee, Sang-Kwan

    This study presents part of an experimental and analytical survey of candidate methods for damage detection of composite structural. Embedded piezoceramic (PZT) sensors were excited with the high power ultrasonic wave generator generating a propagation of stress wave along the composite plate. The same embedded piezoceramic (PZT) sensors are used as receivers for acquiring stress signals. The effects of center frequency of embedded sensor were evaluated for the damage identification capability with known localized defects. The study was carried out to assess damage in composite plate by fusing information from multiple sensing paths of the embedded network. It was based on the Hilbert transform, signal correlation and probabilistic searching. The obtained results show that satisfactory detection of defects could be achieved by proposed method.

  1. An Embedded Librarian Program: Eight Years On.

    PubMed

    Freiburger, Gary; Martin, Jennifer R; Nuñez, Annabelle V

    2016-01-01

    This article examines an embedded librarian program eight years after implementation in a large academic health center. Librarians were physically moved into the colleges of pharmacy, public health, and nursing. Statistics are reported as well as comments from the participating librarians and faculty members. Strong relationships have been built between librarians, faculty members, and students. Locating the librarians among faculty and students led to a better understanding of client needs and an increased awareness of librarian competencies and services resulting in partnerships and greater utilization of library services.

  2. Embedding Multiple Literacies into STEM Curricula

    ERIC Educational Resources Information Center

    Soules, Aline; Nielsen, Sarah; LeDuc, Danika; Inouye, Caron; Singley, Jason; Wildy, Erica; Seitz, Jeff

    2014-01-01

    In fall 2012, an interdisciplinary team of science, English, and library faculty embedded reading, writing, and information literacy strategies in Science, Technology, Engineering, and Mathematics (STEM) curricula as a first step in improving student learning and retention in science courses and aligning them with the Next Generation Science and…

  3. Video Game Learning Dynamics: Actionable Measures of Multidimensional Learning Trajectories

    ERIC Educational Resources Information Center

    Reese, Debbie Denise; Tabachnick, Barbara G.; Kosko, Robert E.

    2015-01-01

    Valid, accessible, reusable methods for instructional video game design and embedded assessment can provide actionable information enhancing individual and collective achievement. Cyberlearning through game-based, metaphor-enhanced learning objects (CyGaMEs) design and embedded assessment quantify player behavior to study knowledge discovery and…

  4. An optimised patient information sheet did not significantly increase recruitment or retention in a falls prevention study: an embedded randomised recruitment trial.

    PubMed

    Cockayne, Sarah; Fairhurst, Caroline; Adamson, Joy; Hewitt, Catherine; Hull, Robin; Hicks, Kate; Keenan, Anne-Maree; Lamb, Sarah E; Green, Lorraine; McIntosh, Caroline; Menz, Hylton B; Redmond, Anthony C; Rodgers, Sara; Torgerson, David J; Vernon, Wesley; Watson, Judith; Knapp, Peter; Rick, Jo; Bower, Peter; Eldridge, Sandra; Madurasinghe, Vichithranie W; Graffy, Jonathan

    2017-03-28

    Randomised controlled trials are generally regarded as the 'gold standard' experimental design to determine the effectiveness of an intervention. Unfortunately, many trials either fail to recruit sufficient numbers of participants, or recruitment takes longer than anticipated. The current embedded trial evaluates the effectiveness of optimised patient information sheets on recruitment of participants in a falls prevention trial. A three-arm, embedded randomised methodology trial was conducted within the National Institute for Health Research-funded REducing Falls with ORthoses and a Multifaceted podiatry intervention (REFORM) cohort randomised controlled trial. Routine National Health Service podiatry patients over the age of 65 were randomised to receive either the control patient information sheet (PIS) for the host trial or one of two optimised versions, a bespoke user-tested PIS or a template-developed PIS. The primary outcome was the proportion of patients in each group who went on to be randomised to the host trial. Six thousand and nine hundred patients were randomised 1:1:1 into the embedded trial. A total of 193 (2.8%) went on to be randomised into the main REFORM trial (control n = 62, template-developed n = 68; bespoke user-tested n = 63). Information sheet allocation did not improve recruitment to the trial (odds ratios for the three pairwise comparisons: template vs control 1.10 (95% CI 0.77-1.56, p = 0.60); user-tested vs control 1.01 (95% CI 0.71-1.45, p = 0.94); and user-tested vs template 0.92 (95% CI 0.65-1.31, p = 0.65)). This embedded methodology trial has demonstrated limited evidence as to the benefit of using optimised information materials on recruitment and retention rates in the REFORM study. International Standard Randomised Controlled Trials Number registry, ISRCTN68240461 . Registered on 01 July 2011.

  5. "If you don't abstain, you will die of AIDS": AIDS education in Kenyan public schools.

    PubMed

    Njue, Carolyne; Nzioka, Charles; Ahlberg, Beth-Maina; Pertet, Anne M; Voeten, Helene A C M

    2009-04-01

    We explored constraints of implementing AIDS education in public schools in Kenya. Sixty interviews with teachers and 60 focus group discussions with students were conducted in 21 primary and nine secondary schools. System/school-level constraints included lack of time in the curriculum, limited reach of secondary-school students (because AIDS education is embedded in biology, which is not compulsory), and disapproval of openness about sex and condoms by the Ministry of Education and parents. Alternative strategies to teach about AIDS had their own constraints. Teachers lacked training and support and felt uncomfortable with the topic. They were not used to interactive teaching methods and sometimes breached confidentiality. Teachers' negative attitudes constrained students from seeking information. Training interventions should be provided to teachers to increase their self-confidence, foster more positive attitudes, and stimulate interactive teaching methods. The Ministry of Education needs to have a clear policy toward the promotion of condoms.

  6. Digital image envelope: method and evaluation

    NASA Astrophysics Data System (ADS)

    Huang, H. K.; Cao, Fei; Zhou, Michael Z.; Mogel, Greg T.; Liu, Brent J.; Zhou, Xiaoqiang

    2003-05-01

    Health data security, characterized in terms of data privacy, authenticity, and integrity, is a vital issue when digital images and other patient information are transmitted through public networks in telehealth applications such as teleradiology. Mandates for ensuring health data security have been extensively discussed (for example The Health Insurance Portability and Accountability Act, HIPAA) and health informatics guidelines (such as the DICOM standard) are beginning to focus on issues of data continue to be published by organizing bodies in healthcare; however, there has not been a systematic method developed to ensure data security in medical imaging Because data privacy and authenticity are often managed primarily with firewall and password protection, we have focused our research and development on data integrity. We have developed a systematic method of ensuring medical image data integrity across public networks using the concept of the digital envelope. When a medical image is generated regardless of the modality, three processes are performed: the image signature is obtained, the DICOM image header is encrypted, and a digital envelope is formed by combining the signature and the encrypted header. The envelope is encrypted and embedded in the original image. This assures the security of both the image and the patient ID. The embedded image is encrypted again and transmitted across the network. The reverse process is performed at the receiving site. The result is two digital signatures, one from the original image before transmission, and second from the image after transmission. If the signatures are identical, there has been no alteration of the image. This paper concentrates in the method and evaluation of the digital image envelope.

  7. The rationale for integrated childhood meningoencephalitis surveillance: a case study from Cambodia

    PubMed Central

    Touch, Sok; Hills, Susan; Rani, Manju; Samnang, Chham; Khalakdina, Asheena; Jacobson, Julie

    2009-01-01

    Abstract Problem Recent progress in vaccine availability and affordability has raised prospects for reducing death and disability from neurological infections in children. In many Asian countries, however, the epidemiology and public health burden of neurological diseases such as Japanese encephalitis and bacterial meningitis are poorly understood. Approach A sentinel surveillance system for Japanese encephalitis was developed and embedded within the routine meningoencephalitis syndromic surveillance system in Cambodia in 2006. The sentinel surveillance system was designed so surveillance and laboratory testing for other etiologies of neurological infection could be incorporated. Local setting The Communicable Disease Control department of the Ministry of Health in Cambodia worked with partners to establish the sentinel surveillance system. Relevant changes The sentinel surveillance system has provided important information on the disease burden of Japanese encephalitis in Cambodia and is now providing a platform for expansion to incorporate laboratory testing for other vaccine-preventable neurological infections in children. Lessons learned Sentinel surveillance systems, when linked to syndromic reporting systems, can characterize the epidemiology of meningoencephalitis and identify the proportion of hospital-based neurological infection in children that is vaccine preventable. Integrated systems enable consistency in data collection, analysis and information dissemination, and they enhance the capacity of public health managers to provide more credible and integrated information to policy-makers. This will assist decision-making about the potential role of immunization in reducing the incidence of childhood neurological infections. PMID:19551241

  8. The Humanities and the Art of Public Discussion. Volume 2.

    ERIC Educational Resources Information Center

    Federation of State Humanities Councils, Washington, DC.

    The marriage of the humanities to public discussion of major current issues is an invitation to understand how various points of view are embedded in one's history, values, visions of the future, and an understanding of what is right, wrong, and necessary. The essays in this volume examine three issues: abortion, economic competition, and racial…

  9. Embracing the Future: Embedding Digital Repositories in Higher Education Institutions. Research Brief

    ERIC Educational Resources Information Center

    Hoorens, Stijn; van Dijk, Lidia Villalba; van Stolk, Christian

    2009-01-01

    This briefing paper captures the key findings and recommendations of a study commissioned by the Joint Information Systems Committee on aspects of the strategic commitment of institutions to repository sustainability. This project, labelled EMBRACE (EMBedding Repositories And Consortial Enhancement), is aimed at enhancing the functionality,…

  10. Low-dimensional approximation searching strategy for transfer entropy from non-uniform embedding

    PubMed Central

    2018-01-01

    Transfer entropy from non-uniform embedding is a popular tool for the inference of causal relationships among dynamical subsystems. In this study we present an approach that makes use of low-dimensional conditional mutual information quantities to decompose the original high-dimensional conditional mutual information in the searching procedure of non-uniform embedding for significant variables at different lags. We perform a series of simulation experiments to assess the sensitivity and specificity of our proposed method to demonstrate its advantage compared to previous algorithms. The results provide concrete evidence that low-dimensional approximations can help to improve the statistical accuracy of transfer entropy in multivariate causality analysis and yield a better performance over other methods. The proposed method is especially efficient as the data length grows. PMID:29547669

  11. Position-aware deep multi-task learning for drug-drug interaction extraction.

    PubMed

    Zhou, Deyu; Miao, Lei; He, Yulan

    2018-05-01

    A drug-drug interaction (DDI) is a situation in which a drug affects the activity of another drug synergistically or antagonistically when being administered together. The information of DDIs is crucial for healthcare professionals to prevent adverse drug events. Although some known DDIs can be found in purposely-built databases such as DrugBank, most information is still buried in scientific publications. Therefore, automatically extracting DDIs from biomedical texts is sorely needed. In this paper, we propose a novel position-aware deep multi-task learning approach for extracting DDIs from biomedical texts. In particular, sentences are represented as a sequence of word embeddings and position embeddings. An attention-based bidirectional long short-term memory (BiLSTM) network is used to encode each sentence. The relative position information of words with the target drugs in text is combined with the hidden states of BiLSTM to generate the position-aware attention weights. Moreover, the tasks of predicting whether or not two drugs interact with each other and further distinguishing the types of interactions are learned jointly in multi-task learning framework. The proposed approach has been evaluated on the DDIExtraction challenge 2013 corpus and the results show that with the position-aware attention only, our proposed approach outperforms the state-of-the-art method by 0.99% for binary DDI classification, and with both position-aware attention and multi-task learning, our approach achieves a micro F-score of 72.99% on interaction type identification, outperforming the state-of-the-art approach by 1.51%, which demonstrates the effectiveness of the proposed approach. Copyright © 2018 Elsevier B.V. All rights reserved.

  12. An evaluation of dental information sessions provided to childcare educators in NSW in 2010-2011.

    PubMed

    Noller, Jennifer M

    2013-12-01

    Childcare services provide ideal settings to promote good oral health and help reduce tooth decay in young children. This paper reports the results of an evaluation of the dental information session component of the NSW Little Smiles Program provided by public oral health service professionals to childcare educators in NSW in 2010-2011. The evaluation sought to determine if a face-to-face information session provided to childcare educators by oral health professionals: (i) can improve the confidence of childcare educators to reach national quality standards that relate to oral health; and (ii) is an appropriate model to use. In 2010-2011, 163 dental information sessions were provided to 1716 participants from over 526 childcare centres across NSW. Results showed that a dental information session can improve the confidence of childcare educators to assist their service to reach the required national quality standards for oral hygiene and diet-related oral health issues. Further evaluation is required to determine if oral health can be embedded in the daily practice of childcare services and other options need to be explored to deliver the sessions in a more cost-effective way.

  13. Unfree markets: socially embedded informal health providers in northern Karnataka, India.

    PubMed

    George, Asha; Iyer, Aditi

    2013-11-01

    The dynamics of informal health markets in marginalised regions are relevant to policy discourse in India, but are poorly understood. We examine how informal health markets operate from the viewpoint of informal providers (those without any government-recognised medical degrees, otherwise known as RMPs) by drawing upon data from a household survey in 2002, a provider census in 2004 and ongoing field observations from a research site in Koppal district, Karnataka, India. We find that despite their illegality, RMPs depend on government and private providers for their training and referral networks. Buffeted by unregulated market pressures, RMPs are driven to provide allopathic commodities regardless of need, but can also be circumspect in their practice. Though motivated by profit, their socially embedded practice at community level at times undermines their ability to ensure payment of fees for their services. In addition, RMPs feel that communities can threaten them via violence or malicious rumours, leading them to seek political favour and social protection from village elites and elected representatives. RMPs operate within negotiated quid pro quo bargains that lead to tenuous reciprocity or fragile trust between them and the communities in which they practise. In the context of this 'unfree' market, some RMPs reported being more embedded in health systems, more responsive to communities and more vulnerable to unregulated market pressures than others. Understanding the heterogeneity, nuanced motivations and the embedded social relations that mark informal providers in the health systems, markets and communities they work in, is critical for health system reforms. Copyright © 2013 Elsevier Ltd. All rights reserved.

  14. Disease named entity recognition from biomedical literature using a novel convolutional neural network.

    PubMed

    Zhao, Zhehuan; Yang, Zhihao; Luo, Ling; Wang, Lei; Zhang, Yin; Lin, Hongfei; Wang, Jian

    2017-12-28

    Automatic disease named entity recognition (DNER) is of utmost importance for development of more sophisticated BioNLP tools. However, most conventional CRF based DNER systems rely on well-designed features whose selection is labor intensive and time-consuming. Though most deep learning methods can solve NER problems with little feature engineering, they employ additional CRF layer to capture the correlation information between labels in neighborhoods which makes them much complicated. In this paper, we propose a novel multiple label convolutional neural network (MCNN) based disease NER approach. In this approach, instead of the CRF layer, a multiple label strategy (MLS) first introduced by us, is employed. First, the character-level embedding, word-level embedding and lexicon feature embedding are concatenated. Then several convolutional layers are stacked over the concatenated embedding. Finally, MLS strategy is applied to the output layer to capture the correlation information between neighboring labels. As shown by the experimental results, MCNN can achieve the state-of-the-art performance on both NCBI and CDR corpora. The proposed MCNN based disease NER method achieves the state-of-the-art performance with little feature engineering. And the experimental results show the MLS strategy's effectiveness of capturing the correlation information between labels in the neighborhood.

  15. Baseline and extensions approach to information retrieval of complex medical data: Poznan's approach to the bioCADDIE 2016

    PubMed Central

    Cieslewicz, Artur; Dutkiewicz, Jakub; Jedrzejek, Czeslaw

    2018-01-01

    Abstract Information retrieval from biomedical repositories has become a challenging task because of their increasing size and complexity. To facilitate the research aimed at improving the search for relevant documents, various information retrieval challenges have been launched. In this article, we present the improved medical information retrieval systems designed by Poznan University of Technology and Poznan University of Medical Sciences as a contribution to the bioCADDIE 2016 challenge—a task focusing on information retrieval from a collection of 794 992 datasets generated from 20 biomedical repositories. The system developed by our team utilizes the Terrier 4.2 search platform enhanced by a query expansion method using word embeddings. This approach, after post-challenge modifications and improvements (with particular regard to assigning proper weights for original and expanded terms), allowed us achieving the second best infNDCG measure (0.4539) compared with the challenge results and infAP 0.3978. This demonstrates that proper utilization of word embeddings can be a valuable addition to the information retrieval process. Some analysis is provided on related work involving other bioCADDIE contributions. We discuss the possibility of improving our results by using better word embedding schemes to find candidates for query expansion. Database URL: https://biocaddie.org/benchmark-data PMID:29688372

  16. Data embedding employing degenerate clusters of data having differences less than noise value

    DOEpatents

    Sanford, M.T. II; Handel, T.G.

    1998-10-06

    A method of embedding auxiliary information into a set of host data, such as a photograph, television signal, facsimile transmission, or identification card. All such host data contain intrinsic noise, allowing pixels in the host data which are nearly identical and which have values differing by less than the noise value to be manipulated and replaced with auxiliary data. As the embedding method does not change the elemental values of the host data, the auxiliary data do not noticeably affect the appearance or interpretation of the host data. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user. 35 figs.

  17. Steganographic embedding in containers-images

    NASA Astrophysics Data System (ADS)

    Nikishova, A. V.; Omelchenko, T. A.; Makedonskij, S. A.

    2018-05-01

    Steganography is one of the approaches to ensuring the protection of information transmitted over the network. But a steganographic method should vary depending on a used container. According to statistics, the most widely used containers are images and the most common image format is JPEG. Authors propose a method of data embedding into a frequency area of images in format JPEG 2000. It is proposed to use the method of Benham-Memon- Yeo-Yeung, in which instead of discrete cosine transform, discrete wavelet transform is used. Two requirements for images are formulated. Structure similarity is chosen to obtain quality assessment of data embedding. Experiments confirm that requirements satisfaction allows achieving high quality assessment of data embedding.

  18. Demonstration of Data Interactive Publications

    NASA Astrophysics Data System (ADS)

    Domenico, B.; Weber, J.

    2012-04-01

    This is a demonstration version of the talk given in session ESSI2.4 "Full lifecycle of data." For some years now, the authors have developed examples of online documents that allowed the reader to interact directly with datasets, but there were limitations that restricted the interaction to specific desktop analysis and display tools that were not generally available to all readers of the documents. Recent advances in web service technology and related standards are making it possible to develop systems for publishing online documents that enable readers to access, analyze, and display the data discussed in the publication from the perspective and in the manner from which the author wants it to be represented. By clicking on embedded links, the reader accesses not only the usual textual information in a publication, but also data residing on a local or remote web server as well as a set of processing tools for analyzing and displaying the data. With the option of having the analysis and display processing provided on the server (or in the cloud), there are now a broader set of possibilities on the client side where the reader can interact with the data via a thin web client, a rich desktop application, or a mobile platform "app." The presentation will outline the architecture of data interactive publications along with illustrative examples.

  19. Fiber-Embedded Metallic Materials: From Sensing towards Nervous Behavior

    PubMed Central

    Saheb, Nouari; Mekid, Samir

    2015-01-01

    Embedding of fibers in materials has attracted serious attention from researchers and has become a new research trend. Such material structures are usually termed “smart” or more recently “nervous”. Materials can have the capability of sensing and responding to the surrounding environmental stimulus, in the former, and the capability of feeling multiple structural and external stimuli, while feeding information back to a controller for appropriate real-time action, in the latter. In this paper, embeddable fibers, embedding processes, and behavior of fiber-embedded metallic materials are reviewed. Particular emphasis has been given to embedding fiber Bragg grating (FBG) array sensors and piezo wires, because of their high potential to be used in nervous materials for structural health monitoring. Ultrasonic consolidation and laser-based layered manufacturing processes are discussed in detail because of their high potential to integrate fibers without disruption. In addition, current challenges associated with embedding fibers in metallic materials are highlighted and recommendations for future research work are set. PMID:28793689

  20. The Organization of Informal Learning

    ERIC Educational Resources Information Center

    Rogoff, Barbara; Callanan, Maureen; Gutiérrez, Kris D.; Erickson, Frederick

    2016-01-01

    Informal learning is often treated as simply an alternative to formal, didactic instruction. This chapter discusses how the organization of informal learning differs across distinct settings but with important commonalities distinguishing informal learning from formal learning: Informal learning is nondidactic, is embedded in meaningful activity,…

  1. Opportunity NYC-Family Rewards: An Embedded Child and Family Study of Conditional Cash Transfers

    ERIC Educational Resources Information Center

    Morris, Pamela; Aber, J. Lawrence; Wolf, Sharon; Berg, Juliette

    2011-01-01

    This study builds on and informs ecological theory (Bronfenbrenner & Morris, 2006) by focusing on the contextual processes by which individual developmental trajectories can be altered. Ecological theory posits that children are embedded in a nested and interactive set of interrelated contexts beginning with the micro-system (the most…

  2. Researching into a MOOC Embedded Flipped Classroom Model for College English Reading and Writing Course

    ERIC Educational Resources Information Center

    Xinying, Zhang

    2017-01-01

    There is obvious pressure for higher education institutions to undergo transformation now in China. Reflecting this, the computer and information technology give rise to the development of a Massive Open Online Course (MOOC) embedded flipped classroom. Flipped classroom approaches replace the traditional transmissive teaching with engaging…

  3. Gender Beliefs and Embedded Gendered Values in Preschool

    ERIC Educational Resources Information Center

    Emilson, Anette; Folkesson, Anne-Mari; Lindberg, Ingeborg Moqvist

    2016-01-01

    The aim of this study is to explore practitioners' gender beliefs and how gendered values are embedded in Swedish preschool practice. The research question is: What beliefs about gender and the associated values, can be identified in practitioners' talk when they discuss gender issues? The study is informed by Bronwyn Davies' theoretical ideas…

  4. Embedded Librarianship and Teacher Education: A Neuroeducational Paradigm Using Guided Inquiry

    ERIC Educational Resources Information Center

    Warner, Signia; Templeton, Lolly

    2010-01-01

    This article focuses on a course-embedded guided inquiry project initiated by a senior librarian and an education professor to promote an understanding of how the brain functions and to experiment with brain-targeted teaching techniques. Information literacy instruction (ILI) takes place in the electronic classroom in the Educational Resources…

  5. Embedding Enterprise: A Business School Undergraduate Course with an Enterprise Focus

    ERIC Educational Resources Information Center

    Jones, Paul; Jones, Amanda; Skinner, Heather; Packham, Gary

    2013-01-01

    This study profiles, through a case study of an undergraduate business programme, how a business school has embedded the theme of enterprise in its core undergraduate programme. Key participants in the development of the strategy and programme tutors and students were interviewed, to provide information for an analysis of the principle objectives…

  6. Beginning Readers Activate Semantics from Sub-Word Orthography

    ERIC Educational Resources Information Center

    Nation, Kate; Cocksey, Joanne

    2009-01-01

    Two experiments assessed whether 7-year-old children activate semantic information from sub-word orthography. Children made category decisions to visually-presented words, some of which contained an embedded word (e.g., "hip" in s"hip"). In Experiment 1 children were slower and less accurate to classify words if they contained an embedded word…

  7. Engineering the Future: Embedding Engineering Permanently across the School-University Interface

    ERIC Educational Resources Information Center

    MacBride, G.; Hayward, E. L.; Hayward, G.; Spencer, E.; Ekevall, E.; Magill, J.; Bryce, A. C.; Stimpson, B.

    2010-01-01

    This paper describes the design, implementation, and evaluation of an educational program. Engineering the Future (EtF) sought to promote a permanent, informed awareness within the school community of high-level engineering by embedding key aspects of engineering within the education curriculum. The Scottish education system is used for a case…

  8. An Embedded Systems Course for Engineering Students Using Open-Source Platforms in Wireless Scenarios

    ERIC Educational Resources Information Center

    Rodriguez-Sanchez, M. C.; Torrado-Carvajal, Angel; Vaquero, Joaquin; Borromeo, Susana; Hernandez-Tamames, Juan A.

    2016-01-01

    This paper presents a case study analyzing the advantages and disadvantages of using project-based learning (PBL) combined with collaborative learning (CL) and industry best practices, integrated with information communication technologies, open-source software, and open-source hardware tools, in a specialized microcontroller and embedded systems…

  9. Embedding Marketing in International Campus Development: Lessons from UK Universities

    ERIC Educational Resources Information Center

    Lewis, Vicky

    2016-01-01

    This paper provides recommendations for embedding a market- and marketing-informed approach within the development process for a new international campus. It includes a brief outline of the current global profile of international campuses (as one form of transnational education) before highlighting the role of marketing at key stages of campus…

  10. Nursing Faculty Collaborate with Embedded Librarians to Serve Online Graduate Students in a Consortium Setting

    ERIC Educational Resources Information Center

    Guillot, Ladonna; Stahr, Beth; Meeker, Bonnie Juve'

    2010-01-01

    Nursing and library faculty face many information literacy challenges when graduate nursing programs migrate to online course delivery. The authors describe a collaborative model for providing cost-effective online library services to new graduate students in a three-university consortium. The embedded librarian service links a health sciences…

  11. Named Entity Recognition in Chinese Clinical Text Using Deep Neural Network.

    PubMed

    Wu, Yonghui; Jiang, Min; Lei, Jianbo; Xu, Hua

    2015-01-01

    Rapid growth in electronic health records (EHRs) use has led to an unprecedented expansion of available clinical data in electronic formats. However, much of the important healthcare information is locked in the narrative documents. Therefore Natural Language Processing (NLP) technologies, e.g., Named Entity Recognition that identifies boundaries and types of entities, has been extensively studied to unlock important clinical information in free text. In this study, we investigated a novel deep learning method to recognize clinical entities in Chinese clinical documents using the minimal feature engineering approach. We developed a deep neural network (DNN) to generate word embeddings from a large unlabeled corpus through unsupervised learning and another DNN for the NER task. The experiment results showed that the DNN with word embeddings trained from the large unlabeled corpus outperformed the state-of-the-art CRF's model in the minimal feature engineering setting, achieving the highest F1-score of 0.9280. Further analysis showed that word embeddings derived through unsupervised learning from large unlabeled corpus remarkably improved the DNN with randomized embedding, denoting the usefulness of unsupervised feature learning.

  12. Engaging the learner: Embedding information literacy skills into a biotechnology degree.

    PubMed

    Ward, Helena; Hockey, Julie

    2007-09-01

    One of the challenges of the Biotechnology industry is keeping up to date with the rapid pace of change and that much of the information, which students learn in their undergraduate studies, will be out of date in a few years. It is therefore crucial that Biotechnology students have the skills to access the relevant information for their studies and critically evaluate the vast volume of information and its sources. By developing information literacy skills, which are part of lifelong learning, Biotechnology graduates are better prepared for their careers. Students also need to understand the issues related to the use of information such as social, political, ethical, and legal implications. This paper will outline the embedding of information literacy skills within the Biotechnology degree at the University of South Australia. Examples of specific activities and their link to assessment will be discussed. Copyright © 2007 International Union of Biochemistry and Molecular Biology, Inc.

  13. Sustaining librarian vitality: embedded librarianship model for health sciences libraries.

    PubMed

    Wu, Lin; Mi, Misa

    2013-01-01

    With biomedical information widely accessible from anywhere at any time, health sciences libraries have become less centralized, and they are challenged to stay relevant and vital to the mission and strategic goals of their home institution. One solution is to embed librarians at strategic points in health professions' education, research, and patient care. This article discusses a proposed five-level model of embedded librarianship within the context of health sciences libraries and describes different roles, knowledge, and skills desirable for health sciences librarians working as embedded librarians.

  14. CASTE (Course Assembly System and Tutorial Environment) and CVI: (Combat Vehicle Identification) A First Application of an Intelligent Tutorial System to Combat Vehicle Identification.

    DTIC Science & Technology

    1984-09-01

    based training systems and hence to realize an embedded trainer that is both intelligent and effective . The o(Continued) DO,; FOAM AM 71 1ឹ...Performance Effectiveness and Simulation Approved for public releate; dlitribution unlimited iii &a3laAfc*ia £&&etaL* ■’—’,£-«.■£./■.,’-f...oriented approaches to computer-based training systems and hence realise an embedded trainer that is both intelli- gent and effective . To this end

  15. Experiments and improvements of ear recognition based on local texture descriptors

    NASA Astrophysics Data System (ADS)

    Benzaoui, Amir; Adjabi, Insaf; Boukrouche, Abdelhani

    2017-04-01

    The morphology of the human ear presents rich and stable information embedded on the curved 3-D surface and has as a result attracted considerable attention from forensic scientists and engineers as a biometric recognition modality. However, recognizing a person's identity from the morphology of the human ear in unconstrained environments, with insufficient and incomplete training data, strong person-specificity, and high within-range variance, can be very challenging. Following our previous work on ear recognition based on local texture descriptors, we propose to use anatomical and embryological information about the human ear in order to find the autonomous components and the locations where large interindividual variations can be detected. Embryology is particularly relevant to our approach as it provides information on the possible changes that can be observed in the external structure of the ear. We experimented with three publicly available databases, namely: IIT Delhi-1, IIT Delhi-2, and USTB-1, consisting of several ear benchmarks acquired under varying conditions and imaging qualities. The experiments show excellent results, beyond the state of the art.

  16. 16 CFR 6.103 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... alleged victims of discrimination. Electronic and information technology includes information technology... that contains embedded information technology that is used as an integral part of the product, but the..., and medical equipment where information technology is integral to its operation are not electronic and...

  17. Applying Human Factors Principles to Mitigate Usability Issues Related to Embedded Assumptions in Health Information Technology Design

    PubMed Central

    Lowry, Svetlana Z; Patterson, Emily S

    2014-01-01

    Background There is growing recognition that design flaws in health information technology (HIT) lead to increased cognitive work, impact workflows, and produce other undesirable user experiences that contribute to usability issues and, in some cases, patient harm. These usability issues may in turn contribute to HIT utilization disparities and patient safety concerns, particularly among “non-typical” HIT users and their health care providers. Health care disparities are associated with poor health outcomes, premature death, and increased health care costs. HIT has the potential to reduce these disparate outcomes. In the computer science field, it has long been recognized that embedded cultural assumptions can reduce the usability, usefulness, and safety of HIT systems for populations whose characteristics differ from “stereotypical” users. Among these non-typical users, inappropriate embedded design assumptions may contribute to health care disparities. It is unclear how to address potentially inappropriate embedded HIT design assumptions once detected. Objective The objective of this paper is to explain HIT universal design principles derived from the human factors engineering literature that can help to overcome potential usability and/or patient safety issues that are associated with unrecognized, embedded assumptions about cultural groups when designing HIT systems. Methods Existing best practices, guidance, and standards in software usability and accessibility were subjected to a 5-step expert review process to identify and summarize those best practices, guidance, and standards that could help identify and/or address embedded design assumptions in HIT that could negatively impact patient safety, particularly for non-majority HIT user populations. An iterative consensus-based process was then used to derive evidence-based design principles from the data to address potentially inappropriate embedded cultural assumptions. Results Design principles that may help identify and address embedded HIT design assumptions are available in the existing literature. Conclusions Evidence-based HIT design principles derived from existing human factors and informatics literature can help HIT developers identify and address embedded cultural assumptions that may underlie HIT-associated usability and patient safety concerns as well as health care disparities. PMID:27025349

  18. Applying Human Factors Principles to Mitigate Usability Issues Related to Embedded Assumptions in Health Information Technology Design.

    PubMed

    Gibbons, Michael C; Lowry, Svetlana Z; Patterson, Emily S

    2014-12-18

    There is growing recognition that design flaws in health information technology (HIT) lead to increased cognitive work, impact workflows, and produce other undesirable user experiences that contribute to usability issues and, in some cases, patient harm. These usability issues may in turn contribute to HIT utilization disparities and patient safety concerns, particularly among "non-typical" HIT users and their health care providers. Health care disparities are associated with poor health outcomes, premature death, and increased health care costs. HIT has the potential to reduce these disparate outcomes. In the computer science field, it has long been recognized that embedded cultural assumptions can reduce the usability, usefulness, and safety of HIT systems for populations whose characteristics differ from "stereotypical" users. Among these non-typical users, inappropriate embedded design assumptions may contribute to health care disparities. It is unclear how to address potentially inappropriate embedded HIT design assumptions once detected. The objective of this paper is to explain HIT universal design principles derived from the human factors engineering literature that can help to overcome potential usability and/or patient safety issues that are associated with unrecognized, embedded assumptions about cultural groups when designing HIT systems. Existing best practices, guidance, and standards in software usability and accessibility were subjected to a 5-step expert review process to identify and summarize those best practices, guidance, and standards that could help identify and/or address embedded design assumptions in HIT that could negatively impact patient safety, particularly for non-majority HIT user populations. An iterative consensus-based process was then used to derive evidence-based design principles from the data to address potentially inappropriate embedded cultural assumptions. Design principles that may help identify and address embedded HIT design assumptions are available in the existing literature. Evidence-based HIT design principles derived from existing human factors and informatics literature can help HIT developers identify and address embedded cultural assumptions that may underlie HIT-associated usability and patient safety concerns as well as health care disparities.

  19. Rural Men's Health, Health Information Seeking, and Gender Identities: A Conceptual Theoretical Review of the Literature.

    PubMed

    Hiebert, Bradley; Leipert, Beverly; Regan, Sandra; Burkell, Jacquelyn

    2018-07-01

    Beginning as early as 2009, recent shifts in Canadian health care delivery indicate that access to health information is essential to promote and maintain a healthy population. It is important to understand how and where various populations, such as underresourced rural populations, access health information so that public health agencies can develop and deliver appropriate information with, for, and in these contexts. There is a paucity of research that specifically examines how rural Canadian men seek health information; therefore, this review aimed to conceptualize this process based on three dynamic key constructs: health patterns of rural Canadians, health information-seeking behaviors, and rural gender identities. This conceptual theoretical literature review included 91 articles at the intersection of these three constructs. Discussion focuses on how residing in a rural region influences men's health and health care access. Health information-seeking behaviors are discussed in terms of social networks and framed with a rural context. Connell's theory of masculinity provides a useful approach to dissecting how rural men's gender identities influence their health attitudes, and how such attitudes are embedded in rural social and cultural norms. Each major construct-health in rural Canada, health information seeking, and rural gender identities-is discussed to highlight how specific embodiments of masculinity may promote and inhibit men's health information-seeking and positive health behaviors.

  20. Sparsity prediction and application to a new steganographic technique

    NASA Astrophysics Data System (ADS)

    Phillips, David; Noonan, Joseph

    2004-10-01

    Steganography is a technique of embedding information in innocuous data such that only the innocent data is visible. The wavelet transform lends itself to image steganography because it generates a large number of coefficients representing the information in the image. Altering a small set of these coefficients allows embedding of information (payload) into an image (cover) without noticeably altering the original image. We propose a novel, dual-wavelet steganographic technique, using transforms selected such that the transform of the cover image has low sparsity, while the payload transform has high sparsity. Maximizing the sparsity of the payload transform reduces the amount of information embedded in the cover, and minimizing the sparsity of the cover increases the locations that can be altered without significantly altering the image. Making this system effective on any given image pair requires a metric to indicate the best (maximum sparsity) and worst (minimum sparsity) wavelet transforms to use. This paper develops the first stage of this metric, which can predict, averaged across many wavelet families, which of two images will have a higher sparsity. A prototype implementation of the dual-wavelet system as a proof of concept is also developed.

  1. The University-Public Health Partnership for Public Health Research Training in Quebec, Canada.

    PubMed

    Paradis, Gilles; Hamelin, Anne-Marie; Malowany, Maureen; Levy, Joseph; Rossignol, Michel; Bergeron, Pierre; Kishchuk, Natalie

    2017-01-01

    Enhancing effective preventive interventions to address contemporary public health problems requires improved capacity for applied public health research. A particular need has been recognized for capacity development in population health intervention research to address the complex multidisciplinary challenges of developing, implementing, and evaluating public health practices, intervention programs, and policies. Research training programs need to adapt to these new realities. We have presented an example of a 2003 to 2015 training program in transdisciplinary research on public health interventions that embedded doctoral and postdoctoral trainees in public health organizations in Quebec, Canada. This university-public health partnership for research training is an example of how to link science and practice to meet emerging needs in public health.

  2. Embedded Words in Visual Word Recognition: Does the Left Hemisphere See the Rain in Brain?

    ERIC Educational Resources Information Center

    McCormick, Samantha F.; Davis, Colin J.; Brysbaert, Marc

    2010-01-01

    To examine whether interhemispheric transfer during foveal word recognition entails a discontinuity between the information presented to the left and right of fixation, we presented target words in such a way that participants fixated immediately left or right of an embedded word (as in "gr*apple", "bull*et") or in the middle…

  3. Marketing the Library in an On-Line University to Help Achieve Information Literacy

    ERIC Educational Resources Information Center

    Murphy, Jennifer

    2013-01-01

    An entrepreneurial librarian takes the embedded librarian concept one step further at a completely on-line university and markets the virtual library to students, faculty and administration rather than wait for customers to come to the library. York and Vance (2009) make the observation that "one obstacle to marketing an embedded librarian…

  4. Information Literacy Development at a Distance: Embedded or Reality?

    ERIC Educational Resources Information Center

    Chisholm, Elizabeth; Lamond, Heather M.

    2012-01-01

    A small library using two full time equivalent (FTE) professional staff integrated into the Moodle environment of over 40 postgraduate distance courses with the potential to reach over 1,800 students and getting results. How? This is not embedding as many would think of it, with the librarian an active teacher throughout the entire length of the…

  5. Closing the Gap: Cybersecurity for U.S. Forces and Commands

    DTIC Science & Technology

    2017-03-30

    Dickson, Ph.D. Professor of Military Studies , JAWS Thesis Advisor Kevin Therrien, Col, USAF Committee Member Stephen Rogers, Colonel, USA Director...infrastructures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries.”5...of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and

  6. LSB-based Steganography Using Reflected Gray Code for Color Quantum Images

    NASA Astrophysics Data System (ADS)

    Li, Panchi; Lu, Aiping

    2018-02-01

    At present, the classical least-significant-bit (LSB) based image steganography has been extended to quantum image processing. For the existing LSB-based quantum image steganography schemes, the embedding capacity is no more than 3 bits per pixel. Therefore, it is meaningful to study how to improve the embedding capacity of quantum image steganography. This work presents a novel LSB-based steganography using reflected Gray code for colored quantum images, and the embedding capacity of this scheme is up to 4 bits per pixel. In proposed scheme, the secret qubit sequence is considered as a sequence of 4-bit segments. For the four bits in each segment, the first bit is embedded in the second LSB of B channel of the cover image, and and the remaining three bits are embedded in LSB of RGB channels of each color pixel simultaneously using reflected-Gray code to determine the embedded bit from secret information. Following the transforming rule, the LSB of stego-image are not always same as the secret bits and the differences are up to almost 50%. Experimental results confirm that the proposed scheme shows good performance and outperforms the previous ones currently found in the literature in terms of embedding capacity.

  7. Wireless Sensor Node for Autonomous Monitoring and Alerts in Remote Environments

    NASA Technical Reports Server (NTRS)

    Panangadan, Anand V. (Inventor); Monacos, Steve P. (Inventor)

    2015-01-01

    A method, apparatus, system, and computer program products provides personal alert and tracking capabilities using one or more nodes. Each node includes radio transceiver chips operating at different frequency ranges, a power amplifier, sensors, a display, and embedded software. The chips enable the node to operate as either a mobile sensor node or a relay base station node while providing a long distance relay link between nodes. The power amplifier enables a line-of-sight communication between the one or more nodes. The sensors provide a GPS signal, temperature, and accelerometer information (used to trigger an alert condition). The embedded software captures and processes the sensor information, provides a multi-hop packet routing protocol to relay the sensor information to and receive alert information from a command center, and to display the alert information on the display.

  8. Semantic Annotation of Complex Text Structures in Problem Reports

    NASA Technical Reports Server (NTRS)

    Malin, Jane T.; Throop, David R.; Fleming, Land D.

    2011-01-01

    Text analysis is important for effective information retrieval from databases where the critical information is embedded in text fields. Aerospace safety depends on effective retrieval of relevant and related problem reports for the purpose of trend analysis. The complex text syntax in problem descriptions has limited statistical text mining of problem reports. The presentation describes an intelligent tagging approach that applies syntactic and then semantic analysis to overcome this problem. The tags identify types of problems and equipment that are embedded in the text descriptions. The power of these tags is illustrated in a faceted searching and browsing interface for problem report trending that combines automatically generated tags with database code fields and temporal information.

  9. Top-k similar graph matching using TraM in biological networks.

    PubMed

    Amin, Mohammad Shafkat; Finley, Russell L; Jamil, Hasan M

    2012-01-01

    Many emerging database applications entail sophisticated graph-based query manipulation, predominantly evident in large-scale scientific applications. To access the information embedded in graphs, efficient graph matching tools and algorithms have become of prime importance. Although the prohibitively expensive time complexity associated with exact subgraph isomorphism techniques has limited its efficacy in the application domain, approximate yet efficient graph matching techniques have received much attention due to their pragmatic applicability. Since public domain databases are noisy and incomplete in nature, inexact graph matching techniques have proven to be more promising in terms of inferring knowledge from numerous structural data repositories. In this paper, we propose a novel technique called TraM for approximate graph matching that off-loads a significant amount of its processing on to the database making the approach viable for large graphs. Moreover, the vector space embedding of the graphs and efficient filtration of the search space enables computation of approximate graph similarity at a throw-away cost. We annotate nodes of the query graphs by means of their global topological properties and compare them with neighborhood biased segments of the datagraph for proper matches. We have conducted experiments on several real data sets, and have demonstrated the effectiveness and efficiency of the proposed method

  10. Lost in the "Third Space": The Impact of Public Engagement in Higher Education on Academic Identity, Research Practice and Career Progression

    ERIC Educational Resources Information Center

    Watermeyer, Richard

    2015-01-01

    Public engagement (PE) is habitually recognized and advocated across the higher education (HE) community--especially by regulator and funder constituencies--as an intrinsically good thing. In the UK, a number of initiatives focused on embedding a culture of PE within universities have sought to further this claim, yet have done so without…

  11. Embedding Publication Skills in Science Research Training: A Writing Group Programme Based on Applied Linguistics Frameworks and Facilitated by a Scientist

    ERIC Educational Resources Information Center

    Cargill, Margaret; Smernik, Ronald

    2016-01-01

    Few systematic efforts have been reported to develop higher degree by research student skills for writing publishable articles in science and technology fields. There is a need to address this lack in the light of the current importance of publication to science research students and the high supervisor workload entailed in repeated draft…

  12. Sculpted landscapes: art & place in Cleveland's Cultural Gardens, 1916-2006.

    PubMed

    Tebeau, Mark

    2010-01-01

    Perhaps the world's first peace garden, the Cleveland Cultural Gardens embody the history of twentieth-century America and reveal the complex interrelations between art and place. This essay uses the Cleveland Cultural Gardens as a lens through which to explore how art and place have intersected over time. It explores how communities have negotiated questions of national, ethnic, and American identity and embedded those identities into the vernacular landscape. It considers how the particulars of place were embedded into a public garden and asks whether it is possible for public art to transcend its place—both in terms of geography and history. In some sense, the Gardens have transcended their place, but in others respects, their fortunes were bound inextricably to that place, to the economic, demographic, and cultural contours that shaped and reshaped Northern Ohio. As works of art, the Cleveland Cultural Gardens both have reflected the history of Cleveland and American industrial cities during the 20th century and revealed something of the dynamics that underscored the changing character of public art and gardens in American cities.

  13. Navigating the Religious Landscape in Schools: Towards Inclusive Leadership

    ERIC Educational Resources Information Center

    Marshall, Joanne M.

    2014-01-01

    This article identifies historical and contemporary influences of religion in US public schooling. It provides analytical questions that social justice leaders can use to evaluate the practices embedded in their own schools, including an equity audit.

  14. A Graph Theory Practice on Transformed Image: A Random Image Steganography

    PubMed Central

    Thanikaiselvan, V.; Arulmozhivarman, P.; Subashanthini, S.; Amirtharajan, Rengarajan

    2013-01-01

    Modern day information age is enriched with the advanced network communication expertise but unfortunately at the same time encounters infinite security issues when dealing with secret and/or private information. The storage and transmission of the secret information become highly essential and have led to a deluge of research in this field. In this paper, an optimistic effort has been taken to combine graceful graph along with integer wavelet transform (IWT) to implement random image steganography for secure communication. The implementation part begins with the conversion of cover image into wavelet coefficients through IWT and is followed by embedding secret image in the randomly selected coefficients through graph theory. Finally stegoimage is obtained by applying inverse IWT. This method provides a maximum of 44 dB peak signal to noise ratio (PSNR) for 266646 bits. Thus, the proposed method gives high imperceptibility through high PSNR value and high embedding capacity in the cover image due to adaptive embedding scheme and high robustness against blind attack through graph theoretic random selection of coefficients. PMID:24453857

  15. Transforming Legacy Systems to Obtain Information Superiority

    DTIC Science & Technology

    2001-01-01

    is imperative that innovative technologies be developed to enable legacy weapon systems to exploit the information revolution, achieve information ... dominance , and meet the required operational tempo. This paper presents an embedded-system architecture, open system middleware services, and a software

  16. Look beyond one's own nose: combination of information from publicly available sources reveals an association of GATA4 polymorphisms with plasma triglycerides.

    PubMed

    Lamina, Claudia; Coassin, Stefan; Illig, Thomas; Kronenberg, Florian

    2011-12-01

    GATA4iKO mice exhibit impeded triglyceride absorption from intestine and decreased plasma triglyceride levels. Data in humans are lacking. We hypothesized that triglyceride levels might also be regulated by polymorphisms in the GATA4 gene in humans. We used publicly available data from different sources to evaluate this hypothesis. Our approach is a more often applicable advance to uncover associations and their functional implications which would have been otherwise missed by standard genome-wide association studies (GWAS). We used the publicly available GWAS results from 137 SNPs in the GATA4 region for triglyceride levels. We embedded these results into the comprehensive functional genomics data provided in the UCSC Genome Browser including among others information on regulatory elements and interspecies conservation. A concise graphical presentation is proposed together with an R function for automatic data preparation. This process is presented in an educational manner using a screencast to become most useful for other researchers. We observed several polymorphisms in and around the GATA4 gene which have a significant influence on plasma triglyceride levels with the lowest p-value at SNP rs1466785 (Bonferroni-corrected p-value = 1.76e-5). The bioinformatic evaluation of this locus in publicly available functional genomics data provided converging evidence for the presence of a transcriptional regulator downstream of GATA4. The combination of different sources of data has revealed an association of GATA4 with triglyceride levels in humans. Our evaluation exemplifies how an integrative analysis including both statistical and biological perspectives can shed new light on available association data and reveals novel candidate genes, which are otherwise hidden in the noisy region below genome-wide significance. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  17. Embedded Data Processor and Portable Computer Technology testbeds

    NASA Technical Reports Server (NTRS)

    Alena, Richard; Liu, Yuan-Kwei; Goforth, Andre; Fernquist, Alan R.

    1993-01-01

    Attention is given to current activities in the Embedded Data Processor and Portable Computer Technology testbed configurations that are part of the Advanced Data Systems Architectures Testbed at the Information Sciences Division at NASA Ames Research Center. The Embedded Data Processor Testbed evaluates advanced microprocessors for potential use in mission and payload applications within the Space Station Freedom Program. The Portable Computer Technology (PCT) Testbed integrates and demonstrates advanced portable computing devices and data system architectures. The PCT Testbed uses both commercial and custom-developed devices to demonstrate the feasibility of functional expansion and networking for portable computers in flight missions.

  18. An embedded laser marking controller based on ARM and FPGA processors.

    PubMed

    Dongyun, Wang; Xinpiao, Ye

    2014-01-01

    Laser marking is an important branch of the laser information processing technology. The existing laser marking machine based on PC and WINDOWS operating system, are large and inconvenient to move. Still, it cannot work outdoors or in other harsh environments. In order to compensate for the above mentioned disadvantages, this paper proposed an embedded laser marking controller based on ARM and FPGA processors. Based on the principle of laser galvanometer scanning marking, the hardware and software were designed for the application. Experiments showed that this new embedded laser marking controller controls the galvanometers synchronously and could achieve precise marking.

  19. Efficient Measurement of Multiparticle Entanglement with Embedding Quantum Simulator.

    PubMed

    Chen, Ming-Cheng; Wu, Dian; Su, Zu-En; Cai, Xin-Dong; Wang, Xi-Lin; Yang, Tao; Li, Li; Liu, Nai-Le; Lu, Chao-Yang; Pan, Jian-Wei

    2016-02-19

    The quantum measurement of entanglement is a demanding task in the field of quantum information. Here, we report the direct and scalable measurement of multiparticle entanglement with embedding photonic quantum simulators. In this embedding framework [R. Di Candia et al. Phys. Rev. Lett. 111, 240502 (2013)], the N-qubit entanglement, which does not associate with a physical observable directly, can be efficiently measured with only two (for even N) and six (for odd N) local measurement settings. Our experiment uses multiphoton quantum simulators to mimic dynamical concurrence and three-tangle entangled systems and to track their entanglement evolutions.

  20. Brief Report: The Relationship between Visual Acuity, the Embedded Figures Test and Systemizing in Autism Spectrum Disorders

    ERIC Educational Resources Information Center

    Brosnan, Mark J.; Gwilliam, Lucy R.; Walker, Ian

    2012-01-01

    Enhanced performance upon the Embedded Figures Test (EFT) in individuals with autism spectrum disorder (ASD) has informed psychological theories of the non-social aspects that characterise ASD. The Extreme Male Brain theory of autism proposes that enhanced visual acuity underpins greater attention to detail (assessed by the EFT) which is a…

  1. Embedded librarian within an online health informatics graduate research course: a case study.

    PubMed

    Kumar, Sajeesh; Wu, Lin; Reynolds, Rebecca

    2014-01-01

    The Health Sciences Library and the Department of Health Informatics & Information Management at the University of Tennessee Health Science Center in Memphis piloted an embedded librarian project in summer 2012. The value and effectiveness of the pilot project was evaluated by analyzing the content of e-mail questions received from the students and the students' answers to the pre- and post-class surveys. The project received positive feedback from the students and course faculty. Librarians collaborating with teaching faculty and interacting one-on-one with students in health information-intensive courses proved to be helpful for student learning.

  2. An annotation system for 3D fluid flow visualization

    NASA Technical Reports Server (NTRS)

    Loughlin, Maria M.; Hughes, John F.

    1995-01-01

    Annotation is a key activity of data analysis. However, current systems for data analysis focus almost exclusively on visualization. We propose a system which integrates annotations into a visualization system. Annotations are embedded in 3D data space, using the Post-it metaphor. This embedding allows contextual-based information storage and retrieval, and facilitates information sharing in collaborative environments. We provide a traditional database filter and a Magic Lens filter to create specialized views of the data. The system has been customized for fluid flow applications, with features which allow users to store parameters of visualization tools and sketch 3D volumes.

  3. A Case of Error Disclosure: A Communication Privacy Management Analysis

    PubMed Central

    Petronio, Sandra; Helft, Paul R.; Child, Jeffrey T.

    2013-01-01

    To better understand the process of disclosing medical errors to patients, this research offers a case analysis using Petronios’s theoretical frame of Communication Privacy Management (CPM). Given the resistance clinicians often feel about error disclosure, insights into the way choices are made by the clinicians in telling patients about the mistake has the potential to address reasons for resistance. Applying the evidenced-based CPM theory, developed over the last 35 years and dedicated to studying disclosure phenomenon, to disclosing medical mistakes potentially has the ability to reshape thinking about the error disclosure process. Using a composite case representing a surgical mistake, analysis based on CPM theory is offered to gain insights into conversational routines and disclosure management choices of revealing a medical error. The results of this analysis show that an underlying assumption of health information ownership by the patient and family can be at odds with the way the clinician tends to control disclosure about the error. In addition, the case analysis illustrates that there are embedded patterns of disclosure that emerge out of conversations the clinician has with the patient and the patient’s family members. These patterns unfold privacy management decisions on the part of the clinician that impact how the patient is told about the error and the way that patients interpret the meaning of the disclosure. These findings suggest the need for a better understanding of how patients manage their private health information in relationship to their expectations for the way they see the clinician caring for or controlling their health information about errors. Significance for public health Much of the mission central to public health sits squarely on the ability to communicate effectively. This case analysis offers an in-depth assessment of how error disclosure is complicated by misunderstandings, assuming ownership and control over information, unwittingly following conversational scripts that convey misleading messages, and the difficulty in regulating privacy boundaries in the stressful circumstances that occur with error disclosures. As a consequence, the potential contribution to public health is the ability to more clearly see the significance of the disclosure process that has implications for many public health issues. PMID:25170501

  4. Impact and User Satisfaction of a Clinical Information Portal Embedded in an Electronic Health Record

    PubMed Central

    Tannery, Nancy H; Epstein, Barbara A; Wessel, Charles B; Yarger, Frances; LaDue, John; Klem, Mary Lou

    2011-01-01

    In 2008, a clinical information tool was developed and embedded in the electronic health record system of an academic medical center. In 2009, the initial information tool, Clinical-e, was superseded by a portal called Clinical Focus, with a single search box enabling a federated search of selected online information resources. To measure the usefulness and impact of Clinical Focus, a survey was used to gather feedback about users' experience with this clinical resource. The survey determined what type of clinicians were using this tool and assessed user satisfaction and perceived impact on patient care decision making. Initial survey results suggest the majority of respondents found Clinical Focus easy to navigate, the content easy to read, and the retrieved information relevant and complete. The majority would recommend Clinical Focus to their colleagues. Results indicate that this tool is a promising area for future development. PMID:22016670

  5. Content-based audio authentication using a hierarchical patchwork watermark embedding

    NASA Astrophysics Data System (ADS)

    Gulbis, Michael; Müller, Erika

    2010-05-01

    Content-based audio authentication watermarking techniques extract perceptual relevant audio features, which are robustly embedded into the audio file to protect. Manipulations of the audio file are detected on the basis of changes between the original embedded feature information and the anew extracted features during verification. The main challenges of content-based watermarking are on the one hand the identification of a suitable audio feature to distinguish between content preserving and malicious manipulations. On the other hand the development of a watermark, which is robust against content preserving modifications and able to carry the whole authentication information. The payload requirements are significantly higher compared to transaction watermarking or copyright protection. Finally, the watermark embedding should not influence the feature extraction to avoid false alarms. Current systems still lack a sufficient alignment of watermarking algorithm and feature extraction. In previous work we developed a content-based audio authentication watermarking approach. The feature is based on changes in DCT domain over time. A patchwork algorithm based watermark was used to embed multiple one bit watermarks. The embedding process uses the feature domain without inflicting distortions to the feature. The watermark payload is limited by the feature extraction, more precisely the critical bands. The payload is inverse proportional to segment duration of the audio file segmentation. Transparency behavior was analyzed in dependence of segment size and thus the watermark payload. At a segment duration of about 20 ms the transparency shows an optimum (measured in units of Objective Difference Grade). Transparency and/or robustness are fast decreased for working points beyond this area. Therefore, these working points are unsuitable to gain further payload, needed for the embedding of the whole authentication information. In this paper we present a hierarchical extension of the watermark method to overcome the limitations given by the feature extraction. The approach is a recursive application of the patchwork algorithm onto its own patches, with a modified patch selection to ensure a better signal to noise ratio for the watermark embedding. The robustness evaluation was done by compression (mp3, ogg, aac), normalization, and several attacks of the stirmark benchmark for audio suite. Compared on the base of same payload and transparency the hierarchical approach shows improved robustness.

  6. Minimum curvilinearity to enhance topological prediction of protein interactions by network embedding

    PubMed Central

    Cannistraci, Carlo Vittorio; Alanis-Lobato, Gregorio; Ravasi, Timothy

    2013-01-01

    Motivation: Most functions within the cell emerge thanks to protein–protein interactions (PPIs), yet experimental determination of PPIs is both expensive and time-consuming. PPI networks present significant levels of noise and incompleteness. Predicting interactions using only PPI-network topology (topological prediction) is difficult but essential when prior biological knowledge is absent or unreliable. Methods: Network embedding emphasizes the relations between network proteins embedded in a low-dimensional space, in which protein pairs that are closer to each other represent good candidate interactions. To achieve network denoising, which boosts prediction performance, we first applied minimum curvilinear embedding (MCE), and then adopted shortest path (SP) in the reduced space to assign likelihood scores to candidate interactions. Furthermore, we introduce (i) a new valid variation of MCE, named non-centred MCE (ncMCE); (ii) two automatic strategies for selecting the appropriate embedding dimension; and (iii) two new randomized procedures for evaluating predictions. Results: We compared our method against several unsupervised and supervisedly tuned embedding approaches and node neighbourhood techniques. Despite its computational simplicity, ncMCE-SP was the overall leader, outperforming the current methods in topological link prediction. Conclusion: Minimum curvilinearity is a valuable non-linear framework that we successfully applied to the embedding of protein networks for the unsupervised prediction of novel PPIs. The rationale for our approach is that biological and evolutionary information is imprinted in the non-linear patterns hidden behind the protein network topology, and can be exploited for predicting new protein links. The predicted PPIs represent good candidates for testing in high-throughput experiments or for exploitation in systems biology tools such as those used for network-based inference and prediction of disease-related functional modules. Availability: https://sites.google.com/site/carlovittoriocannistraci/home Contact: kalokagathos.agon@gmail.com or timothy.ravasi@kaust.edu.sa Supplementary information: Supplementary data are available at Bioinformatics online. PMID:23812985

  7. Dynamic Reconfiguration of a RGBD Sensor Based on QoS and QoC Requirements in Distributed Systems.

    PubMed

    Munera, Eduardo; Poza-Lujan, Jose-Luis; Posadas-Yagüe, Juan-Luis; Simó-Ten, José-Enrique; Noguera, Juan Fco Blanes

    2015-07-24

    The inclusion of embedded sensors into a networked system provides useful information for many applications. A Distributed Control System (DCS) is one of the clearest examples where processing and communications are constrained by the client's requirements and the capacity of the system. An embedded sensor with advanced processing and communications capabilities supplies high level information, abstracting from the data acquisition process and objects recognition mechanisms. The implementation of an embedded sensor/actuator as a Smart Resource permits clients to access sensor information through distributed network services. Smart resources can offer sensor services as well as computing, communications and peripheral access by implementing a self-aware based adaptation mechanism which adapts the execution profile to the context. On the other hand, information integrity must be ensured when computing processes are dynamically adapted. Therefore, the processing must be adapted to perform tasks in a certain lapse of time but always ensuring a minimum process quality. In the same way, communications must try to reduce the data traffic without excluding relevant information. The main objective of the paper is to present a dynamic configuration mechanism to adapt the sensor processing and communication to the client's requirements in the DCS. This paper describes an implementation of a smart resource based on a Red, Green, Blue, and Depth (RGBD) sensor in order to test the dynamic configuration mechanism presented.

  8. e!DAL - a framework to store, share and publish research data

    PubMed Central

    2014-01-01

    Background The life-science community faces a major challenge in handling “big data”, highlighting the need for high quality infrastructures capable of sharing and publishing research data. Data preservation, analysis, and publication are the three pillars in the “big data life cycle”. The infrastructures currently available for managing and publishing data are often designed to meet domain-specific or project-specific requirements, resulting in the repeated development of proprietary solutions and lower quality data publication and preservation overall. Results e!DAL is a lightweight software framework for publishing and sharing research data. Its main features are version tracking, metadata management, information retrieval, registration of persistent identifiers (DOI), an embedded HTTP(S) server for public data access, access as a network file system, and a scalable storage backend. e!DAL is available as an API for local non-shared storage and as a remote API featuring distributed applications. It can be deployed “out-of-the-box” as an on-site repository. Conclusions e!DAL was developed based on experiences coming from decades of research data management at the Leibniz Institute of Plant Genetics and Crop Plant Research (IPK). Initially developed as a data publication and documentation infrastructure for the IPK’s role as a data center in the DataCite consortium, e!DAL has grown towards being a general data archiving and publication infrastructure. The e!DAL software has been deployed into the Maven Central Repository. Documentation and Software are also available at: http://edal.ipk-gatersleben.de. PMID:24958009

  9. e!DAL--a framework to store, share and publish research data.

    PubMed

    Arend, Daniel; Lange, Matthias; Chen, Jinbo; Colmsee, Christian; Flemming, Steffen; Hecht, Denny; Scholz, Uwe

    2014-06-24

    The life-science community faces a major challenge in handling "big data", highlighting the need for high quality infrastructures capable of sharing and publishing research data. Data preservation, analysis, and publication are the three pillars in the "big data life cycle". The infrastructures currently available for managing and publishing data are often designed to meet domain-specific or project-specific requirements, resulting in the repeated development of proprietary solutions and lower quality data publication and preservation overall. e!DAL is a lightweight software framework for publishing and sharing research data. Its main features are version tracking, metadata management, information retrieval, registration of persistent identifiers (DOI), an embedded HTTP(S) server for public data access, access as a network file system, and a scalable storage backend. e!DAL is available as an API for local non-shared storage and as a remote API featuring distributed applications. It can be deployed "out-of-the-box" as an on-site repository. e!DAL was developed based on experiences coming from decades of research data management at the Leibniz Institute of Plant Genetics and Crop Plant Research (IPK). Initially developed as a data publication and documentation infrastructure for the IPK's role as a data center in the DataCite consortium, e!DAL has grown towards being a general data archiving and publication infrastructure. The e!DAL software has been deployed into the Maven Central Repository. Documentation and Software are also available at: http://edal.ipk-gatersleben.de.

  10. PubFinder: a tool for improving retrieval rate of relevant PubMed abstracts.

    PubMed

    Goetz, Thomas; von der Lieth, Claus-Wilhelm

    2005-07-01

    Since it is becoming increasingly laborious to manually extract useful information embedded in the ever-growing volumes of literature, automated intelligent text analysis tools are becoming more and more essential to assist in this task. PubFinder (www.glycosciences.de/tools/PubFinder) is a publicly available web tool designed to improve the retrieval rate of scientific abstracts relevant for a specific scientific topic. Only the selection of a representative set of abstracts is required, which are central for a scientific topic. No special knowledge concerning the query-syntax is necessary. Based on the selected abstracts, a list of discriminating words is automatically calculated, which is subsequently used for scoring all defined PubMed abstracts for their probability of belonging to the defined scientific topic. This results in a hit-list of references in the descending order of their likelihood score. The algorithms and procedures implemented in PubFinder facilitate the perpetual task for every scientist of staying up-to-date with current publications dealing with a specific subject in biomedicine.

  11. NASA's Astronomy Education Program: Reaching Diverse Audiences

    NASA Astrophysics Data System (ADS)

    Hasan, Hashima; Smith, Denise Anne; Hertz, Paul; Meinke, Bonnie

    2015-08-01

    An overview will be given of the rich programs developed by NASA to inject the science from it's Astrophysics missions into STEM activities targeted to diverse audiences. For example, Astro4Girls was started as a pilot program during IYA2009. This program partners NASA astrophysics education programs with public libraries to provide NASA-themed hands-on education activities for girls and their families, and has been executed across the country. School curricula and NASA websites have been translated in Spanish; Braille books have been developed for the visually impaired; programs have been developed for the hearing impaired. Special effort has been made to reach underrepresented minorities. Audiences include students, teachers, and the general public through formal and informal education settings, social media and other outlets. NASA Astrophysics education providers include teams embedded in its space flight missions; professionals selected though peer reviewed programs; as well as the Science Mission Directorate Astrophysics Education forum. Representative examples will be presented to demonstrate the reach of NASA education programs, as well as an evaluation of the effectiveness of these programs.

  12. Design of Plant Eco-physiology Monitoring System Based on Embedded Technology

    NASA Astrophysics Data System (ADS)

    Li, Yunbing; Wang, Cheng; Qiao, Xiaojun; Liu, Yanfei; Zhang, Xinlu

    A real time system has been developed to collect plant's growth information comprehensively. Plant eco-physiological signals can be collected and analyzed effectively. The system adopted embedded technology: wireless sensors network collect the eco-physiological information. Touch screen and ARM microprocessor make the system work independently without PC. The system is versatile and all parameters can be set by the touch screen. Sensors' intelligent compensation can be realized in this system. Information can be displayed by either graphically or in table mode. The ARM microprocessor provides the interface to connect with the internet, so the system support remote monitoring and controlling. The system has advantages of friendly interface, flexible construction and extension. It's a good tool for plant's management.

  13. Embedded-explicit emergent literacy intervention I: Background and description of approach.

    PubMed

    Justice, Laura M; Kaderavek, Joan N

    2004-07-01

    This article, the first of a two-part series, provides background information and a general description of an emergent literacy intervention model for at-risk preschoolers and kindergartners. The embedded-explicit intervention model emphasizes the dual importance of providing young children with socially embedded opportunities for meaningful, naturalistic literacy experiences throughout the day, in addition to regular structured therapeutic interactions that explicitly target critical emergent literacy goals. The role of the speech-language pathologist (SLP) in the embedded-explicit model encompasses both indirect and direct service delivery: The SLP consults and collaborates with teachers and parents to ensure the highest quality and quantity of socially embedded literacy-focused experiences and serves as a direct provider of explicit interventions using structured curricula and/or lesson plans. The goal of this integrated model is to provide comprehensive emergent literacy interventions across a spectrum of early literacy skills to ensure the successful transition of at-risk children from prereaders to readers.

  14. From the Weakest Link to the Best Defense: Exploring the Factors That Affect Employee Intention to Comply with Information Security Policies

    ERIC Educational Resources Information Center

    Aurigemma, Salvatore

    2013-01-01

    Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the reliance on information technology has increased, so too have the threats and costs associated with protecting organizational information resources. To combat potential information security threats, organizations rely…

  15. Music score watermarking by clef modifications

    NASA Astrophysics Data System (ADS)

    Schmucker, Martin; Yan, Hongning

    2003-06-01

    In this paper we present a new method for hiding data in music scores. In contrast to previous published algorithms we investigate the possibilities of embedding information in clefs. Using the clef as information carrier has two advantages: First, a clef is present in each staff line which guarantees a fixed capacity. Second, the clef defines the reference system for musical symbols and music containing symbols, e.g. the notes and the rests, are not degraded by manipulations. Music scores must be robust against greyscale to binary conversion. As a consequence, the information is embedded by modifying the black and white distribution of pixels in certain areas. We evaluate simple image processing mechanisms based on erosion and dilation for embedding the information. For retrieving the watermark the b/w-distribution is extracted from the given clef. To solve the synchronization problem the watermarked clef is normalized in a pre-processing step. The normalization is based on moments. The areas used for watermarking are calculated by image segmentation techniques which consider the features of a clef. We analyze capacity and robustness of the proposed method using different parameters for our proposed method. This proposed method can be combined with other music score watermarking methods to increase the capacity of existing watermarking techniques.

  16. Crisis Communication: The Business Communicator's Strategies for Communicating under Stress.

    ERIC Educational Resources Information Center

    Vielhaber, Mary E.

    1990-01-01

    Uses the 1979 Three Mile Island nuclear plant accident to illustrate the communication problems embedded in a crisis. Describes the reactions created by the stress related to crisis. Suggests business communication strategies for improving communication to the public. (SR)

  17. A Teaching Model for the Grammar of Television.

    ERIC Educational Resources Information Center

    Becker, Ann Devaney

    1986-01-01

    Offers an analytical model to assist teachers and students in decoding social and cultural meaning embedded in the visual track of any given television program. To illustrate the model, the Public Broadcasting System's production of "The Scarlet Letter" is analyzed. (MBR)

  18. The Readiness of Lecturers in Embedding Soft Skills in the Bachelor's Degree Program in Malaysian Institutes of Teacher Education

    ERIC Educational Resources Information Center

    Hassan, Aminuddin; Maharoff, Marina; Abiddin, Norhasni Zainal

    2014-01-01

    This is a preliminary research to obtain information to formulate a problem statement for an overall study of the embedding of soft skills in the program courses in higher learning institutions. This research was conducted in the form of single case and multi-case studies. The research data was attained through mixed methods; the quantitative…

  19. Illustration Watermarking for Digital Images: An Investigation of Hierarchical Signal Inheritances for Nested Object-based Embedding

    DTIC Science & Technology

    2007-02-23

    approach for signal-level watermark inheritance. 15. SUBJECT TERMS EOARD, Steganography , Image Fusion, Data Mining, Image ...in watermarking algorithms , a program interface and protocol has been de - veloped, which allows control of the embedding and retrieval processes by the...watermarks in an image . Watermarking algorithm (DLL) Watermarking editor (Delphi) - User marks all objects: ci - class information oi - object instance

  20. Corrosion Monitors for Embedded Evaluation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robinson, Alex L.; Pfeifer, Kent B.; Casias, Adrian L.

    2017-05-01

    We have developed and characterized novel in-situ corrosion sensors to monitor and quantify the corrosive potential and history of localized environments. Embedded corrosion sensors can provide information to aid health assessments of internal electrical components including connectors, microelectronics, wires, and other susceptible parts. When combined with other data (e.g. temperature and humidity), theory, and computational simulation, the reliability of monitored systems can be predicted with higher fidelity.

  1. On-chip photonic-phononic emitter-receiver apparatus

    DOEpatents

    Cox, Jonathan Albert; Jarecki, Jr., Robert L.; Rakich, Peter Thomas; Wang, Zheng; Shin, Heedeuk; Siddiqui, Aleem; Starbuck, Andrew Lea

    2017-07-04

    A radio-frequency photonic devices employs photon-phonon coupling for information transfer. The device includes a membrane in which a two-dimensionally periodic phononic crystal (PnC) structure is patterned. The device also includes at least a first optical waveguide embedded in the membrane. At least a first line-defect region interrupts the PnC structure. The first optical waveguide is embedded within the line-defect region.

  2. The Effects of Embedded Skill Instruction on the Acquisition of Target and Nontarget Skills in Preschoolers with Developmental Delays.

    ERIC Educational Resources Information Center

    Daugherty, Stefanie; Grisham-Brown, Jennifer; Hemmeter, Mary Louise

    2001-01-01

    In the current study, a constant time delay (CTD) procedure was embedded in classroom activities and routines to teach counting to three preschool children with speech and language delays. CTD was effective in teaching numbers to all three children. One child out of two also was able to acquire non-target information. (Contains references.) (CR)

  3. Various Effects of Embedded Intrapulse Communications on Pulsed Radar

    DTIC Science & Technology

    2017-06-01

    specific type of interference that may be encountered by radar; however, this introductory information should suffice to illustrate to the reader why...chapter we seek to not merely understand the overall statistical performance of the radar with embedded intrapulse communications but rather to evaluate...Theory Probability of detection, discussed in Chapter 4, assesses the statistical probability of a radar accurately identifying a target given a

  4. Introduction

    PubMed Central

    Taussig, Karen-Sue; Gibbon, Sahra Elizabeth

    2013-01-01

    We introduce this special issue of Medial Anthropology Quarterly on public health genomics by exploring both the unique contribution of ethnographic sensibility that medical anthropologists bring to the study of genomics and some of the key insights offered by the essays in this collection. As anthropologists, we are concerned with the power dynamics and larger cultural commitments embedded in practices associated with public health. We seek to understand, first, the broad significance of genomics as a cultural object and, second, the social action set into motion as researchers seek to translate genomic knowledge and technology into public health benefits. PMID:24214906

  5. Multidimensional biochemical information processing of dynamical patterns

    NASA Astrophysics Data System (ADS)

    Hasegawa, Yoshihiko

    2018-02-01

    Cells receive signaling molecules by receptors and relay information via sensory networks so that they can respond properly depending on the type of signal. Recent studies have shown that cells can extract multidimensional information from dynamical concentration patterns of signaling molecules. We herein study how biochemical systems can process multidimensional information embedded in dynamical patterns. We model the decoding networks by linear response functions, and optimize the functions with the calculus of variations to maximize the mutual information between patterns and output. We find that, when the noise intensity is lower, decoders with different linear response functions, i.e., distinct decoders, can extract much information. However, when the noise intensity is higher, distinct decoders do not provide the maximum amount of information. This indicates that, when transmitting information by dynamical patterns, embedding information in multiple patterns is not optimal when the noise intensity is very large. Furthermore, we explore the biochemical implementations of these decoders using control theory and demonstrate that these decoders can be implemented biochemically through the modification of cascade-type networks, which are prevalent in actual signaling pathways.

  6. Multidimensional biochemical information processing of dynamical patterns.

    PubMed

    Hasegawa, Yoshihiko

    2018-02-01

    Cells receive signaling molecules by receptors and relay information via sensory networks so that they can respond properly depending on the type of signal. Recent studies have shown that cells can extract multidimensional information from dynamical concentration patterns of signaling molecules. We herein study how biochemical systems can process multidimensional information embedded in dynamical patterns. We model the decoding networks by linear response functions, and optimize the functions with the calculus of variations to maximize the mutual information between patterns and output. We find that, when the noise intensity is lower, decoders with different linear response functions, i.e., distinct decoders, can extract much information. However, when the noise intensity is higher, distinct decoders do not provide the maximum amount of information. This indicates that, when transmitting information by dynamical patterns, embedding information in multiple patterns is not optimal when the noise intensity is very large. Furthermore, we explore the biochemical implementations of these decoders using control theory and demonstrate that these decoders can be implemented biochemically through the modification of cascade-type networks, which are prevalent in actual signaling pathways.

  7. Can't Count or Won't Count? Embedding Quantitative Methods in Substantive Sociology Curricula: A Quasi-Experiment.

    PubMed

    Williams, Malcolm; Sloan, Luke; Cheung, Sin Yi; Sutton, Carole; Stevens, Sebastian; Runham, Libby

    2016-06-01

    This paper reports on a quasi-experiment in which quantitative methods (QM) are embedded within a substantive sociology module. Through measuring student attitudes before and after the intervention alongside control group comparisons, we illustrate the impact that embedding has on the student experience. Our findings are complex and even contradictory. Whilst the experimental group were less likely to be distrustful of statistics and appreciate how QM inform social research, they were also less confident about their statistical abilities, suggesting that through 'doing' quantitative sociology the experimental group are exposed to the intricacies of method and their optimism about their own abilities is challenged. We conclude that embedding QM in a single substantive module is not a 'magic bullet' and that a wider programme of content and assessment diversification across the curriculum is preferential.

  8. Assuring image authenticity within a data grid using lossless digital signature embedding and a HIPAA-compliant auditing system

    NASA Astrophysics Data System (ADS)

    Lee, Jasper C.; Ma, Kevin C.; Liu, Brent J.

    2008-03-01

    A Data Grid for medical images has been developed at the Image Processing and Informatics Laboratory, USC to provide distribution and fault-tolerant storage of medical imaging studies across Internet2 and public domain. Although back-up policies and grid certificates guarantee privacy and authenticity of grid-access-points, there still lacks a method to guarantee the sensitive DICOM images have not been altered or corrupted during transmission across a public domain. This paper takes steps toward achieving full image transfer security within the Data Grid by utilizing DICOM image authentication and a HIPAA-compliant auditing system. The 3-D lossless digital signature embedding procedure involves a private 64 byte signature that is embedded into each original DICOM image volume, whereby on the receiving end the signature can to be extracted and verified following the DICOM transmission. This digital signature method has also been developed at the IPILab. The HIPAA-Compliant Auditing System (H-CAS) is required to monitor embedding and verification events, and allows monitoring of other grid activity as well. The H-CAS system federates the logs of transmission and authentication events at each grid-access-point and stores it into a HIPAA-compliant database. The auditing toolkit is installed at the local grid-access-point and utilizes Syslog [1], a client-server standard for log messaging over an IP network, to send messages to the H-CAS centralized database. By integrating digital image signatures and centralized logging capabilities, DICOM image integrity within the Medical Imaging and Informatics Data Grid can be monitored and guaranteed without loss to any image quality.

  9. An Embedded Laser Marking Controller Based on ARM and FPGA Processors

    PubMed Central

    Dongyun, Wang; Xinpiao, Ye

    2014-01-01

    Laser marking is an important branch of the laser information processing technology. The existing laser marking machine based on PC and WINDOWS operating system, are large and inconvenient to move. Still, it cannot work outdoors or in other harsh environments. In order to compensate for the above mentioned disadvantages, this paper proposed an embedded laser marking controller based on ARM and FPGA processors. Based on the principle of laser galvanometer scanning marking, the hardware and software were designed for the application. Experiments showed that this new embedded laser marking controller controls the galvanometers synchronously and could achieve precise marking. PMID:24772028

  10. Workplace Learning in Informal Networks

    ERIC Educational Resources Information Center

    Milligan, Colin; Littlejohn, Allison; Margaryan, Anoush

    2014-01-01

    Learning does not stop when an individual leaves formal education, but becomes increasingly informal, and deeply embedded within other activities such as work. This article describes the challenges of informal learning in knowledge intensive industries, highlighting the important role of personal learning networks. The article argues that…

  11. An embedded real-time red peach detection system based on an OV7670 camera, ARM cortex-M4 processor and 3D look-up tables.

    PubMed

    Teixidó, Mercè; Font, Davinia; Pallejà, Tomàs; Tresanchez, Marcel; Nogués, Miquel; Palacín, Jordi

    2012-10-22

    This work proposes the development of an embedded real-time fruit detection system for future automatic fruit harvesting. The proposed embedded system is based on an ARM Cortex-M4 (STM32F407VGT6) processor and an Omnivision OV7670 color camera. The future goal of this embedded vision system will be to control a robotized arm to automatically select and pick some fruit directly from the tree. The complete embedded system has been designed to be placed directly in the gripper tool of the future robotized harvesting arm. The embedded system will be able to perform real-time fruit detection and tracking by using a three-dimensional look-up-table (LUT) defined in the RGB color space and optimized for fruit picking. Additionally, two different methodologies for creating optimized 3D LUTs based on existing linear color models and fruit histograms were implemented in this work and compared for the case of red peaches. The resulting system is able to acquire general and zoomed orchard images and to update the relative tracking information of a red peach in the tree ten times per second.

  12. An Embedded Real-Time Red Peach Detection System Based on an OV7670 Camera, ARM Cortex-M4 Processor and 3D Look-Up Tables

    PubMed Central

    Teixidó, Mercè; Font, Davinia; Pallejà, Tomàs; Tresanchez, Marcel; Nogués, Miquel; Palacín, Jordi

    2012-01-01

    This work proposes the development of an embedded real-time fruit detection system for future automatic fruit harvesting. The proposed embedded system is based on an ARM Cortex-M4 (STM32F407VGT6) processor and an Omnivision OV7670 color camera. The future goal of this embedded vision system will be to control a robotized arm to automatically select and pick some fruit directly from the tree. The complete embedded system has been designed to be placed directly in the gripper tool of the future robotized harvesting arm. The embedded system will be able to perform real-time fruit detection and tracking by using a three-dimensional look-up-table (LUT) defined in the RGB color space and optimized for fruit picking. Additionally, two different methodologies for creating optimized 3D LUTs based on existing linear color models and fruit histograms were implemented in this work and compared for the case of red peaches. The resulting system is able to acquire general and zoomed orchard images and to update the relative tracking information of a red peach in the tree ten times per second. PMID:23202040

  13. Visual Exploration of Semantic Relationships in Neural Word Embeddings

    DOE PAGES

    Liu, Shusen; Bremer, Peer-Timo; Thiagarajan, Jayaraman J.; ...

    2017-08-29

    Constructing distributed representations for words through neural language models and using the resulting vector spaces for analysis has become a crucial component of natural language processing (NLP). But, despite their widespread application, little is known about the structure and properties of these spaces. To gain insights into the relationship between words, the NLP community has begun to adapt high-dimensional visualization techniques. Particularly, researchers commonly use t-distributed stochastic neighbor embeddings (t-SNE) and principal component analysis (PCA) to create two-dimensional embeddings for assessing the overall structure and exploring linear relationships (e.g., word analogies), respectively. Unfortunately, these techniques often produce mediocre or evenmore » misleading results and cannot address domain-specific visualization challenges that are crucial for understanding semantic relationships in word embeddings. We introduce new embedding techniques for visualizing semantic and syntactic analogies, and the corresponding tests to determine whether the resulting views capture salient structures. Additionally, we introduce two novel views for a comprehensive study of analogy relationships. Finally, we augment t-SNE embeddings to convey uncertainty information in order to allow a reliable interpretation. Combined, the different views address a number of domain-specific tasks difficult to solve with existing tools.« less

  14. Visual Exploration of Semantic Relationships in Neural Word Embeddings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, Shusen; Bremer, Peer-Timo; Thiagarajan, Jayaraman J.

    Constructing distributed representations for words through neural language models and using the resulting vector spaces for analysis has become a crucial component of natural language processing (NLP). But, despite their widespread application, little is known about the structure and properties of these spaces. To gain insights into the relationship between words, the NLP community has begun to adapt high-dimensional visualization techniques. Particularly, researchers commonly use t-distributed stochastic neighbor embeddings (t-SNE) and principal component analysis (PCA) to create two-dimensional embeddings for assessing the overall structure and exploring linear relationships (e.g., word analogies), respectively. Unfortunately, these techniques often produce mediocre or evenmore » misleading results and cannot address domain-specific visualization challenges that are crucial for understanding semantic relationships in word embeddings. We introduce new embedding techniques for visualizing semantic and syntactic analogies, and the corresponding tests to determine whether the resulting views capture salient structures. Additionally, we introduce two novel views for a comprehensive study of analogy relationships. Finally, we augment t-SNE embeddings to convey uncertainty information in order to allow a reliable interpretation. Combined, the different views address a number of domain-specific tasks difficult to solve with existing tools.« less

  15. Critical Infrastructure Protection II, The International Federation for Information Processing, Volume 290.

    NASA Astrophysics Data System (ADS)

    Papa, Mauricio; Shenoi, Sujeet

    The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

  16. 41 CFR 102-75.296 - When may a landholding agency other than GSA be the disposal agency for real and related personal...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 102-75.296 Public Contracts and Property Management Federal Property Management Regulations System... is not being disposed; or (3) Standing timber, embedded gravel, sand, stone, and underground water...

  17. 41 CFR 102-75.296 - When may a landholding agency other than GSA be the disposal agency for real and related personal...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 102-75.296 Public Contracts and Property Management Federal Property Management Regulations System... is not being disposed; or (3) Standing timber, embedded gravel, sand, stone, and underground water...

  18. 41 CFR 102-75.296 - When may a landholding agency other than GSA be the disposal agency for real and related personal...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 102-75.296 Public Contracts and Property Management Federal Property Management Regulations System... is not being disposed; or (3) Standing timber, embedded gravel, sand, stone, and underground water...

  19. 41 CFR 102-75.296 - When may a landholding agency other than GSA be the disposal agency for real and related personal...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 102-75.296 Public Contracts and Property Management Federal Property Management Regulations System... is not being disposed; or (3) Standing timber, embedded gravel, sand, stone, and underground water...

  20. 41 CFR 102-75.296 - When may a landholding agency other than GSA be the disposal agency for real and related personal...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 102-75.296 Public Contracts and Property Management Federal Property Management Regulations System... is not being disposed; or (3) Standing timber, embedded gravel, sand, stone, and underground water...

  1. Oblivious image watermarking combined with JPEG compression

    NASA Astrophysics Data System (ADS)

    Chen, Qing; Maitre, Henri; Pesquet-Popescu, Beatrice

    2003-06-01

    For most data hiding applications, the main source of concern is the effect of lossy compression on hidden information. The objective of watermarking is fundamentally in conflict with lossy compression. The latter attempts to remove all irrelevant and redundant information from a signal, while the former uses the irrelevant information to mask the presence of hidden data. Compression on a watermarked image can significantly affect the retrieval of the watermark. Past investigations of this problem have heavily relied on simulation. It is desirable not only to measure the effect of compression on embedded watermark, but also to control the embedding process to survive lossy compression. In this paper, we focus on oblivious watermarking by assuming that the watermarked image inevitably undergoes JPEG compression prior to watermark extraction. We propose an image-adaptive watermarking scheme where the watermarking algorithm and the JPEG compression standard are jointly considered. Watermark embedding takes into consideration the JPEG compression quality factor and exploits an HVS model to adaptively attain a proper trade-off among transparency, hiding data rate, and robustness to JPEG compression. The scheme estimates the image-dependent payload under JPEG compression to achieve the watermarking bit allocation in a determinate way, while maintaining consistent watermark retrieval performance.

  2. Review, Revise, and (re)Release: Updating an Information Literacy Tutorial to Embed a Science Information Life Cycle

    ERIC Educational Resources Information Center

    Bussmann, Jeffra Diane; Plovnick, Caitlin E.

    2013-01-01

    In 2008, University of California, Irvine (UCI) Libraries launched their first Find Science Information online tutorial. It was an innovative web-based tool, containing not only informative content but also interactive activities, embedded hyperlinked resources, and reflective quizzes, all designed primarily to educate undergraduate science…

  3. Evaluation of Information Literacy Skill Development in First Year Medical Students

    ERIC Educational Resources Information Center

    Carr, Sandra; Iredell, Helena; Newton-Smith, Carol; Clark, Catherine

    2011-01-01

    Medical practitioners need the skills to find relevant information and evaluate its authenticity, validity, and reliability. The learning of information literacy has been embedded in the University of Western Australia (UWA) medical course since 2000. The purpose of this study was to evaluate the effectiveness of the enhanced information literacy…

  4. The Key Roles in the Informal Organization: A Network Analysis Perspective

    ERIC Educational Resources Information Center

    de Toni, Alberto F.; Nonino, Fabio

    2010-01-01

    Purpose: The purpose of this paper is to identify the key roles embedded in the informal organizational structure (informal networks) and to outline their contribution in the companies' performance. A major objective of the research is to find and characterize a new key informal role that synthesises problem solving, expertise, and accessibility…

  5. Science, democracy, and the right to research.

    PubMed

    Brown, Mark B; Guston, David H

    2009-09-01

    Debates over the politicization of science have led some to claim that scientists have or should have a "right to research." This article examines the political meaning and implications of the right to research with respect to different historical conceptions of rights. The more common "liberal" view sees rights as protections against social and political interference. The "republican" view, in contrast, conceives rights as claims to civic membership. Building on the republican view of rights, this article conceives the right to research as embedding science more firmly and explicitly within society, rather than sheltering science from society. From this perspective, all citizens should enjoy a general right to free inquiry, but this right to inquiry does not necessarily encompass all scientific research. Because rights are most reliably protected when embedded within democratic culture and institutions, claims for a right to research should be considered in light of how the research in question contributes to democracy. By putting both research and rights in a social context, this article shows that the claim for a right to research is best understood, not as a guarantee for public support of science, but as a way to initiate public deliberation and debate about which sorts of inquiry deserve public support.

  6. Simplifying the representation of complex free-energy landscapes using sketch-map

    PubMed Central

    Ceriotti, Michele; Tribello, Gareth A.; Parrinello, Michele

    2011-01-01

    A new scheme, sketch-map, for obtaining a low-dimensional representation of the region of phase space explored during an enhanced dynamics simulation is proposed. We show evidence, from an examination of the distribution of pairwise distances between frames, that some features of the free-energy surface are inherently high-dimensional. This makes dimensionality reduction problematic because the data does not satisfy the assumptions made in conventional manifold learning algorithms We therefore propose that when dimensionality reduction is performed on trajectory data one should think of the resultant embedding as a quickly sketched set of directions rather than a road map. In other words, the embedding tells one about the connectivity between states but does not provide the vectors that correspond to the slow degrees of freedom. This realization informs the development of sketch-map, which endeavors to reproduce the proximity information from the high-dimensionality description in a space of lower dimensionality even when a faithful embedding is not possible. PMID:21730167

  7. Digital Badges and Library Instructional Programs: Academic Library Case Study

    ERIC Educational Resources Information Center

    Rodgers, Andrea Reed; Puterbaugh, Mark

    2017-01-01

    This case study describes the planning, implementation, and migration process of Eastern University Library's information literacy digital badge. Prior to implementing a badging program, information literacy sessions were informally embedded in first-year college writing courses as a "one-shot" presentation. Spurred on by accreditation…

  8. [Development of an embedded mobile terminal for real-time remote monitoring of out-of-hospital cardiac patients].

    PubMed

    Xu, Zhi-min; Fang, Zu-Xiang; Lai, Da-Kun; Song, Hai-Lang

    2007-05-01

    A kind of real-time remote monitoring embedded terminal which is combined with mobile communication technology and GPS localization technology, has been developed. The results of preliminary experiments show that the terminal can transmit ECG signals and localization information in real time and continuously, supply a real-time monitoring of out-of-hospital cardiac patients and trace the patients.

  9. Embedded Ultrasonics for SHM of Space Applications

    DTIC Science & Technology

    2012-07-30

    information on material properties and other forms of damage such as cracks, structural fatigue and/or impact events. This synergistic aspect of the embedded...larger the phase shift. However, high excitation levels could contribute to sensor fatigue and levels in a range 15 to 20 (110 to 130 volts) are...joints each featuring three bolts. Piezoelectric wafers ( PZT ) with UNF electrodes were bonded to the isogrid panels using 3M 2216 epoxy

  10. Knowledge translation strategies to improve the use of evidence in public health decision making in local government: intervention design and implementation plan

    PubMed Central

    2013-01-01

    Background Knowledge translation strategies are an approach to increase the use of evidence within policy and practice decision-making contexts. In clinical and health service contexts, knowledge translation strategies have focused on individual behavior change, however the multi-system context of public health requires a multi-level, multi-strategy approach. This paper describes the design of and implementation plan for a knowledge translation intervention for public health decision making in local government. Methods Four preliminary research studies contributed findings to the design of the intervention: a systematic review of knowledge translation intervention effectiveness research, a scoping study of knowledge translation perspectives and relevant theory literature, a survey of the local government public health workforce, and a study of the use of evidence-informed decision-making for public health in local government. A logic model was then developed to represent the putative pathways between intervention inputs, processes, and outcomes operating between individual-, organizational-, and system-level strategies. This formed the basis of the intervention plan. Results The systematic and scoping reviews identified that effective and promising strategies to increase access to research evidence require an integrated intervention of skill development, access to a knowledge broker, resources and tools for evidence-informed decision making, and networking for information sharing. Interviews and survey analysis suggested that the intervention needs to operate at individual and organizational levels, comprising workforce development, access to evidence, and regular contact with a knowledge broker to increase access to intervention evidence; develop skills in appraisal and integration of evidence; strengthen networks; and explore organizational factors to build organizational cultures receptive to embedding evidence in practice. The logic model incorporated these inputs and strategies with a set of outcomes to measure the intervention’s effectiveness based on the theoretical frameworks, evaluation studies, and decision-maker experiences. Conclusion Documenting the design of and implementation plan for this knowledge translation intervention provides a transparent, theoretical, and practical approach to a complex intervention. It provides significant insights into how practitioners might engage with evidence in public health decision making. While this intervention model was designed for the local government context, it is likely to be applicable and generalizable across sectors and settings. Trial registration Australia New Zealand Clinical Trials Register ACTRN12609000953235. PMID:24107358

  11. Visualization of JPEG Metadata

    NASA Astrophysics Data System (ADS)

    Malik Mohamad, Kamaruddin; Deris, Mustafa Mat

    There are a lot of information embedded in JPEG image than just graphics. Visualization of its metadata would benefit digital forensic investigator to view embedded data including corrupted image where no graphics can be displayed in order to assist in evidence collection for cases such as child pornography or steganography. There are already available tools such as metadata readers, editors and extraction tools but mostly focusing on visualizing attribute information of JPEG Exif. However, none have been done to visualize metadata by consolidating markers summary, header structure, Huffman table and quantization table in a single program. In this paper, metadata visualization is done by developing a program that able to summarize all existing markers, header structure, Huffman table and quantization table in JPEG. The result shows that visualization of metadata helps viewing the hidden information within JPEG more easily.

  12. The impact of advertising patient and public involvement on trial recruitment: embedded cluster randomised recruitment trial.

    PubMed

    Hughes-Morley, Adwoa; Hann, Mark; Fraser, Claire; Meade, Oonagh; Lovell, Karina; Young, Bridget; Roberts, Chris; Cree, Lindsey; More, Donna; O'Leary, Neil; Callaghan, Patrick; Waheed, Waquas; Bower, Peter

    2016-12-08

    Patient and public involvement in research (PPIR) may improve trial recruitment rates, but it is unclear how. Where trials use PPIR to improve design and conduct, many do not communicate this clearly to potential participants. Better communication of PPIR might encourage patient enrolment, as trials may be perceived as more socially valid, relevant and trustworthy. We aimed to evaluate the impact on recruitment of directly advertising PPIR to potential trial participants. This is a cluster trial, embedded within a host trial ('EQUIP') recruiting service users diagnosed with severe mental illness. The intervention was informed by a systematic review, a qualitative study, social comparison theory and a stakeholder workshop including service users and carers. Adopting Participatory Design approaches, we co-designed the recruitment intervention with PPIR partners using a leaflet to advertise the PPIR in EQUIP and sent potential participants invitations with the leaflet (intervention group) or not (control group). Primary outcome was the proportion of patients enrolled in EQUIP. Secondary outcomes included the proportions of patients who positively responded to the trial invitation. Thirty-four community mental health teams were randomised and 8182 service users invited. For the primary outcome, 4% of patients in the PPIR group were enrolled versus 5.3% of the control group. The intervention was not effective for improving recruitment rates (adjusted OR = 0.75, 95% CI = 0.53 to 1.07, p = 0.113). For the secondary outcome of positive response, the intervention was not effective, with 7.3% of potential participants in the intervention group responding positively versus 7.9% of the control group (adjusted OR = 0.74, 95% CI = 0.53 to 1.04, p = 0.082). We did not find a positive impact of directly advertising PPIR on any other outcomes. To our knowledge, this is the largest ever embedded trial to evaluate a recruitment or PPIR intervention. Advertising PPIR did not improve enrolment rates or any other outcome. It is possible that rather than advertising PPIR being the means to improve recruitment, PPIR may have an alternative impact on trials by making them more attractive, acceptable and patient-centred. We discuss potential reasons for our findings and implications for recruitment practice and research. ISRCTN, ISRCTN16488358 . Registered on 14 May 2014. Study Within A Trial, SWAT-26 . Registered on 21 January 2016.

  13. Professional Development Recognizing Technology Integration Modeled after the TPACK Framework

    ERIC Educational Resources Information Center

    McCusker, Laura

    2017-01-01

    Public school teachers within a Pennsylvania intermediate unit are receiving inadequate job-embedded professional development that recognizes knowledge of content, pedagogy, and technology integration, as outlined by Mishra and Koehler's Technological Pedagogical Content Knowledge (TPACK) framework (2006). A school environment where teachers are…

  14. Sustainable Watersheds: A Conceptual Approach to Integrating Ecosystem Services and Public Health

    EPA Science Inventory

    Sustainable management of aquatic ecosystems is a worldwide priority; the integrity of these systems depends, in turn, on the integrity of the watersheds (catchments) in which they are embedded. In this article, we present the concepts, background, and scientific foundations for ...

  15. Can’t Count or Won’t Count? Embedding Quantitative Methods in Substantive Sociology Curricula: A Quasi-Experiment

    PubMed Central

    Williams, Malcolm; Sloan, Luke; Cheung, Sin Yi; Sutton, Carole; Stevens, Sebastian; Runham, Libby

    2015-01-01

    This paper reports on a quasi-experiment in which quantitative methods (QM) are embedded within a substantive sociology module. Through measuring student attitudes before and after the intervention alongside control group comparisons, we illustrate the impact that embedding has on the student experience. Our findings are complex and even contradictory. Whilst the experimental group were less likely to be distrustful of statistics and appreciate how QM inform social research, they were also less confident about their statistical abilities, suggesting that through ‘doing’ quantitative sociology the experimental group are exposed to the intricacies of method and their optimism about their own abilities is challenged. We conclude that embedding QM in a single substantive module is not a ‘magic bullet’ and that a wider programme of content and assessment diversification across the curriculum is preferential. PMID:27330225

  16. Embedded CLIPS for SDI BM/C3 simulation and analysis

    NASA Technical Reports Server (NTRS)

    Gossage, Brett; Nanney, Van

    1990-01-01

    Nichols Research Corporation is developing the BM/C3 Requirements Analysis Tool (BRAT) for the U.S. Army Strategic Defense Command. BRAT uses embedded CLIPS/Ada to model the decision making processes used by the human commander of a defense system. Embedding CLlPS/Ada in BRAT allows the user to explore the role of the human in Command and Control (C2) and the use of expert systems for automated C2. BRAT models assert facts about the current state of the system, the simulated scenario, and threat information into CLIPS/Ada. A user-defined rule set describes the decision criteria for the commander. We have extended CLIPS/Ada with user-defined functions that allow the firing of a rule to invoke a system action such as weapons release or a change in strategy. The use of embedded CLIPS/Ada will provide a powerful modeling tool for our customer at minimal cost.

  17. Informed Reflexivity: Enacting Epistemic Virtue

    ERIC Educational Resources Information Center

    Weinstock, Michael; Kienhues, Dorothe; Feucht, Florian C.; Ryan, Mary

    2017-01-01

    To discuss reflexive practice in relation to epistemic cognition, we posit informed reflexivity as an epistemic virtue that is informed by its particular context and purposes of knowing and action and promotes use of reliable processes to achieve epistemic aims. It involves reasoning about social relationships in which a person is embedded when…

  18. Dangerous agent or saviour? HPV vaccine representations on online discussion forums in Romania.

    PubMed

    Penţa, Marcela A; Băban, Adriana

    2014-02-01

    Whereas Romanian health officials have launched two national human papillomavirus (HPV) vaccination campaigns, the uptake rate remained insignificant. Understanding local perceptions of the vaccine is necessary, as they could inform future educational programmes. Given that social media provide new opportunities to communicate about vaccination, this paper sought to explore the public's constructions of the HPV vaccine as they were expressed on Internet discussion forums. Twenty discussion forums, with a total sample size of 2,240 comments (2007-2012), were included. We conducted a thematic analysis with a focus on language, informed by a discourse analytic approach. Positive discourses relying on evidence-based arguments or cancer-related experiences battled with negative discourses that focused mostly on pseudo-scientific information and affect-based testimonials. Both camps made use of appeals to authority in order to provide powerful messages. Critics expressed high levels of mistrust in the health system and perceived the vaccine as dangerous, as part of a conspiracy, as unnecessary or as a promoter of promiscuity. By contrast, supporters considered the HPV vaccine to be helpful and criticized the irrationality of opponents. Ambivalence and uncertainty also emerged, along with criticism toward the suboptimal organization of the vaccination programmes. Findings highlight ways in which views about the vaccine are embedded in broader perspectives about science, the national medical system, society development and economic inequality. Online posts are likely to elicit fear and doubts around vaccination, which in turn may impair decisions. Findings indicate that targeted education campaigns are needed in order to address public concerns about vaccination.

  19. Sensitivity of HER-2/neu antibodies in archival tissue samples: potential source of error in immunohistochemical studies of oncogene expression.

    PubMed

    Press, M F; Hung, G; Godolphin, W; Slamon, D J

    1994-05-15

    HER-2/neu oncogene amplification and overexpression of breast cancer tissue has been correlated with poor prognosis in women with both node-positive and node-negative disease. However, several studies have not confirmed this association. Review of these studies reveals the presence of considerable methodological variability including differences in study size, follow-up time, techniques and reagents. The majority of papers with clinical follow-up information are immunohistochemical studies using archival, paraffin-embedded breast cancers, and a variety of HER-2/neu antibodies have been used in these studies. Very little information, however, is available about the ability of the antibodies to detect overexpression following tissue processing for paraffin-embedding. Therefore, a series of antibodies, reported in the literature or commercially available, were evaluated to assess their sensitivity and specificity as immunohistochemical reagents. Paraffin-embedded samples of 187 breast cancers, previously characterized as frozen specimens for HER-2/neu amplification by Southern blot and for overexpression by Northern blot, Western blot, and immunohistochemistry, were used. Two multitumor paraffin-embedded tissue blocks were prepared from the previously analyzed breast cancers as a panel of cases to test a series of previously studied and/or commercially available anti-HER-2/neu antibodies. Immunohistochemical staining results obtained with 7 polyclonal and 21 monoclonal antibodies in sections from paraffin-embedded blocks of these breast cancers were compared. The ability of these antibodies to detect overexpression was extremely variable, providing an important explantation for the variable overexpression rate reported in the literature.

  20. Properties of nanocrystalline Si layers embedded in structure of solar cell

    NASA Astrophysics Data System (ADS)

    Jurečka, Stanislav; Imamura, Kentaro; Matsumoto, Taketoshi; Kobayashi, Hikaru

    2017-12-01

    Suppression of spectral reflectance from the surface of solar cell is necessary for achieving a high energy conversion efficiency. We developed a simple method for forming nanocrystalline layers with ultralow reflectance in a broad range of wavelengths. The method is based on metal assisted etching of the silicon surface. In this work, we prepared Si solar cell structures with embedded nanocrystalline layers. The microstructure of embedded layer depends on the etching conditions. We examined the microstructure of the etched layers by a transmission electron microscope and analysed the experimental images by statistical and Fourier methods. The obtained results provide information on the applied treatment operations and can be used to optimize the solar cell forming procedure.

  1. Consensus embedding: theory, algorithms and application to segmentation and classification of biomedical data

    PubMed Central

    2012-01-01

    Background Dimensionality reduction (DR) enables the construction of a lower dimensional space (embedding) from a higher dimensional feature space while preserving object-class discriminability. However several popular DR approaches suffer from sensitivity to choice of parameters and/or presence of noise in the data. In this paper, we present a novel DR technique known as consensus embedding that aims to overcome these problems by generating and combining multiple low-dimensional embeddings, hence exploiting the variance among them in a manner similar to ensemble classifier schemes such as Bagging. We demonstrate theoretical properties of consensus embedding which show that it will result in a single stable embedding solution that preserves information more accurately as compared to any individual embedding (generated via DR schemes such as Principal Component Analysis, Graph Embedding, or Locally Linear Embedding). Intelligent sub-sampling (via mean-shift) and code parallelization are utilized to provide for an efficient implementation of the scheme. Results Applications of consensus embedding are shown in the context of classification and clustering as applied to: (1) image partitioning of white matter and gray matter on 10 different synthetic brain MRI images corrupted with 18 different combinations of noise and bias field inhomogeneity, (2) classification of 4 high-dimensional gene-expression datasets, (3) cancer detection (at a pixel-level) on 16 image slices obtained from 2 different high-resolution prostate MRI datasets. In over 200 different experiments concerning classification and segmentation of biomedical data, consensus embedding was found to consistently outperform both linear and non-linear DR methods within all applications considered. Conclusions We have presented a novel framework termed consensus embedding which leverages ensemble classification theory within dimensionality reduction, allowing for application to a wide range of high-dimensional biomedical data classification and segmentation problems. Our generalizable framework allows for improved representation and classification in the context of both imaging and non-imaging data. The algorithm offers a promising solution to problems that currently plague DR methods, and may allow for extension to other areas of biomedical data analysis. PMID:22316103

  2. Speculation detection for Chinese clinical notes: Impacts of word segmentation and embedding models.

    PubMed

    Zhang, Shaodian; Kang, Tian; Zhang, Xingting; Wen, Dong; Elhadad, Noémie; Lei, Jianbo

    2016-04-01

    Speculations represent uncertainty toward certain facts. In clinical texts, identifying speculations is a critical step of natural language processing (NLP). While it is a nontrivial task in many languages, detecting speculations in Chinese clinical notes can be particularly challenging because word segmentation may be necessary as an upstream operation. The objective of this paper is to construct a state-of-the-art speculation detection system for Chinese clinical notes and to investigate whether embedding features and word segmentations are worth exploiting toward this overall task. We propose a sequence labeling based system for speculation detection, which relies on features from bag of characters, bag of words, character embedding, and word embedding. We experiment on a novel dataset of 36,828 clinical notes with 5103 gold-standard speculation annotations on 2000 notes, and compare the systems in which word embeddings are calculated based on word segmentations given by general and by domain specific segmenters respectively. Our systems are able to reach performance as high as 92.2% measured by F score. We demonstrate that word segmentation is critical to produce high quality word embedding to facilitate downstream information extraction applications, and suggest that a domain dependent word segmenter can be vital to such a clinical NLP task in Chinese language. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. Design of UAV-Embedded Microphone Array System for Sound Source Localization in Outdoor Environments †

    PubMed Central

    Hoshiba, Kotaro; Washizaki, Kai; Wakabayashi, Mizuho; Ishiki, Takahiro; Bando, Yoshiaki; Gabriel, Daniel; Nakadai, Kazuhiro; Okuno, Hiroshi G.

    2017-01-01

    In search and rescue activities, unmanned aerial vehicles (UAV) should exploit sound information to compensate for poor visual information. This paper describes the design and implementation of a UAV-embedded microphone array system for sound source localization in outdoor environments. Four critical development problems included water-resistance of the microphone array, efficiency in assembling, reliability of wireless communication, and sufficiency of visualization tools for operators. To solve these problems, we developed a spherical microphone array system (SMAS) consisting of a microphone array, a stable wireless network communication system, and intuitive visualization tools. The performance of SMAS was evaluated with simulated data and a demonstration in the field. Results confirmed that the SMAS provides highly accurate localization, water resistance, prompt assembly, stable wireless communication, and intuitive information for observers and operators. PMID:29099790

  4. Design of UAV-Embedded Microphone Array System for Sound Source Localization in Outdoor Environments.

    PubMed

    Hoshiba, Kotaro; Washizaki, Kai; Wakabayashi, Mizuho; Ishiki, Takahiro; Kumon, Makoto; Bando, Yoshiaki; Gabriel, Daniel; Nakadai, Kazuhiro; Okuno, Hiroshi G

    2017-11-03

    In search and rescue activities, unmanned aerial vehicles (UAV) should exploit sound information to compensate for poor visual information. This paper describes the design and implementation of a UAV-embedded microphone array system for sound source localization in outdoor environments. Four critical development problems included water-resistance of the microphone array, efficiency in assembling, reliability of wireless communication, and sufficiency of visualization tools for operators. To solve these problems, we developed a spherical microphone array system (SMAS) consisting of a microphone array, a stable wireless network communication system, and intuitive visualization tools. The performance of SMAS was evaluated with simulated data and a demonstration in the field. Results confirmed that the SMAS provides highly accurate localization, water resistance, prompt assembly, stable wireless communication, and intuitive information for observers and operators.

  5. Chromatin accessibility prediction via convolutional long short-term memory networks with k-mer embedding

    PubMed Central

    Min, Xu; Zeng, Wanwen; Chen, Ning; Chen, Ting; Jiang, Rui

    2017-01-01

    Abstract Motivation: Experimental techniques for measuring chromatin accessibility are expensive and time consuming, appealing for the development of computational approaches to predict open chromatin regions from DNA sequences. Along this direction, existing methods fall into two classes: one based on handcrafted k-mer features and the other based on convolutional neural networks. Although both categories have shown good performance in specific applications thus far, there still lacks a comprehensive framework to integrate useful k-mer co-occurrence information with recent advances in deep learning. Results: We fill this gap by addressing the problem of chromatin accessibility prediction with a convolutional Long Short-Term Memory (LSTM) network with k-mer embedding. We first split DNA sequences into k-mers and pre-train k-mer embedding vectors based on the co-occurrence matrix of k-mers by using an unsupervised representation learning approach. We then construct a supervised deep learning architecture comprised of an embedding layer, three convolutional layers and a Bidirectional LSTM (BLSTM) layer for feature learning and classification. We demonstrate that our method gains high-quality fixed-length features from variable-length sequences and consistently outperforms baseline methods. We show that k-mer embedding can effectively enhance model performance by exploring different embedding strategies. We also prove the efficacy of both the convolution and the BLSTM layers by comparing two variations of the network architecture. We confirm the robustness of our model to hyper-parameters by performing sensitivity analysis. We hope our method can eventually reinforce our understanding of employing deep learning in genomic studies and shed light on research regarding mechanisms of chromatin accessibility. Availability and implementation: The source code can be downloaded from https://github.com/minxueric/ismb2017_lstm. Contact: tingchen@tsinghua.edu.cn or ruijiang@tsinghua.edu.cn Supplementary information: Supplementary materials are available at Bioinformatics online. PMID:28881969

  6. The Gender Puzzle: Toddlers' Use of Articles to Access Noun Information

    ERIC Educational Resources Information Center

    Arias-Trejo, Natalia; Falcon, Alberto; Alva-Canto, Elda A.

    2013-01-01

    Grammatical gender embedded in determiners, nouns and adjectives allows indirect and more rapid processing of the referents implied in sentences. However in a language such as Spanish, this useful information cannot be reliably retrieved from a single source of information. Instead, noun gender may be extracted either from phono-morphological,…

  7. Embedding operational research into national disease control programme: lessons from 10 years of experience in Indonesia

    PubMed Central

    Mahendradhata, Yodi; Probandari, Ari; Widjanarko, Bagoes; Riono, Pandu; Mustikawati, Dyah; Tiemersma, Edine W.; Alisjahbana, Bachti

    2014-01-01

    There is growing recognition that operational research (OR) should be embedded into national disease control programmes. However, much of the current OR capacity building schemes are still predominantly driven by international agencies with limited integration into national disease control programmes. We demonstrated that it is possible to achieve a more sustainable capacity building effort across the country by establishing an OR group within the national tuberculosis (TB) control programme in Indonesia. Key challenges identified include long-term financial support, limited number of scientific publications, and difficulties in documenting impact on programmatic performance. External evaluation has expressed concerns in regard to utilisation of OR in policy making. Efforts to address this concern have been introduced recently and led to indications of increased utilisation of research evidence in policy making by the national TB control programme. Embedding OR in national disease control programmes is key in establishing an evidence-based disease control programme. PMID:25361728

  8. A novel attack method about double-random-phase-encoding-based image hiding method

    NASA Astrophysics Data System (ADS)

    Xu, Hongsheng; Xiao, Zhijun; Zhu, Xianchen

    2018-03-01

    By using optical image processing techniques, a novel text encryption and hiding method applied by double-random phase-encoding technique is proposed in the paper. The first step is that the secret message is transformed into a 2-dimension array. The higher bits of the elements in the array are used to fill with the bit stream of the secret text, while the lower bits are stored specific values. Then, the transformed array is encoded by double random phase encoding technique. Last, the encoded array is embedded on a public host image to obtain the image embedded with hidden text. The performance of the proposed technique is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient.

  9. Word Spotting and Recognition with Embedded Attributes.

    PubMed

    Almazán, Jon; Gordo, Albert; Fornés, Alicia; Valveny, Ernest

    2014-12-01

    This paper addresses the problems of word spotting and word recognition on images. In word spotting, the goal is to find all instances of a query word in a dataset of images. In recognition, the goal is to recognize the content of the word image, usually aided by a dictionary or lexicon. We describe an approach in which both word images and text strings are embedded in a common vectorial subspace. This is achieved by a combination of label embedding and attributes learning, and a common subspace regression. In this subspace, images and strings that represent the same word are close together, allowing one to cast recognition and retrieval tasks as a nearest neighbor problem. Contrary to most other existing methods, our representation has a fixed length, is low dimensional, and is very fast to compute and, especially, to compare. We test our approach on four public datasets of both handwritten documents and natural images showing results comparable or better than the state-of-the-art on spotting and recognition tasks.

  10. Real-time multiple objects tracking on Raspberry-Pi-based smart embedded camera

    NASA Astrophysics Data System (ADS)

    Dziri, Aziz; Duranton, Marc; Chapuis, Roland

    2016-07-01

    Multiple-object tracking constitutes a major step in several computer vision applications, such as surveillance, advanced driver assistance systems, and automatic traffic monitoring. Because of the number of cameras used to cover a large area, these applications are constrained by the cost of each node, the power consumption, the robustness of the tracking, the processing time, and the ease of deployment of the system. To meet these challenges, the use of low-power and low-cost embedded vision platforms to achieve reliable tracking becomes essential in networks of cameras. We propose a tracking pipeline that is designed for fixed smart cameras and which can handle occlusions between objects. We show that the proposed pipeline reaches real-time processing on a low-cost embedded smart camera composed of a Raspberry-Pi board and a RaspiCam camera. The tracking quality and the processing speed obtained with the proposed pipeline are evaluated on publicly available datasets and compared to the state-of-the-art methods.

  11. Moving Mexico’s Higher Education System Forward -- Potential and Challenges

    DTIC Science & Technology

    2011-10-28

    Mexican HES. The Mexican populace generally possesses a deeply embedded cultural aversion to self-assessment, especially when it comes to education...throughout the 31 states that make up the country.5 The Mexican public HES is nominally administered from Mexico City by the Secretaria de Educacion

  12. Chemistry and Education

    ERIC Educational Resources Information Center

    Rowland, Sherwood F.

    2004-01-01

    The ACS (American Chemical Society) plays a major role in the facilitation of the teaching of established knowledge, the extension of this knowledge and public service, which become even more important because they are embedded in society highly dependent in its daily activities on the fruits of science and technology. The president of the ACS and…

  13. Competing and Contested Discourses on Citizenship and Civic Praxis

    ERIC Educational Resources Information Center

    Koyama, Jill

    2017-01-01

    In this paper, I utilize complementary features of critical discourse analysis (CDA) and Actor-Network Theory (ANT) to trace and investigate issues of power, materiality, and reproduction embedded within notions of citizenship and civic engagement. I interrogate the often narrow and conservative political and public discourses in Arizona that…

  14. Research to create public memory of wilderness

    Treesearch

    William Stewart

    2012-01-01

    If wilderness experiences are distinct from general outdoor recreation experiences, then wilderness visitor research needs to reflect the distinction. If there are distinguishing characteristics, they would be linked to social and cultural meanings embedded in the Wilderness Act of 1964 and contemporary interpretations of it. Most research on wilderness visitor...

  15. Social capital and health during pregnancy; an in-depth exploration from rural Sri Lanka.

    PubMed

    Agampodi, Thilini Chanchala; Rheinländer, Thilde; Agampodi, Suneth Buddhika; Glozier, Nicholas; Siribaddana, Sisira

    2017-07-27

    Dimensions of social capital relevant to health in pregnancy are sparsely described in the literature. This study explores dimensions of social capital and the mechanisms in which they could affect the health of rural Sri Lankan pregnant women. An exploratory qualitative study of solicited diaries written by pregnant women on their social relationships, diary interviews and in-depth interviews with key informants was conducted. A framework approach for qualitative data analysis was used. Pregnant women (41), from eight different communities completed diaries and 38 post-diary interviews. Sixteen key informant interviews were conducted with public health midwives and senior community dwellers. We identified ten cognitive and five structural constructs of social capital relevant to health in pregnancy. Domestic and neighborhood cohesion were the most commonly expressed constructs. Social support was limited to support from close family, friends and public health midwives. A high density of structural social capital was observed in the micro-communities. Membership in local community groups was not common. Four different pathways by which social capital could influence health in pregnancy were identified. These include micro-level cognitive social capital by promoting mental wellbeing; micro-level structural social capital by reducing minor ailments in pregnancy; micro-level social support mechanisms promoting physical and mental wellbeing through psychosocial resources and health systems at each level providing focused maternal care. Current tools available may not contain the relevant constructs to capture the unique dimensions of social capital in pregnancy. Social capital can influence health during pregnancy, mainly through improved psychosocial resources generated by social cohesion in micro-communities and by the embedded neighborhood public health services.

  16. Fading vision: knowledge translation in the implementation of a public health policy intervention

    PubMed Central

    2013-01-01

    Background In response to several high profile public health crises, public health renewal is underway in Canada. In the province of British Columbia, the Ministry of Health initiated a collaborative evidence-informed process involving a steering committee of representatives from the six health authorities. A Core Functions (CF) Framework was developed, identifying 21 core public health programs. For each core program, an evidence review was conducted and a model core program paper developed. These documents were distributed to health authorities to guide development of their own renewed public health services. The CF implementation was conceptualized as an embedded knowledge translation process. A CF coordinator in each health authority was to facilitate a gap analysis and development of a performance improvement plan for each core program, and post these publically on the health authority website. Methods Interviews (n = 19) and focus groups (n = 8) were conducted with a total of 56 managers and front line staff from five health authorities working in the Healthy Living and Sexually Transmitted Infection Prevention core programs. All interviews and focus groups were digitally recorded, transcribed and verified by the project coordinator. Five members of the research team used NVivo 9 to manage data and conducted a thematic analysis. Results Four main themes emerged concerning implementation of the CF Framework generally, and the two programs specifically. The themes were: ‘you’ve told me what, now tell me how’; ‘the double bind’; ‘but we already do that’; and the ‘selling game.’ Findings demonstrate the original vision of the CF process was lost in the implementation process and many participants were unaware of the CF framework or process. Conclusions Results are discussed with respect to a well-known framework on the adoption, assimilation, and implementation of innovations in health services organizations. Despite attempts of the Ministry of Health and the Steering Committee to develop and implement a collaborative, evidence-informed policy intervention, there were several barriers to the realization of the vision for core public health functions implementation, at least in the early stages. In neglecting the implementation process, it seems unlikely that the expected benefits of the public health renewal process will be realized. PMID:23734672

  17. Overview and recent progress of the Magnetized Shock Experiment (MSX)

    NASA Astrophysics Data System (ADS)

    Weber, T. E.; Intrator, T. P.; Smith, R. J.; Hutchinson, T. M.; Boguski, J. C.; Sears, J. A.; Swan, H. O.; Gao, K. W.; Chapdelaine, L. J.; Winske, D.; Dunn, J. P.

    2013-10-01

    The Magnetized Shock Experiment (MSX) has been constructed to study the physics of super-Alfvènic, supercritical, magnetized shocks. Exhibiting transitional length and time scales much smaller than can be produced through collisional processes, these shocks are observed to create non-thermal distributions, amplify magnetic fields, and accelerate particles to relativistic velocities. Shocks are produced through the acceleration and subsequent stagnation of Field Reversed Configuration (FRC) plasmoids against a high-flux magnetic mirror with a conducting boundary or a plasma target with embedded field. Adjustable shock velocity, density, and magnetic geometry (B parallel, perpendicular, or oblique to k) provide unique access to a wide range of dimensionless parameters relevant to astrophysical shocks. Information regarding the experimental configuration, diagnostics suite, recent simulations, experimental results, and physics goals will be presented. This work is supported by DOE OFES and NNSA under LANS contract DE-AC52-06NA25369 Approved for Public Release: LA-UR-13-24859.

  18. Attitude change: persuasion and social influence.

    PubMed

    Wood, W

    2000-01-01

    This chapter reviews empirical and theoretical developments in research on social influence and message-based persuasion. The review emphasizes research published during the period from 1996-1998. Across these literatures, three central motives have been identified that generate attitude change and resistance. These involve concerns with the self, with others and the rewards/punishments they can provide, and with a valid understanding of reality. The motives have implications for information processing and for attitude change in public and private contexts. Motives in persuasion also have been investigated in research on attitude functions and cognitive dissonance theory. In addition, the chapter reviews the relatively unique aspects of each literature: In persuasion, it considers the cognitive and affective mechanisms underlying attitude change, especially dual-mode processing models, recipients' affective reactions, and biased processing. In social influence, the chapter considers how attitudes are embedded in social relations, including social identity theory and majority/minority group influence.

  19. Navigation studies based on the ubiquitous positioning technologies

    NASA Astrophysics Data System (ADS)

    Ye, Lei; Mi, Weijie; Wang, Defeng

    2007-11-01

    This paper summarized the nowadays positioning technologies, such as absolute positioning methods and relative positioning methods, indoor positioning and outdoor positioning, active positioning and passive positioning. Global Navigation Satellite System (GNSS) technologies were introduced as the omnipresent out-door positioning technologies, including GPS, GLONASS, Galileo and BD-1/2. After analysis of the shortcomings of GNSS, indoor positioning technologies were discussed and compared, including A-GPS, Cellular network, Infrared, Electromagnetism, Computer Vision Cognition, Embedded Pressure Sensor, Ultrasonic, RFID (Radio Frequency IDentification), Bluetooth, WLAN etc.. Then the concept and characteristics of Ubiquitous Positioning was proposed. After the ubiquitous positioning technologies contrast and selection followed by system engineering methodology, a navigation system model based on Incorporate Indoor-Outdoor Positioning Solution was proposed. And this model was simulated in the Galileo Demonstration for World Expo Shanghai project. In the conclusion, the prospects of ubiquitous positioning based navigation were shown, especially to satisfy the public location information acquiring requirement.

  20. Switching theory-based steganographic system for JPEG images

    NASA Astrophysics Data System (ADS)

    Cherukuri, Ravindranath C.; Agaian, Sos S.

    2007-04-01

    Cellular communications constitute a significant portion of the global telecommunications market. Therefore, the need for secured communication over a mobile platform has increased exponentially. Steganography is an art of hiding critical data into an innocuous signal, which provide answers to the above needs. The JPEG is one of commonly used format for storing and transmitting images on the web. In addition, the pictures captured using mobile cameras are in mostly in JPEG format. In this article, we introduce a switching theory based steganographic system for JPEG images which is applicable for mobile and computer platforms. The proposed algorithm uses the fact that energy distribution among the quantized AC coefficients varies from block to block and coefficient to coefficient. Existing approaches are effective with a part of these coefficients but when employed over all the coefficients they show there ineffectiveness. Therefore, we propose an approach that works each set of AC coefficients with different frame work thus enhancing the performance of the approach. The proposed system offers a high capacity and embedding efficiency simultaneously withstanding to simple statistical attacks. In addition, the embedded information could be retrieved without prior knowledge of the cover image. Based on simulation results, the proposed method demonstrates an improved embedding capacity over existing algorithms while maintaining a high embedding efficiency and preserving the statistics of the JPEG image after hiding information.

  1. The Practical Guide to Classroom Literacy Assessment

    ERIC Educational Resources Information Center

    Barone, Diane M.; Taylor, Joan M.

    2006-01-01

    Whether it is standardized test data, student journals, or informal classroom question and answer, assessments provide invaluable, ongoing diagnostic information for making key instructional decisions. In this engaging and comprehensive resource, the authors demonstrate practical ways for embedding test preparation into teaching by integrating…

  2. Quantitative Proteomic Analysis of Optimal Cutting Temperature (OCT) Embedded Core-Needle Biopsy of Lung Cancer

    NASA Astrophysics Data System (ADS)

    Zhao, Xiaozheng; Huffman, Kenneth E.; Fujimoto, Junya; Canales, Jamie Rodriguez; Girard, Luc; Nie, Guangjun; Heymach, John V.; Wistuba, Igacio I.; Minna, John D.; Yu, Yonghao

    2017-10-01

    With recent advances in understanding the genomic underpinnings and oncogenic drivers of pathogenesis in different subtypes, it is increasingly clear that proper pretreatment diagnostics are essential for the choice of appropriate treatment options for non-small cell lung cancer (NSCLC). Tumor tissue preservation in optimal cutting temperature (OCT) compound is commonly used in the surgical suite. However, proteins recovered from OCT-embedded specimens pose a challenge for LC-MS/MS experiments, due to the large amounts of polymers present in OCT. Here we present a simple workflow for whole proteome analysis of OCT-embedded NSCLC tissue samples, which involves a simple trichloroacetic acid precipitation step. Comparisons of protein recovery between frozen versus OCT-embedded tissue showed excellent consistency with more than 9200 proteins identified. Using an isobaric labeling strategy, we quantified more than 5400 proteins in tumor versus normal OCT-embedded core needle biopsy samples. Gene ontology analysis indicated that a number of proliferative as well as squamous cell carcinoma (SqCC) marker proteins were overexpressed in the tumor, consistent with the patient's pathology based diagnosis of "poorly differentiated SqCC". Among the most downregulated proteins in the tumor sample, we noted a number of proteins with potential immunomodulatory functions. Finally, interrogation of the aberrantly expressed proteins using a candidate approach and cross-referencing with publicly available databases led to the identification of potential druggable targets in DNA replication and DNA damage repair pathways. We conclude that our approach allows LC-MS/MS proteomic analyses on OCT-embedded lung cancer specimens, opening the way to bring powerful proteomics into the clinic. [Figure not available: see fulltext.

  3. Artificial Intelligence Learning Semantics via External Resources for Classifying Diagnosis Codes in Discharge Notes.

    PubMed

    Lin, Chin; Hsu, Chia-Jung; Lou, Yu-Sheng; Yeh, Shih-Jen; Lee, Chia-Cheng; Su, Sui-Lung; Chen, Hsiang-Cheng

    2017-11-06

    Automated disease code classification using free-text medical information is important for public health surveillance. However, traditional natural language processing (NLP) pipelines are limited, so we propose a method combining word embedding with a convolutional neural network (CNN). Our objective was to compare the performance of traditional pipelines (NLP plus supervised machine learning models) with that of word embedding combined with a CNN in conducting a classification task identifying International Classification of Diseases, Tenth Revision, Clinical Modification (ICD-10-CM) diagnosis codes in discharge notes. We used 2 classification methods: (1) extracting from discharge notes some features (terms, n-gram phrases, and SNOMED CT categories) that we used to train a set of supervised machine learning models (support vector machine, random forests, and gradient boosting machine), and (2) building a feature matrix, by a pretrained word embedding model, that we used to train a CNN. We used these methods to identify the chapter-level ICD-10-CM diagnosis codes in a set of discharge notes. We conducted the evaluation using 103,390 discharge notes covering patients hospitalized from June 1, 2015 to January 31, 2017 in the Tri-Service General Hospital in Taipei, Taiwan. We used the receiver operating characteristic curve as an evaluation measure, and calculated the area under the curve (AUC) and F-measure as the global measure of effectiveness. In 5-fold cross-validation tests, our method had a higher testing accuracy (mean AUC 0.9696; mean F-measure 0.9086) than traditional NLP-based approaches (mean AUC range 0.8183-0.9571; mean F-measure range 0.5050-0.8739). A real-world simulation that split the training sample and the testing sample by date verified this result (mean AUC 0.9645; mean F-measure 0.9003 using the proposed method). Further analysis showed that the convolutional layers of the CNN effectively identified a large number of keywords and automatically extracted enough concepts to predict the diagnosis codes. Word embedding combined with a CNN showed outstanding performance compared with traditional methods, needing very little data preprocessing. This shows that future studies will not be limited by incomplete dictionaries. A large amount of unstructured information from free-text medical writing will be extracted by automated approaches in the future, and we believe that the health care field is about to enter the age of big data. ©Chin Lin, Chia-Jung Hsu, Yu-Sheng Lou, Shih-Jen Yeh, Chia-Cheng Lee, Sui-Lung Su, Hsiang-Cheng Chen. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 06.11.2017.

  4. Wavelet-based audio embedding and audio/video compression

    NASA Astrophysics Data System (ADS)

    Mendenhall, Michael J.; Claypoole, Roger L., Jr.

    2001-12-01

    Watermarking, traditionally used for copyright protection, is used in a new and exciting way. An efficient wavelet-based watermarking technique embeds audio information into a video signal. Several effective compression techniques are applied to compress the resulting audio/video signal in an embedded fashion. This wavelet-based compression algorithm incorporates bit-plane coding, index coding, and Huffman coding. To demonstrate the potential of this audio embedding and audio/video compression algorithm, we embed an audio signal into a video signal and then compress. Results show that overall compression rates of 15:1 can be achieved. The video signal is reconstructed with a median PSNR of nearly 33 dB. Finally, the audio signal is extracted from the compressed audio/video signal without error.

  5. User Expectations for Media Sharing Practices in Open Display Networks

    PubMed Central

    Jose, Rui; Cardoso, Jorge C. S.; Hong, Jason

    2015-01-01

    Open Display Networks have the potential to allow many content creators to publish their media to an open-ended set of screen displays. However, this raises the issue of how to match that content to the right displays. In this study, we aim to understand how the perceived utility of particular media sharing scenarios is affected by three independent variables, more specifically: (a) the locativeness of the content being shared; (b) how personal that content is and (c) the scope in which it is being shared. To assess these effects, we composed a set of 24 media sharing scenarios embedded with different treatments of our three independent variables. We then asked 100 participants to express their perception of the relevance of those scenarios. The results suggest a clear preference for scenarios where content is both local and directly related to the person that is publishing it. This is in stark contrast to the types of content that are commonly found in public displays, and confirms the opportunity that open displays networks may represent a new media for self-expression. This novel understanding may inform the design of new publication paradigms that will enable people to share media across the display networks. PMID:26153770

  6. Stellar Presentations (Abstract)

    NASA Astrophysics Data System (ADS)

    Young, D.

    2015-12-01

    (Abstract only) The AAVSO is in the process of expanding its education, outreach and speakers bureau program. powerpoint presentations prepared for specific target audiences such as AAVSO members, educators, students, the general public, and Science Olympiad teams, coaches, event supervisors, and state directors will be available online for members to use. The presentations range from specific and general content relating to stellar evolution and variable stars to specific activities for a workshop environment. A presentation—even with a general topic—that works for high school students will not work for educators, Science Olympiad teams, or the general public. Each audience is unique and requires a different approach. The current environment necessitates presentations that are captivating for a younger generation that is embedded in a highly visual and sound-bite world of social media, twitter and U-Tube, and mobile devices. For educators, presentations and workshops for themselves and their students must support the Next Generation Science Standards (NGSS), the Common Core Content Standards, and the Science Technology, Engineering and Mathematics (STEM) initiative. Current best practices for developing relevant and engaging powerpoint presentations to deliver information to a variety of targeted audiences will be presented along with several examples.

  7. Consumer Sleep Technologies: A Review of the Landscape.

    PubMed

    Ko, Ping-Ru T; Kientz, Julie A; Choe, Eun Kyoung; Kay, Matthew; Landis, Carol A; Watson, Nathaniel F

    2015-12-15

    To review sleep related consumer technologies, including mobile electronic device "apps," wearable devices, and other technologies. Validation and methodological transparency, the effect on clinical sleep medicine, and various social, legal, and ethical issues are discussed. We reviewed publications from the digital libraries of the Association for Computing Machinery, Institute of Electrical and Electronics Engineers, and PubMed; publications from consumer technology websites; and mobile device app marketplaces. Search terms included "sleep technology," "sleep app," and "sleep monitoring." Consumer sleep technologies are categorized by delivery platform including mobile device apps (integrated with a mobile operating system and utilizing mobile device functions such as the camera or microphone), wearable devices (on the body or attached to clothing), embedded devices (integrated into furniture or other fixtures in the native sleep environment), accessory appliances, and conventional desktop/website resources. Their primary goals include facilitation of sleep induction or wakening, self-guided sleep assessment, entertainment, social connection, information sharing, and sleep education. Consumer sleep technologies are changing the landscape of sleep health and clinical sleep medicine. These technologies have the potential to both improve and impair collective and individual sleep health depending on method of implementation. © 2015 American Academy of Sleep Medicine.

  8. Application of smart optical fiber sensors for structural load monitoring

    NASA Astrophysics Data System (ADS)

    Davies, Heddwyn; Everall, Lorna A.; Gallon, Andrew M.

    2001-06-01

    This paper describes a smart monitoring system, incorporating optical fiber sensing techniques, capable of providing important structural information to designers and users alike. This technology has wide industrial and commercial application in areas including aerospace, civil, maritime and automotive engineering. In order to demonstrate the capability of the sensing system it has been installed in a 35m free-standing carbon fiber yacht mast, where a complete optical network of strain and temperature sensors were embedded into a composite mast and boom during lay-up. The system was able to monitor the behavior of the composite rig through a range of handling conditions. The resulting strain information can be used by engineers to improve the structural design process. Embedded fiber optic sensors have wide ranging application for structural load monitoring. Due to their small size, optical fiber sensors can be readily embedded into composite materials. Other advantages include their immediate multiplexing capability and immunity to electro-magnetic interference. The capability of this system has been demonstrated within the maritime and industrial environment, but can be adapted for any application.

  9. Spectral embedding-based registration (SERg) for multimodal fusion of prostate histology and MRI

    NASA Astrophysics Data System (ADS)

    Hwuang, Eileen; Rusu, Mirabela; Karthigeyan, Sudha; Agner, Shannon C.; Sparks, Rachel; Shih, Natalie; Tomaszewski, John E.; Rosen, Mark; Feldman, Michael; Madabhushi, Anant

    2014-03-01

    Multi-modal image registration is needed to align medical images collected from different protocols or imaging sources, thereby allowing the mapping of complementary information between images. One challenge of multimodal image registration is that typical similarity measures rely on statistical correlations between image intensities to determine anatomical alignment. The use of alternate image representations could allow for mapping of intensities into a space or representation such that the multimodal images appear more similar, thus facilitating their co-registration. In this work, we present a spectral embedding based registration (SERg) method that uses non-linearly embedded representations obtained from independent components of statistical texture maps of the original images to facilitate multimodal image registration. Our methodology comprises the following main steps: 1) image-derived textural representation of the original images, 2) dimensionality reduction using independent component analysis (ICA), 3) spectral embedding to generate the alternate representations, and 4) image registration. The rationale behind our approach is that SERg yields embedded representations that can allow for very different looking images to appear more similar, thereby facilitating improved co-registration. Statistical texture features are derived from the image intensities and then reduced to a smaller set by using independent component analysis to remove redundant information. Spectral embedding generates a new representation by eigendecomposition from which only the most important eigenvectors are selected. This helps to accentuate areas of salience based on modality-invariant structural information and therefore better identifies corresponding regions in both the template and target images. The spirit behind SERg is that image registration driven by these areas of salience and correspondence should improve alignment accuracy. In this work, SERg is implemented using Demons to allow the algorithm to more effectively register multimodal images. SERg is also tested within the free-form deformation framework driven by mutual information. Nine pairs of synthetic T1-weighted to T2-weighted brain MRI were registered under the following conditions: five levels of noise (0%, 1%, 3%, 5%, and 7%) and two levels of bias field (20% and 40%) each with and without noise. We demonstrate that across all of these conditions, SERg yields a mean squared error that is 81.51% lower than that of Demons driven by MRI intensity alone. We also spatially align twenty-six ex vivo histology sections and in vivo prostate MRI in order to map the spatial extent of prostate cancer onto corresponding radiologic imaging. SERg performs better than intensity registration by decreasing the root mean squared distance of annotated landmarks in the prostate gland via both Demons algorithm and mutual information-driven free-form deformation. In both synthetic and clinical experiments, the observed improvement in alignment of the template and target images suggest the utility of parametric eigenvector representations and hence SERg for multimodal image registration.

  10. Comparison of fixation and processing methods for hairless guinea pig skin following sulfur mustard exposure. (Reannouncement with new availability information)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bryant, M.A.; Braue Jr, E.H.

    1992-12-31

    Ten anesthetized hairless guinea pigs Crl:IAF(HA)BR were exposed to 10 pi of neat sulfur mustard (HD) in a vapor cup on their skin for 7 min. At 24 h postexposure, the guinea pigs were euthanatized and skin sections taken for histologic evaluation. The skin was fixed using either 10% neutral buffered formalin (NBF), McDowell Trump fixative (4CF-IG), Zenker`s formol-saline (Helly`s fluid), or Zenker`s fluid. Fixed skin sections were cut in half: one half was embedded in paraffin and the other half in plastic (glycol methacrylate). Paraffin-embedded tissue was stained with hematoxylin and eosin; plastic-embedded tissue was stained with Lee`s methylenemore » blue basic fuchsin. Skin was also frozen unfixed, sectioned by cryostat, and stained with pinacyanole. HD-exposed skin was evaluated histologically for the presence of epidermal and follicular necrosis, microblister formation, epidermitis, and intracellular edema to determine the optimal fixation and embedding method for lesion preservation. The percentage of histologic sections with lesions varied little between fixatives and was similar for both paraffin and plastic embedding material. Plastic-embedded sections were thinner, allowing better histologic evaluation, but were more difficult to stain. Plastic embedding material did not infiltrate tissue fixed in Zenker`s fluid or Zenker`s formol-saline. Frozen tissue sections were prepared in the least processing time and lesion preservation was comparable to fixed tissue. It was concluded that standard histologic processing using formalin fixation and paraffin embedding is adequate for routine histopathological evaluation of HD skin lesions in the hairless guinea pig.... Sulfur mustard, Vesicating agents, Pathology, Hairless guinea pig model, Fixation.« less

  11. The Hubble Frontier Fields: Engaging Multiple Audiences in Exploring the Cosmic Frontier

    NASA Astrophysics Data System (ADS)

    Lawton, Brandon L.; Smith, Denise A.; Summers, Frank; Ryer, Holly; Slivinski, Carolyn; Lotz, Jennifer M.

    2017-06-01

    The Hubble Frontier Fields is a multi-cycle program of six deep-field observations of strong-lensing galaxy clusters taken in parallel with six deep “blank fields.” The three-year long collaborative program began in late 2013 and is led by observations from NASA’s Great Observatories. The observations, now complete, allow astronomers to look deeper into the universe than ever before, and potentially uncover galaxies that are as much as 100 times fainter than what the telescopes can typically observe. The Frontier Fields science program is ideal for informing audiences about scientific advances and topics in STEM. The study of galaxy properties, statistics, optics, and Einstein’s theory of general relativity naturally leverages off of the science returns of the Frontier Fields program. As a result, the Space Telescope Science Institute’s Office of Public Outreach (OPO) has engaged multiple audiences over the past three years to follow the progress of the Frontier Fields.For over two decades, the STScI outreach program has sought to bring the wonders of the universe to the public and engage audiences in the adventure of scientific discovery. In addition, we are leveraging the reach of the new NASA’s Universe of Learning education program to bring the science of the Frontier Fields to informal education audiences. The main underpinnings of the STScI outreach program and the Universe of Learning education program are scientist-educator development teams, partnerships, and an embedded program evaluation component. OPO is leveraging the infrastructure of these education and outreach programs to bring the Frontier Fields science program to the education community and the public in a cost-effective way.This talk will feature highlights over the past three years of the program. We will highlight OPO’s strategies and infrastructure that allows for the quick delivery of groundbreaking science to the education community and public.

  12. A report of work activities on the NASA Spacelink public electronic library

    NASA Technical Reports Server (NTRS)

    Smith, Willard A.

    1994-01-01

    NASA Spacelink is a comprehensive electronic data base of NASA and other source educational and informational materials. This service originates at Marshall Space Flight Center (MSFC) in Huntsville, Alabama. This is an education service of NASA Headquarters, through the MSFC Education Office, that first began in February of 1988. The new NASA Spacelink Public Electronic Library was the result of a study conducted to investigate an upgrade or redesign of the original NASA Spacelink. The UNIX Operating System was chosen to be the host operating system for the new NASA Spacelink Public Electronic Library. The UNIX system was selected for this project because of the strengths built into the embedded communication system and for its simple and direct file handling capabilities. The host hardware of the new system is a Sun Microsystems SPARCserver 1000 computer system. The configuration has four 50-MHz SuperSPARC processors with 128 megabytes of shared memory; three SB800 serial ports allowing 24 cable links for phone communications; 4.1 gigabytes of on-line disk storage; and ten (10) CD-ROM drives. Communications devices on the system are sufficient to support the expected number of users through the Internet, the local dial services, long distance dial services; the MSFC PABX, and the NPSS (NASA Packet Switching System) and 1-800 access service for the registered teachers.

  13. 39 CFR 255.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... technology” and any equipment or interconnected system or subsystem of equipment that is used in the creation... embedded information technology that is used as an integral part of the product, but the principal function... an impairment. (f) Information technology means any equipment, or interconnected system or subsystem...

  14. 39 CFR 255.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... technology” and any equipment or interconnected system or subsystem of equipment that is used in the creation... embedded information technology that is used as an integral part of the product, but the principal function... an impairment. (f) Information technology means any equipment, or interconnected system or subsystem...

  15. 39 CFR 255.2 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... technology” and any equipment or interconnected system or subsystem of equipment that is used in the creation... embedded information technology that is used as an integral part of the product, but the principal function... an impairment. (f) Information technology means any equipment, or interconnected system or subsystem...

  16. 39 CFR 255.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... technology” and any equipment or interconnected system or subsystem of equipment that is used in the creation... embedded information technology that is used as an integral part of the product, but the principal function... an impairment. (f) Information technology means any equipment, or interconnected system or subsystem...

  17. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.

    PubMed

    Al-Dmour, Hayat; Al-Ani, Ahmed

    2016-04-01

    The present work has the goal of developing a secure medical imaging information system based on a combined steganography and cryptography technique. It attempts to securely embed patient's confidential information into his/her medical images. The proposed information security scheme conceals coded Electronic Patient Records (EPRs) into medical images in order to protect the EPRs' confidentiality without affecting the image quality and particularly the Region of Interest (ROI), which is essential for diagnosis. The secret EPR data is converted into ciphertext using private symmetric encryption method. Since the Human Visual System (HVS) is less sensitive to alterations in sharp regions compared to uniform regions, a simple edge detection method has been introduced to identify and embed in edge pixels, which will lead to an improved stego image quality. In order to increase the embedding capacity, the algorithm embeds variable number of bits (up to 3) in edge pixels based on the strength of edges. Moreover, to increase the efficiency, two message coding mechanisms have been utilized to enhance the ±1 steganography. The first one, which is based on Hamming code, is simple and fast, while the other which is known as the Syndrome Trellis Code (STC), is more sophisticated as it attempts to find a stego image that is close to the cover image through minimizing the embedding impact. The proposed steganography algorithm embeds the secret data bits into the Region of Non Interest (RONI), where due to its importance; the ROI is preserved from modifications. The experimental results demonstrate that the proposed method can embed large amount of secret data without leaving a noticeable distortion in the output image. The effectiveness of the proposed algorithm is also proven using one of the efficient steganalysis techniques. The proposed medical imaging information system proved to be capable of concealing EPR data and producing imperceptible stego images with minimal embedding distortions compared to other existing methods. In order to refrain from introducing any modifications to the ROI, the proposed system only utilizes the Region of Non Interest (RONI) in embedding the EPR data. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  18. A design proposal of a certain missile tactical command system based on Beidou satellite communication and GPS positioning techniques

    NASA Astrophysics Data System (ADS)

    Ma, Jian; Hao, Yongsheng; Miao, Jian; Zhang, Jianmao

    2007-11-01

    This paper introduced a design proposal of tactical command system that applied to a kind of anti-tank missile carriers. The tactical command system was made up of embedded computer system based on PC104 bus, Linux operating system, digital military map, Beidou satellite communication equipments and GPS positioning equipments. The geographic coordinates was measured by the GPS receiver, the positioning data, commands and information were transmitted real-time between tactical command systems, tactical command systems and command center, by the Beidou satellite communication systems. The Beidou satellite communication equipments and GPS positioning equipments were integrated to an independent module, exchanging data with embedded computer through RS232 serial ports and USB ports. The decision support system software based on information fusion, calculates positioning data, geography information and battle field information synthetically, shows the position of allies and the position of enemy on the military map, and assesses the various threats of different enemy objects, educes a situation assessment and threat assessment.

  19. Linguistic complexity and information structure in Korean: Evidence from eye-tracking during reading

    PubMed Central

    Lee, Yoonhyoung; Lee, Hanjung; Gordon, Peter C.

    2006-01-01

    The nature of the memory processes that support language comprehension and the manner in which information packaging influences online sentence processing were investigated in three experiments that used eye-tracking during reading to measure the ease of understanding complex sentences in Korean. All three experiments examined reading of embedded complement sentences; the third experiment additionally examined reading of sentences with object-modifying, object-extracted relative clauses. In Korean, both of these structures place two NPs with nominative case marking early in the sentence, with the embedded and matrix verbs following later. The type (pronoun, name or description) of these two critical NPs was varied in the experiments. When the initial NPs were of the same type, comprehension was slowed after participants had read the sentence-final verbs, a finding that supports the view that working memory in language comprehension is constrained by similarity-based interference during the retrieval of information necessary to determine the syntactic or semantic relations between noun phrases and verb phrases. Ease of comprehension was also influenced by the association between type of NP and syntactic position, with the best performance being observed when more definite NPs (pronouns and names) were in a prominent syntactic position (e.g., matrix subject) and less definite NPs (descriptions) were in a non-prominent syntactic position (embedded subject). This pattern provides evidence that the interpretation of sentences is facilitated by consistent packaging of information in different linguistic elements. PMID:16970936

  20. Rapid Extraction of Lexical Tone Phonology in Chinese Characters: A Visual Mismatch Negativity Study

    PubMed Central

    Wang, Xiao-Dong; Liu, A-Ping; Wu, Yin-Yuan; Wang, Peng

    2013-01-01

    Background In alphabetic languages, emerging evidence from behavioral and neuroimaging studies shows the rapid and automatic activation of phonological information in visual word recognition. In the mapping from orthography to phonology, unlike most alphabetic languages in which there is a natural correspondence between the visual and phonological forms, in logographic Chinese, the mapping between visual and phonological forms is rather arbitrary and depends on learning and experience. The issue of whether the phonological information is rapidly and automatically extracted in Chinese characters by the brain has not yet been thoroughly addressed. Methodology/Principal Findings We continuously presented Chinese characters differing in orthography and meaning to adult native Mandarin Chinese speakers to construct a constant varying visual stream. In the stream, most stimuli were homophones of Chinese characters: The phonological features embedded in these visual characters were the same, including consonants, vowels and the lexical tone. Occasionally, the rule of phonology was randomly violated by characters whose phonological features differed in the lexical tone. Conclusions/Significance We showed that the violation of the lexical tone phonology evoked an early, robust visual response, as revealed by whole-head electrical recordings of the visual mismatch negativity (vMMN), indicating the rapid extraction of phonological information embedded in Chinese characters. Source analysis revealed that the vMMN was involved in neural activations of the visual cortex, suggesting that the visual sensory memory is sensitive to phonological information embedded in visual words at an early processing stage. PMID:23437235

  1. Streamflow Prediction based on Chaos Theory

    NASA Astrophysics Data System (ADS)

    Li, X.; Wang, X.; Babovic, V. M.

    2015-12-01

    Chaos theory is a popular method in hydrologic time series prediction. Local model (LM) based on this theory utilizes time-delay embedding to reconstruct the phase-space diagram. For this method, its efficacy is dependent on the embedding parameters, i.e. embedding dimension, time lag, and nearest neighbor number. The optimal estimation of these parameters is thus critical to the application of Local model. However, these embedding parameters are conventionally estimated using Average Mutual Information (AMI) and False Nearest Neighbors (FNN) separately. This may leads to local optimization and thus has limitation to its prediction accuracy. Considering about these limitation, this paper applies a local model combined with simulated annealing (SA) to find the global optimization of embedding parameters. It is also compared with another global optimization approach of Genetic Algorithm (GA). These proposed hybrid methods are applied in daily and monthly streamflow time series for examination. The results show that global optimization can contribute to the local model to provide more accurate prediction results compared with local optimization. The LM combined with SA shows more advantages in terms of its computational efficiency. The proposed scheme here can also be applied to other fields such as prediction of hydro-climatic time series, error correction, etc.

  2. Healthy Foundations Study: a randomised controlled trial to evaluate biological embedding of early-life experiences.

    PubMed

    Gonzalez, Andrea; Catherine, Nicole; Boyle, Michael; Jack, Susan M; Atkinson, Leslie; Kobor, Michael; Sheehan, Debbie; Tonmyr, Lil; Waddell, Charlotte; MacMillan, Harriet L

    2018-01-26

    Adverse early experiences are associated with long-lasting disruptions in physiology, development and health. These experiences may be 'biologically embedded' into molecular and genomic systems that determine later expressions of vulnerability. Most studies to date have not examined whether preventive interventions can potentially reverse biological embedding. The Nurse-Family Partnership (NFP) is an evidence-based intervention with demonstrated efficacy in improving prenatal health, parenting and child functioning. The Healthy Foundations Study is an innovative birth cohort which will evaluate the impact of the NFP on biological outcomes of mothers and their infants. Starting in 2013, up to 400 pregnant mothers and their newborns were recruited from the British Columbia Healthy Connections Project-a randomised controlled trial of the NFP, and will be followed to child aged 2 years. Women were recruited prior to 28 weeks' gestation and then individually randomised to receive existing services (comparison group) or NFP plus existing services (intervention group). Hair samples are collected from mothers at baseline and 2 months post partum to measure physiological stress. Saliva samples are collected from infants during all visits for analyses of stress and immune function. Buccal swabs are collected from infants at 2 and 24 months to assess DNA methylation. Biological samples will be related to child outcome measures at age 2 years. The study received ethical approval from seven research ethics boards. Findings from this study will be shared broadly with the research community through peer-reviewed publications, and conference presentations, as well as seminars with our policy partners and relevant healthcare providers. The outcomes of this study will provide all stakeholders with important information regarding how early adversity may lead to health and behavioural disparities and how these may be altered through early interventions. NCT01672060; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  3. Extracting hidden messages in steganographic images

    DOE PAGES

    Quach, Tu-Thach

    2014-07-17

    The eventual goal of steganalytic forensic is to extract the hidden messages embedded in steganographic images. A promising technique that addresses this problem partially is steganographic payload location, an approach to reveal the message bits, but not their logical order. It works by finding modified pixels, or residuals, as an artifact of the embedding process. This technique is successful against simple least-significant bit steganography and group-parity steganography. The actual messages, however, remain hidden as no logical order can be inferred from the located payload. This paper establishes an important result addressing this shortcoming: we show that the expected mean residualsmore » contain enough information to logically order the located payload provided that the size of the payload in each stego image is not fixed. The located payload can be ordered as prescribed by the mean residuals to obtain the hidden messages without knowledge of the embedding key, exposing the vulnerability of these embedding algorithms. We provide experimental results to support our analysis.« less

  4. Untangling Brain-Wide Dynamics in Consciousness by Cross-Embedding

    PubMed Central

    Tajima, Satohiro; Yanagawa, Toru; Fujii, Naotaka; Toyoizumi, Taro

    2015-01-01

    Brain-wide interactions generating complex neural dynamics are considered crucial for emergent cognitive functions. However, the irreducible nature of nonlinear and high-dimensional dynamical interactions challenges conventional reductionist approaches. We introduce a model-free method, based on embedding theorems in nonlinear state-space reconstruction, that permits a simultaneous characterization of complexity in local dynamics, directed interactions between brain areas, and how the complexity is produced by the interactions. We demonstrate this method in large-scale electrophysiological recordings from awake and anesthetized monkeys. The cross-embedding method captures structured interaction underlying cortex-wide dynamics that may be missed by conventional correlation-based analysis, demonstrating a critical role of time-series analysis in characterizing brain state. The method reveals a consciousness-related hierarchy of cortical areas, where dynamical complexity increases along with cross-area information flow. These findings demonstrate the advantages of the cross-embedding method in deciphering large-scale and heterogeneous neuronal systems, suggesting a crucial contribution by sensory-frontoparietal interactions to the emergence of complex brain dynamics during consciousness. PMID:26584045

  5. Liquid-Embedded Elastomer Electronics

    NASA Astrophysics Data System (ADS)

    Kramer, Rebecca; Majidi, Carmel; Park, Yong-Lae; Paik, Jamie; Wood, Robert

    2012-02-01

    Hyperelastic sensors are fabricated by embedding a silicone rubber film with microchannels of conductive liquid. In the case of soft tactile sensors, pressing the surface of the elastomer will deform the cross-section of underlying channels and change their electrical resistance. Soft pressure sensors may be employed in a variety of applications. For example, a network of pressure sensors can serve as artificial skin by yielding detailed information about contact pressures. This concept was demonstrated in a hyperelastic keypad, where perpendicular conductive channels form a quasi-planar network within an elastomeric matrix that registers the location, intensity and duration of applied pressure. In a second demonstration, soft curvature sensors were used for joint angle proprioception. Because the sensors are soft and stretchable, they conform to the host without interfering with the natural mechanics of motion. This marked the first use of liquid-embedded elastomer electronics to monitor human or robotic motion. Finally, liquid-embedded elastomers may be implemented as conductors in applications that call for flexible or stretchable circuitry, such as robotic origami.

  6. Multi-Task Learning with Low Rank Attribute Embedding for Multi-Camera Person Re-Identification.

    PubMed

    Su, Chi; Yang, Fan; Zhang, Shiliang; Tian, Qi; Davis, Larry Steven; Gao, Wen

    2018-05-01

    We propose Multi-Task Learning with Low Rank Attribute Embedding (MTL-LORAE) to address the problem of person re-identification on multi-cameras. Re-identifications on different cameras are considered as related tasks, which allows the shared information among different tasks to be explored to improve the re-identification accuracy. The MTL-LORAE framework integrates low-level features with mid-level attributes as the descriptions for persons. To improve the accuracy of such description, we introduce the low-rank attribute embedding, which maps original binary attributes into a continuous space utilizing the correlative relationship between each pair of attributes. In this way, inaccurate attributes are rectified and missing attributes are recovered. The resulting objective function is constructed with an attribute embedding error and a quadratic loss concerning class labels. It is solved by an alternating optimization strategy. The proposed MTL-LORAE is tested on four datasets and is validated to outperform the existing methods with significant margins.

  7. Living Inquiry: Learning from and about Informational Texts in a Second-Grade Classroom

    ERIC Educational Resources Information Center

    Maloch, Beth; Horsey, Michelle

    2013-01-01

    This article tells the story of one second grade teacher and the ways she integrated informational texts into her classroom. Reported by the classroom teacher and a researcher who studied her practice for a year, the manuscripts detail the ways Michelle (the classroom teacher) embedded informational texts in her classroom primarily within the…

  8. Design of embedded intelligent monitoring system based on face recognition

    NASA Astrophysics Data System (ADS)

    Liang, Weidong; Ding, Yan; Zhao, Liangjin; Li, Jia; Hu, Xuemei

    2017-01-01

    In this paper, a new embedded intelligent monitoring system based on face recognition is proposed. The system uses Pi Raspberry as the central processor. A sensors group has been designed with Zigbee module in order to assist the system to work better and the two alarm modes have been proposed using the Internet and 3G modem. The experimental results show that the system can work under various light intensities to recognize human face and send alarm information in real time.

  9. Reconstructing latent dynamical noise for better forecasting observables

    NASA Astrophysics Data System (ADS)

    Hirata, Yoshito

    2018-03-01

    I propose a method for reconstructing multi-dimensional dynamical noise inspired by the embedding theorem of Muldoon et al. [Dyn. Stab. Syst. 13, 175 (1998)] by regarding multiple predictions as different observables. Then, applying the embedding theorem by Stark et al. [J. Nonlinear Sci. 13, 519 (2003)] for a forced system, I produce time series forecast by supplying the reconstructed past dynamical noise as auxiliary information. I demonstrate the proposed method on toy models driven by auto-regressive models or independent Gaussian noise.

  10. MATLAB Algorithms for Rapid Detection and Embedding of Palindrome and Emordnilap Electronic Watermarks in Simulated Chemical and Biological Image Data

    DTIC Science & Technology

    2004-12-01

    digital watermarking http:// ww*.petitcolas .net/ fabien/ steganography / email: fapp2@cl.cam.ac.uk a=double(imread(’custom-a.jpg’)); %load in image ...MATLAB Algorithms for Rapid Detection and Embedding of Palindrome and Emordnilap Electronic Watermarks in Simulated Chemical and Biological Image ...approach (Ref 2-4) to watermarking involves be used to inform the viewer of data (such as photographs putting the cover image in the first 4

  11. How and Why Young Adults Do and Do Not Search for Health Information: Cognitive and Affective Factors

    ERIC Educational Resources Information Center

    Myrick, Jessica Gall; Willoughby, Jessica Fitts; Verghese, Roshni Susana

    2016-01-01

    Objective: The goal of this study was to take an in-depth look at why college students do (or do not) seek health information, and how they seek information when they do. Design: Qualitative content analysis of responses to an open-ended prompt embedded in a survey about health information seeking behaviours. Setting: Nearly 700 (N?=?697) college…

  12. Strong-field tidal distortions of rotating black holes. III. Embeddings in hyperbolic three-space

    NASA Astrophysics Data System (ADS)

    Penna, Robert F.; Hughes, Scott A.; O'Sullivan, Stephen

    2017-09-01

    In previous work, we developed tools for quantifying the tidal distortion of a black hole's event horizon due to an orbiting companion. These tools use techniques which require large mass ratios (companion mass μ much smaller than black hole mass M ), but can be used for arbitrary bound orbits and for any black hole spin. We also showed how to visualize these distorted black holes by embedding their horizons in a global Euclidean three-space, E3. Such visualizations illustrate interesting and important information about horizon dynamics. Unfortunately, we could not visualize black holes with spin parameter a*>√{3 }/2 ≈0.866 : such holes cannot be globally embedded into E3. In this paper, we overcome this difficulty by showing how to embed the horizons of tidally distorted Kerr black holes in a hyperbolic three-space, H3. We use black hole perturbation theory to compute the Gaussian curvatures of tidally distorted event horizons, from which we build a two-dimensional metric of their distorted horizons. We develop a numerical method for embedding the tidally distorted horizons in H3. As an application, we give a sequence of embeddings into H3 of a tidally interacting black hole with spin a*=0.9999 . A small-amplitude, high-frequency oscillation seen in previous work shows up particularly clearly in these embeddings.

  13. Embedded fiber-optic sensing for accurate internal monitoring of cell state in advanced battery management systems part 1: Cell embedding method and performance

    NASA Astrophysics Data System (ADS)

    Raghavan, Ajay; Kiesel, Peter; Sommer, Lars Wilko; Schwartz, Julian; Lochbaum, Alexander; Hegyi, Alex; Schuh, Andreas; Arakaki, Kyle; Saha, Bhaskar; Ganguli, Anurag; Kim, Kyung Ho; Kim, ChaeAh; Hah, Hoe Jin; Kim, SeokKoo; Hwang, Gyu-Ok; Chung, Geun-Chang; Choi, Bokkyu; Alamgir, Mohamed

    2017-02-01

    A key challenge hindering the mass adoption of Lithium-ion and other next-gen chemistries in advanced battery applications such as hybrid/electric vehicles (xEVs) has been management of their functional performance for more effective battery utilization and control over their life. Contemporary battery management systems (BMS) reliant on monitoring external parameters such as voltage and current to ensure safe battery operation with the required performance usually result in overdesign and inefficient use of capacity. More informative embedded sensors are desirable for internal cell state monitoring, which could provide accurate state-of-charge (SOC) and state-of-health (SOH) estimates and early failure indicators. Here we present a promising new embedded sensing option developed by our team for cell monitoring, fiber-optic sensors. High-performance large-format pouch cells with embedded fiber-optic sensors were fabricated. The first of this two-part paper focuses on the embedding method details and performance of these cells. The seal integrity, capacity retention, cycle life, compatibility with existing module designs, and mass-volume cost estimates indicate their suitability for xEV and other advanced battery applications. The second part of the paper focuses on the internal strain and temperature signals obtained from these sensors under various conditions and their utility for high-accuracy cell state estimation algorithms.

  14. Estimating the decomposition of predictive information in multivariate systems

    NASA Astrophysics Data System (ADS)

    Faes, Luca; Kugiumtzis, Dimitris; Nollo, Giandomenico; Jurysta, Fabrice; Marinazzo, Daniele

    2015-03-01

    In the study of complex systems from observed multivariate time series, insight into the evolution of one system may be under investigation, which can be explained by the information storage of the system and the information transfer from other interacting systems. We present a framework for the model-free estimation of information storage and information transfer computed as the terms composing the predictive information about the target of a multivariate dynamical process. The approach tackles the curse of dimensionality employing a nonuniform embedding scheme that selects progressively, among the past components of the multivariate process, only those that contribute most, in terms of conditional mutual information, to the present target process. Moreover, it computes all information-theoretic quantities using a nearest-neighbor technique designed to compensate the bias due to the different dimensionality of individual entropy terms. The resulting estimators of prediction entropy, storage entropy, transfer entropy, and partial transfer entropy are tested on simulations of coupled linear stochastic and nonlinear deterministic dynamic processes, demonstrating the superiority of the proposed approach over the traditional estimators based on uniform embedding. The framework is then applied to multivariate physiologic time series, resulting in physiologically well-interpretable information decompositions of cardiovascular and cardiorespiratory interactions during head-up tilt and of joint brain-heart dynamics during sleep.

  15. Characterizing Exposure-Related Behaviors Using Agent-Based Models Embedded with Needs-Based Artificial Intelligence

    EPA Science Inventory

    Information on where and how individuals spend their time is important for characterizing exposures to chemicals in consumer products and in indoor environments. Traditionally, exposure assessors have relied on time-use surveys in order to obtain information on exposure-related b...

  16. Implementing Physical Best in Higher Education Courses

    ERIC Educational Resources Information Center

    Ayers, Suzan F.; Martinez, Ray D.

    2007-01-01

    Since the emphases of physical education teacher education (PETE) programs can be linked to quality K-12 instruction, embedding Physical Best (PB) materials into existing PETE curricula can be a practical means of addressing the obesity crisis in the public schools. The PB program is a comprehensive, health-related fitness education program that…

  17. The Case for Participatory Evaluation in an Era of Accountability

    ERIC Educational Resources Information Center

    Chouinard, Jill Anne

    2013-01-01

    Evaluation occurs within a specific context and is influenced by the economic, political, historical, and social forces that shape that context. The culture of evaluation is thus very much embedded in the culture of accountability that currently prevails in public sector institutions, policies, and program. As such, our understanding of the…

  18. 65 Years & Counting: AASL and School Librarians--Still Champions of Intellectual Freedom

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The American Association of School Librarians and its members have always been champions of intellectual freedom. It is a core value of school librarians and has been--and remains--an integral part of AASL's culture. Intellectual freedom is deeply embedded in AASL's standards, position statements, member-focused publications, conferences, award…

  19. A Critical Exploration of Collaborative and Distributed Leadership in Higher Education: Developing an Alternative Ontology through Leadership-as-Practice

    ERIC Educational Resources Information Center

    Youngs, Howard

    2017-01-01

    Since the turn of the millennium, interest in collaborative and distributed conceptualisations of leadership has gathered momentum, particularly in education. During the same period, higher education institutions have been embedded in practices shaped by New Public Management. The resultant reconfiguration of structural arrangements within…

  20. Uncovering Embedded Face Threat Mitigation in Landscape Architecture Critique Feedback

    ERIC Educational Resources Information Center

    Housley Gaffney, Amy L.

    2015-01-01

    Receiving public feedback on academic work may threaten students' face, particularly when such feedback is critical. One way that feedback may be cushioned is through face-threat mitigation techniques. I analyzed the use of such techniques in the feedback given by faculty and professionals to landscape architecture students as preparation for…

  1. Public and Scientists' Views on Science and Society

    ERIC Educational Resources Information Center

    Pew Research Center, 2015

    2015-01-01

    Scientific innovations are deeply embedded in national life--in the economy, in core policy choices about how people care for themselves and use the resources around them, and in the topmost reaches of Americans' imaginations. New Pew Research Center surveys of citizens and a representative sample of scientists connected to the American…

  2. Job-Embedded Professional Learning Essential to Improving Teaching and Learning in Early Education

    ERIC Educational Resources Information Center

    Pacchiano, Debra; Klein, Rebecca; Hawley, Marsha Shigeyo

    2016-01-01

    Improving classroom teaching improves children's learning outcomes. In pursuit of those goals, the early education field has made substantial investments aimed at increasing the quality of classroom environments and teacher-child interactions. Yet, in publicly funded programs across the country, the quality of instruction remains low and…

  3. Punking and Bullying: Strategies in Middle School, High School, and Beyond

    ERIC Educational Resources Information Center

    Phillips, Debby A.

    2007-01-01

    Punking is a practice of verbal and physical violence, humiliation, and shaming usually done in public by males to other males. This definition is based on interviews and discussion groups with 32 adolescent boys and on media sources within which adolescent males are embedded. Discourse analysis findings reveal that punking terminology and…

  4. Active Ingredients for an Embedded Intervention within the Early Childhood Classroom

    ERIC Educational Resources Information Center

    Blackwell, Angela Labrie; Dunn, Winnie

    2016-01-01

    As public education moves toward a tiered model of intervention (Response to Intervention), occupational therapists need to understand how to effectively implement interventions at each tier. The purpose of this article is to report about a process of examining teacher-therapist meeting transcripts from a feasibility study to find the active…

  5. What Is John Dewey Doing in "To Kill a Mockingbird"?

    ERIC Educational Resources Information Center

    Frank, Jeff

    2015-01-01

    Harper Lee's novel "To Kill a Mockingbird" is taught in countless public schools and is beloved by many teachers and future teachers. Embedded within this novel--interestingly--is a strong criticism of an approach to education mockingly referred to as the "Dewey Decimal System." In this essay I explore Lee's criticism of…

  6. Insights into the Intrinsic and Extrinsic Challenges for Implementing Technology Education: Case Studies of Queensland Teachers

    ERIC Educational Resources Information Center

    Finger, Glenn; Houguet, Belinda

    2009-01-01

    This study, embedded within the "Researching School Change in Technology Education" (RSCTE) project in Queensland, Australia, aimed to gain insights into the intrinsic and extrinsic challenges experienced by teachers during the implementation of technology education within primary school settings. The official publication and launch of…

  7. Consumer perceptions of graded, graphic and text label presentations for qualified health claims.

    PubMed

    Kapsak, Wendy Reinhardt; Schmidt, David; Childs, Nancy M; Meunier, John; White, Christy

    2008-03-01

    On December 18, 2002, the Food and Drug Administration (FDA) announced the Consumer Health Information for Better Nutrition Initiative. The initiative's goal is to make available more and better information about conventional foods and dietary supplements to help Americans improve their health and reduce risk of disease by making sound dietary decisions. It included a rating system to assess the "weight of the publicly available evidence." It assigns one of four ranked levels to the claim thus resulting in qualified health claims. Two phases of research were conducted by the International Food Information Council (IFIC) Foundation. Qualitative research to assess consumer understanding, vocabulary, and familiarity with claims helped with the design and orientation of the second quantitative research phase. The quantitative phase employed a Web-based survey. The claim formats included: report card graphic, report card text, embedded claim text, point-counterpoint, structure/function claim, and nutrient content claim. Respondents were asked to rate the product for perceived strength of scientific evidence provided to support the claim, and questions about the product's perceived healthfulness, quality, safety, and purchase intent. Consumers found it difficult to discriminate across four levels and showed inclination to project the scientific validity grade onto other product attributes. Consumers showed preference for simpler messages.

  8. Developing a theory of the societal lifecycle of cigarette smoking : explaining and anticipating trends using information feedback.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brodsky, Nancy S.; Glass, Robert John, Jr.; Zagonel, Aldo A.

    Cigarette smoking presented the most significant public health challenge in the United States in the 20th Century and remains the single most preventable cause of morbidity and mortality in this country. A number of System Dynamics models exist that inform tobacco control policies. We reviewed them and discuss their contributions. We developed a theory of the societal lifecycle of smoking, using a parsimonious set of feedback loops to capture historical trends and explore future scenarios. Previous work did not explain the long-term historical patterns of smoking behaviors. Much of it used stock-and-flow to represent the decline in prevalence in themore » recent past. With noted exceptions, information feedbacks were not embedded in these models. We present and discuss our feedback-rich conceptual model and illustrate the results of a series of simulations. A formal analysis shows phenomena composed of different phases of behavior with specific dominant feedbacks associated with each phase. We discuss the implications of our society's current phase, and conclude with simulations of what-if scenarios. Because System Dynamics models must contain information feedback to be able to anticipate tipping points and to help identify policies that exploit leverage in a complex system, we expanded this body of work to provide an endogenous representation of the century-long societal lifecycle of smoking.« less

  9. Geomorphology and American dams: The scientific, social, and economic context

    NASA Astrophysics Data System (ADS)

    Graf, William L.

    2005-10-01

    American geomorphologic research related to dams is embedded in a complicated context of science, policy, economics, and culture. Research into the downstream effects of large dams has progressed to the point of theory-building, but generalization and theory-building are from this research because (1) it is highly focused on a few locations, (2) it concerns mostly very large dams rather than a representative sample of sizes, (3) the available record of effects is too short to inform us on long-term changes, (4) the reversibility of changes imposed by dam installation and operation is unknown, and (5) coordinated funding for the needed research is scarce. In the scientific context, present research is embedded in a history of geomorphology in government service, with indistinct boundaries between "basic and applied" research. The federal policy that most strongly influences present geomorphological investigations connected with dams is related to habitat for endangered species, because the biological aspects of ecosystems are directly dependent on the substrate formed by the sediments and landforms that are influenced by dams. The economic context for research includes large amounts of public funds for river restoration, along with substantial private investments in dams; and geomorphology is central to these expensive issues. The cultural context for research is highly contentious and dominated by advocacy procedures that include intense scrutiny of any geomorphologic research related to dams. Advocates are likely to use the products of geomorphological research to make cases for their own positions.

  10. A Grassmann graph embedding framework for gait analysis

    NASA Astrophysics Data System (ADS)

    Connie, Tee; Goh, Michael Kah Ong; Teoh, Andrew Beng Jin

    2014-12-01

    Gait recognition is important in a wide range of monitoring and surveillance applications. Gait information has often been used as evidence when other biometrics is indiscernible in the surveillance footage. Building on recent advances of the subspace-based approaches, we consider the problem of gait recognition on the Grassmann manifold. We show that by embedding the manifold into reproducing kernel Hilbert space and applying the mechanics of graph embedding on such manifold, significant performance improvement can be obtained. In this work, the gait recognition problem is studied in a unified way applicable for both supervised and unsupervised configurations. Sparse representation is further incorporated in the learning mechanism to adaptively harness the local structure of the data. Experiments demonstrate that the proposed method can tolerate variations in appearance for gait identification effectively.

  11. Predicting Exposure to Consumer-Products Using Agent-Based Models Embedded with Needs-Based Artificial Intelligence and Empirically -Based Scheduling Models

    EPA Science Inventory

    Information on human behavior and consumer product use is important for characterizing exposures to chemicals in consumer products and in indoor environments. Traditionally, exposure-assessors have relied on time-use surveys to obtain information on exposure-related behavior. In ...

  12. Embedding Term Similarity and Inverse Document Frequency into a Logical Model of Information Retrieval.

    ERIC Educational Resources Information Center

    Losada, David E.; Barreiro, Alvaro

    2003-01-01

    Proposes an approach to incorporate term similarity and inverse document frequency into a logical model of information retrieval. Highlights include document representation and matching; incorporating term similarity into the measure of distance; new algorithms for implementation; inverse document frequency; and logical versus classical models of…

  13. Determinants of College Major Choice: Identification Using an Information Experiment. Working Paper #02-11

    ERIC Educational Resources Information Center

    Wiswall, Matthew; Zafar, Basit

    2011-01-01

    This paper studies the determinants of college major choice using a unique "information" experiment embedded in a survey. We first ask respondents their "self" beliefs--beliefs about their own expected earnings and other major-specific outcomes conditional on various majors, their "population" beliefs--beliefs about…

  14. Information Literacy for First-Year Students: An Embedded Curriculum Approach

    ERIC Educational Resources Information Center

    Andrews, T.; Patil, R.

    2007-01-01

    The ability to access, evaluate and synthesise high-quality research material is the backbone of critical thinking in academic and professional contexts for Engineers and Industrial Designers. This is the premise upon which teaching and library staff developed Information Literacy (IL) components in Engineering & Industrial Design Practice--a…

  15. Test Information Targeting Strategies for Adaptive Multistage Testing Designs.

    ERIC Educational Resources Information Center

    Luecht, Richard M.; Burgin, William

    Adaptive multistage testlet (MST) designs appear to be gaining popularity for many large-scale computer-based testing programs. These adaptive MST designs use a modularized configuration of preconstructed testlets and embedded score-routing schemes to prepackage different forms of an adaptive test. The conditional information targeting (CIT)…

  16. Program-Integrated Information Literacy Instruction for Online Graduate Students

    ERIC Educational Resources Information Center

    Kumar, Swapna; Ochoa, Marilyn

    2012-01-01

    Academic librarians often provide information literacy support for specific courses or topics in the form of research guides, one-shot training sessions, library orientations, or by embedding library content into online courses. Less frequently, they provide continuous program-level support on-campus or online. This paper highlights the value of…

  17. Beyond Library Walls: Embedding Librarians in Academic Departments

    ERIC Educational Resources Information Center

    Matava, Tobie; Coffey, Dan; Kushkowski, Jeffrey

    2010-01-01

    Today's academic library provides resources that users can access both physically in the library and virtually from academic offices. This increasing availability of online access means that information resources are no longer confined within library walls and librarians need to rethink how their constituents' information needs are being met.…

  18. 78 FR 76144 - Agency Information Collection Activities: Announcement of Board Approval Under Delegated...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-16

    ... requested that derivative `market-linked' CDs be excluded from the report since (1) the actual embedded... Federal Reserve will exclude derivative `market-linked' CDs from the report. F. Newly-Acquired Businesses... implementation of the following information collection: Report title: Report of Selected Money Market Rates...

  19. From Tenet to Practice: Putting Diversity-Informed Services into Action

    ERIC Educational Resources Information Center

    Ippen, Chandra Ghosh; Norona, Carmen Rosa; Thomas, Kandace

    2012-01-01

    The Diversity-Informed Infant Mental Health Tenets provide guidelines for addressing inequities in American society. Embedding the Tenets into infant mental health systems requires intentionality and careful consideration. With the use of vignettes, this article examines each Tenet and how infant mental health practitioners, agencies, and systems…

  20. Formative Assessment Probes: How Far Did It Go?

    ERIC Educational Resources Information Center

    Keeley, Page

    2011-01-01

    Assessment serves many purposes in the elementary classroom. Formative assessment, often called assessment for learning, is characterized by its primary purpose--promoting learning. It takes place both formally and informally, is embedded in various stages of an instructional cycle, informs the teacher about appropriate next steps for instruction,…

  1. Embedding Open-domain Common-sense Knowledge from Text

    PubMed Central

    Goodwin, Travis; Harabagiu, Sanda

    2017-01-01

    Our ability to understand language often relies on common-sense knowledge – background information the speaker can assume is known by the reader. Similarly, our comprehension of the language used in complex domains relies on access to domain-specific knowledge. Capturing common-sense and domain-specific knowledge can be achieved by taking advantage of recent advances in open information extraction (IE) techniques and, more importantly, of knowledge embeddings, which are multi-dimensional representations of concepts and relations. Building a knowledge graph for representing common-sense knowledge in which concepts discerned from noun phrases are cast as vertices and lexicalized relations are cast as edges leads to learning the embeddings of common-sense knowledge accounting for semantic compositionality as well as implied knowledge. Common-sense knowledge is acquired from a vast collection of blogs and books as well as from WordNet. Similarly, medical knowledge is learned from two large sets of electronic health records. The evaluation results of these two forms of knowledge are promising: the same knowledge acquisition methodology based on learning knowledge embeddings works well both for common-sense knowledge and for medical knowledge Interestingly, the common-sense knowledge that we have acquired was evaluated as being less neutral than than the medical knowledge, as it often reflected the opinion of the knowledge utterer. In addition, the acquired medical knowledge was evaluated as more plausible than the common-sense knowledge, reflecting the complexity of acquiring common-sense knowledge due to the pragmatics and economicity of language. PMID:28649676

  2. Reading in the Hyperconnected Information Era: Lessons from the Beijing Ticket Scam

    ERIC Educational Resources Information Center

    Ruth, Alison

    2009-01-01

    In this paper I argue that the kinds of literacy needed for making sense of information on websites is more nuanced and embedded in our everyday context that we are currently providing for learners. The kinds of analysis of websites which allow the processing of information in context are presented. This is demonstrated by an analysis of a scam…

  3. Changing Our Aim: Infiltrating Faculty with Information Literacy

    ERIC Educational Resources Information Center

    Cowan, Sandra; Eva, Nicole

    2016-01-01

    Librarians are stretched thin these days--budget cuts and decreasing numbers are forcing us to look at new ways of doing things. While the embedded information literacy model has gained popularity in the past number of years, it may be time for a new model of information literacy. We must arm teaching faculty with the tools they need to teach…

  4. On supervised graph Laplacian embedding CA model & kernel construction and its application

    NASA Astrophysics Data System (ADS)

    Zeng, Junwei; Qian, Yongsheng; Wang, Min; Yang, Yongzhong

    2017-01-01

    There are many methods to construct kernel with given data attribute information. Gaussian radial basis function (RBF) kernel is one of the most popular ways to construct a kernel. The key observation is that in real-world data, besides the data attribute information, data label information also exists, which indicates the data class. In order to make use of both data attribute information and data label information, in this work, we propose a supervised kernel construction method. Supervised information from training data is integrated into standard kernel construction process to improve the discriminative property of resulting kernel. A supervised Laplacian embedding cellular automaton model is another key application developed for two-lane heterogeneous traffic flow with the safe distance and large-scale truck. Based on the properties of traffic flow in China, we re-calibrate the cell length, velocity, random slowing mechanism and lane-change conditions and use simulation tests to study the relationships among the speed, density and flux. The numerical results show that the large-scale trucks will have great effects on the traffic flow, which are relevant to the proportion of the large-scale trucks, random slowing rate and the times of the lane space change.

  5. Visual communications with side information via distributed printing channels: extended multimedia and security perspectives

    NASA Astrophysics Data System (ADS)

    Voloshynovskiy, Sviatoslav V.; Koval, Oleksiy; Deguillaume, Frederic; Pun, Thierry

    2004-06-01

    In this paper we address visual communications via printing channels from an information-theoretic point of view as communications with side information. The solution to this problem addresses important aspects of multimedia data processing, security and management, since printed documents are still the most common form of visual information representation. Two practical approaches to side information communications for printed documents are analyzed in the paper. The first approach represents a layered joint source-channel coding for printed documents. This approach is based on a self-embedding concept where information is first encoded assuming a Wyner-Ziv set-up and then embedded into the original data using a Gel'fand-Pinsker construction and taking into account properties of printing channels. The second approach is based on Wyner-Ziv and Berger-Flynn-Gray set-ups and assumes two separated communications channels where an appropriate distributed coding should be elaborated. The first printing channel is considered to be a direct visual channel for images ("analog" channel with degradations). The second "digital channel" with constrained capacity is considered to be an appropriate auxiliary channel. We demonstrate both theoretically and practically how one can benefit from this sort of "distributed paper communications".

  6. Enabling private and public sector organizations as agents of homeland security

    NASA Astrophysics Data System (ADS)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  7. Investigation of the Impact of Extracting and Exchanging Health Information by Using Internet and Social Networks.

    PubMed

    Pistolis, John; Zimeras, Stelios; Chardalias, Kostas; Roupa, Zoe; Fildisis, George; Diomidous, Marianna

    2016-06-01

    Social networks (1) have been embedded in our daily life for a long time. They constitute a powerful tool used nowadays for both searching and exchanging information on different issues by using Internet searching engines (Google, Bing, etc.) and Social Networks (Facebook, Twitter etc.). In this paper, are presented the results of a research based on the frequency and the type of the usage of the Internet and the Social Networks by the general public and the health professionals. The objectives of the research were focused on the investigation of the frequency of seeking and meticulously searching for health information in the social media by both individuals and health practitioners. The exchanging of information is a procedure that involves the issues of reliability and quality of information. In this research, by using advanced statistical techniques an effort is made to investigate the participant's profile in using social networks for searching and exchanging information on health issues. Based on the answers 93 % of the people, use the Internet to find information on health-subjects. Considering principal component analysis, the most important health subjects were nutrition (0.719 %), respiratory issues (0.79 %), cardiological issues (0.777%), psychological issues (0.667%) and total (73.8%). The research results, based on different statistical techniques revealed that the 61.2% of the males and 56.4% of the females intended to use the social networks for searching medical information. Based on the principal components analysis, the most important sources that the participants mentioned, were the use of the Internet and social networks for exchanging information on health issues. These sources proved to be of paramount importance to the participants of the study. The same holds for nursing, medical and administrative staff in hospitals.

  8. Frontier Fields: Engaging Educators, the Youth, and the Public in Exploring the Cosmic Frontier

    NASA Astrophysics Data System (ADS)

    Lawton, Brandon L.; Eisenhamer, Bonnie; Smith, Denise A.; Summers, Frank; Darnell, John A.; Ryer, Holly

    2015-01-01

    The Frontier Fields is a multi-cycle program of six deep-field observations of strong-lensing galaxy clusters that will be taken in parallel with six deep 'blank fields.' The three-year long collaborative program is led by observations from NASA's Great Observatories. The observations allow astronomers to look deeper into the universe than ever before, and potentially uncover galaxies that are as much as 100 times fainter than what the telescopes can typically observe. The Frontier Fields science program is ideal for informing audiences about scientific advances and topics in STEM. The study of galaxy properties, statistics, optics, and Einstein's theory of general relativity naturally leverages off of the science returns of the Frontier Fields program. As a result, the Space Telescope Science Institute's Office of Public Outreach (OPO) has initiated an education and public outreach (EPO) project to follow the progress of the Frontier Fields.For over two decades, the Hubble EPO program has sought to bring the wonders of the universe to the education community, the youth, and the public, and engage audiences in the adventure of scientific discovery. Program components include standards-based curriculum-support materials, exhibits and exhibit components, professional development workshops, and direct interactions with scientists. We are also leveraging our new social media strategy to bring the science program to the public in the form of an ongoing blog. The main underpinnings of the program's infrastructure are scientist-educator development teams, partnerships, and an embedded program evaluation component. OPO is leveraging this existing infrastructure to bring the Frontier Fields science program to the education community and the public in a cost-effective way.The Frontier Fields program has just completed its first year. This talk will feature the goals and current status of the Frontier Fields EPO program. We will highlight OPO's strategies and infrastructure that allows for the quick delivery of groundbreaking science to the education community and public.

  9. User interfaces for computational science: A domain specific language for OOMMF embedded in Python

    NASA Astrophysics Data System (ADS)

    Beg, Marijan; Pepper, Ryan A.; Fangohr, Hans

    2017-05-01

    Computer simulations are used widely across the engineering and science disciplines, including in the research and development of magnetic devices using computational micromagnetics. In this work, we identify and review different approaches to configuring simulation runs: (i) the re-compilation of source code, (ii) the use of configuration files, (iii) the graphical user interface, and (iv) embedding the simulation specification in an existing programming language to express the computational problem. We identify the advantages and disadvantages of different approaches and discuss their implications on effectiveness and reproducibility of computational studies and results. Following on from this, we design and describe a domain specific language for micromagnetics that is embedded in the Python language, and allows users to define the micromagnetic simulations they want to carry out in a flexible way. We have implemented this micromagnetic simulation description language together with a computational backend that executes the simulation task using the Object Oriented MicroMagnetic Framework (OOMMF). We illustrate the use of this Python interface for OOMMF by solving the micromagnetic standard problem 4. All the code is publicly available and is open source.

  10. Gravity Cues Embedded in the Kinematics of Human Motion Are Detected in Form-from-Motion Areas of the Visual System and in Motor-Related Areas

    PubMed Central

    Cignetti, Fabien; Chabeauti, Pierre-Yves; Menant, Jasmine; Anton, Jean-Luc J. J.; Schmitz, Christina; Vaugoyeau, Marianne; Assaiante, Christine

    2017-01-01

    The present study investigated the cortical areas engaged in the perception of graviceptive information embedded in biological motion (BM). To this end, functional magnetic resonance imaging was used to assess the cortical areas active during the observation of human movements performed under normogravity and microgravity (parabolic flight). Movements were defined by motion cues alone using point-light displays. We found that gravity modulated the activation of a restricted set of regions of the network subtending BM perception, including form-from-motion areas of the visual system (kinetic occipital region, lingual gyrus, cuneus) and motor-related areas (primary motor and somatosensory cortices). These findings suggest that compliance of observed movements with normal gravity was carried out by mapping them onto the observer’s motor system and by extracting their overall form from local motion of the moving light points. We propose that judgment on graviceptive information embedded in BM can be established based on motor resonance and visual familiarity mechanisms and not necessarily by accessing the internal model of gravitational motion stored in the vestibular cortex. PMID:28861024

  11. Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

    PubMed Central

    Sang, Jun; Ling, Shenggui; Alam, Mohammad S.

    2012-01-01

    In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image embedded with hidden data. The performance of the proposed technique, including the hiding capacity, the recovery accuracy of the secret text, and the quality of the image embedded with hidden data, is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient. By using optical information processing techniques, the proposed method has been found to significantly improve the security of text information transmission, while ensuring hiding capacity at a prescribed level. PMID:23202003

  12. Acid-etching technique of non-decalcified bone samples for visualizing osteocyte-lacuno-canalicular network using scanning electron microscope.

    PubMed

    Lampi, Tiina; Dekker, Hannah; Ten Bruggenkate, Chris M; Schulten, Engelbert A J M; Mikkonen, Jopi J W; Koistinen, Arto; Kullaa, Arja M

    2018-01-01

    The aim of this study was to define the acid-etching technique for bone samples embedded in polymethyl metacrylate (PMMA) in order to visualize the osteocyte lacuno-canalicular network (LCN) for scanning electron microscopy (SEM). Human jaw bone tissue samples (N = 18) were collected from the study population consisting of patients having received dental implant surgery. After collection, the bone samples were fixed in 70% ethanol and non-decalcified samples embedded routinely into polymethyl metacrylate (PMMA). The PMMA embedded specimens were acid-etched in either 9 or 37% phosphoric acid (PA) and prepared for SEM for further analysis. PMMA embedded bone specimens acid-etched by 9% PA concentration accomplishes the most informative and favorable visualization of the LCN to be observed by SEM. Etching of PMMA embedded specimens is recommendable to start with 30 s or 40 s etching duration in order to find the proper etching duration for the samples examined. Visualizing osteocytes and LCN provides a tool to study bone structure that reflects changes in bone metabolism and diseases related to bone tissue. By proper etching protocol of non-decalcified and using scanning electron microscope it is possible to visualize the morphology of osteocytes and the network supporting vitality of bone tissue.

  13. ADAPTIVE METHODS FOR STOCHASTIC DIFFERENTIAL EQUATIONS VIA NATURAL EMBEDDINGS AND REJECTION SAMPLING WITH MEMORY.

    PubMed

    Rackauckas, Christopher; Nie, Qing

    2017-01-01

    Adaptive time-stepping with high-order embedded Runge-Kutta pairs and rejection sampling provides efficient approaches for solving differential equations. While many such methods exist for solving deterministic systems, little progress has been made for stochastic variants. One challenge in developing adaptive methods for stochastic differential equations (SDEs) is the construction of embedded schemes with direct error estimates. We present a new class of embedded stochastic Runge-Kutta (SRK) methods with strong order 1.5 which have a natural embedding of strong order 1.0 methods. This allows for the derivation of an error estimate which requires no additional function evaluations. Next we derive a general method to reject the time steps without losing information about the future Brownian path termed Rejection Sampling with Memory (RSwM). This method utilizes a stack data structure to do rejection sampling, costing only a few floating point calculations. We show numerically that the methods generate statistically-correct and tolerance-controlled solutions. Lastly, we show that this form of adaptivity can be applied to systems of equations, and demonstrate that it solves a stiff biological model 12.28x faster than common fixed timestep algorithms. Our approach only requires the solution to a bridging problem and thus lends itself to natural generalizations beyond SDEs.

  14. ADAPTIVE METHODS FOR STOCHASTIC DIFFERENTIAL EQUATIONS VIA NATURAL EMBEDDINGS AND REJECTION SAMPLING WITH MEMORY

    PubMed Central

    Rackauckas, Christopher

    2017-01-01

    Adaptive time-stepping with high-order embedded Runge-Kutta pairs and rejection sampling provides efficient approaches for solving differential equations. While many such methods exist for solving deterministic systems, little progress has been made for stochastic variants. One challenge in developing adaptive methods for stochastic differential equations (SDEs) is the construction of embedded schemes with direct error estimates. We present a new class of embedded stochastic Runge-Kutta (SRK) methods with strong order 1.5 which have a natural embedding of strong order 1.0 methods. This allows for the derivation of an error estimate which requires no additional function evaluations. Next we derive a general method to reject the time steps without losing information about the future Brownian path termed Rejection Sampling with Memory (RSwM). This method utilizes a stack data structure to do rejection sampling, costing only a few floating point calculations. We show numerically that the methods generate statistically-correct and tolerance-controlled solutions. Lastly, we show that this form of adaptivity can be applied to systems of equations, and demonstrate that it solves a stiff biological model 12.28x faster than common fixed timestep algorithms. Our approach only requires the solution to a bridging problem and thus lends itself to natural generalizations beyond SDEs. PMID:29527134

  15. Wireless and embedded carbon nanotube networks for damage detection in concrete structures

    NASA Astrophysics Data System (ADS)

    Saafi, Mohamed

    2009-09-01

    Concrete structures undergo an uncontrollable damage process manifesting in the form of cracks due to the coupling of fatigue loading and environmental effects. In order to achieve long-term durability and performance, continuous health monitoring systems are needed to make critical decisions regarding operation, maintenance and repairs. Recent advances in nanostructured materials such as carbon nanotubes have opened the door for new smart and advanced sensing materials that could effectively be used in health monitoring of structures where wireless and real time sensing could provide information on damage development. In this paper, carbon nanotube networks were embedded into a cement matrix to develop an in situ wireless and embedded sensor for damage detection in concrete structures. By wirelessly measuring the change in the electrical resistance of the carbon nanotube networks, the progress of damage can be detected and monitored. As a proof of concept, wireless cement-carbon nanotube sensors were embedded into concrete beams and subjected to monotonic and cyclic loading to evaluate the effect of damage on their response. Experimental results showed that the wireless response of the embedded nanotube sensors changes due to the formation of cracks during loading. In addition, the nanotube sensors were able to detect the initiation of damage at an early stage of loading.

  16. Teaching at the Interface: Curriculum and Pedagogy in a Teachers' Institute on Virginia Indian History and Cultures

    ERIC Educational Resources Information Center

    Heuvel, Lisa L.

    2011-01-01

    In the 1990s, as Virginia Indians faced the 2007 quadracentennial of Jamestown's founding, they initiated plans to publicly correct inaccuracies and omissions embedded in the historical narrative. The Beyond Jamestown: Virginia Indians Past and Present Teachers' Institute was one such initiative through the Virginia Foundation for the Humanities'…

  17. Art Integration Fosters Empathy in the Middle School Classroom

    ERIC Educational Resources Information Center

    Bradshaw, R. Darden

    2016-01-01

    In this article, I highlight findings from a nine-day unit embedded within a larger, four-month long qualitative action research study set in a public middle school. My goal in conducting this research was examination of relationships between visual culture and art integration as a method of fostering students to find voice while taking risks. A…

  18. Close Analysis of Texts with Structure (CATS): An Intervention to Teach Reading Comprehension to At-Risk Second Graders

    ERIC Educational Resources Information Center

    Williams, Joanna P.; Kao, Jenny C.; Pao, Lisa S.; Ordynans, Jill G.; Atkins, J. Grant; Cheng, Rong; DeBonis, Daniel

    2016-01-01

    We developed and evaluated an intervention that teaches reading comprehension via expository text structure training to second graders in urban public schools at risk for academic failure. Fifty lessons on 5 basic text structures (sequence, comparison, causation, description, and problem-solution) were embedded in a social studies curriculum that…

  19. A Data-Driven Conceptualization of Language Teacher Identity in the Context of Public High Schools in Iran

    ERIC Educational Resources Information Center

    Namaghi, Seyyed Ali Ostovar

    2009-01-01

    Teaching must be recognized "as a socially constructed activity that requires the interpretation and negotiation of meanings embedded within the context of the classroom." As part and parcel of this interpretation and negotiation, there is a continual redefinition of teacher identity. "Teaching and teacher identity are socially…

  20. The Spatialization of Racial Inequity and Educational Opportunity:Rethinking the Rural/Urban Divide

    ERIC Educational Resources Information Center

    Tieken, Mara Casey

    2017-01-01

    This analysis recounts and examines the history of American public education, focusing on the experiences of poor urban and rural students of color. Using the lens of critical race theory, it suggests that educational inequity is not just raced and classed but also spatialized--that is, embedded in and maintained through geography. The mechanisms…

  1. Accountability in Higher Education: Are There "Fatal Errors" Embedded in Current U.S. Policy Affecting Higher Education?

    ERIC Educational Resources Information Center

    Grantham, Marilyn H.

    Some observers of political phenomena are referring to the 1990s as the "age of accountability." Early in the decade of the '90s, articles in periodicals, professional journals and other sources were voicing warnings about increasing public policymaker frustration with higher education and the spreading development and implementation of…

  2. Enhancing the Value and Sustainability of Field Stations and Marine Laboratories in the 21st Century

    ERIC Educational Resources Information Center

    National Academies Press, 2014

    2014-01-01

    For over a century, field stations have been important entryways for scientists to study and make important discoveries about the natural world. They are centers of research, conservation, education, and public outreach, often embedded in natural environments that range from remote to densely populated urban locations. Because they lack…

  3. When Every Day Is Professional Development Day

    ERIC Educational Resources Information Center

    Tienken, Christopher H.; Stonaker, Lew

    2007-01-01

    In the Monroe Township (New Jersey) Public Schools, teachers' learning occurs daily, not just on one day in October and February. Central office and school-level administrators foster job-embedded teacher growth. Every day is a professional development day in the district, but that has not always been so. How did the district become a system with…

  4. Divide and Recombine for Large Complex Data

    DTIC Science & Technology

    2017-12-01

    Empirical Methods in Natural Language Processing , October 2014 Keywords Enter keywords for the publication. URL Enter the URL...low-latency data processing systems. Declarative Languages for Interactive Visualization: The Reactive Vega Stack Another thread of XDATA research...for array processing operations embedded in the R programming language . Vector virtual machines work well for long vectors. One of the most

  5. Exploring Embedded Remediation for Community College Career Technical Education Pathways: Promising Practices

    ERIC Educational Resources Information Center

    Cooper, Donna Walters

    2014-01-01

    Public community colleges enroll nearly half of all undergraduate students in the United States and many of these students are enrolled in 1- and 2-year Career and Technical Education programs. Employers have indicated that colleges should place more emphasis on reading, writing, and critical thinking skills. Career Technical Education can address…

  6. Transfer Entails Communication: The Public Understanding of (Social) Science as a Stage and a Play for Implementing Evidence-Based Prevention Knowledge and Programs.

    PubMed

    Bromme, Rainer; Beelmann, Andreas

    2018-04-01

    Many social science-based interventions entail the transfer of evidence-based knowledge to the "target population," because the acquisition and the acceptance of that knowledge are necessary for the intended improvement of behavior or development. Furthermore, the application of a certain prevention program is often legitimated by a reference to science-based reasons such as an evaluation according to scientific standards. Hence, any implementation of evidence-based knowledge and programs is embedded in the public understanding of (social) science. Based on recent research on such public understanding of science, we shall discuss transfer as a process of science communication.

  7. Disparate foundations of scientists’ policy positions on contentious biomedical research

    PubMed Central

    Edelmann, Achim; Moody, James; Light, Ryan

    2017-01-01

    What drives scientists’ position taking on matters where empirical answers are unavailable or contradictory? We examined the contentious debate on whether to limit experiments involving the creation of potentially pandemic pathogens. Hundreds of scientists, including Nobel laureates, have signed petitions on the debate, providing unique insights into how scientists take a public stand on important scientific policies. Using 19,257 papers published by participants, we reconstructed their collaboration networks and research specializations. Although we found significant peer associations overall, those opposing “gain-of-function” research are more sensitive to peers than are proponents. Conversely, specializing in fields directly related to gain-of-function research (immunology, virology) predicts public support better than specializing in fields related to potential pathogenic risks (such as public health) predicts opposition. These findings suggest that different social processes might drive support compared with opposition. Supporters are embedded in a tight-knit scholarly community that is likely both more familiar with and trusting of the relevant risk mitigation practices. Opponents, on the other hand, are embedded in a looser federation of widely varying academic specializations with cognate knowledge of disease and epidemics that seems to draw more heavily on peers. Understanding how scientists’ social embeddedness shapes the policy actions they take is important for helping sides interpret each other’s position accurately, avoiding echo-chamber effects, and protecting the role of scientific expertise in social policy. PMID:28559310

  8. Disparate foundations of scientists' policy positions on contentious biomedical research.

    PubMed

    Edelmann, Achim; Moody, James; Light, Ryan

    2017-06-13

    What drives scientists' position taking on matters where empirical answers are unavailable or contradictory? We examined the contentious debate on whether to limit experiments involving the creation of potentially pandemic pathogens. Hundreds of scientists, including Nobel laureates, have signed petitions on the debate, providing unique insights into how scientists take a public stand on important scientific policies. Using 19,257 papers published by participants, we reconstructed their collaboration networks and research specializations. Although we found significant peer associations overall, those opposing "gain-of-function" research are more sensitive to peers than are proponents. Conversely, specializing in fields directly related to gain-of-function research (immunology, virology) predicts public support better than specializing in fields related to potential pathogenic risks (such as public health) predicts opposition. These findings suggest that different social processes might drive support compared with opposition. Supporters are embedded in a tight-knit scholarly community that is likely both more familiar with and trusting of the relevant risk mitigation practices. Opponents, on the other hand, are embedded in a looser federation of widely varying academic specializations with cognate knowledge of disease and epidemics that seems to draw more heavily on peers. Understanding how scientists' social embeddedness shapes the policy actions they take is important for helping sides interpret each other's position accurately, avoiding echo-chamber effects, and protecting the role of scientific expertise in social policy.

  9. Advanced technologies for encryption of satellite links

    NASA Astrophysics Data System (ADS)

    McMahan, Sherry S.

    The use of encryption on satellite links is discussed. Advanced technology exists to provide transmission security for large earth station with data rates up to 50 megabits per second. One of the major concerns in the use of encryption equipment with very small aperture terminals (VSAT) is the key management issue and the related operational costs. The low cost requirement and the lack of physical protection of remote VSATs place severe constraints on the design of encryption equipment. Encryption may be accomplished by embedding a tamper proof encryption module into the baseband unit of each VSAT. VSAT networks are usually star networks where there is a single large earth station that serves as a hub and all satellite communications takes place between each VSAT and the hub earth station. The hub earth station has the secret master key of each VSAT. These master keys are used to downline load encrypted session keys to each VSAT. A more secure alternative is to use public key techniques where each embedded VSAT encryption module internally generates its own secret and public numbers. The secret number never leaves the module while the public number is sent to the hub at the time of initialization of the encryption module into the VSAT. Physical access control to encryption modules of VSAT systems can be implemented using passwords, smart cards or biometrics.

  10. From LPF to eLISA: new approach in payload software

    NASA Astrophysics Data System (ADS)

    Gesa, Ll.; Martin, V.; Conchillo, A.; Ortega, J. A.; Mateos, I.; Torrents, A.; Lopez-Zaragoza, J. P.; Rivas, F.; Lloro, I.; Nofrarias, M.; Sopuerta, CF.

    2017-05-01

    eLISA will be the first observatory in space to explore the Gravitational Universe. It will gather revolutionary information about the dark universe. This implies a robust and reliable embedded control software and hardware working together. With the lessons learnt with the LISA Pathfinder payload software as baseline, we will introduce in this short article the key concepts and new approaches that our group is working on in terms of software: multiprocessor, self-modifying-code strategies, 100% hardware and software monitoring, embedded scripting, Time and Space Partition among others.

  11. Time delayed Ensemble Nudging Method

    NASA Astrophysics Data System (ADS)

    An, Zhe; Abarbanel, Henry

    Optimal nudging method based on time delayed embedding theory has shows potentials on analyzing and data assimilation in previous literatures. To extend the application and promote the practical implementation, new nudging assimilation method based on the time delayed embedding space is presented and the connection with other standard assimilation methods are studied. Results shows the incorporating information from the time series of data can reduce the sufficient observation needed to preserve the quality of numerical prediction, making it a potential alternative in the field of data assimilation of large geophysical models.

  12. Multi-agent integrated password management (MIPM) application secured with encryption

    NASA Astrophysics Data System (ADS)

    Awang, Norkhushaini; Zukri, Nurul Hidayah Ahmad; Rashid, Nor Aimuni Md; Zulkifli, Zuhri Arafah; Nazri, Nor Afifah Mohd

    2017-10-01

    Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128-bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.

  13. Diversity and uniformity in genetic responsibility: moral attitudes of patients, relatives and lay people in Germany and Israel.

    PubMed

    Raz, Aviad E; Schicktanz, Silke

    2009-11-01

    The professional and institutional responsibility for handling genetic knowledge is well discussed; less attention has been paid to how lay people and particularly people who are affected by genetic diseases perceive and frame such responsibilities. In this exploratory study we qualitatively examine the attitudes of lay people, patients and relatives of patients in Germany and Israel towards genetic testing. These attitudes are further examined in the national context of Germany and Israel, which represent opposite regulatory approaches and bioethical debates concerning genetic testing. Three major themes of responsibility emerged from the inter-group and cross-cultural comparison: self-responsibility, responsibility for kin, and responsibility of society towards its members. National contrast was apparent in the moral reasoning of lay respondents concerning, for example, the right not to know versus the duty to know (self-responsibility) and the moral conflict concerning informing kin versus the moral duty to inform (responsibility for kin). Attitudes of respondents affected by genetic diseases were, however, rather similar in both countries. We conclude by discussing how moral discourses of responsibility are embedded within cultural (national, religious) as well as phenomenological (being affected) narratives, and the role of public engagement in bioethical discourse.

  14. Using Simultaneous Prompting to Teach Restaurant Words and Classifications as Non-Target Information to Secondary Students with Moderate to Severe Disabilities

    ERIC Educational Resources Information Center

    Smith, Bethany R.; Schuster, John W.; Collins, Belva; Kleinert, Harold

    2011-01-01

    This paper reviews selected literature pertaining to simultaneous prompting and the acquisition of non-target information for individuals with moderate to severe disabilities. The purpose of this review was to discuss the definition of non-target information (NTI) and the various places it can be embedded within an instructional trial. The…

  15. Biotechnology Education. Engaging the Learner: Embedding Information Literacy Skills into a Biotechnology Degree

    ERIC Educational Resources Information Center

    Ward, Helena; Hockey, Julie

    2007-01-01

    One of the challenges of the Biotechnology industry is keeping up to date with the rapid pace of change and that much of the information, which students learn in their undergraduate studies, will be out of date in a few years. It is therefore crucial that Biotechnology students have the skills to access the relevant information for their studies…

  16. Embedding multiple watermarks in the DFT domain using low- and high-frequency bands

    NASA Astrophysics Data System (ADS)

    Ganic, Emir; Dexter, Scott D.; Eskicioglu, Ahmet M.

    2005-03-01

    Although semi-blind and blind watermarking schemes based on Discrete Cosine Transform (DCT) or Discrete Wavelet Transform (DWT) are robust to a number of attacks, they fail in the presence of geometric attacks such as rotation, scaling, and translation. The Discrete Fourier Transform (DFT) of a real image is conjugate symmetric, resulting in a symmetric DFT spectrum. Because of this property, the popularity of DFT-based watermarking has increased in the last few years. In a recent paper, we generalized a circular watermarking idea to embed multiple watermarks in lower and higher frequencies. Nevertheless, a circular watermark is visible in the DFT domain, providing a potential hacker with valuable information about the location of the watermark. In this paper, our focus is on embedding multiple watermarks that are not visible in the DFT domain. Using several frequency bands increases the overall robustness of the proposed watermarking scheme. Specifically, our experiments show that the watermark embedded in lower frequencies is robust to one set of attacks, and the watermark embedded in higher frequencies is robust to a different set of attacks.

  17. Biomedical analysis of formalin-fixed, paraffin-embedded tissue samples: The Holy Grail for molecular diagnostics.

    PubMed

    Donczo, Boglarka; Guttman, Andras

    2018-06-05

    More than a century ago in 1893, a revolutionary idea about fixing biological tissue specimens was introduced by Ferdinand Blum, a German physician. Since then, a plethora of fixation methods have been investigated and used. Formalin fixation with paraffin embedment became the most widely used types of fixation and preservation method, due to its proper architectural conservation of tissue structures and cellular shape. The huge collection of formalin-fixed, paraffin-embedded (FFPE) sample archives worldwide holds a large amount of unearthed information about diseases that could be the Holy Grail in contemporary biomarker research utilizing analytical omics based molecular diagnostics. The aim of this review is to critically evaluate the omics options for FFPE tissue sample analysis in the molecular diagnostics field. Copyright © 2018. Published by Elsevier B.V.

  18. Compression embedding

    DOEpatents

    Sandford, M.T. II; Handel, T.G.; Bradley, J.N.

    1998-03-10

    A method of embedding auxiliary information into the digital representation of host data created by a lossy compression technique is disclosed. The method applies to data compressed with lossy algorithms based on series expansion, quantization to a finite number of symbols, and entropy coding. Lossy compression methods represent the original data as integer indices having redundancy and uncertainty in value by one unit. Indices which are adjacent in value are manipulated to encode auxiliary data. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user. Lossy compression methods use loss-less compressions known also as entropy coding, to reduce to the final size the intermediate representation as indices. The efficiency of the compression entropy coding, known also as entropy coding is increased by manipulating the indices at the intermediate stage in the manner taught by the method. 11 figs.

  19. Compression embedding

    DOEpatents

    Sandford, II, Maxwell T.; Handel, Theodore G.; Bradley, Jonathan N.

    1998-01-01

    A method of embedding auxiliary information into the digital representation of host data created by a lossy compression technique. The method applies to data compressed with lossy algorithms based on series expansion, quantization to a finite number of symbols, and entropy coding. Lossy compression methods represent the original data as integer indices having redundancy and uncertainty in value by one unit. Indices which are adjacent in value are manipulated to encode auxiliary data. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user. Lossy compression methods use loss-less compressions known also as entropy coding, to reduce to the final size the intermediate representation as indices. The efficiency of the compression entropy coding, known also as entropy coding is increased by manipulating the indices at the intermediate stage in the manner taught by the method.

  20. Digital interface of electronic transformers based on embedded system

    NASA Astrophysics Data System (ADS)

    Shang, Qiufeng; Qi, Yincheng

    2008-10-01

    Benefited from digital interface of electronic transformers, information sharing and system integration in substation can be realized. An embedded system-based digital output scheme of electronic transformers is proposed. The digital interface is designed with S3C44B0X 32bit RISC microprocessor as the hardware platform. The μCLinux operation system (OS) is transplanted on ARM7 (S3C44B0X). Applying Ethernet technology as the communication mode in the substation automation system is a new trend. The network interface chip RTL8019AS is adopted. Data transmission is realized through the in-line TCP/IP protocol of uClinux embedded OS. The application result and character analysis show that the design can meet the real-time and reliability requirements of IEC60044-7/8 electronic voltage/current instrument transformer standards.

  1. Manipulating Noise Frequencies Alters Hemispheric Contributions to Decision Making

    ERIC Educational Resources Information Center

    Gallagher, Patrick; Dagenbach, Dale

    2007-01-01

    Participants listened to the Asian disease problem framed in terms of either gains or losses and chose between two plans to combat the disease. All participants heard the problem embedded in other sounds; for some it was the relatively lower-frequency information, and for others it was the relatively higher-frequency information. The classic…

  2. Bedding down the Embedding: IL Reality in a Teacher Education Program

    ERIC Educational Resources Information Center

    Hobbs, Helen; Aspland, Tania

    2003-01-01

    Queensland University of Technology (QUT) is one of Australia's largest universities, enrolling 30 000 students. Our Information Literacy Framework and Syllabus was endorsed as university policy in February 2001. QUT Library uses the Australian Information Literacy Standards as the basis and entry point for our syllabus. The university-wide…

  3. Student Perception of Competence and Attitude in Middle School Physical Education

    ERIC Educational Resources Information Center

    Scrabis-Fletcher, Kristin; Silverman, Stephen

    2017-01-01

    Motivation is a dynamic process that accounts for the interaction and filtration of information by the student and the effect that it has on student behavior. Perception of competence, an embedded motivational theory, posits that the influence of prior experience and information received from outside sources affects student behavior (Harter,…

  4. Embedded Managers in Informal Learning Spaces

    ERIC Educational Resources Information Center

    Raisin, Victoria; Fennewald, Joseph

    2016-01-01

    Many universities have decided to invest in updating their informal learning spaces. One decision to be made in planning the space is how to staff it. The researchers carried out a qualitative case study to better understand the perspective of learning space managers who work in offices within their assigned space. The research generated six…

  5. A Semiotic Analysis of Icons on the World Wide Web.

    ERIC Educational Resources Information Center

    Ma, Yan

    The World Wide Web allows users to interact with a graphic interface to search information in a hypermedia and multimedia environment. Graphics serve as reference points on the World Wide Web for searching and retrieving information. This study analyzed the culturally constructed syntax patterns, or codes, embedded in the icons of library…

  6. Embedding Information Literacy in a First-Year Business Undergraduate Course

    ERIC Educational Resources Information Center

    Price, Robin; Becker, Karen; Clark, Lynette; Collins, Sue

    2011-01-01

    This article reports on a project to embed information literacy skills development in a first-year undergraduate business course at an Australian university. In accordance with prior research suggesting that first-year students are over-confident about their skills, the project used an optional online quiz to allow students to pre-test their…

  7. FERC examines transmission access pricing policies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Burkhart, L.A.

    1993-02-15

    The Federal Energy Regulatory Commission (FERC) has approved two orders dealing with transmission pricing issues that evolved from its March 1992 Pennsylvania Electric Co. (Penelec) decision dealing with cost recovery of transmission plant expansion. Commissioner Betsy Moler said the cases represented the first time the FERC has used incremental rates for wheeling transactions. In the first new order, Public Service Electric Gas Co. proposed charging for third-party transmission services to recover the sum of its standard embedded cost rate and the net incremental cost of making upgrades to its integrated transmission system. Public Service sought to provide service to EEAmore » I Limited, which proposed building and operating a cogeneration facility at a United States Gypsum Co. plant in New Jersey. Consolidated Edison Company of New York Inc. had agreed to purchase the project's output. In rejecting Public Service's proposal, the FERC ruled the utility must charge a transmission rate that is the higher of either its embedded cost rate or its incremental cost rate of accelerated expansion. (In this instance, the incremental rate was higher). In the second new order, Public Service Co. of Colorado (PSCC) filed a proposed open access transmission service tariff related to its acquisition of facilities from Colorado-Ute Electric Association Inc. The FERC rejected PSCC's tariff request that would have required a new transmission customer (in the event PSCC modified its integrated transmission grid) to pay the sum of PSCC's standard transmission rate (reflecting the average cost of the grid facilities) plus the expansion cost (reflecting the incremental facility cost).« less

  8. Super resolution reconstruction of μ-CT image of rock sample using neighbour embedding algorithm

    NASA Astrophysics Data System (ADS)

    Wang, Yuzhu; Rahman, Sheik S.; Arns, Christoph H.

    2018-03-01

    X-ray computed tomography (μ-CT) is considered to be the most effective way to obtain the inner structure of rock sample without destructions. However, its limited resolution hampers its ability to probe sub-micro structures which is critical for flow transportation of rock sample. In this study, we propose an innovative methodology to improve the resolution of μ-CT image using neighbour embedding algorithm where low frequency information is provided by μ-CT image itself while high frequency information is supplemented by high resolution scanning electron microscopy (SEM) image. In order to obtain prior for reconstruction, a large number of image patch pairs contain high- and low- image patches are extracted from the Gaussian image pyramid generated by SEM image. These image patch pairs contain abundant information about tomographic evolution of local porous structures under different resolution spaces. Relying on the assumption of self-similarity of porous structure, this prior information can be used to supervise the reconstruction of high resolution μ-CT image effectively. The experimental results show that the proposed method is able to achieve the state-of-the-art performance.

  9. Model-theoretic framework for sensor data fusion

    NASA Astrophysics Data System (ADS)

    Zavoleas, Kyriakos P.; Kokar, Mieczyslaw M.

    1993-09-01

    The main goal of our research in sensory data fusion (SDF) is the development of a systematic approach (a methodology) to designing systems for interpreting sensory information and for reasoning about the situation based upon this information and upon available data bases and knowledge bases. To achieve such a goal, two kinds of subgoals have been set: (1) develop a theoretical framework in which rational design/implementation decisions can be made, and (2) design a prototype SDF system along the lines of the framework. Our initial design of the framework has been described in our previous papers. In this paper we concentrate on the model-theoretic aspects of this framework. We postulate that data are embedded in data models, and information processing mechanisms are embedded in model operators. The paper is devoted to analyzing the classes of model operators and their significance in SDF. We investigate transformation abstraction and fusion operators. A prototype SDF system, fusing data from range and intensity sensors, is presented, exemplifying the structures introduced. Our framework is justified by the fact that it provides modularity, traceability of information flow, and a basis for a specification language for SDF.

  10. A mobile mapping system for spatial information based on DGPS/EGIS

    NASA Astrophysics Data System (ADS)

    Pei, Ling; Wang, Qing; Gu, Juan

    2007-11-01

    With the rapid developments of mobile device and wireless communication, it brings a new challenge for acquiring the spatial information. A mobile mapping system based on differential global position system (DGPS) integrated with embedded geographic information system (EGIS) is designed. A mobile terminal adapts to various GPS differential environments such as single base mode and network GPS mode like Virtual Reference Station (VRS) and Master- Auxiliary Concept (MAC) by the mobile communication technology. The spatial information collected through DGPS is organized in an EGIS running in the embedded device. A set of mobile terminal in real-time DGPS based on GPRS adopting multithreading technique of serial port in manner of simulating overlapped I/O operating is developed, further more, the GPS message analysis and checkout based on Strategy Pattern for various receivers are included in the process of development. A mobile terminal accesses to the GPS network successfully by NTRIP (Networked Transport of RTCM via Internet Protocol) compliance. Finally, the accuracy and reliability of the mobile mapping system are proved by a lot of testing in 9 provinces all over the country.

  11. Meanings of blood, bleeding and blood donations in Pakistan: implications for national vs global safe blood supply policies

    PubMed Central

    Mumtaz, Zubia; Bowen, Sarah; Mumtaz, Rubina

    2012-01-01

    Contemporary public policy, supported by international arbitrators of blood policy such as the World Health Organization and the International Federation of the Red Cross, asserts that the safest blood is that donated by voluntary, non-remunerated donors from low-risk groups of the population. These policies promote anonymous donation and discourage kin-based or replacement donation. However, there is reason to question whether these policies, based largely on Western research and beliefs, are the most appropriate for ensuring an adequate safe blood supply in many other parts of the world. This research explored the various and complex meanings embedded in blood using empirical ethnographic data from Pakistan, with the intent of informing development of a national blood policy in that country. Using a focused ethnographic approach, data were collected in 26 in-depth interviews, 6 focus group discussions, 12 key informant interviews and 25 hours of observations in blood banks and maternity and surgical wards. The key finding was that notions of caste-based purity of blood, together with the belief that donors and recipients are symbolically knitted in a kin relationship, place a preference on kin-blood. The anonymity inherent in current systems of blood extraction, storage and use as embedded in contemporary policy discourse and practice was problematic as it blurred distinctions that were important within this society. The article highlights the importance—to ensuring a safe blood supply—of basing blood procurement policies on local, context-specific belief systems rather than relying on uniform, one-size-fits-all global policies. Drawing on our empirical findings and the literature, it is argued that the practice of kin-donated blood remains a feasible alternative to the global ideal of voluntary, anonymous donations. There is a need to focus on developing context-sensitive strategies for promoting blood safety, and critically revisit the assumptions underlying contemporary global blood procurement policies. PMID:21372061

  12. Examining the online approaches used by hospitals in Sydney, Australia to inform patients about healthcare associated infections and infection prevention strategies.

    PubMed

    Park, J; Seale, H

    2017-12-21

    Provision of information plays a critical role in supporting patients to be engaged or empowered to be involved with infection prevention measures in hospitals. This explorative study evaluated the suitability, readability and accessibility of information on healthcare associated infections (HCAIs) and infection prevention strategies targeted at patients from the websites of 19 acute care public hospitals in Sydney, Australia. We included hospitals with greater than 200 beds in the sample. We examined online information targeted at patients on HCAIs and infection prevention and compared it using the Suitability Assessment of Material (SAM) and Simple Measure of Gobbledygook (SMOG) readability formulas for suitability, readability and accessibility. Thirty-six webpages were identified as being relevant and containing information about HCAIs or infection prevention. Based on the SAM/SMOG scores, only three webpages were found to be 'superior'. Many of the webpages scored poorly in content, literacy, graphics, learning stimulation and cultural appropriateness. In comparison, most of the webpages scored well in the layout and typography. The majority (97%) of the materials were written at a level higher than the recommended reading grade level. Lastly, the websites scored poorly on the ability to locate the information easily, as messages about HCAIs/infection prevention were usually embedded into other topics. While providing information online is only one approach to delivering messages about infection prevention, it is becoming increasingly important in today's technology society. Hospitals are neglecting to use best practices when designing their online resources and current websites are difficult to navigate. The findings point to the need to review patient information on HCAIs regarding suitability, readability and accessibility.

  13. A novel image watermarking method based on singular value decomposition and digital holography

    NASA Astrophysics Data System (ADS)

    Cai, Zhishan

    2016-10-01

    According to the information optics theory, a novel watermarking method based on Fourier-transformed digital holography and singular value decomposition (SVD) is proposed in this paper. First of all, a watermark image is converted to a digital hologram using the Fourier transform. After that, the original image is divided into many non-overlapping blocks. All the blocks and the hologram are decomposed using SVD. The singular value components of the hologram are then embedded into the singular value components of each block using an addition principle. Finally, SVD inverse transformation is carried out on the blocks and hologram to generate the watermarked image. The watermark information embedded in each block is extracted at first when the watermark is extracted. After that, an averaging operation is carried out on the extracted information to generate the final watermark information. Finally, the algorithm is simulated. Furthermore, to test the encrypted image's resistance performance against attacks, various attack tests are carried out. The results show that the proposed algorithm has very good robustness against noise interference, image cut, compression, brightness stretching, etc. In particular, when the image is rotated by a large angle, the watermark information can still be extracted correctly.

  14. The effects of community pharmacy public health interventions on population health and health inequalities: a systematic review of reviews protocol.

    PubMed

    Hillier-Brown, Frances; Bambra, Clare; Thomson, Katie; Balaj, Mirza; Walton, Nick; Todd, Adam

    2017-08-30

    Community pharmacies have great potential to deliver services aimed at promoting health and preventing disease, and are embedded within communities. In the light of a rapid increase in community pharmacy-delivered public health services and an accompanying increase in the evidence base, this systematic review of reviews will synthesise systematic reviews of public health community pharmacy interventions and assess their effects on public health and health inequalities. Systematic review methodology will be used to identify all systematic reviews that describe the health and health equity effects of community pharmacy public health interventions. Twenty databases will be searched using a pre-determined search strategy to evaluate community pharmacy-delivered public health interventions. Findings from the included reviews will be pooled, and a narrative synthesis executed to identify overarching patterns and results. Findings will support future decision-making around how community pharmacy public health services can be used alongside other strategies to promote health, prevent disease and reduce health inequalities. PROSPERO registration number: CRD42017056264 .

  15. Information diffusion, Facebook clusters, and the simplicial model of social aggregation: a computational simulation of simplicial diffusers for community health interventions.

    PubMed

    Kee, Kerk F; Sparks, Lisa; Struppa, Daniele C; Mannucci, Mirco A; Damiano, Alberto

    2016-01-01

    By integrating the simplicial model of social aggregation with existing research on opinion leadership and diffusion networks, this article introduces the constructs of simplicial diffusers (mathematically defined as nodes embedded in simplexes; a simplex is a socially bonded cluster) and simplicial diffusing sets (mathematically defined as minimal covers of a simplicial complex; a simplicial complex is a social aggregation in which socially bonded clusters are embedded) to propose a strategic approach for information diffusion of cancer screenings as a health intervention on Facebook for community cancer prevention and control. This approach is novel in its incorporation of interpersonally bonded clusters, culturally distinct subgroups, and different united social entities that coexist within a larger community into a computational simulation to select sets of simplicial diffusers with the highest degree of information diffusion for health intervention dissemination. The unique contributions of the article also include seven propositions and five algorithmic steps for computationally modeling the simplicial model with Facebook data.

  16. Strategic analytics: towards fully embedding evidence in healthcare decision-making.

    PubMed

    Garay, Jason; Cartagena, Rosario; Esensoy, Ali Vahit; Handa, Kiren; Kane, Eli; Kaw, Neal; Sadat, Somayeh

    2015-01-01

    Cancer Care Ontario (CCO) has implemented multiple information technology solutions and collected health-system data to support its programs. There is now an opportunity to leverage these data and perform advanced end-to-end analytics that inform decisions around improving health-system performance. In 2014, CCO engaged in an extensive assessment of its current data capacity and capability, with the intent to drive increased use of data for evidence-based decision-making. The breadth and volume of data at CCO uniquely places the organization to contribute to not only system-wide operational reporting, but more advanced modelling of current and future state system management and planning. In 2012, CCO established a strategic analytics practice to assist the agency's programs contextualize and inform key business decisions and to provide support through innovative predictive analytics solutions. This paper describes the organizational structure, services and supporting operations that have enabled progress to date, and discusses the next steps towards the vision of embedding evidence fully into healthcare decision-making. Copyright © 2014 Longwoods Publishing.

  17. Application of interactive motion charts for displaying liver transplantation data in public websites.

    PubMed

    Santori, G

    2014-09-01

    In the past several years a vast amount of digital information has become available in every field of science, and ideas to apply improved strategies for obtaining a more in-depth knowledge of the data are considered in many areas. Although several American and European organizations show regularly in their public websites the aggregated results of organ donation and transplantation, no tools are provided to engage with the final users and to enable them to handle these data. In this study, a new model of Web-based interactive motion charts was applied to aggregated liver transplantation data obtained from a consecutive 28-year series of liver transplantation performed in a single Italian center. The interactive charts were obtained by combining the Google visualization application programming interface and the googleVis package within the open source statistical environment R. The interactive charts may be embedded into online/offline Web pages and rendered in each common browser. The users may interact with the charts by selecting chart type (bubble, bar, or line chart), x- and y-axis scales (linear or logarithmic), variables, bubble size, color, and even changing opacity of unselected items. Moreover, the charts may dynamically display the trend over time of each continuous/categoric variable, allowing users both to trace how the lines changes over time and to control the animation speed. The interactive motion charts should be used in the public websites that manage aggregated data concerning organ donation and transplantation. Copyright © 2014 Elsevier Inc. All rights reserved.

  18. Anticipating health innovations in 2030-2040: Where does responsibility lie for the publics?

    PubMed

    Lehoux, Pascale; Miller, Fiona A; Grimard, Dominique; Gauthier, Philippe

    2018-04-01

    Considering that public engagement is pivotal to the mission of Responsible Research and Innovation, this article's aim is to examine how members of the public conceive of the relationship between responsibility and prospective health technologies. We organized four face-to-face deliberative workshops and an online forum wherein participants were invited to comment on scenarios involving three fictional technologies in 2030 and 2040. Our analyses describe how participants anticipated these technologies' impacts and formulated two conditions for their use: they should (1) be embedded within professional care and services and (2) include social protection of individual freedom and privacy. By clarifying what technological direction shall be avoided and who shall act responsibly, these conditions emphasize our participants' understanding of society as much as their understanding of science. For new technologies to be deployed in socially responsible ways, public engagement methods should be developed alongside public governance and regulatory strategies.

  19. Contested evidence: Exposure to competing scientific claims and public support for banning bisphenol A.

    PubMed

    Brewer, Paul R; Ley, Barbara L

    2014-05-01

    The public controversy surrounding bisphenol A (BPA) revolves around competing claims about what scientific evidence shows regarding the effects of the chemical on human health. This study uses an experiment embedded within a public opinion survey to test the effects of exposure to such claims on public support for banning the use of BPA in products. Exposure to the claim that "there is not enough scientific evidence that BPA harms human health" reduced support, whereas exposure to the claim that there "is enough scientific evidence" failed to increase support. No effect emerged among those simultaneously exposed to both claims. The "not enough evidence" claim influenced less educated respondents and women but not college-educated respondents or men. Aspects of the underlying structure of opinion also differed depending on which claim(s) respondents received. The results illuminate how members of the public respond to competing scientific claims regarding controversial issues.

  20. "Focus on glaciers": an exposition of geo-photos to attract interest on a vanishing beauty

    NASA Astrophysics Data System (ADS)

    Rossi, Giuliana; Bohm, Gualtiero; Saraò, Angela

    2016-04-01

    Public awareness of the effects of industrial activity on the environment and climate is growing, but the information needs to be disseminated to a larger number of people, of all ages, to be effective. Images can certainly be an optimal tool to communicate the important message of global warming effects and, thanks to the digital techniques, photography is gaining a new popularity. Anybody, owning just a phone or a tablet, has a camera to catch images that can be immediately spread worldwide via web sites, on-line newspapers, social media or blogs to convey messages and emotions. Fine art photography can surely help in attracting interest and in educating people. For this reason, we organize an exposition of artistic pictures; the beauty of the images attracts the eyes of the public, discovering an unknown reality and gives the opportunity to illustrate the dramatic retreat of the Alpine glaciers, and the majesty of the Antarctic landscape, put in danger by the climate changes. The glaciers are the main characters, with the infinite grey-blue shadows due to change in ice density, the spectacular staircases created by the seracs, and the contrast with the embedding rocks. A sub-set of the images will be presented in this context.

  1. Gender on the brain: a case study of science communication in the new media environment.

    PubMed

    O'Connor, Cliodhna; Joffe, Helene

    2014-01-01

    Neuroscience research on sex difference is currently a controversial field, frequently accused of purveying a 'neurosexism' that functions to naturalise gender inequalities. However, there has been little empirical investigation of how information about neurobiological sex difference is interpreted within wider society. This paper presents a case study that tracks the journey of one high-profile study of neurobiological sex differences from its scientific publication through various layers of the public domain. A content analysis was performed to ascertain how the study was represented in five domains of communication: the original scientific article, a press release, the traditional news media, online reader comments and blog entries. Analysis suggested that scientific research on sex difference offers an opportunity to rehearse abiding cultural understandings of gender. In both scientific and popular contexts, traditional gender stereotypes were projected onto the novel scientific information, which was harnessed to demonstrate the factual truth and normative legitimacy of these beliefs. Though strains of misogyny were evident within the readers' comments, most discussion of the study took pains to portray the sexes' unique abilities as equal and 'complementary'. However, this content often resembled a form of benevolent sexism, in which praise of women's social-emotional skills compensated for their relegation from more esteemed trait-domains, such as rationality and productivity. The paper suggests that embedding these stereotype patterns in neuroscience may intensify their rhetorical potency by lending them the epistemic authority of science. It argues that the neuroscience of sex difference does not merely reflect, but can actively shape the gender norms of contemporary society.

  2. Gender on the Brain: A Case Study of Science Communication in the New Media Environment

    PubMed Central

    O’Connor, Cliodhna; Joffe, Helene

    2014-01-01

    Neuroscience research on sex difference is currently a controversial field, frequently accused of purveying a ‘neurosexism’ that functions to naturalise gender inequalities. However, there has been little empirical investigation of how information about neurobiological sex difference is interpreted within wider society. This paper presents a case study that tracks the journey of one high-profile study of neurobiological sex differences from its scientific publication through various layers of the public domain. A content analysis was performed to ascertain how the study was represented in five domains of communication: the original scientific article, a press release, the traditional news media, online reader comments and blog entries. Analysis suggested that scientific research on sex difference offers an opportunity to rehearse abiding cultural understandings of gender. In both scientific and popular contexts, traditional gender stereotypes were projected onto the novel scientific information, which was harnessed to demonstrate the factual truth and normative legitimacy of these beliefs. Though strains of misogyny were evident within the readers’ comments, most discussion of the study took pains to portray the sexes’ unique abilities as equal and ‘complementary’. However, this content often resembled a form of benevolent sexism, in which praise of women’s social-emotional skills compensated for their relegation from more esteemed trait-domains, such as rationality and productivity. The paper suggests that embedding these stereotype patterns in neuroscience may intensify their rhetorical potency by lending them the epistemic authority of science. It argues that the neuroscience of sex difference does not merely reflect, but can actively shape the gender norms of contemporary society. PMID:25354280

  3. Hall effect encoding of brushless dc motors

    NASA Technical Reports Server (NTRS)

    Berard, C. A.; Furia, T. J.; Goldberg, E. A.; Greene, R. C.

    1970-01-01

    Encoding mechanism integral to the motor and using the permanent magnets embedded in the rotor eliminates the need for external devices to encode information relating the position and velocity of the rotating member.

  4. 77 FR 27781 - Agency Information Collection Activities: Proposed Collection: Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ... progress towards a high-quality home visiting program or embedding their home visiting program into a comprehensive, high-quality early childhood system. Thirteen States were awarded Development Grants, and nine...

  5. Structured sparse linear graph embedding.

    PubMed

    Wang, Haixian

    2012-03-01

    Subspace learning is a core issue in pattern recognition and machine learning. Linear graph embedding (LGE) is a general framework for subspace learning. In this paper, we propose a structured sparse extension to LGE (SSLGE) by introducing a structured sparsity-inducing norm into LGE. Specifically, SSLGE casts the projection bases learning into a regression-type optimization problem, and then the structured sparsity regularization is applied to the regression coefficients. The regularization selects a subset of features and meanwhile encodes high-order information reflecting a priori structure information of the data. The SSLGE technique provides a unified framework for discovering structured sparse subspace. Computationally, by using a variational equality and the Procrustes transformation, SSLGE is efficiently solved with closed-form updates. Experimental results on face image show the effectiveness of the proposed method. Copyright © 2011 Elsevier Ltd. All rights reserved.

  6. Non-uniform multivariate embedding to assess the information transfer in cardiovascular and cardiorespiratory variability series.

    PubMed

    Faes, Luca; Nollo, Giandomenico; Porta, Alberto

    2012-03-01

    The complexity of the short-term cardiovascular control prompts for the introduction of multivariate (MV) nonlinear time series analysis methods to assess directional interactions reflecting the underlying regulatory mechanisms. This study introduces a new approach for the detection of nonlinear Granger causality in MV time series, based on embedding the series by a sequential, non-uniform procedure, and on estimating the information flow from one series to another by means of the corrected conditional entropy. The approach is validated on short realizations of linear stochastic and nonlinear deterministic processes, and then evaluated on heart period, systolic arterial pressure and respiration variability series measured from healthy humans in the resting supine position and in the upright position after head-up tilt. Copyright © 2011 Elsevier Ltd. All rights reserved.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hymel, Ross

    The Public Key (PK) FPGA software performs asymmetric authentication using the 163-bit Elliptic Curve Digital Signature Algorithm (ECDSA) on an embedded FPGA platform. A digital signature is created on user-supplied data, and communication with a host system is performed via a Serial Peripheral Interface (SPI) bus. Software includes all components necessary for signing, including custom random number generator for key creation and SHA-256 for data hashing.

  8. Whose Web of Knowledge[TM] Is It Anyway?: Citing Feminist Research in the Field of Higher Education

    ERIC Educational Resources Information Center

    Hart, Jeni; Metcalfe, Amy Scott

    2010-01-01

    We examined the post-publication period of six feminist articles (Hart, 2006) using citation indexing. From our findings, we argue that both indexes are embedded within an enduring system of academic patriarchy and neither index truly measures impact of scholarly work. Implications of current impact measures for promotion, tenure, and merit are…

  9. 2015 Marine Corps Security Environment Forecast: Futures 2030-2045

    DTIC Science & Technology

    2015-01-01

    The technologies that make the iPhone “smart” were publically funded—the Internet, wireless networks, the global positioning system, microelectronics...Energy Revolution (63 percent);  Internet of Things (ubiquitous sensors embedded in interconnected computing devices) (50 percent);  “Sci-Fi...Neuroscience & artificial intelligence - Sensors /control systems -Power & energy -Human-robot interaction Robots/autonomous systems will become part of the

  10. Educating for Democracy in a Partisan Age: Confronting the Challenges of Motivated Reasoning and Misinformation

    ERIC Educational Resources Information Center

    Kahne, Joseph; Bowyer, Benjamin

    2017-01-01

    This article investigates youth judgments of the accuracy of truth claims tied to controversial public issues. In an experiment embedded within a nationally representative survey of youth ages 15 to 27 (N = 2,101), youth were asked to judge the accuracy of one of several simulated online posts. Consistent with research on motivated reasoning,…

  11. Job Embedded Teacher Leadership Training: A Study of Teacher Empowerment in an Elementary Public School District

    ERIC Educational Resources Information Center

    Banker, Lauren Langer

    2017-01-01

    This mixed-methodology case study explored one district's attempt to provide teacher leadership training in an effort to increase feelings of empowerment. Empowerment is defined as the degree to which an individual feels capable of influencing his or her work role and context (Spreitzer, 1995) and in the field of education, empowering teachers is…

  12. Creating an Online Laboratory

    DTIC Science & Technology

    2015-03-18

    Problem (TSP) to solve, a canonical computer science problem that involves identifying the shortest itinerary for a hypothetical salesman traveling among a...also created working versions of the travelling salesperson problem , prisoners’ dilemma, public goods game, ultimatum game, word ladders, and...the task within networks of others performing the task. Thus, we built five problems which could be embedded in networks: the traveling salesperson

  13. In Challenging Times, Might the Equality Act 2010 Assist Universities in Embracing and Embedding Widening Participation?

    ERIC Educational Resources Information Center

    Lewis, Kenton; Hammond, John; Horvers, Kea

    2012-01-01

    Not for the first time in its history, the UK Higher Education sector finds itself in a position of significant financial constraint. The current coalition Government's actions to address the budget deficit have led to sweeping cuts across many public sector departments, but it is higher education that has seen the most draconian reduction in…

  14. An integrated framework for detecting suspicious behaviors in video surveillance

    NASA Astrophysics Data System (ADS)

    Zin, Thi Thi; Tin, Pyke; Hama, Hiromitsu; Toriu, Takashi

    2014-03-01

    In this paper, we propose an integrated framework for detecting suspicious behaviors in video surveillance systems which are established in public places such as railway stations, airports, shopping malls and etc. Especially, people loitering in suspicion, unattended objects left behind and exchanging suspicious objects between persons are common security concerns in airports and other transit scenarios. These involve understanding scene/event, analyzing human movements, recognizing controllable objects, and observing the effect of the human movement on those objects. In the proposed framework, multiple background modeling technique, high level motion feature extraction method and embedded Markov chain models are integrated for detecting suspicious behaviors in real time video surveillance systems. Specifically, the proposed framework employs probability based multiple backgrounds modeling technique to detect moving objects. Then the velocity and distance measures are computed as the high level motion features of the interests. By using an integration of the computed features and the first passage time probabilities of the embedded Markov chain, the suspicious behaviors in video surveillance are analyzed for detecting loitering persons, objects left behind and human interactions such as fighting. The proposed framework has been tested by using standard public datasets and our own video surveillance scenarios.

  15. Public Acceptance for Geological CO2-Storage

    NASA Astrophysics Data System (ADS)

    Schilling, F.; Ossing, F.; Würdemann, H.; Co2SINK Team

    2009-04-01

    Public acceptance is one of the fundamental prerequisites for geological CO2 storage. In highly populated areas like central Europe, especially in the vicinity of metropolitan areas like Berlin, underground operations are in the focus of the people living next to the site, the media, and politics. To gain acceptance, all these groups - the people in the neighbourhood, journalists, and authorities - need to be confident of the security of the planned storage operation as well as the long term security of storage. A very important point is to show that the technical risks of CO2 storage can be managed with the help of a proper short and long term monitoring concept, as well as appropriate mitigation technologies e.g adequate abandonment procedures for leaking wells. To better explain the possible risks examples for leakage scenarios help the public to assess and to accept the technical risks of CO2 storage. At Ketzin we tried the following approach that can be summed up on the basis: Always tell the truth! This might be self-evident but it has to be stressed that credibility is of vital importance. Suspiciousness and distrust are best friends of fear. Undefined fear seems to be the major risk in public acceptance of geological CO2-storage. Misinformation and missing communication further enhance the denial of geological CO2 storage. When we started to plan and establish the Ketzin storage site, we ensured a forward directed communication. Offensive information activities, an information centre on site, active media politics and open information about the activities taking place are basics. Some of the measures were: - information of the competent authorities through meetings (mayor, governmental authorities) - information of the local public, e.g. hearings (while also inviting local, regional and nation wide media) - we always treated the local people and press first! - organizing of bigger events to inform the public on site, e.g. start of drilling activities (open for public, press, NGOs,…). - being open for visitors (first of all for the local!) often we informed the public together with the mining authorities - being open for podium discussions and presentation etc. - organized by NGOs, Student groups, press, politics, scientific meetings… Since people usually trust scientists more than politicians and companies, scientists have an enhanced responsibility while informing the public. Once again - always tell the truth and take care of your credibility! In this case, it was most helpful that the project was embedded in the broad scientific activity of research centre which seems to have given the project a positive neutral background. As many people have an undefined fear of all operations in the underground, we tried to address all issues related to storage. Ranging from the transport, injection facility, technical installation, safety of the storage site, the wells, hydraulic system, chemical reactions etc.. When addressing all major concerns before people ask, confidence to the scientists is kept high. We never said that there is absolutely no risk (by the way, nobody would believe that!) we weighted the risk with respect to health, safety and environmental HSE issues. We explained in detail the different trapping mechanisms of the storage operation. This has to be done according to the social groups involved. For the broad public common analogues were helpful: - Trapping in the pore space - a sponge - Trapping through a tight cap rock - a bottle of mineral water with a crown cap as seal - Chemical Trapping - opening of a bottle of mineral water - Well bore integrity - problem of retightening of a bottle with a crown cap - Sucking in of fluid -instead of releasing a sandstone sample standing partly in water - Injecting of CO2 - using a soda machine - Often the concern of burning gas is addressed - showing a CO2 fire extinguisher -CO is poisonous, CO2 not: - drinking soda or even better? champaigne Beyond information of the local public, we put some effort in informing interested people, media, politicians on all leveles: regional, state, federal state and European. If suspiciousness and distrust are the enemy of acceptance telling the truth and honesty is its best friend. Role of the media The key arguments find their way to the broad public through the media. Therefore the media have to be seen as partners in science communication, not as enterprise strategy proliferators. Journalists want their story: combine the true story with the true scientific content and you have the chance to get your information into the public. Neutrality and credibility also here are vital issues. We never told that CCS is the simple solution for the climate change problem (which it even cannot be) but that it is a bridge technology for some decades which might give us some more time to change energy production and consumption. All our media activities followed this rule.

  16. The ethics of Google Earth: crossing thresholds from spatial data to landscape visualisation.

    PubMed

    Sheppard, Stephen R J; Cizek, Petr

    2009-05-01

    'Virtual globe' software systems such as Google Earth are growing rapidly in popularity as a way to visualise and share 3D environmental data. Scientists and environmental professionals, many of whom are new to 3D modeling and visual communications, are beginning routinely to use such techniques in their work. While the appeal of these techniques is evident, with unprecedented opportunities for public access to data and collaborative engagement over the web, are there nonetheless risks in their widespread usage when applied in areas of the public interest such as planning and policy-making? This paper argues that the Google Earth phenomenon, which features realistic imagery of places, cannot be dealt with only as a question of spatial data and geographic information science. The virtual globe type of visualisation crosses several key thresholds in communicating scientific and environmental information, taking it well beyond the realm of conventional spatial data and geographic information science, and engaging more complex dimensions of human perception and aesthetic preference. The realism, perspective views, and social meanings of the landscape visualisations embedded in virtual globes invoke not only cognition but also emotional and intuitive responses, with associated issues of uncertainty, credibility, and bias in interpreting the imagery. This paper considers the types of risks as well as benefits that may exist with participatory uses of virtual globes by experts and lay-people. It is illustrated with early examples from practice and relevant themes from the literature in landscape visualisation and related disciplines such as environmental psychology and landscape planning. Existing frameworks and principles for the appropriate use of environmental visualisation methods are applied to the special case of widely accessible, realistic 3D and 4D visualisation systems such as Google Earth, in the context of public awareness-building and agency decision-making on environmental issues. Relevant principles are suggested which lend themselves to much-needed evaluation of risks and benefits of virtual globe systems. Possible approaches for balancing these benefits and risks include codes of ethics, software design, and metadata templates.

  17. NASA Astrophysics Education and Public Outreach: Engaging Educators and Students in Exploring the Cosmic Frontier

    NASA Astrophysics Data System (ADS)

    Lawton, Brandon L.; Eisenhamer, Bonnie; Smith, Denise Anne; Jirdeh, Hussein; Summers, Frank; Darnell, John T.; Ryer, Holly

    2015-08-01

    NASA’s Frontier Fields is an ambitious three-year Great Observatories program that will expand our understanding of galaxy formation and evolution in the early universe. The program includes six deep-field observations of strong-lensing galaxy clusters that will be taken in parallel with six deep “blank fields.” The observations allow astronomers to look deeper into the universe than ever before, and potentially uncover galaxies that are as much as 100 times fainter than what the telescopes can typically observe. The Frontier Fields science program is ideal for informing audiences about scientific advances and topics in STEM. The study of galaxy properties, statistics, optics, and Einstein’s theory of general relativity naturally leverages off of the science returns of the Frontier Fields program. As a result, the Space Telescope Science Institute’s Office of Public Outreach (OPO) has initiated an E/PO project to follow the progress of the Frontier Fields.For over two decades, the Hubble E/PO program has sought to bring the wonders of the universe to the education community, the youth, and the public, and engage audiences in the adventure of scientific discovery. Program components include standards-based curriculum-support materials, exhibits and exhibit components, professional development workshops, and direct interactions with scientists. We are also leveraging our new social media strategy to bring the science program to the public in the form of an ongoing blog. The main underpinnings of the program’s infrastructure are scientist-educator development teams, partnerships, and an embedded program evaluation component. OPO is leveraging this existing infrastructure to bring the Frontier Fields science program to the education community and the public in a cost-effective way.This talk features the goals and current status of the Frontier Fields E/PO program, with a particular emphasis on our education goals and achievements. We also highlight OPO’s strategies and infrastructure which allows for the quick delivery of groundbreaking science to the education community and public.

  18. Innovative Leadership by School Principals: Embedding Information Communication and Technology in Kuwaiti Schools

    ERIC Educational Resources Information Center

    Al Sharija, Mohammed; Watters, James J.

    2012-01-01

    Kuwait is an oil rich country planning for a future that is not dependent on exploiting natural resources. A major policy initiative has been the introduction of Information Communication and Technology (ICT) to schools. However, contextual issues and teacher capabilities in the use of ICT have limited the success of this initiative. The study…

  19. Embedding Information Literacy Skills in the Psychology Curriculum: Supporting Students in Their Transition to Independent Researchers

    ERIC Educational Resources Information Center

    Bohan, Jason; Friel, Niamh; Szymanek, Larissa

    2015-01-01

    Here we report on a new initiative which supported first-year psychology undergraduates in developing their information literacy skills. These skills were taught in a small-group tutorial setting with tutor guidance and peer-supported activities. We measured student's Autonomous Learning and Academic Self-Efficacy before and after the teaching…

  20. On random field Completely Automated Public Turing Test to Tell Computers and Humans Apart generation.

    PubMed

    Kouritzin, Michael A; Newton, Fraser; Wu, Biao

    2013-04-01

    Herein, we propose generating CAPTCHAs through random field simulation and give a novel, effective and efficient algorithm to do so. Indeed, we demonstrate that sufficient information about word tests for easy human recognition is contained in the site marginal probabilities and the site-to-nearby-site covariances and that these quantities can be embedded directly into certain conditional probabilities, designed for effective simulation. The CAPTCHAs are then partial random realizations of the random CAPTCHA word. We start with an initial random field (e.g., randomly scattered letter pieces) and use Gibbs resampling to re-simulate portions of the field repeatedly using these conditional probabilities until the word becomes human-readable. The residual randomness from the initial random field together with the random implementation of the CAPTCHA word provide significant resistance to attack. This results in a CAPTCHA, which is unrecognizable to modern optical character recognition but is recognized about 95% of the time in a human readability study.

  1. Theory and Practice in the Design of Physician Payment Incentives

    PubMed Central

    Robinson, James C.

    2001-01-01

    Combining the economic literature on principal-agent relationships with examples of marketplace innovations allows analysis of the evolution of methods for paying physicians. Agency theory and the economic principles of performance-based compensation are applied in the context of imperfect information, risk aversion, multiple interrelated tasks, and team production efficiencies. Fee-for-service and capitation are flawed methods of motivating physicians to achieve specific goals. Payment innovations that blend elements of fee-for-service, capitation, and case rates can preserve the advantages and attenuate the disadvantages of each. These innovations include capitation with fee-for-service carve-outs, department budgets with individual fee-for-service or “contact” capitation, and case rates for defined episodes of illness. The context within which payment incentives are embedded, includes such nonprice mechanisms as screening and monitoring and such organizational relationships as employment and ownership. The analysis has implications for health services research and public policy with respect to physician payment incentives. PMID:11439463

  2. Application based on ArcObject inquiry and Google maps demonstration to real estate database

    NASA Astrophysics Data System (ADS)

    Hwang, JinTsong

    2007-06-01

    Real estate industry in Taiwan has been flourishing in recent years. To acquire various and abundant information of real estate for sale is the same goal for the consumers and the brokerages. Therefore, before looking at the property, it is important to get all pertinent information possible. Not only this beneficial for the real estate agent as they can provide the sellers with the most information, thereby solidifying the interest of the buyer, but may also save time and the cost of manpower were something out of place. Most of the brokerage sites are aware of utilizes Internet as form of media for publicity however; the contents are limited to specific property itself and the functions of query are mostly just provided searching by condition. This paper proposes a query interface on website which gives function of zone query by spatial analysis for non-GIS users, developing a user-friendly interface with ArcObject in VB6, and query by condition. The inquiry results can show on the web page which is embedded functions of Google Maps and the UrMap API on it. In addition, the demonstration of inquiry results will give the multimedia present way which includes hyperlink to Google Earth with surrounding of the property, the Virtual Reality scene of house, panorama of interior of building and so on. Therefore, the website provides extra spatial solution for query and demonstration abundant information of real estate in two-dimensional and three-dimensional types of view.

  3. Contributions of individual face features to face discrimination.

    PubMed

    Logan, Andrew J; Gordon, Gael E; Loffler, Gunter

    2017-08-01

    Faces are highly complex stimuli that contain a host of information. Such complexity poses the following questions: (a) do observers exhibit preferences for specific information? (b) how does sensitivity to individual face parts compare? These questions were addressed by quantifying sensitivity to different face features. Discrimination thresholds were determined for synthetic faces under the following conditions: (i) 'full face': all face features visible; (ii) 'isolated feature': single feature presented in isolation; (iii) 'embedded feature': all features visible, but only one feature modified. Mean threshold elevations for isolated features, relative to full-faces, were 0.84x, 1.08, 2.12, 3.34, 4.07 and 4.47 for head-shape, hairline, nose, mouth, eyes and eyebrows respectively. Hence, when two full faces can be discriminated at threshold, the difference between the eyes is about four times less than what is required when discriminating between isolated eyes. In all cases, sensitivity was higher when features were presented in isolation than when they were embedded within a face context (threshold elevations of 0.94x, 1.74, 2.67, 2.90, 5.94 and 9.94). This reveals a specific pattern of sensitivity to face information. Observers are between two and four times more sensitive to external than internal features. The pattern for internal features (higher sensitivity for the nose, compared to mouth, eyes and eyebrows) is consistent with lower sensitivity for those parts affected by facial dynamics (e.g. facial expressions). That isolated features are easier to discriminate than embedded features supports a holistic face processing mechanism which impedes extraction of information about individual features from full faces. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Medical information on the internet: a tool for measuring consumer perception of quality aspects.

    PubMed

    Dubowicz, Arthur; Schulz, Peter J

    2015-03-30

    Most of adult Internet users have searched for health information on the Internet. The Internet has become one of the most important sources for health information and treatment advice. In most cases, the information found is not verified with a medical doctor, but judged by the "online-diagnosers" independently. Facing this situation, public health authorities raise concern over the quality of medical information laypersons can find on the Internet. The objective of the study was aimed at developing a measure to evaluate the credibility of websites that offer medical advice and information. The measure was tested in a quasi-experimental study on two sleeping-disorder websites of different quality. There were 45 survey items for rating the credibility of websites that were tested in a quasi-experimental study with a random assignment of 454 participants to either a high- or a low-quality website exposure. Using principal component analysis, the original items were reduced to 13 and sorted into the factors: trustworthiness, textual deficits of the content, interferences (external links on the Web site), and advertisements. The first two factors focus more on the provided content itself, while the other two describe the embedding of the content into the website. The 45 survey items had been designed previously using exploratory observations and literature research. The final scale showed adequate power and reliability for all factors. The loadings of the principal component analysis ranged satisfactorily (.644 to .854). Significant differences at P<.001 were found between the low- and high-quality groups. Advertisements on the website were rated as disturbing in both experimental conditions, meaning that they do not differentiate between good and bad information. The scale reliably distinguished high- and low-quality of medical advice given on websites.

  5. EXIF Custom: Automatic image metadata extraction for Scratchpads and Drupal.

    PubMed

    Baker, Ed

    2013-01-01

    Many institutions and individuals use embedded metadata to aid in the management of their image collections. Many deskop image management solutions such as Adobe Bridge and online tools such as Flickr also make use of embedded metadata to describe, categorise and license images. Until now Scratchpads (a data management system and virtual research environment for biodiversity) have not made use of these metadata, and users have had to manually re-enter this information if they have wanted to display it on their Scratchpad site. The Drupal described here allows users to map metadata embedded in their images to the associated field in the Scratchpads image form using one or more customised mappings. The module works seamlessly with the bulk image uploader used on Scratchpads and it is therefore possible to upload hundreds of images easily with automatic metadata (EXIF, XMP and IPTC) extraction and mapping.

  6. EXIF Custom: Automatic image metadata extraction for Scratchpads and Drupal

    PubMed Central

    2013-01-01

    Abstract Many institutions and individuals use embedded metadata to aid in the management of their image collections. Many deskop image management solutions such as Adobe Bridge and online tools such as Flickr also make use of embedded metadata to describe, categorise and license images. Until now Scratchpads (a data management system and virtual research environment for biodiversity) have not made use of these metadata, and users have had to manually re-enter this information if they have wanted to display it on their Scratchpad site. The Drupal described here allows users to map metadata embedded in their images to the associated field in the Scratchpads image form using one or more customised mappings. The module works seamlessly with the bulk image uploader used on Scratchpads and it is therefore possible to upload hundreds of images easily with automatic metadata (EXIF, XMP and IPTC) extraction and mapping. PMID:24723768

  7. Smart fabrics: integrating fiber optic sensors and information networks.

    PubMed

    El-Sherif, Mahmoud

    2004-01-01

    "Smart Fabrics" are defined as fabrics capable of monitoring their own "health", and sensing environmental conditions. They consist of special type of sensors, signal processing, and communication network embedded into textile substrate. Available conventional sensors and networking systems are not fully technologically mature for such applications. New classes of miniature sensors, signal processing and networking systems are urgently needed for such application. Also, the methodology for integration into textile structures has to be developed. In this paper, the development of smart fabrics with embedded fiber optic systems is presented for applications in health monitoring and diagnostics. Successful development of such smart fabrics with embedded sensors and networks is mainly dependent on the development of the proper miniature sensors technology, and on the integration of these sensors into textile structures. The developed smart fabrics will be discussed and samples of the results will be presented.

  8. Real-time depth processing for embedded platforms

    NASA Astrophysics Data System (ADS)

    Rahnama, Oscar; Makarov, Aleksej; Torr, Philip

    2017-05-01

    Obtaining depth information of a scene is an important requirement in many computer-vision and robotics applications. For embedded platforms, passive stereo systems have many advantages over their active counterparts (i.e. LiDAR, Infrared). They are power efficient, cheap, robust to lighting conditions and inherently synchronized to the RGB images of the scene. However, stereo depth estimation is a computationally expensive task that operates over large amounts of data. For embedded applications which are often constrained by power consumption, obtaining accurate results in real-time is a challenge. We demonstrate a computationally and memory efficient implementation of a stereo block-matching algorithm in FPGA. The computational core achieves a throughput of 577 fps at standard VGA resolution whilst consuming less than 3 Watts of power. The data is processed using an in-stream approach that minimizes memory-access bottlenecks and best matches the raster scan readout of modern digital image sensors.

  9. Graphite nanoplatelet enabled embeddable fiber sensor for in situ curing monitoring and structural health monitoring of polymeric composites.

    PubMed

    Luo, Sida; Liu, Tao

    2014-06-25

    A graphite nanoplatelet (GNP) thin film enabled 1D fiber sensor (GNP-FibSen) was fabricated by a continuous roll-to-roll spray coating process, characterized by scanning electron microscopy and Raman spectroscopy and evaluated by coupled electrical-mechanical tensile testing. The neat GNP-FibSen sensor shows very high gauge sensitivity with a gauge factor of ∼17. By embedding the sensor in fiberglass prepreg laminate parts, the dual functionalities of the GNP-FibSen sensor were demonstrated. In the manufacturing process, the resistance change of the embedded sensor provides valuable local resin curing information. After the manufacturing process, the same sensor is able to map the strain/stress states and detect the failure of the host composite. The superior durability of the embedded GNP-FibSen sensor has been demonstrated through 10,000 cycles of coupled electromechanical tests.

  10. Non-standard analysis and embedded software

    NASA Technical Reports Server (NTRS)

    Platek, Richard

    1995-01-01

    One model for computing in the future is ubiquitous, embedded computational devices analogous to embedded electrical motors. Many of these computers will control physical objects and processes. Such hidden computerized environments introduce new safety and correctness concerns whose treatment go beyond present Formal Methods. In particular, one has to begin to speak about Real Space software in analogy with Real Time software. By this we mean, computerized systems which have to meet requirements expressed in the real geometry of space. How to translate such requirements into ordinary software specifications and how to carry out proofs is a major challenge. In this talk we propose a research program based on the use of no-standard analysis. Much detail remains to be carried out. The purpose of the talk is to inform the Formal Methods community that Non-Standard Analysis provides a possible avenue to attack which we believe will be fruitful.

  11. Three-dimensional localization and optical imaging of objects in turbid media with independent component analysis.

    PubMed

    Xu, M; Alrubaiee, M; Gayen, S K; Alfano, R R

    2005-04-01

    A new approach for optical imaging and localization of objects in turbid media that makes use of the independent component analysis (ICA) from information theory is demonstrated. Experimental arrangement realizes a multisource illumination of a turbid medium with embedded objects and a multidetector acquisition of transmitted light on the medium boundary. The resulting spatial diversity and multiple angular observations provide robust data for three-dimensional localization and characterization of absorbing and scattering inhomogeneities embedded in a turbid medium. ICA of the perturbations in the spatial intensity distribution on the medium boundary sorts out the embedded objects, and their locations are obtained from Green's function analysis based on any appropriate light propagation model. Imaging experiments were carried out on two highly scattering samples of thickness approximately 50 times the transport mean-free path of the respective medium. One turbid medium had two embedded absorptive objects, and the other had four scattering objects. An independent component separation of the signal, in conjunction with diffusive photon migration theory, was used to locate the embedded inhomogeneities. In both cases, improved lateral and axial localizations of the objects over the result obtained by use of common photon migration reconstruction algorithms were achieved. The approach is applicable to different medium geometries, can be used with any suitable photon propagation model, and is amenable to near-real-time imaging applications.

  12. Real time monitoring of progressive damage during loading of a simplified total hip stem construct using embedded acoustic emission sensors.

    PubMed

    Mavrogordato, Mark; Taylor, Mark; Taylor, Andrew; Browne, Martin

    2011-05-01

    Acoustic emission (AE) is a non-destructive technique that is capable of passively monitoring failure of a construct with excellent temporal resolution. Previous investigations using AE to monitor the integrity of a total hip replacement (THR) have used surface mounted sensors; however, the AE signal attenuates as it travels through materials and across interfaces. This study proposes that directly embedded sensors within the femoral stem of the implant will reduce signal attenuation effects and eliminate potential complications and variability associated with fixing the sensor to the sample. Data was collected during in vitro testing of implanted constructs, and information from both embedded and externally mounted AE sensors was compared and corroborated by micro-Computed Tomography (micro-CT) images taken before and after testing. The results of this study indicate that the embedded sensors gave a closer corroboration to observed damage using micro-CT and were less affected by unwanted noise sources. This has significant implications for the use of AE in assessing the state of THR constructs in vitro and it is hypothesised that directly embedded AE sensors may provide the first steps towards an in vivo, cost effective, user friendly, non-destructive system capable of continuously monitoring the condition of the implanted construct. Copyright © 2010 IPEM. Published by Elsevier Ltd. All rights reserved.

  13. Low-Rank Discriminant Embedding for Multiview Learning.

    PubMed

    Li, Jingjing; Wu, Yue; Zhao, Jidong; Lu, Ke

    2017-11-01

    This paper focuses on the specific problem of multiview learning where samples have the same feature set but different probability distributions, e.g., different viewpoints or different modalities. Since samples lying in different distributions cannot be compared directly, this paper aims to learn a latent subspace shared by multiple views assuming that the input views are generated from this latent subspace. Previous approaches usually learn the common subspace by either maximizing the empirical likelihood, or preserving the geometric structure. However, considering the complementarity between the two objectives, this paper proposes a novel approach, named low-rank discriminant embedding (LRDE), for multiview learning by taking full advantage of both sides. By further considering the duality between data points and features of multiview scene, i.e., data points can be grouped based on their distribution on features, while features can be grouped based on their distribution on the data points, LRDE not only deploys low-rank constraints on both sample level and feature level to dig out the shared factors across different views, but also preserves geometric information in both the ambient sample space and the embedding feature space by designing a novel graph structure under the framework of graph embedding. Finally, LRDE jointly optimizes low-rank representation and graph embedding in a unified framework. Comprehensive experiments in both multiview manner and pairwise manner demonstrate that LRDE performs much better than previous approaches proposed in recent literatures.

  14. Sequence2Vec: a novel embedding approach for modeling transcription factor binding affinity landscape.

    PubMed

    Dai, Hanjun; Umarov, Ramzan; Kuwahara, Hiroyuki; Li, Yu; Song, Le; Gao, Xin

    2017-11-15

    An accurate characterization of transcription factor (TF)-DNA affinity landscape is crucial to a quantitative understanding of the molecular mechanisms underpinning endogenous gene regulation. While recent advances in biotechnology have brought the opportunity for building binding affinity prediction methods, the accurate characterization of TF-DNA binding affinity landscape still remains a challenging problem. Here we propose a novel sequence embedding approach for modeling the transcription factor binding affinity landscape. Our method represents DNA binding sequences as a hidden Markov model which captures both position specific information and long-range dependency in the sequence. A cornerstone of our method is a novel message passing-like embedding algorithm, called Sequence2Vec, which maps these hidden Markov models into a common nonlinear feature space and uses these embedded features to build a predictive model. Our method is a novel combination of the strength of probabilistic graphical models, feature space embedding and deep learning. We conducted comprehensive experiments on over 90 large-scale TF-DNA datasets which were measured by different high-throughput experimental technologies. Sequence2Vec outperforms alternative machine learning methods as well as the state-of-the-art binding affinity prediction methods. Our program is freely available at https://github.com/ramzan1990/sequence2vec. xin.gao@kaust.edu.sa or lsong@cc.gatech.edu. Supplementary data are available at Bioinformatics online. © The Author(s) 2017. Published by Oxford University Press.

  15. Empirical Mode Decomposition and k-Nearest Embedding Vectors for Timely Analyses of Antibiotic Resistance Trends

    PubMed Central

    Teodoro, Douglas; Lovis, Christian

    2013-01-01

    Background Antibiotic resistance is a major worldwide public health concern. In clinical settings, timely antibiotic resistance information is key for care providers as it allows appropriate targeted treatment or improved empirical treatment when the specific results of the patient are not yet available. Objective To improve antibiotic resistance trend analysis algorithms by building a novel, fully data-driven forecasting method from the combination of trend extraction and machine learning models for enhanced biosurveillance systems. Methods We investigate a robust model for extraction and forecasting of antibiotic resistance trends using a decade of microbiology data. Our method consists of breaking down the resistance time series into independent oscillatory components via the empirical mode decomposition technique. The resulting waveforms describing intrinsic resistance trends serve as the input for the forecasting algorithm. The algorithm applies the delay coordinate embedding theorem together with the k-nearest neighbor framework to project mappings from past events into the future dimension and estimate the resistance levels. Results The algorithms that decompose the resistance time series and filter out high frequency components showed statistically significant performance improvements in comparison with a benchmark random walk model. We present further qualitative use-cases of antibiotic resistance trend extraction, where empirical mode decomposition was applied to highlight the specificities of the resistance trends. Conclusion The decomposition of the raw signal was found not only to yield valuable insight into the resistance evolution, but also to produce novel models of resistance forecasters with boosted prediction performance, which could be utilized as a complementary method in the analysis of antibiotic resistance trends. PMID:23637796

  16. Indel-tolerant read mapping with trinucleotide frequencies using cache-oblivious kd-trees

    PubMed Central

    Mahmud, Md Pavel; Wiedenhoeft, John; Schliep, Alexander

    2012-01-01

    Motivation: Mapping billions of reads from next generation sequencing experiments to reference genomes is a crucial task, which can require hundreds of hours of running time on a single CPU even for the fastest known implementations. Traditional approaches have difficulties dealing with matches of large edit distance, particularly in the presence of frequent or large insertions and deletions (indels). This is a serious obstacle both in determining the spectrum and abundance of genetic variations and in personal genomics. Results: For the first time, we adopt the approximate string matching paradigm of geometric embedding to read mapping, thus rephrasing it to nearest neighbor queries in a q-gram frequency vector space. Using the L1 distance between frequency vectors has the benefit of providing lower bounds for an edit distance with affine gap costs. Using a cache-oblivious kd-tree, we realize running times, which match the state-of-the-art. Additionally, running time and memory requirements are about constant for read lengths between 100 and 1000 bp. We provide a first proof-of-concept that geometric embedding is a promising paradigm for read mapping and that L1 distance might serve to detect structural variations. TreQ, our initial implementation of that concept, performs more accurate than many popular read mappers over a wide range of structural variants. Availability and implementation: TreQ will be released under the GNU Public License (GPL), and precomputed genome indices will be provided for download at http://treq.sf.net. Contact: pavelm@cs.rutgers.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:22962448

  17. 77 FR 33225 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-05

    ... progress towards a high-quality home visiting program or towards embedding their home visiting program into a comprehensive, high-quality early childhood system. Of State applicants to the competitive grant...

  18. Distributed proximity sensor system having embedded light emitters and detectors

    NASA Technical Reports Server (NTRS)

    Lee, Sukhan (Inventor)

    1990-01-01

    A distributed proximity sensor system is provided with multiple photosensitive devices and light emitters embedded on the surface of a robot hand or other moving member in a geometric pattern. By distributing sensors and emitters capable of detecting distances and angles to points on the surface of an object from known points in the geometric pattern, information is obtained for achieving noncontacting shape and distance perception, i.e., for automatic determination of the object's shape, direction and distance, as well as the orientation of the object relative to the robot hand or other moving member.

  19. Detecting spam comments on Indonesia’s Instagram posts

    NASA Astrophysics Data System (ADS)

    Septiandri, Ali Akbar; Wibisono, Okiriza

    2017-01-01

    In this paper we experimented with several feature sets for detecting spam comments in social media contents authored by Indonesian public figures. We define spam comments as comments which have promotional purposes (e.g. referring other users to products and services) and thus not related to the content to which the comments are posted. Three sets of features are evaluated for detecting spams: (1) hand-engineered features such as comment length, number of capital letters, and number of emojis, (2) keyword features such as whether the comment contains advertising words or product-related words, and (3) text features, namely, bag-of-words, TF-IDF, and fastText embeddings, each combined with latent semantic analysis. With 24,000 manually-annotated comments scraped from Instagram posts authored by more than 100 Indonesian public figures, we compared the performance of these feature sets and their combinations using 3 popular classification algorithms: Na¨ıve Bayes, SVM, and XGBoost. We find that using all three feature sets (with fastText embedding for the text features) gave the best F 1-score of 0.9601 on a holdout dataset. More interestingly, fastText embedding combined with hand-engineered features (i.e. without keyword features) yield similar F 1-score of 0.9523, and McNemar’s test failed to reject the hypothesis that the two results are not significantly different. This result is important as keyword features are largely dependent on the dataset and may not be as generalisable as the other feature sets when applied to new data. For future work, we hope to collect bigger and more diverse dataset of Indonesian spam comments, improve our model’s performance and generalisability, and publish a programming package for others to reliably detect spam comments.

  20. Persistent identifiers for CMIP6 data in the Earth System Grid Federation

    NASA Astrophysics Data System (ADS)

    Buurman, Merret; Weigel, Tobias; Juckes, Martin; Lautenschlager, Michael; Kindermann, Stephan

    2016-04-01

    The Earth System Grid Federation (ESGF) is a distributed data infrastructure that will provide access to the CMIP6 experiment data. The data consist of thousands of datasets composed of millions of files. Over the course of the CMIP6 operational phase, datasets may be retracted and replaced by newer versions that consist of completely or partly new files. Each dataset is hosted at a single data centre, but can have one or several backups (replicas) at other data centres. To keep track of the different data entities and relationships between them, to ensure their consistency and improve exchange of information about them, Persistent Identifiers (PIDs) are used. These are unique identifiers that are registered at a globally accessible server, along with some metadata (the PID record). While usually providing access to the data object they refer to, as long as it exists, the metadata record will remain available even beyond the object's lifetime. Besides providing access to data and metadata, PIDs will allow scientists to communicate effectively and on a fine granularity about CMIP6 data. The initiative to introduce PIDs in the ESGF infrastructure has been described and agreed upon through a series of white papers governed by the WGCM Infrastructure Panel (WIP). In CMIP6, each dataset and each file is assigned a PID that keeps track of the data object's physical copies throughout the object lifetime. In addition to this, its relationship with other data objects is stored in the PID recordA human-readable version of this information is available on an information page also linked in the PID record. A possible application that exploits the information available from the PID records is a smart information tool, which a scientific user can call to find out if his/her version was replaced by a new one, to view and browse the related datasets and files, and to get access to the various copies or to additional metadata on a dedicated website. The PID registration process is embedded in the ESGF data publication process. During their first publication, the PID records are populated with metadata including the parent dataset(s), other existing versions and physical location. Every subsequent publication, un-publication or replica publication of a dataset or file then updates the PID records to keep track of changing physical locations of the data (or lack thereof) and of reported errors in the data. Assembling the metadata records and registering the PIDs on a central server is a potential performance bottleneck as millions of data objects may be published in a short timeframe when the CMIP6 experiment phase begins. For this reason, the PID registration and metadata update tasks are pushed to a message queueing system facilitating high availability and scalability and then processed asynchronously. This will lead to a slight delay in PID registration but will avoid blocking resources at the data centres and slowing down the publication of the data so eagerly awaited by the scientists.

  1. The translation research in a dental setting (TRiaDS) programme protocol

    PubMed Central

    2010-01-01

    Background It is well documented that the translation of knowledge into clinical practice is a slow and haphazard process. This is no less true for dental healthcare than other types of healthcare. One common policy strategy to help promote knowledge translation is the production of clinical guidance, but it has been demonstrated that the simple publication of guidance is unlikely to optimise practice. Additional knowledge translation interventions have been shown to be effective, but effectiveness varies and much of this variation is unexplained. The need for researchers to move beyond single studies to develop a generalisable, theory based, knowledge translation framework has been identified. For dentistry in Scotland, the production of clinical guidance is the responsibility of the Scottish Dental Clinical Effectiveness Programme (SDCEP). TRiaDS (Translation Research in a Dental Setting) is a multidisciplinary research collaboration, embedded within the SDCEP guidance development process, which aims to establish a practical evaluative framework for the translation of guidance and to conduct and evaluate a programme of integrated, multi-disciplinary research to enhance the science of knowledge translation. Methods Set in General Dental Practice the TRiaDS programmatic evaluation employs a standardised process using optimal methods and theory. For each SDCEP guidance document a diagnostic analysis is undertaken alongside the guidance development process. Information is gathered about current dental care activities. Key recommendations and their required behaviours are identified and prioritised. Stakeholder questionnaires and interviews are used to identify and elicit salient beliefs regarding potential barriers and enablers towards the key recommendations and behaviours. Where possible routinely collected data are used to measure compliance with the guidance and to inform decisions about whether a knowledge translation intervention is required. Interventions are theory based and informed by evidence gathered during the diagnostic phase and by prior published evidence. They are evaluated using a range of experimental and quasi-experimental study designs, and data collection continues beyond the end of the intervention to investigate the sustainability of an intervention effect. Discussion The TRiaDS programmatic approach is a significant step forward towards the development of a practical, generalisable framework for knowledge translation research. The multidisciplinary composition of the TRiaDS team enables consideration of the individual, organisational and system determinants of professional behaviour change. In addition the embedding of TRiaDS within a national programme of guidance development offers a unique opportunity to inform and influence the guidance development process, and enables TRiaDS to inform dental services practitioners, policy makers and patients on how best to translate national recommendations into routine clinical activities. PMID:20646275

  2. Implementing Sustainable Data Collection for a Cardiac Outcomes Registry in an Australian Public Hospital.

    PubMed

    Cox, Nicholas; Brennan, Angela; Dinh, Diem; Brien, Rita; Cowie, Kath; Stub, Dion; Reid, Christopher M; Lefkovits, Jeffrey

    2018-04-01

    Clinical outcome registries are an increasingly vital component of ensuring quality and safety of patient care. However, Australian hospitals rarely have additional resources or the capacity to fund the additional staff time to complete the task of data collection and entry. At the same time, registry funding models do not support staff for the collection of data at the site but are directed towards the central registry tasks of data reporting, managing and quality monitoring. The sustainability of a registry is contingent on building efficiencies into data management and collection. We describe the methods used in a large Victorian public hospital to develop a sustainable data collection system for the Victorian Cardiac Outcomes Registry (VCOR), using existing staff and resources common to many public hospitals. We describe the features of the registry and the hospital specific strategies that allowed us to do this as part of our routine business of providing good quality cardiac care. All clinical staff involved in patient care were given some data collection task with the entry of these data embedded into the staff's daily workflow. A senior cardiology registrar was empowered to allocate data entry tasks to colleagues when data were found to be incomplete. The task of 30-day follow-up proved the most onerous part of data collection. Cath-lab nursing staff were allocated this role. With hospital accreditation and funding models moving towards performance based quality indicators, collection of accurate and reliable information is crucial. Our experience demonstrates the successful implementation of clinical outcome registry data collection in a financially constrained public hospital environment utilising existing resources. Copyright © 2017. Published by Elsevier B.V.

  3. Structural health monitoring using smart optical fiber sensors

    NASA Astrophysics Data System (ADS)

    Davies, Heddwyn; Everall, Lorna A.; Gallon, Andrew M.

    2001-04-01

    This paper describes the potential of a smart monitoring system, incorporating optical fiber sensing techniques, to provide important structural information to designers and users alike. This technology has application in all areas including aerospace, civil, maritime and automotive engineering. In order to demonstrate the capability of the sensing system it has been installed in a 35 m free-standing carbon fiber yacht mast, where a complete optical network of strain and temperature sensors were embedded into a composite mast and boom during lay-up. The system was able to monitor the behavior of the composite rig through a range of handling conditions and the resulting strain information could be used by engineers to improve the structural design process. The optical strain sensor system comprises of three main components: the sensor network, the opto-electronic data acquisition unit (OFSSS) and the external PC which acts as a data log and display. Embedded fiber optic sensors have wide ranging application for structural load monitoring. Due to their small size, optical fiber sensors can be readily embedded into composite materials. Other advantages include their immediate multiplexing capability and immunity to electromagnetic interference. The capability of this system has been demonstrated within the maritime environment, but can be adapted for any application.

  4. Biometric feature embedding using robust steganography technique

    NASA Astrophysics Data System (ADS)

    Rashid, Rasber D.; Sellahewa, Harin; Jassim, Sabah A.

    2013-05-01

    This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for such techniques can arise in law enforcement, forensics, counter terrorism, internet/mobile banking and border control. What differentiates this problem from normal information hiding techniques is the added requirement that there should be minimal effect on face recognition accuracy. We propose an LSB-Witness embedding technique in which the secret message is already present in the LSB plane but instead of changing the cover image LSB values, the second LSB plane will be changed to stand as a witness/informer to the receiver during message recovery. Although this approach may affect the stego quality, it is eliminating the weakness of traditional LSB schemes that is exploited by steganalysis techniques for LSB, such as PoV and RS steganalysis, to detect the existence of secrete message. Experimental results show that the proposed method is robust against PoV and RS attacks compared to other variants of LSB. We also discussed variants of this approach and determine capacity requirements for embedding face biometric feature vectors while maintain accuracy of face recognition.

  5. Using a Context-aware Medical Application to Address Information Needs for Extubation Decisions

    PubMed Central

    Zhu, Xinxin; Lord, William

    2005-01-01

    Information overload has been one of the causes of preventable medical errors [1] and escalating costs [2]. A context-aware application with embedded clinical knowledge is proposed to provide practitioners with the appropriate amount of information and content. We developed a prototype of a context-aware medical application to address clinicians’ information needs that arise in a data-intensive unit, the Cardio-Thoracic Intensive Care Unit (CTICU). A major clinical decision supported by the prototype, the extubation decision, is illustrated. PMID:16779455

  6. Extraction of CT dose information from DICOM metadata: automated Matlab-based approach.

    PubMed

    Dave, Jaydev K; Gingold, Eric L

    2013-01-01

    The purpose of this study was to extract exposure parameters and dose-relevant indexes of CT examinations from information embedded in DICOM metadata. DICOM dose report files were identified and retrieved from a PACS. An automated software program was used to extract from these files information from the structured elements in the DICOM metadata relevant to exposure. Extracting information from DICOM metadata eliminated potential errors inherent in techniques based on optical character recognition, yielding 100% accuracy.

  7. Transversal analysis of public policies on user fees exemptions in six West African countries.

    PubMed

    Ridde, Valéry; Queuille, Ludovic; Kafando, Yamba; Robert, Emilie

    2012-11-20

    While more and more West African countries are implementing public user fees exemption policies, there is still little knowledge available on this topic. The long time required for scientific production, combined with the needs of decision-makers, led to the creation in 2010 of a project to support implementers in aggregating knowledge on their experiences. This article presents a transversal analysis of user fees exemption policies implemented in Benin, Burkina Faso, Mali, Niger, Togo and Senegal. This was a multiple case study with several embedded levels of analysis. The cases were public user fees exemption policies selected by the participants because of their instructive value. The data used in the countries were taken from documentary analysis, interviews and questionnaires. The transversal analysis was based on a framework for studying five implementation components and five actors' attitudes usually encountered in these policies. The analysis of the implementation components revealed: a majority of State financing; maintenance of centrally organized financing; a multiplicity of reimbursement methods; reimbursement delays and/or stock shortages; almost no implementation guides; a lack of support measures; communication plans that were rarely carried out, funded or renewed; health workers who were given general information but not details; poorly informed populations; almost no evaluation systems; ineffective and poorly funded coordination systems; low levels of community involvement; and incomplete referral-evacuation systems. With regard to actors' attitudes, the analysis revealed: objectives that were appreciated by everyone; dissatisfaction with the implementation; specific tensions between healthcare providers and patients; overall satisfaction among patients, but still some problems; the perception that while the financial barrier has been removed, other barriers persist; occasionally a reorganization of practices, service rationing due to lack of reimbursement, and some overcharging or shifting of resources. This transversal analysis confirms the need to assign a great deal of importance to the implementation of user fees exemption policies once these decisions have been taken. It also highlights some practices that suggest avenues of future research.

  8. Teaching GeoEthics Across the Geoscience Curriculum

    NASA Astrophysics Data System (ADS)

    Mogk, D. W.; Geissman, J. W.; Kieffer, S. W.; Reidy, M.; Taylor, S.; Vallero, D. A.; Bruckner, M. Z.

    2014-12-01

    Ethics education is an increasingly important component of the pre-professional training of geoscientists. Funding agencies (NSF) require training of graduate students in the responsible conduct of research, employers are increasingly expecting their workers to have basic training in ethics, and the public demands that scientists abide by the highest standards of ethical conduct. Yet, few faculty have the requisite training to effectively teach about ethics in their classes, or even informally in mentoring their research students. To address this need, an NSF-funded workshop was convened to explore how ethics education can be incorporated into the geoscience curriculum. Workshop goals included: examining where and how geoethics topics can be taught from introductory courses for non-majors to modules embedded in "core" geoscience majors courses or dedicated courses in geoethics; sharing best pedagogic practices for "what works" in ethics education; developing a geoethics curriculum framework; creating a collection of online instructional resources, case studies, and related materials; applying lessons learned about ethics education from sister disciplines (biology, engineering, philosophy); and considering ways that geoethics instruction can contribute to public scientific literacy. Four major themes were explored in detail: (1) GeoEthics and self: examining the internal attributes of a geoscientist that establish the ethical values required to successfully prepare for and contribute to a career in the geosciences; (2) GeoEthics and the geoscience profession: identifying ethical standards expected of geoscientists if they are to contribute responsibly to the community of practice; (3) GeoEthics and society: exploring geoscientists' responsibilities to effectively and responsibly communicate the results of geoscience research to inform society about issues ranging from geohazards to natural resource utilization in order to protect public health, safety, and economic security; (4) GeoEthics and Earth: explicating geoscientists' responsibilities to provide stewardship towards of the Earth based on their knowledge of Earth's composition, architecture, history, dynamic processes, and complex systems. Workshop resources can be accessed at serc.carleton.edu/geoethics/

  9. Supervised linear dimensionality reduction with robust margins for object recognition

    NASA Astrophysics Data System (ADS)

    Dornaika, F.; Assoum, A.

    2013-01-01

    Linear Dimensionality Reduction (LDR) techniques have been increasingly important in computer vision and pattern recognition since they permit a relatively simple mapping of data onto a lower dimensional subspace, leading to simple and computationally efficient classification strategies. Recently, many linear discriminant methods have been developed in order to reduce the dimensionality of visual data and to enhance the discrimination between different groups or classes. Many existing linear embedding techniques relied on the use of local margins in order to get a good discrimination performance. However, dealing with outliers and within-class diversity has not been addressed by margin-based embedding method. In this paper, we explored the use of different margin-based linear embedding methods. More precisely, we propose to use the concepts of Median miss and Median hit for building robust margin-based criteria. Based on such margins, we seek the projection directions (linear embedding) such that the sum of local margins is maximized. Our proposed approach has been applied to the problem of appearance-based face recognition. Experiments performed on four public face databases show that the proposed approach can give better generalization performance than the classic Average Neighborhood Margin Maximization (ANMM). Moreover, thanks to the use of robust margins, the proposed method down-grades gracefully when label outliers contaminate the training data set. In particular, we show that the concept of Median hit was crucial in order to get robust performance in the presence of outliers.

  10. Advancing the application of systems thinking in health: exploring dual practice and its management in Kampala, Uganda

    PubMed Central

    2014-01-01

    Background Many full-time Ugandan government health providers take on additional jobs – a phenomenon called dual practice. We describe the complex patterns that characterize the evolution of dual practice in Uganda, and the local management practices that emerged in response, in five government facilities. An in-depth understanding of dual practice can contribute to policy discussions on improving public sector performance. Methods A multiple case study design with embedded units of analysis was supplemented by interviews with policy stakeholders and a review of historical and policy documents. Five facility case studies captured the perspective of doctors, nurses, and health managers through semi-structured in-depth interviews. A causal loop diagram illustrated interactions and feedback between old and new actors, as well as emerging roles and relationships. Results The causal loop diagram illustrated how feedback related to dual practice policy developed in Uganda. As opportunities for dual practice grew and the public health system declined over time, government providers increasingly coped through dual practice. Over time, government restrictions to dual practice triggered policy resistance and protest from government providers. Resulting feedback contributed to compromising the supply of government providers and, potentially, of service delivery outcomes. Informal government policies and restrictions replaced the formal restrictions identified in the early phases. In some instances, government health managers, particularly those in hospitals, developed their own practices to cope with dual practice and to maintain public sector performance. Management practices varied according to the health manager’s attitude towards dual practice and personal experience with dual practice. These practices were distinct in hospitals. Hospitals faced challenges managing internal dual practice opportunities, such as those created by externally-funded research projects based within the hospital. Private wings’ inefficiencies and strict fee schedule made them undesirable work locations for providers. Conclusions Dual practice prevails because public and private sector incentives, non-financial and financial, are complementary. Local management practices for dual practice have not been previously documented and provide learning opportunities to inform policy discussions. Understanding how dual practice evolves and how it is managed locally is essential for health workforce policy, planning, and performance discussions in Uganda and similar settings. PMID:25134522

  11. Communicating Science to Officials and People at Risk During a Slow-Motion Lava Flow Crisis

    NASA Astrophysics Data System (ADS)

    Neal, C. A.; Babb, J.; Brantley, S.; Kauahikaua, J. P.

    2015-12-01

    From June 2014 through March 2015, Kīlauea Volcano's Púu ´Ō´ō vent on the East Rift Zone produced a tube-fed pāhoehoe lava flow -the "June 27th flow" - that extended 20 km downslope. Within 2 months of onset, flow trajectory towards populated areas in the Puna District caused much concern. The USGS Hawaiian Volcano Observatory (HVO) issued a news release of increased hazard on August 22 and began participating in public meetings organized by Hawai`i County Mayor and Civil Defense two days later. On September 4, HVO upgraded the volcano alert level to WARNING based on an increased potential for lava to reach homes and infrastructure. Ultimately, direct impacts were modest: lava destroyed one unoccupied home and one utility pole, crossed a rural roadway, and partially inundated a waste transfer station, a cemetery, and agricultural land. Anticipation that lava could reach Pāhoa Village and cross the only major access highway, however, caused significant disruption. HVO scientists employed numerous methods to communicate science and hazard information to officials and the at-risk public: daily (or more frequent) written updates of the lava activity, flow front locations and advance rates; frequent updates of web-hosted maps and images; use of the 'lines of steepest descent' method to indicate likely lava flow paths; consistent participation in well-attended community meetings; bi-weekly briefings to County, State, and Federal officials; correspondence with the public via email and recorded phone messages; participation in press conferences and congressional briefings; and weekly newspaper articles (Volcano Watch). Communication lessons both learned and reinforced include: (1) direct, frequent interaction between scientists and officials and at-risk public builds critical trust and understanding; (2) images, maps, and presentations must be tailored to audience needs; (3) many people are unfamiliar with maps (oblique aerial photographs were more effective); (4) uncertainties in forecasting lava flow advance can be easily misunderstood; (5) simple, jargon-free language reaches the largest audience; (6) repetition of information and using different approaches is helpful; and (7) embedding scientists within the emergency management and communication framework helps unify critical messages.

  12. An optical watermarking solution for color personal identification pictures

    NASA Astrophysics Data System (ADS)

    Tan, Yi-zhou; Liu, Hai-bo; Huang, Shui-hua; Sheng, Ben-jian; Pan, Zhong-ming

    2009-11-01

    This paper presents a new approach for embedding authentication information into image on printed materials based on optical projection technique. Our experimental setup consists of two parts, one is a common camera, and the other is a LCD projector, which project a pattern on personnel's body (especially on the face). The pattern, generated by a computer, act as the illumination light source with sinusoidal distribution and it is also the watermark signal. For a color image, the watermark is embedded into the blue channel. While we take pictures (256×256 and 512×512, 567×390 pixels, respectively), an invisible mark is embedded directly into magnitude coefficients of Discrete Fourier transform (DFT) at exposure moment. Both optical and digital correlation is suitable for detection of this type of watermark. The decoded watermark is a set of concentric circles or sectors in the DFT domain (middle frequencies region) which is robust to photographing, printing and scanning. The unlawful people modify or replace the original photograph, and make fake passport (drivers' license and so on). Experiments show, it is difficult to forge certificates in which a watermark was embedded by our projector-camera combination based on analogue watermark method rather than classical digital method.

  13. Optical 3D watermark based digital image watermarking for telemedicine

    NASA Astrophysics Data System (ADS)

    Li, Xiao Wei; Kim, Seok Tae

    2013-12-01

    Region of interest (ROI) of a medical image is an area including important diagnostic information and must be stored without any distortion. This algorithm for application of watermarking technique for non-ROI of the medical image preserving ROI. The paper presents a 3D watermark based medical image watermarking scheme. In this paper, a 3D watermark object is first decomposed into 2D elemental image array (EIA) by a lenslet array, and then the 2D elemental image array data is embedded into the host image. The watermark extraction process is an inverse process of embedding. The extracted EIA through the computational integral imaging reconstruction (CIIR) technique, the 3D watermark can be reconstructed. Because the EIA is composed of a number of elemental images possesses their own perspectives of a 3D watermark object. Even though the embedded watermark data badly damaged, the 3D virtual watermark can be successfully reconstructed. Furthermore, using CAT with various rule number parameters, it is possible to get many channels for embedding. So our method can recover the weak point having only one transform plane in traditional watermarking methods. The effectiveness of the proposed watermarking scheme is demonstrated with the aid of experimental results.

  14. PtRu nanoparticles embedded in nitrogen doped carbon with highly stable CO tolerance and durability

    NASA Astrophysics Data System (ADS)

    Ling, Ying; Yang, Zehui; Yang, Jun; Zhang, Yunfeng; Zhang, Quan; Yu, Xinxin; Cai, Weiwei

    2018-02-01

    As is well known, the lower durability and sluggish methanol oxidation reaction (MOR) of PtRu alloy electrocatalyst blocks the commercialization of direct methanol fuel cells (DMFCs). Here, we design a new PtRu electrocatalyst, with highly stable CO tolerance and durability, in which the PtRu nanoparticles are embedded in nitrogen doped carbon layers derived from carbonization of poly(vinyl pyrrolidone). The newly fabricated electrocatalyst exhibits no loss in electrochemical surface area (ECSA) and MOR activity after potential cycling from 0.6-1.0 V versus reversible hydrogen electrode, while commercial CB/PtRu retains only 50% of its initial ECSA. Meanwhile, due to the same protective layers, the Ru dissolution is decelerated, resulting in stable CO tolerance. Methanol oxidation reaction (MOR) testing indicates that the activity of newly fabricated electrocatalyst is two times higher than that of commercial CB/PtRu, and the fuel cell performance of the embedded PtRu electrocatalyst was comparable to that of commercial CB/PtRu. The embedded PtRu electrocatalyst is applicable in real DMFC operation. This study offers important and useful information for the design and fabrication of durable and CO tolerant electrocatalysts.

  15. Sources of information used by nurses to inform practice: An integrative review.

    PubMed

    Spenceley, Shannon M; O'Leary, Katherine A; Chizawsky, Lesa L K; Ross, Amber J; Estabrooks, Carole A

    2008-06-01

    We present an integrative review of the literature about sources of information nurses use to inform practice. The demand for access to more and better information has been fueled by the evidence-based healthcare movement. Although the expectations for evidence-based practice have never been higher, the demands on care environments have never been greater. The goals of professional nursing are served by using the best available information to inform practice. To influence such activity, we must understand what sources of information nurses rely on for guidance. We examined studies of any research design published between 1985 and 2006, as well as research dissertations in the same time frame. Databases searched included the Cumulative Index of Nursing and Allied Health Literature (CINAHL), Medline, the Educational Resources Information Center, the Library and Information Science Abstracts and the Library Literature and Information Science databases. The review question: what information sources do registered nurses turn to, to support direct patient care? Analysis included an overview of study design and practice setting, and an examination of sources accessed most frequently by nurses to guide practice. We present, in ranked order, the sources nurses accessed in order to guide practice. We note the high reliance on informal, interactive sources. An unexpected finding of high reliance on journals is explored in greater detail and found to be equivocal at best. We conclude with a critical discussion of what we see as embedded assumptions and expectations about how information-seeking supports nursing practice. Expectations embedded in the scope and context of nursing practice have influenced knowledge development in the area of information-seeking to support practice. It is important that future research in this area takes into account the expectations and information needs arising in emerging roles for nurses within evolving healthcare systems.

  16. Transferring genomics to the clinic: distinguishing Burkitt and diffuse large B cell lymphomas.

    PubMed

    Sha, Chulin; Barrans, Sharon; Care, Matthew A; Cunningham, David; Tooze, Reuben M; Jack, Andrew; Westhead, David R

    2015-01-01

    Classifiers based on molecular criteria such as gene expression signatures have been developed to distinguish Burkitt lymphoma and diffuse large B cell lymphoma, which help to explore the intermediate cases where traditional diagnosis is difficult. Transfer of these research classifiers into a clinical setting is challenging because there are competing classifiers in the literature based on different methodology and gene sets with no clear best choice; classifiers based on one expression measurement platform may not transfer effectively to another; and, classifiers developed using fresh frozen samples may not work effectively with the commonly used and more convenient formalin fixed paraffin-embedded samples used in routine diagnosis. Here we thoroughly compared two published high profile classifiers developed on data from different Affymetrix array platforms and fresh-frozen tissue, examining their transferability and concordance. Based on this analysis, a new Burkitt and diffuse large B cell lymphoma classifier (BDC) was developed and employed on Illumina DASL data from our own paraffin-embedded samples, allowing comparison with the diagnosis made in a central haematopathology laboratory and evaluation of clinical relevance. We show that both previous classifiers can be recapitulated using very much smaller gene sets than originally employed, and that the classification result is closely dependent on the Burkitt lymphoma criteria applied in the training set. The BDC classification on our data exhibits high agreement (~95 %) with the original diagnosis. A simple outcome comparison in the patients presenting intermediate features on conventional criteria suggests that the cases classified as Burkitt lymphoma by BDC have worse response to standard diffuse large B cell lymphoma treatment than those classified as diffuse large B cell lymphoma. In this study, we comprehensively investigate two previous Burkitt lymphoma molecular classifiers, and implement a new gene expression classifier, BDC, that works effectively on paraffin-embedded samples and provides useful information for treatment decisions. The classifier is available as a free software package under the GNU public licence within the R statistical software environment through the link http://www.bioinformatics.leeds.ac.uk/labpages/softwares/ or on github https://github.com/Sharlene/BDC.

  17. The BBaRTS Healthy Teeth Behaviour Change Programme for preventing dental caries in primary school children: study protocol for a cluster randomised controlled trial.

    PubMed

    Pine, Cynthia; Adair, Pauline; Robinson, Louise; Burnside, Girvan; Moynihan, Paula; Wade, William; Kistler, James; Curnow, Morag; Henderson, Mary

    2016-02-20

    Oral health behaviours such as establishing twice-daily toothbrushing and sugar control intake need parental self-efficacy (PSE) to prevent the development of childhood dental caries. A previous study has shown that behaviour change techniques (BCTs) delivered via a storybook can improve parental self-efficacy to undertake twice-daily toothbrushing. to determine whether an intervention (BBaRTS, Bedtime Brush and Read Together to Sleep), designed to increase PSE; delivered through storybooks with embedded BCTs, parenting skills and oral health messages, can improve child oral health compared to (1) an exactly similar intervention containing no behaviour change techniques, and (2) the BBaRTS intervention supplemented with home supply of fluoride toothpaste and supervised toothbrushing on schooldays. A 2-year, three-arm, multicentre, cluster randomised controlled trial. children (estimated 2000-2600) aged 5-7 years and their families from 60 UK primary schools. Test group 1: a series of eight children's storybooks developed by a psychologist, public health dentist, science educator, children's author and illustrators, with guidance from the Department for Education (England). The books feature animal characters and contain embedded dental health messages, parenting skills and BCTs to promote good oral health routines focused on controlling sugar intake and toothbrushing, as well as reading at bedtime. Books are given out over 2 years. Test group 2: as Test group 1 plus home supplies of fluoride toothpaste (1000 ppmF), and daily supervised toothbrushing in school on schooldays. Active Control group: series of eight books with exactly the same stories, characters and illustrations, but without BCTs, dental health messages or parenting skills. Annual child dental examinations and parental questionnaires will be undertaken. A sub-set of participants will be invited to join an embedded study of the child's diet and salivary microbiota composition. dental caries experience in permanent teeth at age 7-8 years. A multi-disciplinary team was established to develop the BBaRTS Children's Healthy Teeth Programme. The books were developed in partnership with the Department for Education (England), informed by a series of focus groups with children, teachers and parents. ISRCTN21461006 (date of registration 23 September 2015).

  18. Programmable logic controller implementation of an auto-tuned predictive control based on minimal plant information.

    PubMed

    Valencia-Palomo, G; Rossiter, J A

    2011-01-01

    This paper makes two key contributions. First, it tackles the issue of the availability of constrained predictive control for low-level control loops. Hence, it describes how the constrained control algorithm is embedded in an industrial programmable logic controller (PLC) using the IEC 61131-3 programming standard. Second, there is a definition and implementation of a novel auto-tuned predictive controller; the key novelty is that the modelling is based on relatively crude but pragmatic plant information. Laboratory experiment tests were carried out in two bench-scale laboratory systems to prove the effectiveness of the combined algorithm and hardware solution. For completeness, the results are compared with a commercial proportional-integral-derivative (PID) controller (also embedded in the PLC) using the most up to date auto-tuning rules. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  19. Using Best Practices to Extract, Organize, and Reuse Embedded Decision Support Content Knowledge Rules from Mature Clinical Systems.

    PubMed

    DesAutels, Spencer J; Fox, Zachary E; Giuse, Dario A; Williams, Annette M; Kou, Qing-Hua; Weitkamp, Asli; Neal R, Patel; Bettinsoli Giuse, Nunzia

    2016-01-01

    Clinical decision support (CDS) knowledge, embedded over time in mature medical systems, presents an interesting and complex opportunity for information organization, maintenance, and reuse. To have a holistic view of all decision support requires an in-depth understanding of each clinical system as well as expert knowledge of the latest evidence. This approach to clinical decision support presents an opportunity to unify and externalize the knowledge within rules-based decision support. Driven by an institutional need to prioritize decision support content for migration to new clinical systems, the Center for Knowledge Management and Health Information Technology teams applied their unique expertise to extract content from individual systems, organize it through a single extensible schema, and present it for discovery and reuse through a newly created Clinical Support Knowledge Acquisition and Archival Tool (CS-KAAT). CS-KAAT can build and maintain the underlying knowledge infrastructure needed by clinical systems.

  20. Role of the Pair Correlation Function in the Dynamical Transition Predicted by Mode Coupling Theory

    NASA Astrophysics Data System (ADS)

    Nandi, Manoj Kumar; Banerjee, Atreyee; Dasgupta, Chandan; Bhattacharyya, Sarika Maitra

    2017-12-01

    In a recent study, we have found that for a large number of systems the configurational entropy at the pair level Sc 2, which is primarily determined by the pair correlation function, vanishes at the dynamical transition temperature Tc. Thus, it appears that the information of the transition temperature is embedded in the structure of the liquid. In order to investigate this, we describe the dynamics of the system at the mean field level and, using the concepts of the dynamical density functional theory, show that the dynamical transition temperature depends only on the pair correlation function. Thus, this theory is similar in spirit to the microscopic mode coupling theory (MCT). However, unlike microscopic MCT, which predicts a very high transition temperature, the present theory predicts a transition temperature that is similar to Tc. This implies that the information of the dynamical transition temperature is embedded in the pair correlation function.

Top