Pope, Catherine; Halford, Susan; Turnbull, Joanne; Prichard, Jane
2014-06-01
This article draws on data collected during a 2-year project examining the deployment of a computerised decision support system. This computerised decision support system was designed to be used by non-clinical staff for dealing with calls to emergency (999) and urgent care (out-of-hours) services. One of the promises of computerised decisions support technologies is that they can 'hold' vast amounts of sophisticated clinical knowledge and combine it with decision algorithms to enable standardised decision-making by non-clinical (clerical) staff. This article draws on our ethnographic study of this computerised decision support system in use, and we use our analysis to question the 'automated' vision of decision-making in healthcare call-handling. We show that embodied and experiential (human) expertise remains central and highly salient in this work, and we propose that the deployment of the computerised decision support system creates something new, that this conjunction of computer and human creates a cyborg practice.
Implementing security in a distributed web-based EHCR.
Sucurovic, Snezana
2007-01-01
In many countries there are initiatives for building an integrated patient-centric electronic health record. There are also initiatives for transnational integrations. These growing demands for integration result from the fact that it can provide improving healthcare treatments and reducing the cost of healthcare services. While in European highly developed countries computerisation in healthcare sector began in the 1970s and reached a high level, some developing countries, and Serbia among them, have started computerisation recently. This is why MEDIS (MEDical Information System) is aimed at integration itself from the very beginning instead of integration of heterogeneous information systems on a middle layer or using HL7 protocol. The implementation of a national healthcare information system requires using standards as integrated and widely accepted solutions. Therefore, we have started building MEDIS to meet the requirements of CEN ENV 13606 and CEN ENV 13729 standards. The prototype version has a distributed component-based architecture with modern security solutions applied. MEDIS has been implemented as a federated system where the central server hosts basic EHCR information about a patient, and clinical servers contain their own part of patients' EHCR. At present, there is an initial version of prototype planned to be deployed at first in a small community. In particular, open source API for X.509 authentication and authorisation has been developed. Our project meets the requirements for education in health informatics, including appropriate knowledge and skills on EHCR. The points included in this article have been presented on several national conferences and widely discussed. MEDIS has explored a federated, component-based EHCR architecture and related security aspects. In its initial version it shows acceptable performances and administrative simplicity. It emphasizes the importance of using standards in building EHCR in our country, in order to prepare it for future integrations.
Maclean, Donald; Younes, Hakim Ben; Forrest, Margaret; Towers, Hazel K
2012-03-01
Accurate and timely clinical data are required for clinical and organisational purposes and is especially important for patient management, audit of surgical performance and the electronic health record. The recent introduction of computerised theatre management systems has enabled real-time (point-of-care) operative procedure coding by clinical staff. However the accuracy of these data is unknown. The aim of this Scottish study was to compare the accuracy of theatre nurses' real-time coding on the local theatre management system with the central Scottish Morbidity Record (SMR01). Paired procedural codes were recorded, qualitatively graded for precision and compared (n = 1038). In this study, real-time, point-of-care coding by theatre nurses resulted in significant coding errors compared with the central SMR01 database. Improved collaboration between full-time coders and clinical staff using computerised decision support systems is suggested.
Laing, G L; Bruce, J L; Aldous, C; Clarke, D L
2014-01-01
The Pietermaritzburg Metropolitan Trauma Service formerly lacked a robust computerised trauma registry. This made surgical audit difficult for the purpose of quality of care improvement and development. We aimed to design, construct and implement a computerised trauma registry within our service. Twelve months following its implementation, we sought to examine and report on the quality of the registry. Formal ethical approval to maintain a computerised trauma registry was obtained prior to undertaking any design and development. Appropriate commercial software was sourced to develop this project. The registry was designed as a flat file. A flat file is a plain text or mixed text and binary file which usually contains one record per line or physical record. Thereafter the registry file was launched onto a secure server. This provided the benefits of access security and automated backups. Registry training was provided to clients by the developer. The exercise of data capture was then integrated into the process of service delivery, taking place at the endpoint of patient care (discharge, transfer or death). Twelve months following its implementation, the compliance rates of data entry were measured. The developer of this project managed to design, construct and implement an electronic trauma registry into the service. Twelve months following its implementation the data were extracted and audited to assess the quality. A total of 2640 patient entries were captured onto the registry. Compliance rates were in the order of eighty percent and client satisfaction rates were high. A number of deficits were identified. These included the omission of weekend discharges and underreporting of deaths. The construction and implementation of the computerised trauma registry was the beginning of an endeavour to continue improvements in the quality of care within our service. The registry provided a reliable audit at twelve months post implementation. Deficits and limitations were identified and new strategies have been planned to overcome these problems and integrate the trauma registry into the process of clinical care. Copyright © 2013 Elsevier Ltd. All rights reserved.
Pain Assessment–Can it be Done with a Computerised System? A Systematic Review and Meta-Analysis
Pombo, Nuno; Garcia, Nuno; Bousson, Kouamana; Spinsante, Susanna; Chorbev, Ivan
2016-01-01
Background: Mobile and web technologies are becoming increasingly used to support the treatment of chronic pain conditions. However, the subjectivity of pain perception makes its management and evaluation very difficult. Pain treatment requires a multi-dimensional approach (e.g., sensory, affective, cognitive) whence the evidence of technology effects across dimensions is lacking. This study aims to describe computerised monitoring systems and to suggest a methodology, based on statistical analysis, to evaluate their effects on pain assessment. Methods: We conducted a review of the English-language literature about computerised systems related to chronic pain complaints that included data collected via mobile devices or Internet, published since 2000 in three relevant bibliographical databases such as BioMed Central, PubMed Central and ScienceDirect. The extracted data include: objective and duration of the study, age and condition of the participants, and type of collected information (e.g., questionnaires, scales). Results: Sixty-two studies were included, encompassing 13,338 participants. A total of 50 (81%) studies related to mobile systems, and 12 (19%) related to web-based systems. Technology and pen-and-paper approaches presented equivalent outcomes related with pain intensity. Conclusions: The adoption of technology was revealed as accurate and feasible as pen-and-paper methods. The proposed assessment model based on data fusion combined with a qualitative assessment method was revealed to be suitable. Data integration raises several concerns and challenges to the design, development and application of monitoring systems applied to pain. PMID:27089351
ERIC Educational Resources Information Center
Bennett, Roger; Kottasz, Rita; Nocciolino, Julia
2007-01-01
Outputs from a computerised touch pad turnstile security system that recorded business students' entries into and exits from a university's buildings revealed that a significant number of the institution's first-year intake withdrew from their (business) degree programmes within a few weeks of enrolment. Accordingly, a sample of these "early…
ERIC Educational Resources Information Center
Dahlin, Karin I. E.
2013-01-01
Working Memory (WM) has a central role in learning. It is suggested to be malleable and is considered necessary for several aspects of mathematical functioning. This study investigated whether work with an interactive computerised working memory training programme at school could affect the mathematical performance of young children. Fifty-seven…
Teaching the Repeated Prisoner's Dilemma with a Non-Computerised Adaptation of Axelrod's Tournament
ERIC Educational Resources Information Center
Dennis, Catherine
2015-01-01
Darwin's theory of evolution is explicitly competitive, yet co-operation between individuals is a common phenomenon. The Prisoner's Dilemma model is central to the teaching of the evolution of co-operation. The best-known explorations of the Prisoner's Dilemma are the tournaments run by Robert Axelrod in the 1980s. Aimed at students of biological…
Immunisation registers in Italy: a patchwork of computerisation.
Alfonsi, V; D'Ancona, F; Rota, M C; Giambi, C; Ranghiasci, A; Iannazzo, S
2012-04-26
In Italy, the 21 regional health authorities are in charge of organising and implementing their own vaccination strategy, based on the national vaccine plan. Immunisation coverage varies greatly among the regions for certain vaccines. Efforts to increase childhood immunisation coverage have included initiatives to develop and implement computerised immunisation registers in as many regions as possible. We undertook a cross-sectional online survey in July 2011 to provide an updated picture of the use, heterogeneity and main functions of different computerised immunisation registers used in the Italian regions and to understand the flow of information from local health units to the regional authorities and to the Ministry of Health. Comparing current data with those obtained in 2007, a substantial improvement is evident. A total of 15 regions are fully computerised (previously nine), with 83% of local health units equipped with a computerised register (previously 70%). Eight of the 15 fully computerised regions use the same software, simplifying data sharing. Only four regions are able to obtain data in real time from local health units. Despite the progress made, the capacity to monitor vaccination coverage and to exchange data appears still limited.
Attitudes of nursing staff towards computerisation: a case of two hospitals in Nairobi, Kenya
2014-01-01
Background The health sector is faced with constant changes as new approaches to tackle illnesses are unveiled through research. Information, communication and technology have greatly transformed healthcare practice the world over. Nursing is continually exposed to a variety of changes. Variables including age, educational level, years worked in nursing, computer knowledge and experience have been found to influence the attitudes of nurses towards computerisation. The purpose of the study was to determine the attitudes of nurses towards the use of computers and the factors that influence these attitudes. Methods This cross sectional descriptive study was conducted among staff nurses working at one public hospital (Kenyatta National Hospital, (KNH) and one private hospital (Aga Khan University Hospital (AKUH). A convenience sample of 200 nurses filled the questionnaires. Data was collected using the modified Nurses’ Attitudes Towards Computerisation (NATC) questionnaire. Results Nurses had a favorable attitude towards computerisation. Non-users had a significantly higher attitude score compared to the users (p = 0.0274). Statistically significant associations were observed with age (p = 0.039), level of education (p = 0.025), duration of exposure to computers (p = 0.025) and attitudes towards computerisation. Conclusion Generally, nurses have positive attitudes towards computerisation. This information is important for the planning and implementation of computerisation in the hospital as suggested in other studies. PMID:24774008
The security of patient identifiable information in doctors' homes.
McLean, Iain; Anderson, C Mary
2004-08-01
Ethically and legally doctors bear a responsibility to ensure the security of patient identifiable information in their possession. Many doctors, especially those in forensic medicine, hold paper or computerised medical records at home. This survey was conducted to assess the level of security for these records and awareness of the issues. Fifty-six forensic physicians (30 male, 26 female) answered a questionnaire. Eighty-nine percent used a computer to write patient notes and reports, but only 26 of these were on the Data Protection Register, and only 24 password-protected their files. Few doctors took steps to protect data on old computers they had stopped using. Of those responding, 88% held paper records at home but only of these had lockable filing cabinets. Burglar alarms were fitted in 77% of homes, yet 36% of homes had been burgled. No participants had written instructions for disposal of records and reports after their death. Older participants were more likely to have been burgled, yet less likely to have antiviral software than their younger counterparts. Participants expressed the need for information, education and training in data security.
Computerised patient record with distributed objects.
Gornik, T; Orel, A; Roblek, D; Verhovsek, R
1999-01-01
The vast spectrum of information and functionality requirements imposed on a Computerised Patient Record (CPR), fueled by an ever changing and expanding business model demands information system interoperability. The management of information, created across the continuum of care, and associated information system functionality, can not be provided by data interchange to and from monolithic applications. WebDoctor is a Computerised Patient Record (CPR) which is fully used at the Institute of Oncology in Ljubljana, Slovenia--a hospital with 500 beds and more than 200 users, all of them medical professionals. The data are stored in an underlying Oracle hospital data base. For logging the username and password security is used. WebDoctor uses Internationalization APIs. Currently GUI is currently written in Slovenian language, but can be easily adapted to any other language. It is available in either Metal or Windows look. Search for patients is based on CPR No. or partial data from demographics. All the available patients data can be found on a single screen divided into several tab sections. The tab sections cover general and speciality data. The general data include demographics, admissions and diagnoses, meanwhile the speciality data are divided into Labs where data are represented numerically by date or by type and graphically with the ability of detailed view in separate window, Radiology where results are represented in textual form as well as pictures together with a special viewer to provide detailed analyses and Radioisotopes where results are also being represented in textual form together with a graphical representation. WebDoctor is running on virtually any platform. It achieved the 100% Java Certification which places the application among the firsts if not the first of this kind in the healthcare industry. It excels with a small and light client which doesn't exceed the 150K.
de Graaf, L Esther; Gerhards, Sylvia AH; Evers, Silvia MAA; Arntz, Arnoud; Riper, Heleen; Severens, Johan L; Widdershoven, Guy; Metsemakers, Job FM; Huibers, Marcus JH
2008-01-01
Background Major depression is a common mental health problem in the general population, associated with a substantial impact on quality of life and societal costs. However, many depressed patients in primary care do not receive the care they need. Reason for this is that pharmacotherapy is only effective in severely depressed patients and psychological treatments in primary care are scarce and costly. A more feasible treatment in primary care might be computerised cognitive behavioural therapy. This can be a self-help computer program based on the principles of cognitive behavioural therapy. Although previous studies suggest that computerised cognitive behavioural therapy is effective, more research is necessary. Therefore, the objective of the current study is to evaluate the (cost-) effectiveness of online computerised cognitive behavioural therapy for depression in primary care. Methods/Design In a randomised trial we will compare (a) computerised cognitive behavioural therapy with (b) treatment as usual by a GP, and (c) computerised cognitive behavioural therapy in combination with usual GP care. Three hundred mild to moderately depressed patients (aged 18–65) will be recruited in the general population by means of a large-scale Internet-based screening (N = 200,000). Patients will be randomly allocated to one of the three treatment groups. Primary outcome measure of the clinical evaluation is the severity of depression. Other outcomes include psychological distress, social functioning, and dysfunctional beliefs. The economic evaluation will be performed from a societal perspective, in which all costs will be related to clinical effectiveness and health-related quality of life. All outcome assessments will take place on the Internet at baseline, two, three, six, nine, and twelve months. Costs are measured on a monthly basis. A time horizon of one year will be used without long-term extrapolation of either costs or quality of life. Discussion Although computerised cognitive behavioural therapy is a promising treatment for depression in primary care, more research is needed. The effectiveness of online computerised cognitive behavioural therapy without support remains to be evaluated as well as the effects of computerised cognitive behavioural therapy in combination with usual GP care. Economic evaluation is also needed. Methodological strengths and weaknesses are discussed. Trial registration The study has been registered at the Netherlands Trial Register, part of the Dutch Cochrane Centre (ISRCTN47481236). PMID:18590518
[Teletransmission, health care and deontology].
Lousson, J P
1995-01-01
EDI is the technique the most frequently used by Chemists to relay their daily orders to their suppliers. Three out of four Chemists in France are computerised using various forms of computer hardware and software. The Health Care organisations propose that Chemists use the EDI to relay to the CETELIC all the items of information concerning their invoicing. This means handing over administrative information identifying the patient, the doctor ... as well as financial and confidential data such as the CIP code of the prescribed and delivered medicine. The law of the 4th January 1993 was instigated to control the rising expenses of the Health Care organisations and it mandates the Caisse Primaire d'Assurance Maladie (the French social security organisations) to retrieve and analyse the information thus gathered from all of the medical professionals involved. However, the accumulation of all these items of computerised information constitutes in effect a confidential medical file on each patient. This raises the following issues: Who does this confidential data belong to? Who should the Chemists give it to? What is to be done with it? Who will be responsible for its analysis in respect of the confidentiality problem? (Another medical professional bound by oath?) And how can we insure against subsequent abuse of this material?
Hogg, K; Dawson, D; Mackway‐Jones, K
2006-01-01
Objectives To measure the diagnostic accuracy of computerised strain gauge plethysmography in the diagnosis of pulmonary embolism (PE). Methods Two researchers prospectively recruited 425 patients with pleuritic chest pain presenting to the emergency department (ED). Lower limb computerised strain gauge plethysmography was performed in the ED. All patients underwent an independent reference standard diagnostic algorithm to establish the presence or absence of PE. A low modified Wells' clinical probability combined with a normal D‐dimer excluded PE. All others required diagnostic imaging with PIOPED interpreted ventilation perfusion scanning and/or computerised tomography (CT) pulmonary angiography. Patients with a nondiagnostic CT had digital subtraction pulmonary angiography. All patients were followed up clinically for 3 months. Results The sensitivity of computerised strain gauge plethysmography was 33.3% (95% confidence interval (CI) 16.3 to 56.2%) and specificity 64.1% (95% CI 59.0 to 68.8%). The negative likelihood ratio was 1.04 (95% CI 0.68 to 1.33) and positive likelihood ratio 0.93 (95% CI 0.45 to 1.60). Conclusions Lower limb computerised strain gauge plethysmography does not aid in the diagnosis of PE. PMID:16439734
Derikx, Joep P M; Erdkamp, Frans L G; Hoofwijk, A G M
2013-01-01
An electronic health record (EHR) should provide 4 key functionalities: (a) documenting patient data; (b) facilitating computerised provider order entry; (c) displaying the results of diagnostic research; and (d) providing support for healthcare providers in the clinical decision-making process.- Computerised provider order entry into the EHR enables the electronic receipt and transfer of orders to ancillary departments, which can take the place of handwritten orders.- By classifying the computer provider order entries according to disorders, digital care pathways can be created. Such care pathways could result in faster and improved diagnostics.- Communicating by means of an electronic instruction document that is linked to a computerised provider order entry facilitates the provision of healthcare in a safer, more efficient and auditable manner.- The implementation of a full-scale EHR has been delayed as a result of economic, technical and legal barriers, as well as some resistance by physicians.
Guidelines for computer security in general practice.
Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan
2007-01-01
As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making these guidelines relevant to local contexts should help maximise their uptake.
Applying Adaptive Variables in Computerised Adaptive Testing
ERIC Educational Resources Information Center
Triantafillou, Evangelos; Georgiadou, Elissavet; Economides, Anastasios A.
2007-01-01
Current research in computerised adaptive testing (CAT) focuses on applications, in small and large scale, that address self assessment, training, employment, teacher professional development for schools, industry, military, assessment of non-cognitive skills, etc. Dynamic item generation tools and automated scoring of complex, constructed…
Dalton, Kieran; O'Brien, Gary; O'Mahony, Denis; Byrne, Stephen
2018-06-08
computerised interventions have been suggested as an effective strategy to reduce potentially inappropriate prescribing (PIP) for hospitalised older adults. This systematic review and meta-analysis examined the evidence for efficacy of computerised interventions designed to reduce PIP in this patient group. an electronic literature search was conducted using eight databases up to October 2017. Included studies were controlled trials of computerised interventions aiming to reduce PIP in hospitalised older adults (≥65 years). Risk of bias was assessed using Cochrane's Effective Practice and Organisation of Care criteria. of 653 records identified, eight studies were included-two randomised controlled trials, two interrupted time series analysis studies and four controlled before-after studies. Included studies were mostly at a low risk of bias. Overall, seven studies showed either a statistically significant reduction in the proportion of patients prescribed a potentially inappropriate medicine (PIM) (absolute risk reduction {ARR} 1.3-30.1%), or in PIMs ordered (ARR 2-5.9%). However, there is insufficient evidence thus far to suggest that these interventions can routinely improve patient-related outcomes. It was only possible to include three studies in the meta-analysis-which demonstrated that intervention patients were less likely to be prescribed a PIM (odds ratio 0.6; 95% CI 0.38, 0.93). No computerised intervention targeting potential prescribing omissions (PPOs) was identified. this systematic review concludes that computerised interventions are capable of statistically significantly reducing PIMs in hospitalised older adults. Future interventions should strive to target both PIMs and PPOs, ideally demonstrating both cost-effectiveness data and clinically significant improvements in patient-related outcomes.
76 FR 43993 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
...; System of Records AGENCY: National Security Agency/Central Security Service, Department of Defense. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security.... FOR FURTHER INFORMATION CONTACT: Ms. Anne Hill, National Security Agency/Central Security Service...
Barken, Tina Lien; Thygesen, Elin; Söderhamn, Ulrika
2017-12-28
Telemedicine is changing traditional nursing care, and entails nurses performing advanced and complex care within a new clinical environment, and monitoring patients at a distance. Telemedicine practice requires complex disease management, advocating that the nurses' reasoning and decision-making processes are supported. Computerised decision support systems are being used increasingly to assist reasoning and decision-making in different situations. However, little research has focused on the clinical reasoning of nurses using a computerised decision support system in a telemedicine setting. Therefore, the objective of the study is to explore the process of telemedicine nurses' clinical reasoning when using a computerised decision support system for the management of patients with chronic obstructive pulmonary disease. The factors influencing the reasoning and decision-making processes were investigated. In this ethnographic study, a combination of data collection methods, including participatory observations, the think-aloud technique, and a focus group interview was employed. Collected data were analysed using qualitative content analysis. When telemedicine nurses used a computerised decision support system for the management of patients with complex, unstable chronic obstructive pulmonary disease, two categories emerged: "the process of telemedicine nurses' reasoning to assess health change" and "the influence of the telemedicine setting on nurses' reasoning and decision-making processes". An overall theme, termed "advancing beyond the system", represented the connection between the reasoning processes and the telemedicine work and setting, where being familiar with the patient functioned as a foundation for the nurses' clinical reasoning process. In the telemedicine setting, when supported by a computerised decision support system, nurses' reasoning was enabled by the continuous flow of digital clinical data, regular video-mediated contact and shared decision-making with the patient. These factors fostered an in-depth knowledge of the patients and acted as a foundation for the nurses' reasoning process. Nurses' reasoning frequently advanced beyond the computerised decision support system recommendations. Future studies are warranted to develop more accurate algorithms, increase system maturity, and improve the integration of the digital clinical information with clinical experiences, to support telemedicine nurses' reasoning process.
75 FR 56079 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-15
... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency/Central Security Service is proposing to...
76 FR 58786 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-22
... National Security Agency/Central Security System systems of records notices subject to the Privacy Act of... inquiries to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; Systems of Records AGENCY: National Security Agency/Central Security Service, Department of Defense (DoD...
77 FR 56628 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-13
... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a system of records. SUMMARY: The National Security Agency/Central Security Service proposes to add a new...
78 FR 45913 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-30
... National Security Agency/Central Security Service systems of records subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act Office, 9800...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to alter...
ERIC Educational Resources Information Center
Kirk, Hannah E.; Gray, Kylie M.; Ellis, Kirsten; Taffe, John; Cornish, Kim M.
2016-01-01
Background: Children with intellectual and developmental disabilities (IDD) experience heightened attention difficulties which have been linked to poorer cognitive, academic and social outcomes. Although, increasing research has focused on the potential of computerised cognitive training in reducing attention problems, limited studies have…
Ojanen, Timo T.; Boonmongkon, Pimpawun; Samakkeekarom, Ronnapoom; Samoh, Nattharat; Cholratana, Mudjalin; Payakkakom, Anusorn; Guadamuz, Thomas E.
2014-01-01
Violence in the physical (offline) world is a well-documented health and social issue among young people worldwide. In Southeast Asia, online harassment (defined as intentional behaviours to harm others through the Internet or through mobile devices) is less well documented. In this paper, we describe and critically discuss the mixed-methods data collection approach we used to build a contextualised understanding of offline violence and online harassment among 15-24 year-old students and out-of-school youth in Central Thailand. We mapped linkages between offline violence and online harassment, and with their possible correlates including gender, sexuality, and mobile media or Internet use. Data collection methods included in-depth interviews, focus group discussions and a custom-built, self-administered computerised survey. Using mixed methods enabled us to collect holistic qualitative/quantitative data from both students and out-of-school youth. In our discussion, we focus on gender, sexuality, class and ethnicity issues in recruiting out-of-school youth; definition and measurement issues; technical issues in using a computerised survey; ethical issues surrounding data collection from minors as well as privacy and confidentiality concerns in collecting data in both in-school and out-of-school settings; and the general implications of using mixed methods. PMID:25010363
Ojanen, Timo T; Boonmongkon, Pimpawun; Samakkeekarom, Ronnapoom; Samoh, Nattharat; Cholratana, Mudjalin; Payakkakom, Anusorn; Guadamuz, Thomas E
2014-01-01
Violence in the physical (offline) world is a well-documented health and social issue among young people worldwide. In Southeast Asia, online harassment (defined as intentional behaviours to harm others through the Internet or through mobile devices) is less well documented. In this paper, we describe and critically discuss the mixed-methods data collection approach we used to build a contextualised understanding of offline violence and online harassment among 15- to 24-year-old students and out-of-school youth in Central Thailand. We mapped linkages between offline violence and online harassment, and with their possible correlates including gender, sexuality, and mobile media or Internet use. Data collection methods included in-depth interviews, focus group discussions and a custom-built, self-administered computerised survey. Using mixed methods enabled us to collect holistic qualitative/quantitative data from both students and out-of-school youth. In our discussion, we focus on gender, sexuality, class and ethnicity issues in recruiting out-of-school youth; definition and measurement issues; technical issues in using a computerised survey; ethical issues surrounding data collection from minors as well as privacy and confidentiality concerns in collecting data in both in-school and out-of-school settings; and the general implications of using mixed methods.
Do Computerised Training Programmes Designed to Improve Working Memory Work?
ERIC Educational Resources Information Center
Apter, Brian J. B.
2012-01-01
A critical review of working memory training research during the last 10 years is provided. Particular attention is given to research that has attempted to investigate the efficacy of commercially marketed computerised training programmes such as "Cogmed" and "Jungle Memory". Claimed benefits are questioned on the basis that research methodologies…
Demography, Social Structure and Learning through Life
ERIC Educational Resources Information Center
van der Veen, Ruud
2010-01-01
The modernisation of the Western world during the last two centuries has been a mix of industrialisation/computerisation and urbanisation. Consequently, reports on the future of adult learning and adult education have been a mix on the one hand of the learning requirements that follow from industrialisation/computerisation and on the other hand,…
Computerised Accounting Software; A Curriculum That Enhances an Accounting Programme
ERIC Educational Resources Information Center
Machera, Robert P.; Machera, Precious C.
2017-01-01
There has been an outcry in commerce and industry about students who fail to perform in the accounting department due to lack of "practical accounting skills". It is from this background that the researchers were motivated to investigate the impact of a Computerised Accounting Software Curriculum that enhances an Accounting Programme. At…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-12
... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...
Pennant, Mary E; Loucas, Christina E; Whittington, Craig; Creswell, Cathy; Fonagy, Peter; Fuggle, Peter; Kelvin, Raphael; Naqvi, Sabrina; Stockton, Sarah; Kendall, Tim
2015-04-01
One quarter of children and young people (CYP) experience anxiety and/or depression before adulthood, but treatment is sometimes unavailable or inadequate. Self-help interventions may have a role in augmenting treatment and this work aimed to systematically review the evidence for computerised anxiety and depression interventions in CYP aged 5-25 years old. Databases were searched for randomised controlled trials and 27 studies were identified. For young people (12-25 years) with risk of diagnosed anxiety disorders or depression, computerised CBT (cCBT) had positive effects for symptoms of anxiety (SMD -0.77, 95% CI -1.45 to -0.09, k = 6, N = 220) and depression (SMD -0.62, 95% CI -1.13 to -0.11, k = 7, N = 279). In a general population study of young people, there were small positive effects for anxiety (SMD -0.15, 95% CI -0.26 to -0.03; N = 1273) and depression (SMD -0.15, 95% CI -0.26 to -0.03; N = 1280). There was uncertainty around the effectiveness of cCBT in children (5-11 years). Evidence for other computerised interventions was sparse and inconclusive. Computerised CBT has potential for treating and preventing anxiety and depression in clinical and general populations of young people. Further program development and research is required to extend its use and establish its benefit in children. Copyright © 2015 Elsevier Ltd. All rights reserved.
Davis, N F; Murray, G; O'Connor, T; Browne, C; MacCraith, E; Galvin, D; Mulvin, D; Quinlan, D; Lennon, G
2017-11-01
A forgotten ureteric stent may result in severe renal impairment leading to nephrectomy. To compare the effectiveness of a centralised computerised registry for monitoring ureteric stent activity with a previously established theatre stent logbook system. This prospective audit was performed in two 9-monthly intervals. During the first interval, insertion/removal of a ureteric stent was documented in a specific theatre stent logbook. In the second interval, an electronic centralised computerised registry was developed to document insertion/removal of a ureteric stent onto an accessible hospital server. A computerised traffic-light system was also developed to identify patients with an indwelling stent for >3 months. The primary outcome variable was the number of prolonged indwelling ureteric stents in both groups. During the first time interval, 188 ureteric stents were inserted and 182 (96%) were removed or changed. Six (4%) patients underwent insertion of a ureteric stent for a prolonged period of time (>6 months). This subgroup required complex endourological intervention for stent removal due to encrustation. During the second time interval, 157 ureteric stents were inserted and all patients had their stent removed or changed within 6 months. No patients in this group were lost to follow-up. This study demonstrates that a centralised computerised ureteric stent registry is superior to a conventional logbook for monitoring ureteric stent activity. We propose the introduction a centralised nationalised ureteric stent registry for eliminating the potential for prolonged or forgotten ureteric stents.
Evaluation of three indices for biofilm accumulation on complete dentures.
Paranhos, Helena de Freitas Oliveira; Lovato da Silva, Claudia Helena; de Souza, Raphael Freitas; Pontes, Karina Matthes de Freitas
2010-03-01
The objective of this study was to evaluate the accuracy and reproducibility of three complete denture biofilm indices (Prosthesis Hygiene Index; Jeganathan et al. Index; Budtz-Jørgensen Index) by means of a computerised comparison method. Clinical studies into denture hygiene have employed a large number of biofilm indices among their outcome variables. However, the knowledge about the validity of these indices is still scarce. Sixty-two complete denture wearers were selected. The internal surfaces of the upper complete dentures were stained (5% erythrosine) and photographed. The slides were projected on paper, and the biofilm indices were applied over the photos by means of a scoring method. For the computerised method, the areas (total and biofilm-covered) were measured by dedicated software (Image Tool). In addition, to compare the results of the computerised method and Prosthetic Hygiene Index, a new scoring scale (including four and five graded) was introduced. For the Jeganathan et al. and Budtz-Jørgensen indices, the original scales were used. Values for each index were compared with the computerised method by the Friedman test. Their reproducibility was measured by means of weighed kappa. Significance for both tests was set at 0.05. The indices tested provided similar mean measures but they tended to overestimate biofilm coverage when compared with the computerised method (p < 0.001). Agreement between the Prosthesis Hygiene Index and the computerised method was not significant, regardless of the scale used. Jeghanathan et al. Index showed weak agreement, and consistent results were found for Budtz-Jorgensen Index (kappa = 0.19 and 0.39 respectively). Assessment of accuracy for the biofilm indices showed instrument bias that was similar among the tested methods. Weak inter-instrument reproducibility was found for the indices, except for the Budtz-Jørgensen Index. This should be the method of choice for clinical studies when more sophisticated approaches are not possible.
ERIC Educational Resources Information Center
Van der Molen, M. J.; Van Luit, J. E. H.; Van der Molen, M. W.; Klugkist, I.; Jongmans, M. J.
2010-01-01
Background: The goal of this study is to evaluate the effectiveness of a computerised working memory (WM) training on memory, response inhibition, fluid intelligence, scholastic abilities and the recall of stories in adolescents with mild to borderline intellectual disabilities attending special education. Method: A total of 95 adolescents with…
ERIC Educational Resources Information Center
Toyoda, Etsuko
2016-01-01
For second-language learners to effectively and efficiently gather information from online texts in their target language, a well-designed computerised system to assist their reading is essential. While many articles and websites which introduce electronic second-language learning tools exist, evaluation of their functions in relation to the…
ERIC Educational Resources Information Center
Wei, Wei; Zheng, Ying
2017-01-01
This research provided a comprehensive evaluation and validation of the listening section of a newly introduced computerised test, Pearson Test of English Academic (PTE Academic). PTE Academic contains 11 item types assessing academic listening skills either alone or in combination with other skills. First, task analysis helped identify skills…
Using a Computerised Graphics Package to Achieve a Technology-Oriented Classroom
ERIC Educational Resources Information Center
Aladejana, Francisca; Idowu, Lanre
2009-01-01
The present situation in Nigeria involves students of fine arts, a practical-oriented subject, being exposed to poor methods of teaching with consequent poor performances. This study examined the extent to which the use of a computerised graphics package could make the classroom technology-oriented and affect the performance of learners. This is…
A New Computerised Advanced Theory of Mind Measure for Children with Asperger Syndrome: The ATOMIC
ERIC Educational Resources Information Center
Beaumont, Renae B.; Sofronoff, Kate
2008-01-01
This study examined the ability of children with Asperger Syndrome (AS) to attribute mental states to characters in a new computerised, advanced theory of mind measure: The Animated Theory of Mind Inventory for Children (ATOMIC). Results showed that children with AS matched on IQ, verbal comprehension, age and gender performed equivalently on…
ERIC Educational Resources Information Center
Ghilay, Yaron; Ghilay, Ruth
2012-01-01
The study examined advantages and disadvantages of computerised assessment compared to traditional evaluation. It was based on two samples of college students (n=54) being examined in computerised tests instead of paper-based exams. Students were asked to answer a questionnaire focused on test effectiveness, experience, flexibility and integrity.…
Future of computerised electrocardiography.
Meijler, F L; Robles de Medina, E O; Helder, J C
1980-01-01
The advent of computerised electrocardiography has been of prime importance for the storage and retrieval of data, but none of the available systems is of universal application for analysis of patterns. Future needs require hierarchical systems of increasing degrees of complexity, depending on the source of requests, and there should be appropriate provision for review by cardiologists before the final report is issued. PMID:7000098
Review and Reward within the Computerised Peer-Assessment of Essays
ERIC Educational Resources Information Center
Davies, Phil
2009-01-01
This article details the implementation and use of a "Review Stage" within the CAP (computerised assessment by peers) tool as part of the assessment process for a post-graduate module in e-learning. It reports upon the effect of providing the students with a "second chance" in marking and commenting their peers' essays having been able to view the…
76 FR 62630 - Information Security Regulations
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-11
... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1902 Information Security Regulations AGENCY: Central Intelligence Agency. ACTION: Final rule. SUMMARY: The Central Intelligence agency is removing certain information security regulations which have become outdated. The Executive Order upon which the regulations...
A Computerized Wear Particle Atlas for Ferrogram and Filtergram Analyses
1998-01-01
A Computerised Wear Particle Atlas for Ferrogram and Filtergram Analyses Jian G. Ding Lubrosoft P/L P 0 Box 2368, Rowville Melbourne VIC 3178...Australia (61-3) 9759-9083 Abstract: A new computerised wear particle atlas has been developed for identification of solid particles and...differentiation of wear severity of lubricated equipment. This atlas contains 892 images of representative solid particles selected from thousands of filtergram
Rodriguez, Daniel M; Teesson, Maree; Newton, Nicola C
2014-03-01
Serious educational games (SEG) have been shown to be effective in educating young people about a range of topics, including languages and maths. This paper identifies the use of computerised SEGs in education about alcohol and other drugs and reviews their impact on the prevention of alcohol and drug use. The Cochrane Library, EMBASE, MEDLINE, ERIC, Scopus, psychINFO, pubMED and DRUG databases were searched in February 2013. Additional publications were obtained from the reference lists of the relevant papers. Studies were included if they described an evaluation of a computerised SEG that targeted alcohol and/or other drugs and had been trialled with adolescents. Eight SEGs were identified targeting tobacco, alcohol, cannabis, methamphetamine, ecstasy, inhalants, cocaine and opioids. Six reported positive outcomes in terms of increased content knowledge and two reported increased negative attitudes towards the targeted drugs. Only one reported a decrease in the frequency of drug use. This is the first review of the efficacy of computerised SEGs for alcohol and other drugs for adolescents. Results suggest that SEGs can increase content knowledge of alcohol and other drugs. Evidence concerning impacts on negative attitudes and alcohol and drug use is limited, with few studies examining these outcomes. © 2013 Australasian Professional Society on Alcohol and other Drugs.
Matsuda, Yasuhiro; Morimoto, Tsubasa; Furukawa, Shunichi; Sato, Sayaka; Hatsuse, Norifumi; Iwata, Kazuhiko; Kimura, Mieko; Kishimoto, Toshifumi; Ikebuchi, Emi
2018-04-01
Devising new methods to improve neurocognitive impairment through cognitive remediation is an important research goal. We developed an original computer programme termed the Japanese Cognitive Rehabilitation Programme for Schizophrenia (JCORES) that provides cognitive practice across a broad range of abilities. The current study examined for the first time whether a cognitive remediation programme, including both computerised cognitive training using JCORES and group intervention such as enhancing meta-cognition and teaching strategies, is more effective than treatment as usual for improving neurocognitive and social functioning. Sixty-two outpatients with schizophrenia were randomised to either a cognitive remediation group or a control group. Participants engaged in two computerised cognitive training sessions and one group meeting per week for 12 weeks. The average number of total sessions attended (computerised cognitive practice + group intervention) was 32.3 (89.7%). The cognitive remediation group showed significantly more improvements in verbal memory, composite score of the Brief Assessment of Cognition in Schizophrenia, Japanese version (BACS-J), and general psychopathology on the Positive and Negative Syndrome Scale (PANSS) than the control group. These findings demonstrate that a cognitive remediation programme is feasible in Japan and is a more effective way to improve neurocognitive functioning and psychiatric symptoms.
77 FR 26259 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-03
.... SUPPLEMENTARY INFORMATION: The National Security Agency systems of records notice subject to the Privacy Act of... of Records AGENCY: National Security Agency/Central Security Service. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security Service is deleting a system of...
75 FR 67697 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-03
... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act (FOIA)/Privacy Act Office...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a...
75 FR 43494 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to...
[A computerised clinical decision-support system for the management of depression in Primary Care].
Aragonès, Enric; Comín, Eva; Cavero, Myriam; Pérez, Víctor; Molina, Cristina; Palao, Diego
Despite its clinical relevance and its importance as a public health problem, there are major gaps in the management of depression. Evidence-based clinical guidelines are useful to improve processes and clinical outcomes. In order to make their implementation easier these guidelines have been transformed into computerised clinical decision support systems. In this article, a description is presented on the basics and characteristics of a new computerised clinical guideline for the management of major depression, developed in the public health system in Catalonia. This tool helps the clinician to establish reliable and accurate diagnoses of depression, to choose the best treatment a priori according to the disease and the patient characteristics. It also emphasises the importance of systematic monitoring to assess the clinical course, and to adjust therapeutic interventions to the patient's needs at all times. Copyright © 2016 Elsevier España, S.L.U. All rights reserved.
Mazza, Danielle; Pearce, Christopher; Turner, Lyle Robert; De Leon-Santiago, Maria; McLeod, Adam; Ferriggi, Jason; Shearer, Marianne
2016-07-04
The Melbourne East MonAsh GeNeral PracticE DaTabase (MAGNET) research platform was launched in 2013 to provide a unique data source for primary care and health services research in Australia. MAGNET contains information from the computerised records of 50 participating general practices and includes data from the computerised medical records of more than 1,100,000 patients. The data extracted is patient-level episodic information and includes a variety of fields related to patient demographics and historical clinical information, along with the characteristics of the participating general practices. While there are limitations to the data that is currently available, the MAGNET research platform continues to investigate other avenues for improving the breadth and quality of data, with the aim of providing a more comprehensive picture of primary care in Australia.
Georgieva, A; Payne, S J; Redman, C W G
2009-12-01
The foetal heart rate (FHR) response to uterine contractions is crucial to detect foetal distress by electronic FHR monitoring during labour. We are developing a new automated system (OxSys) for decision support in labour, using the Oxford database of intrapartum FHR records. We describe here a novel technique for automated detection of uterus contractions. In addition, we present a comparison of the new method with four other computerised approaches. During training, OxSys achieved sensitivity above 95% and positive predictive value (PPV) of up to 90% for traces of good quality. During testing, OxSys achieved sensitivity = 87% and PPV = 75%. For comparison, a second clinical expert obtained sensitivity = 93% and PPV = 80%, and all other computerised approaches achieved lower values. It was concluded that the proposed method can be employed with confidence in our study on foetal health assessment in labour and future OxSys development.
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
Objective assessment of attention in delirium: a narrative review.
Tieges, Zoë; Brown, Laura J E; MacLullich, Alasdair M J
2014-12-01
Inattention is a core feature of delirium, and valid assessment of attention is central to diagnosis. Methods of measuring attention in delirium can be divided into two broad categories: (i) objective neuropsychological testing; and (ii) subjective grading of behaviour during interview and clinical examination. Here, we review and critically evaluate studies of objective neuropsychological testing of attention in delirium. We examine the implications of these studies for delirium detection and monitoring in clinical practice and research, and how these studies inform understanding of the nature of attentional deficits in delirium. Searches of MEDLINE and ISI Web of Knowledge databases were performed to identify studies in which objective tests of attention had been administered to patients with delirium, who had been diagnosed using DSM or ICD criteria. Sixteen publications were identified. The attention tests administered in these studies were grouped into the following categories: measures of attention span, vigilance tests, other pen-and-paper tests (e.g. Trail Making Test) and computerised tests of speeded reaction, vigilance and sustained attention. Patients with delirium showed deficits on all tasks, although most tasks were not considered pure measures of attention. Five papers provided data on differential diagnosis from dementia. Cancellation tests, spatial span tests and computerised tests of sustained attention discriminated delirium from dementia. Five studies presented reliability or validity statistics. The existing evidence base on objective assessment of attention in delirium is small. Objective testing of attention is underdeveloped but shows considerable promise in clinical practice and research. Copyright © 2014 John Wiley & Sons, Ltd.
12 CFR 234.4 - Standards for central securities depositories and central counterparties.
Code of Federal Regulations, 2013 CFR
2013-01-01
... it meets or exceeds the following risk-management standards with respect to the payment, clearing... central counterparty's risk-management procedures. (9) The central securities depository or central... plausible market conditions. (b) The Board, by order, may apply heightened risk-management standards to a...
12 CFR 234.4 - Standards for central securities depositories and central counterparties.
Code of Federal Regulations, 2014 CFR
2014-01-01
... it meets or exceeds the following risk-management standards with respect to the payment, clearing... central counterparty's risk-management procedures. (9) The central securities depository or central... plausible market conditions. (b) The Board, by order, may apply heightened risk-management standards to a...
Musiat, Peter; Goldstone, Philip; Tarrier, Nicholas
2014-04-11
E-mental health and m-mental health include the use of technology in the prevention, treatment and aftercare of mental health problems. With the economical pressure on mental health services increasing, e-mental health and m-mental health could bridge treatment gaps, reduce waiting times for patients and deliver interventions at lower costs. However, despite the existence of numerous effective interventions, the transition of computerised interventions into care is slow. The aim of the present study was to investigate the acceptability of e-mental health and m-mental health in the general population. An advisory group of service users identified dimensions that potentially influence an individual's decision to engage with a particular treatment for mental health problems. A large sample (N = 490) recruited through email, flyers and social media was asked to rate the acceptability of different treatment options for mental health problems on these domains. Results were analysed using repeated measures MANOVA. Participants rated the perceived helpfulness of an intervention, the ability to motivate users, intervention credibility, and immediate access without waiting time as most important dimensions with regard to engaging with a treatment for mental health problems. Participants expected face-to-face therapy to meet their needs on most of these dimensions. Computerised treatments and smartphone applications for mental health were reported to not meet participants' expectations on most domains. However, these interventions scored higher than face-to-face treatments on domains associated with the convenience of access. Overall, participants reported a very low likelihood of using computerised treatments for mental health in the future. Individuals in this study expressed negative views about computerised self-help intervention and low likelihood of use in the future. To improve the implementation and uptake, policy makers need to improve the public perception of such interventions.
2014-01-01
Background E-mental health and m-mental health include the use of technology in the prevention, treatment and aftercare of mental health problems. With the economical pressure on mental health services increasing, e-mental health and m-mental health could bridge treatment gaps, reduce waiting times for patients and deliver interventions at lower costs. However, despite the existence of numerous effective interventions, the transition of computerised interventions into care is slow. The aim of the present study was to investigate the acceptability of e-mental health and m-mental health in the general population. Methods An advisory group of service users identified dimensions that potentially influence an individual’s decision to engage with a particular treatment for mental health problems. A large sample (N = 490) recruited through email, flyers and social media was asked to rate the acceptability of different treatment options for mental health problems on these domains. Results were analysed using repeated measures MANOVA. Results Participants rated the perceived helpfulness of an intervention, the ability to motivate users, intervention credibility, and immediate access without waiting time as most important dimensions with regard to engaging with a treatment for mental health problems. Participants expected face-to-face therapy to meet their needs on most of these dimensions. Computerised treatments and smartphone applications for mental health were reported to not meet participants’ expectations on most domains. However, these interventions scored higher than face-to-face treatments on domains associated with the convenience of access. Overall, participants reported a very low likelihood of using computerised treatments for mental health in the future. Conclusions Individuals in this study expressed negative views about computerised self-help intervention and low likelihood of use in the future. To improve the implementation and uptake, policy makers need to improve the public perception of such interventions. PMID:24725765
INRstar: computerised decision support software for anticoagulation management in primary care.
Jones, Robert Treharne; Sullivan, Mark; Barrett, David
2005-01-01
Computerised decision support software (CDSS) for anticoagulation management has become established practice in the UK, offering significant advantages for patients and clinicians over traditional methods of dose calculation. The New GMS Contract has been partly responsible for this shift of management from secondary to primary care, in which INRstar has been the market leader for many years. In September 2004, INRstar received the John Perry Prize, awarded by the PHCSG for excellence and innovation in medical applications of information technology.
Aziz, Muhammad Tahir; Ur-Rehman, Tofeeq; Qureshi, Sadia; Bukhari, Nadeem Irfan
Medication errors in chemotherapy are frequent and lead to patient morbidity and mortality, as well as increased rates of re-admission and length of stay, and considerable extra costs. Objective: This study investigated the proposition that computerised chemotherapy ordering reduces the incidence and severity of chemotherapy protocol errors. A computerised physician order entry of chemotherapy order (C-CO) with clinical decision support system was developed in-house, including standardised chemotherapy protocol definitions, automation of pharmacy distribution, clinical checks, labeling and invoicing. A prospective study was then conducted in a C-CO versus paper based chemotherapy order (P-CO) in a 30-bed chemotherapy bay of a tertiary hospital. Both C-CO and P-CO orders, including pharmacoeconomic analysis and the severity of medication errors, were checked and validated by a clinical pharmacist. A group analysis and field trial were also conducted to assess clarity, feasibility and decision making. The C-CO was very usable in terms of its clarity and feasibility. The incidence of medication errors was significantly lower in the C-CO compared with the P-CO (10/3765 [0.26%] versus 134/5514 [2.4%]). There was also a reduction in dispensing time of chemotherapy protocols in the C-CO. The chemotherapy computerisation with clinical decision support system resulted in a significant decrease in the occurrence and severity of medication errors, improvements in chemotherapy dispensing and administration times, and reduction of chemotherapy cost.
Computerised decision support in physical activity interventions: A systematic literature review.
Triantafyllidis, Andreas; Filos, Dimitris; Claes, Jomme; Buys, Roselien; Cornelissen, Véronique; Kouidi, Evangelia; Chouvarda, Ioanna; Maglaveras, Nicos
2018-03-01
The benefits of regular physical activity for health and quality of life are unarguable. New information, sensing and communication technologies have the potential to play a critical role in computerised decision support and coaching for physical activity. We provide a literature review of recent research in the development of physical activity interventions employing computerised decision support, their feasibility and effectiveness in healthy and diseased individuals, and map out challenges and future research directions. We searched the bibliographic databases of PubMed and Scopus to identify physical activity interventions with computerised decision support utilised in a real-life context. Studies were synthesized according to the target user group, the technological format (e.g., web-based or mobile-based) and decision-support features of the intervention, the theoretical model for decision support in health behaviour change, the study design, the primary outcome, the number of participants and their engagement with the intervention, as well as the total follow-up duration. From the 24 studies included in the review, the highest percentage (n = 7, 29%) targeted sedentary healthy individuals followed by patients with prediabetes/diabetes (n = 4, 17%) or overweight individuals (n = 4, 17%). Most randomized controlled trials reported significantly positive effects of the interventions, i.e., increase in physical activity (n = 7, 100%) for 7 studies assessing physical activity measures, weight loss (n = 3, 75%) for 4 studies assessing diet, and reductions in glycosylated hemoglobin (n = 2, 66%) for 3 studies assessing glycose concentration. Accelerometers/pedometers were used in almost half of the studies (n = 11, 46%). Most adopted decision support features included personalised goal-setting (n = 16, 67%) and motivational feedback sent to the users (n = 15, 63%). Fewer adopted features were integration with electronic health records (n = 3, 13%) and alerts sent to caregivers (n = 4, 17%). Theoretical models of decision support in health behaviour to drive the development of the intervention were not reported in most studies (n = 14, 58%). Interventions employing computerised decision support have the potential to promote physical activity and result in health benefits for both diseased and healthy individuals, and help healthcare providers to monitor patients more closely. Objectively measured activity through sensing devices, integration with clinical systems used by healthcare providers and theoretical frameworks for health behaviour change need to be employed in a larger scale in future studies in order to realise the development of evidence-based computerised systems for physical activity monitoring and coaching. Copyright © 2017 Elsevier B.V. All rights reserved.
Walker, Jane; Cassidy, Jim; Sharpe, Michael
2009-03-30
Depression Care for People with Cancer is a complex intervention delivered by specially trained cancer nurses, under the supervision of a psychiatrist. It is given as a supplement to the usual care for depression, which patients receive from their general practitioner and cancer service. In a 'proof of concept' trial (Symptom Management Research Trials in Oncology-1) Depression Care for People with Cancer improved depression more than usual care alone. The second Symptom Management Research Trial in Oncology (SMaRT Oncology-2 Trial) will test its effectiveness and cost-effectiveness in a 'real world' setting. A two arm parallel group multi-centre randomised controlled trial. TRIAL PROCEDURES: 500 patients will be recruited through established systematic Symptom Monitoring Services, which screen patients for depression. Patients will have: a diagnosis of cancer (of various types); an estimated life expectancy of twelve months or more and a diagnosis of Major Depressive Disorder. Patients will be randomised to usual care or usual care plus Depression Care for People with Cancer. Randomisation will be carried out by telephoning a secure computerised central randomisation system or by using a secure web interface. The primary outcome measure is 'treatment response' measured at 24 week outcome data collection. 'Treatment response' will be defined as a reduction of 50% or more in the patient's baseline depression score, measured using the 20-item Symptom Checklist (SCL-20D). Secondary outcomes include remission of major depressive disorder, depression severity and patients' self-rated improvement of depression. Current controlled trials ISRCTN40568538 TRIAL HYPOTHESES: (1) Depression Care for People with Cancer as a supplement to usual care will be more effective than usual care alone in achieving a 50% reduction in baseline SCL-20D score at 24 weeks. (2) Depression Care for People with Cancer as a supplement to usual care will cost more than usual care alone but will be more cost effective in achieving improvements in patients' depression and quality of life.
Desai, K M; Gingell, J C; Skidmore, R; Follett, D H
1987-11-01
A new method is described for evaluating arteriogenic impotence by means of noninvasive quantification of penile Doppler arterial waveforms using computerised analysis based on the Laplace Transform model. The haemodynamic changes occurring during a papaverine-induced erection in healthy potent volunteers have been recorded by this technique, which has also been shown to be capable of discriminating between a normal and an abnormal penile arterial supply in an initial study of potent and impotent men.
ERIC Educational Resources Information Center
Vaughn, Brian E.; Coppola, Gabrielle; Verissimo, Manuela; Monteiro, Ligia; Santos, Antonio Jose; Posada, German; Carbonell, Olga A.; Plata, Sandra J.; Waters, Harriet S.; Bost, Kelly K.; McBride, Brent; Shin, Nana; Korth, Bryan
2007-01-01
The secure-base phenomenon is central to the Bowlby/Ainsworth theory of attachment and is also central to the assessment of attachment across the lifespan. The present study tested whether mothers' knowledge about the secure-base phenomenon, as assessed using a recently designed wordlist prompt measure for eliciting attachment-relevant stories,…
European Security and NATO Enlargement: A View from Central Europe.
1998-04-01
8217iii 3. REPORT TYPE AND DATES COVERED Final fieport European Security and NATO Enlargement: A View from Central Europe (U) 6. AUTHOR(S) Stephen J...of views , including some not often heard, on the issues connected with NATO enlargement. 14. SUBJECT TERMS United States; NATO; post-Cold War...298-102 EUROPEAN SECURITY AND NATO ENLARGEMENT: A VIEW FROM CENTRAL EUROPE Edited by Stephen J. Blank April 1998 f"W DISTRIBUTION STATEMENT
Psychological Security-Insecurity of Illinois Central College Students.
ERIC Educational Resources Information Center
Grout, David R.
This study attempted to discover the distribution of feelings of security and insecurity in the population of Illinois Central College (ICC) and whether significant differences exist among various subgroups. A 10 per cent stratified random sample of students were administered Maslow's Security-Insecurity Inventory. No significant difference was…
Turning Access into a web-enabled secure information system for clinical trials.
Dongquan Chen; Chen, Wei-Bang; Soong, Mayhue; Soong, Seng-Jaw; Orthner, Helmuth F
2009-08-01
Organizations that have limited resources need to conduct clinical studies in a cost-effective, but secure way. Clinical data residing in various individual databases need to be easily accessed and secured. Although widely available, digital certification, encryption, and secure web server, have not been implemented as widely, partly due to a lack of understanding of needs and concerns over issues such as cost and difficulty in implementation. The objective of this study was to test the possibility of centralizing various databases and to demonstrate ways of offering an alternative to a large-scale comprehensive and costly commercial product, especially for simple phase I and II trials, with reasonable convenience and security. We report a working procedure to transform and develop a standalone Access database into a secure Web-based secure information system. For data collection and reporting purposes, we centralized several individual databases; developed, and tested a web-based secure server using self-issued digital certificates. The system lacks audit trails. The cost of development and maintenance may hinder its wide application. The clinical trial databases scattered in various departments of an institution could be centralized into a web-enabled secure information system. The limitations such as the lack of a calendar and audit trail can be partially addressed with additional programming. The centralized Web system may provide an alternative to a comprehensive clinical trial management system.
Westbrook, J I; Georgiou, A; Dimos, A; Germanos, T
2006-01-01
Objective To assess the impact of a computerised pathology order entry system on laboratory turnaround times and test ordering within a teaching hospital. Methods A controlled before and after study compared test assays ordered from 11 wards two months before (n = 97 851) and after (n = 113 762) the implementation of a computerised pathology order entry system (Cerner Millennium Powerchart). Comparisons were made of laboratory turnaround times, frequency of tests ordered and specimens taken, proportions of patients having tests, average number per patient, and percentage of gentamicin and vancomycin specimens labelled as random. Results Intervention wards experienced an average decrease in turnaround of 15.5 minutes/test assay (range 73.8 to 58.3 minutes; p<0.001). Reductions were significant for prioritised and non‐prioritised tests, and for those done within and outside business hours. There was no significant change in the average number of tests (p = 0.228), or specimens per patient (p = 0.324), and no change in turnaround time for the control ward (p = 0.218). Use of structured order screens enhanced data provided to laboratories. Removing three test assays from the liver function order set resulted in significantly fewer of these tests being done. Conclusions Computerised order entry systems are an important element in achieving faster test results. These systems can influence test ordering patterns through structured order screens, manipulation of order sets, and analysis of real time data to assess the impact of such changes, not possible with paper based systems. The extent to which improvements translate into improved patient outcomes remains to be determined. A potentially limiting factor is clinicians' capacity to respond to, and make use of, faster test results. PMID:16461564
Practices to prevent venous thromboembolism: a brief review
Lau, Brandyn D; Haut, Elliott R
2014-01-01
Background Venous thromboembolism (VTE) is a common cause of preventable harm for hospitalised patients. Over the past decade, numerous intervention types have been implemented in attempts to improve the prescription of VTE prophylaxis in hospitals, with varying degrees of success. We reviewed key articles to assess the efficacy of different types of interventions to improve prescription of VTE prophylaxis for hospitalised patients. Methods We conducted a search of MEDLINE for key studies published between 2001 and 2012 of interventions employing education, paper based tools, computerised tools, real time audit and feedback, or combinations of intervention types to improve prescription of VTE prophylaxis for patients in hospital settings. Process outcomes of interest were prescription of any VTE prophylaxis and best practice VTE prophylaxis. Clinical outcomes of interest were any VTE and potentially preventable VTE, defined as VTE occurring in patients not prescribed appropriate prophylaxis. Results 16 articles were included in this review. Two studies employed education only, four implemented paper based tools, four used computerised tools, two evaluated audit and feedback strategies, and four studies used combinations of intervention types. Individual modalities result in improved prescription of VTE prophylaxis; however, the greatest and most sustained improvements were those that combined education with computerised tools. Conclusions Many intervention types have proven effective to different degrees in improving VTE prevention. Provider education is likely a required additional component and should be combined with other intervention types. Active mandatory tools are likely more effective than passive ones. Information technology tools that are well integrated into provider workflow, such as alerts and computerised clinical decision support, can improve best practice prophylaxis use and prevent patient harm resulting from VTE. PMID:23708438
Streiff, Michael B; Carolan, Howard T; Hobson, Deborah B; Kraus, Peggy S; Holzmueller, Christine G; Demski, Renee; Lau, Brandyn D; Biscup-Horn, Paula; Pronovost, Peter J
2012-01-01
Problem Venous thromboembolism (VTE) is a common cause of potentially preventable mortality, morbidity, and increased medical costs. Risk-appropriate prophylaxis can prevent most VTE events, but only a small fraction of patients at risk receive this treatment. Design Prospective quality improvement programme. Setting Johns Hopkins Hospital, Baltimore, Maryland, USA. Strategies for change A multidisciplinary team established a VTE Prevention Collaborative in 2005. The collaborative applied the four step TRIP (translating research into practice) model to develop and implement a mandatory clinical decision support tool for VTE risk stratification and risk-appropriate VTE prophylaxis for all hospitalised adult patients. Initially, paper based VTE order sets were implemented, which were then converted into 16 specialty-specific, mandatory, computerised, clinical decision support modules. Key measures for improvement VTE risk stratification within 24 hours of hospital admission and provision of risk-appropriate, evidence based VTE prophylaxis. Effects of change The VTE team was able to increase VTE risk assessment and ordering of risk-appropriate prophylaxis with paper based order sets to a limited extent, but achieved higher compliance with a computerised clinical decision support tool and the data feedback which it enabled. Risk-appropriate VTE prophylaxis increased from 26% to 80% for surgical patients and from 25% to 92% for medical patients in 2011. Lessons learnt A computerised clinical decision support tool can increase VTE risk stratification and risk-appropriate VTE prophylaxis among hospitalised adult patients admitted to a large urban academic medical centre. It is important to ensure the tool is part of the clinician’s normal workflow, is mandatory (computerised forcing function), and offers the requisite modules needed for every clinical specialty. PMID:22718994
Holben, David H; Taylor, Christopher A
2015-09-01
Food insecurity is a preventable health threat and may precipitate central obesity and metabolic syndrome in children and adolescents in the United States. To examine (1) health by household food security status; and (2) differences and prevalence of central obesity among persons aged 12 to 18 years in the United States. The National Health and Nutrition Examination Survey was administered to a cross-sectional sample of persons aged 12 to 18 years in 1999 to 2006. Controlling for age, race/ethnicity, and sex differences in mean obesity and chronic disease factors across levels of food insecurity (analysis of covariance [Bonferroni post hoc] and ORs [logistic regression analyses]) were examined, as were differences in the rates of risk factors (χ(2) statistics). A total of 7435 participants were analyzed. Those from marginally food secure (n=751) and low-food secure (n=1206) (population size estimate, 26,714,182) households were significantly more likely than their high-food secure counterparts (n=4831) to be overweight (P=.036) (OR, 1.44), and those from marginally food secure households were 1.3-times more likely to be obese (P=.036). Nearly 25% of respondents from marginally food secure, low-food secure, and very low-food secure (n=647) households reported central obesity (P=.002), which was 1.4 to 1.5 times more likely than those from high-food secure households. Participants from high-food secure households had significantly higher mean high-density lipoprotein values (P=.019). Risk factors indicative of metabolic syndrome were present in 3.1%. Household food insecurity was associated with an increased likelihood of being overweight and having central obesity. Limitations included the use of cross-sectional data and some self-reported data and the inability to control for all moderating variables in obesity and overall health status.
Blignaut, P J; McDonald, T; Tolmie, C J
2001-05-01
A prototyping approach was used to determine the essential system requirements of a computerised patient record information system for a typical township primary health care clinic. A pilot clinic was identified and the existing manual system and business processes in this clinic was studied intensively before the first prototype was implemented. Interviews with users, incidental observations and analysis of actual data entered were used as primary techniques to refine the prototype system iteratively until a system with an acceptable data set and adequate functionalities were in place. Several non-functional and user-related requirements were also discovered during the prototyping period.
The effect of maternal methadone use on the fetal heart pattern: a computerised CTG analysis.
Navaneethakrishnan, R; Tutty, S; Sinha, C; Lindow, S W
2006-08-01
Using a computerised analysis, the cardiotocograph (CTG) from women who use methadone (n= 25) when compared with women who do not use methadone (n= 25) showed a significant reduction in the fetal heart baseline rate, with a significant reduction in number of accelerations and episodes of high variation. The short-term variation, number of decelerations and episodes of low variation were not different between the two groups. The time taken to meet the standardised criteria was not different, and it is possible that a computer-assisted CTG analysis could be more accurate than a naked eye interpretation.
Low-cost printing of computerised tomography (CT) images where there is no dedicated CT camera.
Tabari, Abdulkadir M
2007-01-01
Many developing countries still rely on conventional hard copy images to transfer information among physicians. We have developed a low-cost alternative method of printing computerised tomography (CT) scan images where there is no dedicated camera. A digital camera is used to photograph images from the CT scan screen monitor. The images are then transferred to a PC via a USB port, before being printed on glossy paper using an inkjet printer. The method can be applied to other imaging modalities like ultrasound and MRI and appears worthy of emulation elsewhere in the developing world where resources and technical expertise are scarce.
[Survey on computerized immunization registries in Italy].
Alfonsi, V; D'Ancona, F; Ciofi degli Atti, M L
2008-01-01
Computerized immunization registries are essential for conducting and monitoring vaccination programs. In fact, they enable to improve vaccine offering to target population, generating needed-immunization lists and assessing levels of vaccination coverage. In 2007, a national survey on immunization registries was conducted in Italy. In February 2007, all the 21 Regional Health Authorities (RHAs) completed and returned an ad hoc questionnaire. In June 2007, RHAs were further contacted by telephone in order to verify and update the information provided in questionnaires. In 9 Italian Regions (42.8%), vaccination registries are computerized in all Local Health Units (LHUs). In five of these Regions, all LHUs use the same software, while in the remaining four Regions, different softwares are in use. In six additional Regions (28.6%), only some LHUs use computerized immunization registries (range 61.5%-95%). In the remaining 6 Regions (28.6%), which are all in Southern Italy, there are no computerised immunization registries at all. In total, computerised immunization registries cover 126/180 Italian LHUs (70%); in 76/126 (60%) of these LUHs, immunization registries are linked with population registries. This survey shows the need to improve the implementation of computerised immunization registries in Italy, especially in Southern Regions.
Computerised analysis of facial emotion expression in eating disorders.
Leppanen, Jenni; Dapelo, Marcela Marin; Davies, Helen; Lang, Katie; Treasure, Janet; Tchanturia, Kate
2017-01-01
Problems with social-emotional processing are known to be an important contributor to the development and maintenance of eating disorders (EDs). Diminished facial communication of emotion has been frequently reported in individuals with anorexia nervosa (AN). Less is known about facial expressivity in bulimia nervosa (BN) and in people who have recovered from AN (RecAN). This study aimed to pilot the use of computerised facial expression analysis software to investigate emotion expression across the ED spectrum and recovery in a large sample of participants. 297 participants with AN, BN, RecAN, and healthy controls were recruited. Participants watched film clips designed to elicit happy or sad emotions, and facial expressions were then analysed using FaceReader. The finding mirrored those from previous work showing that healthy control and RecAN participants expressed significantly more positive emotions during the positive clip compared to the AN group. There were no differences in emotion expression during the sad film clip. These findings support the use of computerised methods to analyse emotion expression in EDs. The findings also demonstrate that reduced positive emotion expression is likely to be associated with the acute stage of AN illness, with individuals with BN showing an intermediate profile.
Glaister, Karen
2005-09-01
The ability of nurses to perform accurate drug dosage calculations has repercussions for patients' well-being. How best to assist nurses develop competency in this area is paramount. This paper presents findings of a study conducted with undergraduate nurses to determine the effect of three instructional approaches on the learning of this skill. The quasi-experimental study exposed participants to one of three instructional approaches: integrative learning, computerised learning and a combination of integrative and computerised learning. Quantitative and qualitative approaches were used to explore differences in the instructional approaches and gain further understanding of the learning process. There was no statistical difference between the three instructional approaches on knowledge acquisition and transfer measures, other than measures for procedural knowledge, which was significant (F(2,47) = 3.33 at p < .044). A least-significant difference post hoc test (alpha = 0. 10) indicated computerised learning was significantly more effective in developing procedural knowledge. The provision of instructional strategies, which facilitate development of conditional knowledge and automaticity, is necessary for competency development in dosage calculations. Furthermore, the curriculum must incorporate authentic tasks and permit time to support competency attainment.
Ellison, GTH; Richter, LM; de Wet, T; Harris, HE; Griesel, RD; McIntyre, JA
2007-01-01
This study examined the reliability of hand-written and computerised records of birth data collected during the Birth to Ten study at Baragwanath Hospital in Soweto. The reliability of record-keeping in hand-written obstetric and neonatal files was assessed by comparing duplicate records of six different variables abstracted from six different sections in these files. The reliability of computerised record-keeping was assessed by comparing the original hand-written record of each variable with records contained in the hospital’s computerised database. These data sets displayed similar levels of reliability which suggests that similar errors occurred when data were transcribed from one section of the files to the next, and from these files to the computerised database. In both sets of records reliability was highest for the categorical variable infant sex, and for those continuous variables (such as maternal age and gravidity) recorded with unambiguous units. Reliability was lower for continuous variables that could be recorded with different levels of precision (such as birth weight), those that were occasionally measured more than once, and those that could be measured using more than one measurement technique (such as gestational age). Reducing the number of times records are transcribed, categorising continuous variables, and standardising the techniques used for measuring and recording variables would improve the reliability of both hand-written and computerised data sets. OPSOMMING In hierdie studie is die betroubaarheid van handgeskrewe en gerekenariseerde rekords van ge boortedata ondersoek, wat versamel is gedurende die ‘Birth to Ten’ -studie aan die Baragwanath hospitaal in Soweto. Die betroubaarheid van handgeskrewe verloskundige en pasgeboortelike rekords is beoordeel deur duplikaatrekords op ses verskillende verander likes te vergelyk, wat onttrek is uit ses verskillende dele van die betrokke lêers. Die gerekenariseerde rekords se betroubaarheid is beoordeel deur die oorspronklike geskrewe rekord van elke veranderlike te vergelyk met rekords wat beskikbaar is in die hospitaal se gerekenariseerde databasis Hierdie datastelle her vergelykbare vlakke van betroubaarheid getoon, waaruit afgelei kan word dat soortgelyke foute voorkom warmeer data oorgeplaas word vaneen deeivan ’n lêer na ’n ander, en vanaf die lêer na die gerekenariseerde databasis. In albei stelle rekords was die betroubaarheid die hoogste vir die kategoriese veranderlike suigeling se geslag, en vir daardie kontinue veranderlikes (soos moeder se ouderdom en gravida) wat in terme van ondubbelsinmge eenhede gekodeer kan word. Kontinue veranderlikes wat op wisselende vlakke van akkuratheid gemeet word (soos gewig met geboorte), veranderlikes wat soms meer as een keer gemeet is, en veranderlikes wat voigens meer as een metingstegniek bepaal is (soos draagtydsouderdom), was minder betroubaar Deur die aantal kere wat rekords oorgeskryf moet word te verminder, kontinue veranderlikes tat kategoriese veranderlikes te wysig. en tegnieke vir meting en aantekening van veranderlikes te standardiseer, kan die betroubaarheid van sowel handgeskrewe as gerekenariseerde datastelle verbeter word. PMID:9287552
Doyle, K A
1995-12-01
The increasing range and complexity of biologicals, and the greater demand for these products, have resulted in a greater volume of trade in animal-based biological material. This has given rise, in turn, to many approaches to the regulation of importation of these materials, as countries seek protection against the introduction of disease. Harmonization of these regulatory approaches would contribute significantly to the availability of veterinary biologicals, to their manufacture and trade, and to disease security. Australia has developed systems for the categorisation and evaluation of biologicals, control by import permits, and specific procedures at point-of-entry and in institutions where these products are used. Computerised records and precedents assist in evaluation and in the issuing of permits. Recognition that some materials must be subject to further control has led to a system of registration of institutions based on levels of biosecurity, and approved use and disposal programmes. Institutions vary from high-security animal health laboratories to human in vitro fertilisation clinics, which use animal-derived media and materials. Such institutions are regulated through quality assurance contracts. Quarantine authorities have linkages with other agencies which have an interest in these products. These linkages reflect the administrative structures of government in Australia, and provide for management of all forms of risk. The author describes these systems and overviews their biological basis.
Young, A; Dixon, A; Getty, J; Renton, P; Vacher, H
1981-06-01
A case of the cauda equina syndrome complicating ankylosing spondylitis (AS) is described. An unusual feature of this case was the relapsing and remitting nature of the condition, but there is sufficient evidence to explain the clinical picture on the basis of a recurrent intraspinal inflammatory process. The clinical and radiological features are similar to those of a further 28 reported in the literature. An electromyogram (EMG) proved important in defining the extent of neurological involvement. Computerised tomography (CT) showed marked laminar erosion and no bony exit foramen encroachment. We believe that the clinical diagnosis of this condition can be adequately confirmed with plain radiology, EMG, and CT scan.
Cushion, Christopher; Harvey, Stephen; Muir, Bob; Nelson, Lee
2012-01-01
We outline the evolution of a computerised systematic observation tool and describe the process for establishing the validity and reliability of this new instrument. The Coach Analysis and Interventions System (CAIS) has 23 primary behaviours related to physical behaviour, feedback/reinforcement, instruction, verbal/non-verbal, questioning and management. The instrument also analyses secondary coach behaviour related to performance states, recipient, timing, content and questioning/silence. The CAIS is a multi-dimensional and multi-level mechanism able to provide detailed and contextualised data about specific coaching behaviours occurring in complex and nuanced coaching interventions and environments that can be applied to both practice sessions and competition.
[Perimetric changes in advanced glaucoma].
Feraru, Crenguta Ioana; Pantalon, Anca
2011-01-01
The evaluation of various perimetric aspects in advanced glaucoma stages correlated to morpho-functional changes. MATHERIAL AND METHOD: Retrospective clinical trial over a 10 months time period that included patients with advanced glaucoma stages, for which there have been recorded several computerised visual field tests (central 24-2 strategy, 10-2 strategy with either III or V--Goldman stimulus spot size) along with other morpho-funtional ocular paramaters: VA, lOP optic disk analysis. We included in our study 56 eyes from 45 patients. In most cases 89% it was an open angle glaucoma (either primary or secondary) Mean visual acuity was 0.45 +/- 0.28. Regarding the perimetric deficit 83% had advanced deficit, 9% moderate and 8% early visual changes. As perimetric type of defect we found a majority with general reduction of sensitivity (33 eyes) + ring shape scotoma. In 6 eyes (10.7%) having left only a central isle of vision we performed the central 10-2 strategy with III or V Goldmann stimulus spot size. Statistic analysis showed scarce correlation between the visual acuity and the quantitative perimetric parameters (MD and PSD), and variance analysis found present a multiple correlation parameter p = 0.07 that proves there is no liniary correspondence between the morpho-functional parameters: VA-MD(PSD) and C/D ratio. In advanced glaucoma stages, the perimetric changes are mostly severe. Perimetric evaluation is essential in these stages and needs to be individualised.
Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A
2000-04-01
The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.
Computerised analysis of facial emotion expression in eating disorders
2017-01-01
Background Problems with social-emotional processing are known to be an important contributor to the development and maintenance of eating disorders (EDs). Diminished facial communication of emotion has been frequently reported in individuals with anorexia nervosa (AN). Less is known about facial expressivity in bulimia nervosa (BN) and in people who have recovered from AN (RecAN). This study aimed to pilot the use of computerised facial expression analysis software to investigate emotion expression across the ED spectrum and recovery in a large sample of participants. Method 297 participants with AN, BN, RecAN, and healthy controls were recruited. Participants watched film clips designed to elicit happy or sad emotions, and facial expressions were then analysed using FaceReader. Results The finding mirrored those from previous work showing that healthy control and RecAN participants expressed significantly more positive emotions during the positive clip compared to the AN group. There were no differences in emotion expression during the sad film clip. Discussion These findings support the use of computerised methods to analyse emotion expression in EDs. The findings also demonstrate that reduced positive emotion expression is likely to be associated with the acute stage of AN illness, with individuals with BN showing an intermediate profile. PMID:28575109
Campbell, J; Langdon, D; Cercignani, M; Rashid, W
2016-01-01
Aim. To explore the efficacy of home-based, computerised, cognitive rehabilitation in patients with multiple sclerosis using neuropsychological assessment and advanced structural and functional magnetic resonance imaging (fMRI). Methods. 38 patients with MS and cognitive impairment on the Brief International Cognitive Assessment for MS (BICAMS) were enrolled. Patients were randomised to undergo 45 minutes of computerised cognitive rehabilitation using RehaCom software ( n = 19) three times weekly for six weeks or to a control condition ( n = 19). Neuropsychological and MRI data were obtained at baseline (time 1), following the 6-week intervention (time 2), and after a further twelve weeks (time 3). Cortical activations were explored using fMRI and microstructural changes were explored using quantitative magnetisation transfer (QMT) imaging. Results. The treatment group showed a greater improvement in SDMT gain scores between baseline and time 2 compared to the control group ( p = 0.005). The treatment group exhibited increased activation in the bilateral prefrontal cortex and right temporoparietal regions relative to control group at time 3 ( p < 0.05 FWE corrected ). No significant changes were observed on QMT. Conclusion. This study supports the hypothesis that home-based, computerised, cognitive rehabilitation may be effective in improving cognitive performance in patients with MS. Clinical trials registration is ISRCTN54901925.
Bowman, Caroline H; Evans, Cathryn E Y; Turnbull, Oliver H
2005-02-01
In the last decade, the Iowa Gambling Task (IGT) has become a widely employed neuropsychological research instrument for the investigation of executive function. The task has been employed in a wide range of formats, from 'manual' procedures to more recently introduced computerised versions. Computer-based formats often require that responses on the task should be artificially delayed by a number of seconds between trials to collect skin-conductance data. Participants, however, may become frustrated when they want to select from a particular deck in the time-limited versions--so that an unintended emotional experience of frustration might well disrupt a task presumed to be reliant on emotion-based learning. We investigated the effect of the various types of Iowa Gambling Task format on performance, using three types of task: the classic manual administration, with no time limitations; a computerised administration with a 6-s enforced delay; and a control computerised version which had no time constraints. We also evaluated the subjective experience of participants on each task. There were no significant differences in performance, between formats, in behavioural terms. Subjective experience measures on the task also showed consistent effects across all three formats-with substantial, and rapidly developing, awareness of which decks were 'good' and 'bad.'
CPOE in Iran--a viable prospect? Physicians' opinions on using CPOE in an Iranian teaching hospital.
Kazemi, Alireza; Ellenius, Johan; Tofighi, Shahram; Salehi, Aref; Eghbalian, Fatemeh; Fors, Uno G
2009-03-01
In recent years, the theory that on-line clinical decision support systems can improve patients' safety among hospitalised individuals has gained greater acceptance. However, the feasibility of implementing such a system in a middle or low-income country has rarely been studied. Understanding the current prescription process and a proper needs assessment of prescribers can act as the key to successful implementation. The aim of this study was to explore physicians' opinions on the current prescription process, and the expected benefits and perceived obstacles to employ Computerised Physician Order Entry in an Iranian teaching hospital. Initially, the interview guideline was developed through focus group discussions with eight experts. Then semi-structured interviews were held with 19 prescribers. After verbatim transcription, inductive thematic analysis was performed on empirical data. Forty hours of on-looker observations were performed in different wards to explore the current prescription process. The current prescription process was identified as a physician-centred, top-down, model, where prescribers were found to mostly rely on their memories as well as being overconfident. Some errors may occur during different paper-based registrations, transcriptions and transfers. Physician opinions on Computerised Physician Order Entry were categorised into expected benefits and perceived obstacles. Confidentiality issues, reduction of medication errors and educational benefits were identified as three themes in the expected benefits category. High cost, social and cultural barriers, data entry time and problems with technical support emerged as four themes in the perceived obstacles category. The current prescription process has a high possibility of medication errors. Although there are different barriers confronting the implementation and continuation of Computerised Physician Order Entry in Iranian hospitals, physicians have a willingness to use them if these systems provide significant benefits. A pilot study in a limited setting and a comprehensive analysis of health outcomes and economic indicators should be performed, to assess the merits of introducing Computerised Physician Order Entry with decision support capabilities in Iran.
Computerised respiratory sounds can differentiate smokers and non-smokers.
Oliveira, Ana; Sen, Ipek; Kahya, Yasemin P; Afreixo, Vera; Marques, Alda
2017-06-01
Cigarette smoking is often associated with the development of several respiratory diseases however, if diagnosed early, the changes in the lung tissue caused by smoking may be reversible. Computerised respiratory sounds have shown to be sensitive to detect changes within the lung tissue before any other measure, however it is unknown if it is able to detect changes in the lungs of healthy smokers. This study investigated the differences between computerised respiratory sounds of healthy smokers and non-smokers. Healthy smokers and non-smokers were recruited from a university campus. Respiratory sounds were recorded simultaneously at 6 chest locations (right and left anterior, lateral and posterior) using air-coupled electret microphones. Airflow (1.0-1.5 l/s) was recorded with a pneumotachograph. Breathing phases were detected using airflow signals and respiratory sounds with validated algorithms. Forty-four participants were enrolled: 18 smokers (mean age 26.2, SD = 7 years; mean FEV 1 % predicted 104.7, SD = 9) and 26 non-smokers (mean age 25.9, SD = 3.7 years; mean FEV 1 % predicted 96.8, SD = 20.2). Smokers presented significantly higher frequency at maximum sound intensity during inspiration [(M = 117, SD = 16.2 Hz vs. M = 106.4, SD = 21.6 Hz; t(43) = -2.62, p = 0.0081, d z = 0.55)], lower expiratory sound intensities (maximum intensity: [(M = 48.2, SD = 3.8 dB vs. M = 50.9, SD = 3.2 dB; t(43) = 2.68, p = 0.001, d z = -0.78)]; mean intensity: [(M = 31.2, SD = 3.6 dB vs. M = 33.7,SD = 3 dB; t(43) = 2.42, p = 0.001, d z = 0.75)] and higher number of inspiratory crackles (median [interquartile range] 2.2 [1.7-3.7] vs. 1.5 [1.2-2.2], p = 0.081, U = 110, r = -0.41) than non-smokers. Significant differences between computerised respiratory sounds of smokers and non-smokers have been found. Changes in respiratory sounds are often the earliest sign of disease. Thus, computerised respiratory sounds might be a promising measure to early detect smoking related respiratory diseases.
78 FR 63159 - Amendment to Certification of Nebraska's Central Filing System
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... system for Nebraska to permit the conversion of all debtor social security and taxpayer identification... automatically convert social security numbers and taxpayer identification numbers into ten number unique... certified central filing systems is available through the Internet on the GIPSA Web site ( http://www.gipsa...
Central Libraries in Uncertain Times.
ERIC Educational Resources Information Center
Kenney, Brian J.
2001-01-01
Discusses security and safety issues for public libraries, especially high-profile central facilities, in light of the September 11 terrorist attacks. Highlights include inspecting bags as patrons enter as well as exit; the need for security guidelines for any type of disaster or emergency; building design; and the importance of communication.…
ERIC Educational Resources Information Center
Larence, Eileen R.
2010-01-01
Thousands of gang members in the United States belong to gangs such as MS-13 and 18th Street that are also active in Central American countries. Federal entities with responsibilities for addressing Central American gangs include the National Security Council (NSC); the Departments of Homeland Security (DHS), Justice (DOJ), and State; and the U.S.…
32 CFR 322.4 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... physical security requirements for the protection of personal information and ensure that such requirements... NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.4 Responsibilities. (a) The... Associate Director for Human Resources Services or designee shall: (1) Establish the physical security...
Computerisation of diabetic clinic records.
Watkins, G B; Sutcliffe, T; Pyke, D A; Watkins, P J
1980-01-01
A simple system for putting diabetic records on a computer file is achieved by using stationery that combines the usual handwritten records (not computerised) with the minimum of essential data suitable for punching on to computer tape. The record may be brought up to date at a selected time time interval. This simple, cheap system has been in use in a busy clinic for six years. The information on about 8000 diabetics now held in the computer file is used chiefly to help research by creating registers of patients with specified characteristics, such as treatment, heredity complications, and pregnancy. A complete up-to-date index of the entire clinic population is always available, and routine clinic statistics are returned every six months. PMID:7437814
Code of Federal Regulations, 2011 CFR
2011-07-01
... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...
Code of Federal Regulations, 2013 CFR
2013-07-01
... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...
Code of Federal Regulations, 2012 CFR
2012-07-01
... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] BIOTECH Holdings Ltd., California Oil & Gas Corp., Central Minera Corp., Chemokine Therapeutics Corp., and Global Precision Medical Inc.; Order of... securities of California Oil & Gas Corp. because it has not filed any periodic reports since the period ended...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Energy Production, Inc., Best Energy Services, Inc., Community Central Bank Corporation, Explortex Energy, Inc., HemoBioTech, Inc., Larrea... securities of HemoBioTech, Inc. because it has not filed any periodic reports since the period ended December...
Improving Regional Security in Central America: Military Engagement Options for Nicaragua
2002-12-01
Diálogo Centro-americano San José, Costa Rica No. 38 Marzo-Abril 1999 Ejércitos para preservar la paz y la democracia . Pedro Joaquín Chamorro...del Foro Civil Centroamericano para la Defensa y la Seguridad (FOCADES). (Declaration of Managua: Declaration of Managua: Constitution of the Central...State. Isacson, Adam 1998. Seguridad Cooperativa en Centroamérica. (Cooperative Security in Central America) Diálogo Centro-americano No. 35
Martin, P; Brown, M C; Espin-Garcia, O; Cuffe, S; Pringle, D; Mahler, M; Villeneuve, J; Niu, C; Charow, R; Lam, C; Shani, R M; Hon, H; Otsuka, M; Xu, W; Alibhai, S; Jenkinson, J; Liu, G
2016-03-01
In this study, we compared cancer patients preference for computerised (tablet/web-based) surveys versus paper. We also assessed whether the understanding of a cancer-related topic, pharmacogenomics is affected by the survey format, and examined differences in demographic and medical characteristics which may affect patient preference and understanding. Three hundred and four cancer patients completed a tablet-administered survey and another 153 patients completed a paper-based survey. Patients who participated in the tablet survey were questioned regarding their preference for survey format administration (paper, tablet and web-based). Understanding was assessed with a 'direct' method, by asking patients to assess their understanding of genetic testing, and with a 'composite' score. Patients preferred administration with tablet (71%) compared with web-based (12%) and paper (17%). Patients <65 years old, non-Caucasians and white-collar professionals significantly preferred the computerised format following multivariate analysis. There was no significant difference in understanding between the paper and tablet survey with direct questioning or composite score. Age (<65 years) and white-collar professionals were associated with increased understanding (both P = 0.03). There was no significant difference in understanding between the tablet and print survey in a multivariate analysis. Patients overwhelmingly preferred computerised surveys and understanding of pharmacogenomics was not affected by survey format. © 2015 John Wiley & Sons Ltd.
Software for computerised analysis of cardiotocographic traces.
Romano, M; Bifulco, P; Ruffo, M; Improta, G; Clemente, F; Cesarelli, M
2016-02-01
Despite the widespread use of cardiotocography in foetal monitoring, the evaluation of foetal status suffers from a considerable inter and intra-observer variability. In order to overcome the main limitations of visual cardiotocographic assessment, computerised methods to analyse cardiotocographic recordings have been recently developed. In this study, a new software for automated analysis of foetal heart rate is presented. It allows an automatic procedure for measuring the most relevant parameters derivable from cardiotocographic traces. Simulated and real cardiotocographic traces were analysed to test software reliability. In artificial traces, we simulated a set number of events (accelerations, decelerations and contractions) to be recognised. In the case of real signals, instead, results of the computerised analysis were compared with the visual assessment performed by 18 expert clinicians and three performance indexes were computed to gain information about performances of the proposed software. The software showed preliminary performance we judged satisfactory in that the results matched completely the requirements, as proved by tests on artificial signals in which all simulated events were detected from the software. Performance indexes computed in comparison with obstetricians' evaluations are, on the contrary, not so satisfactory; in fact they led to obtain the following values of the statistical parameters: sensitivity equal to 93%, positive predictive value equal to 82% and accuracy equal to 77%. Very probably this arises from the high variability of trace annotation carried out by clinicians. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Gilbert, Louisa; Shaw, Stacey A; Goddard-Eckrich, Dawn; Chang, Mingway; Rowe, Jessica; McCrimmon, Tara; Almonte, Maria; Goodwin, Sharun; Epperson, Matthew
2015-12-10
The high rate of intimate partner violence (IPV) victimisation found among substance-using women receiving community supervision underscores the need for effective IPV victimisation screening, brief intervention and referral to treatment services (SBIRT) for this population. This randomised controlled trial (RCT) aims to assess the feasibility, safety and efficacy of a single-session computerised self-paced IPV SBIRT (Computerised WINGS) in identifying IPV victimisation among women under community supervision and increasing access to IPV services, compared to the same IPV SBIRT service delivered by a case manager (Case Manager WINGS). This RCT was conducted with 191 substance-using women in probation and community court sites in New York City. No significant differences were found between Computerised and Case Manager WINGS arms on any outcomes. Both arms reported identical high rates of any physical, sexual or psychological IPV victimisation in the past year (77% for both arms) during the intervention. Both arms experienced significant increases from baseline to the 3-month follow-up in receipt of IPV services, social support, IPV self-efficacy and abstinence from drug use. Findings suggest that both modalities of WINGS show promise in identifying and addressing IPV victimisation among substance-using women receiving community supervision. Copyright © 2015 John Wiley & Sons, Ltd.
Computerised CBT for depressed adolescents: Randomised controlled trial.
Smith, Patrick; Scott, Rebecca; Eshkevari, Ertimiss; Jatta, Fatoumata; Leigh, Eleanor; Harris, Victoria; Robinson, Alex; Abeles, Paul; Proudfoot, Judy; Verduyn, Chrissie; Yule, William
2015-10-01
Depression in adolescents is a common and impairing problem. Effective psychological therapies for depression are not accessed by most adolescents. Computerised therapy offers huge potential for improving access to treatment. To test the efficacy of Stressbusters, a Computerised-CBT (C-CBT) programme for depression in young people. Multi-site, schools-based, RCT of C-CBT compared to Waiting List, for young people (N = 112; aged 12-16) with significant symptoms of depression, using multiple-informants (adolescents, parents, teachers), with follow-up at 3 and 6 months. Relative to being on a Waiting List, C-CBT was associated with statistically significant and clinically meaningful improvements in symptoms of depression and anxiety according to adolescent self-report; and with a trend towards improvements in depression and anxiety according to parent-report. Improvements were maintained at follow-up. Treatment gains were similar for boys and girls across the participating age range. Treatment effect was partially mediated by changes in ruminative thinking. Teachers rated adolescents as having few emotional or behavioural problems, both before and after intervention. C-CBT had no detectable effect on academic attainment. In the month after intervention, young people who received C-CBT had significantly fewer absences from school than those on the Waiting List. C-CBT shows considerable promise for the treatment of mild-moderate depression in adolescents. Copyright © 2015 Elsevier Ltd. All rights reserved.
76 FR 3098 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-19
...: National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800..., Privacy Act and Mandatory Declassification Review Records. System Location: National Security Agency... Information Act; 5 U.S.C. 552a, The Privacy Act of 1974 (as amended); E.O. 13526, Classified National Security...
Security, Extremism and Education: Safeguarding or Surveillance?
ERIC Educational Resources Information Center
Davies, Lynn
2016-01-01
This article analyses how education is positioned in the current concerns about security and extremism. This means firstly examining the different meanings of security (national, human and societal) and who provides security for whom. Initially, a central dilemma is acknowledged: that schooling appears to be simultaneously irrelevant to the huge…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hernandez, M. R.; Gamboa-deBuen, I.; Dies, P.
Computerised tomography (CT) is a favourite method of medical diagnosis. Its use has thus increased rapidly throughout the world, particularly in studies relating to children. However to avoid administering unnecessarily high doses of radiation to paediatric patients it is important to have correct dose reference levels to minimize risk. The research is being developed within the public health sector at the Hospital Infantil de Mexico 'Dr. Federico Gomez.' We measured the entrance surface air kerma (K{sub P}) in paediatric patients, during the radiological studies of control in CT (studies of head, thorax and abdomen). Phantom was used to evaluate imagemore » quality as the tomograph requires a high resolution image in order to operate at its optimum level.« less
Worldwide Emerging Environmental Issues Affecting the U.S. Military. September 2008 Report
2008-09-01
Anticipation and Response System…………………………………………..1 Item 3. First EU-Central Asia Security Forum Included Environmental Security………….2 Item 4. Indonesian ...back seat at EU-Central Asia talks http://euobserver.com/9/26778/?rk=1 Item 4. Indonesian Navy to Tighten Security in Sea Border Areas The... Indonesian Navy announced that it will tighten security in its eastern and western sea border areas to support law enforcement efforts at sea for
Miles, A; Chronakis, I; Fox, J; Mayer, A
2017-03-24
To develop a computerised decision aid (DA) to inform the decision process on adjuvant chemotherapy in patients with stage II colorectal cancer, and examine perceived usefulness, acceptability and areas for improvement of the DA. Mixed methods. Single outpatient oncology department in central London. Consecutive recruitment of 13 patients with stage II colorectal cancer, 12 of whom completed the study. Inclusion criteria were: age >18 years; complete resection for stage II adenocarcinoma of the colon or rectum; patients within 14-56 days after surgery; no contraindication to adjuvant chemotherapy; able to give written informed consent. Exclusion criterion: previous chemotherapy. Patient perceived usefulness (assessed by the PrepDM questionnaire) and acceptability of the DA. PrepDM scores, measuring the perceived usefulness of the DA in preparing the patient to communicate with their doctor and make a health decision, were above those reported in other patient groups. Patient acceptability scores were also high; however, interviews showed that there was evidence of a lack of understanding of key information among some patients, in particular their baseline risk of recurrence, the net benefit of combination chemotherapy and the rationale for having chemotherapy when cancer had apparently gone. Patients found the DA acceptable and useful in supporting their decision about whether or not to have adjuvant chemotherapy. Suggested improvements for the DA include: sequential presentation of treatment options (eg, no treatment vs 1 drug, 1 drug vs 2 drugs) to enhance patient understanding of the difference between combination and single therapy, diagrams to help patients understand the rationale for chemotherapy to prevent a recurrence and inbuilt checks on patient understanding of baseline risk of recurrence and net benefit of chemotherapy. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
14 CFR 1203.603 - Systematic review for declassification.
Code of Federal Regulations, 2011 CFR
2011-01-01
... National Security Agency. (3) Systematic review for declassification of classified information pertaining... coordinated through the Central Intelligence Agency. (4) The Chairperson, NASA Information Security Program... guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in coordination with...
Code of Federal Regulations, 2010 CFR
2010-07-01
... , Director of Central Intelligence Directive (DCID) 1/14 2 and regulations of the National Security Agency. 1... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION General Provisions § 154.2 Applicability. (a) This part implements the...
The Curious National Security Pendulum: Openness and/or Censorship.
ERIC Educational Resources Information Center
Marwick, Christine M.
1979-01-01
Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)
Federmann, Rolf; Goldsmith, Robert; Bäckström, Martin
2007-04-01
A validation study of a computerised test recently developed involving the Stroop effect, extended here by inclusion of a third, more difficult test series, is presented. Three groups of men belonging to the Swedish armed forces and adjudged to differ in their qualifications (20, 32, and 19 men of levels 1, 2, and 3, respectively) and a fourth group of 18 men convicted of serious crimes of violence were given this test, termed the Stress Strategy Test. Discriminant analysis of the test's 12 variables (four for each of the three test series) yielded a discriminant power of 65% for the total group, highest for the level 1 group (80%) and for the nonmilitary group (72%), results substantially better than obtained for the original version of the test with use of similar subject groups.
Shanahan, Marian; Shakeshaft, Anthony; Mattick, Richard P
2006-01-01
To assess the relative cost effectiveness of four strategies (academic detailing, computerised reminder systems, target payments and interactive continuing medical education) to increase the provision of screening and brief interventions by Australian GPs with the ultimate goal of decreasing risky alcohol consumption among their patients. This project used a modelling approach to combine information on the effectiveness and costs of four separate strategies to change GP behaviours to estimate their relative cost effectiveness. The computerised reminder system and academic detailing appear most effective in achieving a decrease in the number of standard drinks consumed by risky drinkers. Regardless of the assumptions made, the targeted payment strategy appeared to be the least cost-effective method to achieve a decrease in risky alcohol consumption while the other three strategies appear reasonably comparable.
Designing healthcare information technology to catalyse change in clinical care.
Lester, William T; Zai, Adrian H; Grant, Richard W; Chueh, Henry C
2008-01-01
The gap between best practice and actual patient care continues to be a pervasive problem in our healthcare system. Efforts to improve on this knowledge-performance gap have included computerised disease management programs designed to improve guideline adherence. However, current computerised reminder and decision support interventions directed at changing physician behaviour have had only a limited and variable effect on clinical outcomes. Further, immediate pay-for-performance financial pressures on institutions have created an environment where disease management systems are often created under duress, appended to existing clinical systems and poorly integrated into the existing workflow, potentially limiting their real-world effectiveness. The authors present a review of disease management as well as a conceptual framework to guide the development of more effective health information technology (HIT) tools for translating clinical information into clinical action.
Bomba, D; de Silva, A
2001-01-01
Research into patient attitudes towards the use of technology in health care needs to be given much greater attention within health informatics. Past research has often focused more on the needs of health care providers rather than the end users. This article attempts to redress this knowledge bias by reporting on a case study of the responses gained from patients in a selected Australian medical practice towards the use of computerised medical records and unique identifiers. The responses (n=138) were gained from a survey of patients over a 13 day period of practice operation. This case study serves as an example of the type of future consumer health informatics research which can be undertaken not just in Australia but also in other countries, both at local regional levels and at a national level.
Virtual classroom helps medical education for both Chinese and foreign students.
Shi, C; Wang, L; Li, X; Chai, S; Niu, W; Kong, Y; Zhou, W; Yin, W
2015-11-01
The rapid development of computer and internet technology has a strong influence over one's quality of education within different fields of study. To determine the potential benefits of introducing internet into medical school classes, a pilot study was conducted in three different Chinese medical schools. Seven hundred and eight medical school undergraduates, 385 dental school students and 366 foreign students were randomly recruited to complete a self-administered questionnaire. The contents included personal information, current usage of computer and internet, and attitudes towards the computerised teaching methods. Two forum groups were created using instant message software and were randomly assigned to two classes, allowing students to freely ask or discuss questions with the help of their teachers in these two virtual classrooms. All 1539 questionnaires were accepted and analysed. Although there were some differences between Chinese and foreign undergraduates, both group of students were highly proficient in internet usage and navigation. Overwhelmingly, 88.37% of the students owned a computer and frequently logged onto the internet. Most of them believed that the internet is a helpful adjunct to their studies and held positive attitudes towards computerised teaching. Compared to the classes that were not assigned internet forums, the two experimental classes performed significantly better on the examination. Our results suggest that computerised teaching methods have significant potential to assist in learning for both Chinese and foreign medical undergraduates. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Code of Federal Regulations, 2011 CFR
2011-07-01
.... 1 et seq.), the tariff laws of the United States, or the Social Security Act (42 U.S.C. 301 et seq... individual, the taxpayer identifying number is generally the individual's social security number. (c) General...) Social Security benefit payments (excluding Supplemental Security Income payments), Black Lung (part B...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
76 FR 44057 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... (DTC). DTC operates an automated, centralized system for book-entry movement of securities positions in...
Information Security and the Internet.
ERIC Educational Resources Information Center
Doddrell, Gregory R.
1996-01-01
As business relies less on "fortress" style central computers and more on distributed systems, the risk of disruption increases because of inadequate physical security, support services, and site monitoring. This article discusses information security and why protection is required on the Internet, presents a best practice firewall, and…
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 2 2012-07-01 2012-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 2 2011-07-01 2011-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 2 2014-07-01 2014-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 2 2013-07-01 2013-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
ERIC Educational Resources Information Center
Olijnyk, Nicholas Victor
2014-01-01
The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…
Why information security belongs on the CFO's agenda.
Quinnild, James; Fusile, Jeff; Smith, Cindy
2006-02-01
Healthcare financial executives need to understand the complex and growing role of information security in supporting the business of health care. The biggest security gaps in healthcare organizations occur in strategy and centralization, business executive preparation, and protected health information. CFOs should collaborate with the CIO in engaging a comprehensive framework to develop, implement, communicate, and maintain an enterprisewide information security strategy.
Framework for Flexible Security in Group Communications
NASA Technical Reports Server (NTRS)
McDaniel, Patrick; Prakash, Atul
2006-01-01
The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.
1994-02-28
improvements. Pare 10 ka•- V •DkI U Release Manager The Release Manager provides franchisees with media copies of existing libraries, as needed. Security...implementors, and potential library franchisees . Security Team The Security Team assists the Security Officer with security analysis. Team members are...and Franchisees . A Potential User is an individual who requests a Library Account. A User Recruit has been sent a CARDS Library Account Registration
76 FR 6596 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
.... The Food Security Act of 1985 permits the states to establish ``central filing systems.'' These... in section 1324 of the Food Security Act of 1985. The information received from the State is... responsibility for the Clear Title Program (Section 1324 of the Food Security Act of 1985. Clear Title Program...
Building Security. Honeywell Planning Guide.
ERIC Educational Resources Information Center
Honeywell, Inc., Minneapolis, Minn.
A general discussion of building detection and alarm systems to provide security against burglary and vandalism is provided by a manufacturer of automated monitoring and control systems. Security systems are identified as--(1) local alarm system, (2) central station alarm system, (3) proprietary alarm system, and (4) direct connect alarm system..…
Merging leadership and innovation to secure a large health system.
Bellino, Joseph V; Shaw, Sharon
2014-01-01
In this article the security system executive for a 13-hospital system spells out how partnering with capable and motivated vendors and gaining the cooperation of other departments enabled him to convert disparate security systems with equipment from multiple manufacturers into a cost-effective centralized system.
77 FR 60401 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-03
... computer password protection.'' * * * * * System manager(s) and address: Delete entry and replace with...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency (NSA) is proposing to amend a system of...
Military Deception Reconsidered
2008-06-01
operations through media channels to receive real benefits . If information advantage is properly formulated, carried out, and secured, it is a...timeliness, security, objective, and centralized control. However, I propose that operational advantage , consisting of surprise, information advantage ... Advantage , Surprise, Operational Advantage , Military Tactics, Deception Campaigns 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified
Code of Federal Regulations, 2011 CFR
2011-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... requested. There are no fees associated with a Privacy Act request, except as stated in NSA/CSS Regulation...
Code of Federal Regulations, 2013 CFR
2013-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... requested. There are no fees associated with a Privacy Act request, except as stated in NSA/CSS Regulation...
Code of Federal Regulations, 2012 CFR
2012-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... requested. There are no fees associated with a Privacy Act request, except as stated in NSA/CSS Regulation...
Toit, Nicole du; Burden, Faith A; Kempson, Sue A; Dixon, Padraic M
2008-12-01
Post-mortem examination of 16 donkey cheek teeth (CT) with caries (both peripheral and infundibular) and pulpar exposure were performed using computerised axial tomography (CAT), histology and scanning electron microscopy. CAT imaging was found to be useful to assess the presence and extent of caries and pulp exposure in individual donkey CT. Histology identified the loss of occlusal secondary dentine, and showed pulp necrosis in teeth with pulpar exposure. Viable pulp was present more apically in one exposed pulp horn, with its occlusal aspect sealed off from the exposed aspect of the pulp horn by a false pulp stone. Scanning electron microscopy showed the amelo-cemental junction to be a possible route of bacterial infection in infundibular cemental caries. The basic pathogenesis of dental caries in donkeys appears very similar to its description in other species.
D'Orso, M I; Centemeri, R; Latocca, R; Riva, M; Cesana, G
2012-01-01
Occupational Health Doctors active in building sector firms frequently have to evaluate residual workers' osteomuscular function in patients coming back to work after an accident happened during work time or free time. Definition of their specific individual work suitability is usually carried out utilizing semeiotic tests in which subjective evaluation of every single Medical Doctor is real important in definition of final results and this fact can cause legal controversies. In our research we describe the application of computerised movement analysis on 10 workers of building sector. In every patient examined this technical method has been able to study objectively the tridimensional ranges of motion of most important osteomuscular districts. The possibility to have an objective evaluation of residual osteomuscular function has a relevant importance both in definition of workers' work suitability at the moment in which they start again their activities and in possible future legal conflicts.
Geospatial Data for Computerisation of Public Administration in the Czech Republic
NASA Astrophysics Data System (ADS)
Cada, V.; Mildorf, T.
2011-08-01
The main aim of the eGovernment programme in the Czech Republic is to enhance the efficiency of public administration. The Digital Map of Public Administration (DMVS) should be composed of digital orthophotographs of the Czech Republic, digital and digitised cadastral maps, digital purpose cadastral map (ÚKM) and a technical map of municipality, if available. The DMVS project is a part of computerisation of public administration in the Czech Republic. The project enhances the productivity of government administration and also simplifies the processes between citizens and public administration. The DMVS project, that should be compliant with the INSPIRE (Infrastructure for Spatial Information in the European Community) initiative, generates definite demand for geodata on the level of detail of land data model. The user needs that are clearly specified and required are not met due to inconsistencies in terminology, data management and level of detail.
[Computerised monitoring of integrated cervical screening. Indicators of diagnostic performance].
Bucchi, L; Pierri, C; Amadori, A; Folicaldi, S; Ghidoni, D; Nannini, R; Bondi, A
2003-12-01
In a previous issue of this journal, we presented the background, rationale, general methods, and indicators of participation of a computerised system for the monitoring of integrated cervical screening, i.e. the integration of spontaneous Pap smear practice into organised screening. We also reported the results of the application of those indicators in the general database of the Pathology Department of Imola Health District in northern Italy. In the current paper, we present the rationale and definitions of indicators of diagnostic performance (total Pap smears and rate of unsatisfactory Pap smears, distribution by cytology class reported, rate of patients without timely follow-up, detection rate, positive predictive value, distribution of cytology classes reported by histology diagnosis, and distribution of cases of CIN and carcinoma registered by detection modality) as well as the results of their application in the same database as above.
Pathologists dislike sound? Evaluation of a computerised training microscope.
Gray, E; Duvall, E; Sprey, J; Bird, C C
1998-01-01
AIM: To evaluate the use of multimedia enhancements, using a computerised microscope, in the training of microscope skills. METHODS: The HOME microscope provides facilities to highlight features of interest in conjunction with either text display or aural presentation. A pilot study was carried out with 10 individuals, eight of whom were at different stages of pathology training. A tutorial was implemented employing sound or text, and each individual tested each version. Both the subjective impressions of users and objective measurement of their patterns of use were recorded. RESULTS: Although both versions improved learning, users took longer to work through the aural than the text version; 90% of users preferred the text only version, including all eight individuals involved in pathology training. CONCLUSIONS: Pathologists appear to prefer visual rather than aural input when using teaching systems such as the HOME microscope and sound does not give added value to the training experience. Images PMID:9659250
Computer-assisted image processing to detect spores from the fungus Pandora neoaphidis.
Korsnes, Reinert; Westrum, Karin; Fløistad, Erling; Klingen, Ingeborg
2016-01-01
This contribution demonstrates an example of experimental automatic image analysis to detect spores prepared on microscope slides derived from trapping. The application is to monitor aerial spore counts of the entomopathogenic fungus Pandora neoaphidis which may serve as a biological control agent for aphids. Automatic detection of such spores can therefore play a role in plant protection. The present approach for such detection is a modification of traditional manual microscopy of prepared slides, where autonomous image recording precedes computerised image analysis. The purpose of the present image analysis is to support human visual inspection of imagery data - not to replace it. The workflow has three components:•Preparation of slides for microscopy.•Image recording.•Computerised image processing where the initial part is, as usual, segmentation depending on the actual data product. Then comes identification of blobs, calculation of principal axes of blobs, symmetry operations and projection on a three parameter egg shape space.
Carnie, J; Boden, J; Gao Smith, F
2002-07-01
In this single group observational study on 29 patients, we describe a technique that predicts the depth of the epidural space, calculated from the routine pre-operative chest computerised tomography (CT) scan using Pythagorean triangle trigonometry. We also compared the CT-derived depth of the epidural space with the actual depth of needle insertion. The CT-derived and the actual depths of the epidural space were highly correlated (r = 0.88, R2 = 0.78, p < 0.0001). The mean (95% CI) difference between CT-derived and actual depths was 0.26 (0.03-0.49) cm. Thus, the CT-derived depth tends to be greater than the actual depth by between 0.03 and 0.49 cm. There were no associations between either the CT-derived or the actual depth of the epidural space and age, weight, height or body mass index.
Schuth, G; Carr, G; Barnes, C; Carling, C; Bradley, P S
2016-01-01
Positional variation in match performance is well established in elite soccer but no information exists on players switching positions. This study investigated the influence of elite players interchanging from one position to another on physical and technical match performance. Data were collected from multiple English Premier League (EPL) seasons using a computerised tracking system. After adhering to stringent inclusion criteria, players were examined across several interchanges: central-defender to fullback (CD-FB, n = 11, 312 observations), central-midfielder to wide-midfielder (CM-WM, n = 7, 171 observations), wide-midfielder to central-midfielder (WM-CM, n = 7, 197 observations) and attacker to wide-midfielder (AT-WM, n = 4, 81 observations). Players interchanging from CD-FB covered markedly more high-intensity running and sprinting distance (effect size [ES]: -1.56 and -1.26), lost more possessions but made more final third entries (ES: -1.23 and -1.55). Interchanging from CM-WM and WM-CM resulted in trivial to moderate differences in both physical (ES: -0.14-0.59 and -0.21-0.39) and technical performances (ES: -0.48-0.64 and -0.36-0.54). Players interchanging from AT-WM demonstrated a moderate difference in high-intensity running without possession (ES: -0.98) and moderate-to-large differences in the number of clearances, tackles and possessions won (ES: -0.77, -1.16 and -1.41). The data demonstrate that the physical and technical demands vary greatly from one interchange to another but utility players seem able to adapt to these positional switches.
The Eastring gas pipeline in the context of the Central and Eastern European gas supply challenge
NASA Astrophysics Data System (ADS)
Mišík, Matúš; Nosko, Andrej
2017-11-01
Ever since the 2009 natural gas crisis, energy security has been a crucial priority for countries of Central and Eastern Europe. Escalating in 2014, the conflict between Ukraine and Russia further fuelled negative expectations about the future development of energy relations for the region predominantly supplied by Russia. As a response to the planned cessation of gas transit through the Brotherhood pipeline, which brings Russian gas to Europe via Ukraine and Slovakia, the Slovak transmission system operator Eustream proposed the Eastring pipeline. This Perspective analyses this proposal and argues that neither the perceived decrease in Slovak energy security nor the loss of economic rent from the international gas transit should be the main policy driver behind such a major infrastructure project. Although marketed as an answer to current Central and Eastern European gas supply security challenges, the Eastring pipeline is actually mainly focused on issues connected to the Slovak gas transit.
Code of Federal Regulations, 2013 CFR
2013-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... 22161. 2 See footnote 1 to this section. (b) This part applies to all NSA/CSS elements, field activities...
Code of Federal Regulations, 2014 CFR
2014-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... 22161. 2 See footnote 1 to this section. (b) This part applies to all NSA/CSS elements, field activities...
Code of Federal Regulations, 2012 CFR
2012-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... 22161. 2 See footnote 1 to this section. (b) This part applies to all NSA/CSS elements, field activities...
Code of Federal Regulations, 2011 CFR
2011-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... 22161. 2 See footnote 1 to this section. (b) This part applies to all NSA/CSS elements, field activities...
China’s Energy Security: The Grand Hedging Strategy
2010-05-01
spotlight. The key to sustaining this dynamic economic growth is access to petroleum resources. The central question of this monograph is as follows...Is China’s energy security strategy liberal-institutionalist or realist-mercantilist? Using a qualitative case study methodology that explores the...dependent variable -- energy security -- using three independent variables (cost of supply, reliability of supply, and security of supply), China’s
Code of Federal Regulations, 2012 CFR
2012-07-01
... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY..., leased, or otherwise controlled by the Central Intelligence Agency). Authorized person. An officer of the Security Protective Service, or any other Central Intelligence Agency employee who has been authorized by...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY..., leased, or otherwise controlled by the Central Intelligence Agency). Authorized person. An officer of the Security Protective Service, or any other Central Intelligence Agency employee who has been authorized by...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY..., leased, or otherwise controlled by the Central Intelligence Agency). Authorized person. An officer of the Security Protective Service, or any other Central Intelligence Agency employee who has been authorized by...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY..., leased, or otherwise controlled by the Central Intelligence Agency). Authorized person. An officer of the Security Protective Service, or any other Central Intelligence Agency employee who has been authorized by...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY..., leased, or otherwise controlled by the Central Intelligence Agency). Authorized person. An officer of the Security Protective Service, or any other Central Intelligence Agency employee who has been authorized by...
Newby, Jill M; Twomey, Conal; Yuan Li, Susan Shi; Andrews, Gavin
2016-07-15
An increasing number of computerised transdiagnostic cognitive behavioural therapy programs (TD-cCBT) have been developed in the past decade, but there are no meta-analyses to explore the efficacy of these programs, nor moderators of the effects. The current meta-analysis focused on studies evaluating TD-cCBT interventions to examine their effects on anxiety, depression and quality of life (QOL). Results from 17 RCTs showed computerised TD-cCBT outperformed control conditions on all outcome measures at post-treatment, with large effect sizes for depression (g's=.84), and medium effect sizes for anxiety (g=.78) and QOL (g=.48). RCT quality was generally good, although heterogeneity was moderate to high. Further analyses revealed that studies comparing TD-cCBT to waitlist controls had the largest differences (g=.93) compared to active (g=.59) and usual care control groups (g=.37) on anxiety outcomes, but there was no influence of control group subtype on depression outcomes. Treatment length, symptom target (mixed versus anxiety only), treatment design (standardised versus tailored), and therapist experience (students versus qualified therapists) did not influence the results. Preliminary evidence from 4 comparisons with disorder-specific treatments suggests transdiagnostic treatments are as effective for reducing anxiety, and there may be small but superior outcomes for TD-cCBT programs for reducing depression (g=.21) and improving QOL (g=.21) compared to disorder-specific cCBT. These findings show that TD-cCBT programs are efficacious, and have comparable effects to disorder-specific cCBT programs. Copyright © 2016 Elsevier B.V. All rights reserved.
Health innovation for patient safety improvement.
Sellappans, Renukha; Chua, Siew Siang; Tajuddin, Nur Amani Ahmad; Mei Lai, Pauline Siew
2013-01-01
Medication error has been identified as a major factor affecting patient safety. Many innovative efforts such as Computerised Physician Order Entry (CPOE), a Pharmacy Information System, automated dispensing machines and Point of Administration Systems have been carried out with the aim of improving medication safety. However, areas remain that require urgent attention. One main area will be the lack of continuity of care due to the breakdown of communication between multiple healthcare providers. Solutions may include consideration of "health smart cards" that carry vital patient medical information in the form of a "credit card" or use of the Malaysian identification card. However, costs and technical aspects associated with the implementation of this health smart card will be a significant barrier. Security and confidentiality, on the other hand, are expected to be of primary concern to patients. Challenges associated with the implementation of a health smart card might include physician buy-in for use in his or her everyday practice. Training and technical support should also be available to ensure the smooth implementation of this system. Despite these challenges, implementation of a health smart card moves us closer to seamless care in our country, thereby increasing the productivity and quality of healthcare.
Dudarev, Alexey A; Dushkina, Eugenia V; Sladkova, Yuliya N; Alloyarov, Pavel R; Chupakhin, Valery S; Dorofeyev, Vitaliy M; Kolesnikova, Tatjana A; Fridman, Kirill B; Evengard, Birgitta; Nilsson, Lena M
2013-01-01
Poor state of water supply systems, shortage of water purification facilities and disinfection systems, low quality of drinking water generally in Russia and particularly in the regions of the Russian Arctic, Siberia and Far East have been defined in the literature. However, no standard protocol of water security assessment has been used in the majority of studies. Uniform water security indicators collected from Russian official statistical sources for the period 2000-2011 were used for comparison for 18 selected regions in the Russian Arctic, Siberia and Far East. The following indicators of water security were analyzed: water consumption, chemical and biological contamination of water reservoirs of Categories I and II of water sources (centralized--underground and surface, and non-centralized) and of drinking water. Water consumption in selected regions fluctuated from 125 to 340 L/person/day. Centralized water sources (both underground and surface sources) are highly contaminated by chemicals (up to 40-80%) and biological agents (up to 55% in some regions), mainly due to surface water sources. Underground water sources show relatively low levels of biological contamination, while chemical contamination is high due to additional water contamination during water treatment and transportation in pipelines. Non-centralized water sources are highly contaminated (both chemically and biologically) in 32-90% of samples analyzed. Very high levels of chemical contamination of drinking water (up to 51%) were detected in many regions, mainly in the north-western part of the Russian Arctic. Biological contamination of drinking water was generally much lower (2.5-12%) everywhere except Evenki AO (27%), and general and thermotolerant coliform bacteria predominated in drinking water samples from all regions (up to 17.5 and 12.5%, correspondingly). The presence of other agents was much lower: Coliphages--0.2-2.7%, Clostridia spores, Giardia cysts, pathogenic bacteria, Rotavirus--up to 0.8%. Of a total of 56 chemical pollutants analyzed in water samples from centralized water supply systems, 32 pollutants were found to be in excess of hygienic limits, with the predominant pollutants being Fe (up to 55%), Cl (up to 57%), Al (up to 43%) and Mn (up to 45%). In 18 selected regions of the Russian Arctic, Siberia and Far East Category I and II water reservoirs, water sources (centralized--underground, surface; non-centralized) and drinking water are highly contaminated by chemical and biological agents. Full-scale reform of the Russian water industry and water security system is urgently needed, especially in selected regions.
Ntoumenopoulos, G; Glickman, Y
2012-09-01
To explore the feasibility of computerised lung sound monitoring to evaluate secretion removal in intubated and mechanically ventilated adult patients. Before and after observational investigation. Intensive care unit. Fifteen intubated and mechanically ventilated adult patients receiving chest physiotherapy. Chest physiotherapy included combinations of standard closed airway suctioning, saline lavage, postural drainage, chest wall vibrations, manual-assisted cough and/or lung hyperinflation, dependent upon clinical indications. Lung sound amplitude at peak inspiration was assessed using computerised lung sound monitoring. Measurements were performed immediately before and after chest physiotherapy. Data are reported as mean [standard deviation (SD)], mean difference and 95% confidence intervals (CI). Significance testing was not performed due to the small sample size and the exploratory nature of the study. Fifteen patients were included in the study [11 males, four females, mean age 65 (SD 14) years]. The mean total lung sound amplitude at peak inspiration decreased two-fold from 38 (SD 59) units before treatment to 17 (SD 19) units after treatment (mean difference 22, 95% CI of difference -3 to 46). The mean total lung sound amplitude from the lungs of patients with a large amount of secretions (n=9) was over four times 'louder' than the lungs of patients with a moderate or small amount of secretions (n=6) [56 (SD 72) units vs 12 (13) units, respectively; mean difference -44, 95% CI of difference -100 to 11]. The mean total lung sound amplitude decreased in the group of 'loud' right and left lungs (n=15) from 37 (SD 36) units before treatment to 15 (SD 13) units after treatment (mean difference 22, 95% CI of difference 6 to 38). Computerised lung sound monitoring in this small group of patients demonstrated a two-fold decrease in lung sound amplitude following chest physiotherapy. Subgroup analysis also demonstrated decreasing trends in lung sound amplitude in the group of 'loud' lungs following chest physiotherapy. Due to the small sample size and large SDs with high variability in the lung sound amplitude measurements, significance testing was not reported. Further investigation is needed in a larger sample of patients with more accurate measurement of sputum wet weight in order to distinguish between secretion-related effects and changes due to other factors such as airflow rate and pattern. Copyright © 2012 Chartered Society of Physiotherapy. Published by Elsevier Ltd. All rights reserved.
Distributed generation of shared RSA keys in mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Liu, Yi-Liang; Huang, Qin; Shen, Ying
2005-12-01
Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.
Impact of Export Control and Technology Transfer Regimes: International Perspectives
2012-01-07
major national security and public policy issue. Exploring the ITAR environment through a set of case studies was the central idea in a project...cover) was based on a survey of UK stakeholders. The results were unambiguous and striking. Our British partners conclude ITAR is a good idea gone...ITAR) regime is a major national security and public policy issue. Exploring the ITAR environment through a set of case studies was the central idea
A DICOM based radiotherapy plan database for research collaboration and reporting
NASA Astrophysics Data System (ADS)
Westberg, J.; Krogh, S.; Brink, C.; Vogelius, I. R.
2014-03-01
Purpose: To create a central radiotherapy (RT) plan database for dose analysis and reporting, capable of calculating and presenting statistics on user defined patient groups. The goal is to facilitate multi-center research studies with easy and secure access to RT plans and statistics on protocol compliance. Methods: RT institutions are able to send data to the central database using DICOM communications on a secure computer network. The central system is composed of a number of DICOM servers, an SQL database and in-house developed software services to process the incoming data. A web site within the secure network allows the user to manage their submitted data. Results: The RT plan database has been developed in Microsoft .NET and users are able to send DICOM data between RT centers in Denmark. Dose-volume histogram (DVH) calculations performed by the system are comparable to those of conventional RT software. A permission system was implemented to ensure access control and easy, yet secure, data sharing across centers. The reports contain DVH statistics for structures in user defined patient groups. The system currently contains over 2200 patients in 14 collaborations. Conclusions: A central RT plan repository for use in multi-center trials and quality assurance was created. The system provides an attractive alternative to dummy runs by enabling continuous monitoring of protocol conformity and plan metrics in a trial.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY DEBARMENT AND SUSPENSION PROCEDURES § 1910.1 General. The Central Intelligence Agency (CIA), in accordance with its authorities under the Central Intelligence Agency Act of 1949, as amended, and the National Security Act of 1947, as...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY DEBARMENT AND SUSPENSION PROCEDURES § 1910.1 General. The Central Intelligence Agency (CIA), in accordance with its authorities under the Central Intelligence Agency Act of 1949, as amended, and the National Security Act of 1947, as...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY DEBARMENT AND SUSPENSION PROCEDURES § 1910.1 General. The Central Intelligence Agency (CIA), in accordance with its authorities under the Central Intelligence Agency Act of 1949, as amended, and the National Security Act of 1947, as...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY DEBARMENT AND SUSPENSION PROCEDURES § 1910.1 General. The Central Intelligence Agency (CIA), in accordance with its authorities under the Central Intelligence Agency Act of 1949, as amended, and the National Security Act of 1947, as...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY DEBARMENT AND SUSPENSION PROCEDURES § 1910.1 General. The Central Intelligence Agency (CIA), in accordance with its authorities under the Central Intelligence Agency Act of 1949, as amended, and the National Security Act of 1947, as...
77 FR 52310 - Central Idaho Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-29
... DEPARTMENT OF AGRICULTURE Forest Service Central Idaho Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The Central Idaho Resource Advisory Committee will meet in Salmon, Idaho and Challis, Idaho. The committee is authorized under the Secure Rural Schools and...
77 FR 48950 - South Central Idaho Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-15
... DEPARTMENT OF AGRICULTURE Forest Service South Central Idaho Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The South Central Idaho Resource Advisory Committee will meet in Jerome, Idaho. The committee is authorized under the Secure Rural Schools and...
76 FR 50452 - South Central Idaho Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-15
... DEPARTMENT OF AGRICULTURE South Central Idaho Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The South Central Idaho Resource Advisory Committee will meet in Jerome, Idaho. The committee is authorized under the Secure Rural Schools and Community Self...
Rojas, Marianela; Gimeno, David; Vargas-Prada, Sergio; Benavides, Fernando G
2015-08-01
Examine the prevalence of musculoskeletal pain (MSP) in the six Spanish-speaking countries of Central America using a single standardized instrument, the First Survey on Working Conditions and Health in Central America in workers from all manual and non-manual labor sectors, using social security coverage as an indicator of formal versus informal employment. The workers (n = 12 024) were surveyed in their homes. The age-adjusted prevalence of MSP during the previous month was calculated for pain in the back (upper, or cervical; middle, or thoracic; and lower, or lumbar) and arm joints (shoulder, elbow, and wrist). Prevalence was estimated by sex, occupation (manual or non-manual), economic sector (agriculture, industry, or services), and social security coverage. Poisson regression models were used to calculate the prevalence rates and 95% confidence intervals, with stratification by country and anatomical site. By sites, the age-adjusted prevalence of cervical-dorsal MSP was the highest, especially in El Salvador (47.8%) and Nicaragua (45.9%), and lumbar MSP was less prevalent, especially in Panama (12.8%) and Guatemala (14.8%). After additional adjustments, the prevalence of MSP was higher in women and manual workers for all the sites and in all the countries. There were no differences in MSP in terms of social security coverage or sector of economic activity. The high prevalence of MSP in Central America, regardless of sector of activity or social security coverage, indicates that the prevention of MSP should be a priority in occupational health programs in low- and middle-income countries, especially for women and manual workers.
Management of the Defense Technology Security Administration Year 2000 Program
1998-11-03
caller is fully protected Acronyms DTSA Defense Technology Security Administration Y2K Year 2000 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 400 ARMY NAVY...accordance with the DoD Management Plan Defense Technology Security Administration. The Defense Technology Security Administration ( DTSA ) was established...in 1985 as a field activity of the Office of the Secretary of Defense By establishing DTSA , the DoD role in export controls was centralized and
6. Interior, rear offices: operations assistant office looking north toward ...
6. Interior, rear offices: operations assistant office looking north toward security operations officer's office. - Ellsworth Air Force Base, Rushmore Air Force Station, Security Central Control Building, Quesada Drive, Blackhawk, Meade County, SD
32 CFR 1906.102 - Application.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... National Security Act of 1947 (50 U.S.C. 402 et seq.), as amended; the Central Intelligence Agency Act of...
32 CFR 1906.102 - Application.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... National Security Act of 1947 (50 U.S.C. 402 et seq.), as amended; the Central Intelligence Agency Act of...
32 CFR 1906.102 - Application.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... National Security Act of 1947 (50 U.S.C. 402 et seq.), as amended; the Central Intelligence Agency Act of...
32 CFR 1906.102 - Application.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... National Security Act of 1947 (50 U.S.C. 402 et seq.), as amended; the Central Intelligence Agency Act of...
32 CFR 1906.102 - Application.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... National Security Act of 1947 (50 U.S.C. 402 et seq.), as amended; the Central Intelligence Agency Act of...
78 FR 23741 - North Central Idaho Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-22
... DEPARTMENT OF AGRICULTURE Forest Service North Central Idaho Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The North Central Idaho Resource Advisorsy Committee (RAC) will be meet in Grangeville, Idaho. The RAC is authorized under the Secure Rural Schools and...
76 FR 9540 - South Central Idaho Resource Advisory Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-18
... DEPARTMENT OF AGRICULTURE Forest Service South Central Idaho Resource Advisory Committee; Meeting AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The South Central Idaho Resource Advisory Committee will meet in Jerome, Idaho. The committee is meeting as authorized under the Secure...
75 FR 4523 - North Central Idaho Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-28
... DEPARTMENT OF AGRICULTURE Forest Service North Central Idaho Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The North Central Idaho RAC will meet in Grangeville, Idaho. The committee is meeting as authorized under the Secure Rural Schools and Community Self...
77 FR 43236 - North Central Idaho Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-24
... DEPARTMENT OF AGRICULTURE Forest Service North Central Idaho Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The North Central Idaho RAC will meet in Grangeville, Idaho. The committee is meeting as authorized under the Secure Rural Schools and Community Self...
75 FR 64691 - North Central Idaho Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-20
... DEPARTMENT OF AGRICULTURE Forest Service North Central Idaho Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The North Central Idaho RAC will meet in Potlatch, Idaho. The committee is meeting as authorized under the Secure Rural Schools and Community Self...
76 FR 1594 - North Central Idaho Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-11
... DEPARTMENT OF AGRICULTURE Forest Service North Central Idaho Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meetings. SUMMARY: The North Central Idaho RAC will meet in Grangeville, Idaho. The committee is meeting as authorized under the Secure Rural Schools and Community Self...
76 FR 12933 - North Central Idaho Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-09
... DEPARTMENT OF AGRICULTURE Forest Service North Central Idaho Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meetings. SUMMARY: The North Central Idaho RAC will meet in Grangeville, Idaho. The committee is meeting as authorized under the Secure Rural Schools and Community Self...
Occasional Papers in Open and Distance Learning, Number 14.
ERIC Educational Resources Information Center
Donnan, Peter, Ed.
Five papers focussing on educational technology are presented in this issue. "Computerised Instructional Technologies: Considerations for Lectures and Instructional Designers" (Helen Geissinger) and "The Higher Education Distance Learner and Technology" (Terry Geddes) locates the new technologies within a solidly grounded…
A Research Study on Secure Attachment Using the Primary Caregiving Approach
ERIC Educational Resources Information Center
Ebbeck, Marjory; Phoon, Dora Mei Yong; Tan-Chong, Elizabeth Chai Kim; Tan, Marilyn Ai Bee; Goh, Mandy Lian Mui
2015-01-01
A child's positive sense of well-being is central to their overall growth and development. With an increasing number of mothers in the workforce, many infants and toddlers spend much time in child care services. Hence it is crucial that caregivers provide a secure base for the child to develop secure attachment with educarers. Given multiple…
Code of Federal Regulations, 2012 CFR
2012-07-01
... government and international agencies and foreign central banks. In their accounts, depository institutions... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... Direct®—into which we issue marketable Treasury securities. We maintain and transfer securities in these...
VIEW LOOKING SOUTHWEST AT BUILDING 121, THE PLANT SECURITY BUILDING. ...
VIEW LOOKING SOUTHWEST AT BUILDING 121, THE PLANT SECURITY BUILDING. BUILDING 121 WAS ONE OF THE ORIGINAL STRUCTURES AT THE ROCKY FLATS PLANT. IT SHARES A COMMON WALL WITH BUILDING 122, THE EMERGENCY MEDICAL BUILDING. (7/29/52) - Rocky Flats Plant, Security & Armory, West of Third Street, south of Central Avenue, Golden, Jefferson County, CO
Beyond Containment and Deterrence: A Security Framework for Europe in the 21st Century
1990-04-02
decades of the 21st Century in Europe, and examines DDO FJoA 1473 E. T1O. Of INOV 65 IS OBSOLETE Uaf eSECRIT CUnclassified SECURITY CLASSIFICATION’ OF THIS... Poland , and parts of France and Russia, but it did not truely unify Germany. Bismarck unified only parts of Germany which he could constrain under...Europe, Central Europe, the Balkans, and the Soviet Union. Central Europe includes Vest Germany, East Germany, Austria, Czechoslavakia, Poland , and
2017-06-09
across the Indian Ocean is central to interests of India and China. Hence, both have increased their regional presence using diplomatic, economic , and...trade across the Indian Ocean is central to interests of India and China. Hence, both have increased their regional presence using diplomatic, economic ...of Defense Staff CPEC China Pakistan Economic Corridor GDP Gross Domestic Product IOR Indian Ocean Region NSS National Security Strategy PLAN
Code of Federal Regulations, 2010 CFR
2010-07-01
... actions and decisions in a manner that facilitates archival processing for public access. Central agency... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Declassification § 2001.34...
76 FR 20624 - Central Montana Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-13
... will meet in Stanford, Montana. The committee is meeting as authorized under the Secure Rural Schools... Ranger District, located at 109 Central Avenue, Stanford, MT. Written comments should be sent to Ron Wiseman, Lewis and Clark National Forest, 109 Central Avenue, Stanford, Montana 59479. Comments may also...
76 FR 49433 - Central Montana Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
... will meet in Stanford, Montana. The committee is meeting as authorized under the Secure Rural Schools... Ranger District, located at 109 Central Avenue, Stanford, MT. Written comments should be sent to Ron Wiseman, Lewis and Clark National Forest, 109 Central Avenue, Stanford, Montana 59479. Comments may also...
Computerised Screening for Dyslexia in Adults
ERIC Educational Resources Information Center
Singleton, Chris; Horne, Joanna; Simmons, Fiona
2009-01-01
Identifying dyslexia in adulthood presents particular challenges because of complicating factors such as acquisition of compensatory strategies, differing degrees of intervention and the problem of distinguishing dyslexic adults from those whose literacy difficulties have non-cognitive causes. One of the implications is that conventional literacy…
A wireless sensor tag platform for container security and integrity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Amaya, Ivan A.; Cree, Johnathan V.; Mauss, Fredrick J.
Cargo containers onboard ships are widely used in the global supply chain. The need for container security is evidenced by the Container Security Initiative launched by the U.S. Bureau of Customs and Border Protection (CBP). One method of monitoring cargo containers is using low power wireless sensor tags. The wireless sensor tags are used to set up a network that is comprised of tags internal to the container and a central device. The sensor network reports alarms and other anomalies to a central device, which then relays the message to an outside network upon arrival at the destination port. Thismore » allows the port authorities to have knowledge of potential security or integrity issues before physically examining the container. Challenges of using wireless sensor tag networks for container security include battery life, size, environmental conditions, information security, and cost among others. PNNL developed an active wireless sensor tag platform capable of reporting data wirelessly to a central node as well as logging data to nonvolatile memory. The tags, operate at 2.4 GHz over an IEEE 802.15.4 protocol, and were designed to be distributed throughout the inside of a shipping container in the upper support frame. The tags are mounted in a housing that allows for simple and efficient installation or removal prior to, during, or after shipment. The distributed tags monitor the entire container volume. The sensor tag platform utilizes low power electronics and provides an extensible sensor interface for incorporating a wide range of sensors including chemical, biological, and environmental sensors.« less
A wireless sensor tag platform for container security and integrity
NASA Astrophysics Data System (ADS)
Amaya, Ivan A.; Cree, Johnathan V.; Mauss, Fredrick J.
2011-04-01
Cargo containers onboard ships are widely used in the global supply chain. The need for container security is evidenced by the Container Security Initiative launched by the U.S. Bureau of Customs and Border Protection (CBP). One method of monitoring cargo containers is using low power wireless sensor tags. The wireless sensor tags are used to set up a network that is comprised of tags internal to the container and a central device. The sensor network reports alarms and other anomalies to a central device, which then relays the message to an outside network upon arrival at the destination port. This allows the port authorities to have knowledge of potential security or integrity issues before physically examining the container. Challenges of using wireless sensor tag networks for container security include battery life, size, environmental conditions, information security, and cost among others. PNNL developed an active wireless sensor tag platform capable of reporting data wirelessly to a central node as well as logging data to nonvolatile memory. The tags, operate at 2.4 GHz over an IEEE 802.15.4 protocol, and were designed to be distributed throughout the inside of a shipping container in the upper support frame. The tags are mounted in a housing that allows for simple and efficient installation or removal prior to, during, or after shipment. The distributed tags monitor the entire container volume. The sensor tag platform utilizes low power electronics and provides an extensible sensor interface for incorporating a wide range of sensors including chemical, biological, and environmental sensors.
Patients prefer electronic medical records - fact or fiction?
Masiza, Melissa; Mostert-Phipps, Nicky; Pottasa, Dalenca
2013-01-01
Incomplete patient medical history compromises the quality of care provided to a patient while well-kept, adequate patient medical records are central to the provision of good quality of care. According to research, patients have the right to contribute to decision-making affecting their health. Hence, the researchers investigated their views regarding a paper-based system and an electronic medical record (EMR). An explorative approach was used in conducting a survey within selected general practices in the Nelson Mandela Metropole. The majority of participants thought that the use of a paper-based system had no negative impact on their health. Participants expressed concerns relating to the confidentiality of their medical records with both storage mediums. The majority of participants indicated they prefer their GP to computerise their consultation details. The main objective of the research on which this poster is based was to investigate the storage medium of preference for patients and the reasons for their preference. Overall, 48% of the 85 participants selected EMRs as their preferred storage medium and the reasons for their preference were also uncovered.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Commission; (2) The Federal Bureau of Investigation; (3) The Secret Service; (4) The Central Intelligence Agency; (5) The National Security Council; (6) The National Security Agency; (7) The Defense Intelligence... Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., January 6, 1993 (58 FR 3479, January 8, 1993), entitled “National Industrial Security Program” (NISP... National Industrial Security Program Operating Manual (NISPOM) incorporates the requirements of these... Central Intelligence, is responsible for issuance and maintenance of this Manual. The following DOD...
Baskerville, J R; Chang, J H; Viator, M; Rutledge, W; Miryala, R; Duval, K E; Nishino, T K
2009-01-01
To determine the iatrogenic absorbed dosage of radiation of the patient in milligray (mGy) computerised tomography dose index volume (CTDIvol) when tested with multidetector computerised tomography (MDCT) in the emergency department (ED) setting and calculate the absorbed dosage of radiation per clinically actionable result and emergently treatable finding (ETF). The University of Texas Medical Branch (UTMB) ED located in Galveston, Texas, USA, is a level 1 trauma and tertiary referral centre treating 70,000 patients per annum. A retrospective cross-sectional data analysis of 770 emergency patients investigated by MDCT in July 2007. The presence of actionable results and ETF were determined by chart review. A total of 5320 emergency patients was treated in the UTMB ED in July 2007. This included 4508 medical and 812 trauma patients. A total of 1094 MDCT studies was performed, of which complete data were available on 1046. A total of 770 patients was investigated by MDCT, representing 14.47% of all emergency patients. This included 33.99% of trauma patients and 10.96% of medical patients. Actionable results were found in 341 studies and ETF in 105 studies. The mean radiation was 163.27 and 530.23 mGy CTDIvol for actionable results and ETF, respectively, for all studies. The mean radiation was 53.27 and 106.36 mGy CTDIvol for medical and trauma patients, respectively. The absorbed dosage of radiation of patients investigated by MDCT is clinically significant. The actionable results and ETF in our study demonstrate considerable opportunity for improvement in the utilisation of this technology by physicians.
Chen, H; Ho, H M; Ying, M; Fu, S N
2012-01-01
Objectives The purpose of this study was to correlate findings on small vessel vascularity between computerised findings and Newman's scaling using power Doppler ultrasonography (PDU) imaging and its predictive value in patients with plantar fasciitis. Methods PDU was performed on 44 patients (age range 30–66 years; mean age 48 years) with plantar fasciitis and 46 healthy subjects (age range 18–61 years; mean age 36 years). The vascularity was quantified using ultrasound images by a customised software program and graded by Newman's grading scale. Vascular index (VI) was calculated from the software program as the ratio of the number of colour pixels to the total number of pixels within a standardised selected area of proximal plantar fascia. The 46 healthy subjects were examined on 2 occasions 7–10 days apart, and 18 of them were assessed by 2 examiners. Statistical analyses were performed using intraclass correlation coefficient and linear regression analysis. Results Good correlation was found between the averaged VI ratios and Newman's qualitative scale (ρ = 0.70; p<0.001). Intratester and intertester reliability were 0.89 and 0.61, respectively. Furthermore, higher VI was correlated with less reduction in pain after physiotherapeutic intervention. Conclusions The computerised VI not only has a high level of concordance with the Newman grading scale but is also reliable in reflecting the vascularity of proximal plantar fascia, and can predict pain reduction after intervention. This index can be used to characterise the changes in vascularity of patients with plantar fasciitis, and it may also be helpful for evaluating treatment and monitoring the progress after intervention in future studies. PMID:22167513
Chou, Cheng-Chen; Pressler, Susan J; Giordani, Bruno; Fetzer, Susan Jane
2015-11-01
To evaluate the validity of the Chinese version of the CogState battery, a computerised cognitive testing among patients with heart failure in Taiwan. Cognitive deficits are common in patients with heart failure and a validated Chinese measurement is required for assessing cognitive change for this population. The CogState computerised battery is a measurement of cognitive function and has been validated in many languages, but not Chinese. A cross-sectional study. A convenience sample consisted of 76 women with heart failure and 64 healthy women in northern Taiwan. Women completed the Chinese version of the CogState battery and the Montreal Cognitive Assessment. Construct validity of the Chinese version of the battery was evaluated by exploratory factor analysis and known-group comparisons. Convergent validity of the CogState tasks was examined by Pearson correlation coefficients. Principal components factor analysis with promax rotation showed two factors reflecting the speed and memory dimensions of the tests. Scores for CogState battery tasks showed significant differences between the heart failure and healthy control group. Examination of convergent validity of the CogState found a significant association with the Montreal Cognitive Assessment. The Chinese CogState Battery has satisfactory construct and convergent validity to measure cognitive deficits in patients with heart failure in Taiwan. The Chinese CogState battery is a valid instrument for detecting cognitive deficits that may be subtle in the early stages, and identifying changes that provide insights into patients' abilities to implement treatment accurately and consistently. Better interventions tailored to the needs of the cognitive impaired population can be developed. © 2015 John Wiley & Sons Ltd.
NASA Astrophysics Data System (ADS)
Bański, Jerzy
2013-01-01
The aim of this article is to evaluate the effect of contemporary transformations in the population of Central European countries on climate change, in addition to singling out the primary points of interaction between demographic processes and the climate. In analyzing the interactions between climate and demographics, we can formulate three basic hypotheses regarding the region in question: 1) as a result of current demographic trends in Central Europe, the influence of the region on its climate will probably diminish, 2) the importance of the "climatically displaced" in global migratory movements will increase, and some of those concerned will move to Central Europe, 3) the contribution of the region to global food security will increase. In the last decade most of what comprises the region of Central Europe has reported a decline in population growth and a negative migration balance. As a process, this loss of population may have a positive effect on the environment and the climate. We can expect ongoing climate change to intensify migration processes, particularly from countries outside Europe. Interactions between climate and demographic processes can also be viewed in the context of food security. The global warming most sources foresee for the coming decades is the process most likely to result in spatial polarization of food production in agriculture. Central Europe will then face the challenge of assuring and improving food security, albeit this time on a global scale.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duran, Felicia Angelica; Waymire, Russell L.
2013-10-01
Sandia National Laboratories (SNL) is providing training and consultation activities on security planning and design for the Korea Hydro and Nuclear Power Central Research Institute (KHNPCRI). As part of this effort, SNL performed a literature review on computer security requirements, guidance and best practices that are applicable to an advanced nuclear power plant. This report documents the review of reports generated by SNL and other organizations [U.S. Nuclear Regulatory Commission, Nuclear Energy Institute, and International Atomic Energy Agency] related to protection of information technology resources, primarily digital controls and computer resources and their data networks. Copies of the key documentsmore » have also been provided to KHNP-CRI.« less
Informal employment and health status in Central America.
López-Ruiz, María; Artazcoz, Lucía; Martínez, José Miguel; Rojas, Marianela; Benavides, Fernando G
2015-07-24
Informal employment is assumed to be an important but seldom studied social determinant of health, affecting a large number of workers around the world. Although informal employment arrangements constitute a permanent, structural pillar of many labor markets in low- and middle-income countries, studies about its relationship with health status are still scarce. In Central America more than 60% of non-agricultural workers have informal employment. Therefore, we aimed to assess differences in self-perceived and mental health status of Central Americans with different patterns of informal and formal employment. Employment profiles were created by combining employment relations (employees, self-employed, employers), social security coverage (yes/no) and type of contract--only for employees--(written, oral, none), in a cross-sectional study of 8,823 non-agricultural workers based on the I Central American Survey of Working Conditions and Health of 2011. Using logistic regression models, adjusted odds ratios (aOR) by country, age and occupation, of poor self-perceived and mental health were calculated by sex. Different models were first fitted separately for the three dimensions of employment conditions, then for employment profiles as independent variables. Poor self-perceived health was reported by 34% of women and 27% of men, and 30% of women and 26% of men reported poor mental health. Lack of social security coverage was associated with poor self-perceived health (women, aOR: 1.38, 95% CI: 1.13-1.67; men, aOR: 1.36, 95% CI: 1.13-1.63). Almost all employment profiles with no social security coverage were significantly associated with poor self-perceived and poor mental health in both sexes. Our results show that informal employment is a significant factor in social health inequalities among Central American workers, which could be diminished by policies aimed at increasing social security coverage.
NASA Astrophysics Data System (ADS)
Rangga, K. K.; Syarief, Y. A.
2018-03-01
The objectives of this study are to study the participation of paddy farmers in the Special Effort program to increase paddy production, to study the level of household food security of paddy farmers, and to analyze the correlation between farmer participation and food security level of paddy farmers. The location was chosen purposively in Seputih Raman sub-district. The data were collected from December 2016 to February 2017. The population of this study was paddy farmers who participating in Special Effort program. The hypothesis was tested by using Spearman’s Rank correlation test. Farmer household’s food security was measured objectively based on the share of household’s food expenditure and subjectively based on the opinion, views, and attitudes or farmers’ opinions on food availability, food distribution, and household food consumption. This research showed that farmers’ participation in Special Effort program in Seputih Raman Sub Ditrict, Central Lampung Regency belonged to medium classification, household food security either objectively or subjectively was in food resistant condition of medium classification, and there was significant correlation between farmers’ participation and food security level of paddy farmer household.
Dudarev, Alexey A.; Dushkina, Eugenia V.; Sladkova, Yuliya N.; Alloyarov, Pavel R.; Chupakhin, Valery S.; Dorofeyev, Vitaliy M.; Kolesnikova, Tatjana A.; Fridman, Kirill B.; Evengard, Birgitta; Nilsson, Lena M.
2013-01-01
Background Poor state of water supply systems, shortage of water purification facilities and disinfection systems, low quality of drinking water generally in Russia and particularly in the regions of the Russian Arctic, Siberia and Far East have been defined in the literature. However, no standard protocol of water security assessment has been used in the majority of studies. Study design and methods Uniform water security indicators collected from Russian official statistical sources for the period 2000–2011 were used for comparison for 18 selected regions in the Russian Arctic, Siberia and Far East. The following indicators of water security were analyzed: water consumption, chemical and biological contamination of water reservoirs of Categories I and II of water sources (centralized – underground and surface, and non-centralized) and of drinking water. Results Water consumption in selected regions fluctuated from 125 to 340 L/person/day. Centralized water sources (both underground and surface sources) are highly contaminated by chemicals (up to 40–80%) and biological agents (up to 55% in some regions), mainly due to surface water sources. Underground water sources show relatively low levels of biological contamination, while chemical contamination is high due to additional water contamination during water treatment and transportation in pipelines. Non-centralized water sources are highly contaminated (both chemically and biologically) in 32–90% of samples analyzed. Very high levels of chemical contamination of drinking water (up to 51%) were detected in many regions, mainly in the north-western part of the Russian Arctic. Biological contamination of drinking water was generally much lower (2.5–12%) everywhere except Evenki AO (27%), and general and thermotolerant coliform bacteria predominated in drinking water samples from all regions (up to 17.5 and 12.5%, correspondingly). The presence of other agents was much lower: Coliphages – 0.2–2.7%, Clostridia spores, Giardia cysts, pathogenic bacteria, Rotavirus – up to 0.8%. Of a total of 56 chemical pollutants analyzed in water samples from centralized water supply systems, 32 pollutants were found to be in excess of hygienic limits, with the predominant pollutants being Fe (up to 55%), Cl (up to 57%), Al (up to 43%) and Mn (up to 45%). Conclusion In 18 selected regions of the Russian Arctic, Siberia and Far East Category I and II water reservoirs, water sources (centralized – underground, surface; non-centralized) and drinking water are highly contaminated by chemical and biological agents. Full-scale reform of the Russian water industry and water security system is urgently needed, especially in selected regions. PMID:24350065
Design of a Web-tool for diagnostic clinical trials handling medical imaging research.
Baltasar Sánchez, Alicia; González-Sistal, Angel
2011-04-01
New clinical studies in medicine are based on patients and controls using different imaging diagnostic modalities. Medical information systems are not designed for clinical trials employing clinical imaging. Although commercial software and communication systems focus on storage of image data, they are not suitable for storage and mining of new types of quantitative data. We sought to design a Web-tool to support diagnostic clinical trials involving different experts and hospitals or research centres. The image analysis of this project is based on skeletal X-ray imaging. It involves a computerised image method using quantitative analysis of regions of interest in healthy bone and skeletal metastases. The database is implemented with ASP.NET 3.5 and C# technologies for our Web-based application. For data storage, we chose MySQL v.5.0, one of the most popular open source databases. User logins were necessary, and access to patient data was logged for auditing. For security, all data transmissions were carried over encrypted connections. This Web-tool is available to users scattered at different locations; it allows an efficient organisation and storage of data (case report form) and images and allows each user to know precisely what his task is. The advantages of our Web-tool are as follows: (1) sustainability is guaranteed; (2) network locations for collection of data are secured; (3) all clinical information is stored together with the original images and the results derived from processed images and statistical analysis that enable us to perform retrospective studies; (4) changes are easily incorporated because of the modular architecture; and (5) assessment of trial data collected at different sites is centralised to reduce statistical variance.
Harrison, Peter M C; Collins, Tom; Müllensiefen, Daniel
2017-06-15
Modern psychometric theory provides many useful tools for ability testing, such as item response theory, computerised adaptive testing, and automatic item generation. However, these techniques have yet to be integrated into mainstream psychological practice. This is unfortunate, because modern psychometric techniques can bring many benefits, including sophisticated reliability measures, improved construct validity, avoidance of exposure effects, and improved efficiency. In the present research we therefore use these techniques to develop a new test of a well-studied psychological capacity: melodic discrimination, the ability to detect differences between melodies. We calibrate and validate this test in a series of studies. Studies 1 and 2 respectively calibrate and validate an initial test version, while Studies 3 and 4 calibrate and validate an updated test version incorporating additional easy items. The results support the new test's viability, with evidence for strong reliability and construct validity. We discuss how these modern psychometric techniques may also be profitably applied to other areas of music psychology and psychological science in general.
Mechanisation and automation technologies development in work at construction sites
NASA Astrophysics Data System (ADS)
Sobotka, A.; Pacewicz, K.
2017-10-01
Implementing construction work that creates buildings is a very complicated and laborious task and requires the use of various types of machines and equipment. For years there has been a desire for designers and technologists to introduce devices that replace people’s work on machine construction, automation and even robots. Technologies for building construction are still being developed and implemented to limit people’s hard work and improve work efficiency and quality in innovative architectonical and construction solutions. New opportunities for improving work on the construction site include computerisation of technological processes and construction management for projects and processes. The aim of the paper was to analyse the development of mechanisation, automation and computerisation of construction processes and selected building technologies, with special attention paid to 3D printing technology. The state of mechanisation of construction works in Poland and trends in its development in construction technologies are presented. These studies were conducted on the basis of the available literature and a survey of Polish construction companies.
Four principles for user interface design of computerised clinical decision support systems.
Kanstrup, Anne Marie; Christiansen, Marion Berg; Nøhr, Christian
2011-01-01
The paper presents results from a design research project of a user interface (UI) for a Computerised Clinical Decision Support System (CDSS). The ambition has been to design Human-Computer Interaction (HCI) that can minimise medication errors. Through an iterative design process a digital prototype for prescription of medicine has been developed. This paper presents results from the formative evaluation of the prototype conducted in a simulation laboratory with ten participating physicians. Data from the simulation is analysed by use of theory on how users perceive information. The conclusion is a model, which sum up four principles of interaction for design of CDSS. The four principles for design of user interfaces for CDSS are summarised as four A's: All in one, At a glance, At hand and Attention. The model emphasises integration of all four interaction principles in the design of user interfaces for CDSS, i.e. the model is an integrated model which we suggest as a guide for interaction design when working with preventing medication errors.
Post-marketing surveillance of quinolones 1988-1990.
Davey, P G; McDonald, T; Lindsay, G
1991-04-01
It has been much easier to obtain original data on adverse drug reactions (ADR) of quinolones from the pharmaceutical industry than it was two years ago. This is to be welcomed and, as anticipated, the new data continue to suggest that the new 4-quinolones have an ADR profile which is very similar to that of other antimicrobials. Visual disturbance is not a prominent feature, in contrast to the ADR profile of nalidixic acid. Better definition of quinolone ADRs requires prospective study, and the results of a newly completed prescription event monitoring study are awaited with interest. The potential use of computerised databases and record linkage is examined, but at present the number of quinolone prescriptions is too small to assess documentation of serious but rare events such as convulsions. Physicians need to be aware of the limitations of current data on suspected ADRs. Further investment in computerised databases is required to satisfy the requirements for attributing causality of an event to a drug.
[Importance of an outpatient record in obstetric anesthesia].
Lanza, V; Mercadante, S; Pignataro, A; Guglielmo, L; Villari, P; Di Fiore, G; Sapio, M; De Michele, P; Vegna, G
1991-01-01
A computerised record was used to collect data following an anesthesiological check-up of pregnant women at approximately 30 weeks of pregnancy. The record was input onto a portable PC in the anesthesia outpatient clinic, memorized on disk (3.5") and then transferred onto a PC network (one PC for each operating theatre) for "real time" consultation of each patient's data. All pregnant women attending the antenatal clinico were also given a folder illustrating epidural anesthetic techniques. Seven hundred and nine outpatient visits have been performed over the past two years with a 62% utilisation ratio. The collection of data using a computerised system allows a rapid and efficacious system of communication to be set up among the membranes of the anesthesiological team, thus encouraging the use of epidural techniques during labour. The distribution of the folder also facilitated the task of the anesthetist who found that pregnant women visiting the anesthesia clinic were already familiar with the epidural technique.
Spencer, Elizabeth; Ferguson, Alison; Craig, Hugh; Colyvas, Kim; Hankey, Graeme J; Flicker, Leon
2015-02-01
Decline in linguistic function has been associated with decline in cognitive function in previous research. This research investigated the informativeness of written language samples of Australian men from the Health in Men's Study (HIMS) aged from 76 to 93 years using the Computerised Propositional Idea Density Rater (CPIDR 5.1). In total, 60,255 words in 1147 comments were analysed using a linear-mixed model for statistical analysis. Results indicated no relationship with education level (p = 0.79). Participants for whom English was not their first learnt language showed Propositional Idea Density (PD) scores slightly lower (0.018 per 1 word). Mean PD per 1 word for those for whom English was their first language for comments below 60 words was 0.494 and above 60 words 0.526. Text length was found to have an effect (p = <0.0001). The mean PD was higher than previously reported for men and lower than previously reported for a similar cohort for Australian women.
de Vries, Arjen E; van der Wal, Martje Hl; Bedijn, Wendy; de Jong, Richard M; van Dijk, Rene B; Hillege, Hans L; Jaarsma, Tiny
2012-12-01
In the last decades, the introduction of information and communication technology (ICT) in healthcare promised an improved quality of care while reducing workload and improving cost-effectiveness. This might be realised by the use of computer guided decision support systems and telemonitoring. This case study describes the process of care of a patient with chronic heart failure, who was treated with a computerised disease management system in combination with telemonitoring. With the help of these appliances, we think we were probably able to prevent at least two readmissions for heart failure in a period of 10 months. We also gained more insight into patient's behaviour with regards to compliance with the heart failure regimen at home. Frequent contact at distance and the online availability of physiological measurements at home facilitated patient tailored education and helped the patient to react adequately to symptoms of deterioration. Additionally, up-titration of heart failure medication was performed without contacting the patient at the outpatient clinic.
Training and transfer effects of N-back training for brain-injured and healthy subjects.
Lindeløv, Jonas Kristoffer; Dall, Jonas Olsen; Kristensen, Casper Daniel; Aagesen, Marie Holt; Olsen, Stine Almgren; Snuggerud, Therese Ruud; Sikorska, Anna
2016-10-01
Working memory impairments are prevalent among patients with acquired brain injury (ABI). Computerised training targeting working memory has been researched extensively using samples from healthy populations but this field remains isolated from similar research in ABI patients. We report the results of an actively controlled randomised controlled trial in which 17 patients and 18 healthy subjects completed training on an N-back task. The healthy group had superior improvements on both training tasks (SMD = 6.1 and 3.3) whereas the ABI group improved much less (SMD = 0.5 and 1.1). Neither group demonstrated transfer to untrained tasks. We conclude that computerised training facilitates improvement of specific skills rather than high-level cognition in healthy and ABI subjects alike. The acquisition of these specific skills seems to be impaired by brain injury. The most effective use of computer-based cognitive training may be to make the task resemble the targeted behaviour(s) closely in order to exploit the stimulus-specificity of learning.
Security Requirements Management in Software Product Line Engineering
NASA Astrophysics Data System (ADS)
Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario
Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.
Central Asia: Regional Developments and Implications for U.S. Interests
2012-05-18
Representatives, Committee on International Relations, Subcommittee on the Middle East and Central Asia, Assessing Energy and Security Issues in Central Asia...Akiner, Violence in Andijon, 13 May 2005: An Independent Assessment , Central Asia-Caucasus Institute, July 2005; AbduMannob Polat, Reassessing Andijan...observers warn that Islamic extremism could increase dramatically in the region, others discount the risk that the existing secular governments soon
Strategic Vision: A Selected Bibliography
2011-04-01
Africa in the New World: How Global and Domestic Developments Will Impact by 2025. Tshwane (Pretoria), South Africa: Institute for Security Studies...Our Next Chapter; Tough Questions, Straight Answers. New York: Ecco, 2008. 306pp. (E902 . H13 2008) Hanks, Reuel R. Global Security Watch: Central...D’Amato. The Macroeconomics of US Defense Spending: Problems in Federal Spending, and Their Impact on National Security. Washington, DC: Center for
47 CFR 202.2 - Criteria and guidance.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...
47 CFR 202.2 - Criteria and guidance.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...
47 CFR 202.2 - Criteria and guidance.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...
47 CFR 202.2 - Criteria and guidance.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...
A Computerised English Language Proofing Cloze Program.
ERIC Educational Resources Information Center
Coniam, David
1997-01-01
Describes a computer program that takes multiple-choice cloze passages and compiles them into proofreading exercises. Results reveal that such a computerized test type can be used to accurately measure the proficiency of students of English as a Second Language in Hong Kong. (14 references) (Author/CK)
The Experience of External Studies. Occasional Papers No. 4.
ERIC Educational Resources Information Center
Riverina Coll. of Advanced Education, Wagga Wagga, New South Wales (Australia).
This document brings together four invited papers by external students who have graduated from Riverina College: (1) "The External Student: One Profile" (Christine Del Gigante); (2) "Managing Life as a External Student" (Robert Landow); (3) "The Computerised Student" (John Chant); and (4) "The Right to…
76 FR 37773 - Central Montana Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-28
... will meet in Stanford, MT. The committee is authorized under the Secure Rural Schools and Community... comments must be sent to 109 Central Ave., Stanford, MT 59479, or by e-mail to [email protected] , or via...
76 FR 30094 - Central Montana Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-24
... will meet in Stanford, MT. The committee is authorized under the Secure Rural Schools and Community... requests for time for oral comments must be sent to 109 Central Ave., Stanford, MT 59479, or by e-mail to...
Alaska Department of Natural Resources Recorder's Office UCC Online Filing
interests in personal property. The UCC Central File System Office maintains a statewide library and index of all transactions filed which create a security interest in personal property. The UCC Central
77 FR 56625 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-13
... Internet at http://www.regulations.gov as they are received without change, including any personal.... George G. Meade, MD 20755-6000. Decentralized segments: Defense Intelligence Agency (DIA) Headquarters... decentralized system locations, write to the National Security Agency/Central Security Service, Freedom of...
32 CFR 322.4 - Responsibilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 2 2014-07-01 2014-07-01 false Responsibilities. 322.4 Section 322.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.4 Responsibilities. (a) The...
32 CFR 322.4 - Responsibilities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 2 2012-07-01 2012-07-01 false Responsibilities. 322.4 Section 322.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.4 Responsibilities. (a) The...
32 CFR 322.4 - Responsibilities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 2 2013-07-01 2013-07-01 false Responsibilities. 322.4 Section 322.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.4 Responsibilities. (a) The...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2012 CFR
2012-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2010 CFR
2010-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2013 CFR
2013-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2011 CFR
2011-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2014 CFR
2014-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
How a central bank perceives the (visual) communication of security features on its banknotes
NASA Astrophysics Data System (ADS)
Tornare, Roland
1998-04-01
The banknotes of earlier generations were protected by two or three security features with which the general public was familiar: watermark, security thread, intaglio printing. The remaining features pleased primarily printers and central banks, with little thought being given to public perception. The philosophy adopted two decades ago was based on a certain measure of discretion. It required patience and perseverance to discover the built-in security features of the banknotes. When colour photocopiers appeared on the scene in the mid- eighties we were compelled to take precautionary measures to protect our banknotes. One such measure consisted of an information campaign to prepare ourselves for this new potential threat. At this point, we actually became fully aware of the complex design of our banknotes and how difficult it is to communicate clearly the difference between a genuine and a counterfeit banknote. This difficult experience has nevertheless been a great benefit. It badgered us continually during the initial phase of designing the banknotes and preparing the information campaign.
NASA Astrophysics Data System (ADS)
Chalmers, Alex
2004-09-01
To increase the security and throughput of ISO traffic through international terminals more technology must be applied to the problem. A transnational central archive of inspection records is discussed that can be accessed by national agencies as ISO containers approach their borders. The intent is to improve the throughput and security of the cargo inspection process. A review of currently available digital media archiving technologies is presented and their possible application to the tracking of international ISO container shipments. Specific image formats employed by current x-ray inspection systems are discussed. Sample x-ray data from systems in use today are shown that could be entered into such a system. Data from other inspection technologies are shown to be easily integrated, as well as the creation of database records suitable for interfacing with other computer systems. Overall system performance requirements are discussed in terms of security, response time and capacity. Suggestions for pilot projects based on existing border inspection processes are made also.
Privacy Impact Assessment for the Central Data Exchange
The Central Data Exchange collects personally identifiable information, including personal answers to security questions. Learn how this data will be collected in the system, how it will be used, access to the data, and the purpose of data collection.
ERIC Educational Resources Information Center
Beale, Ivan L.
2005-01-01
Computer assisted learning (CAL) can involve a computerised intelligent learning environment, defined as an environment capable of automatically, dynamically and continuously adapting to the learning context. One aspect of this adaptive capability involves automatic adjustment of instructional procedures in response to each learner's performance,…
Information Technology and Disabilities, 1994.
ERIC Educational Resources Information Center
McNulty, Tom, Ed.
1994-01-01
Four issues of this newsletter on information technology and disabilities (ITD) contain the following articles: "Building an Accessible CD-ROM Reference Station" (Rochelle Wyatt and Charles Hamilton); "Development of an Accessible User Interface for People Who Are Blind or Vision Impaired as Part of the Re-Computerisation of Royal Blind Society…
Constructing "Nerdiness": Characterisation in "The Big Bang Theory"
ERIC Educational Resources Information Center
Bednarek, Monika
2012-01-01
This paper analyses the linguistic construction of the televisual character Sheldon--the "main nerd" in the sitcom "The Big Bang Theory" (CBS, 2007-), approaching this construction of character through both computerised and "manual" linguistic analysis. More specifically, a computer analysis of dialogue (using concordances and keyword analysis) in…
Computerising the Salesforce: The Introduction of Technical Change in a Non-Union Workforce.
ERIC Educational Resources Information Center
Newell, Helen; Lloyd, Caroline
1998-01-01
Results of interviews with 13 pharmaceutical sales representatives, five sales managers, and six human-resource managers and 47 survey responses showed that introduction of information technology was seen as purely technical; human-resources departments played no role; and informal communication procedures enabled management to ignore individual…
Learner Affect in Computerised L2 Oral Grammar Practice with Corrective Feedback
ERIC Educational Resources Information Center
Bodnar, Stephen; Cucchiarini, Catia; Penning de Vries, Bart; Strik, Helmer; van Hout, Roeland
2017-01-01
Although corrective feedback (CF) has received much interest in the second language acquisition literature, relatively little research has investigated the relationship between CF and learner affect in concrete practice situations. The present study investigates learners' affective states and practice behaviour in a novel context: oral grammar…
Working Memory Interventions with Children: Classrooms or Computers?
ERIC Educational Resources Information Center
Colmar, Susan; Double, Kit
2017-01-01
The importance of working memory to classroom functioning and academic outcomes has led to the development of many interventions designed to enhance students' working memory. In this article we briefly review the evidence for the relative effectiveness of classroom and computerised working memory interventions in bringing about measurable and…
Physical and Psychosocial Environments Associated with Networked Classrooms
ERIC Educational Resources Information Center
Zandvliet, David B.; Fraser, Barry J.
2005-01-01
This article reports a study of the learning environments in computer networked classrooms. The study is unique in that it involved an evaluation of both the physical and psychosocial classroom environments in these computerised settings through the use of a combination of questionnaires and ergonomic evaluations. The study involved administering…
Students' Understanding of Molecular Structure Representations
ERIC Educational Resources Information Center
Ferk, Vesna; Vrtacnik, Margareta; Blejec, Andrej; Gril, Alenka
2003-01-01
The purpose of the investigation was to determine the meanings attached by students to the different kinds of molecular structure representations used in chemistry teaching. The students (n = 124) were from primary (aged 13-14 years) and secondary (aged 17-18 years) schools and a university (aged 21-25 years). A computerised "Chemical…
Datson, D J; Carter, N G
1988-10-01
The use of personal computers in accountancy and business generally has been stimulated by the availability of flexible software packages. We describe the implementation of a commercial software package designed for interfacing with laboratory instruments and highlight the ease with which it can be implemented, without the need for specialist computer programming staff.
Central Asia: Regional Developments and Implications for U.S. Interests
2012-01-03
Central Asia, Assessing Energy and Security Issues in Central Asia, Testimony of Steven Mann, Principal Deputy Assistant Secretary for South and...Akiner, Violence in Andijon, 13 May 2005: An Independent Assessment , Central Asia-Caucasus Institute, July 2005; AbduMannob Polat, Reassessing Andijan...dramatically in the region, others discount the risk that the existing secular governments soon will be overthrown by Islamic extremists.57 In the case
The U.S. Footprint on the Arabian Peninsula: Can We Avoid a Repeat of the Pullout from Saudi Arabia?
2009-12-01
respective GCC country. Centrally located power is defined as the government of a GCC country that allows minimal or no political liberalization ...exercise more political liberalization , and carefully balance religious entities with secular foreign policy requirements are far less easily manipulated...Command and Defense Security Cooperation Agency staff, and conference material related to EU -GCC security. Other national security strategy
Liaw, Siaw-Teng; Powell-Davies, Gawaine; Pearce, Christopher; Britt, Helena; McGlynn, Lisa; Harris, Mark F
2016-03-01
With increasing computerisation in general practice, national primary care networks are mooted as sources of data for health services and population health research and planning. Existing data collection programs - MedicinesInsight, Improvement Foundation, Bettering the Evaluation and Care of Health (BEACH) - vary in purpose, governance, methodologies and tools. General practitioners (GPs) have significant roles as collectors, managers and users of electronic health record (EHR) data. They need to understand the challenges to their clinical and managerial roles and responsibilities. The aim of this article is to examine the primary and secondary use of EHR data, identify challenges, discuss solutions and explore directions. Representatives from existing programs, Medicare Locals, Local Health Districts and research networks held workshops on the scope, challenges and approaches to the quality and use of EHR data. Challenges included data quality, interoperability, fragmented governance, proprietary software, transparency, sustainability, competing ethical and privacy perspectives, and cognitive load on patients and clinicians. Proposed solutions included effective change management; transparent governance and management of intellectual property, data quality, security, ethical access, and privacy; common data models, metadata and tools; and patient/community engagement. Collaboration and common approaches to tools, platforms and governance are needed. Processes and structures must be transparent and acceptable to GPs.
32 CFR 299.4 - Responsibilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...
32 CFR 299.4 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...
32 CFR 299.4 - Responsibilities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Agency Central Security Service (NSA/CSS) Policy Manual 3-16, “Control of Communications Security Material” (available to authorized users of SIPRNET at www.iad.nsa.smil.mil/resources/library/nsa_office_of_policy_section/pdf/NSA_CSS_MAN-3-16_080505.pdf). (b) Adversely affecting the performance of classified...
32 CFR 299.4 - Responsibilities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...
Code of Federal Regulations, 2011 CFR
2011-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM.../CSS by other government agencies shall be placed in the processing queue according to the date the... placed in the queue according to the date of the requester's letter. (d) The FOIA office shall maintain...
75 FR 77305 - Security-Based Swap Data Repository Registration, Duties, and Core Principles
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-10
... authorities can access and analyze the data from secure, central locations to better monitor for systemic risk... authorities information to help limit systemic risk and by promoting stability through enhanced transparency...) performing market surveillance, prudential supervision, and macroprudential (systemic risk) supervision; and...
7 CFR 3560.408 - Lease of security property.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Lease of security property. 3560.408 Section 3560.408 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, DEPARTMENT OF... facilities related to a housing project (e.g., central kitchens, recreation facilities, laundry rooms, and...
32 CFR 1901.61 - Purpose and authority.
Code of Federal Regulations, 2010 CFR
2010-07-01
... and security suitability investigations (or promotion material in the case of the armed services... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS... Central Intelligence has determined to exempt from the procedures established by this regulation and from...
19 CFR 10.584 - Certification.
Code of Federal Regulations, 2010 CFR
2010-04-01
... for those goods in the Dominican Republic—Central America—United States Free Trade Agreement; there... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. Dominican Republic-Central America-United...
NASA Astrophysics Data System (ADS)
Kuhn, D. R.; Tracy, Miles C.; Frankel, Sheila E.
2002-08-01
This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. This document is not intended to provide a mandatory framework for telecommuting or home office broadband communication environments, but rather to present suggested approaches to the topic.
Classical noise, quantum noise and secure communication
NASA Astrophysics Data System (ADS)
Tannous, C.; Langlois, J.
2016-01-01
Secure communication based on message encryption might be performed by combining the message with controlled noise (called pseudo-noise) as performed in spread-spectrum communication used presently in Wi-Fi and smartphone telecommunication systems. Quantum communication based on entanglement is another route for securing communications as demonstrated by several important experiments described in this work. The central role played by the photon in unifying the description of classical and quantum noise as major ingredients of secure communication systems is highlighted and described on the basis of the classical and quantum fluctuation dissipation theorems.
Biocontainment, biosecurity, and security practices in beef feedyards.
Brandt, Aric W; Sanderson, Michael W; DeGroot, Brad D; Thomson, Dan U; Hollis, Larry C
2008-01-15
To determine the biocontainment, biosecurity, and security practices at beef feedyards in the Central Plains of the United States. Survey. Managers of feedyards in Colorado, Kansas, Nebraska, Oklahoma, and Texas that feed beef cattle for finish before slaughter; feedyards had to have an active concentrated animal feeding operation permit with a 1-time capacity of >or= 1,000 cattle. A voluntary survey of feedyard personnel was conducted. Identified feedyard personnel were interviewed and responses regarding facility design, security, employees, disease preparedness, feedstuffs, hospital or treatment systems, sanitation, cattle sources, handling of sick cattle, and disposal of carcasses were collected in a database questionnaire. The survey was conducted for 106 feedyards with a 1-time capacity that ranged from 1,300 to 125,000 cattle. Feedyards in general did not have high implementation of biocontainment, biosecurity, or security practices. Smaller feedyards were, in general, less likely to use good practices than were larger feedyards. Results of the survey provided standard practices for biocontainment, biosecurity, and security in feedyards located in Central Plains states. Information gained from the survey results can be used by consulting veterinarians and feedyard managers as a basis for discussion and to target training efforts.
Revitalization of food barns in supporting sustainable food security in Central Java
NASA Astrophysics Data System (ADS)
Riptanti, E. W.; Qonita, A.; Suprapti
2018-02-01
Rice barns have been developed in some areas in Central Java, but several problems seem to appear, leading to nonoptimal functions of nonactive food barns. The present article aims to examine revitalization of food barns through systematic, integrated, and sustainable empowerment. The research design is exploratory research to generate data that are in-depth qualitative and quantitative. Survey was applied in four regencies including Wonogiri, Purworejo, Temanggung, and Batang. Key informants comprise caretakers of food barns, village apparatus, public figures, and Food Security Office apparatus. The research results revealed that the food barns have not been managed in professional manners. Active roles of all members and caretakers, village government, and Food Security Agency are, therefore, required in revitalizing the food barns. In order to perform social functions well, the food barns should be profit-oriented to achieve sustainability.
77 FR 15596 - Privacy Act; Implementation
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-16
... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2012-OS-0032] 32 CFR Part 322 Privacy... levels of government. List of Subjects in 32 CFR Part 322 Privacy. Accordingly, 32 CFR part 322 is amended as follows: PART 322--NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 0 1. The authority...
76 FR 22615 - Privacy Act; Implementation
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-22
... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2011-OS-0003] 32 CFR Part 322... Part 322 Privacy. Accordingly, 32 CFR part 322 is amended as follows: PART 322--NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE PROGRAM 0 1. The authority citation for 32 CFR part 322.7 continues to...
32 CFR 299.7 - Exempt records.
Code of Federal Regulations, 2014 CFR
2014-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...
32 CFR 299.7 - Exempt records.
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...
32 CFR 299.7 - Exempt records.
Code of Federal Regulations, 2012 CFR
2012-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...
32 CFR 299.7 - Exempt records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...
Code of Federal Regulations, 2013 CFR
2013-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM § 299.5 Procedures. (a) Requests for copies of records of the NSA/CSS shall be delivered to the Director... Director of Policy, if so designated, shall endeavor to respond to a direct request to NSA/CSS within 20...
Code of Federal Regulations, 2012 CFR
2012-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM § 299.5 Procedures. (a) Requests for copies of records of the NSA/CSS shall be delivered to the Director... Director of Policy, if so designated, shall endeavor to respond to a direct request to NSA/CSS within 20...
32 CFR 299.7 - Exempt records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... NSA/CSS to withhold information in whole or in part from public disclosure when there is a sound legal... source, including a source within NSA/CSS, state, local, or foreign agency or authority, or any private...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Investigation; (3) United States Secret Service; (4) Central Intelligence Agency; (5) National Security Council; (6) National Security Agency; (7) Defense Intelligence Agency; (8) Merit Systems Protection Board; (9... Section 733.105 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE...
Code of Federal Regulations, 2010 CFR
2010-07-01
...) National Security Agency/Central Security Service records, unless the records are exempt according to 50 U.S.C. 402. (c) Defense Intelligence Agency, National Reconnaissance Office, and National Geospatial-Intelligence Agency records, unless the records are exempt according to 50 U.S.C. 403-5e, 10 U.S.C. 424 and 455...
17 CFR 17.02 - Form, manner and time of filing reports.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Form, manner and time of filing reports. 17.02 Section 17.02 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... markets located in that time zone, and central time for information concerning all other markets. (b...
76 FR 60112 - Consent Based Social Security Number Verification (CBSV) Service
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-28
... protect the public's information. In addition to the benefit of providing high volume, centralized SSN verification services to the business community in a secure manner, CBSV provides us with cost and workload management benefits. New Information: To use CBSV, interested parties must pay a one- time non-refundable...
78 FR 56266 - Consent Based Social Security Number Verification (CBSV) Service
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-12
... developed CBSV as a user- friendly, internet-based application with safeguards that protect the public's information. In addition to the benefit of providing high volume, centralized SSN verification services to users in a secure manner, CBSV provides us with cost and workload management benefits. New Information...
32 CFR 322.7 - Exempt systems of records.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 2 2013-07-01 2013-07-01 false Exempt systems of records. 322.7 Section 322.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.7 Exempt systems of...
32 CFR 322.7 - Exempt systems of records.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 2 2012-07-01 2012-07-01 false Exempt systems of records. 322.7 Section 322.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.7 Exempt systems of...
32 CFR 322.7 - Exempt systems of records.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 2 2014-07-01 2014-07-01 false Exempt systems of records. 322.7 Section 322.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.7 Exempt systems of...
32 CFR 322.7 - Exempt systems of records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 2 2011-07-01 2011-07-01 false Exempt systems of records. 322.7 Section 322.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.7 Exempt systems of...
12 CFR 725.20 - Repayment, security and credit reporting agreements; other terms and conditions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Repayment, security and credit reporting agreements; other terms and conditions. 725.20 Section 725.20 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION CENTRAL LIQUIDITY...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-11
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Protection, Department of Homeland Security. ACTION: 60-Day notice and request for comments; Extension of an...: Direct all written comments to U.S. Customs and Border Protection, Attn: Tracey Denning, Office of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-15
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Protection, Department of Homeland Security. ACTION: 30-Day notice and request for comments; Extension of an existing information collection: 1651-0061. SUMMARY: U.S. Customs and Border Protection (CBP) of the...
Reilly, Niamh
2018-05-01
The recent unprecedented focus on ending impunity for conflict-related sexual violence (CRSV) is positive in many respects. However, it has narrowed the scope of Security Council Resolution 1325 and the women, peace, and security (WPS) agenda it established in 2000. Through a critical discursive genealogy of the interrelation of two UN agendas-protection of civilians in armed conflict and women, peace, and security-the author traces how CRSV emerged as the defining issue of the latter while the transformative imperative of making women's participation central to every UN endeavor for peace and security has failed to gain traction.
EU Failing FAO Challenge to Improve Global Food Security.
Smyth, Stuart J; Phillips, Peter W B; Kerr, William A
2016-07-01
The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.
19 CFR 10.625 - Refunds of excess customs duties.
Code of Federal Regulations, 2010 CFR
2010-04-01
...-Central America-United States Free Trade Agreement Retroactive Preferential Tariff Treatment for Textile... Dominican Republic—Central America—United States Free Trade Agreement Implementation Act, as amended by... 10.625 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Central and field organization, established places at which, the officers from whom, and the methods whereby the public may secure information, make... ORGANIZATION § 5.2 Central and field organization, established places at which, the officers from whom, and the...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Central and field organization, established places at which, the officers from whom, and the methods whereby the public may secure information, make... ORGANIZATION § 5.2 Central and field organization, established places at which, the officers from whom, and the...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Central and field organization, established places at which, the officers from whom, and the methods whereby the public may secure information, make... ORGANIZATION § 5.2 Central and field organization, established places at which, the officers from whom, and the...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Central and field organization, established places at which, the officers from whom, and the methods whereby the public may secure information, make... ORGANIZATION § 5.2 Central and field organization, established places at which, the officers from whom, and the...
ViPAR: a software platform for the Virtual Pooling and Analysis of Research Data.
Carter, Kim W; Francis, Richard W; Carter, K W; Francis, R W; Bresnahan, M; Gissler, M; Grønborg, T K; Gross, R; Gunnes, N; Hammond, G; Hornig, M; Hultman, C M; Huttunen, J; Langridge, A; Leonard, H; Newman, S; Parner, E T; Petersson, G; Reichenberg, A; Sandin, S; Schendel, D E; Schalkwyk, L; Sourander, A; Steadman, C; Stoltenberg, C; Suominen, A; Surén, P; Susser, E; Sylvester Vethanayagam, A; Yusof, Z
2016-04-01
Research studies exploring the determinants of disease require sufficient statistical power to detect meaningful effects. Sample size is often increased through centralized pooling of disparately located datasets, though ethical, privacy and data ownership issues can often hamper this process. Methods that facilitate the sharing of research data that are sympathetic with these issues and which allow flexible and detailed statistical analyses are therefore in critical need. We have created a software platform for the Virtual Pooling and Analysis of Research data (ViPAR), which employs free and open source methods to provide researchers with a web-based platform to analyse datasets housed in disparate locations. Database federation permits controlled access to remotely located datasets from a central location. The Secure Shell protocol allows data to be securely exchanged between devices over an insecure network. ViPAR combines these free technologies into a solution that facilitates 'virtual pooling' where data can be temporarily pooled into computer memory and made available for analysis without the need for permanent central storage. Within the ViPAR infrastructure, remote sites manage their own harmonized research dataset in a database hosted at their site, while a central server hosts the data federation component and a secure analysis portal. When an analysis is initiated, requested data are retrieved from each remote site and virtually pooled at the central site. The data are then analysed by statistical software and, on completion, results of the analysis are returned to the user and the virtually pooled data are removed from memory. ViPAR is a secure, flexible and powerful analysis platform built on open source technology that is currently in use by large international consortia, and is made publicly available at [http://bioinformatics.childhealthresearch.org.au/software/vipar/]. © The Author 2015. Published by Oxford University Press on behalf of the International Epidemiological Association.
The Possibilities and Limitations of Applying "Open Data" Principles in Schools
ERIC Educational Resources Information Center
Selwyn, Neil; Henderson, Michael; Chao, Shu-Hua
2017-01-01
Large quantities of data are now being generated, collated and processed within schools through computerised systems and other digital technologies. In response to growing concerns over the efficiency and equity of how these data are used, the concept of "open data" has emerged as a potential means of using digital technology to…
Development of a Computerised Method of Determining Aircraft Maintenance Intervals.
1985-09-01
Reliability. Vol.17. 1978. pp461-464. 23. , and Shunji Osaki. "Optimum Preventive Maintenance Policies for a 2-Unit Redundant System." IEEE...Transactions on Reliability. Vol.R-23. No.2. June 1974. pp86-91. 24. _ _, and Shunji Osaki. "A Summary of Optimum Preventive Maintenance Policies for a Two-Unit
USDA-ARS?s Scientific Manuscript database
Current methods for assessing children's dietary intake, such as interviewer-administered 24-h dietary recall (24-h DR), are time consuming and resource intensive. Self-administered instruments offer a low-cost diet assessment method for use with children. The present study assessed the validity of ...
Allocentric versus Egocentric Spatial Memory in Adults with Autism Spectrum Disorder
ERIC Educational Resources Information Center
Ring, Melanie; Gaigg, Sebastian B.; Altgassen, Mareike; Barr, Peter; Bowler, Dermot M.
2018-01-01
Individuals with autism spectrum disorder (ASD) present difficulties in forming relations among items and context. This capacity for relational binding is also involved in spatial navigation and research on this topic in ASD is scarce and inconclusive. Using a computerised version of the Morris Water Maze task, ASD participants showed particular…
Spelling: Computerised Feedback for Self-Correction
ERIC Educational Resources Information Center
Lawley, Jim
2016-01-01
Research has shown that any assumption that L2 learners of English do well to rely on the feedback provided by generic spell checkers (for example, the MS Word spell checker) is misplaced. Efforts to develop spell checkers specifically for L2 learners have focused on training software to offer more appropriate suggestion lists for replacing…
Fruit and vegetables are similarly categorised by 8-13-year-old children
USDA-ARS?s Scientific Manuscript database
This exploratory study assessed how 8- to 13-year-old children categorized and labelled fruit and vegetables (FaV), and how these were influenced by child characteristics, to specify second-level categories in a hierarchical food search system for a computerised 24-h dietary recall (hdr). Two sets o...
Evidence of Virtual Patients as a Facilitative Learning Tool on an Anesthesia Course
ERIC Educational Resources Information Center
Leung, Joseph Y. C.; Critchley, Lester A. H.; Yung, Alex L. K.; Kumta, Shekhar M.
2015-01-01
Virtual patients are computerised representations of realistic clinical cases. They were developed to teach clinical reasoning skills through delivery of multiple standardized patient cases. The anesthesia course at The Chinese University of Hong Kong developed two novel types of virtual patients, formative assessment cases studies and storyline,…
Quest for a Computerised Semantics.
ERIC Educational Resources Information Center
Leslie, Adrian R.
The objective of this thesis was to colligate the various strands of research in the literature of computational linguistics that have to do with the computational treatment of semantic content so as to encode it into a computerized dictionary. In chapter 1 the course of mechanical translation (1947-1960) and quantitative linguistics is traced to…
Identifying Reading Problems with Computer-Adaptive Assessments
ERIC Educational Resources Information Center
Merrell, C.; Tymms, P.
2007-01-01
This paper describes the development of an adaptive assessment called Interactive Computerised Assessment System (InCAS) that is aimed at children of a wide age and ability range to identify specific reading problems. Rasch measurement has been used to create the equal interval scales that form each part of the assessment. The rationale for the…
ERIC Educational Resources Information Center
Krzok, Franziska; Rieger, Verena; Niemann, Katharina; Nobis-Bosch, Ruth; Radermacher, Irmgard; Huber, Walter; Willmes, Klaus; Abel, Stefanie
2018-01-01
Background: SAPS--'Sprachsystematisches Aphasiescreening'--is a novel language-systematic aphasia screening developed for the German language, which already had been positively evaluated. It offers a fast assessment of modality-specific psycholinguistic components at different levels of complexity and the derivation of impairment-based treatment…
Developing a Computerised Multiple Elements Test for Organisational Difficulties
ERIC Educational Resources Information Center
Hynes, Sinead M.; Fish, Jessica; Evans, Jonathan J.; Manly, Tom
2015-01-01
Executive function is best measured in loosely structured, multi-component tasks that reflect real-life demands. These tasks require participants to develop a strategy, keep a plan in mind and monitor time. Errors include ignoring stated goals ("goal neglect"), over-allocation of time to one task and violating rules. Teasing apart such…
Computer-Based Working Memory Training in Children with Mild Intellectual Disability
ERIC Educational Resources Information Center
Delavarian, Mona; Bokharaeian, Behrouz; Towhidkhah, Farzad; Gharibzadeh, Shahriar
2015-01-01
We designed a working memory (WM) training programme in game framework for mild intellectually disabled students. Twenty-four students participated as test and control groups. The auditory and visual-spatial WM were assessed by primary test, which included computerised Wechsler numerical forward and backward sub-tests and secondary tests, which…
Inclusion in Physical Education: A Review of Literature
ERIC Educational Resources Information Center
Qi, Jing; Ha, Amy S.
2012-01-01
The purpose of this review was to analyse empirical studies on inclusion in physical education (PE) over the past 20 years and then propose recommendations for future research. A systematic process was used to search the literature for this review. First, a total of 75 research-based articles from computerised education databases were included in…
Computerization of guidelines: towards a "guideline markup language".
Dart, T; Xu, Y; Chatellier, G; Degoulet, P
2001-01-01
Medical decision making is one of the most difficult daily tasks for physicians. Guidelines have been designed to reduce variance between physicians in daily practice, to improve patient outcomes and to control costs. In fact, few physicians use guidelines in daily practice. A way to ease the use of guidelines is to implement computerised guidelines (computer reminders). We present in this paper a method of computerising guidelines. Our objectives were: 1) to propose a generic model that can be instantiated for any specific guidelines; 2) to use eXtensible Markup Language (XML) as a guideline representation language to instantiate the generic model for a specific guideline. Our model is an object representation of a clinical algorithm, it has been validated by running two different guidelines issued by a French official Agency. In spite of some limitations, we found that this model is expressive enough to represent complex guidelines devoted to diabetes and hypertension management. We conclude that XML can be used as a description format to structure guidelines and as an interface between paper-based guidelines and computer applications.
Slice-thickness evaluation in CT and MRI: an alternative computerised procedure.
Acri, G; Tripepi, M G; Causa, F; Testagrossa, B; Novario, R; Vermiglio, G
2012-04-01
The efficient use of computed tomography (CT) and magnetic resonance imaging (MRI) equipment necessitates establishing adequate quality-control (QC) procedures. In particular, the accuracy of slice thickness (ST) requires scan exploration of phantoms containing test objects (plane, cone or spiral). To simplify such procedures, a novel phantom and a computerised LabView-based procedure have been devised, enabling determination of full width at half maximum (FWHM) in real time. The phantom consists of a polymethyl methacrylate (PMMA) box, diagonally crossed by a PMMA septum dividing the box into two sections. The phantom images were acquired and processed using the LabView-based procedure. The LabView (LV) results were compared with those obtained by processing the same phantom images with commercial software, and the Fisher exact test (F test) was conducted on the resulting data sets to validate the proposed methodology. In all cases, there was no statistically significant variation between the two different procedures and the LV procedure, which can therefore be proposed as a valuable alternative to other commonly used procedures and be reliably used on any CT and MRI scanner.
Triñanes, Yolanda; Atienza, Gerardo; Louro-González, Arturo; de-las-Heras-Liñero, Elena; Alvarez-Ariza, María; Palao, Diego J
2015-01-01
One of the proposals for improving clinical practice is to introduce computerised decision support systems (CDSS) and integrate these with electronic medical records. Accordingly, this study sought to systematically review evidence on the effectiveness of CDSS in the management of depression. A search was performed in Medline, EMBASE and PsycInfo, in order to do this. The quality of quantitative studies was assessed using the SIGN method, and qualitative studies using the CASPe checklist. Seven studies were identified (3 randomised clinical trials, 3 non-randomised trials, and one qualitative study). The CDSS assessed incorporated content drawn from guidelines and other evidence-based products. In general, the CDSS had a positive impact on different aspects, such as the screening and diagnosis, treatment, improvement in depressive symptoms and quality of life, and referral of patients. The use of CDSS could thus serve to optimise care of depression in various scenarios by providing recommendations based on the best evidence available and facilitating decision-making in clinical practice. Copyright © 2014 SEP y SEPB. Published by Elsevier España. All rights reserved.
Street-level Bureaucracy and Social Policy in Brazil.
Costa, Nilson do Rosário
2017-11-01
This paper describes the Brazilian central government bureaucracy and people with disabilities' access to the Continuous Cash Benefit (BPC). This access depends on the Ministry of Social Security bureaucracy's evaluation of the condition of vulnerability. We performed a literature review, analysis of secondary data from time series and cross-sectional data to describe street-level federal bureaucracy. Legal documents and indicators describe the expert evaluation regimen of the Ministry of Social Security (MPS). This paper shows the uneven growth of the number of career public servants of the central government in the last two decades. The Brazilian central government has adopted the international concept of person with disabilities in the evaluation of BPC applicants. Despite this decision, it is shown that the Brazilian central government expanded selectively the career bureaucracy to work in the social area. It was found that the result of the evaluation process was quite strict, favoring applicants in conditions of extreme biomedical vulnerability. Despite adopting the social model, BPC eligibility is tied to medical diagnosis.
2000-05-01
Security Establishment from Canada and Ministry of Finance from Finland and Service Central de la Sécurité des Systèmes d’Information from France and...Nazionale per la Sicurezza CESIS III Reparto - UCSi from Italy and Ministry of the Interior and Kingdom Relations from The Netherlands and Page 3 of...39 HQ Defence Command Norway/Security Division from Norway and Ministerio de Administraciones Públicas from Spain and Communications-Electronics
Moore, L; Tapper, K; Dennehy, A; Cooper, A
2005-07-01
To evaluate the validity, reliability and sensitivity of a computerised single day 24-h recall questionnaire designed for the comparison of children's fruit and snack consumption at the group (school) level. Relative validity and reliability were assessed in relation to (i) intake at school and (ii) intake throughout the whole day, using diary-assisted 24-h recall interviews and a 7-day test-retest procedure. Sensitivity was assessed in relation to intake by comparing results from schools with differing food policies, and by sex. Eight schools took part in the validity and reliability assessments, with 78 children completing the 24-h recall interviews and 195 children completing the test-retest procedure. A total of 43 schools (1890 children) took part in the sensitivity analysis. All children were aged 9-11 y. All schools were in South Wales and South-west England. For fruit intake at school, the questionnaire showed fair levels of validity at the individual level (kappa = 0.29). At the group level, there were little or no differences in fruit intake at school between the two measures and two occasions. The questionnaire was sufficiently sensitive to identify statistically significant differences between girls and boys, and between schools with different food policies. For snack intake at school, validity at the individual level was slightly lower (kappa = 0.220.25), but the data remained of value in analyses at the group level. For fruit and snack intake throughout the whole day there was little agreement at the individual level (kappa = 0.00-0.06), and at the group level there tended to be substantial differences between the two measures and two occasions. The computerised questionnaire is a quick and cost-effective means of assessing children's consumption of fruit at school. While further development is required to improve validity and reliability, it has the potential to be particularly useful in randomised controlled trials of school-based dietary interventions.
Real-time pulse oximetry artifact annotation on computerized anaesthetic records.
Gostt, Richard Karl; Rathbone, Graeme Dennis; Tucker, Adam Paul
2002-01-01
Adoption of computerised anaesthesia record keeping systems has been limited by the concern that they record artifactual data and accurate data indiscriminately. Data resulting from artifacts does not reflect the patient's true condition and presents a problem in later analysis of the record, with associated medico-legal implications. This study developed an algorithm to automatically annotate pulse oximetry artifacts and sought to evaluate the algorithm's accuracy in routine surgical procedures. MacAnaesthetist is a semi-automatic anaesthetic record keeping system developed for the Apple Macintosh computer, which incorporated an algorithm designed to automatically detect pulse oximetry artifacts. The algorithm labeled artifactual oxygen saturation values < 90%. This was done in real-time by analyzing physiological data captured from a Datex AS/3 Anaesthesia Monitor. An observational study was conducted to evaluate the accuracy of the algorithm during routine surgical procedures (n = 20). An anaesthetic record was made by an anaesthetist using the Datex AS/3 record keeper, while a second anaesthetic record was produced in parallel using MacAnaesthetist. A copy of the Datex AS/3 record was kept for later review by a group of anaesthetists (n = 20), who judged oxygen saturation values < 90% to be either genuine or artifact. MacAnaesthetist correctly labeled 12 out of 13 oxygen saturations < 90% (92.3% accuracy). A post-operative review of the Datex AS/3 anaesthetic records (n = 8) by twenty anaesthetists resulted in 127 correct responses out of total of 200 (63.5% accuracy). The remaining Datex AS/3 records (n = 12) were not reviewed, as they did not contain any oxygen saturations <90%. The real-time artifact detection algorithm developed in this study was more accurate than anaesthetists who post-operatively reviewed records produced by an existing computerised anaesthesia record keeping system. Algorithms have the potential to more accurately identify and annotate artifacts on computerised anaesthetic records, assisting clinicians to more correctly interpret abnormal data.
The Causes of Poverty: Thinking Critically about a Key Economic Issue
ERIC Educational Resources Information Center
Otlin, Josh
2008-01-01
Economics is a central part of civic education. Students need to know about the Constitution and the party system, but active citizenship in the twenty-first century requires much more than the standard civics courses offer. Economic issues dominate public policy debates ranging from Social Security to immigration to international security. If…
Well Played: The Origins and Future of Playfulness
ERIC Educational Resources Information Center
Gordon, Gwen
2014-01-01
In this article, the author synthesizes research from several disciplines to shed light on play's central role in healthy development. Gordon builds on research in attachment theory that correlates secure attachment in infancy with adult well-being to demonstrate how playfulness might be a lifelong outcome of secure attachment and a primary…
The Psychology of Working Theory.
Duffy, Ryan D; Blustein, David L; Diemer, Matthew A; Autin, Kelsey L
2016-03-01
In the current article, we build on research from vocational psychology, multicultural psychology, intersectionality, and the sociology of work to construct an empirically testable Psychology of Working Theory (PWT). Our central aim is to explain the work experiences of all individuals, but particularly people near or in poverty, people who face discrimination and marginalization in their lives, and people facing challenging work-based transitions for which contextual factors are often the primary drivers of the ability to secure decent work. The concept of decent work is defined and positioned as the central variable within the theory. A series of propositions is offered concerning (a) contextual predictors of securing decent work, (b) psychological and economic mediators and moderators of these relations, and (c) outcomes of securing decent work. Recommendations are suggested for researchers seeking to use the theory and practical implications are offered concerning counseling, advocacy, and public policy. (c) 2016 APA, all rights reserved).
Angelow, Aniela; Schmidt, Matthias; Weitmann, Kerstin; Schwedler, Susanne; Vogt, Hannes; Havemann, Christoph; Hoffmann, Wolfgang
2008-07-01
In our report we describe concept, strategies and implementation of a central biosample and data management (CSDM) system in the three-centre clinical study of the Transregional Collaborative Research Centre "Inflammatory Cardiomyopathy - Molecular Pathogenesis and Therapy" SFB/TR 19, Germany. Following the requirements of high system resource availability, data security, privacy protection and quality assurance, a web-based CSDM was developed based on Java 2 Enterprise Edition using an Oracle database. An efficient and reliable sample documentation system using bar code labelling, a partitioning storage algorithm and an online documentation software was implemented. An online electronic case report form is used to acquire patient-related data. Strict rules for access to the online applications and secure connections are used to account for privacy protection and data security. Challenges for the implementation of the CSDM resided at project, technical and organisational level as well as at staff level.
Report Central: quality reporting tool in an electronic health record.
Jung, Eunice; Li, Qi; Mangalampalli, Anil; Greim, Julie; Eskin, Michael S; Housman, Dan; Isikoff, Jeremy; Abend, Aaron H; Middleton, Blackford; Einbinder, Jonathan S
2006-01-01
Quality reporting tools, integrated with ambulatory electronic health records, can help clinicians and administrators understand performance, manage populations, and improve quality. Report Central is a secure web report delivery tool built on Crystal Reports XItrade mark and ASP.NET technologies. Pilot evaluation of Report Central indicates that clinicians prefer a quality reporting tool that is integrated with our home-grown EHR to support clinical workflow.
The role of laboratory in ensuring appropriate test requests.
Ferraro, Simona; Panteghini, Mauro
2017-07-01
This review highlights the role of laboratory professionals and the strategies to be promoted in strict cooperation with clinicians for auditing, monitoring and improving the appropriateness of test request. The introduction of local pathways and care maps in agreement with international and national guidelines as well as the implementation of reflex testing and algorithms have a central role in guiding test request and in correcting the overuse/misuse of tests. Furthermore, removing obsolete tests from laboratory menu and vetting of restricted tests is recommended to increase cost-effectiveness. This saves costs and permits to introduce new biomarkers with increased diagnostic accuracy with a better impact on patient outcome. An additional issue is concerning the periodicity of (re)testing, accounting that only a minority of tests may be ordered as often as necessary. In the majority of cases, a minimum retesting interval should be introduced. The availability of effective computerised order entry systems is relevant in ensuring appropriate test requests and in providing an aid by automated rules that may stop inappropriate requests before they reach the laboratory. Copyright © 2017 The Canadian Society of Clinical Chemists. Published by Elsevier Inc. All rights reserved.
[Exploring the dark continent: medical image and brain].
Garcia-Molina, A; Ensenat, A
2017-04-01
Until the late 19th century, direct observation of the central nervous system was practically impossible. The discovery of X-rays in 1895 and their subsequent application in the field of medicine brought about a shift of paradigm that completely revolutionised the way in which neurology was practised. The possibility of viewing the inside of the brain had a pronounced impact on clinical practice, and enriched the diagnosis and treatment of brain pathologies in a manner that was unimaginable up until then. The aim of this study is to describe the birth and development of medical imaging of the brain, from the discovery of X-rays and the early days of radiography to the appearance of computerised tomography and magnetic resonance in the 60s, both of which are techniques that were to change the world of diagnostic imaging forever. This brief overview of the history of radiology also includes the origins of angiography and other techniques that are no longer in use, but which were ground-breaking innovations in their time, such as ventriculography or pneumoencephalography. The procedures and techniques described in this article made it possible to view the inside of the brain, thereby facilitating the diagnosis and treatment of a number of neurological processes.
Neuroblastoma with intracranial involvement: an ENSG Study.
Shaw, P J; Eden, T
1992-01-01
We report the experience of the European Neuroblastoma Study Group (ENSG) with central nervous system (CNS) involvement of neuroblastoma. Among this series of intensively treated patients, CNS neuroblastoma was diagnosed by computerised tomography (CT) scanning, rather than by autopsy. Cranial disease occurred in 5% of ENSG patients. Of 11 patients with intracranial disease, 4 had disease in the posterior fossa, a site rarely reported previously. Furthermore, 5 cases had CNS metastases at a time when there was no detectable disease elsewhere, rather than as part of extensive relapse. The pattern of disease we observed, at least for those with parenchymal disease, is in keeping with arterial spread. Although CT scanning is the optimal modality for identifying CNS disease, 2 cases had normal head CT scans prior to the onset of CNS disease. As most patients had symptoms of raised intracranial pressure (RICP) at the time the CNS disease was diagnosed, there does not seem to be any indication for routine CT scanning of the head at diagnosis, but this should be performed as soon as any symptoms or signs appear. With patients living longer with their disease, vigilance must be maintained during follow-up.
Computer security: a necessary element of integrated information systems.
Butzen, F; Furler, F
1986-01-01
The Matheson Report sees the medical library as playing a key role in a network of interlocking information bases that will extend from central repositories of medical information to each physician's personal records. It appears, however, that the role of security in this vision has not been fully delineated. This paper discusses problems in maintaining the security of confidential medical information, the state of the applicable law, and techniques for security (with special emphasis on the UNIX operating system). It is argued that the absence of security threatens any plan to build an information network, as there will be resistance to any system that may give intruders access to confidential data. PMID:3742113
Marine data security based on blockchain technology
NASA Astrophysics Data System (ADS)
Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang
2018-03-01
With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.
A Study of United States Air Force Medical Central Processing and Distribution Systems.
1981-06-01
5 M t2-8 13. IILL .i 2 5 I C. N SECURITY CLASSIFICATION OF THIS PAGE N,. LC, t,7EPORT DOCUMENTATION P AD-A 195 485 o Is. REPORT SECURITY...CLASSIFICATION lb. RlIKILIIV MAKKINib Unc lassif led 2a. SECURITY CLASSIFICATION AUTHORITY 3 DISTRIBUTION /AVAILABILITY OF REPORT Approved for public release...8217b, DECLASSIFICATION I DOWNGRADING SCHEDULE Distribution unlimited 4. PERFORMING ORGANIZATION REPORT NUMBER(S) 5. MONITORING ORGANIZATION REPORT NUMBER
2005-02-14
hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed , and...the national level, the National Security Act of 1947 (NSA 47) mandates the need for interagency cooperation.6 In this regard, the National Security...within DoD, it lacks a central body or mechanism to provide the overarching, truly ’global’ oversight and guidance needed to ensure adequate interagency
32 CFR 1900.01 - Authority and purpose.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Authority and purpose. 1900.01 Section 1900.01 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS... National Security Act of 1947, as amended (50 U.S.C. 403); and sec. 6 of the Central Intelligence Agency...
32 CFR 1900.01 - Authority and purpose.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Authority and purpose. 1900.01 Section 1900.01 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS... National Security Act of 1947, as amended (50 U.S.C. 403); and sec. 6 of the Central Intelligence Agency...
32 CFR 1900.01 - Authority and purpose.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Authority and purpose. 1900.01 Section 1900.01 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS... National Security Act of 1947, as amended (50 U.S.C. 403); and sec. 6 of the Central Intelligence Agency...
International Military Cooperation: From Concepts to Constructs
ERIC Educational Resources Information Center
D'Orazio, Vito
2013-01-01
International cooperation on issues of security is a central concept in many theoretical debates in international relations. This dissertation is an attempt to lay the foundation for measuring military cooperation and understanding the forces brought forth through its expansion. The central notion is that the set of policies related to military…
Buchta, M; Kiesswetter, E; Otto, A; Schaller, K H; Seeber, A; Hilla, W; Windorfer, K; Stork, J; Kuhlmann, A; Gefeller, O; Letzel, S
2003-09-01
The neurotoxicity of occupational exposure to aluminium (Al)-containing welding fumes has been discussed with controversial results. The aim of the longitudinal study was to examine a group of Al welders for significant central nervous changes in comparison with a non-exposed cohort. A group of 98 Al welders (mean age 37 years) in the car-body construction industry, with a median of 6 years of occupational exposure to Al welding fumes, and an education-matched, gender-matched, age-matched control group of 50 car-production workers (mean age 36 years) at the same plant, were included in this longitudinal study. Two cross-sectional studies were done in 1999 and 2001. In the second cross-sectional study 97 welders and 50 controls could be examined. The examination programme consisted, for example, of a standardised anamnesis, focussing on occupational history, education, illnesses, medication, accidents and current alcohol consumption, a physical examination that included neurological status, and the assessment of Al concentration in plasma and urine. The neurobehavioral methods included a symptom questionnaire, modified Q16, and computerised and non-computerised tests: psychomotor performance (steadiness, line tracing, aiming, tapping), verbal intelligence (WST), simple reaction time, digit span, block design (HAWIE), symbol-digit substitution, digit span, switching attention (European neurobehavioral evaluation system, EURO-NES), and standard progressive matrices. The data were analysed by multivariate analysis of covariance (MANCOVA) for repeated measurements with covariates age, education, and carbohydrate-deficient transferrin in plasma (CDT). RESULTS. The median Al urine concentration (mean preshift/postshift) was 52.4 microg/g creatinine (2001) and 57.6 microg/g creatinine (1999). Median respirable air dust was 0.67 mg/m(3) (2001) and 0.47 mg/m(3) (1999). Welders and controls did not report significantly more symptoms in the modified Q16. Furthermore, no significant differences in psychomotor performance and other neurobehavioral tasks, except for reaction time, were seen between welders and non-welders. Regression analyses reveal a significant relationship between reaction time and Al excretion in urine that was confounded by other factors. At present the outcome for reaction time has to be interpreted as a single result. However, as the modified Q16 questionnaire and the rest of the psychomotor performance showed no significant changes, the next cross-sectional study, in 2003, will provide further information on which a final conclusion can be based.
So, Mirai; Yamaguchi, Sosei; Hashimoto, Sora; Sado, Mitsuhiro; Furukawa, Toshi A; McCrone, Paul
2013-04-15
Depression is a major cause of disability worldwide, and computerised cognitive behavioural therapy (CCBT) is expected to be a more augmentative and efficient treatment. According to previous meta-analyses of CCBT, there is a need for a meta-analytic revaluation of the short-term effectiveness of this therapy and for an evaluation of its long-term effects, functional improvement and dropout. Five databases were used (MEDLINE, PsycINFO, EMBASE, CENTRAL and CiNii). We included all RCTs with proper concealment and blinding of outcome assessment for the clinical effectiveness of CCBT in adults (aged 18 and over) with depression. Using Cohen's method, the standard mean difference (SMD) for the overall pooled effects across the included studies was estimated with a random effect model. The main outcome measure and the relative risk of dropout were included in the meta-analysis. Fourteen trials met the inclusion criteria, and sixteen comparisons from these were used for the largest meta-analysis ever. All research used appropriate random sequence generation and Intention-to-Treat analyses (ITT), and employed self-reported measures as the primary outcome. For the sixteen comparisons (2807 participants) comparing CCBT and control conditions, the pooled SMD was -0.48 [95% IC -0.63 to -0.33], suggesting similar effect to the past reviews. Also, there was no significant clinical effect at long follow-up and no improvement of function found. Furthermore, a significantly higher drop-out rate was found for CCBT than for controls. When including studies without BDI as a rating scale and with only modern imputation as sensitivity analysis, the pooled SMD remained significant despite the reduction from a moderate to a small effect. Significant publication bias was found in a funnel plot and on two tests (Begg's p = 0.09; Egger's p = 0.01). Using a trim and fill analysis, the SMD was -0.32 [95% CI -0.49 to -0.16]. Despite a short-term reduction in depression at post-treatment, the effect at long follow-up and the function improvement were not significant, with significantly high drop-out. Considering the risk of bias, our meta-analysis implied that the clinical usefulness of current CCBT for adult depression may need to be re-considered downwards in terms of practical implementation and methodological validity.
ERIC Educational Resources Information Center
Liu, Chia-Ju; Zandvliet, David B.; Hou, I.-Ling
2012-01-01
This study investigated perceptions of senior high school students towards the Taiwanese information technology (IT) classroom with the What Is Happening in this Class? (WIHIC) survey and explored the physical learning environment of the IT classroom using the Computerised Classroom Environment Inventory (CCEI). The participants included 2,869…
ERIC Educational Resources Information Center
Moothedath, Shana; Chaporkar, Prasanna; Belur, Madhu N.
2016-01-01
In recent years, the computerised adaptive test (CAT) has gained popularity over conventional exams in evaluating student capabilities with desired accuracy. However, the key limitation of CAT is that it requires a large pool of pre-calibrated questions. In the absence of such a pre-calibrated question bank, offline exams with uncalibrated…
ERIC Educational Resources Information Center
Read, Sue; Nte, Sol; Corcoran, Patsy; Stephens, Richard
2013-01-01
Background: Loss is a universal experience and death is perceived as the ultimate loss. The overarching aim of this research is to produce a qualitative, flexible, interactive, computerised tool to support the facilitation of emotional expressions around loss for people with intellectual disabilities. This paper explores the process of using…
Peer Assessment: Judging the Quality of Students' Work by Comments Rather than Marks
ERIC Educational Resources Information Center
Davies, Phil
2006-01-01
This paper reports the results of a study into the quality of peer feedback provided by students within a computerised peer-assessment environment. The study looks at the creation of a "feedback index" that represents the quality of an essay based upon the feedback provided during a peer-marking process and identifies a significant…
ERIC Educational Resources Information Center
Gürses, Nedim; Demiray, Emine
2009-01-01
In like manner as conventional education and teaching approaches distance education tends to model the same procedures. Indeed, formerly enriched on printed material served as a primary source. However, thanks to the developments in technology and evolution in education, computerised information has made inroads in distance education programmes.…
Experiencing Virtual Patients in Clinical Learning: A Phenomenological Study
ERIC Educational Resources Information Center
Edelbring, Samuel; Dastmalchi, Maryam; Hult, Hakan; Lundberg, Ingrid E.; Dahlgren, Lars Owe
2011-01-01
Computerised virtual patients (VPs) are increasingly being used in medical education. With more use of this technology, there is a need to increase the knowledge of students' experiences with VPs. The aim of the study was to elicit the nature of virtual patients in a clinical setting, taking the students' experience as a point of departure.…
ERIC Educational Resources Information Center
Lin, Yu-Shih; Chang, Yi-Chun; Liew, Keng-Hou; Chu, Chih-Ping
2016-01-01
Computerised testing and diagnostics are critical challenges within an e-learning environment, where the learners can assess their learning performance through tests. However, a test result based on only a single score is insufficient information to provide a full picture of learning performance. In addition, because test results implicitly…
ERIC Educational Resources Information Center
International Federation of Library Associations, The Hague (Netherlands).
The eight papers in this collection focus on library activities in various geographical regions, e.g., Asia, Oceania, Africa, Latin America, the Caribbean, and Western Australia: (1) "Future Approaches and Prospects of Computerised Information Network among the Countries of South Asian Association for Regional Cooperation (SAARC)" (Abdullah…
ERIC Educational Resources Information Center
Holt, Samantha; Yuill, Nicola
2014-01-01
Children with autism are said to lack other-awareness, which restricts their opportunities for peer collaboration. We assessed other-awareness in non-verbal children with autism and typically-developing preschoolers collaborating on a shared computerised picture-sorting task. The studies compared a novel interface, designed to support…
ERIC Educational Resources Information Center
Momoh, Mustapha
2010-01-01
This study examined the impediments to effective use of Information and Communication Technology (ICT) tools in Nigerian universities. Series of research conducted on the factors militating against computerisation indicated that, there were impediments to effective utilisation of ICT tools in most developing countries. In the light of this, the…
ERIC Educational Resources Information Center
Gurses, Nedim; Demiray, Emine
2009-01-01
In like manner as conventional education and teaching approaches distance education tends to model the same procedures. Indeed, formerly enriched on printed material served as a primary source. However, thanks to the developments in technology and evolution in education, computerised information has made inroads in distance education programmes.…
ERIC Educational Resources Information Center
Richards, Derek; Timulak, Ladislav
2013-01-01
Participants with symptoms of depression received either eight sessions of therapist-delivered email cognitive behaviour therapy (eCBT; n = 37), or eight sessions of computerised CBT self-administered treatment (cCBT; n = 43). At post-treatment participants completed a questionnaire to determine what they found satisfying about their online…
Report Central: Quality Reporting Tool in an Electronic Health Record
Jung, Eunice; Li, Qi; Mangalampalli, Anil; Greim, Julie; Eskin, Michael S.; Housman, Dan; Isikoff, Jeremy; Abend, Aaron H.; Middleton, Blackford; Einbinder, Jonathan S.
2006-01-01
Quality reporting tools, integrated with ambulatory electronic health records, can help clinicians and administrators understand performance, manage populations, and improve quality. Report Central is a secure web report delivery tool built on Crystal Reports XI™ and ASP.NET technologies. Pilot evaluation of Report Central indicates that clinicians prefer a quality reporting tool that is integrated with our home-grown EHR to support clinical workflow. PMID:17238590
Code of Federal Regulations, 2011 CFR
2011-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... request. (1) A written request for NSA/CSS records, that reasonably describes the records sought, made by... implicitly invokes 5 U.S.C. 552, as amended, 5 U.S.C. 552a, as amended, DoD 5400.7-R, or NSA/CSS Freedom of...
Code of Federal Regulations, 2012 CFR
2012-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... request. (1) A written request for NSA/CSS records, that reasonably describes the records sought, made by... implicitly invokes 5 U.S.C. 552, as amended, 5 U.S.C. 552a, as amended, DoD 5400.7-R, or NSA/CSS Freedom of...
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... request. (1) A written request for NSA/CSS records, that reasonably describes the records sought, made by... implicitly invokes 5 U.S.C. 552, as amended, 5 U.S.C. 552a, as amended, DoD 5400.7-R, or NSA/CSS Freedom of...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Physical security controls for non-practitioners... 1301.72 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF... a central protection company or a local or State police agency which has a legal duty to respond, or...
ERIC Educational Resources Information Center
Rosenbaum, Sara, Ed.; Simon, Patti, Ed.
2016-01-01
Speech and language are central to the human experience; they are the vital means by which people convey and receive knowledge, thoughts, feelings, and other internal experiences. Acquisition of communication skills begins early in childhood and is foundational to the ability to gain access to culturally transmitted knowledge, organize and share…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61593; File No. SR-DTC-2009-17] Self-Regulatory Organizations; The Depository Trust Company; Order Approving Proposed Rule Change To Allow The Depository Trust Company To Provide Settlement Services to European Central Counterparty Limited for U.S. Securities Traded on European Trading Venues...
Medvedev’s Plan: Giving Russia a Voice But Not a Veto in a New European Security System
2009-12-01
Iran “will thank the United States for its thoughtlessness and continue their nuc- lear programs.”51 There is no evidence that China or Russia would...regional king -pins, with a weak central government and without any national military-security forces. Russian military forces will be permanently
Maximum Security. The Culture of Violence in Inner-City Schools.
ERIC Educational Resources Information Center
Devine, John
In an ethnographic reflection on 10 years experience working in the high schools of inner-city New York, issues of school safety, discipline, and violence are explored. The central proposition is that the mentality that relies on paramilitary security measures and technological devices, such as metal detectors, to achieve safe schools is only an…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-10
... subsection (a) to add records containing the results from TSA's intelligence-driven risk- based analysis of... information. 49 CFR Sec. 1560. \\1\\ 77 FR 69491 (Nov. 19, 2012). Under sec. 4012(a)(1)-(2) of the Intelligence... the Central Intelligence Agency, the Secretary of the Treasury, and the Secretary of Defense. The...
Implementing the global health security agenda: lessons from global health and security programs.
Paranjape, Suman M; Franz, David R
2015-01-01
The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.
21 CFR 1301.76 - Other security controls for practitioners.
Code of Federal Regulations, 2014 CFR
2014-04-01
... nonpractitioners in § 1301.74 (a), (b), and (e). (d) Central fill pharmacies must comply with § 1301.74(e) when selecting private, common or contract carriers to transport filled prescriptions to a retail pharmacy for delivery to the ultimate user. When central fill pharmacies contract with private, common or contract...
21 CFR 1301.76 - Other security controls for practitioners.
Code of Federal Regulations, 2013 CFR
2013-04-01
... nonpractitioners in § 1301.74 (a), (b), and (e). (d) Central fill pharmacies must comply with § 1301.74(e) when selecting private, common or contract carriers to transport filled prescriptions to a retail pharmacy for delivery to the ultimate user. When central fill pharmacies contract with private, common or contract...
21 CFR 1301.76 - Other security controls for practitioners.
Code of Federal Regulations, 2012 CFR
2012-04-01
... nonpractitioners in § 1301.74 (a), (b), and (e). (d) Central fill pharmacies must comply with § 1301.74(e) when selecting private, common or contract carriers to transport filled prescriptions to a retail pharmacy for delivery to the ultimate user. When central fill pharmacies contract with private, common or contract...
Piece by Piece: The Story of the Central Bands Commissioning Project
ERIC Educational Resources Information Center
Sindberg, Laura K.
2005-01-01
The Central Bands Commissioning Project was a multidimensional endeavor. One dimension included organizational details, such as selecting a composer, negotiating a contract, and securing funds. A second dimension was made up of teaching and learning activities related to the commission, such as meeting local composers, writing letters to composers…
76 FR 1593 - Notice of Central Idaho Resource Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-11
...Pursuant to the authorities in the Federal Advisory Committee Act (Pub. L. 92-463) and under the Secure Rural Schools and Community Self-Determination Act of 2000 (Pub. L. 110-343), the Salmon-Challis National Forest's Central Idaho Resource Advisory Committee will conduct a business meeting which is open to the public.
17 CFR 256.01-4 - Construction or service contracts, and centralized procurement accounting.
Code of Federal Regulations, 2010 CFR
2010-04-01
... expenses directly attributable to construction work shall be excluded from the accounting system of the... companies. Cost of goods procured shall be excluded from the accounting system of the service company and... contracts, and centralized procurement accounting. 256.01-4 Section 256.01-4 Commodity and Securities...
2009-07-01
crises that more than likely are considered to threaten Uzbek vital interests in Central Asia. According to CSTO Secretary General Nikolai Bordyuzha, the...Central Asia. To Russian leaders, the planned deployment of theater missile defense interceptors to Poland and a radar system in the Czech Republic
Survey of methods for secure connection to the internet
NASA Astrophysics Data System (ADS)
Matsui, Shouichi
1994-04-01
This paper describes a study of a security method of protecting inside network computers against outside miscreants and unwelcome visitors and a control method when these computers are connected with the Internet. In the present Internet, a method to encipher all data cannot be used, so that it is necessary to utilize PEM (Privacy Enhanced Mail) capable of the encipherment and conversion of secret information. For preventing miscreant access by eavesdropping password, one-time password is effective. The most cost-effective method is a firewall system. This system lies between the outside and inside network. By limiting computers that directly communicate with the Internet, control is centralized and inside network security is protected. If the security of firewall systems is strictly controlled under correct setting, security within the network can be secured even in open networks such as the Internet.
Ullman, Amanda J; Kleidon, Tricia; Gibson, Victoria; McBride, Craig A; Mihala, Gabor; Cooke, Marie; Rickard, Claire M
2017-08-30
Central venous access device (CVAD) associated complications are a preventable source of patient harm, frequently resulting in morbidity and delays to vital treatment. Dressing and securement products are used to prevent infectious and mechanical complications, however current complication rates suggest customary practices are inadequate. The aim of this study was to evaluate the feasibility of launching a full-scale randomized controlled efficacy trial of innovative dressing and securement products for pediatric tunneled CVAD to prevent complication and failure. An external, pilot, four-group randomized controlled trial of standard care (bordered polyurethane dressing and suture), in comparison to integrated securement-dressing, suture-less securement device, and tissue adhesive was undertaken across two large, tertiary referral pediatric hospitals in Australia. Forty-eight pediatric participants with newly inserted tunneled CVADs were consecutively recruited. The primary outcome of study feasibility was established by elements of eligibility, recruitment, attrition, protocol adherence, missing data, parent and healthcare staff satisfaction and acceptability, and effect size estimates for CVAD failure (cessation of function prior to completion of treatment) and complication (associated bloodstream infection, thrombosis, breakage, dislodgement or occlusion). Dressing integrity, product costs and site complications were also examined. Protocol feasibility was established. CVAD failure was: 17% (2/12) integrated securement-dressing; 8% (1/13) suture-less securement device; 0% tissue adhesive (0/12); and, 0% standard care (0/11). CVAD complications were: 15% (2/13) suture-less securement device (CVAD associated bloodstream infection, and occlusion and partial dislodgement); 8% (1/12) integrated securement-dressing (partial dislodgement); 0% tissue adhesive (0/12); and, 0% standard care (0/11). One CVAD-associated bloodstream infection occurred, within the suture-less securement device group. Overall satisfaction was highest in the integrated securement-dressing (mean 8.5/10; standard deviation 1.2). Improved dressing integrity was evident in the intervention arms, with the integrated securement-dressing associated with prolonged time to first dressing change (mean days 3.5). Improving the security and dressing integrity of tunneled CVADs is likely to improve outcomes for pediatric patients. Further research is necessary to identify novel, effective CVAD securement to reduce complications, and provide reliable vascular access for children. ACTRN12614000280606 ; prospectively registered on 17/03/2014.
Lessons from Central and Southeast Europe for the Expanding Alliances
2008-06-01
more than a token material and personnel contribution to alliances? Examining three geographically close but historically distinct cases, Austria...security regimes such as the United Nations, North Atlantic Treaty Organization and the European Union . Second, the three nations’ historical and...Collective Security, Collective Defense, Civil-Military Relations, North Atlantic Treaty Organization (NATO), European Union (EU) Common Foreign and
THERMAL COUPLE FOR MEASURING TEMPERATURE IN A REACTOR
Kanne, W.
1959-11-24
A thermocouple device for measuring the temperature of a flowing fluid in a conduit within which is positioned a metallic rod is presented. A thermocouple junction is secured to the rod centrally, and thermal insulating support disks having a diameter greater than the rod are secured to the end portions of the rod and adapted to fit transversely in the conduit.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-11
... Act Provisions and Regulations in Connection With a Request From ICE Trust U.S. LLC Related to Central... securities. The temporary exemptions were requested by ICE Trust U.S. LLC. Treasury is also soliciting public... exemptions to permit ICE Trust U.S. LLC (ICE Trust) to clear and settle transactions in credit default swaps...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-05
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61249; File No. SR-DTC-2009-17] Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing of Proposed Rule Change To Allow The Depository Trust Company To Provide Settlement Services to European Central Counterparty Limited for U.S. Securities Traded on European Trading Venue...
2011-10-01
Fortunately, some products offer centralized management and deployment tools for local desktop implementation . Figure 5 illustrates the... implementation of a secure desktop infrastructure based on virtualization. It includes an overview of desktop virtualization, including an in-depth...environment in the data centre, whereas LHVD places it on the endpoint itself. Desktop virtualization implementation considerations and potential
ERIC Educational Resources Information Center
Smith, David J.
2007-01-01
A central mission of the United States Institute of Peace (USIP) is the promotion of international conflict resolution education by assisting and supporting colleges and universities in their efforts at developing and offering programs, courses, and activities that focus on international peace, conflict, and security. Over the years, a number of…
Computer User's Guide to the Protection of Information Resources. NIST Special Publication 500-171.
ERIC Educational Resources Information Center
Helsing, Cheryl; And Others
Computers have changed the way information resources are handled. Large amounts of information are stored in one central place and can be accessed from remote locations. Users have a personal responsibility for the security of the system and the data stored in it. This document outlines the user's responsibilities and provides security and control…
2015-02-01
Centralization . . . . . . . . . . . . . . . . . . . . . . 43 “Anonymity”: A Bitcoin Case Study...been a case of x National Security Implications of Virtual Currency such a non-state actor deployment; in this report, we aim to high- light...development of VCs may advance, including a gen- eral increased sophistication in cryptographic applications. More gen- erally, we make the case that the main
Using Swarming Agents for Scalable Security in Large Network Environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crouse, Michael; White, Jacob L.; Fulp, Errin W.
2011-09-23
The difficulty of securing computer infrastructures increases as they grow in size and complexity. Network-based security solutions such as IDS and firewalls cannot scale because of exponentially increasing computational costs inherent in detecting the rapidly growing number of threat signatures. Hostbased solutions like virus scanners and IDS suffer similar issues, and these are compounded when enterprises try to monitor these in a centralized manner. Swarm-based autonomous agent systems like digital ants and artificial immune systems can provide a scalable security solution for large network environments. The digital ants approach offers a biologically inspired design where each ant in the virtualmore » colony can detect atoms of evidence that may help identify a possible threat. By assembling the atomic evidences from different ant types the colony may detect the threat. This decentralized approach can require, on average, fewer computational resources than traditional centralized solutions; however there are limits to its scalability. This paper describes how dividing a large infrastructure into smaller managed enclaves allows the digital ant framework to effectively operate in larger environments. Experimental results will show that using smaller enclaves allows for more consistent distribution of agents and results in faster response times.« less
ERIC Educational Resources Information Center
Kamerilova, Galina S.; Kartavykh, Marina A.; Ageeva, Elena L.; Veryaskina, Marina A.; Ruban, Elena M.
2016-01-01
The authors consider the question of computerisation in health, safety and environment teachers' training in the context of the general approaches and requirements of the Federal National Standard of Higher Education, which is realised through designing of electronic informational and educational environment. The researchers argue indispensability…
Do Computers Improve the Drawing of a Geometrical Figure for 10 Year-Old Children?
ERIC Educational Resources Information Center
Martin, Perrine; Velay, Jean-Luc
2012-01-01
Nowadays, computer aided design (CAD) is widely used by designers. Would children learn to draw more easily and more efficiently if they were taught with computerised tools? To answer this question, we made an experiment designed to compare two methods for children to do the same drawing: the classical "pen and paper" method and a CAD…
Shaping the Global Civil Society: An Interview with Michael Peters
ERIC Educational Resources Information Center
Heraud, Richard; Tesar, Marek
2017-01-01
Professor Michael A. Peters has worked in an era of transformation that has taken him from a labour-intensive paper-based form of production to the computerised reproduction of thought, and the current shift in the publishing landscape from a reader-subscription to an author-pays model. Most of what he has learned in publishing and editing he has…
ERIC Educational Resources Information Center
Marriott, Pru; Tan, Siew Min; Marriott, Neil
2015-01-01
Finance is a popular programme of study in UK higher education despite it being a challenging subject that requires students to understand and apply complex and abstract mathematical models and academic theories. Educational simulation is an active learning method found to be useful in enhancing students' learning experience, but there has been…
ERIC Educational Resources Information Center
Koychev, Ivan; El-Deredy, Wael; Haenschel, Corinna; Deakin, John Francis William
2010-01-01
We aimed to clarify the importance of early visual processing deficits for the formation of cognitive deficits in the schizophrenia spectrum. We carried out an event-related potential (ERP) study using a computerised delayed matching to sample working memory (WM) task on a sample of volunteers with high and low scores on the Schizotypal…
[Design of computerised database for clinical and basic management of uveal melanoma].
Bande Rodríguez, M F; Santiago Varela, M; Blanco Teijeiro, M J; Mera Yañez, P; Pardo Perez, M; Capeans Tome, C; Piñeiro Ces, A
2012-09-01
The uveal melanoma is the most common primary intraocular tumour in adults. The objective of this work is to show how a computerised database has been formed with specific applications, for clinical and research use, to an extensive group of patients diagnosed with uveal melanoma. For the design of the database a selection of categories, attributes and values was created based on the classifications and parameters given by various authors of articles which have had great relevance in the field of uveal melanoma in recent years. The database has over 250 patient entries with specific information on their clinical history, diagnosis, treatment and progress. It enables us to search any parameter of the entry and make quick and simple statistical studies of them. The database models have been transformed into a basic tool for clinical practice, as they are an efficient way of storing, compiling and selective searching of information. When creating a database it is very important to define a common strategy and the use of a standard language. Copyright © 2011 Sociedad Española de Oftalmología. Published by Elsevier Espana. All rights reserved.
Jennings, Beth
2006-04-01
With the increasing corporate and governmental rationalisation of medical care, the mandate of efficiency has caused many to fear that concern for the individual patient will be replaced with impersonal, rule-governed allocation of medical resources. Largely ignored is the role of moral principles in medical decision-making. This analysis comes from an ethnographic study conducted from 1999-2001 in three US Intensive Care Units, two of which were using the computerised decision-support tool, APACHE III (Acute Physiological and Chronic Health Evaluation III), which notably predicts the probability that a patient will die. It was found that the use of APACHE presents a paradox regarding concern for the individual patient. To maintain jurisdiction over the care of patients, physicians share the data with the payers and regulators of care to prove they are using resources effectively and efficiently, yet they use the system in conjunction with moral principles to justify treating each patient as unique. Thus, concern for the individual patient is not lessened with the use of this system. However, physicians do not share the data with patients or surrogate decision-makers because they fear they will be viewed as more interested in profits than patients.
Palmer, Rebecca; Enderby, Pam
2016-10-01
The speech-language pathology profession has explored a number of approaches to support efficient delivery of interventions for people with stroke-induced aphasia. This study aimed to explore the role of volunteers in supporting self-managed practice of computerised language exercises. A qualitative interview study of the volunteer support role was carried out alongside a pilot randomised controlled trial of computer aphasia therapy. Patients with aphasia practised computer exercises tailored for them by a speech-language pathologist at home regularly for 5 months. Eight of the volunteers who supported the intervention took part in semi-structured interviews. Interviews were audio recorded, transcribed verbatim and analysed thematically. Emergent themes included: training and support requirements; perception of the volunteer role; challenges facing the volunteer, in general and specifically related to supporting computer therapy exercises. The authors concluded that volunteers helped to motivate patients to practise their computer therapy exercises and also provided support to the carers. Training and ongoing structured support of therapy activity and conduct is required from a trained speech-language pathologist to ensure the successful involvement of volunteers supporting impairment-based computer exercises in patients' own homes.
DASS, NARINDER; McMURRAY, GORDON; BRADING, ALISON F.
1999-01-01
Elastic fibres, which are intimately associated with collagen, a major component of the urethra, have been assumed to contribute to the resting urethral closure pressure. The Miller stain for elastin was used to demonstrate elastic fibres in cryostat sections of guinea pig bladder base, vesicourethral junction (VUJ) and urethra. Computerised image analysis was employed to objectively quantify these fibres. Both male and female guinea pigs showed significantly greater amounts of circularly disposed elastic fibres in the VUJ than in the other 2 regions examined. This particular disposition of fibres may be responsible for imparting resiliency and plasticity to the VUJ, allowing it to distend and recoil repeatedly in response to urine outflow. Furthermore, the elastic fibres may be partly responsible for the passive occlusive force in this region. Elastic fibres in the distal urethra were not quantified because of their relative paucity. Sagittal sections of the urethra revealed a mass of longitudinally arranged elastic fibres localised almost exclusively within the mucosa, submucosa and longitudinal smooth muscle layer. Functionally, this arrangement may exist to facilitate urethral length changes that occur in micturition. PMID:10580860
Van der Molen, M J; Van Luit, J E H; Van der Molen, M W; Klugkist, I; Jongmans, M J
2010-05-01
The goal of this study is to evaluate the effectiveness of a computerised working memory (WM) training on memory, response inhibition, fluid intelligence, scholastic abilities and the recall of stories in adolescents with mild to borderline intellectual disabilities attending special education. A total of 95 adolescents with mild to borderline intellectual disabilities were randomly assigned to either a training adaptive to each child's progress in WM, a non-adaptive WM training, or to a control group. Verbal short-term memory (STM) improved significantly from pre- to post-testing in the group who received the adaptive training compared with the control group. The beneficial effect on verbal STM was maintained at follow-up and other effects became clear at that time as well. Both the adaptive and non-adaptive WM training led to higher scores at follow-up than at post-intervention on visual STM, arithmetic and story recall compared with the control condition. In addition, the non-adaptive training group showed a significant increase in visuo-spatial WM capacity. The current study provides the first demonstration that WM can be effectively trained in adolescents with mild to borderline intellectual disabilities.
Yuen, V M; Li, B L; Cheuk, D K; Leung, M K M; Hui, T W C; Wong, I C; Lam, W W; Choi, S W; Irwin, M G
2017-10-01
Chloral hydrate is commonly used to sedate children for painless procedures. Children may recover more quickly after sedation with dexmedetomidine, which has a shorter half-life. We randomly allocated 196 children to chloral hydrate syrup 50 mg.kg -1 and intranasal saline spray, or placebo syrup and intranasal dexmedetomidine spray 3 μg.kg -1 , 30 min before computerised tomography studies. More children resisted or cried after drinking chloral hydrate syrup than placebo syrup, 72 of 107 (67%) vs. 42 of 87 (48%), p = 0.009, but there was no difference after intranasal saline vs. dexmedetomidine, 49 of 107 (46%) vs. 40 of 87 (46%), p = 0.98. Sedation was satisfactory in 81 of 107 (76%) children after chloral hydrate and 64 of 87 (74%) children after dexmedetomidine, p = 0.74. Of the 173 children followed up for at least 4 h after discharge, 38 of 97 (39%) had recovered normal function after chloral hydrate and 32 of 76 (42%) after dexmedetomidine, p = 0.76. Six children vomited after chloral hydrate syrup and placebo spray vs. none after placebo syrup and dexmedetomidine spray, p = 0.03. © 2017 The Association of Anaesthetists of Great Britain and Ireland.
Cruickshank, A
2001-01-01
After subarachnoid haemorrhage (SAH), cerebral angiography is usually performed to establish a site of bleeding, which may then be treated surgically to prevent a potentially catastrophic re-bleed. The investigation of choice in the diagnosis of SAH is computerised tomography (CT). However, because CT can miss some patients with SAH, cerebrospinal fluid (CSF) spectrophotometry should be performed in those patients with negative or equivocal CT scans or those who have presented several days after the suspected bleed. Spectrophotometry should aim to detect the presence of both oxyhaemoglobin and bilirubin because either one or both of these pigments may contribute to xanthochromia following SAH. CSF supernatant is scanned using a double beam spectrophotometer at wavelengths between 350 nm and 650 nm. Oxyhaemoglobin alone produces an absorption peak at 413–415 nm, bilirubin alone produces a broad peak at 450–460 nm, and bilirubin together with oxyhaemoglobin produce a shoulder at 450–460 nm on the downslope of the oxyhaemoglobin peak. To minimise the frequency of false positive and false negative results, a protocol has been developed, which is described. Key Words: subarachnoid haemorrhage • computerised tomography • cerebrospinal fluid • spectrophotometry • oxyhaemoglobin • bilirubin • xanthochromia PMID:11684714
Secure data aggregation in heterogeneous and disparate networks using stand off server architecture
NASA Astrophysics Data System (ADS)
Vimalathithan, S.; Sudarsan, S. D.; Seker, R.; Lenin, R. B.; Ramaswamy, S.
2009-04-01
The emerging global reach of technology presents myriad challenges and intricacies as Information Technology teams aim to provide anywhere, anytime and anyone access, for service providers and customers alike. The world is fraught with stifling inequalities, both from an economic as well as socio-political perspective. The net result has been large capability gaps between various organizational locations that need to work together, which has raised new challenges for information security teams. Similar issues arise, when mergers and acquisitions among and between organizations take place. While integrating remote business locations with mainstream operations, one or more of the issues including the lack of application level support, computational capabilities, communication limitations, and legal requirements cause a serious impediment thereby complicating integration while not violating the organizations' security requirements. Often resorted techniques like IPSec, tunneling, secure socket layer, etc. may not be always techno-economically feasible. This paper addresses such security issues by introducing an intermediate server between corporate central server and remote sites, called stand-off-server. We present techniques such as break-before-make connection, break connection after transfer, multiple virtual machine instances with different operating systems using the concept of a stand-off-server. Our experiments show that the proposed solution provides sufficient isolation for the central server/site from attacks arising out of weak communication and/or computing links and is simple to implement.
Honduras’ National Security Strategy To Combat Terrorism
2006-12-01
ENVIRONMENT Culture in “ancient” America was based in two major locations. In Mexico and Central America were the Aztecs and the Mayas, and in Peru were the...Colombia), the drugs transit via the West Indies, Central America and Mexico (fig. 2), which are the trafficking centers of the international mafia...by migrants.42 Some of the factors that contribute to the increase of gang activities in Central America, Mexico , and the U.S. are: income
Forest statistics for West-Central Tennessee counties
Renewable Resource Evaluation Research Work Unit
1982-01-01
These tables were derived from data obtained during a 1980 inventory of 11 counties comprising the West Central Unit of Tennessee (fig. 1). The data on forest acreage and timber volume were secured by systematic sampling method involving a forest-non-forest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...
Forest statistics for North-Central Alabama counties
Forest Inventory and Analysis Research Work Unit
1983-01-01
These tables were derived from data obtained during a 1982 inventory of 15 counties comprising the North Central Unit of Alabama (fig. 1). The data on forest acreage and timber volume were secured by systematic sampling method involving a forest-nonforest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...
Forest statistics for Central Tennessee counties
Renewable Resources Evaluation Research Work Unit
1981-01-01
These tables were derived from data obtained during a 1980 inventory of 23 counties comprising the Central Unit of Tennessee (fig. 1). The data on forest acreage and timber volume were secured by a systematic sampling method involving a forest-non-forest classification on aerial photographs and on-the-ground measurements of trees at sample locations. The sample...
VIEW LOOKING SOUTHEAST AT BUILDING 121. THE BUILDING HOUSES OFFICES, ...
VIEW LOOKING SOUTHEAST AT BUILDING 121. THE BUILDING HOUSES OFFICES, THE ROCKY FLATS PLANT CENTRAL ALARM STATION, ALARM CONSOLES, THE ARMORY, THE LOCK AND KEY SECTION, A COMPUTER ROOM, A UTILITY ROOM, AND LOCKER ROOMS WITH SHOWERS. (1/98) - Rocky Flats Plant, Security & Armory, West of Third Street, south of Central Avenue, Golden, Jefferson County, CO
20 CFR 404.1588 - Your responsibility to tell us of events that may change your disability status.
Code of Federal Regulations, 2013 CFR
2013-04-01
... may change your disability status. 404.1588 Section 404.1588 Employees' Benefits SOCIAL SECURITY... issue a receipt to you or your representative at least until a centralized computer file that records... centralized computer file is in place, we will continue to issue receipts to you or your representative if you...
20 CFR 404.1588 - Your responsibility to tell us of events that may change your disability status.
Code of Federal Regulations, 2012 CFR
2012-04-01
... may change your disability status. 404.1588 Section 404.1588 Employees' Benefits SOCIAL SECURITY... issue a receipt to you or your representative at least until a centralized computer file that records... centralized computer file is in place, we will continue to issue receipts to you or your representative if you...
20 CFR 404.1588 - Your responsibility to tell us of events that may change your disability status.
Code of Federal Regulations, 2011 CFR
2011-04-01
... may change your disability status. 404.1588 Section 404.1588 Employees' Benefits SOCIAL SECURITY... issue a receipt to you or your representative at least until a centralized computer file that records... centralized computer file is in place, we will continue to issue receipts to you or your representative if you...
20 CFR 404.1588 - Your responsibility to tell us of events that may change your disability status.
Code of Federal Regulations, 2014 CFR
2014-04-01
... may change your disability status. 404.1588 Section 404.1588 Employees' Benefits SOCIAL SECURITY... issue a receipt to you or your representative at least until a centralized computer file that records... centralized computer file is in place, we will continue to issue receipts to you or your representative if you...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Central and field organization, established places at which, the officers from whom, and the methods whereby the public may secure information, make... functions are channeled and determined. 5.2 Section 5.2 Foreign Relations DEPARTMENT OF STATE GENERAL...
Cultural Awareness in Nuclear Security Programs: A Critical Link
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nasser, Al-Sharif Nasser bin; Auda, Jasmine; Bachner, Katherine
Nuclear security programs that offer training and capacity building opportunities to practitioners working in nuclear facilities play a central role in strengthening the global nuclear security architecture. There is often a significant divide, however, between both the development of these programs and their implementation, and between the programs’ intended and actual outcomes. This article argues that this disconnect can often be attributed to an absence of cultural awareness and an inability for internationally-designed programs to effectively resonate with local audiences. Furthermore, the importance of the role of cultural awareness in implementing nuclear security programs will be assessed, and its applicationsmore » in the Jordanian context will be presented.« less
Cultural Awareness in Nuclear Security Programs: A Critical Link
Nasser, Al-Sharif Nasser bin; Auda, Jasmine; Bachner, Katherine
2016-11-20
Nuclear security programs that offer training and capacity building opportunities to practitioners working in nuclear facilities play a central role in strengthening the global nuclear security architecture. There is often a significant divide, however, between both the development of these programs and their implementation, and between the programs’ intended and actual outcomes. This article argues that this disconnect can often be attributed to an absence of cultural awareness and an inability for internationally-designed programs to effectively resonate with local audiences. Furthermore, the importance of the role of cultural awareness in implementing nuclear security programs will be assessed, and its applicationsmore » in the Jordanian context will be presented.« less
Survey on Security Issues in File Management in Cloud Computing Environment
NASA Astrophysics Data System (ADS)
Gupta, Udit
2015-06-01
Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks. The privacy of users data is maintained by data centers around the world and hence it has become feasible to operate on that data from lightweight portable devices. But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another. File management is central to cloud computing and it is paramount to address the security concerns which arise out of it. This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.
Shared Awareness in Times of Crisis: A Framework for Collaboration
2011-06-01
also affords a “ dashboard ” perspective allowing for centralization of resources. The U.S. Army’s Knowledge Online portal is one example of a single...labor, energy, materials, information, cash and technology into outputs of higher value • Organization’s values (criteria that managers and...follows: Challenges - Disabilities Inter-Organizational Cross-Organizational Privacy and Security high security (portal) blocks information flow Trust
ERIC Educational Resources Information Center
McGonigle-Chalmers, Maggie; Alderson-Day, Ben; Fleming, Joanna; Monsen, Karl
2013-01-01
Nine low-functioning children with profound expressive language impairment and autism were studied in terms of their responsiveness to a computer-based learning program designed to assess syntactic awareness. The children learned to touch words on a screen in the correct sequence in order to see a corresponding animation, such as "monkey…
ERIC Educational Resources Information Center
Galor, Sharon; Hentschel, Uwe
2009-01-01
The primary objective of this study was to identify the vulnerability factors for suicide attempts in an Israeli sample, with the help of the Gottschalk-Gleser content analysis scales. The respondents were divided into four groups: suicide attempters; controls; post-traumatic stress disorder and depressed patients who did not report suicidal…
ERIC Educational Resources Information Center
Mascia, Maria Lidia; Agus, Mirian; Fastame, Maria Chiara; Penna, Maria Pietronilla; Sale, Eliana; Pessa, Eliano
2015-01-01
The development of numerical abilities was examined in three groups of 5 year-olds: one including 13 children accomplishing a numerical training in pencil-and-paper format (EG1); another group including 21 children accomplished a homologous training in computerized format; the remaining 24 children were assigned to the control group (CG). The…
Decision tools in health care: focus on the problem, not the solution.
Liu, Joseph; Wyatt, Jeremy C; Altman, Douglas G
2006-01-20
Systematic reviews or randomised-controlled trials usually help to establish the effectiveness of drugs and other health technologies, but are rarely sufficient by themselves to ensure actual clinical use of the technology. The process from innovation to routine clinical use is complex. Numerous computerised decision support systems (DSS) have been developed, but many fail to be taken up into actual use. Some developers construct technologically advanced systems with little relevance to the real world. Others did not determine whether a clinical need exists. With NHS investing 5 billion pounds sterling in computer systems, also occurring in other countries, there is an urgent need to shift from a technology-driven approach to one that identifies and employs the most cost-effective method to manage knowledge, regardless of the technology. The generic term, 'decision tool' (DT), is therefore suggested to demonstrate that these aids, which seem different technically, are conceptually the same from a clinical viewpoint. Many computerised DSSs failed for various reasons, for example, they were not based on best available knowledge; there was insufficient emphasis on their need for high quality clinical data; their development was technology-led; or evaluation methods were misapplied. We argue that DSSs and other computer-based, paper-based and even mechanical decision aids are members of a wider family of decision tools. A DT is an active knowledge resource that uses patient data to generate case specific advice, which supports decision making about individual patients by health professionals, the patients themselves or others concerned about them. The identification of DTs as a consistent and important category of health technology should encourage the sharing of lessons between DT developers and users and reduce the frequency of decision tool projects focusing only on technology. The focus of evaluation should become more clinical, with the impact of computer-based DTs being evaluated against other computer, paper- or mechanical tools, to identify the most cost effective tool for each clinical problem. We suggested the generic term 'decision tool' to demonstrate that decision-making aids, such as computerised DSSs, paper algorithms, and reminders are conceptually the same, so the methods to evaluate them should be the same.
Palmer, Rebecca; Cooper, Cindy; Enderby, Pam; Brady, Marian; Julious, Steven; Bowen, Audrey; Latimer, Nicholas
2015-01-27
Aphasia affects the ability to speak, comprehend spoken language, read and write. One third of stroke survivors experience aphasia. Evidence suggests that aphasia can continue to improve after the first few months with intensive speech and language therapy, which is frequently beyond what resources allow. The development of computer software for language practice provides an opportunity for self-managed therapy. This pragmatic randomised controlled trial will investigate the clinical and cost effectiveness of a computerised approach to long-term aphasia therapy post stroke. A total of 285 adults with aphasia at least four months post stroke will be randomly allocated to either usual care, computerised intervention in addition to usual care or attention and activity control in addition to usual care. Those in the intervention group will receive six months of self-managed word finding practice on their home computer with monthly face-to-face support from a volunteer/assistant. Those in the attention control group will receive puzzle activities, supplemented by monthly telephone calls. Study delivery will be coordinated by 20 speech and language therapy departments across the United Kingdom. Outcome measures will be made at baseline, six, nine and 12 months after randomisation by blinded speech and language therapist assessors. Primary outcomes are the change in number of words (of personal relevance) named correctly at six months and improvement in functional conversation. Primary outcomes will be analysed using a Hochberg testing procedure. Significance will be declared if differences in both word retrieval and functional conversation at six months are significant at the 5% level, or if either comparison is significant at 2.5%. A cost utility analysis will be undertaken from the NHS and personal social service perspective. Differences between costs and quality-adjusted life years in the three groups will be described and the incremental cost effectiveness ratio will be calculated. Treatment fidelity will be monitored. This is the first fully powered trial of the clinical and cost effectiveness of computerised aphasia therapy. Specific challenges in designing the protocol are considered. Registered with Current Controlled Trials ISRCTN68798818 on 18 February 2014.
Wahlgren, Carl-Fredrik; Edelbring, Samuel; Fors, Uno; Hindbeck, Hans; Ståhle, Mona
2006-01-01
Background Most of the many computer resources used in clinical teaching of dermatology and venereology for medical undergraduates are information-oriented and focus mostly on finding a "correct" multiple-choice alternative or free-text answer. We wanted to create an interactive computer program, which facilitates not only factual recall but also clinical reasoning. Methods Through continuous interaction with students, a new computerised interactive case simulation system, NUDOV, was developed. It is based on authentic cases and contains images of real patients, actors and healthcare providers. The student selects a patient and proposes questions for medical history, examines the skin, and suggests investigations, diagnosis, differential diagnoses and further management. Feedback is given by comparing the user's own suggestions with those of a specialist. In addition, a log file of the student's actions is recorded. The program includes a large number of images, video clips and Internet links. It was evaluated with a student questionnaire and by randomising medical students to conventional teaching (n = 85) or conventional teaching plus NUDOV (n = 31) and comparing the results of the two groups in a final written examination. Results The questionnaire showed that 90% of the NUDOV students stated that the program facilitated their learning to a large/very large extent, and 71% reported that extensive working with authentic computerised cases made it easier to understand and learn about diseases and their management. The layout, user-friendliness and feedback concept were judged as good/very good by 87%, 97%, and 100%, respectively. Log files revealed that the students, in general, worked with each case for 60–90 min. However, the intervention group did not score significantly better than the control group in the written examination. Conclusion We created a computerised case simulation program allowing students to manage patients in a non-linear format supporting the clinical reasoning process. The student gets feedback through comparison with a specialist, eliminating the need for external scoring or correction. The model also permits discussion of case processing, since all transactions are stored in a log file. The program was highly appreciated by the students, but did not significantly improve their performance in the written final examination. PMID:16907972
Breeze, Johno; Allanson-Bailey, L S; Hepper, A E; Midwinter, M J
2015-03-01
Modern body armour clearly reduces injury incidence and severity, but evidence to actually objectively demonstrate this effect is scarce. Although the Joint Theatre Trauma Registry (JTTR) alone cannot relate injury pattern to body armour coverage, the addition of computerised Surface Wound Mapping (SWM) may enable this utility. Surface wound locations of all UK and NATO coalition soldiers, Afghan National Army and Police and local nationals injured by explosively propelled fragments and treated in the Role 3 UK-led Field Hospital in Camp Bastion, Afghanistan, between 8 July and 20 October 2012 were prospectively recorded. The Abbreviated Injury Scores (AIS) and relative risk of casualties sustaining injuries under a type of body armour were compared with those that did not wear that armour. Casualties wearing a combat helmet were 2.7 times less likely to sustain a fragmentation wound to the head than those that were unprotected (mean AIS of 2.9 compared with 4.1). Casualties wearing a body armour vest were 4.1 times less likely to sustain a fragmentation wound to the chest or abdomen than those that were unprotected (mean AIS of 2.9 compared with 3.9). Casualties wearing pelvic protection were 10 times less likely to sustain a fragmentation wound to the pelvis compared with those that were unprotected (mean AIS of 3.4 compared with 3.9). Computerised SWM has objectively demonstrated the ability of body armour worn on current operations in Afghanistan to reduce wound incidence and severity. We recognise this technique is limited in that it only records the surface wound location and may be specific to this conflict. However, gathering electronic SWM at the same time as recording injuries for the JTTR was simple, required little extra time and therefore we would recommend its collection during future conflicts. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
WestREN: a description of an Irish academic general practice research network
2010-01-01
Background Primary care research networks have been established internationally since the 1960s to enable diverse practitioners to engage in and develop research and education and implement research evidence. The newly established Western Research and Education Network (WestREN) is one such network consisting of a collaboration between the Discipline of General Practice at NUI Galway and 71 West of Ireland general practices. In September 2009 all member practices were issued with a questionnaire with two objectives: to describe the structure and characteristics of the member practices and to compare the results to the national profile of Irish general practice. Methods A postal survey was used followed by one written and one email reminder. Results A response rate of 73% (52/71) was achieved after two reminders. Half of practices were in a rural location, one quarter located in an urban setting and another quarter in a mixed location. Ninety-four per cent of general practitioners practice from purpose-built or adapted premises with under 6% of practices being attached to the general practitioner's residence. Over 96% of general practitioners use appointment systems with 58% using appointment only. All practices surveyed were computerised, with 80% describing their practices as 'fully computerised'. Almost 60% of general practitioners are coding chronic diagnoses with 20% coding individual consultations. Twenty-five per cent of general practitioners were single-handed with the majority of practices having at least two general practitioners, and a mean number of general practitioners of 2.4. Ninety-two per cent of practices employed a practice nurse with 30% employing more than one nurse. Compared to the national profile, WestREN practices appear somewhat larger, and more likely to be purpose-built and in rural areas. National trends apparent between 1982 and 1992, such as increasing computerisation and practice nurse availability, appear to be continuing. Conclusions WestREN is a new university-affiliated general practice research network in Ireland. Survey of its initial membership confirms WestREN practices to be broadly representative of the national profile and has provided us with valuable information on the current and changing structure of Irish general practice. PMID:20925958
Updating energy security and environmental policy: Energy security theories revisited.
Proskuryakova, L
2018-06-18
The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.
Rickard, Claire M; Marsh, Nicole M; Webster, Joan; Gavin, Nicole C; Chan, Raymond J; McCarthy, Alexandra L; Mollee, Peter; Ullman, Amanda J; Kleidon, Tricia; Chopra, Vineet; Zhang, Li; McGrail, Matthew R; Larsen, Emily; Choudhury, Md Abu; Keogh, Samantha; Alexandrou, Evan; McMillan, David J; Mervin, Merehau Cindy; Paterson, David L; Cooke, Marie; Ray-Barruel, Gillian; Castillo, Maria Isabel; Hallahan, Andrew; Corley, Amanda; Geoffrey Playford, E
2017-06-15
Around 30% of peripherally inserted central catheters (PICCs) fail from vascular, infectious or mechanical complications. Patients with cancer are at highest risk, and this increases morbidity, mortality and costs. Effective PICC dressing and securement may prevent PICC failure; however, no large randomised controlled trial (RCT) has compared alternative approaches. We designed this RCT to assess the clinical and cost-effectiveness of dressing and securements to prevent PICC failure. Pragmatic, multicentre, 2×2 factorial, superiority RCT of (1) dressings (chlorhexidine gluconate disc (CHG) vs no disc) and (2) securements (integrated securement dressing (ISD) vs securement device (SED)). A qualitative evaluation using a knowledge translation framework is included. Recruitment of 1240 patients will occur over 3 years with allocation concealment until randomisation by a centralised service. For the dressing hypothesis, we hypothesise CHG discs will reduce catheter-associated bloodstream infection (CABSI) compared with no CHG disc. For the securement hypothesis, we hypothesise that ISD will reduce composite PICC failure (infection (CABSI/local infection), occlusion, dislodgement or thrombosis), compared with SED. types of PICC failure; safety; costs; dressing/securement failure; dwell time; microbial colonisation; reversible PICC complications and consumer acceptability. Relative incidence rates of CABSI and PICC failure/100 devices and/1000 PICC days (with 95% CIs) will summarise treatment impact. Kaplan-Meier survival curves (and log rank Mantel-Haenszel test) will compare outcomes over time. Secondary end points will be compared between groups using parametric/non-parametric techniques; p values <0.05 will be considered to be statistically significant. Ethical approval from Queensland Health (HREC/15/QRCH/241) and Griffith University (Ref. No. 2016/063). Results will be published. Trial registration number is: ACTRN12616000315415. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Roads, Power, and Schools: A Brighter Future for Bishkek and the Region
2010-12-13
support developing democracy are by no means unique to Kyrgyzstan or Central Asia . The language in the latest National Security Strategy (NSS) guides U.S...Corporation (MCC), American Uni- versity Central Asia (AUCA), and the National Democratic Institute (NDI) are prime examples of American foreign policy at...Central Asia , this small country is just as important strategi- cally as it was when the Silk Road that passes through it was one of the world’s main trade
Macrolides for diffuse panbronchiolitis.
Yang, Ming; Dong, Bi Rong; Lu, Jing; Lin, Xiufang; Wu, Hong Mei
2010-12-08
Diffuse panbronchiolitis (DPB) is a chronic airways disease predominantly affecting East Asians. Macrolides, a class of antibiotics, have been used as the main treatment for DPB, based on evidence from retrospective and non-randomised studies. To assess the efficacy and safety of macrolides for DPB. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (The Cochrane Library 2010, issue 1), which contains the Cochrane Acute Respiratory Infections Group's Specialised Register, MEDLINE (1966 to April 2010), EMBASE (1974 to April 2010), Chinese Biomedical Literature Database (CBM) (1978 to April 2010), China National Knowledge Infrastructure (CNKI) (1974 to April 2010), KoreaMed (1997 to April 2010) and Database of Japana Centra Revuo Medicina (1983 to April 2010). Randomised controlled trials (RCTs) or quasi-RCTs assessing the effect of macrolides for DPB. Two review authors independently assessed study quality and subsequent risk of bias according to the Cochrane Collaboration's tool for assessing risk of bias. The primary outcomes were five-year survival rate, lung function and clinical response. We used risk ratios (RR) for individual trial results in the data analysis and measured all outcomes with 95% confidence intervals (CI). Only one RCT (19 participants) with significant methodological limitations was included in this review. It found that the computerised tomography images of all participants treated with a long-term, low-dose macrolide (erythromycin) improved from baseline, while the images of 71.4% of participants in the control group (with no treatment) worsened and 28.6% remained unchanged. Adverse effects were not reported. There is little evidence for macrolides in the treatment of DPB. We are therefore unable to make any new recommendations. It may be reasonable to use low-dose macrolides soon after diagnosis is made and to continue this treatment for at least six months, according to current guidelines.
Get Flat, or Get Flattened: Adapting to the Forces of Globalization
2015-02-25
down leadership interest in preparing the joint force for the emerging security environment. The CCJO defines the operational problem as determining...proportional to the square of the number of users in the 8 An idea, behavior, style , or usage that...centralized, totalizing, and autocratic . To increase efficiency and maximize revenue to pay for the war governments centralized their administrations
Littoral Combat Ship Manpower, an Overview of Officer Characteristics and Placement
2013-03-01
15. NUMBER OF PAGES 103 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE...maritime force: 1.) Networks should be the central organizing principle of the fleet, and its sensing and fighting power should be distributed across...assured access” force; and 4.) Numbers of hulls count (quantity had its own quality) and consequently the fleet’s combat power should be
Semiconductor Technology and U.S. National Security
2010-04-21
control regime as hindrances to compete in the global market.45 Interestingly, DOD’s Defense Technology Security Administration ( DTSA ) reviews export...licenses and only advises DOS or DOC.46 DTSA has neither compliance nor enforcement authority. There is no lead organization or a centralized...which lists several semiconductor technologies, is out of date and not used, even by DOD’s DTSA .51 In order to remove certain export controls on
Overview of Climate Confluence Security Issues
NASA Astrophysics Data System (ADS)
Reisman, J. P.
2011-12-01
Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.
ERIC Educational Resources Information Center
Lee, Hyunjoo
2016-01-01
This study examined how performance feedback type (progress vs. distance) affects Korean college students' self-regulation and task achievement according to relative goal importance in the pursuit of multiple goals. For this study, 146 students participated in a computerised task. The results showed the interaction effects of goal importance and…
A feasibility study of a new computerised cognitive remediation for young adults with schizophrenia
Cellard, Caroline; Reeder, Clare; Paradis-Giroux, Andrée-Anne; Roy, Marc-André; Gilbert, Elsa; Ivers, Hans; Bouchard, Roch-Hugo; Maziade, Michel; Wykes, Til
2016-01-01
Cognitive remediation therapy is effective for improving cognition, symptoms and social functioning in individuals with schizophrenia; however, the impact on visual episodic memory remains unclear. The objectives of this feasibility study were: (1) to explore whether or not CIRCuiTS—a new computerised cognitive remediation therapy programme developed in England—improves visual episodic memory and other cognitive domains in young adults with early course schizophrenia; and (2) to evaluate acceptability of the CIRCuiTS programme in French-Canadians. Three participants with visual episodic memory impairments at baseline were recruited from clinical settings in Canada, and consented to participate. Neuropsychological, clinical and social functioning was evaluated at baseline and post-treatment. Intervention involved 40 sessions of cognitive remediation. First, the reliable change index (RCI) revealed that each participant demonstrated significant post-therapy change in episodic memory and in other cognitive domains. The response profile was characterised by the use of organisational strategies. Second, the treatment was considered acceptable to participants in terms of session frequency (number of sessions per week), intensity (hours per week; total hours), and number of missed sessions and total completed sessions. This preliminary study yielded encouraging data demonstrating the feasibility of the CIRCuiTS programme in French-Canadian young adults with schizophrenia. PMID:25753694
NASA Astrophysics Data System (ADS)
Agus, M.; Mascia, M. L.; Fastame, M. C.; Melis, V.; Pilloni, M. C.; Penna, M. P.
2015-02-01
A body of literature shows the significant role of visual-spatial skills played in the improvement of mathematical skills in the primary school. The main goal of the current study was to investigate the impact of a combined visuo-spatial and mathematical training on the improvement of mathematical skills in 146 second graders of several schools located in Italy. Participants were presented single pencil-and-paper visuo-spatial or mathematical trainings, computerised version of the above mentioned treatments, as well as a combined version of computer-assisted and pencil-and-paper visuo-spatial and mathematical trainings, respectively. Experimental groups were presented with training for 3 months, once a week. All children were treated collectively both in computer-assisted or pencil-and-paper modalities. At pre and post-test all our participants were presented with a battery of objective tests assessing numerical and visuo-spatial abilities. Our results suggest the positive effect of different types of training for the empowerment of visuo-spatial and numerical abilities. Specifically, the combination of computerised and pencil-and-paper versions of visuo-spatial and mathematical trainings are more effective than the single execution of the software or of the pencil-and-paper treatment.
Johnston, D G; Hall, K; Kendall-Taylor, P; Patrick, D; Watson, M; Cook, D B
1984-07-28
The clinical, radiological, and biochemical effects of dopamine agonist withdrawal after long-term treatment were investigated in seven women and eight men who had been treated for prolactinomas for 1.5 to 7 (mean 3.7) years. Before treatment, serum prolactin concentrations were 1473 to 115 000 mU/l, all patients had abnormal radiological findings, and six had suprasellar extensions of pituitary tumours. Treatment with either bromocriptine or pergolide relieved symptoms and suppressed prolactin secretion in most patients. The size of the residual tumour was defined by doing fourth generation computerised tomographic scans immediately before termination of therapy, and evidence of tumour re-expansion was sought on scans repeated 5-39 weeks later. After discontinuation of treatment, symptoms recurred in 13 of 15 patients and hyper-prolactinaemia redeveloped in 14. Other pituitary function tests remained unchanged or improved. In 13 of 15 patients tumour or gland size did not change after withdrawal of treatment. One man had a marginal increase in tumour size, while in another the pituitary tumour shrank. Thus, although cessation of long-term dopamine agonist therapy leads to recurrence of symptoms and hyperprolactinaemia, rapid tumour regrowth is uncommon and of small extent, and other pituitary function is not altered in the short term.
Predictive value of ventilatory inflection points determined under field conditions.
Heyde, Christian; Mahler, Hubert; Roecker, Kai; Gollhofer, Albert
2016-01-01
The aim of this study was to evaluate the predictive potential provided by two ventilatory inflection points (VIP1 and VIP2) examined in field without using gas analysis systems and uncomfortable facemasks. A calibrated respiratory inductance plethysmograph (RIP) and a computerised routine were utilised, respectively, to derive ventilation and to detect VIP1 and VIP2 during a standardised field ramp test on a 400 m running track on 81 participants. In addition, average running speed of a competitive 1000 m run (S1k) was observed as criterion. The predictive value of running speed at VIP1 (SVIP1) and the speed range between VIP1 and VIP2 in relation to VIP2 (VIPSPAN) was analysed via regression analysis. VIPSPAN rather than running speed at VIP2 (SVIP2) was operationalised as a predictor to consider the covariance between SVIP1 and SVIP2. SVIP1 and VIPSPAN, respectively, provided 58.9% and 22.9% of explained variance in regard to S1k. Considering covariance, the timing of two ventilatory inflection points provides predictive value in regard to a competitive 1000 m run. This is the first study to apply computerised detection of ventilatory inflection points in a field setting independent on measurements of the respiratory gas exchange and without using any facemasks.
Fernandez-Granero, Miguel Angel; Sanchez-Morillo, Daniel; Leon-Jimenez, Antonio
2015-10-23
Chronic obstructive pulmonary disease (COPD) is one of the commonest causes of death in the world and poses a substantial burden on healthcare systems and patients' quality of life. The largest component of the related healthcare costs is attributable to admissions due to acute exacerbation (AECOPD). The evidence that might support the effectiveness of the telemonitoring interventions in COPD is limited partially due to the lack of useful predictors for the early detection of AECOPD. Electronic stethoscopes and computerised analyses of respiratory sounds (CARS) techniques provide an opportunity for substantial improvement in the management of respiratory diseases. This exploratory study aimed to evaluate the feasibility of using: (a) a respiratory sensor embedded in a self-tailored housing for ageing users; (b) a telehealth framework; (c) CARS and (d) machine learning techniques for the remote early detection of the AECOPD. In a 6-month pilot study, 16 patients with COPD were equipped with a home base-station and a sensor to daily record their respiratory sounds. Principal component analysis (PCA) and a support vector machine (SVM) classifier was designed to predict AECOPD. 75.8% exacerbations were early detected with an average of 5 ± 1.9 days in advance at medical attention. The proposed method could provide support to patients, physicians and healthcare systems.
Nabe-Nielsen, Kirsten; Garde, Anne Helene; Aust, Birgit; Diderichsen, Finn
2012-01-01
This quasi-experimental study investigated how an intervention aiming at increasing eldercare workers' influence on their working hours affected the flexibility, variability, regularity and predictability of the working hours. We used baseline (n = 296) and follow-up (n = 274) questionnaire data and interviews with intervention-group participants (n = 32). The work units in the intervention group designed their own intervention comprising either implementation of computerised self-scheduling (subgroup A), collection of information about the employees' work-time preferences by questionnaires (subgroup B), or discussion of working hours (subgroup C). Only computerised self-scheduling changed the working hours and the way they were planned. These changes implied more flexible but less regular working hours and an experience of less predictability and less continuity in the care of clients and in the co-operation with colleagues. In subgroup B and C, the participants ended up discussing the potential consequences of more work-time influence without actually implementing any changes. Employee work-time influence may buffer the adverse effects of shift work. However, our intervention study suggested that while increasing the individual flexibility, increasing work-time influence may also result in decreased regularity of the working hours and less continuity in the care of clients and co-operation with colleagues.
77 FR 52372 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-29
... stolen securities. Reporting to the central database also allows reporting institutions to gain access to... proper performance of the functions of the agency, including whether the information shall have practical...
Creating Defense Excellence: Defense Addendum to Road Map for National Security
2001-05-15
occasionally distrust political appointees—many of whom can be young , inexperienced academics—as “interlopers” who can severely damage well-established...centralization, lost managerial competence, and the loss of Service esprit de corps. The centralized approach may instill greater efficiency toward a...This is necessary because the evolution of joint warfighting and defense economics has shifted many past roles and responsibilities to joint and
2002-05-31
Central America such as Fuerzas Aliadas Humanitarian and more pointedly, through the expansion of the Caribbean Nations Security Conference (CANSEC...Costa Rica, El Salvador, Guatemala, Honduras, Mexico, and Nicaragua attended as observers. At the conference Major General Soligan, the SOUTHCOM J5, put...United States, Britain, and Canada are deporting undocumented aliens and legal aliens that have been convicted of criminal offences. Between 1993 and
2014 Year End Report: Center for Development of Security Excellence
2014-01-01
the increased availability of products available through Open eLearning and the first of its kind Facility Security Officer (FSO) Toolkit available...Toolkits 15 New Shorts 16 New Courses at CDSE 18 CDSE Webinars 18 CDSE Open eLearning Courses 19 International Engagements 19 CDSE Virtual Instructor...training, and certification future to over 1,000 registered civilian and military personnel from around the globe. Rather than travelling to a central
The Rule of Law Effort in Afghanistan: A Success Story in the Making
2016-06-10
14415/ justice -deferred-rule-of-law-in- central-america (accessed February 14, 2016). American Bar Association, Division for Public Education . “Part I...accountability for police and other security forces. Using El Salvador as a prognostic outlook on rule of law development and justice sector reform...security and complete justice sector reforms. Afghanistan is making progress after the fall of the Taliban in 2001 with a democratic republic, laws
Rep. Hayworth, Nan A. S. [R-NY-19
2011-12-07
Senate - 08/29/2012 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
ERIC Educational Resources Information Center
Al-Anani, Hanan Abd Al-Hameed
2015-01-01
The purpose of this study was to identify the degree of parental abuse and psychological security of the child, as well as the degree differences of these variables, based on the gender, the age and place of residency. The aim of this study also was to detect the relationship between parental abuse and the psychological security of the child. The…
2008-01-01
a U.S. inter-agency delegation to the inaugural meeting of the U.S.-Central American Integration System, or SICA, Dialogue on Security held in ...WTO] including making China a member in 2001. We also have strongly promoted the Asia-Pacific Economic Cooperation forum [ APEC ] and fashioned high...President Bush endorsed a Free Trade Area of the Asia-Pacific [FTA AP] during his visit to the APEC leaders meeting
NASA Astrophysics Data System (ADS)
Williams, Christopher
2000-07-01
The nature of international education as a field of studies has been affected by global changes over the past decade. At the same time, the concept of global security has emerged, bringing together studies related to development, the environment and the understanding of violence. Although much of the education literature reflects the global security approach, it is not a field that has been subjected to much analysis as a whole. This paper provides an assessment of international education as a discipline, and outlines the global security framework. It examines how this framework is reflected in the forms of analysis used by international educationists. Finally it suggests how the central purpose of global security, namely ensuring human survival, could be adopted within international education to provide a clear sense of direction. This has specific implications for such areas as curriculum, assessment, educational provision and planning.
NASA Astrophysics Data System (ADS)
Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.
2005-04-01
Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.
A security framework for nationwide health information exchange based on telehealth strategy.
Zaidan, B B; Haiqi, Ahmed; Zaidan, A A; Abdulnabi, Mohamed; Kiah, M L Mat; Muzamel, Hussaen
2015-05-01
This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.
Practical secure quantum communications
NASA Astrophysics Data System (ADS)
Diamanti, Eleni
2015-05-01
We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.
Ivanov, Vladimir I; Yu, Paul L; Baras, John S
2010-09-01
Medical information is extremely sensitive in nature - a compromise, such as eavesdropping or tampering by a malicious third party, may result in identity theft, incorrect diagnosis and treatment, and even death. Therefore, it is important to secure the transfer of medical information from the patient to the recording system. We consider a portable, wireless device transferring medical information to a remote server. We decompose this problem into two sub-problems and propose security solutions to each of them: (1) to secure the link between the patient and the portable device, and (2) to secure the link between the portable device and the network. Thus we push the limits of the network security to the edge by authenticating the user using their biometric information; authenticating the device to the network at the physical layer; and strengthening the security of the wireless link with a key exchange mechanism. The proposed authentication methods can be used for recording the readings of medical data in a central database and for accessing medical records in various settings.
Security in the CernVM File System and the Frontier Distributed Database Caching System
NASA Astrophysics Data System (ADS)
Dykstra, D.; Blomer, J.
2014-06-01
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.
Symmetric Key Services Markup Language (SKSML)
NASA Astrophysics Data System (ADS)
Noor, Arshad
Symmetric Key Services Markup Language (SKSML) is the eXtensible Markup Language (XML) being standardized by the OASIS Enterprise Key Management Infrastructure Technical Committee for requesting and receiving symmetric encryption cryptographic keys within a Symmetric Key Management System (SKMS). This protocol is designed to be used between clients and servers within an Enterprise Key Management Infrastructure (EKMI) to secure data, independent of the application and platform. Building on many security standards such as XML Signature, XML Encryption, Web Services Security and PKI, SKSML provides standards-based capability to allow any application to use symmetric encryption keys, while maintaining centralized control. This article describes the SKSML protocol and its capabilities.
Security in MANETs using reputation-adjusted routing
NASA Astrophysics Data System (ADS)
Ondi, Attila; Hoffman, Katherine; Perez, Carlos; Ford, Richard; Carvalho, Marco; Allen, William
2009-04-01
Mobile Ad-Hoc Networks enable communication in various dynamic environments, including military combat operations. Their open and shared communication medium enables new forms of attack that are not applicable for traditional wired networks. Traditional security mechanisms and defense techniques are not prepared to cope with the new attacks and the lack of central authorities make identity verifications difficult. This work extends our previous work in the Biologically Inspired Tactical Security Infrastructure to provide a reputation-based weighing mechanism for linkstate routing protocols to protect the network from attackers that are corrupting legitimate network traffic. Our results indicate that the approach is successful in routing network traffic around compromised computers.
Introduction: Cybersecurity and Software Assurance Minitrack
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burns, Luanne; George, Richard; Linger, Richard C
Modern society is dependent on software systems of remarkable scope and complexity. Yet methods for assuring their security and functionality have not kept pace. The result is persistent compromises and failures despite best efforts. Cybersecurity methods must work together for situational awareness, attack prevention and detection, threat attribution, minimization of consequences, and attack recovery. Because defective software cannot be secure, assurance technologies must play a central role in cybersecurity approaches. There is increasing recognition of the need for rigorous methods for cybersecurity and software assurance. The goal of this minitrack is to develop science foundations, technologies, and practices that canmore » improve the security and dependability of complex systems.« less
ERIC Educational Resources Information Center
Palmer, D. G.
This publication presents an organized collection of biology questions, designed for use in evaluation at the secondary level in Tasmania. Each item has been tried for quality and is accompanied by its difficulty percentage as well as by its content area and the mental processes required to answer it. The content areas include: Diversity,…
2011-05-01
Homeland Security (DHS) and the Department of State (DOS), and by changing the IC’s CPRC representative from the Director of Central Intelli- gence to the...Security Strategy of the United States of America (May 2010), p. 4. 2 Nuclear Posture Review Report (April 6, 2010), p. i 3 National Strategy for...ongoing efforts with GICNT, the Nuclear Forensics International Technical Working Group (ITWG), Forensics En - gagement Working Group (FEWG), NATO
2014-09-01
power. The wireless infrastructure is an expansion of the current DOD IE which can be leveraged to connect mobile capabilities and technologies. The...DOD must focus on three critical areas central to mobility : the wireless infrastructure , the devices themselves, and the applications the devices use... infrastructure to support mobile devices. – The intent behind this goal is to improve the existing wireless backbone to support secure voice, data, and video
2009-01-01
command system.2 The United States Southern Command, responsible for Department of Defense planning, coordination, and operations in Central America ...South America and i waters, formed its Joint Interagency Task Force South to enable it to conduct coordinated illicit trafficking operations. ts y...Collin Powell and Secretary of Defense Donald Rumsfeld, the National Security Council has at times been a place for policy to come to die under the
Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M Barry; Lee, Brian; Stinn, John; Worthen, Katherine
2010-01-01
Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance.
Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Oehmen, Christopher S.
This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF canmore » be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.« less
State Approaches Toward Reducing Youth Violence in Honduras and Nicaragua
2015-09-01
delinquency issues, through the implantation of domestic policies, security reforms, and social programs. This thesis will make use of statistical 13...Flow of U.S Deportations to Central America, DHS .......... 21 Table 3. Statistics of Central American National Police Forces, 2013. ........ 56 Table...Nacional de Estadística (National Statistics Institute) MIGOB Ministerio de Gobernación (Ministry of Interior) MS-13 Mara Salvatrucha NGO non
European Economic and Monetary Union: Why Should We Care?
1992-04-15
economic, if not political unification, that calls for a single market, a central european bank and a single currency. Why, in one short decade, did the EC...directives to eliminate fiscal and technical barriers to trade, services, banking , insurance, transportation, and securities transactions. The Single...implications. A logical outgrowth of this is the establishment of a single european currency and a central bank to issue this currency. These are 12
The Limits of Friendship: US Security Cooperation in Central Asia (Walker Paper, Number 9)
2007-10-01
with Central Asian cultural , political, and economic dynamics. However, un- known to most Americans for almost a decade, the US military has been...the larger plan. Those individuals often have little knowledge or appreciation of the cultural , political, historic, and economic influences...experience suggests that the more culturally , politi‑ cally, and economically distant the country is from the United States, the more unlikely it is
32 CFR 1907.03 - Contact for general information and requests.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Agency Release Panel, Central Intelligence Agency, Washington, DC 20505. The commercial (non-secure... INTELLIGENCE AGENCY CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO § 1.9 OF...
Modeling IrisCode and its variants as convex polyhedral cones and its security implications.
Kong, Adams Wai-Kin
2013-03-01
IrisCode, developed by Daugman, in 1993, is the most influential iris recognition algorithm. A thorough understanding of IrisCode is essential, because over 100 million persons have been enrolled by this algorithm and many biometric personal identification and template protection methods have been developed based on IrisCode. This paper indicates that a template produced by IrisCode or its variants is a convex polyhedral cone in a hyperspace. Its central ray, being a rough representation of the original biometric signal, can be computed by a simple algorithm, which can often be implemented in one Matlab command line. The central ray is an expected ray and also an optimal ray of an objective function on a group of distributions. This algorithm is derived from geometric properties of a convex polyhedral cone but does not rely on any prior knowledge (e.g., iris images). The experimental results show that biometric templates, including iris and palmprint templates, produced by different recognition methods can be matched through the central rays in their convex polyhedral cones and that templates protected by a method extended from IrisCode can be broken into. These experimental results indicate that, without a thorough security analysis, convex polyhedral cone templates cannot be assumed secure. Additionally, the simplicity of the algorithm implies that even junior hackers without knowledge of advanced image processing and biometric databases can still break into protected templates and reveal relationships among templates produced by different recognition methods.
Food security for community-living elderly people in Beijing, China.
Cheng, Yang; Rosenberg, Mark; Yu, Jie; Zhang, Hua
2016-11-01
Food security has been identified as an important issue for elderly people's quality of life and ageing in place. A food security index composed of three indicators (food intake, food quality and food affordability) was developed to measure the food security status of community-living elderly people. Food security was then examined among community-living elderly in the central urban districts of Beijing, China. Data were collected by a questionnaire survey in the summer of 2013 and the response rate was 78.5%. Descriptive statistics and binary logistic regression were applied to analyse food security and the associations between food security and demographic and socioeconomic factors. The results showed that 54.2% of the surveyed elderly experienced food security. Participants with better education (OR = 1.68) and better health (OR = 1.47) were more likely to experience food security. The young-old were less likely to experience food security than the older old (OR = 0.94). Elderly people who lived with their children were less likely to experience food security than those who lived alone (OR = 0.43). The results of impact factors on food security highlight both similarities with studies from more developed countries and the unique challenges faced in a rapidly changing China with its unique social, cultural and political systems. The food security index we developed in this study is a simple and effective measure of food security status, which can be used in surveys for evaluating the food security status of elderly people in the future. © 2015 John Wiley & Sons Ltd.
Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin
2017-06-15
Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study-simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan.
32 CFR 1907.26 - Notification of decision and prohibition on adverse action.
Code of Federal Regulations, 2010 CFR
2010-07-01
... made to the Interagency Security Classification Appeals Panel (ISCAP) established pursuant to § 5.4 of... CENTRAL INTELLIGENCE AGENCY CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO Â...
32 CFR 1907.26 - Notification of decision and prohibition on adverse action.
Code of Federal Regulations, 2011 CFR
2011-07-01
... made to the Interagency Security Classification Appeals Panel (ISCAP) established pursuant to § 5.4 of... CENTRAL INTELLIGENCE AGENCY CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO Â...
2017-04-29
Continuous electronic fetal heart-rate monitoring is widely used during labour, and computerised interpretation could increase its usefulness. We aimed to establish whether the addition of decision-support software to assist in the interpretation of cardiotocographs affected the number of poor neonatal outcomes. In this unmasked randomised controlled trial, we recruited women in labour aged 16 years or older having continuous electronic fetal monitoring, with a singleton or twin pregnancy, and at 35 weeks' gestation or more at 24 maternity units in the UK and Ireland. They were randomly assigned (1:1) to decision support with the INFANT system or no decision support via a computer-generated stratified block randomisation schedule. The primary outcomes were poor neonatal outcome (intrapartum stillbirth or early neonatal death excluding lethal congenital anomalies, or neonatal encephalopathy, admission to the neonatal unit within 24 h for ≥48 h with evidence of feeding difficulties, respiratory illness, or encephalopathy with evidence of compromise at birth), and developmental assessment at age 2 years in a subset of surviving children. Analyses were done by intention to treat. This trial is completed and is registered with the ISRCTN Registry, number 98680152. Between Jan 6, 2010, and Aug 31, 2013, 47 062 women were randomly assigned (23 515 in the decision-support group and 23 547 in the no-decision-support group) and 46 042 were analysed (22 987 in the decision-support group and 23 055 in the no-decision-support group). We noted no difference in the incidence of poor neonatal outcome between the groups-172 (0·7%) babies in the decision-support group compared with 171 (0·7%) babies in the no-decision-support group (adjusted risk ratio 1·01, 95% CI 0·82-1·25). At 2 years, no significant differences were noted in terms of developmental assessment. Use of computerised interpretation of cardiotocographs in women who have continuous electronic fetal monitoring in labour does not improve clinical outcomes for mothers or babies. National Institute for Health Research. Copyright © 2017 The Author(s). Published by Elsevier Ltd. This is an Open Access article under the CC BY license. Published by Elsevier Ltd.. All rights reserved.
1983-05-01
THE ARMED FORCES AREA 6 WORK UNIT NUMBERS -. FORT LESLEY J. MC NAIR WASHINGTON, DC 20319 11. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE "Vt...yearly dollar volume and lead directly to cost- effective .- national security. Such business generates research funding that can have important military...Mbreover, there is no central focus for these policies and no foru to discuss their effect on national security and international catetiiveness. The
The New European Security Calculus: Implications for the U.S. Army
1991-01-03
Iberian and Levantine allies) is anxious that "peace" in Central Europe could work to decouple its security concerns from its northern neighbors. 10 4...altered political climate in Europe, the U.S. Army must be proactive in changing its force and command and control structures to meet both its new...relocated to the Kola Peninsula . "The main task of these planes is to attack targets from the rear, and their range makes it possible for them to reach
2015-06-01
Katherine Herbig, Espionage by the Numbers: A Statistical Overview, accessed April 14, 2015, http://www.wright.edu/rsp/Security/Treason/Numbers.htm 5...submitted for top-secret clearances with “derogatory financial information.”43 The debt amount reviewed was $500 in delinquency for at least 120 days, which...Investigative Service’s (DIS) “ delinquent debt criteria with amount of delinquent debt” and Defense Central Index of Investigation’s (DCII) final
Illegal Immigration: Causes, Consequences, and National Security Implications
2010-03-01
have already occurred: “In the wake of 9/11, Mara Salvatrucha [a criminal gang that originated in Los Angeles and has spread to Central America ...for the farmer in Bangladesh or the herder in Africa or the family being battered by hurricanes in Central America . Without that accord, there won’t...immigrants. For example, Malaria, Dengue , Tuberculosis, and other dangerous infections which were eradicated by the 1950s in Undocumented immigrants, who
1986-09-01
United States aid to the rebels (16:9). The United States policy toward Central America originated with the Monroe Doctrine. As explained in Chapter...crisis in the area. The most often used were Mexico and Central America Report, Latinamerica Press, Mesoamerica , and Hemisphere Hotline. Especially...Information Exchange (DLSIE) and the Defense Technical Information Center (DTIC) to determine what studies were available. In addition, the historical
1986-09-01
Latin America, including such powers as Mexico, Brazil , and Venezuala (17:4-6). 4. Foreign Military Sales (FMS) and Foreign Military Construction Sales...coastline where it is characterized by swamps and mangrove thickets. Like its counterpart in Nicaragua, the Honduran Mosquitia and adjoining portion of the... Brazil , Columbia, Argentina, and Chile. Other Central American countries have never been strong enough to exert any real influence, although
Computerised Axial Tomography (CAT)
1990-06-01
commercial market. EMI, which had originally counted on being the only firm selling CT units , subsequently increased its production in order to overtake...to a rough estimate’"’ the number of CT scanners at present working in Italy is about 18 units installed. apart from those in the large cities such as...hGdcl scanners and 198 total body scanners): among othar things, they emphasise that a CT unit , works, on an average, for 5.4 days in the week and
2009-02-01
Measurements on Chart Design and Scoring Rule. Optometry and Vision Science, 79(12), 768-792. ISO. (1998). EN ISO 9241-11. Ergonomic Requirements for...Human Factors from the University of Queensland. He began his career designing and building computerised electronics for the theatre. Following this...to optical detection. Recent work includes the assessment of networked naval gunfire support, ergonomic assessments of combat system consoles and
McMenamin, John; Nicholson, Rick; Leech, Ken
2011-12-01
Clinical reminders have been shown to help general practice achieve an increase in some preventive care items, especially if they identify a patient's eligibility for the target item, prompt clinicians at the right time, provide a fast link to management tools and facilitate clinical recording. WRPHO has introduced the Patient Dashboard clinical reminder and monitored its impact on health targets. This paper reports the impact of a computerised colour-coded clinical reminder on achieving agreed health targets in Whanganui regional practices. Patient Dashboard was developed from previous versions in Auckland and Northland and provided to Whanganui regional practices with Primary Health Organisation (PHO) support. The Dashboard was linked with existing and new clinical management tools which automatically updated clinical records. Data from practices was pooled by Whanganui Regional Primary Health Organisation and target achievement rates reported over 15 months. Over the initial 15 months of Patient Dashboard use, recording of smoking status increased from 74% to 82% and of alcohol use from 15% to 47%. Screening for diabetes increased from 62% to 74%, cardiovascular risk assessment from 20% to 43%, cervical screening from 71% to 79%, and breast screening from 60% to 80%. Patient Dashboard was associated with increased performance indicators both for those targets which were part of a PHO programme and for targets without additional support.
Albayrak, Eda; Sonmezgoz, Fitnet; Ozmen, Zafer; Aktas, Fatma; Altunkas, Aysegul
2017-01-01
A 26-year-old female patient with Type 1 Gaucher’s disease (GD) was admitted to our clinic with complaints of stomachache and signs of anemia. The patient underwent ultrasonography (US), computerised tomography (CT), and magnetic resonance imaging (MRI) scan. Imaging studies revealed massive hepatosplenomegaly, choledocolithiasis, and six nodules in the spleen with a mean size of 14 mm. The nodules appeared hyperechoic, hypoechoic, and of mixed echogenicity on the US and hypodense on the CT. While the nodules were observed to be iso-hypointense in T1-weighted (T1WI) images, they appeared to be hyperintense in the T2-weighted (T2WI) images. There were no diffusion restrictions in these nodules that appeared on the diffusion-weighted magnetic resonance imaging (DWI). A nodule located at the lower pole was observed to be hypointense in the T2WI images. The nodule located at the lower pole, which appeared hypointense in T2WI series, had restricted diffusion upon DWI. In this study, we aimed to present the properties of splenic GD nodules using US, CT, and conventional MRI, together with DWI. This case report is the first to apply US, CT, and conventional MRI, together with DWI, to the splenic nodules associated with Gaucher’s disease. PMID:29386979
Boisen, Egil; Bygholm, Ann; Cavan, David; Hejlesen, Ole K
2003-07-01
Within diabetes care, the majority of health decisions are in the hands of the patient. Therefore, the concepts of disease management and self-care represent inescapable challenges for both patient and healthcare professionals, entailing a considerable amount of learning. Thus, a computerised diabetes disease management systems (CDDM) is to be seen not merely as tools for the medical treatment, but also as pedagogical tools to enhance patient competence. The unfortunate lack of success for most knowledge-based systems might be related to the problem of finding an adequate way of evaluating the systems from their development through the implementation phase to the daily clinical practice. The following presents the initial methodological considerations for evaluating the usefulness of a CDDM system called DiasNet, which is being implemented as a learning tool for patients. The evaluation of usefulness of a CDDM, we claim, entails clinical assessment taking into account the challenges and pitfalls in diabetes disease management. Drawing on activity theory, we suggest the concept of copability as a supplement to 'usability' and 'utility' when determining 'usefulness'. We maintain that it is necessary to ask how well the user copes with the new situation using the system. As ways to measure copability of DiasNet the concepts of coping and learning are discussed, as well as ways this methodology might inform systems development, implementation, and daily clinical practice.
Brisk walking reduces ad libitum snacking in regular chocolate eaters during a workplace simulation.
Oh, Hwajung; Taylor, Adrian H
2012-02-01
Workplace snacking can contribute to obesity. Exercise reduces chocolate cravings but effects on chocolate consumption are unknown. This study investigated the effect of brief exercise on ad libitum consumption during breaks in a computerised task. Seventy-eight regular chocolate eaters, age: 24.90±8.15 years, BMI: 23.56±3.78 kg/m(2) abstained for 2 days. They were randomly assigned to one of four conditions, in a 2 × 2 factorial design, involving either a 15 min brisk walk or quiet rest, and then computerised Stroop tasks with low or high demanding conditions, in three 180 s blocks with a 90 s interval. Throughout, a pre-weighed bowl of chocolates was available for ad libitum eating. A two-way ANOVA revealed no interaction effect of exercise and stress on total chocolate consumption, or main effect of stress, but a main effect of exercise [F(1, 74)=7.12, p<.01]. Mean (SD) chocolate consumption was less (t(73.5)=2.69, 95% CI for difference 3.4-22.9, ES=0.61) for the exercise (15.6 g) than control (28.8 g) group. Exercise also increased affective activation, but there was no mediating effect of change in affect on chocolate consumption. A brief walk may help to reduce ad libitum snacking in regular chocolate eaters. Crown Copyright © 2011. Published by Elsevier Ltd. All rights reserved.
Mortality Benefits of Antibiotic Computerised Decision Support System: Modifying Effects of Age.
Chow, Angela L P; Lye, David C; Arah, Onyebuchi A
2015-11-30
Antibiotic computerised decision support systems (CDSSs) are shown to improve antibiotic prescribing, but evidence of beneficial patient outcomes is limited. We conducted a prospective cohort study in a 1500-bed tertiary-care hospital in Singapore, to evaluate the effectiveness of the hospital's antibiotic CDSS on patients' clinical outcomes, and the modification of these effects by patient factors. To account for clustering, we used multilevel logistic regression models. One-quarter of 1886 eligible inpatients received CDSS-recommended antibiotics. Receipt of antibiotics according to CDSS's recommendations seemed to halve mortality risk of patients (OR 0.54, 95% CI 0.26-1.10, P = 0.09). Patients aged ≤65 years had greater mortality benefit (OR 0.45, 95% CI 0.20-1.00, P = 0.05) than patients that were older than 65 (OR 1.28, 95% CI 0.91-1.82, P = 0.16). No effect was observed on incidence of Clostridium difficile (OR 1.02, 95% CI 0.34-3.01), and multidrug-resistant organism (OR 1.06, 95% CI 0.42-2.71) infections. No increase in infection-related readmission (OR 1.16, 95% CI 0.48-2.79) was found in survivors. Receipt of CDSS-recommended antibiotics reduced mortality risk in patients aged 65 years or younger and did not increase the risk in older patients. Physicians should be informed of the benefits to increase their acceptance of CDSS recommendations.
Stirling, Paul; Valsalan Mannambeth, Rejith; Soler, Agustin; Batta, Vineet; Malhotra, Rajeev Kumar; Kalairajah, Yegappan
2015-03-18
To summarise and compare currently available evidence regarding accuracy of pre-operative imaging, which is one of the key choices for surgeons contemplating patient-specific instrumentation (PSI) surgery. The MEDLINE and EMBASE medical literature databases were searched, from January 1990 to December 2013, to identify relevant studies. The data from several clinical studies was assimilated to allow appreciation and comparison of the accuracy of each modality. The overall accuracy of each modality was calculated as proportion of outliers > 3% in the coronal plane of both computerised tomography (CT) or magnetic resonance imaging (MRI). Seven clinical studies matched our inclusion criteria for comparison and were included in our study for statistical analysis. Three of these reported series using MRI and four with CT. Overall percentage of outliers > 3% in patients with CT-based PSI systems was 12.5% vs 16.9% for MRI-based systems. These results were not statistically significant. Although many studies have been undertaken to determine the ideal pre-operative imaging modality, conclusions remain speculative in the absence of long term data. Ultimately, information regarding accuracy of CT and MRI will be the main determining factor. Increased accuracy of pre-operative imaging could result in longer-term savings, and reduced accumulated dose of radiation by eliminating the need for post-operative imaging and revision surgery.
Evolution of a residue laboratory network and the management tools for monitoring its performance.
Lins, E S; Conceição, E S; Mauricio, A De Q
2012-01-01
Since 2005 the National Residue & Contaminants Control Plan (NRCCP) in Brazil has been considerably enhanced, increasing the number of samples, substances and species monitored, and also the analytical detection capability. The Brazilian laboratory network was forced to improve its quality standards in order to comply with the NRCP's own evolution. Many aspects such as the limits of quantification (LOQs), the quality management systems within the laboratories and appropriate method validation are in continuous improvement, generating new scenarios and demands. Thus, efficient management mechanisms for monitoring network performance and its adherence to the established goals and guidelines are required. Performance indicators associated to computerised information systems arise as a powerful tool to monitor the laboratories' activity, making use of different parameters to describe this activity on a day-to-day basis. One of these parameters is related to turnaround times, and this factor is highly affected by the way each laboratory organises its management system, as well as the regulatory requirements. In this paper a global view is presented of the turnaround times related to the type of analysis, laboratory, number of samples per year, type of matrix, country region and period of the year, all these data being collected from a computerised system called SISRES. This information gives a solid background to management measures aiming at the improvement of the service offered by the laboratory network.
Sigmundsdottir, Linda; Longley, Wendy A; Tate, Robyn L
2016-10-01
Computerised cognitive training (CCT) is an increasingly popular intervention for people experiencing cognitive symptoms. This systematic review evaluated the evidence for CCT in adults with acquired brain injury (ABI), focusing on how outcome measures used reflect efficacy across components of the International Classification of Functioning, Disability and Health. Database searches were conducted of studies investigating CCT to treat cognitive symptoms in adult ABI. Scientific quality was rated using the PEDro-P and RoBiNT Scales. Ninety-six studies met the criteria. Most studies examined outcomes using measures of mental functions (93/96, 97%); fewer studies included measures of activities/participation (41/96, 43%) or body structures (8/96, 8%). Only 14 studies (15%) provided Level 1 evidence (randomised controlled trials with a PEDro-P score ≥ 6/10), with these studies suggesting strong evidence for CCT improving processing speed in multiple sclerosis (MS) and moderate evidence for improving memory in MS and brain tumour populations. There is a large body of research examining the efficacy of CCT, but relatively few Level 1 studies and evidence is largely limited to body function outcomes. The routine use of outcome measures of activities/participation would provide more meaningful evidence for the efficacy of CCT. The use of body structure outcome measures (e.g., neuroimaging) is a newly emerging area, with potential to increase understanding of mechanisms of action for CCT.
[Views of professionals and patients on the introduction of computer science into the consultation].
Roig Buscató, C; Erra Yuste, N; Seguer Toirán, A; Belda Díaz, S; Juncosa Font, S
2005-09-15
To compare the views of professionals and patients on the computerisation of consultations. Cross-sectional. Rural health district in the province of Barcelona, with a population of about 15,000. Consecutive sampling of people seen in the health district and the group of health professionals working in it. Two anonymous self-filled questionnaires with closed questions aimed at health professionals and a sample of patients (accuracy, 0.05; confidence, 95%; prevalence, 50%). The mean age of the 407 patients was 48.4 (SD, 17.2), with 63.6% women. 21 questionnaires were filled in by the professionals (91%), 12 by doctors, and 9 by nurses. Their mean age was 43.9 (SD, 7.5), and 71.4% were women. For common questions, 54.3% of patients were keen on seeing the screen, while professionals calculated this figure at 11%. 5.6% of patients thought computerisation had changed the relationship, whereas 31.6% of professionals did. 12.6% of patients thought it had made the visit longer, whereas 38.1% of the professionals thought it had. 10.6% of patients and 47.4% of professionals thought it had led to loss of confidentiality. The introduction of computers into consultations was accepted well. Professionals were more worried than patients about possible loss of confidentiality, and thought that there had been bigger changes in the doctor-patient relationship and that visits had become longer.
Stirling, Paul; Valsalan Mannambeth, Rejith; Soler, Agustin; Batta, Vineet; Malhotra, Rajeev Kumar; Kalairajah, Yegappan
2015-01-01
AIM: To summarise and compare currently available evidence regarding accuracy of pre-operative imaging, which is one of the key choices for surgeons contemplating patient-specific instrumentation (PSI) surgery. METHODS: The MEDLINE and EMBASE medical literature databases were searched, from January 1990 to December 2013, to identify relevant studies. The data from several clinical studies was assimilated to allow appreciation and comparison of the accuracy of each modality. The overall accuracy of each modality was calculated as proportion of outliers > 3% in the coronal plane of both computerised tomography (CT) or magnetic resonance imaging (MRI). RESULTS: Seven clinical studies matched our inclusion criteria for comparison and were included in our study for statistical analysis. Three of these reported series using MRI and four with CT. Overall percentage of outliers > 3% in patients with CT-based PSI systems was 12.5% vs 16.9% for MRI-based systems. These results were not statistically significant. CONCLUSION: Although many studies have been undertaken to determine the ideal pre-operative imaging modality, conclusions remain speculative in the absence of long term data. Ultimately, information regarding accuracy of CT and MRI will be the main determining factor. Increased accuracy of pre-operative imaging could result in longer-term savings, and reduced accumulated dose of radiation by eliminating the need for post-operative imaging and revision surgery. PMID:25793170
Groom, Madeleine J; Young, Zoe; Hall, Charlotte L; Gillott, Alinda; Hollis, Chris
2016-09-30
There is a clinical need for objective evidence-based measures that are sensitive and specific to ADHD when compared with other neurodevelopmental disorders. This study evaluated the incremental validity of adding an objective measure of activity and computerised cognitive assessment to clinical rating scales to differentiate adult ADHD from Autism spectrum disorders (ASD). Adults with ADHD (n=33) or ASD (n=25) performed the QbTest, comprising a Continuous Performance Test with motion-tracker to record physical activity. QbTest parameters measuring inattention, impulsivity and hyperactivity were combined to provide a summary score ('QbTotal'). Binary stepwise logistic regression measured the probability of assignment to the ADHD or ASD group based on scores on the Conners Adult ADHD Rating Scale-subscale E (CAARS-E) and Autism Quotient (AQ10) in the first step and then QbTotal added in the second step. The model fit was significant at step 1 (CAARS-E, AQ10) with good group classification accuracy. These predictors were retained and QbTotal was added, resulting in a significant improvement in model fit and group classification accuracy. All predictors were significant. ROC curves indicated superior specificity of QbTotal. The findings present preliminary evidence that adding QbTest to clinical rating scales may improve the differentiation of ADHD and ASD in adults. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Whitlock, J; Dixon, J; Sherlock, C; Tucker, R; Bolt, D M; Weller, R
2016-05-21
Since the 1950s, veterinary practitioners have included two separate dorsoproximal-palmarodistal oblique (DPr-PaDiO) radiographs as part of a standard series of the equine foot. One image is obtained to visualise the distal phalanx and the other to visualise the navicular bone. However, rapid development of computed radiography and digital radiography and their post-processing capabilities could mean that this practice is no longer required. The aim of this study was to determine differences in perceived image quality between DPr-PaDiO radiographs that were acquired with a computerised radiography system with exposures, centring and collimation recommended for the navicular bone versus images acquired for the distal phalanx but were subsequently manipulated post-acquisition to highlight the navicular bone. Thirty images were presented to four clinicians for quality assessment and graded using a 1-3 scale (1=textbook quality, 2=diagnostic quality, 3=non-diagnostic image). No significant difference in diagnostic quality was found between the original navicular bone images and the manipulated distal phalanx images. This finding suggests that a single DPr-PaDiO image of the distal phalanx is sufficient for an equine foot radiographic series, with appropriate post-processing and manipulation. This change in protocol will result in reduced radiographic study time and decreased patient/personnel radiation exposure. British Veterinary Association.
Wood, Megan A; Bukowski, William M; Santo, Jonathan B
2017-01-01
A two-wave longitudinal study of 380 preadolescents (M age = 10.87) from largely middle-class schools in Montréal, Québec, Canada, assessed the hypothesis that friendship security, but not friendship intimacy, moderates the stability of anxiety during adolescence. This central but largely overlooked question about peer relations concerns which aspects of friendship account for the effects of friendship on emotional adjustment. Anxiety and friendship quality were measured via self-report questionnaires, employing the Network of Relationships Inventory for security and intimacy items. An index of friendship durability, which combined reciprocity and stability within first- and second-best friendship choices, was derived from sociometric measures. A latent variable path analysis examined with structural equation modeling showed that anxiety was less stable for children who perceived their friendships as secure. The moderating effect of intimacy was statistically nonsignificant. A follow-up analysis showed that the effects of security did not result from friendship durability. These findings provide support for the long-standing but previously unaddressed hypothesis that security, rather than intimacy, accounts for friendship's effect on anxiety reduction during early adolescence.
Quantum key distribution with hacking countermeasures and long term field trial.
Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J
2017-05-16
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.
2014-01-01
Background Human security shifts traditional concepts of security from interstate conflict and the absence of war to the security of the individual. Broad definitions of human security include livelihoods and food security, health, psychosocial well-being, enjoyment of civil and political rights and freedom from oppression, and personal safety, in addition to absence of conflict. Methods In March 2010, we undertook a population-based health and livelihood study of female refugees from conflict-affected Central African Republic living in Djohong District, Cameroon and their female counterparts within the Cameroonian host community. Embedded within the survey instrument were indicators of human security derived from the Leaning-Arie model that defined three domains of psychosocial stability suggesting individuals and communities are most stable when their core attachments to home, community and the future are intact. Results While the female refugee human security outcomes describe a population successfully assimilated and thriving in their new environments based on these three domains, the ability of human security indicators to predict the presence or absence of lifetime and six-month sexual violence was inadequate. Using receiver operating characteristic (ROC) analysis, the study demonstrates that common human security indicators do not uncover either lifetime or recent prevalence of sexual violence. Conclusions These data suggest that current gender-blind approaches of describing human security are missing serious threats to the safety of one half of the population and that efforts to develop robust human security indicators should include those that specifically measure violence against women. PMID:24829613
Bartholomew, K A; Stover, K E; Olby, N J; Moore, S A
2016-12-24
Fibrocartilaginous embolic myelopathy (FCE) is common in dogs; however, there is conflicting information in the veterinary literature regarding clinical characteristics and data on recovery in severe cases is sparse. A systematic review of canine FCE was performed to delineate the natural history of this disease. 322 previously reported cases and 71 previously unreported cases were identified for inclusion. Source publications were identified via PubMed central search and by references from review articles. Previously unreported cases were identified via computerised medical records search at two veterinary institutions. FCE was most common in middle-aged large breed dogs (30 per cent); however, the miniature schnauzer was the most frequently reported individual breed and small breeds comprised 24 per cent of all reported cases. The most common neuroanatomical localisation was a T3-L3 myelopathy (33.1 per cent). Prognosis for recovery of ambulation was good to excellent with 85 per cent of cases regaining the ability to walk unassisted, most within 3 weeks. Persistent neurological deficits were common in patients that recovered ambulation (49.1 per cent). When nociception was absent in the affected limbs at initial presentation, rate of recovery was lower (10 per cent); however, this data is likely biased by limited follow-up in more severe cases. Future prospective studies should evaluate prognosis for more severely affected patients. British Veterinary Association.
The effect of height and BMI on computer dynamic posturography parameters in women.
Olchowik, Grażyna; Tomaszewski, Marek; Olejarz, Piotr; Warchoł, Jan; Różańska-Boczula, Monika
2014-01-01
The human body's posture control is a complex system of organs and mechanisms which controls the body's centre of gravity (COG) over its base of support (BOS). Computerised Dynamic Posturography (CDP) allows for the quantitative and objective assessment of the sensory and motor components of the body's posture control system as well as of the integration and adaptation mechanisms in the central nervous system. The aim of this study was to assess the relationships between the body's height and BMI on CDP results in a group of young healthy women without any clinical symptoms of balance disorders. It was found that the MS depended significantly on the height and BMI of the subjects as well as on the SOT conditions. As the height and BMI increased the MS value decreased. The postural response latency (LC) in the MCT statistically significantly depended only on height and showed a positive correlation. The postural response latency increased with height. The postural response amplitude for both right and left lower limbs significantly depended on height and BMI, but only for the backward movement of the platform. The response amplitude for all platform translations under all MCT conditions increased with height and BMI. The body's resultant imbalance caused by the platform perturbations in the ADT was greater in shorter people and those with a lower BMI.
Famine Early Warning Systems and Their Use of Satellite Remote Sensing Data
NASA Technical Reports Server (NTRS)
Brown, Molly E.; Essam, Timothy; Leonard, Kenneth
2011-01-01
Famine early warning organizations have experience that has much to contribute to efforts to incorporate climate and weather information into economic and political systems. Food security crises are now caused almost exclusively by problems of food access, not absolute food availability, but the role of monitoring agricultural production both locally and globally remains central. The price of food important to the understanding of food security in any region, but it needs to be understood in the context of local production. Thus remote sensing is still at the center of much food security analysis, along with an examination of markets, trade and economic policies during food security analyses. Technology including satellite remote sensing, earth science models, databases of food production and yield, and modem telecommunication systems contributed to improved food production information. Here we present an econometric approach focused on bringing together satellite remote sensing and market analysis into food security assessment in the context of early warning.
18 CFR 367.102 - Accounts 408.1 and 408.2, Taxes other than income taxes.
Code of Federal Regulations, 2010 CFR
2010-04-01
... COMPANY ACT OF 2005, FEDERAL POWER ACT AND NATURAL GAS ACT UNIFORM SYSTEM OF ACCOUNTS FOR CENTRALIZED... taxes, state unemployment insurance, franchise taxes, Federal excise taxes, social security taxes, and...
76 FR 14898 - South Central Idaho Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-18
... Committee will meet in Sun Valley, Idaho. The committee is meeting as authorized under the Secure Rural... will be held at the Sun Valley City Hall Council Chambers, 810 Elkhorn Road, Sun Valley, Idaho 83353...