32 CFR 2001.46 - Transmission.
Code of Federal Regulations, 2010 CFR
2010-07-01
... between the U.S., Puerto Rico, or a U.S. possession or trust territory. (1) Top Secret. Top Secret... an authorized government agency courier service; a designated courier or escort with Top Secret clearance; electronic means over approved communications systems. Under no circumstances will Top Secret...
Business Case Analysis: Reconfiguration of the Frederick Memorial Healthcare System Courier Service
2008-05-13
from each specimen. This figure alone clearly supports the existence of the FMH courier service. The problem , rather, lies in the efficiency and...investigated, to include the Hyundai Accent, Chevrolet Aveo, and the Honda Fit. Each vehicle was evaluated on cost, fuel efficiency, predicted reliability...P175/65R14 Tires Temporary Spare Tire SAFETY Driver Front Airbag and Front Passenger Airbag with Advanced Airbag System 3 Point Driver & Fr Pass
Better delivery/pick up routes in the presence of uncertainty.
DOT National Transportation Integrated Search
2007-08-01
We consider the Courier Delivery Problem, a variant of the Vehicle Routing Problem with : time windows in which customers appear probabilistically and their service times are uncertain. : We use scenario-based stochastic optimization with recourse fo...
A High Speed Mobile Courier Data Access System That Processes Database Queries in Real-Time
NASA Astrophysics Data System (ADS)
Gatsheni, Barnabas Ndlovu; Mabizela, Zwelakhe
A secure high-speed query processing mobile courier data access (MCDA) system for a Courier Company has been developed. This system uses the wireless networks in combination with wired networks for updating a live database at the courier centre in real-time by an offsite worker (the Courier). The system is protected by VPN based on IPsec. There is no system that we know of to date that performs the task for the courier as proposed in this paper.
5 CFR 842.208 - Firefighters, law enforcement officers, and nuclear materials couriers.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., and nuclear materials couriers. 842.208 Section 842.208 Administrative Personnel OFFICE OF PERSONNEL... ANNUITY Eligibility § 842.208 Firefighters, law enforcement officers, and nuclear materials couriers. (a... enforcement officer or nuclear materials courier totaling 25 years; or (2) After becoming age 50 and...
Simulation of robotic courier deliveries in hospital distribution services.
Rossetti, M D; Felder, R A; Kumar, A
2000-06-01
Flexible automation in the form of robotic couriers holds the potential for decreasing operating costs while improving delivery performance in hospital delivery systems. This paper discusses the use of simulation modeling to analyze the costs, benefits, and performance tradeoffs related to the installation and use of a fleet of robotic couriers within hospital facilities. The results of this study enable a better understanding of the delivery and transportation requirements of hospitals. Specifically, we examine how a fleet of robotic couriers can meet the performance requirements of the system while maintaining cost efficiency. We show that for clinical laboratory and pharmaceutical deliveries a fleet of six robotic couriers can achieve significant performance gains in terms of turn-around time and delivery variability over the current system of three human couriers per shift or 13 FTEs. Specifically, the simulation results indicate that using robotic couriers to perform both clinical laboratory and pharmaceutical deliveries would result in a 34% decrease in turn-around time, and a 38% decrease in delivery variability. In addition, a break-even analysis indicated that a positive net present value occurs if nine or more FTEs are eliminated with a resulting ROI of 12%. This analysis demonstrates that simulation can be a valuable tool for examining health care distribution services and indicates that a robotic courier system may yield significant benefits over a traditional courier system in this application.
[Traffic accidents from the motorcycle couriers' perspective: feedback for health promotion].
Veronese, Andréa Márian; de Oliveira, Dora Lúcia Leidens Corrêa
2006-12-01
This research note is the result of a qualitative study in Porto Alegre, Rio Grande do Sul, Brazil, aimed at exploring traffic accident risk from the motorcycle couriers' point of view. The research results highlight the importance of accident prevention and health promotion for these workers. The study was based on sociological theories of risk, especially those emphasizing the social and cultural nature of its meanings. Information was gathered through focus groups and analyzed according to the Data-Based Theory. According to the research subjects, all motorcycle couriers, the traffic accident risk is inherent to their daily work duties and is produced by personal and social interests like money, speed, and urgency. Motorcycle couriers attempt to control such risks by using self-defense strategies. Considering the high incidence of traffic accidents with motorcycle couriers in Porto Alegre, these strategies have apparently not been effective. This note emphasizes that traffic accidents involving motorcycle couriers are work-related accidents, and that health promotion measures to prevent them should target not only the couriers themselves but also their employers and customers.
Determining the feasibility of robotic courier medication delivery in a hospital setting.
Kirschling, Thomas E; Rough, Steve S; Ludwig, Brad C
2009-10-01
The feasibility of a robotic courier medication delivery system in a hospital setting was evaluated. Robotic couriers are self-guiding, self-propelling robots that navigate hallways and elevators to pull an attached or integrated cart to a desired destination. A robotic courier medication delivery system was pilot tested in two patient care units at a 471-bed tertiary care academic medical center. Average transit for the existing manual medication delivery system hourly hospitalwide deliveries was 32.6 minutes. Of this, 32.3% was spent at the patient care unit and 67.7% was spent pushing the cart or waiting at an elevator. The robotic courier medication delivery system traveled as fast as 1.65 ft/sec (52% speed of the manual system) in the absence of barriers but moved at an average rate of 0.84 ft/sec (26% speed of the manual system) during the study, primarily due to hallway obstacles. The robotic courier was utilized for 50% of the possible 1750 runs during the 125-day pilot due to technical or situational difficulties. Of the runs that were sent, a total of 79 runs failed, yielding an overall 91% success rate. During the final month of the pilot, the success rate reached 95.6%. Customer satisfaction with the traditional manual delivery system was high. Customer satisfaction with deliveries declined after implementation of the robotic courier medication distribution system. A robotic courier medication delivery system was implemented but was not expanded beyond the two pilot units. Challenges of implementation included ongoing education on how to properly move the robotic courier and keeping the hallway clear of obstacles.
Pricing for Efficiency, Equity, and Simplicity: A Model Policy for an Interlibrary Courier Service.
ERIC Educational Resources Information Center
Gassler, Robert Scott
1985-01-01
Presents an example of a pricing policy for any interlibrary courier service which (1) calculates fixed, travelling, and stopping costs; (2) charges by how often the courier stops at each participating library; and (3) uses any subsidies for costs libraries cannot control. (CDD)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-05
...) courier, express mail, or expedited delivery service to the Office of the Secretary, Sixteenth Floor, One... the mail, or by courier, express mail, or expedited delivery service upon depositing the document with..., Office of the General Counsel, Washington, DC 20555-0001. The expedited delivery or courier mail address...
Couriers in the Inca Empire: Getting Your Message Across. [Lesson Plan].
ERIC Educational Resources Information Center
2002
This lesson shows how the Inca communicated across the vast stretches of their mountain realm, the largest empire of the pre-industrial world. The lesson explains how couriers carried messages along mountain-ridge roads, up and down stone steps, and over chasm-spanning footbridges. It states that couriers could pass a message from Quito (Ecuador)…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-01
... Adjudications Staff; or (2) courier, express mail, or expedited delivery service to the Office of the Secretary... time of deposit in the mail, or by courier, express mail, or expedited delivery service upon depositing... expedited delivery or courier mail address for both offices is: U.S. Nuclear Regulatory Commission, 11555...
NASA Astrophysics Data System (ADS)
Miller, Carla J.; Glenn, D. F.; Hartenstein, Steven D.; Hallowell, Susan F.
1998-12-01
Recent efforts at the Idaho National Engineering and Environmental Laboratory (INEEL) have included mapping explosive contamination resulting from manufacturing and carrying improvised explosive devices (IEDs). Two types of trace detection equipment were used to determine levels of contamination from designated sampling areas. A total of twenty IEDs were constructed: ten using TNT and ten using C-4. Two test scenarios were used. The first scenario tracked the activities of a manufacturer who straps the device onto an independent courier. The courier then performed a series of activities to simulate waiting in an airport. The second scenario tracked the activities of a manufacturer who also served as the courier. A sample set for each test consisted of thirty samples from various locations on each IED manufacturer, thirty from each IED courier, twenty-five from the manufacturing area, and twenty-five from the courier area. Pre-samples and post-samples were collected for analysis with each detection technique. Samples analyzed by gc/chemiluminescence were taken by swiping a teflon- coated sampling swipe across the surface of the sampling area to pick up any explosive particles. Samples analyzed by ion mobility spectrometry (IMS) were taken from the clothing of the manufacturer and courier by vacuuming the surface and collecting particulates on a fiberglass filter. Samples for IMS analysis from the manufacturing and courier rooms were taken by wiping a cotton sampling swipe across the surface area. Currently, building IEDs and monitoring the explosive contamination is being directed toward detection with portal monitors.
A development framework for distributed artificial intelligence
NASA Technical Reports Server (NTRS)
Adler, Richard M.; Cottman, Bruce H.
1989-01-01
The authors describe distributed artificial intelligence (DAI) applications in which multiple organizations of agents solve multiple domain problems. They then describe work in progress on a DAI system development environment, called SOCIAL, which consists of three primary language-based components. The Knowledge Object Language defines models of knowledge representation and reasoning. The metaCourier language supplies the underlying functionality for interprocess communication and control access across heterogeneous computing environments. The metaAgents language defines models for agent organization coordination, control, and resource management. Application agents and agent organizations will be constructed by combining metaAgents and metaCourier building blocks with task-specific functionality such as diagnostic or planning reasoning. This architecture hides implementation details of communications, control, and integration in distributed processing environments, enabling application developers to concentrate on the design and functionality of the intelligent agents and agent networks themselves.
Location and Routing of the Defense Courier Service Aerial Network
1991-03-01
12 Coefficient Determinatior .................... . .15 Heuristic Solution Techniques ................... 16 Space Filling Curves ...178 V List of Figures Figure Page I. Space Filling Curves ............................. 2. The Sweep Heuristic...frequency associated with the most served site within a given depot’s route system (18). Approach to the Problem The research involves several phases . In
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-11
... inch). Use one of the following fonts: Times New Roman, Courier, Courier New, or Arial. Furthermore... is not financially stable; has a history of unsatisfactory performance; has a financial or other...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-16
... than 10 pitch (characters per inch). Use one of the following fonts: Times New Roman, Courier, Courier... history of unsatisfactory performance; has a financial or other management system that does not meet the...
Code of Federal Regulations, 2013 CFR
2013-01-01
... Energy, and who is the sole such representative for the entire department. Nuclear materials courier... the Department of Energy having a nuclear materials transportation mission; and (3) Is either— (i...) RETIREMENT Nuclear Materials Couriers § 831.802 Definitions. In this subpart— Agency head means the Secretary...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Energy, and who is the sole such representative for the entire department. Nuclear materials courier... the Department of Energy having a nuclear materials transportation mission; and (3) Is either— (i...) RETIREMENT Nuclear Materials Couriers § 831.802 Definitions. In this subpart— Agency head means the Secretary...
37 CFR 251.54 - Assessment of costs of arbitration panels.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Accounting Operations Section, Financial Services Directorate, Library of Congress, 101 Independence Avenue... Service and similar corporate courier services), use the following address: Copyright Office General... corporate courier services may not be used for correspondence and filings for the Copyright Arbitration...
Code of Federal Regulations, 2012 CFR
2012-01-01
... Energy, and who is the sole such representative for the entire department. Nuclear materials courier... the Department of Energy having a nuclear materials transportation mission; and (3) Is either— (i...) RETIREMENT Nuclear Materials Couriers § 831.802 Definitions. In this subpart— Agency head means the Secretary...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Energy, and who is the sole such representative for the entire department. Nuclear materials courier... the Department of Energy having a nuclear materials transportation mission; and (3) Is either— (i...) RETIREMENT Nuclear Materials Couriers § 831.802 Definitions. In this subpart— Agency head means the Secretary...
Code of Federal Regulations, 2011 CFR
2011-01-01
... Energy, and who is the sole such representative for the entire department. Nuclear materials courier... the Department of Energy having a nuclear materials transportation mission; and (3) Is either— (i...) RETIREMENT Nuclear Materials Couriers § 831.802 Definitions. In this subpart— Agency head means the Secretary...
Courier robot keeps hospital staff 'on the job'.
Deery, J
1997-01-01
A courier robot at Abington Memorial Hospital has allowed the hospital to maintain high standards of patient care in the face of budget constraints. The robot handles after-hours deliveries of meals and supplies efficiently and cost-effectively, thus freeing support staff to focus on other tasks.
NASA Astrophysics Data System (ADS)
Hassan, Waleed K.; Al-Assam, Hisham
2017-05-01
The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.
Nonformal Vocational Training. Courier No. 34.
ERIC Educational Resources Information Center
ASPBAE Courier, 1985
1985-01-01
This issue of the Courier has as its main topic nonformal education for vocational and professional competence. The first article, "Nonformal Education for Vocational and Professional Competence: A Report of a Conference" (John Doraisamy), is a summary of the discussions that arose from the papers presented at the Asian-South Pacific…
78 FR 47427 - AUC, LLC Reno Creek, In Situ
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-05
...-Filing system also distributes an email notice that provides access to the document to the NRC's Office...) courier, express mail, or expedited delivery service to the Office of the Secretary, Sixteenth Floor, One... the mail, or by courier, express mail, or expedited delivery service upon depositing the document with...
5 CFR 842.208 - Firefighters, law enforcement officers, and nuclear materials couriers.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 5 Administrative Personnel 2 2011-01-01 2011-01-01 false Firefighters, law enforcement officers, and nuclear materials couriers. 842.208 Section 842.208 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) FEDERAL EMPLOYEES RETIREMENT SYSTEM-BASIC ANNUITY Eligibility § 842.208 Firefighters, la...
Non-Governmental Organisations. Their Role in Development. Courier No. 37.
ERIC Educational Resources Information Center
ASPBAE Courier, 1986
1986-01-01
This issue of the "Courier" contains several articles on the role of nongovernmental organizations (NGOs) working for social justice and development for people in Third World countries. The following articles appear: "Sharing One Earth" (Nighat Said Khan, Kamla Bhasin); "Beware of the Gongo--Regulating NGOs in India: New…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-11
... also distributes an email notice that provides access to the document to the NRC's Office of the...) courier, express mail, or expedited delivery service to the Office of the Secretary, Sixteenth Floor, One... the mail, or by courier, express mail, or expedited delivery service upon depositing the document with...
77 FR 17039 - Application for New Awards; Training for Realtime Writers Program
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-23
... of the following fonts: Times New Roman, Courier, Courier New, or Arial. An application submitted in any other font (including Times Roman or Arial Narrow) will not be accepted. The page limit does not... grantee is not financially stable; has a history of unsatisfactory performance; has a financial or other...
76 FR 18198 - European Union-United States Atlantis Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-01
... fonts: Times New Roman, Courier, Courier New, or Arial. An application submitted in any other font (including Times Roman or Arial Narrow) will not be accepted. The 6000-word limit does not apply to the cover... applicant or grantee is not financially stable; has a history of unsatisfactory performance; has a financial...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Air traffic controllers, firefighters, law enforcement officers, and nuclear materials couriers. 842.405 Section 842.405 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) FEDERAL EMPLOYEES RETIREMENT SYSTEM-BASIC ANNUITY Computations ...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Air traffic controllers, firefighters, law enforcement officers, and nuclear materials couriers. 842.405 Section 842.405 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) FEDERAL EMPLOYEES RETIREMENT SYSTEM-BASIC ANNUITY Computations ...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 5 Administrative Personnel 2 2012-01-01 2012-01-01 false Air traffic controllers, firefighters, law enforcement officers, and nuclear materials couriers. 842.405 Section 842.405 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) FEDERAL EMPLOYEES RETIREMENT SYSTEM-BASIC ANNUITY Computations ...
Non-Formal Education Broadcasting. Courier No. 20, December 1980.
ERIC Educational Resources Information Center
Duke, Chris, Ed.; And Others
This issue of Asian South Pacific Bureau of Adult Education Courier Service focuses on communications within the region. The first paper discusses development and communication and the training needs for workers in these areas. The next two items briefly address how broadcasting for nonformal education is being approached in Indonesia, which…
78 FR 123 - Diablo Canyon, Independent Spent Fuel Storage Installation; License Amendment Request...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-02
... receipt of the document. The E-Filing system also distributes an email notice that provides access to the...: Rulemaking and Adjudications Staff; or (2) courier, express mail, or expedited delivery service to the Office... mail as of the time of deposit in the mail, or by courier, express mail, or expedited delivery service...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-02
... receipt of the document. The E-Filing system also distributes an email notice that provides access to the...: Rulemaking and Adjudications Staff; or (2) courier, express mail, or expedited delivery service to the Office... mail as of the time of deposit in the mail, or by courier, express mail, or expedited delivery service...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-16
...-Filing system also distributes an email notice that provides access to the document to the NRC's Office... Adjudications Staff; or (2) courier, express mail, or expedited delivery service to the Office of the Secretary... time of deposit in the mail, or by courier, express mail, or expedited delivery service upon depositing...
Adult Education. The Quality of Life. ASPBAE Courier No. 52.
ERIC Educational Resources Information Center
ASPBAE Courier, 1991
1991-01-01
This issue of the "Courier" examines the quality of life as it can be improved by adult education, especially in the countries of Asia, Africa, and the South Pacific. It also looks at the need for women's education. The following six articles are included: (1) "The Future of the Family" (Federico Mayor); (2) "Her Words on…
43 CFR 4.909 - How do I request an extension of time?
Code of Federal Regulations, 2010 CFR
2010-10-01
... purpose, you may obtain an extension of time under this section. (b) You must submit a written request for... Service, a private delivery or courier service, hand delivery or telefax to (703) 235-8349; (2) If you.... Postal Service, a private delivery or courier service or hand delivery so that it is received within 5...
77 FR 3211 - USACE's Plan for Retrospective Review Under E.O. 13563
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-23
...-2011-0028, in the subject line of the message. Mail: U.S. Army Corps of Engineers, ATTN: CECW-CO-R (Ms. Amy S. Klein), 441 G Street NW., Washington, DC 20314-1000. Hand Delivery/Courier: Due to security requirements, we cannot receive comments by hand delivery or courier. Instructions: Instructions for submitting...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-22
... smaller than 10 pitch (characters per inch). Use one of the following fonts: Times New Roman, Courier, Courier New, or Arial. An application submitted in any other font (including Times Roman or Arial Narrow... applicant or grantee is not financially stable; has a history of unsatisfactory performance; has a financial...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-14
... (characters per inch). Use one of the following fonts: Times New Roman, Courier, Courier New, or Arial. An application submitted in any other font (including Times Roman or Arial Narrow) will not be accepted. The... grantee is not financially stable; has a history of unsatisfactory performance; has a financial or other...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-08
... fonts: Times New Roman, Courier, Courier New, or Arial. An application submitted in any other font (including Times Roman and Arial Narrow) will not be accepted. The page limit does not apply to Part I, the... applicant or grantee is not financially stable; has a history of unsatisfactory performance; has a financial...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-13
..., and graphs. Use one of the following fonts: Times New Roman, Courier, Courier New, or Arial. An application submitted in any other font (including Times Roman and Arial Narrow) will not be accepted. The... applicant or grantee is not financially stable; has a history of unsatisfactory performance; has a financial...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-28
... smaller than 10 pitch (characters per inch). Use one of the following fonts: Times New Roman, Courier, Courier New, or Arial. An application submitted in any other font (including Times Roman or Arial Narrow... applicant or grantee is not financially stable; has a history of unsatisfactory performance; has a financial...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-29
..., messenger, or courier service: When using this method, you must submit your comments and attachments to the... for submitting comments. Facsimile: If your comments, including attachments, are not longer than 10... Avenue, NW., Washington, DC 20210. Deliveries (hand, express mail, messenger, and courier service) are...
Study on the construction of Intelligent Courier Station Model
NASA Astrophysics Data System (ADS)
zhao, Ce; lu, Jia xin; li, Zhuang zhuang; shao, Zi rong; pi, Kun yi
2018-06-01
Campus Express is an important window to observe the city consumption logistics service "last kilometer".The research on Campus Express service is not only conducive to campus environment improvement and service quality promotion, but also provides all types of community, agglomeration areas such as urban terminal "last kilometer" logistics with reference.This article first proposed the main problems of campus express service,analyzed the mode of smart express station and finally built a smart express station.
Bankson, Daniel D; Heim, Joseph A
2014-01-01
To optimize transportation processes, we present herein a contingency plan that coordinates interim measures used to ensure continued and timely services when climate based events might cause an interruption of the usual specimen transportation processes. As an example, we outline the implementation and effectiveness of a contingency plan for network laboratory courier automobile transportation during times of mountain pass highway closure. Data available from an approximately 3-year period from October 10, 2010 through August 29, 2013 revealed a total of 690 complete closures in the eastbound or westbound lanes of the Interstate-90 highway in the Snoqualmie Pass area in the state of Washington. Despite the frequency of closures, the Washington State Department of Transportation was effective in limiting the duration of closures. Road closures of less than 1 hour accounted for 58.7% of the total closures. No recorded closures prevented dispatched couriers from completing a prescheduled Snoqualmie Pass route. We identified no delays as being clinically significant, despite that there were 5 instances of delays greater than 4 hours. We implemented a contingency plan of aiding courier logistics during all times of pass closure. The plan includes an easy to interpret Condition Dashboard as a status indicator and a Decision Tree that references and summarizes information. Overall, the contingency plan allows for an objective, robust, proactive decision support system that has enabled operational flexibility and has contributed to continued safe, on-time specimen transportation; clients and courier and reference laboratory staff have appreciated these features and associated outcomes. Copyright© by the American Society for Clinical Pathology (ASCP).
76 FR 16743 - Applications for New Awards; Program for North American Mobility in Higher Education
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-25
... inch). Use one of the following fonts: Times New Roman, Courier, Courier New, or Arial. An application submitted in any other font (including Times Roman or Arial Narrow) will not be accepted. The 5000-word... special conditions on a grant if the applicant or grantee is not financially stable; has a history of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-02
... all text in charts, tables, figures, and graphs. Use a font that is either 12 point or larger. Use one of the following fonts: Times New Roman, Courier, Courier New, or Arial. An amended application submitted in any other font (including Times Roman and Arial Narrow) will not be accepted. The page limits...
Court grants courier a jury trial based on fear of AIDS.
1996-03-08
A medical courier who was exposed to blood from a leaking container will be granted a jury trial in Albuquerque, NM. Courier [name removed] was splashed with blood and became alarmed because she had paper cuts on her hands. Repeated blood tests for HIV and hepatitis B were negative. A Bernallilo County judge initially dismissed [name removed]'s lawsuit when the hospital revealed that there was no HIV present in the splashed liquid. A three-judge panel of the Court of Appeals ruled to allow [name removed] a jury trial because New Mexico law no longer requires a plaintiff to prove that the defendant's actions created actual danger or physical impact. The panel determined that [name removed]'s allegations stated a cause for negligent infliction of emotional distress.
Managing healthcare information: analyzing trust.
Söderström, Eva; Eriksson, Nomie; Åhlfeldt, Rose-Mharie
2016-08-08
Purpose - The purpose of this paper is to analyze two case studies with a trust matrix tool, to identify trust issues related to electronic health records. Design/methodology/approach - A qualitative research approach is applied using two case studies. The data analysis of these studies generated a problem list, which was mapped to a trust matrix. Findings - Results demonstrate flaws in current practices and point to achieving balance between organizational, person and technology trust perspectives. The analysis revealed three challenge areas, to: achieve higher trust in patient-focussed healthcare; improve communication between patients and healthcare professionals; and establish clear terminology. By taking trust into account, a more holistic perspective on healthcare can be achieved, where trust can be obtained and optimized. Research limitations/implications - A trust matrix is tested and shown to identify trust problems on different levels and relating to trusting beliefs. Future research should elaborate and more fully address issues within three identified challenge areas. Practical implications - The trust matrix's usefulness as a tool for organizations to analyze trust problems and issues is demonstrated. Originality/value - Healthcare trust issues are captured to a greater extent and from previously unchartered perspectives.
ERIC Educational Resources Information Center
Arnold, Stephen E.
This paper highlights the findings of two studies conducted by Market Opinion Research for Data Courier Inc., both of which focused on textual or bibliographic business information. The first study consisted of interviews with 535 known searchers of the ABI/INFORM file, a product of Data Courier Inc. The purpose was to determine the habits, needs,…
ERIC Educational Resources Information Center
Heslop, Yvonne, Ed.
1989-01-01
This special issue of the "Courier" has been produced to mark the beginning of International Literacy Year 1990. It brings together papers from adult educators involved in literacy work about who needs literacy and why, what literacy is, who can help in creating the right conditions for literacy to succeed, and how to evaluate literacy…
Recommendation based on trust diffusion model.
Yuan, Jinfeng; Li, Li
2014-01-01
Recommender system is emerging as a powerful and popular tool for online information relevant to a given user. The traditional recommendation system suffers from the cold start problem and the data sparsity problem. Many methods have been proposed to solve these problems, but few can achieve satisfactory efficiency. In this paper, we present a method which combines the trust diffusion (DiffTrust) algorithm and the probabilistic matrix factorization (PMF). DiffTrust is first used to study the possible diffusions of trust between various users. It is able to make use of the implicit relationship of the trust network, thus alleviating the data sparsity problem. The probabilistic matrix factorization (PMF) is then employed to combine the users' tastes with their trusted friends' interests. We evaluate the algorithm on Flixster, Moviedata, and Epinions datasets, respectively. The experimental results show that the recommendation based on our proposed DiffTrust + PMF model achieves high performance in terms of the root mean square error (RMSE), Recall, and F Measure.
Recommendation Based on Trust Diffusion Model
Li, Li
2014-01-01
Recommender system is emerging as a powerful and popular tool for online information relevant to a given user. The traditional recommendation system suffers from the cold start problem and the data sparsity problem. Many methods have been proposed to solve these problems, but few can achieve satisfactory efficiency. In this paper, we present a method which combines the trust diffusion (DiffTrust) algorithm and the probabilistic matrix factorization (PMF). DiffTrust is first used to study the possible diffusions of trust between various users. It is able to make use of the implicit relationship of the trust network, thus alleviating the data sparsity problem. The probabilistic matrix factorization (PMF) is then employed to combine the users' tastes with their trusted friends' interests. We evaluate the algorithm on Flixster, Moviedata, and Epinions datasets, respectively. The experimental results show that the recommendation based on our proposed DiffTrust + PMF model achieves high performance in terms of the root mean square error (RMSE), Recall, and F Measure. PMID:25009827
Factors Associated with Road Accidents among Brazilian Motorcycle Couriers
da Silva, Daniela Wosiack; de Andrade, Selma Maffei; Soares, Dorotéia Fátima Pelissari de Paula; Mathias, Thais Aidar de Freitas; Matsuo, Tiemi; de Souza, Regina Kazue Tanno
2012-01-01
The objective of the study was to identify factors associated with reports of road accidents, among motorcycle couriers in two medium-sized municipalities in southern Brazil. A self-administered questionnaire was answered by motorcycle couriers that had worked for at least 12 months in this profession. The outcomes analyzed were reports on accidents and serious accidents over the 12 months prior to the survey. Bivariate and multivariate analyses by means of logistic regression were carried out to investigate factors that were independently associated with the outcomes. Seven hundred and fifty motorcycle couriers, of mean age 29.5 years (standard deviation = 8.1 ), were included in the study. Young age (18 to 24 years compared to ≥25 years, odds ratio [OR] = 1.77) speeding (OR = 1.48), and use of cell phones while driving (OR = 1.43) were factors independently associated with reports of accidents. For serious accidents, there was an association with alternation of work shifts (OR = 1.91) and speeding (OR = 1.67). The characteristics associated with accidents—personal (young age), behavioral (use of cell phones while driving and speeding), and professional (speeding and alternation of work shifts)—reveal the need to adopt wide-ranging strategies to reduce these accidents, including better work conditions for these motorcyclists. PMID:22629158
A game theory-based trust measurement model for social networks.
Wang, Yingjie; Cai, Zhipeng; Yin, Guisheng; Gao, Yang; Tong, Xiangrong; Han, Qilong
2016-01-01
In social networks, trust is a complex social network. Participants in online social networks want to share information and experiences with as many reliable users as possible. However, the modeling of trust is complicated and application dependent. Modeling trust needs to consider interaction history, recommendation, user behaviors and so on. Therefore, modeling trust is an important focus for online social networks. We propose a game theory-based trust measurement model for social networks. The trust degree is calculated from three aspects, service reliability, feedback effectiveness, recommendation credibility, to get more accurate result. In addition, to alleviate the free-riding problem, we propose a game theory-based punishment mechanism for specific trust and global trust, respectively. We prove that the proposed trust measurement model is effective. The free-riding problem can be resolved effectively through adding the proposed punishment mechanism.
ERIC Educational Resources Information Center
de Ruijter, Esther; van der Lippe, Tanja
2009-01-01
This article examines the influence of trust problems on the use of domestic outsourcing by couples from a gender perspective. The authors argue that trust problems matter in outsourcing decisions, because an outsider enters the privacy of the household and takes over tasks of special value. Analyses of data from a survey among 740 Dutch couples…
Code of Federal Regulations, 2011 CFR
2011-04-01
... rise to the level of imminent jeopardy? 1000.363 Section 1000.363 Indians OFFICE OF THE ASSISTANT... Trust Evaluations § 1000.363 What if the trust evaluation reveals problems that do not rise to the level of imminent jeopardy? Where problems not rising to the level of imminent jeopardy are caused by...
Code of Federal Regulations, 2010 CFR
2010-04-01
... rise to the level of imminent jeopardy? 1000.363 Section 1000.363 Indians OFFICE OF THE ASSISTANT... Trust Evaluations § 1000.363 What if the trust evaluation reveals problems that do not rise to the level of imminent jeopardy? Where problems not rising to the level of imminent jeopardy are caused by...
Sharp, Carla; Ha, Carolyn; Fonagy, Peter
2011-05-01
Economic exchange games have rarely been applied to examine psychopathology in youth. In the current study we adapted a trust game to investigate the relations between externalizing behavior problems, trust, and trustworthiness. We were particularly interested in the differential modulating impact of "known identity" (vs. anonymous) condition of the task. Second, we examined whether anomalies in trust behavior would correspond to social cognition manifested in children with externalizing problems. A total of 171 (79 age-matched pairs) boys (mean age = 12.84; SD = 1.80) were recruited from community groups where social networks and relationships amongst peers have been established. A trust game was played under two conditions: an anonymous version where the identity of the trust game partner was not known and a "known identity" version where identities were revealed. Results supported the conclusion that boys with externalizing behavior problems are generally less trustworthy, but not less trusting and that this was true especially for the known identity version of the game. Moreover, anomalies in trust behavior were associated with hostile intentions, but not reflective of a general theory of mind deficit. This study contributes to an emerging literature using economic exchange games to investigate real-time, real-life exchanges in relation to psychopathology.
A trust-based sensor allocation algorithm in cooperative space search problems
NASA Astrophysics Data System (ADS)
Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik
2011-06-01
Sensor allocation is an important and challenging problem within the field of multi-agent systems. The sensor allocation problem involves deciding how to assign a number of targets or cells to a set of agents according to some allocation protocol. Generally, in order to make efficient allocations, we need to design mechanisms that consider both the task performers' costs for the service and the associated probability of success (POS). In our problem, the costs are the used sensor resource, and the POS is the target tracking performance. Usually, POS may be perceived differently by different agents because they typically have different standards or means of evaluating the performance of their counterparts (other sensors in the search and tracking problem). Given this, we turn to the notion of trust to capture such subjective perceptions. In our approach, we develop a trust model to construct a novel mechanism that motivates sensor agents to limit their greediness or selfishness. Then we model the sensor allocation optimization problem with trust-in-loop negotiation game and solve it using a sub-game perfect equilibrium. Numerical simulations are performed to demonstrate the trust-based sensor allocation algorithm in cooperative space situation awareness (SSA) search problems.
The Role of Trust in the Teaching of History
ERIC Educational Resources Information Center
Haynes, Bruce
2018-01-01
This article is an initial exploration of possibilities opened up by considering trust relations as central to the teaching of history in schools. It is an extension of an investigation into epistemological problems to see whether "trust" is a more fruitful concept to use than "truth" in dealing with those problems and is based…
Shin, Jeong-Hun; Jun, Seung-lyul; Hwang, Sung-Yeoun; Ahn, Seong-Hun
2012-01-01
Objectives: This study used the basic principle of Oriental medicine, the sovereign, minister, assistant and courier principle (君臣佐使論) to investigate the effects of the component of ONGABO, which is composed of Ginseng Radix (Red Ginseng), Angelica Gigantis Radix, Schisandrae Fructus, Cuscuta Semen and Curcumae tuber on the viability of HepG2 cells. Methods: Single and mixed extracts of the component of ONGABO were prepared by lypohilizing powder of Red Ginseng (6-year root from Kanghwa), Angelica Gigantis Radix, Schisandrae Fructus, Cuscuta Semen, Curcumae Tuber (from Omniherb Co., Ltd., Korea) at the laboratory of herbal medicine in Woosuk University and were eluted after being macerated with 100% ethanol for three days. The cell viability of HepG2 was determined by using an absorptiometric analysis with PrestoBlue (Invitrogen) reagent after the plate had been incubated for 48 hours. All of the experiments were repeated three times to obtain the average value and standard deviation. The statistical analysis was done and the correlation factor was obtained by using Microsoft Office Excel 2007 and Origin 6.0 software. Results: Although Ginseng Radix (Red Ginseng) and Schisandrae Fructus did not enhance the viability of HepG2 cells, they were shown to provide protection of those cells. On the other hand, Angelica Gigantis Radix decreased the viability of HepG2 cells significantly, Cuscuta Semen and Curcumae Tuber had a small or no effect on the viability of HepG2 cells. Conclusions: In the sovereign, minister, assistant and courier principle (君臣佐使論), Ginseng Radix (Red Ginseng) corresponds to the sovereign component because it provides cell protection effects, Angelica Gigantis Radix corresponds to minister medicinal because it kills cells, Schisandrae Fructus corresponds to the assistant medicinal to help red ginseng having cell protect effects. Cuscuta Semen and Curcumae Tuber correspond to the courier medicinal having no effect in cell viability in HepG2. We hope this study provides motivation for advanced research on the sovereign, minister, assistant and courier principle. PMID:25780653
Shin, Jeong-Hun; Jun, Seung-Lyul; Hwang, Sung-Yeoun; Ahn, Seong-Hun
2012-12-01
This study used the basic principle of Oriental medicine, the sovereign, minister, assistant and courier principle () to investigate the effects of the component of ONGABO, which is composed of Ginseng Radix (Red Ginseng), Angelica Gigantis Radix, Schisandrae Fructus, Cuscuta Semen and Curcumae tuber on the viability of HepG2 cells. Single and mixed extracts of the component of ONGABO were prepared by lypohilizing powder of Red Ginseng (6-year root from Kanghwa), Angelica Gigantis Radix, Schisandrae Fructus, Cuscuta Semen, Curcumae Tuber (from Omniherb Co., Ltd., Korea) at the laboratory of herbal medicine in Woosuk University and were eluted after being macerated with 100% ethanol for three days. The cell viability of HepG2 was determined by using an absorptiometric analysis with PrestoBlue (Invitrogen) reagent after the plate had been incubated for 48 hours. All of the experiments were repeated three times to obtain the average value and standard deviation. The statistical analysis was done and the correlation factor was obtained by using Microsoft Office Excel 2007 and Origin 6.0 software. Although Ginseng Radix (Red Ginseng) and Schisandrae Fructus did not enhance the viability of HepG2 cells, they were shown to provide protection of those cells. On the other hand, Angelica Gigantis Radix decreased the viability of HepG2 cells significantly, Cuscuta Semen and Curcumae Tuber had a small or no effect on the viability of HepG2 cells. In the sovereign, minister, assistant and courier principle (), Ginseng Radix (Red Ginseng) corresponds to the sovereign component because it provides cell protection effects, Angelica Gigantis Radix corresponds to minister medicinal because it kills cells, Schisandrae Fructus corresponds to the assistant medicinal to help red ginseng having cell protect effects. Cuscuta Semen and Curcumae Tuber correspond to the courier medicinal having no effect in cell viability in HepG2. We hope this study provides motivation for advanced research on the sovereign, minister, assistant and courier principle.
Trust estimation of the semantic web using semantic web clustering
NASA Astrophysics Data System (ADS)
Shirgahi, Hossein; Mohsenzadeh, Mehran; Haj Seyyed Javadi, Hamid
2017-05-01
Development of semantic web and social network is undeniable in the Internet world these days. Widespread nature of semantic web has been very challenging to assess the trust in this field. In recent years, extensive researches have been done to estimate the trust of semantic web. Since trust of semantic web is a multidimensional problem, in this paper, we used parameters of social network authority, the value of pages links authority and semantic authority to assess the trust. Due to the large space of semantic network, we considered the problem scope to the clusters of semantic subnetworks and obtained the trust of each cluster elements as local and calculated the trust of outside resources according to their local trusts and trust of clusters to each other. According to the experimental result, the proposed method shows more than 79% Fscore that is about 11.9% in average more than Eigen, Tidal and centralised trust methods. Mean of error in this proposed method is 12.936, that is 9.75% in average less than Eigen and Tidal trust methods.
ERIC Educational Resources Information Center
Yavuz, Ahmet
2015-01-01
This study aims to investigate (1) students' trust in mathematics calculation versus intuition in a physics problem solving and (2) whether this trust is related to achievement in physics in the context of epistemic game theoretical framework. To achieve this research objective, paper-pencil and interview sessions were conducted. A paper-pencil…
DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maiden, Wendy M.
Trust management techniques must be adapted to the unique needs of the application architectures and problem domains to which they are applied. For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, certain characteristics of the mobile agent ant swarm -- their lightweight, ephemeral nature and indirect communication -- make this adaptation especially challenging. This thesis looks at the trust issues and opportunities in swarm-based autonomic computing systems and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and stillmore » serves to protect the swarm. After analyzing the applicability of trust management research as it has been applied to architectures with similar characteristics, this thesis specifies the required characteristics for trust management mechanisms used to monitor the trustworthiness of entities in a swarm-based autonomic computing system and describes a trust model that meets these requirements.« less
Banerjee, Jayeeta; Bhattacharyya, Moushum
2011-12-01
There is a rapid shifting of media: from printed paper to computer screens. This transition is modifying the process of how we read and understand text. The efficiency of reading is dependent on how ergonomically the visual information is presented. Font types and size characteristics have been shown to affect reading. A detailed investigation of the effect of the font type and size on reading on computer screens has been carried out by using subjective, objective and physiological evaluation methods on young adults. A group of young participants volunteered for this study. Two types of fonts were used: Serif fonts (Times New Roman, Georgia, Courier New) and Sans serif fonts (Verdana, Arial, Tahoma). All fonts were presented in 10, 12 and 14 point sizes. This study used a 6 X 3 (font type X size) design matrix. Participants read 18 passages of approximately the same length and reading level on a computer monitor. Reading time, ranking and overall mental workload were measured. Eye movements were recorded by a binocular eye movement recorder. Reading time was minimum for Courier New l4 point. The participants' ranking was highest and mental workload was least for Verdana 14 point. The pupil diameter, fixation duration and gaze duration were least for Courier New 14 point. The present study recommends using 14 point sized fonts for reading on computer screen. Courier New is recommended for fast reading while for on screen presentation Verdana is recommended. The outcome of this study will help as a guideline to all the PC users, software developers, web page designers and computer industry as a whole.
Wang, Raymond Yu; Ng, Cho Nam
2015-01-01
The problem of trust is a paradigmatic social dilemma. Previous literature has paid much academic attention on effects of peer punishment and altruistic third-party punishment on trust and human cooperation in dyadic interactions. However, the effects of centralized sanctioning institutions on decentralized reciprocity in hierarchical interactions remain to be further explored. This paper presents a formal two-level trust game with incomplete information which adds an authority as a strategic purposive actor into the traditional trust game. This model allows scholars to examine the problem of trust in more complex game theoretic configurations. The analysis demonstrates how the centralized institutions might change the dynamics of reciprocity between the trustor and the trustee. Findings suggest that the sequential equilibria of the newly proposed two-level model simultaneously include the risk of placing trust for the trustor and the temptation of short-term defection for the trustee. Moreover, they have shown that even a slight uncertainty about the type of the newly introduced authority might facilitate the establishment of trust and reciprocity in social dilemmas.
Wang, Raymond Yu; Ng, Cho Nam
2015-01-01
The problem of trust is a paradigmatic social dilemma. Previous literature has paid much academic attention on effects of peer punishment and altruistic third-party punishment on trust and human cooperation in dyadic interactions. However, the effects of centralized sanctioning institutions on decentralized reciprocity in hierarchical interactions remain to be further explored. This paper presents a formal two-level trust game with incomplete information which adds an authority as a strategic purposive actor into the traditional trust game. This model allows scholars to examine the problem of trust in more complex game theoretic configurations. The analysis demonstrates how the centralized institutions might change the dynamics of reciprocity between the trustor and the trustee. Findings suggest that the sequential equilibria of the newly proposed two-level model simultaneously include the risk of placing trust for the trustor and the temptation of short-term defection for the trustee. Moreover, they have shown that even a slight uncertainty about the type of the newly introduced authority might facilitate the establishment of trust and reciprocity in social dilemmas. PMID:25879752
Community archiving of imaging studies
NASA Astrophysics Data System (ADS)
Fritz, Steven L.; Roys, Steven R.; Munjal, Sunita
1996-05-01
The quantity of image data created in a large radiology practice has long been a challenge for available archiving technology. Traditional methods ofarchiving the large quantity of films generated in radiology have relied on warehousing in remote sites, with courier delivery of film files for historical comparisons. A digital community archive, accessible via a wide area network, represents a feasible solution to the problem of archiving digital images from a busy practice. In addition, it affords a physician caring for a patient access to imaging studies performed at a variety ofhealthcare institutions without the need to repeat studies. Security problems include both network security issues in the WAN environment and access control for patient, physician and imaging center. The key obstacle to developing a community archive is currently political. Reluctance to participate in a community archive can be reduced by appropriate design of the access mechanisms.
Marital status, social capital, material conditions and self-rated health: a population-based study.
Lindström, Martin
2009-12-01
Associations between marital status and self-rated health were investigated, adjusting for material conditions and trust (social capital). The 2004 public-health survey in Skåne is a cross-sectional study. A total of 27,757 persons aged 18-80 years answered a postal questionnaire, which represents 59% of the random sample. A logistic regression model was used to investigate associations between marital status and self-rated health, adjusting for economic problems and trust. The prevalence of poor self-rated health was 28.7% among men and 33.2% among women. Older respondents, respondents born abroad, with medium/low education, low emotional support, low instrumental support, economic problems, low trust, never married and divorced had significantly higher odds ratios of poor self-rated health than their respective reference group. Low trust was significantly higher among the divorced and unmarried compared to the married/cohabitating. Adjustment for economic problems but not for trust reduced the odds ratios of poor self-rated health among the divorced, which became not significant among men. Never married and the divorced have significantly higher age-adjusted odds ratios of poor self-rated health than the married/cohabitating group. Economic problems but not trust seem to affect the association between marital status and poor self-rated health.
Analysis on the Relationship between Trust Culture and Prejudices in Primary Schools
ERIC Educational Resources Information Center
Erdogan, Cetin
2016-01-01
Problem Statement: Trust is crucial for creating a positive culture in the school environment, which is called as trust culture. On the other hand, prejudice is thought to be a potential barrier for creating trust culture in schools. Thus, it is meaningful to examine the relationship between trust culture and prejudice in schools and then to…
Trust Management in Swarm-Based Autonomic Computing Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maiden, Wendy M.; Haack, Jereme N.; Fink, Glenn A.
2009-07-07
Reputation-based trust management techniques can address issues such as insider threat as well as quality of service issues that may be malicious in nature. However, trust management techniques must be adapted to the unique needs of the architectures and problem domains to which they are applied. Certain characteristics of swarms such as their lightweight ephemeral nature and indirect communication make this adaptation especially challenging. In this paper we look at the trust issues and opportunities in mobile agent swarm-based autonomic systems and find that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust managementmore » problem becomes much more scalable and still serves to protect the swarms. We also analyze the applicability of trust management research as it has been applied to architectures with similar characteristics. Finally, we specify required characteristics for trust management mechanisms to be used to monitor the trustworthiness of the entities in a swarm-based autonomic computing system.« less
The Effects of Individual Communicator Styles on Perceived Faculty Trust
ERIC Educational Resources Information Center
Brimhall, Jack C.
2010-01-01
The research problem addressed in this study was the lack of trust between faculty-principal, faculty-client, and faculty-colleague in U.S. secondary schools. The purpose of the study was to determine the relationship between communicator styles and perceptions of trust. Organizational trust theory served as the theoretical foundation. A…
The Double-System Architecture for Trusted OS
NASA Astrophysics Data System (ADS)
Zhao, Yong; Li, Yu; Zhan, Jing
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture (DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System (TS) and the Security System (SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted Information Channel (TIC) to protect the information flow between TS and SS. In a word, the double system architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.
Trust regions in Kriging-based optimization with expected improvement
NASA Astrophysics Data System (ADS)
Regis, Rommel G.
2016-06-01
The Kriging-based Efficient Global Optimization (EGO) method works well on many expensive black-box optimization problems. However, it does not seem to perform well on problems with steep and narrow global minimum basins and on high-dimensional problems. This article develops a new Kriging-based optimization method called TRIKE (Trust Region Implementation in Kriging-based optimization with Expected improvement) that implements a trust-region-like approach where each iterate is obtained by maximizing an Expected Improvement (EI) function within some trust region. This trust region is adjusted depending on the ratio of the actual improvement to the EI. This article also develops the Kriging-based CYCLONE (CYClic Local search in OptimizatioN using Expected improvement) method that uses a cyclic pattern to determine the search regions where the EI is maximized. TRIKE and CYCLONE are compared with EGO on 28 test problems with up to 32 dimensions and on a 36-dimensional groundwater bioremediation application in appendices supplied as an online supplement available at http://dx.doi.org/10.1080/0305215X.2015.1082350. The results show that both algorithms yield substantial improvements over EGO and they are competitive with a radial basis function method.
Li, Yong; Yuan, Gonglin; Wei, Zengxin
2015-01-01
In this paper, a trust-region algorithm is proposed for large-scale nonlinear equations, where the limited-memory BFGS (L-M-BFGS) update matrix is used in the trust-region subproblem to improve the effectiveness of the algorithm for large-scale problems. The global convergence of the presented method is established under suitable conditions. The numerical results of the test problems show that the method is competitive with the norm method.
Suchsland, Juliane; Winter, Theresa; Greiser, Anne; Streichert, Thomas; Otto, Benjamin; Mayerle, Julia; Runge, Sören; Kallner, Anders; Nauck, Matthias; Petersmann, Astrid
2017-02-01
The innovative pneumatic tube system (iPTS) transports one sample at a time without the use of cartridges and allows rapid sending of samples directly into the bulk loader of a laboratory automation system (LAS). We investigated effects of the iPTS on samples and turn-around time (TAT). During transport, a mini data logger recorded the accelerations in three dimensions and reported them in arbitrary area under the curve (AUC) units. In addition representative quantities of clinical chemistry, hematology and coagulation were measured and compared in 20 blood sample pairs transported by iPTS and courier. Samples transported by iPTS were brought to the laboratory (300 m) within 30 s without adverse effects on the samples. The information retrieved from the data logger showed a median AUC of 7 and 310 arbitrary units for courier and iPTS transport, respectively. This is considerably below the reported limit for noticeable hemolysis of 500 arbitrary units. iPTS reduces TAT by reducing the hands-on time and a fast transport. No differences in the measurement results were found for any of the investigated 36 analytes between courier and iPTS transport. Based on these findings the iPTS was cleared for clinical use in our hospital.
Code of Federal Regulations, 2013 CFR
2013-01-01
... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...
Code of Federal Regulations, 2012 CFR
2012-01-01
... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...
Code of Federal Regulations, 2011 CFR
2011-01-01
... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...
Hampshire, Kate; Hamill, Heather; Mariwah, Simon; Mwanga, Joseph; Amoako-Sakyi, Daniel
2017-09-01
In contexts where healthcare regulation is weak and levels of uncertainty high, how do patients decide whom and what to trust? In this paper, we explore the potential for using Signalling Theory (ST, a form of Behavioural Game Theory) to investigate health-related trust problems under conditions of uncertainty, using the empirical example of 'herbal clinics' in Ghana and Tanzania. Qualitative, ethnographic fieldwork was conducted over an eight-month period (2015-2016) in eight herbal clinics in Ghana and ten in Tanzania, including semi-structured interviews with herbalists (N = 18) and patients (N = 68), plus detailed ethnographic observations and twenty additional key informant interviews. The data were used to explore four ST-derived predictions, relating to herbalists' strategic communication ('signalling') of their trustworthiness to patients, and patients' interpretation of those signals. Signalling Theory is shown to provide a useful analytical framework, allowing us to go beyond the primary trust problem addressed by other researchers - cataloguing observable indicators of trustworthiness - and providing tools for tackling the trickier secondary trust problem, where the trustworthiness of those indicators must be ascertained. Signalling Theory also enables a basis for comparative work between different empirical contexts that share the underlying condition of uncertainty. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.
Code of Federal Regulations, 2014 CFR
2014-01-01
... charges, printing, legal, and professional fees, postage, courier services, and office supplies; and (2... accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges, joint...
George T. Cvetkovich; Patricia L Winter
2002-01-01
Social trust, the willingness to rely on those with formal responsibility to develop policies and make decisions, facilitates effective management of environmental issues, including wildlife management. National polls suggest that the public trusts government agencies to solve environmental problems, yet such trust is low (or non-existent) in areas of controversy, such...
ERIC Educational Resources Information Center
Cin, Cigdem Kentmen
2013-01-01
Although the determinants of trust in governments have received significant attention in the literature on political trust, there has been no attention paid to whether environmental concerns affect governmental trust. Yet, if individuals are worried about local and global environmental degradation, they may think that the government has failed in…
A collaborative filtering recommendation algorithm based on weighted SimRank and social trust
NASA Astrophysics Data System (ADS)
Su, Chang; Zhang, Butao
2017-05-01
Collaborative filtering is one of the most widely used recommendation technologies, but the data sparsity and cold start problem of collaborative filtering algorithms are difficult to solve effectively. In order to alleviate the problem of data sparsity in collaborative filtering algorithm, firstly, a weighted improved SimRank algorithm is proposed to compute the rating similarity between users in rating data set. The improved SimRank can find more nearest neighbors for target users according to the transmissibility of rating similarity. Then, we build trust network and introduce the calculation of trust degree in the trust relationship data set. Finally, we combine rating similarity and trust to build a comprehensive similarity in order to find more appropriate nearest neighbors for target user. Experimental results show that the algorithm proposed in this paper improves the recommendation precision of the Collaborative algorithm effectively.
32 CFR 1802.14 - Transmission.
Code of Federal Regulations, 2010 CFR
2010-07-01
.... mail is approved for SECRET, non-compartmented material; higher classifications require use of approved Top Secret facsimile machines or NACIC-approved couriers. Further information is available from NACIC...
Moros, J; Serrano, J; Gallego, F J; Macías, J; Laserna, J J
2013-06-15
During recent years laser-induced breakdown spectroscopy (LIBS) has been considered one of the techniques with larger ability for trace detection of explosives. However, despite of the high sensitivity exhibited for this application, LIBS suffers from a limited selectivity due to difficulties in assigning the molecular origin of the spectral emissions observed. This circumstance makes the recognition of fingerprints a latent challenging problem. In the present manuscript the sorting of six explosives (chloratite, ammonal, DNT, TNT, RDX and PETN) against a broad list of potential harmless interferents (butter, fuel oil, hand cream, olive oil, …), all of them in the form of fingerprints deposited on the surfaces of objects for courier services, has been carried out. When LIBS information is processed through a multi-stage architecture algorithm built from a suitable combination of 3 learning classifiers, an unknown fingerprint may be labeled into a particular class. Neural network classifiers trained by the Levenberg-Marquardt rule were decided within 3D scatter plots projected onto the subspace of the most useful features extracted from the LIBS spectra. Experimental results demonstrate that the presented algorithm sorts fingerprints according to their hazardous character, although its spectral information is virtually identical in appearance, with rates of false negatives and false positives not beyond of 10%. These reported achievements mean a step forward in the technology readiness level of LIBS for this complex application related to defense, homeland security and force protection. Copyright © 2013 Elsevier B.V. All rights reserved.
78 FR 44519 - Forest Resource Coordinating Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-24
... the addresses below: Nominations sent via express mail or overnight courier service: Maya Solomon...; 1400 Independence Avenue SW., Washington, DC 20250-1123. FOR FURTHER INFORMATION CONTACT: Maya Solomon...
Rebuilding patient trust. Jump in.
Larson, L
2000-06-01
Many people think of hospitals more as businesses than as care providers, and they are wary. As the best connection to their communities, trustees can go a long way to restoring the trust that's gotten lost among the mergers, employee layoffs, and insurance problems. But first, they have to seek community feedback and trust what they hear.
Numerical optimization in Hilbert space using inexact function and gradient evaluations
NASA Technical Reports Server (NTRS)
Carter, Richard G.
1989-01-01
Trust region algorithms provide a robust iterative technique for solving non-convex unstrained optimization problems, but in many instances it is prohibitively expensive to compute high accuracy function and gradient values for the method. Of particular interest are inverse and parameter estimation problems, since function and gradient evaluations involve numerically solving large systems of differential equations. A global convergence theory is presented for trust region algorithms in which neither function nor gradient values are known exactly. The theory is formulated in a Hilbert space setting so that it can be applied to variational problems as well as the finite dimensional problems normally seen in trust region literature. The conditions concerning allowable error are remarkably relaxed: relative errors in the gradient error condition is automatically satisfied if the error is orthogonal to the gradient approximation. A technique for estimating gradient error and improving the approximation is also presented.
TrustRank: a Cold-Start tolerant recommender system
NASA Astrophysics Data System (ADS)
Zou, Haitao; Gong, Zhiguo; Zhang, Nan; Zhao, Wei; Guo, Jingzhi
2015-02-01
The explosive growth of the World Wide Web leads to the fast advancing development of e-commerce techniques. Recommender systems, which use personalised information filtering techniques to generate a set of items suitable to a given user, have received considerable attention. User- and item-based algorithms are two popular techniques for the design of recommender systems. These two algorithms are known to have Cold-Start problems, i.e., they are unable to effectively handle Cold-Start users who have an extremely limited number of purchase records. In this paper, we develop TrustRank, a novel recommender system which handles the Cold-Start problem by leveraging the user-trust networks which are commonly available for e-commerce applications. A user-trust network is formed by friendships or trust relationships that users specify among them. While it is straightforward to conjecture that a user-trust network is helpful for improving the accuracy of recommendations, a key challenge for using user-trust network to facilitate Cold-Start users is that these users also tend to have a very limited number of trust relationships. To address this challenge, we propose a pre-processing propagation of the Cold-Start users' trust network. In particular, by applying the personalised PageRank algorithm, we expand the friends of a given user to include others with similar purchase records to his/her original friends. To make this propagation algorithm scalable to a large amount of users, as required by real-world recommender systems, we devise an iterative computation algorithm of the original personalised TrustRank which can incrementally compute trust vectors for Cold-Start users. We conduct extensive experiments to demonstrate the consistently improvement provided by our proposed algorithm over the existing recommender algorithms on the accuracy of recommendations for Cold-Start users.
Virtual Environment Interpersonal Trust Scale: Validity and Reliability Study
ERIC Educational Resources Information Center
Usta, Ertugrul
2012-01-01
The purpose of this study is in the process of interpersonal communication in virtual environments is available from the trust problem is to develop a measurement tool. Trust in the process of distance education today, and has been a factor to be investigated. People, who take distance education course, they could may remain within the process…
The High Trust Classroom: Raising Achievement from the Inside Out
ERIC Educational Resources Information Center
Moore, Lonnie
2009-01-01
This book provides a roadmap to developing a high-trust classroom, a classroom: (1) With increased student achievement; (2) With few discipline problems; (3) Where students are intrinsically motivated; and (4) Where the teacher can confidently use creative lesson planning. The author presents a simple step by step approach to earning the trust of…
DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maiden, Wendy M.; Dionysiou, Ioanna; Frincke, Deborah A.
2011-02-01
For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, trust management is important for the acceptance of the mobile agent sensors and to protect the system from malicious behavior by insiders and entities that have penetrated network defenses. This paper examines the trust relationships, evidence, and decisions in a representative system and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. We then propose the DualTrust conceptual trust model. By addressing themore » autonomic manager’s bi-directional primary relationships in the ACS architecture, DualTrust is able to monitor the trustworthiness of the autonomic managers, protect the sensor swarm in a scalable manner, and provide global trust awareness for the orchestrating autonomic manager.« less
Davies, Sarah; Salmon, Peter
2017-01-01
Abstract Objective We explored parents' accounts of the parent‐clinician relationship in childhood cancer to understand how parents who perceive threats to the relationship can be supported. Methods Multicentre longitudinal qualitative study, with 67 UK parents of children (aged 1‐12 years) receiving treatment for acute lymphoblastic leukaemia. Analyses drew on the wider sample but focussed on 50 semistructured interviews with 20 parents and were informed by constant comparison. Results All 20 parents described problems with clinical care such as inadequate information or mistakes by staff but varied in how much the problems threatened their sense of relationship with clinicians. Some parents saw the problems as having no relevance to the parent‐clinician relationship. Others saw the problems as threats to the clinical relationship but worked to “contain” the threat in ways that preserved a trusting relationship with at least one senior clinician. Parents' containment work protected the security they needed from the parent‐clinician relationship, but containment was a tenuous process for some. A few parents were unable to contain the problems at all; lacking trust in clinicians, these parents suffered considerably. Conclusions Given the complexity of childhood cancer care, problems with clinical care are inevitable. By engaging in containment work, parents met their needs to feel secure in the face of these problems, but the extent to which parents should have to do this work is debatable. Parents could benefit from support to seek help when problems arise which threaten their trust in clinicians. Attachment theory can guide clinicians in giving this support. PMID:28494129
Buskens, Vincent; Raub, Werner; van Miltenburg, Nynke; Montoya, Estrella R.; van Honk, Jack
2016-01-01
Animal research has established that effects of hormones on social behaviour depend on characteristics of both individual and environment. Insight from research on humans into this interdependence is limited, though. Specifically, hardly any prior testosterone experiments in humans scrutinized the interdependency of testosterone with the social environment. Nonetheless, recent testosterone administration studies in humans repeatedly show that a proxy for individuals’ prenatal testosterone-to-estradiol ratio, second-to-fourth digit-ratio (2D:4D ratio), influences effects of testosterone administration on human social behaviour. Here, we systematically vary the characteristics of the social environment and show that, depending on prenatal sex hormone priming, testosterone administration in women moderates the effect of the social environment on trust. We use the economic trust game and compare one-shot games modelling trust problems in relations between strangers with repeated games modelling trust problems in ongoing relations between partners. As expected, subjects are more trustful in repeated than in one-shot games. In subjects prenatally relatively highly primed by testosterone, however, this effect disappears after testosterone administration. We argue that impairments in cognitive empathy may reduce the repeated game effect on trust after testosterone administration in subjects with relatively high prenatal testosterone exposure and propose a neurobiological explanation for this effect. PMID:27282952
Buskens, Vincent; Raub, Werner; van Miltenburg, Nynke; Montoya, Estrella R; van Honk, Jack
2016-06-10
Animal research has established that effects of hormones on social behaviour depend on characteristics of both individual and environment. Insight from research on humans into this interdependence is limited, though. Specifically, hardly any prior testosterone experiments in humans scrutinized the interdependency of testosterone with the social environment. Nonetheless, recent testosterone administration studies in humans repeatedly show that a proxy for individuals' prenatal testosterone-to-estradiol ratio, second-to-fourth digit-ratio (2D:4D ratio), influences effects of testosterone administration on human social behaviour. Here, we systematically vary the characteristics of the social environment and show that, depending on prenatal sex hormone priming, testosterone administration in women moderates the effect of the social environment on trust. We use the economic trust game and compare one-shot games modelling trust problems in relations between strangers with repeated games modelling trust problems in ongoing relations between partners. As expected, subjects are more trustful in repeated than in one-shot games. In subjects prenatally relatively highly primed by testosterone, however, this effect disappears after testosterone administration. We argue that impairments in cognitive empathy may reduce the repeated game effect on trust after testosterone administration in subjects with relatively high prenatal testosterone exposure and propose a neurobiological explanation for this effect.
Ljunge, Martin
2014-12-01
This paper presents evidence that generalized trust promotes health. Children of immigrants in a broad set of European countries with ancestry from across the world are studied. Individuals are examined within country of residence using variation in trust across countries of ancestry. The approach addresses reverse causality and concerns that the trust measure picks up institutional factors in the individual's contextual setting. There is a significant positive estimate of ancestral trust in explaining self-assessed health. The finding is robust to accounting for individual, parental, and extensive ancestral country characteristics. Individuals with higher ancestral trust are also less likely to be hampered by health problems in their daily life, providing evidence of trust influencing real life outcomes. Individuals with high trust feel and act healthier, enabling a more productive life.
“I feel free”: Experiences of a dance intervention for adolescent girls with internalizing problems
Duberg, Anna; Möller, Margareta; Sunvisson, Helena
2016-01-01
Adolescent girls today suffer from internalizing problems such as somatic symptoms and mental health problems at higher rates compared to those of previous decades, and effective interventions are warranted. The aim of this study was to explore the experiences of participating in an 8-month dance intervention. This qualitative study was embedded in a randomized controlled trial of a dance intervention for adolescent girls with internalizing problems. A total of 112 girls aged 13–18 were included in the study. The dance intervention group comprised 59 girls, 24 of whom were strategically chosen to be interviewed. Data were analyzed using qualitative content analysis with an inductive approach. The experiences of the dance intervention resulted in five generic categories: (1) An Oasis from Stress, which represents the fundamental basis of the intervention; (2) Supportive Togetherness, the setting; (3) Enjoyment and Empowerment, the immediate effect; (4) Finding Acceptance and Trust in Own Ability, the outcome; and (5) Dance as Emotional Expression, the use of the intervention. One main category emerged, Finding Embodied Self-Trust That Opens New Doors, which emphasizes the increased trust in the self and the ability to approach life with a sense of freedom and openness. The central understanding of the adolescent girls’ experiences was that the dance intervention enriched and gave access to personal resources. With the non-judgmental atmosphere and supportive togetherness as a safe platform, the enjoyment and empowerment in dancing gave rise to acceptance, trust in ability, and emotional expression. Taken together, this increased self-trust and they discovered a new ability to “claim space.” Findings from this study may provide practical information on designing future interventions for adolescent girls with internalizing problems. PMID:27416014
"I feel free": Experiences of a dance intervention for adolescent girls with internalizing problems.
Duberg, Anna; Möller, Margareta; Sunvisson, Helena
2016-01-01
Adolescent girls today suffer from internalizing problems such as somatic symptoms and mental health problems at higher rates compared to those of previous decades, and effective interventions are warranted. The aim of this study was to explore the experiences of participating in an 8-month dance intervention. This qualitative study was embedded in a randomized controlled trial of a dance intervention for adolescent girls with internalizing problems. A total of 112 girls aged 13-18 were included in the study. The dance intervention group comprised 59 girls, 24 of whom were strategically chosen to be interviewed. Data were analyzed using qualitative content analysis with an inductive approach. The experiences of the dance intervention resulted in five generic categories: (1) An Oasis from Stress, which represents the fundamental basis of the intervention; (2) Supportive Togetherness, the setting; (3) Enjoyment and Empowerment, the immediate effect; (4) Finding Acceptance and Trust in Own Ability, the outcome; and (5) Dance as Emotional Expression, the use of the intervention. One main category emerged, Finding Embodied Self-Trust That Opens New Doors, which emphasizes the increased trust in the self and the ability to approach life with a sense of freedom and openness. The central understanding of the adolescent girls' experiences was that the dance intervention enriched and gave access to personal resources. With the non-judgmental atmosphere and supportive togetherness as a safe platform, the enjoyment and empowerment in dancing gave rise to acceptance, trust in ability, and emotional expression. Taken together, this increased self-trust and they discovered a new ability to "claim space." Findings from this study may provide practical information on designing future interventions for adolescent girls with internalizing problems.
42 CFR 110.90 - Reconsideration of the Secretary's eligibility and benefits determinations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... carrier or private courier service must be sent to the Associate Administrator, Healthcare Systems Bureau.... (c) Reconsideration process. When the Associate Administrator of the Healthcare Systems Bureau (the...
42 CFR 110.90 - Reconsideration of the Secretary's eligibility and benefits determinations.
Code of Federal Regulations, 2012 CFR
2012-10-01
... carrier or private courier service must be sent to the Associate Administrator, Healthcare Systems Bureau.... (c) Reconsideration process. When the Associate Administrator of the Healthcare Systems Bureau (the...
42 CFR 110.90 - Reconsideration of the Secretary's eligibility and benefits determinations.
Code of Federal Regulations, 2013 CFR
2013-10-01
... carrier or private courier service must be sent to the Associate Administrator, Healthcare Systems Bureau.... (c) Reconsideration process. When the Associate Administrator of the Healthcare Systems Bureau (the...
42 CFR 110.90 - Reconsideration of the Secretary's eligibility and benefits determinations.
Code of Federal Regulations, 2014 CFR
2014-10-01
... carrier or private courier service must be sent to the Associate Administrator, Healthcare Systems Bureau.... (c) Reconsideration process. When the Associate Administrator of the Healthcare Systems Bureau (the...
Analysis on trust influencing factors and trust model from multiple perspectives of online Auction
NASA Astrophysics Data System (ADS)
Yu, Wang
2017-10-01
Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.
Do people trust dentists? Development of the Dentist Trust Scale.
Armfield, J M; Ketting, M; Chrisopoulos, S; Baker, S R
2017-09-01
This study aimed to adapt a measure of trust in physicians to trust in dentists and to assess the reliability and validity of the measure. Questionnaire data were collected from a simple random sample of 596 Australian adults. The 11-item General Trust in Physicians Scale was modified to apply to dentists. The Dentist Trust Scale (DTS) had good internal consistency (α = 0.92) and exploratory factor analysis revealed a single-factor solution. Lower DTS scores were associated with less trust in the dentist last visited, having previously changed dentists due to unhappiness with the care received, currently having dental pain, usual visiting frequency, dental avoidance, and with past experiences of discomfort, gagging, fainting, embarrassment and personal problems with the dentist. The majority of people appear to exhibit trust in dentists. The DTS shows promising reliability and validity evidence. © 2017 Australian Dental Association.
A two-year perspective: who may ease the burden of girls’ loneliness in school?
2014-01-01
Background Loneliness is negatively related to good health and wellbeing, especially among girls. There is little research, however, on factors that may ease the burdens of loneliness in the school setting. Thus, we explored the relationship between girls’ loneliness and later school wellbeing adjusted for other adversities. Furthermore, we assessed the significance of having someone whom the girl trusted by investigating possible modifying influences on the addressed association. Methods Altogether, 119 girls in grades 1–8 provided baseline data and answered the same set of questions two years later. Logistic regression models including perceived academic problems, victimisation by bullying, loneliness and trusted others were tested with bad versus good school wellbeing two years later as outcome using SPSS. Results In the multivariable analysis of loneliness, academic problems, and victimisation, loneliness was the only variable showing a strong and negative contribution to later school wellbeing. Next, demonstrated in separate models; the inclusion of having a trusted class advisor fully attenuated the association of loneliness with later school wellbeing. In contrast, other trusted teachers, trusted parents, or trusted students did not affect the association. Conclusions Loneliness in girls strongly predicted school wellbeing two years later. However, having a class advisor whom the girl trusted to contact in hurtful situations clearly reduced the burden of loneliness. This finding highlights the clinical importance of stability, long-lasting relations, and trust that main teachers may represent for lonely girls. PMID:24712912
Davies, Sarah; Salmon, Peter; Young, Bridget
2017-09-01
We explored parents' accounts of the parent-clinician relationship in childhood cancer to understand how parents who perceive threats to the relationship can be supported. Multicentre longitudinal qualitative study, with 67 UK parents of children (aged 1-12 years) receiving treatment for acute lymphoblastic leukaemia. Analyses drew on the wider sample but focussed on 50 semistructured interviews with 20 parents and were informed by constant comparison. All 20 parents described problems with clinical care such as inadequate information or mistakes by staff but varied in how much the problems threatened their sense of relationship with clinicians. Some parents saw the problems as having no relevance to the parent-clinician relationship. Others saw the problems as threats to the clinical relationship but worked to "contain" the threat in ways that preserved a trusting relationship with at least one senior clinician. Parents' containment work protected the security they needed from the parent-clinician relationship, but containment was a tenuous process for some. A few parents were unable to contain the problems at all; lacking trust in clinicians, these parents suffered considerably. Given the complexity of childhood cancer care, problems with clinical care are inevitable. By engaging in containment work, parents met their needs to feel secure in the face of these problems, but the extent to which parents should have to do this work is debatable. Parents could benefit from support to seek help when problems arise which threaten their trust in clinicians. Attachment theory can guide clinicians in giving this support. © 2017 The Authors. Psycho-Oncology Published by John Wiley & Sons Ltd.
ERIC Educational Resources Information Center
Mikhaylova, Anna; Popova, Liudmila
2016-01-01
The research consists in studying the level of population's trust in nasleg administration (in the administrative-territorial unit) of MS "Khatyryksky nasleg" of Namsky ulus using the case study. The leading research methods for the problem are empirical methods that allow revealing the level of population's trust in administration. The…
Chemically Enhanced Trust: Potential Law Enforcement and Military Applications for Oxytocin
2007-12-01
Breaking Cooperative Relationships, ed. Diego Gambetta, 213-237. Oxford: Basil Blackwell, 1988, 218. 17 Niklas Luhmann. “Familiarity, Confidence, Trust...Problems and Alternatives.” In Trust: Making and Breaking Cooperative Relationships, ed. Diego Gambetta, 94-107. Oxford: Basil Blackwell, 1988, 95...Relationships, ed. Diego Gambetta, 94-107. Oxford: Basil Blackwell, 1988, 166. 171 Karen S. Cook, Russell Hardin and Margaret Levi. Cooperation Without
49 CFR 375.403 - How must I provide a binding estimate?
Code of Federal Regulations, 2010 CFR
2010-10-01
... may be done through fax transmissions; e-mail; overnight courier; or certified mail, return receipt... section), constitutes a failure to transport a shipment with “reasonable dispatch” and subjects you to...
Program Contacts and Mailing/Courier Information
This page provides the contact information for the staff at EPA responsible for the different sections of the Review of New Chemicals program, including contacts for PMN Prenotice and Exemptions and the Central Data Exchange program.
Verow, P; Hargreaves, C
2000-05-01
Sandwell Healthcare NHS Trust has been developing a tool for monitoring the reasons and costs of long-term sick leave (> 7 days). The data obtained from this process has been used to modify the type of occupational health and safety services provided for the Trust. Adoption of more standardized tools of this nature throughout the National Health Service (NHS) would help trusts to compare, and where appropriate enhance, the services provided by occupational health. Musculo-skeletal and mental health problems, account for the greatest costs arising from long-term sickness absence. It may therefore be prudent for NHS employers and their occupational health services to target their efforts on these particular problems.
Political Trust and Sophistication: Taking Measurement Seriously.
Turper, Sedef; Aarts, Kees
2017-01-01
Political trust is an important indicator of political legitimacy. Hence, seemingly decreasing levels of political trust in Western democracies have stimulated a growing body of research on the causes and consequences of political trust. However, the neglect of potential measurement problems of political trust raises doubts about the findings of earlier studies. The current study revisits the measurement of political trust and re-examines the relationship between political trust and sophistication in the Netherlands by utilizing European Social Survey (ESS) data across five time points and four-wave panel data from the Panel Component of ESS. Our findings illustrate that high and low political sophistication groups display different levels of political trust even when measurement characteristics of political trust are taken into consideration. However, the relationship between political sophistication and political trust is weaker than it is often suggested by earlier research. Our findings also provide partial support for the argument that the gap between sophistication groups is widening over time. Furthermore, we demonstrate that, although the between-method differences between the latent means and the composite score means of political trust for high- and low sophistication groups are relatively minor, it is important to analyze the measurement characteristics of the political trust construct.
Managing Trust in Online Social Networks
NASA Astrophysics Data System (ADS)
Bhuiyan, Touhid; Josang, Audun; Xu, Yue
In recent years, there is a dramatic growth in number and popularity of online social networks. There are many networks available with more than 100 million registered users such as Facebook, MySpace, QZone, Windows Live Spaces etc. People may connect, discover and share by using these online social networks. The exponential growth of online communities in the area of social networks attracts the attention of the researchers about the importance of managing trust in online environment. Users of the online social networks may share their experiences and opinions within the networks about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Recommendations may be received through a chain of friends network, so the problem for the user is to be able to evaluate various types of trust opinions and recommendations. This opinion or recommendation has a great influence to choose to use or enjoy the item by the other user of the community. Collaborative filtering system is the most popular method in recommender system. The task in collaborative filtering is to predict the utility of items to a particular user based on a database of user rates from a sample or population of other users. Because of the different taste of different people, they rate differently according to their subjective taste. If two people rate a set of items similarly, they share similar tastes. In the recommender system, this information is used to recommend items that one participant likes, to other persons in the same cluster. But the collaborative filtering system performs poor when there is insufficient previous common rating available between users; commonly known as cost start problem. To overcome the cold start problem and with the dramatic growth of online social networks, trust based approach to recommendation has emerged. This approach assumes a trust network among users and makes recommendations based on the ratings of the users that are directly or indirectly trusted by the target user.
Limited-memory trust-region methods for sparse relaxation
NASA Astrophysics Data System (ADS)
Adhikari, Lasith; DeGuchy, Omar; Erway, Jennifer B.; Lockhart, Shelby; Marcia, Roummel F.
2017-08-01
In this paper, we solve the l2-l1 sparse recovery problem by transforming the objective function of this problem into an unconstrained differentiable function and applying a limited-memory trust-region method. Unlike gradient projection-type methods, which uses only the current gradient, our approach uses gradients from previous iterations to obtain a more accurate Hessian approximation. Numerical experiments show that our proposed approach eliminates spurious solutions more effectively while improving computational time.
CONORBIT: constrained optimization by radial basis function interpolation in trust regions
Regis, Rommel G.; Wild, Stefan M.
2016-09-26
Here, this paper presents CONORBIT (CONstrained Optimization by Radial Basis function Interpolation in Trust regions), a derivative-free algorithm for constrained black-box optimization where the objective and constraint functions are computationally expensive. CONORBIT employs a trust-region framework that uses interpolating radial basis function (RBF) models for the objective and constraint functions, and is an extension of the ORBIT algorithm. It uses a small margin for the RBF constraint models to facilitate the generation of feasible iterates, and extensive numerical tests confirm that such a margin is helpful in improving performance. CONORBIT is compared with other algorithms on 27 test problems, amore » chemical process optimization problem, and an automotive application. Numerical results show that CONORBIT performs better than COBYLA, a sequential penalty derivative-free method, an augmented Lagrangian method, a direct search method, and another RBF-based algorithm on the test problems and on the automotive application.« less
7 CFR 91.40 - Fees for courier service and facsimile of the analysis report.
Code of Federal Regulations, 2011 CFR
2011-01-01
... (CONTINUED) COMMODITY LABORATORY TESTING PROGRAMS SERVICES AND GENERAL INFORMATION Fees and Charges § 91.40... the shortest round trip route from laboratory to sample retrieval site. Pursuant to the requirements...
7 CFR 91.40 - Fees for courier service and facsimile of the analysis report.
Code of Federal Regulations, 2014 CFR
2014-01-01
... (CONTINUED) COMMODITY LABORATORY TESTING PROGRAMS SERVICES AND GENERAL INFORMATION Fees and Charges § 91.40... the shortest round trip route from laboratory to sample retrieval site. Pursuant to the requirements...
7 CFR 91.40 - Fees for courier service and facsimile of the analysis report.
Code of Federal Regulations, 2012 CFR
2012-01-01
... (CONTINUED) COMMODITY LABORATORY TESTING PROGRAMS SERVICES AND GENERAL INFORMATION Fees and Charges § 91.40... the shortest round trip route from laboratory to sample retrieval site. Pursuant to the requirements...
7 CFR 91.40 - Fees for courier service and facsimile of the analysis report.
Code of Federal Regulations, 2013 CFR
2013-01-01
... (CONTINUED) COMMODITY LABORATORY TESTING PROGRAMS SERVICES AND GENERAL INFORMATION Fees and Charges § 91.40... the shortest round trip route from laboratory to sample retrieval site. Pursuant to the requirements...
7 CFR 91.40 - Fees for courier service and facsimile of the analysis report.
Code of Federal Regulations, 2010 CFR
2010-01-01
... (CONTINUED) COMMODITY LABORATORY TESTING PROGRAMS SERVICES AND GENERAL INFORMATION Fees and Charges § 91.40... the shortest round trip route from laboratory to sample retrieval site. Pursuant to the requirements...
77 FR 20994 - Changes in Flood Elevation Determinations
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-09
...; Thomas, Jr., Mayor, City The Coastal Courier. of Hinesville, 115 East Martin Luther King, Jr. Drive...). August 18, 2011; Cook, Mayor, City of El The El Paso Times. Paso, 2 Civic Center Plaza, 10th Floor, El...
78 FR 8434 - Dairy Tariff-Rate Import Quota Licensing Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-06
..., hand delivery, or courier: Abdelsalam El-Farra, Agricultural Marketing Specialist, Sugar and Dairy...-Farra, Agricultural Marketing Specialist, Sugar and Dairy Branch, Import Programs and Export Reporting..., February 6, 2013 / Proposed Rules#0;#0; [[Page 8434
78 FR 2950 - Proposed Posting and Posting of Stockyards
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-15
... . Follow the online instructions for submitting comments. Mail, hand deliver, or courier to Dexter Thomas... poultry dealers in the livestock, poultry, and meatpacking industries. Section 302 of the P&S Act (7 U.S.C...
Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones.
Caballero-Gil, Cándido; Caballero-Gil, Pino; Molina-Gil, Jezabel; Martín-Fernández, Francisco; Loia, Vincenzo
2017-01-27
One of the worst traffic problems today is the existence of huge traffic jams in almost any big city, produced by the large number of commuters using private cars. This problem has led to an increase in research on the optimization of vehicle occupancy in urban areas as this would help to solve the problem that most cars are occupied by single passengers. The solution of sharing the available seats in cars, known as carpooling, is already available in major cities around the world. However, carpooling is still not considered a safe and reliable solution for many users. With the widespread use of mobile technology and social networks, it is possible to create a trust-based platform to promote carpooling through a convenient, fast and secure system. The main objective of this work is the design and implementation of a carpool system that improves some important aspects of previous systems, focusing on trust between users, and on the security of the system. The proposed system guarantees user privacy and measures trust levels through a new reputation algorithm. In addition to this, the proposal has been developed as a mobile application for devices using the Android Open Source Project.
Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones
Caballero-Gil, Cándido; Caballero-Gil, Pino; Molina-Gil, Jezabel; Martín-Fernández, Francisco; Loia, Vincenzo
2017-01-01
One of the worst traffic problems today is the existence of huge traffic jams in almost any big city, produced by the large number of commuters using private cars. This problem has led to an increase in research on the optimization of vehicle occupancy in urban areas as this would help to solve the problem that most cars are occupied by single passengers. The solution of sharing the available seats in cars, known as carpooling, is already available in major cities around the world. However, carpooling is still not considered a safe and reliable solution for many users. With the widespread use of mobile technology and social networks, it is possible to create a trust-based platform to promote carpooling through a convenient, fast and secure system. The main objective of this work is the design and implementation of a carpool system that improves some important aspects of previous systems, focusing on trust between users, and on the security of the system. The proposed system guarantees user privacy and measures trust levels through a new reputation algorithm. In addition to this, the proposal has been developed as a mobile application for devices using the Android Open Source Project. PMID:28134803
Study on Cloud Security Based on Trust Spanning Tree Protocol
NASA Astrophysics Data System (ADS)
Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing
2015-09-01
Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.
On Trust Evaluation in Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Nguyen, Dang Quan; Lamont, Louise; Mason, Peter C.
Trust has been considered as a social relationship between two individuals in human society. But, as computer science and networking have succeeded in using computers to automate many tasks, the concept of trust can be generalized to cover the reliability and relationships of non-human interaction, such as, for example, information gathering and data routing. This paper investigates the evaluation of trust in the context of ad hoc networks. Nodes evaluate each other’s behaviour based on observables. A node then decides whether to trust another node to have certain innate abilities. We show how accurate such an evaluation could be. We also provide the minimum number of observations required to obtain an accurate evaluation, a result that indicates that observation-based trust in ad hoc networks will remain a challenging problem. The impact of making networking decisions using trust evaluation on the network connectivity is also examined. In this manner, quantitative decisions can be made concerning trust-based routing with the knowledge of the potential impact on connectivity.
Facilitation of Risk Communication During the Anthrax Attacks of 2001: The Organizational Backstory
Chess, Caron; Clarke, Lee
2007-01-01
The anthrax attacks of 2001 created risk communication problems that cannot be fully understood without appreciating the dynamics among organizations. Case studies of communication in New Jersey, consisting of interviews with a range of participants, found that existing organizational and professional networks facilitated trust among decisionmakers. This interpersonal trust improved communication among agencies and thereby risk communication with the public. For example, “white powder scares” were a problem even in places without contamination. Professionals’ trust in each other was vital for responding productively. Conversely, organizational challenges, including conflict among agencies, hindered communication with key audiences. Although centralization and increased control are often seen as the remedy for communicative confusion, they also can quash the improvisational responses needed during crises. PMID:17666692
Facilitation of risk communication during the anthrax attacks of 2001: the organizational backstory.
Chess, Caron; Clarke, Lee
2007-09-01
The anthrax attacks of 2001 created risk communication problems that cannot be fully understood without appreciating the dynamics among organizations. Case studies of communication in New Jersey, consisting of interviews with a range of participants, found that existing organizational and professional networks facilitated trust among decisionmakers. This interpersonal trust improved communication among agencies and thereby risk communication with the public. For example, "white powder scares" were a problem even in places without contamination. Professionals' trust in each other was vital for responding productively. Conversely, organizational challenges, including conflict among agencies, hindered communication with key audiences. Although centralization and increased control are often seen as the remedy for communicative confusion, they also can quash the improvisational responses needed during crises.
News Media Exits for Depleted Uranium and Depleted UF6 Articles
hexafluoride, uranium privatization, Paducah, and Portsmouth. The New York Times The Washington Post The Chicago Tribune The Kentucky Post Dayton Daily News USA Today The Courier Journal The Wall Street Journal
31 CFR 543.702 - Pre-Penalty Notice; settlement.
Code of Federal Regulations, 2010 CFR
2010-07-01
... paragraph. The failure to submit a response within the applicable time period set forth in this paragraph... Assets Control by courier) on or before the 30th day after the postmark date on the envelope in which the...
Linking the subcultures of physics: virtual empiricism and the bonding role of trust.
Reyes-Galindo, Luis
2014-10-01
This article draws on empirical material concerning the communication and use of knowledge in experimental physics and its relations to the culture of theoretical physics. The role that trust plays in these interactions is used to create a model of social distance between interacting theoretical and experimental cultures. This article thus seeks to reintroduce trust as a fundamental element in answering the problem of disunity in the sociology of knowledge.
A note on the history of the Norwegian Psychoanalytic Society from 1933 to 1945.
Anthi, Per; Haugsgjerd, Svein
2013-08-01
The Norwegian analysts, who were trained in Berlin before 1933, were drawn into a struggle against fascism, informed by politically leftist analysts who worked at the Berlin Institute. The Norwegian group, including the analysts Wilhelm Reich and Otto Fenichel, were committed to Marxist or social democratic ideologies in order to fight down fascism and Nazism. They were a source of inspiration but also of conflict. After the war the leadership of the IPA was sceptical about the Norwegian group because of its former connections with Die Linke, as well as its relations with Wilhelm Reich. This paper in part considers the courageous efforts of Nic Waal, whom Ernest Jones used as a delegate and courier to solve problems for the IPA and who was unjustly treated after the war. Copyright © 2013 Institute of Psychoanalysis.
30 CFR 243.200 - How do I demonstrate financial solvency?
Code of Federal Regulations, 2010 CFR
2010-07-01
.... Postal Service or private delivery at P.O. Box 5760, MS 3031, Denver, CO 80217-5760; or (2) Courier or overnight delivery at MS 3031, Denver Federal Center, Bldg. 85, Room A-212, Denver, CO 80225-0165. (b) You...
78 FR 28204 - Agency Information Collection Activities; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-14
... Delivery/Courier: Consumer Financial Protection Bureau (Attention: PRA Office), 1700 G Street NW... for additional information should be directed to the Consumer Financial Protection Bureau, (Attention.... They also contain rules about advertising deposit accounts and overdraft services. Regulation DD...
NASA Compendium of Satellite Communications Programs
NASA Technical Reports Server (NTRS)
1973-01-01
A comprehensive review is presented of worldwide communication programs that range in time from the inception of satellite communications to August 1971. The programs included are: Echo, Courier, West Ford, Telstar, Relay, Syncom, Lincoln experimental satellites, Intelsat, Tacsat, Skynet, Nato system, and Telesat.
Frerichs, Leah; Kim, Mimi; Dave, Gaurav; Cheney, Ann; Hassmiller Lich, Kristen; Jones, Jennifer; Young, Tiffany L; Cene, Crystal W; Varma, Deepthi S; Schaal, Jennifer; Black, Adina; Striley, Catherine W; Vassar, Stefanie; Sullivan, Greer; Cottler, Linda B; Brown, Arleen; Burke, Jessica G; Corbie-Smith, Giselle
2017-02-01
Community-academic research partnerships aim to build stakeholder trust in order to improve the reach and translation of health research, but there is limited empirical research regarding effective ways to build trust. This multisite study was launched to identify similarities and differences among stakeholders' perspectives of antecedents to trust in research partnerships. In 2013-2014, we conducted a mixed-methods concept mapping study with participants from three major stakeholder groups who identified and rated the importance of different antecedents of trust on a 5-point Likert-type scale. Study participants were community members ( n = 66), health care providers ( n = 38), and academic researchers ( n = 44). All stakeholder groups rated "authentic communication" and "reciprocal relationships" the highest in importance. Community members rated "communication/methodology to resolve problems" ( M = 4.23, SD = 0.58) significantly higher than academic researchers ( M = 3.87, SD = 0.67) and health care providers ( M = 3.89, SD = 0.62; p < .01) and had different perspectives regarding the importance of issues related to "sustainability." The importance of communication and relationships across stakeholders indicates the importance of colearning processes that involve the exchange of knowledge and skills. The differences uncovered suggest specific areas where attention and skill building may be needed to improve trust within partnerships. More research on how partnerships can improve communication specific to problem solving and sustainability is merited.
Highway funding : problems with Highway Trust Fund information can affect state highway funds
DOT National Transportation Integrated Search
2000-06-01
The Transportation Equity Act for the 21st Century (TEA-21) authorized $217.9 billion for highway, mass transit, and other surface transportation programs for fiscal years 1998 through 2003. TEA-21 continued the use of the Highway Trust Fund-which is...
Mizutani, Eiji; Demmel, James W
2003-01-01
This paper briefly introduces our numerical linear algebra approaches for solving structured nonlinear least squares problems arising from 'multiple-output' neural-network (NN) models. Our algorithms feature trust-region regularization, and exploit sparsity of either the 'block-angular' residual Jacobian matrix or the 'block-arrow' Gauss-Newton Hessian (or Fisher information matrix in statistical sense) depending on problem scale so as to render a large class of NN-learning algorithms 'efficient' in both memory and operation costs. Using a relatively large real-world nonlinear regression application, we shall explain algorithmic strengths and weaknesses, analyzing simulation results obtained by both direct and iterative trust-region algorithms with two distinct NN models: 'multilayer perceptrons' (MLP) and 'complementary mixtures of MLP-experts' (or neuro-fuzzy modular networks).
Trusted computing strengthens cloud authentication.
Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba
2014-01-01
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.
Trusted Computing Strengthens Cloud Authentication
2014-01-01
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. PMID:24701149
Trust-aware recommendation for improving aggregate diversity
NASA Astrophysics Data System (ADS)
Liu, Haifeng; Bai, Xiaomei; Yang, Zhuo; Tolba, Amr; Xia, Feng
2015-10-01
Recommender systems are becoming increasingly important and prevalent because of the ability of solving information overload. In recent years, researchers are paying increasing attention to aggregate diversity as a key metric beyond accuracy, because improving aggregate recommendation diversity may increase long tails and sales diversity. Trust is often used to improve recommendation accuracy. However, how to utilize trust to improve aggregate recommendation diversity is unexplored. In this paper, we focus on solving this problem and propose a novel trust-aware recommendation method by incorporating time factor into similarity computation. The rationale underlying the proposed method is that, trustees with later creation time of trust relation can bring more diverse items to recommend to their trustors than other trustees with earlier creation time of trust relation. Through relevant experiments on publicly available dataset, we demonstrate that the proposed method outperforms the baseline method in terms of aggregate diversity while maintaining almost the same recall.
Trust recovery model of Ad Hoc network based on identity authentication scheme
NASA Astrophysics Data System (ADS)
Liu, Jie; Huan, Shuiyuan
2017-05-01
Mobile Ad Hoc network trust model is widely used to solve mobile Ad Hoc network security issues. Aiming at the problem of reducing the network availability caused by the processing of malicious nodes and selfish nodes in mobile Ad Hoc network routing based on trust model, an authentication mechanism based on identity authentication mobile Ad Hoc network is proposed, which uses identity authentication to identify malicious nodes, And trust the recovery of selfish nodes in order to achieve the purpose of reducing network congestion and improving network quality. The simulation results show that the implementation of the mechanism can effectively improve the network availability and security.
Filtering SPAM in P2PSIP Communities with Web of Trust
NASA Astrophysics Data System (ADS)
Heikkilä, Juho; Gurtov, Andrei
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasingly popular, proliferation of spam calls is only a matter of time. As SIP identity scheme is practically similar to email, those share the same threats. We utilized Host Identity Protocol (HIP) to provide basic security, such as end-to-end encryption. To provide call filtering, however, other tools are needed. In this paper, we suggest applying trust paths familiar from the PGP web of trust to prevent unwanted communication in P2PSIP communities.
Understanding factors that influence stakeholder trust of natural resource science and institutions.
Gray, Steven; Shwom, Rachael; Jordan, Rebecca
2012-03-01
Building trust between resource users and natural resource institutions is essential when creating conservation policies that rely on stakeholders to be effective. Trust can enable the public and agencies to engage in cooperative behaviors toward shared goals and address shared problems. Despite the increasing attention that trust has received recently in the environmental management literature, the influence that individual cognitive and behavioral factors may play in influencing levels of trust in resource management institutions, and their associated scientific assessments, remains unclear. This paper uses the case of fisheries management in the northeast to explore the relationships between an individual's knowledge of the resource, perceptions of resource health, and participatory experience on levels of trust. Using survey data collected from 244 avid recreational anglers in the Northeast U.S., we test these relationships using structural equation modeling. Results indicate that participation in fisheries management is associated with increased trust across all aspects of fisheries management. In addition, higher ratings of resource health by anglers are associated with higher levels of trust of state and regional institutions, but not federal institutions or scientific methods.
Understanding Factors That Influence Stakeholder Trust of Natural Resource Science and Institutions
NASA Astrophysics Data System (ADS)
Gray, Steven; Shwom, Rachael; Jordan, Rebecca
2012-03-01
Building trust between resource users and natural resource institutions is essential when creating conservation policies that rely on stakeholders to be effective. Trust can enable the public and agencies to engage in cooperative behaviors toward shared goals and address shared problems. Despite the increasing attention that trust has received recently in the environmental management literature, the influence that individual cognitive and behavioral factors may play in influencing levels of trust in resource management institutions, and their associated scientific assessments, remains unclear. This paper uses the case of fisheries management in the northeast to explore the relationships between an individual's knowledge of the resource, perceptions of resource health, and participatory experience on levels of trust. Using survey data collected from 244 avid recreational anglers in the Northeast U.S., we test these relationships using structural equation modeling. Results indicate that participation in fisheries management is associated with increased trust across all aspects of fisheries management. In addition, higher ratings of resource health by anglers are associated with higher levels of trust of state and regional institutions, but not federal institutions or scientific methods.
A Multidisciplinary Osteoporosis Service-Based Action Research Study
ERIC Educational Resources Information Center
Whitehead, Dean; Keast, John; Montgomery, Val; Hayman, Sue
2004-01-01
Objective: To investigate an existing Trust-based osteoporosis service's preventative activity, determine any issues and problems and use this data to reorganise the service, as part of a National Health Service Executive/Regional Office-commissioned and funded study. Setting: A UK Hospital Trust's Osteoporosis Service. Design & Method: A…
ERIC Educational Resources Information Center
Provenzano, Dominic
1987-01-01
Describes the current activities of 11 individuals who were prominent in the information industry at the time of Online Magazine's debut. Included are the founders of Congressional Information Service, New York Times Information Bank, Data Courier, Inc., Predicasts, Bibliographic Retrieval Services, Dialog, LEXIS and NEXIS. (EM)
42 CFR 102.90 - Reconsideration of the Secretary's eligibility and benefits determinations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... to the Associate Administrator, Healthcare Systems Bureau, Health Resources and Services... carrier or private courier service must be sent to the Associate Administrator, Healthcare Systems Bureau.... When the Associate Administrator of the Healthcare Systems Bureau (the Associate Administrator...
42 CFR 102.90 - Reconsideration of the Secretary's eligibility and benefits determinations.
Code of Federal Regulations, 2014 CFR
2014-10-01
... to the Associate Administrator, Healthcare Systems Bureau, Health Resources and Services... carrier or private courier service must be sent to the Associate Administrator, Healthcare Systems Bureau.... When the Associate Administrator of the Healthcare Systems Bureau (the Associate Administrator...
42 CFR 102.90 - Reconsideration of the Secretary's eligibility and benefits determinations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... to the Associate Administrator, Healthcare Systems Bureau, Health Resources and Services... carrier or private courier service must be sent to the Associate Administrator, Healthcare Systems Bureau.... When the Associate Administrator of the Healthcare Systems Bureau (the Associate Administrator...
42 CFR 102.90 - Reconsideration of the Secretary's eligibility and benefits determinations.
Code of Federal Regulations, 2012 CFR
2012-10-01
... to the Associate Administrator, Healthcare Systems Bureau, Health Resources and Services... carrier or private courier service must be sent to the Associate Administrator, Healthcare Systems Bureau.... When the Associate Administrator of the Healthcare Systems Bureau (the Associate Administrator...
42 CFR 102.90 - Reconsideration of the Secretary's eligibility and benefits determinations.
Code of Federal Regulations, 2013 CFR
2013-10-01
... to the Associate Administrator, Healthcare Systems Bureau, Health Resources and Services... carrier or private courier service must be sent to the Associate Administrator, Healthcare Systems Bureau.... When the Associate Administrator of the Healthcare Systems Bureau (the Associate Administrator...
75 FR 31749 - International Standard-Setting Activities
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
... DEPARTMENT OF AGRICULTURE Food Safety and Inspection Service [Docket No. FSIS-2009-0033] International Standard-Setting Activities AGENCY: Office of Food Safety, USDA. ACTION: Notice. SUMMARY: This..., and hand- or courier-delivered items: Send to Docket Clerk, U.S. Department of Agriculture, Food...
77 FR 24713 - Ocean Transportation Intermediary License Revocation
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-25
.... Reason: Voluntarily surrendered license. License Number: 019289N. Name: Aramex International Courier, Ltd., dba Aramex. Address: 182-25 150th Avenue, Springfield Gardens, NY 11413. Date Revoked: April 13, 2012. Reason: Voluntarily surrendered license. License Number: 020597N. Name: Ferrara International Worldwide...
How does trust affect patient preferences for participation in decision-making?
Kraetschmer, Nancy; Sharpe, Natasha; Urowitz, Sara; Deber, Raisa B
2004-12-01
Does trust in physicians aid or hinder patient autonomy? We examine the relationship between trust in the recipient's doctor, and desire for a participative role in decisions about medical treatment. We conducted a cross-sectional survey in an urban Canadian teaching hospital. A total of 606 respondents in three clinics (breast cancer, prostate cancer, fracture) completed questionnaires. The instrument included the Problem Solving Decision Making (PSDM) Scale, which used two vignettes (current health condition, chest pain) to categorize respondents by preferred role, and the Trust-in-Physician Scale. Few respondents preferred an autonomous role (2.9% for the current health condition vignette and 1.2% for the chest pain vignette); most preferred shared decision-making (DM) (67.3% current health condition; 48.7% chest pain) or a passive role (29.6% current health condition; 50.1% chest pain). Trust-in-physician yielded 6.3% with blind trust, 36.1% with high trust, 48.6% moderate trust and 9.0% low trust. As hypothesized, autonomous patients had relatively low levels of trust, passive respondents were more likely to have blind trust, while shared respondents had high but not excessive trust. Trust had a significant influence on preferred role even after controlling for the demographic factors such as sex, age and education. Very few respondents wish an autonomous role; those who do tend to have lower trust in their providers. Familiarity with a clinical condition increases desire for a shared (as opposed to passive) role. Shared DM often accompanies, and may require, a trusting patient-physician relationship.
Self-adaptive trust based ABR protocol for MANETs using Q-learning.
Kumar, Anitha Vijaya; Jeyapal, Akilandeswari
2014-01-01
Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.
Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning
Jeyapal, Akilandeswari
2014-01-01
Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243
Numerical study of a matrix-free trust-region SQP method for equality constrained optimization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heinkenschloss, Matthias; Ridzal, Denis; Aguilo, Miguel Antonio
2011-12-01
This is a companion publication to the paper 'A Matrix-Free Trust-Region SQP Algorithm for Equality Constrained Optimization' [11]. In [11], we develop and analyze a trust-region sequential quadratic programming (SQP) method that supports the matrix-free (iterative, in-exact) solution of linear systems. In this report, we document the numerical behavior of the algorithm applied to a variety of equality constrained optimization problems, with constraints given by partial differential equations (PDEs).
Tomlinson, Robert
2018-05-01
Reacting to a never event is difficult and often embarrassing for staff involved. East Lancashire Hospitals NHS Trust has demonstrated that treating staff with respect after a never event, creates an open culture that encourages problem solving and service improvement. The approach has allowed learning to be shared and paved the way for the trust to be the first in the UK to launch the patient centric behavioural noise reduction strategy 'Below ten thousand'.
Markby, Jessica; Boeke, Caroline; Penazzato, Martina; Urick, Brittany; Ghadrshenas, Anisa; Harris, Lindsay; Ford, Nathan; Peter, Trevor
2017-01-01
Background: Despite significant gains made toward improving access, early infant diagnosis (EID) testing programs suffer from long test turnaround times that result in substantial loss to follow-up and mortality associated with delays in antiretroviral therapy initiation. These delays in treatment initiation are particularly impactful because of significant HIV-related infant mortality observed by 2–3 months of age. Short message service (SMS) and general packet radio service (GPRS) printers allow test results to be transmitted immediately to health care facilities on completion of testing in the laboratory. Methods: We conducted a systematic review and meta-analysis to assess the benefit of using SMS/GPRS printers to increase the efficiency of EID test result delivery compared with traditional courier paper–based results delivery methods. Results: We identified 11 studies contributing data for over 16,000 patients from East and Southern Africa. The test turnaround time from specimen collection to result received at the health care facility with courier paper–based methods was 68.0 days (n = 6835), whereas the test turnaround time with SMS/GPRS printers was 51.1 days (n = 6711), resulting in a 2.5-week (25%) reduction in the turnaround time. Conclusions: Courier paper–based EID test result delivery methods are estimated to add 2.5 weeks to EID test turnaround times in low resource settings and increase the risk that infants receive test results during or after the early peak of infant mortality. SMS/GPRS result delivery to health care facility printers significantly reduced test turnaround time and may reduce this risk. SMS/GPRS printers should be considered for expedited delivery of EID and other centralized laboratory test results. PMID:28825941
Cockburn, J; Ruth, D; Silagy, C; Dobbin, M; Reid, Y; Scollo, M; Naccarella, L
1992-03-14
To compare three approaches for marketing a quit smoking intervention kit to general practitioners. Randomised trial of (a) personal delivery and presentation by an educational facilitator with a follow up visit six weeks later; (b) delivery to the receptionist by a friendly volunteer courier with a follow up phone call six weeks later, or (c) postal delivery with a follow up letter six weeks later. Melbourne, Australia. 264 randomly selected general practitioners. A research assistant visited each doctor four months after delivery and measured use of components of the kit. A questionnaire measuring perceptions of aspects of the kit and its delivery was completed by doctors. Costs of each approach were calculated. Doctors receiving the educational facilitator approach were significantly more likely than those receiving the other two approaches to have seen the kit, to rate the method of delivery as engendering motivation to try the kit, to have used one of the "intensive intervention" components from the kit, to report that they found the kit less complicated, and to report greater knowledge of how to use the kit. There were no significant differences in use of "minimal intervention" components of the kit, ratings of overall acceptability of delivery, perceptions of cultural and structural barriers to using the kit, and ratings of the overall acceptability of the kit. The cost of the educational facilitator approach ($A142/doctor) was 24 times that of the mailed approach. The volunteer courier approach ($A14) was twice the cost of the mailed approach. Educational facilitators and volunteer couriers do not seem to be cost effective strategies for distributing smoking interventions.
Feng, Renjian; Xu, Xiaofeng; Zhou, Xiang; Wan, Jiangwen
2011-01-01
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral Strategies Banding Belief Theory of the Trust Evaluation Algorithm) is proposed, which integrates the approach of nodes behavioral strategies and modified evidence theory. According to the behaviors of sensor nodes, a variety of trust factors and coefficients related to the network application are established to obtain direct and indirect trust values through calculating weighted average of trust factors. Meanwhile, the fuzzy set method is applied to form the basic input vector of evidence. On this basis, the evidence difference is calculated between the indirect and direct trust values, which link the revised D-S evidence combination rule to finally synthesize integrated trust value of nodes. The simulation results show that NBBTE can effectively identify malicious nodes and reflects the characteristic of trust value that 'hard to acquire and easy to lose'. Furthermore, it is obvious that the proposed scheme has an outstanding advantage in terms of illustrating the real contribution of different nodes to trust evaluation.
NASA Astrophysics Data System (ADS)
Gigliette, Linda Marie
The purpose of this research was to investigate the effect of a trust-building technique called "positive-framing" (Lemov, 2010, p. 204) on the level of student-teacher trust and students' science academic achievement. The existing literature was reviewed under the constructs of trust, types of trust, trust-building strategies, and student academic achievement. The identified problem is a lack of research into the effect of trust from the high school student perspective and the effect of trust on student academic achievement in science. In addition, there is no empirical evidence to support the effectiveness of the "positive-framing" (Lemov, 2010, p. 204) trust-building intervention. The study involved a volunteer, convenience sample of 9th-grade science students at one high school in Northern California (N=240). The study employed a quasi-experimental, pretest, posttest non-equivalent control group design to examine the level of student trust in the teacher, using the "Student trust in faculty scale" (Forsyth, Adams, & Hoy, 2011, p. 180), and the students' academic achievement, according to the Integrated Process Skills Test II (Okey, Wise, & Burns, 1982). The independent variable was the "positive-framing" (Lemov, 2010, p. 204) trust-building intervention; the two dependent variables were the level of student-teacher trust and student academic achievement. The composite data from the "Student trust in faculty scale" and the academic achievement test were evaluated by a multivariate analysis of covariance (MANCOVA). Results of this study indicated that the null hypothesis was accepted. The "positive-framing" (Lemov, 2010, p. 204) trust-building intervention did not have a significant effect on either the student-teacher trust level or academic achievement in science.
Ward, Paul R.; Mamerow, Loreen; Meyer, Samantha B.
2014-01-01
Background Trust is regarded as a necessary component for the smooth running of society, although societal and political modernising processes have been linked to an increase in mistrust, potentially signalling social and economic problems. Fukuyama developed the notion of ‘high trust’ and ‘low trust’ societies, as a way of understanding trust within different societies. The purpose of this paper is to empirically test and extend Fukuyama’s theory utilising data on interpersonal trust in Taiwan, Hong Kong, South Korea, Japan, Australia and Thailand. This paper focuses on trust in family, neighbours, strangers, foreigners and people with a different religion. Methods Cross-sectional surveys were undertaken in 2009–10, with an overall sample of 6331. Analyses of differences in overall levels of trust between countries were undertaken using Chi square analyses. Multivariate binomial logistic regression analysis was undertaken to identify socio-demographic predictors of trust in each country. Results Our data indicate a tripartite trust model: ‘high trust’ in Australia and Hong Kong; ‘medium trust’ in Japan and Taiwan; and ‘low trust’ in South Korea and Thailand. Trust in family and neighbours were very high across all countries, although trust in people with a different religion, trust in strangers and trust in foreigners varied considerably between countries. The regression models found a consistent group of subpopulations with low trust across the countries: people on low incomes, younger people and people with poor self-rated health. The results were conflicting for gender: females had lower trust in Thailand and Hong Kong, although in Australia, males had lower trust in strangers, whereas females had lower trust in foreigners. Conclusion This paper identifies high, medium and low trust societies, in addition to high and low trusting population subgroups. Our analyses extend the seminal work of Fukuyama, providing both corroboration and refutation for his theory. PMID:24760052
75 FR 60588 - Immediate Disaster Assistance Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-01
... Hedgespeth, Director of Financial Assistance, U.S. Small Business Administration, 409 3rd Street, SW., 8th floor, Washington, DC 20416. Hand Delivery/Courier: Grady Hedgespeth, Director of Financial Assistance... Hand Delivery and you must address the comment to the attention of Grady Hedgespeth, Director of...
Code of Federal Regulations, 2011 CFR
2011-01-01
...— (a) One and seven-tenths percent of average pay multiplied by 20 years; plus (b) One percent of average pay multiplied by the years of service exceeding 20 years. [52 FR 4475, Feb. 11, 1987, as amended...
Code of Federal Regulations, 2010 CFR
2010-01-01
...— (a) One and seven-tenths percent of average pay multiplied by 20 years; plus (b) One percent of average pay multiplied by the years of service exceeding 20 years. [52 FR 4475, Feb. 11, 1987, as amended...
Code of Federal Regulations, 2013 CFR
2013-01-01
... in the nuclear materials transportation field; (2) Is in an organization of the Department of Energy... EMPLOYEES RETIREMENT SYSTEM-BASIC ANNUITY Nuclear Materials Couriers § 842.902 Definitions. Agency head means the Secretary of Energy. For purposes of this subpart, agency head is also deemed to include the...
Code of Federal Regulations, 2012 CFR
2012-01-01
... in the nuclear materials transportation field; (2) Is in an organization of the Department of Energy... EMPLOYEES RETIREMENT SYSTEM-BASIC ANNUITY Nuclear Materials Couriers § 842.902 Definitions. Agency head means the Secretary of Energy. For purposes of this subpart, agency head is also deemed to include the...
Code of Federal Regulations, 2014 CFR
2014-01-01
... in the nuclear materials transportation field; (2) Is in an organization of the Department of Energy... EMPLOYEES RETIREMENT SYSTEM-BASIC ANNUITY Nuclear Materials Couriers § 842.902 Definitions. Agency head means the Secretary of Energy. For purposes of this subpart, agency head is also deemed to include the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... in the nuclear materials transportation field; (2) Is in an organization of the Department of Energy... EMPLOYEES RETIREMENT SYSTEM-BASIC ANNUITY Nuclear Materials Couriers § 842.902 Definitions. Agency head means the Secretary of Energy. For purposes of this subpart, agency head is also deemed to include the...
Code of Federal Regulations, 2010 CFR
2010-01-01
... in the nuclear materials transportation field; (2) Is in an organization of the Department of Energy... EMPLOYEES RETIREMENT SYSTEM-BASIC ANNUITY Nuclear Materials Couriers § 842.902 Definitions. Agency head means the Secretary of Energy. For purposes of this subpart, agency head is also deemed to include the...
Code of Federal Regulations, 2011 CFR
2011-01-01
...). Service under this provision is complete upon delivery by the Post Office or upon personal delivery. (3... counsel, service shall be by personal delivery (including delivery by courier) or delivery by first-class... association, to an officer or agent authorized to accept service of process therefor. Personal service...
Code of Federal Regulations, 2012 CFR
2012-01-01
...). Service under this provision is complete upon delivery by the Post Office or upon personal delivery. (3... counsel, service shall be by personal delivery (including delivery by courier) or delivery by first-class... association, to an officer or agent authorized to accept service of process therefor. Personal service...
Code of Federal Regulations, 2010 CFR
2010-01-01
...). Service under this provision is complete upon delivery by the Post Office or upon personal delivery. (3... counsel, service shall be by personal delivery (including delivery by courier) or delivery by first-class... association, to an officer or agent authorized to accept service of process therefor. Personal service...
Code of Federal Regulations, 2013 CFR
2013-01-01
...). Service under this provision is complete upon delivery by the Post Office or upon personal delivery. (3... counsel, service shall be by personal delivery (including delivery by courier) or delivery by first-class... association, to an officer or agent authorized to accept service of process therefor. Personal service...
Code of Federal Regulations, 2014 CFR
2014-01-01
...). Service under this provision is complete upon delivery by the Post Office or upon personal delivery. (3... counsel, service shall be by personal delivery (including delivery by courier) or delivery by first-class... association, to an officer or agent authorized to accept service of process therefor. Personal service...
75 FR 16815 - Center for Scientific Review; Notice of Closed Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-02
... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Center for Scientific Review... grant applications. Place: National Institutes of Health, 6701 Rockledge Drive, Bethesda, MD 20892... Scientific Review, National Institutes of Health, 6701 Rockledge Drive, Room 6200, MSC 7804 (For courier...
A Robot to Help Make the Rounds
NASA Technical Reports Server (NTRS)
2003-01-01
This paper presents a discussion on the Pyxis HelpMate SecurePak (SP) trackless robotic courier designed by Transitions Research Corporation, to navigate autonomously throughout medical facilities, transporting pharmaceuticals, laboratory specimens, equipment, supplies, meals, medical records, and radiology films between support departments and nursing floors.
Zhang, Yong-Feng; Chiang, Hsiao-Dong
2017-09-01
A novel three-stage methodology, termed the "consensus-based particle swarm optimization (PSO)-assisted Trust-Tech methodology," to find global optimal solutions for nonlinear optimization problems is presented. It is composed of Trust-Tech methods, consensus-based PSO, and local optimization methods that are integrated to compute a set of high-quality local optimal solutions that can contain the global optimal solution. The proposed methodology compares very favorably with several recently developed PSO algorithms based on a set of small-dimension benchmark optimization problems and 20 large-dimension test functions from the CEC 2010 competition. The analytical basis for the proposed methodology is also provided. Experimental results demonstrate that the proposed methodology can rapidly obtain high-quality optimal solutions that can contain the global optimal solution. The scalability of the proposed methodology is promising.
Antiplagiarism Software Takes on the Honor Code
ERIC Educational Resources Information Center
Wasley, Paula
2008-01-01
Among the 100-odd colleges with academic honor codes, plagiarism-detection services raise a knotty problem: Is software compatible with a system based on trust? The answer frequently devolves to the size and culture of the university. Colleges with traditional student-run honor codes tend to "forefront" trust, emphasizing it above all else. This…
ERIC Educational Resources Information Center
Kuwabara, Ko; Willer, Robb; Macy, Michael W.; Mashima, Rie; Terai, Shigeru; Yamagishi, Toshio
2007-01-01
Cross-cultural trust and cooperation are important concerns for international markets, political cooperation, and cultural exchange. Until recently, this problem was difficult to study under controlled conditions due to the inability to conduct experiments involving interaction between participants located in physically distant locations. We…
Data-centric protection in DICOM
NASA Astrophysics Data System (ADS)
Künzi, Julien; Petkovic, M.; Koster, Paul
2009-02-01
In this paper we address the problem of privacy protection and trust enhancement in a distributed healthcare eco system. Increased trust in other parties of the eco system encourages medical entities to share data. This increases the availability of data and consequently improves the general quality of health care. We present two different solutions to the above described problem, both being developed using the DICOM standard (Digital Imaging and Communications in Medicine). The first approach, which is partially relying on legislation, uses sticky policies and commitment protocols to enhance trust. We propose to attach the access control policies to the data in the DICOM files. Furthermore, the source of data disclosure makes sure that the destination commits to enforce the policies by obtaining a signature on the policies and thus providing a proof of the commitment by the destination. The second approach aims at increasing trust by technical enforcement. For this purpose, digital rights management (DRM) technology is used. We demonstrate that it is possible to create a DICOM DRM container using the tools provided by this standard, hence still guaranteeing backward compatibility.
76 FR 5213 - Cable Compulsory License: Specialty Station List
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-28
... Copyright Office is compiling a new specialty station list to identify commercial television broadcast... carriage rules of the Federal Communications Commission (FCC). The list has been periodically updated to... General Counsel, U.S. Copyright Office. If delivered by a commercial courier, an original and five copies...
Campaigning for Literacy. Courier No. 25.
ERIC Educational Resources Information Center
ASPBAE Courier Service, 1982
1982-01-01
This issue contains those materials from a seminar on "Campaigning for Literacy" held at Udaipur, Rajasthan, India, on January 4-11, 1982, that concentrate on Asian experience. The "Udaipur Literacy Declaration," presented first, is followed by extracts from the opening addresses and a review of the report, "Campaigning…
ACHP | Federal Agency Historic Preservation Programs and Officers
Federal Agency Historic Preservation Programs and Officers - Agency Information Updated: April 19, 2018 Federal Preservation Officer Chief, Real Property Management Branch Facilities Division, Agricultural @wdc.usda.gov Read more information For express and courier deliveries please use the following address: USDA
40 CFR 80.1142 - What are the provisions for small refiners under the RFS program?
Code of Federal Regulations, 2010 CFR
2010-07-01
... employed an average of no more than 1,500 people, based on the average number of employees for all pay.... (2) For overnight or courier services: U.S. EPA, Attn: RFS Program, 6406J, 1310 L Street, NW., 6th...
75 FR 36015 - Uniformed Services Accounts and Death Benefits; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-24
... http://www.regulations.gov , by mail, by hand deliver/courier, or by facsimile. FOR FURTHER INFORMATION...: Federal Rulemaking Portal: http://www.regulations.gov . Follow the instructions for submitting comments... the exception of redaction of SSNs, profanities, et cetera) on http://www.regulations.gov .'' Dated...
75 FR 28612 - Proposed Agency Information Collection Activities; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-21
... Agency Information Collection Activities; Comment Request AGENCIES: Office of the Comptroller of the..., Mailstop 2-3, Attention: 1557-0081, 250 E Street, SW., Washington, DC 20219. In addition, comments may be... 20552, Attention: ``1550-0023 (TFR: Schedule DI Revisions).'' Hand Delivery/Courier: Guard's Desk, East...
76 FR 7089 - Intent To Discontinue and Request for Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-08
..., Attention: ``Cost of Funds Indices.'' Hand Delivery/Courier: Guard's Desk, East Lobby Entrance, 1700 G Street, NW., from 9 a.m. to 4 p.m. on business days, Attention: Information Collection Comments, Chief Counsel's Office, Attention: ``Cost of Funds Indices.'' Instructions: All submissions received must...
76 FR 27296 - Private Land Mobile Radio Service Regulations
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-11
... copies for each additional docket or rulemaking number. Filings can be sent by hand or messenger delivery, by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail. All filings... 11-63] Private Land Mobile Radio Service Regulations AGENCY: Federal Communications Commission...
10 CFR 73.46 - Fixed site physical protection systems, subsystems, components, and procedures.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., components, and procedures. 73.46 Section 73.46 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL... Energy couriers engaged in the transport of special nuclear material. The search function for detection... of Energy vehicles engaged in transporting special nuclear material and emergency vehicles under...
10 CFR 73.46 - Fixed site physical protection systems, subsystems, components, and procedures.
Code of Federal Regulations, 2012 CFR
2012-01-01
..., components, and procedures. 73.46 Section 73.46 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL... Energy couriers engaged in the transport of special nuclear material. The search function for detection... of Energy vehicles engaged in transporting special nuclear material and emergency vehicles under...
78 FR 66962 - Advisory Committee on Construction Safety and Health (ACCSH)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-07
... Assistant Secretary of Labor request for nominations for membership on ACCSH. DATES: ACCSH meeting: ACCSH... Office at (202) 693- 1648. Regular mail, express mail, hand delivery, or messenger (courier) service...). OSHA's Docket Office accepts deliveries (hand deliveries, express mail, and messenger service) during...
77 FR 66870 - Advisory Committee on Construction Safety and Health (ACCSH)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-07
... Administration (OSHA), Labor. ACTION: Request for nominations for membership on ACCSH. SUMMARY: The Assistant Secretary of Labor for Occupational Safety and Health (OSHA Assistant Secretary) invites interested persons...) 693-1648; or Mail, express delivery, hand delivery, and messenger or courier service: Submit your...
12 CFR 559.4 - What activities are preapproved for service corporations?
Code of Federal Regulations, 2011 CFR
2011-01-01
... personnel; (12) Research studies and surveys; (13) Software development and systems integration; and (14..., marketing research and other marketing; (3) Clerical; (4) Consulting; (5) Courier; (6) Data processing; (7... housing, small farms, or businesses that are local in character; (2) Investments designed primarily to...
12 CFR 559.4 - What activities are preapproved for service corporations?
Code of Federal Regulations, 2014 CFR
2014-01-01
... personnel; (12) Research studies and surveys; (13) Software development and systems integration; and (14..., marketing research and other marketing; (3) Clerical; (4) Consulting; (5) Courier; (6) Data processing; (7... housing, small farms, or businesses that are local in character; (2) Investments designed primarily to...
12 CFR 559.4 - What activities are preapproved for service corporations?
Code of Federal Regulations, 2010 CFR
2010-01-01
... personnel; (12) Research studies and surveys; (13) Software development and systems integration; and (14..., marketing research and other marketing; (3) Clerical; (4) Consulting; (5) Courier; (6) Data processing; (7... housing, small farms, or businesses that are local in character; (2) Investments designed primarily to...
12 CFR 559.4 - What activities are preapproved for service corporations?
Code of Federal Regulations, 2013 CFR
2013-01-01
... personnel; (12) Research studies and surveys; (13) Software development and systems integration; and (14..., marketing research and other marketing; (3) Clerical; (4) Consulting; (5) Courier; (6) Data processing; (7... housing, small farms, or businesses that are local in character; (2) Investments designed primarily to...
12 CFR 559.4 - What activities are preapproved for service corporations?
Code of Federal Regulations, 2012 CFR
2012-01-01
... personnel; (12) Research studies and surveys; (13) Software development and systems integration; and (14..., marketing research and other marketing; (3) Clerical; (4) Consulting; (5) Courier; (6) Data processing; (7... housing, small farms, or businesses that are local in character; (2) Investments designed primarily to...
López-Navarro, Miguel Ángel; Llorens-Monzonís, Jaume; Tortosa-Edo, Vicente
2013-01-01
Perceived risk of environmental threats often translates into psychological stress with a wide range of effects on health and well-being. Petrochemical industrial complexes constitute one of the sites that can cause considerable pollution and health problems. The uncertainty around emissions results in a perception of risk for citizens residing in neighboring areas, which translates into anxiety and physiological stress. In this context, social trust is a key factor in managing the perceived risk. In the case of industrial risks, it is essential to distinguish between trust in the companies that make up the industry, and trust in public institutions. In the context of a petrochemical industrial complex located in the port of Castellón (Spain), this paper primarily discusses how trust—both in the companies located in the petrochemical complex and in the public institutions—affects citizens’ health risk perception. The research findings confirm that while the trust in companies negatively affects citizens’ health risk perception, trust in public institutions does not exert a direct and significant effect. Analysis also revealed that trust in public institutions and health risk perception are essentially linked indirectly (through trust in companies). PMID:23337129
Methods for reliability evaluation of trust and reputation systems
NASA Astrophysics Data System (ADS)
Janiszewski, Marek B.
2016-09-01
Trust and reputation systems are a systematic approach to build security on the basis of observations of node's behaviour. Exchange of node's opinions about other nodes is very useful to indicate nodes which act selfishly or maliciously. The idea behind trust and reputation systems gets significance because of the fact that conventional security measures (based on cryptography) are often not sufficient. Trust and reputation systems can be used in various types of networks such as WSN, MANET, P2P and also in e-commerce applications. Trust and reputation systems give not only benefits but also could be a thread itself. Many attacks aim at trust and reputation systems exist, but such attacks still have not gain enough attention of research teams. Moreover, joint effects of many of known attacks have been determined as a very interesting field of research. Lack of an acknowledged methodology of evaluation of trust and reputation systems is a serious problem. This paper aims at presenting various approaches of evaluation such systems. This work also contains a description of generalization of many trust and reputation systems which can be used to evaluate reliability of such systems in the context of preventing various attacks.
... Toddlers Kids and Teens Pregnancy and Childbirth Women Men Seniors Your Health Resources Healthcare Management End-of- ... chart for more information about genital problems in men. Our trusted Symptom Checker is written and reviewed ...
Why people seek advice from community pharmacies about skin problems.
Tucker, Rod; Stewart, Derek
2015-04-01
The objective of this study was to explore the reasons why patients with undiagnosed skin problems seek advice at pharmacies. Semi-structured telephone interviews were conducted with patients presenting at pharmacies requesting advice for their own (or their child's) undiagnosed skin problem. Twenty-five patients were interviewed. Key themes around choice of pharmacy were convenience of professional advice, triage to general practitioner (GP) care if warranted, inaccessibility of GP care and perceived non-serious nature of the condition. Interviewees also described high levels of trust in their pharmacists. Few concerns were noted, but those that were centred on lack of privacy and the potential for misdiagnosis. Almost all participants felt positive about their pharmacy care and would re-visit for future skin problems. Patients with undiagnosed skin problems seek advice from pharmacies for reasons of professional advice, accessibility, familiarity and trust and because they perceive their conditions as non-serious. © 2014 Royal Pharmaceutical Society.
Tackling Work Related Stress in a National Health Service Trust
ERIC Educational Resources Information Center
Vick, Donna; Whyatt, Hilary
2004-01-01
The challenge of tackling the problem of coping with work related stress in a National Health Service (NHS) Trust was undertaken. Ideas were developed within the context of two different action learning sets and led to actions resulting in a large therapy Taster Session event and the establishment of a centre offering alternative therapies and…
A Meta-Analysis of the Effect of Education on Social Capital
ERIC Educational Resources Information Center
Huang, Jian; van den Brink, Henriette Maassen; Groot, Wim
2009-01-01
To assess the empirical estimates of the effect of education on social trust and social participation--the basic dimensions of individual social capital--a meta-analysis is applied, synthesizing 154 evaluations on social trust, and 286 evaluations on social participation. The publication bias problem is given special emphasis in the meta-analysis.…
77 FR 47779 - Arkansas: Final Authorization of State Hazardous Waste Management Program Revision
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-10
... Ross Avenue, Dallas, Texas 75202-2733. 4. Hand Delivery or Courier: Deliver your comments to Alima... Planning and Permitting Division, EPA Region 6, 1445 Ross Avenue, Dallas, Texas 75202-2733. Instructions... Ross Avenue, Dallas, Texas 75202-2733, phone number (214) 665-8533. Interested persons wanting to...
76 FR 64931 - Building Energy Codes Cost Analysis
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-19
... Cost Analysis published in the Federal Register on September 13, 2011. 76 FR 56413. The original...-0121. Telephone: (202) 586-2945. Please submit one signed original paper copy. Hand Delivery/Courier...., 6th Floor, Washington, DC 20024. Please submit one signed original paper copy. Docket: For access to...
[Adult and Continuing Education Collections at Syracuse University.
ERIC Educational Resources Information Center
Syracuse University Library Associates Courier, 1991
1991-01-01
This issue of the biannual "Syracuse University Library Associate Courier" is devoted to covering the world famous collections of adult and continuing education materials held by the Syracuse University Library. It contains five articles: "Laubach in India: 1935-1970" (S. Y. Shah) describes missionary and founder of Laubach…
12 CFR 225.129 - Activities closely related to banking.
Code of Federal Regulations, 2013 CFR
2013-01-01
... activities. The Board's amendment of § 225.4(a), which adds courier services to the list of closely related... value of the types utilized by banks and bank-related firms in performing their business activities... financially-related economic data. The authority is not intended to permit holding companies to engage...
12 CFR 225.129 - Activities closely related to banking.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Board's amendment of § 225.4(a), which adds courier services to the list of closely related activities... value of the types utilized by banks and bank-related firms in performing their business activities... financially-related economic data. The authority is not intended to permit holding companies to engage...
12 CFR 225.129 - Activities closely related to banking.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Board's amendment of § 225.4(a), which adds courier services to the list of closely related activities... value of the types utilized by banks and bank-related firms in performing their business activities... financially-related economic data. The authority is not intended to permit holding companies to engage...
12 CFR 225.129 - Activities closely related to banking.
Code of Federal Regulations, 2014 CFR
2014-01-01
... activities. The Board's amendment of § 225.4(a), which adds courier services to the list of closely related... value of the types utilized by banks and bank-related firms in performing their business activities... financially-related economic data. The authority is not intended to permit holding companies to engage...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-20
...-9460. 4. Mail: Steven Brown, Atmospheric Section, Air Planning and Development Branch, Air and Waste..., Kansas 66101. 5. Hand Delivery or Courier: Steven Brown, Atmospheric Section, Air Planning and... Atmospheric Section, Air Planning and Development Branch, Air Waste and Management Division, U.S...
76 FR 37048 - Louisiana; Final Authorization of State Hazardous Waste Management Program Revisions
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-24
... the preamble to the immediate final rule. Unless we get written comments which oppose this... your written comments by July 25, 2011. ADDRESSES: Send written comments to Alima Patterson, Region 6... hand delivery/courier; please follow the detailed instructions in the ADDRESSES section of the...
78 FR 38298 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-26
... Card Plans (Form FR 2572). DATES: Written comments are encouraged and must be received on or before... submitting comments. Mail/Hand Delivery/Courier: Consumer Financial Protection Bureau (Attention: PRA Office.... Type of Review: Extension without change of a currently approved collection. Affected Public: Business...
75 FR 36444 - Proposed Extension of the Approval of Information Collection Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-25
... be provided in the desired format, reporting burden (time and financial resources) is minimized... of the following methods: E-mail: [email protected] ; Mail, Hand Delivery, Courier: Regulatory... collection. Because we continue to experience delays in receiving mail in the Washington, DC area, commenters...
78 FR 72715 - Proposed Revision and Extension of the Approval of Information Collection Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-03
... financial resources) is minimized, collection instruments are clearly understood, and the impact of...: [email protected] ; Mail, Hand Delivery, Courier: Regulatory Analysis Branch, Wage and Hour Division, U.S... experience delays in receiving mail in the Washington, DC area, commenters are strongly encouraged to...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-12
...] Expanding the Economic and Innovation Opportunities of Spectrum Through Incentive Auctions AGENCY: Federal... Media Bureau extends the deadline for filing comments and reply comments on the Notice of Proposed... delivery, by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail...
10 CFR 110.54 - Reporting requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Security, U.S. Department of Commerce, Attn: AP Reports, 14th Street and Pennsylvania Avenue, NW., Room... or AP-1, and associated forms. The reports must contain information on all nuclear facilities...-1731, e-mailed to [email protected], or hand delivered or submitted by courier to Bureau of Industry and...
12 CFR 7.1012 - Messenger service.
Code of Federal Regulations, 2010 CFR
2010-01-01
... service” means any service, such as a courier service or armored car service, used by a national bank and... service do not advertise, or otherwise represent, that the bank itself is providing the service, although the bank may advertise that its customers may use one or more third party messenger services to...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-27
...: [email protected] . Mail/Hand Delivery/Courier: Michael Davis, Project Manager, Consumer Financial... application of best management practices (BMP) to minimize short term air quality and noise impact during... of Final Environmental Assessment (FINAL EA) and a Finding of No Significant Impact (FONSI) for...
33 CFR 20.304 - Service of documents.
Code of Federal Regulations, 2010 CFR
2010-07-01
... other filed document (i) Mail.(ii) Personal delivery. (iii) Express-courier service. (iv) Fax. (v) Other... representative. Is not represented The last known address of the residence or principal place of business of the...) Delivered to the person's office during business hours. (iii) Delivered to the person's residence and...
By Our Own Bootstraps: Making Document Delivery Work in Oregon.
ERIC Educational Resources Information Center
Burkholder, Sue A.
1992-01-01
Describes the development of a courier service in Oregon for document delivery between libraries to support coordinated collection development activities. Organization of the service by individual libraries without dependence on the Library Services and Construction Act is discussed, and costs and response time are considered. (two references)…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-19
..., Regulations, and Variances, 1100 Wilson Boulevard, Room 2350, Arlington, VA 22209-3939. (4) Hand Delivery or Courier: MSHA, Office of Standards, Regulations, and Variances, 1100 Wilson Boulevard, Room 2350... CONTACT: Mario Distasio, Chief of the Economic Analysis Division, Office of Standards, Regulations, and...
77 FR 72295 - Revision of the Commission's Program Access Rules
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-05
... of comment and reply comment period. SUMMARY: The Media Bureau extends the deadline for filing... overnight courier, or by first-class or overnight U.S. Postal Service mail (although the [email protected] , or Kathy Berthot, [email protected] , of the Media Bureau, Policy Division, (202...
75 FR 23637 - Injury and Illness Prevention Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-04
..., hand (courier) delivery, and messenger service. Send your request to: Eastern Research Group, Inc., 110... Commission (OSHRC) the authority to assess civil penalties giving due consideration to the good faith of the... employers who have violated OSHA standards but who have demonstrated a good faith effort to provide a safe...
78 FR 78013 - Focused Mitigation Strategies To Protect Food Against Intentional Adulteration
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-24
... and procedures; I--Inspect your work area and surrounding areas; R--Recognize anything out of the...: Mail/Hand delivery/Courier (for paper or CD-ROM submissions): Division of Dockets Management (HFA-305... Proposed Rule Costs and Benefits I. Introduction II. Background A. Incidents of Intentional Adulteration of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-02
...., Washington, DC 20585-0121. Please submit one signed paper original. Hand Delivery/Courier: Ms. Brenda Edwards...., Washington, DC 20024. Telephone: (202) 586-2945. Please submit one signed paper original. Instructions: [email protected] . SUPPLEMENTARY INFORMATION: I. Authority and Background A. Authority B. Background II...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-16
... one signed paper original. Hand Delivery/Courier: Ms. Brenda Edwards, U.S. Department of Energy...-2945. Please submit one signed paper original. Instructions: All submissions received must include the... . SUPPLEMENTARY INFORMATION: I. Authority and Background II. Summary of the Proposal A. Reorganization of DOE's...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-21
... one signed original paper copy. 4. Hand Delivery/Courier: Ms. Brenda Edwards, U.S. Department of.... Telephone: (202) 586-2945. Please submit one signed original paper copy. For detailed instructions on...-mail: [email protected] . SUPPLEMENTARY INFORMATION: Table of Contents I. Background and Legal...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-09
... OFFICE OF GOVERNMENT ETHICS Agency Information Collection Activities; Proposed Collection; Comment...: Office of Government Ethics (OGE). ACTION: Notice of request for agency and public comments. SUMMARY...-9237. Mail, Hand Delivery/Courier: Office of Government Ethics, Suite 500, 1201 New York Avenue NW...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-19
... OFFICE OF GOVERNMENT ETHICS Proposed Collection; Comment Request for an Unmodified SF 278 Executive Branch Personnel Public Financial Disclosure Report AGENCY: Office of Government Ethics (OGE.../Courier: Office of Government Ethics, Suite 500, 1201 New York Avenue, NW., Washington, DC 20005-3917...
Volcanology by Courier: Science in Stamps.
ERIC Educational Resources Information Center
Glenn, William H.
1981-01-01
Summarized are five activities involving collection of postage stamps picturing volcanoes or related scenes for use as part of or at the conclusion of the study of volcanoes. Activity topics include volcanic features, location of volcanoes, related land features where volcanoes are not located, and making one's own volcano stamps. (DS)
ERIC Educational Resources Information Center
Ellis, Barbara G.; Dick, Steven J.
1996-01-01
Employs the statistics-documentation portion of a word-processing program's grammar-check feature together with qualitative analyses to determine that Henry Watterson, long-time editor of the "Louisville Courier-Journal," was probably the South's famed Civil War correspondent "Shadow." (TB)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-27
...- 1648. Mail, hand delivery, express mail, messenger, or courier service: When using this method, you... DEPARTMENT OF LABOR Occupational Safety and Health Administration [Docket No. OSHA-2010-0008] Construction Fall Protection Systems Criteria and Practices, and Training Requirements; Extension of the Office...
76 FR 24489 - Privacy Act of 1974; Amendment to System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-02
... message). Fax: 202-482-9237, Attention: Elaine Newton, Privacy Officer. Mail, Hand Delivery/Courier...: Elaine Newton, Privacy Officer. FOR FURTHER INFORMATION CONTACT: Ms. Newton at the Office of Government... 4685 (Jan. 26, 2009); and in support of this Administration's core principles of the business of...
75 FR 4039 - Proposed Posting, Posting, and Deposting of Stockyards
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-26
... comments by any of the following methods: E-Mail: [email protected] . Mail: H. Tess Butler, GIPSA... Delivery or Courier: H. Tess Butler, GIPSA, USDA, 1400 Independence Avenue, SW., Room 1643-S, Washington..., 2009. Center, Scottsville, Kentucky. KY-184 Blue Grass South Livestock Market, LLC, Stanford, Kentucky...
A New Architecture for Improved Human Behavior in Military Simulations
2008-04-01
forces were using motorcycle couriers to avoid U.S. intelligence capabilities in the early days of Operation Iraqi Freedom (OIF), there were certainly...Games ( MMORPG ) engage millions of game players in near-real-time computing environments. Games such as World of Warcraft® attract players to
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-21
... was revoked as described in Sec. 145.1051(e). The FAA notes that denial is not automatic. If the... practices, or advances in aircraft technology. These changes would modernize the regulations to keep pace..., Washington, DC 20590-0001. Hand Delivery or Courier: Take comments to Docket Operations in Room W12-140 of...
ERIC Educational Resources Information Center
ASPBAE Courier Service, 1982
1982-01-01
This journal contains a series of articles dealing with the theme of development in Asia and rural Indonesia. Included in the journal are the following articles: "Nonformal Education in Rural Areas of Developing Countries," by members of the Rural Project Team from the Centre for Continuing Education at Australian National University;…
Translations on Eastern Europe, Political, Sociological and Military Affairs, Number 1606.
1978-11-07
communists had succeeded early in winning Thaelmann*s defense attorneys to some extent over to their side. As Dahlem reveals, Friedrich Roetter , a lawyer... Roetter , for one night, turned his Berlin office over to the communists so that they could copy the bill of indictments against Thaelmann. Couriers
Regional Trends Sustainable Development. ASPBAE Courier No. 51.
ERIC Educational Resources Information Center
ASPBAE Courier, 1991
1991-01-01
This issue contains six articles about the practice of adult and nonformal education in the Asian South Pacific region, as well as committee reports, policy statements, and regular features. The articles on adult and nonformal education, and other entries are as follows: "Emerging Trends, Concerns and Issues in Educational Development in…
7 CFR 1493.460 - Guarantee rates and fees.
Code of Federal Regulations, 2013 CFR
2013-01-01
... OF AGRICULTURE EXPORT PROGRAMS CCC EXPORT CREDIT GUARANTEE PROGRAMS CCC Supplier Credit Guarantee... not be approved until the guarantee fee has been received by CCC. The exporter's check for the guarantee fee shall be made payable to CCC and mailed or delivered by courier to the office specified in the...
7 CFR 1493.460 - Guarantee rates and fees.
Code of Federal Regulations, 2014 CFR
2014-01-01
... OF AGRICULTURE EXPORT PROGRAMS CCC EXPORT CREDIT GUARANTEE PROGRAMS CCC Supplier Credit Guarantee... not be approved until the guarantee fee has been received by CCC. The exporter's check for the guarantee fee shall be made payable to CCC and mailed or delivered by courier to the office specified in the...
7 CFR 1493.460 - Guarantee rates and fees.
Code of Federal Regulations, 2012 CFR
2012-01-01
... OF AGRICULTURE EXPORT PROGRAMS CCC EXPORT CREDIT GUARANTEE PROGRAMS CCC Supplier Credit Guarantee... not be approved until the guarantee fee has been received by CCC. The exporter's check for the guarantee fee shall be made payable to CCC and mailed or delivered by courier to the office specified in the...
Paying for the Medicare program.
Munnell, A H
1985-01-01
Although the hospital insurance (HI) trust fund acted as a source of strength for the old-age, survivors, and disability insurance program during its recent financial crises, projections by HCFA and CBO reveal that the Medicare program will experience financing problems of its own within the next decade. No one would argue that Medicare's financing problems should be solved simply by raising more money. However, the prospect of insolvency in the HI trust fund and the increasing strain on general revenues from the Supplementary Medical Insurance trust fund require policymakers to survey the options for increasing Medicare revenues while cost-control devices are being developed. Indeed, even if cost-control efforts are completely successful, additional revenues may be needed in the future to finance new initiatives in the Medicare program. Therefore, this paper will look briefly at current efforts to regain control of soaring hospital and physician costs and then examine some of the more feasible options for increasing Medicare revenues.
Seismic data restoration with a fast L1 norm trust region method
NASA Astrophysics Data System (ADS)
Cao, Jingjie; Wang, Yanfei
2014-08-01
Seismic data restoration is a major strategy to provide reliable wavefield when field data dissatisfy the Shannon sampling theorem. Recovery by sparsity-promoting inversion often get sparse solutions of seismic data in a transformed domains, however, most methods for sparsity-promoting inversion are line-searching methods which are efficient but are inclined to obtain local solutions. Using trust region method which can provide globally convergent solutions is a good choice to overcome this shortcoming. A trust region method for sparse inversion has been proposed, however, the efficiency should be improved to suitable for large-scale computation. In this paper, a new L1 norm trust region model is proposed for seismic data restoration and a robust gradient projection method for solving the sub-problem is utilized. Numerical results of synthetic and field data demonstrate that the proposed trust region method can get excellent computation speed and is a viable alternative for large-scale computation.
Game Theory Based Trust Model for Cloud Environment
Gokulnath, K.; Uthariaraj, Rhymend
2015-01-01
The aim of this work is to propose a method to establish trust at bootload level in cloud computing environment. This work proposes a game theoretic based approach for achieving trust at bootload level of both resources and users perception. Nash equilibrium (NE) enhances the trust evaluation of the first-time users and providers. It also restricts the service providers and the users to violate service level agreement (SLA). Significantly, the problem of cold start and whitewashing issues are addressed by the proposed method. In addition appropriate mapping of cloud user's application to cloud service provider for segregating trust level is achieved as a part of mapping. Thus, time complexity and space complexity are handled efficiently. Experiments were carried out to compare and contrast the performance of the conventional methods and the proposed method. Several metrics like execution time, accuracy, error identification, and undecidability of the resources were considered. PMID:26380365
Evaluation of IT security – genesis and its state-of-art
NASA Astrophysics Data System (ADS)
Livshitz, I. I.; Neklyudov, A. V.; Lontsikh, P. A.
2018-05-01
It is topical to evolve processes of an evaluation of the IT security nowadays. Formation and application of common evaluation approaches to the IT component, which are processed by the governmental and civil organizations, are still not solving problem. Successful processing of the independent evaluation for conformity with a security standard is supposed to be the main criteria of a suitability of any IT component to be used in a trusted computer system. The solution of the mentioned-above problem is suggested through the localization of all research, development and producing processes in a national trusted area (digital sovereignty).
ERIC Educational Resources Information Center
Legrone, James J.
2011-01-01
Studies have shown that many information technology (IT) projects achieve success, while many more do not. Further, researchers have identified various causes of this problem and have suggested remedies. However, these studies have not focused on the nature of the relationship between trust and success in IT projects. Consequently, this study…
Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943
Social Milieu Oriented Routing: A New Dimension to Enhance Network Security in WSNs.
Liu, Lianggui; Chen, Li; Jia, Huiling
2016-02-19
In large-scale wireless sensor networks (WSNs), in order to enhance network security, it is crucial for a trustor node to perform social milieu oriented routing to a target a trustee node to carry out trust evaluation. This challenging social milieu oriented routing with more than one end-to-end Quality of Trust (QoT) constraint has proved to be NP-complete. Heuristic algorithms with polynomial and pseudo-polynomial-time complexities are often used to deal with this challenging problem. However, existing solutions cannot guarantee the efficiency of searching; that is, they can hardly avoid obtaining partial optimal solutions during a searching process. Quantum annealing (QA) uses delocalization and tunneling to avoid falling into local minima without sacrificing execution time. This has been proven a promising way to many optimization problems in recently published literatures. In this paper, for the first time, with the help of a novel approach, that is, configuration path-integral Monte Carlo (CPIMC) simulations, a QA-based optimal social trust path (QA_OSTP) selection algorithm is applied to the extraction of the optimal social trust path in large-scale WSNs. Extensive experiments have been conducted, and the experiment results demonstrate that QA_OSTP outperforms its heuristic opponents.
Baek, Seungsoo; Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.
Fostering interpersonal trust on social media: physicians' perspectives and experiences.
Panahi, Sirous; Watson, Jason; Partridge, Helen
2016-02-01
The problem of developing and sustaining mutual trust is one of the main barriers to knowledge sharing on social media platforms such as blogs, wikis, micro-blogs and social networking websites. While many studies argue that mutual trust is necessary for online communication and knowledge sharing, few have actually explored and demonstrated how physicians can establish and sustain trusted relationships on social media. To identify approaches through which physicians establish interpersonal trust on social media. Twenty-four physicians, who were active users of social media, were interviewed using a semi-structured approach between 2013 and 2014. Snowball sampling was employed for participant recruitment. The data were analysed using a thematic analysis approach. Physicians trust their peers on social media in a slightly different way than in face-to-face communication. The study found that the majority of participants established trust on social media mainly through previous personal interaction, authenticity and relevancy of voice, professional standing, consistency of communication, peer recommendation, and non-anonymous and moderated sites. Healthcare professionals need to approach social media carefully when using it for knowledge sharing, networking and developing trusted relations with like-minded peers. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
How Supervisor Experience Influences Trust, Supervision, and Trainee Learning: A Qualitative Study.
Sheu, Leslie; Kogan, Jennifer R; Hauer, Karen E
2017-09-01
Appropriate trust and supervision facilitate trainees' growth toward unsupervised practice. The authors investigated how supervisor experience influences trust, supervision, and subsequently trainee learning. In a two-phase qualitative inductive content analysis, phase one entailed reviewing 44 internal medicine resident and attending supervisor interviews from two institutions (July 2013 to September 2014) for themes on how supervisor experience influences trust and supervision. Three supervisor exemplars (early, developing, experienced) were developed and shared in phase two focus groups at a single institution, wherein 23 trainees validated the exemplars and discussed how each impacted learning (November 2015). Phase one: Four domains of trust and supervision varying with experience emerged: data, approach, perspective, clinical. Early supervisors were detail oriented and determined trust depending on task completion (data), were rule based (approach), drew on their experiences as trainees to guide supervision (perspective), and felt less confident clinically compared with more experienced supervisors (clinical). Experienced supervisors determined trust holistically (data), checked key aspects of patient care selectively and covertly (approach), reflected on individual experiences supervising (perspective), and felt comfortable managing clinical problems and gauging trainee abilities (clinical). Phase two: Trainees felt the exemplars reflected their experiences, described their preferences and learning needs shifting over time, and emphasized the importance of supervisor flexibility to match their learning needs. With experience, supervisors differ in their approach to trust and supervision. Supervisors need to trust themselves before being able to trust others. Trainees perceive these differences and seek supervision approaches that align with their learning needs.
'Trust my doctor, trust my pancreas': trust as an emergent quality of social practice.
Cohn, Simon
2015-06-11
Growing attention is being paid to the importance of trust, and its corollaries such as mistrust and distrust, in health service and the central place they have in assessments of quality of care. Although initially focussing on doctor-patient relationships, more recent literature has broadened its remit to include trust held in more abstract entities, such as organisations and institutions. There has consequently been growing interest to develop rigorous and universal measures of trust. Drawing on illustrative ethnographic material from observational research in a UK diabetes clinic, this paper supports an approach that foregrounds social practice and resists conceiving trust as solely a psychological state that can be divorced from its context. Beyond exploring the less-than-conscious nature of trust, the interpretations attend to the extent to which trust practices are distributed across a range of actors. Data from clinical encounters reveal the extent to which matters of trust can emerge from the relationships between people, and sometimes people and things, as a result of a wide range of pragmatic concerns, and hence can usefully be conceived of as an extended property of a situation rather than a person. Trust is rarely explicitly articulated, but remains a subtle feature of experience that is frequently ineffable. A practice approach highlights some of the problems with adopting a general psychological or intellectualist conception of trust. In particular, assuming it is a sufficiently stable internal state that can be stored or measured not only transforms a diffuse and often ephemeral quality into a durable thing, but ultimately presents it as a generic state that has meaning independent of the specific relationships and context that achieve it. Emphasising the context-specific nature of trust practices does not dismiss the potential of matters of trust, when they emerge, to be transposed to other contexts. But it does highlight how, on each occasion, trust as a relational quality is ways 'done' or 'achieved' anew.
Bi-Directional Communication: A Critical Component of HAT
NASA Technical Reports Server (NTRS)
Shively, Robert J.
2016-01-01
Known problems with automation include lack of mode awareness, automation brittleness, and risk of miscalibrated trust. Human-Autonomy Teaming (HAT) is essential for improving these problems. This presentation outlines critical components for Human-Autonomy Teaming.
Trust evaluation in health information on the World Wide Web.
Moturu, Sai T; Liu, Huan; Johnson, William G
2008-01-01
The impact of health information on the web is mounting and with the Health 2.0 revolution around the corner, online health promotion and management is becoming a reality. User-generated content is at the core of this revolution and brings to the fore the essential question of trust evaluation, a pertinent problem for health applications in particular. Evolving Web 2.0 health applications provide abundant opportunities for research. We identify these applications, discuss the challenges for trust assessment, characterize conceivable variables, list potential techniques for analysis, and provide a vision for future research.
Lemmers-Jansen, Imke L J; Fett, Anne-Kathrin J; Hanssen, Esther; Veltman, Dick J; Krabbendam, Lydia
2018-06-13
Psychosis is characterized by problems in social functioning that exist well before illness onset, and in individuals at clinical high risk (CHR) for psychosis. Trust is an essential element for social interactions that is impaired in psychosis. In the trust game, chronic patients showed reduced baseline trust, impaired response to positive social feedback, and attenuated brain activation in reward and mentalizing areas. We investigated whether first-episode psychosis patients (FEP) and CHR show similar abnormalities in the neural and behavioral mechanisms underlying trust. Twenty-two FEP, 17 CHR, and 43 healthy controls performed two trust games, with a cooperative and an unfair partner in the fMRI scanner. Region of interest analyses were performed on mentalizing and reward processing areas, during the investment and outcome phases of the games. Compared with healthy controls, FEP and CHR showed reduced baseline trust, but like controls, learned to trust in response to cooperative and unfair feedback. Symptom severity was not associated with baseline trust, however in FEP associated with reduced response to feedback. The only group differences in brain activation were that CHR recruited the temporo-parietal junction (TPJ) more than FEP and controls during investment in the unfair condition. This hyper-activation in CHR was associated with greater symptom severity. Reduced baseline trust may be associated with risk for psychotic illness, or generally with poor mental health. Feedback learning is still intact in CHR and FEP, as opposed to chronic patients. CHR however show distinct neural activation patterns of hyper-activation of the TPJ.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... submitting comments. E-mail: biscaia.robin@epa.gov . Fax: (617) 918-0642, to the attention of Robin Biscaia. Mail: Robin Biscaia, RCRA Waste Management Section, Office of Site Remediation and Restoration (OSRR 07... Delivery or Courier: Deliver your comments to: Robin Biscaia, RCRA Waste Management Section, Office of Site...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-23
... FEDERAL COMMUNICATIONS COMMISSION [CG Docket No. 10-162; DA 10-1325] The Consumer and Governmental... 504 of the Rehabilitation Act of 1973 AGENCY: Federal Communications Commission. ACTION: Notice... can be sent by hand or messenger delivery, by commercial overnight courier, or by first-class or...
76 FR 37021 - Louisiana: Final Authorization of State Hazardous Waste Management Program Revision
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-24
... Ross Avenue, Dallas Texas 75202-2733. 4. Hand Delivery or Courier: Deliver your comments to Alima...-O), Multimedia Planning and Permitting Division, EPA Region 6, 1445 Ross Avenue, Dallas Texas 75202... EPA, Region 6, 1445 Ross Avenue, Dallas, Texas 75202-2733, phone number (214) 665-8533. Interested...
77 FR 38530 - Louisiana: Final Authorization of State Hazardous Waste Management Program Revision
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-28
... Ross Avenue, Dallas, Texas 75202-2733. 4. Hand Delivery or Courier. Deliver your comments to Alima... Planning and Permitting Division, EPA Region 6, 1445 Ross Avenue, Dallas, Texas 75202-2733. Instructions..., Region 6, 1445 Ross Avenue, Dallas, Texas 75202-2733, phone number (214) 665-8533. Interested persons...
Adult Education in the 90s: Unity in Diversity.
ERIC Educational Resources Information Center
Udagama, Premadasa, Ed.
1991-01-01
This issue of the Asian-South Pacific Bureau of Adult Education (ASPBAE) Courier contains the following contributions related to the theme of unity in the diversity of interests and approaches to adult/informal education: "Unity in Diversity--The Future of Adult Education in Asia and the South-Pacific Region" (Rajesh Tandon); "Notes…
75 FR 3476 - Designation of Haiti for Temporary Protected Status
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-21
... Express mail and courier deliveries: USCIS, Attn: Haiti TPS, 2501 S. State Hwy. 121 Business, Suite 400... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services [CIS No. 2491-10; DHS..., the Secretary is authorized to designate a foreign state for TPS or parts of such state upon finding...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-20
... and III of the Americans With Disabilities Act AGENCY: Civil Rights Division, Department of Justice... comments to Disability Rights Section, Civil Rights Division, U.S. Department of Justice, 950 Pennsylvania Avenue NW., Washington, DC 20530. Overnight, courier or hand delivery: Disability Rights Section, Civil...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-08
..., courier services, or mail, to FOIA Disclosure Officer, Office of Trade Adjustment Assistance (ETA), U.S.../10 09/02/10 (Company). 74618 Young's Furniture Whitesburg, TN........ 09/13/10 09/09/10 Manufacturing Company, Inc., (Company). 74619 Sematic USA, Inc., Twinsburg, OH......... 09/13/10 08/16/10 (Workers...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-09
... Information Collection Activities: Submission for OMB Review; Joint Comment Request AGENCY: Office of the..., Mailstop 2-3, Attention: 1557-0081, 250 E Street, SW., Washington, DC 20219. In addition, comments may be... 20552, Attention: ``1550-0023 (TFR: Schedule DI Revisions).'' Hand Delivery/Courier: Guard's Desk, East...
30 CFR 218.51 - How to make payments.
Code of Federal Regulations, 2010 CFR
2010-07-01
....O. Box 5640, Denver, CO 80217-5640. (3) For all other Federal and Indian lease payments other than... Management, P.O. Box 5810, Denver, CO 80217-5810. (e) Where to send a non-EFT payment when you use a courier or overnight delivery service. You should send this type of payment to: Minerals Management Service...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-09
... rule. SUMMARY: The EPA is taking direct final action to approve a carbon monoxide (CO) Limited... maintain the CO National Ambient Air Quality Standards (NAAQS) through the second 10-year maintenance..., Suite 900, Seattle, WA 98101. Hand Delivery/Courier: U.S. EPA Region 10, 1200 Sixth Avenue, Suite 900...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-19
... DEPARTMENT OF TRANSPORTATION Federal Highway Administration [Docket No. FHWA-2010-0104] Agency... Transportation, West Building Ground Floor, Room W12-140, 1200 New Jersey Avenue, SE., Washington, DC 20590. Hand Delivery or Courier: U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200 New...
75 FR 74673 - Approval and Promulgation of Implementation Plans; Georgia: Stage II Vapor Recovery
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-01
... includes multiple modifications to Georgia's Air Quality Rules found at Chapter 391-3-1. Previously, EPA...., Atlanta, Georgia 30303-8960. 5. Hand Delivery or Courier: Ms. Lynorae Benjamin, Regulatory Development... (404) 562-9029. Ms. Spann can also be reached via electronic mail at [email protected]epa.gov . SUPPLEMENTARY...
15 CFR 745.2 - End-Use Certificate reporting requirements under the Chemical Weapons Convention.
Code of Federal Regulations, 2010 CFR
2010-01-01
... by mail or courier delivery to the following address: Information Technology Team, Treaty Compliance Division, Bureau of Industry and Security, U.S. Department of Commerce, Room 4515, 14th Street and... Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE...
Code of Federal Regulations, 2010 CFR
2010-01-01
... address: Information Technology Team, Treaty Compliance Division, Bureau of Industry and Security, U.S... courier delivery to the following address: Information Technology Team, Treaty Compliance Division, Bureau... Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-21
... signed original paper copy. 4. Hand Delivery/Courier: Ms. Brenda Edwards, U.S. Department of Energy...) 586-2945. Please submit one signed original paper copy. For detailed instructions on submitting....Edwards @ee.doe.gov. SUPPLEMENTARY INFORMATION: Table of Contents I. Background and Legal Authority II...
76 FR 12825 - Energy Conservation Program for Consumer Products: Test Procedure for Microwave Ovens
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-09
... paper copy. 4. Hand Delivery/Courier: Ms. Brenda Edwards, U.S. Department of Energy, Building.... Please submit one signed original paper copy. Written comments regarding the burden-hour estimates or... regulations.gov Web site. A link to the Supplemental Notice of Proposed Rulemaking (SNOPR) web page can be...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-02
.... Please submit one signed paper original. 4. Hand Delivery/Courier: Ms. Brenda Edwards, U.S. Department of.... Telephone: (202) 586-2945. Please submit one signed paper original. For detailed instructions on submitting... INFORMATION: Table of Contents I. Background and Authority II. Summary of the Proposal III. Discussion A...
75 FR 42612 - Energy Conservation Program for Consumer Products: Test Procedure for Microwave Ovens
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-22
...., Washington, DC 20585-0121. Please submit one signed original paper copy. 4. Hand Delivery/Courier: Ms. Brenda... Plaza, SW., Washington, DC 20024. Telephone: (202) 586-2945. Please submit one signed original paper... . SUPPLEMENTARY INFORMATION: Table of Contents I. Background and Legal Authority II. Summary of the Proposal III...
Self-Help and Community Education. Courier No. 28.
ERIC Educational Resources Information Center
ASPBAE Courier, 1983
1983-01-01
This journal consists of eight articles dealing with self-help and community education. Included in the volume are the following articles: "An Uphill Struggle--Self-Help in Bangladesh," by S. Harrison and Judy Saul; "How Not to Help a Local Community: A Case from South India," by Nora Sammut and Maria Theresa; "The High…
75 FR 72802 - Solicitation of Applications for the Planning and Local Technical Assistance Programs
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-26
... . Applications also may be delivered via hand delivery, postal mail or courier service in paper (hard copy... application. Alternatively, an applicant eligible for assistance under this notice may request a paper (hard... applications is published in the Federal Register. The content of applications is the same for paper...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-25
... OFFICE OF GOVERNMENT ETHICS Proposed Collection; Comment Request for an Unmodified OGE Form 450 Executive Branch Confidential Financial Disclosure Report AGENCY: Office of Government Ethics (OGE). ACTION... message). FAX: 202-482-9237. Mail, Hand Delivery/Courier: Office of Government Ethics, Suite 500, 1201 New...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... delivery service to the Office of the Secretary, Sixteenth Floor, One White Flint North, 11555 Rockville..., or expedited delivery service upon depositing the document with the provider of the service. A... General Counsel, Washington, DC 20555-0001. The expedited delivery or courier mail address for both...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... delivery service to the Office of the Secretary, Sixteenth Floor, One White Flint North, 11555 Rockville..., or expedited delivery service upon depositing the document with the provider of the service. A... General Counsel, Washington, DC 20555-0001. The expedited delivery or courier mail address for both...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-19
...: The Department of Labor (DOL) is submitting the Occupational Safety and Health Administration (OSHA... the safety system, or a point-of-operation injury occurs. Occupational Safety and Health Act sections... or courier to the Office of Information and Regulatory Affairs, Attn: OMB Desk Officer for DOL- OSHA...
75 FR 3758 - Proposed Extension of the Approval of Information Collection Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-22
..., identified by Control Number 1215- 0036, by either one of the following methods: E-mail: [email protected] . Mail, Hand Delivery, Courier: Regulatory Analysis Branch, Wage and Hour Division, U.S... transmit their comments electronically via e-mail or to submit them by mail early. Comments, including any...
49 CFR 375.501 - Must I write up an order for service?
Code of Federal Regulations, 2010 CFR
2010-10-01
... transmission; e-mail; overnight courier; or certified mail, return receipt requested. (b) You, your agent, or.... (iii) If you are transporting the shipment on a guaranteed service basis, the guaranteed dates or... shipment, when you transport on a collect-on-delivery basis. (10) A statement of the declared value of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-24
..., hand delivery, express mail, messenger, or courier service: When using this method, you must submit... training, inform them of the importance and proper use of safety and health equipment, and train employers... DEPARTMENT OF LABOR Occupational Safety and Health Administration [Docket No. OSHA-2010-0021...
49 CFR 1540.301 - Withdrawal of approval of a security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... express courier on a specific date. (2) Date of service. The date of service is— (i) The date of personal... by the holder of the security program, or 15 calendar days after service, whichever occurs first. (4...) Assistant Secretary's review. The designated official transmits the Petition together with all pertinent...
49 CFR 1540.301 - Withdrawal of approval of a security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... express courier on a specific date. (2) Date of service. The date of service is— (i) The date of personal... by the holder of the security program, or 15 calendar days after service, whichever occurs first. (4...) Assistant Secretary's review. The designated official transmits the Petition together with all pertinent...
49 CFR 1540.301 - Withdrawal of approval of a security program.
Code of Federal Regulations, 2012 CFR
2012-10-01
... express courier on a specific date. (2) Date of service. The date of service is— (i) The date of personal... by the holder of the security program, or 15 calendar days after service, whichever occurs first. (4...) Assistant Secretary's review. The designated official transmits the Petition together with all pertinent...
49 CFR 1540.301 - Withdrawal of approval of a security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... express courier on a specific date. (2) Date of service. The date of service is— (i) The date of personal... by the holder of the security program, or 15 calendar days after service, whichever occurs first. (4...) Assistant Secretary's review. The designated official transmits the Petition together with all pertinent...
49 CFR 1540.301 - Withdrawal of approval of a security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... express courier on a specific date. (2) Date of service. The date of service is— (i) The date of personal... by the holder of the security program, or 15 calendar days after service, whichever occurs first. (4...) Assistant Secretary's review. The designated official transmits the Petition together with all pertinent...
19 CFR 207.93 - Protection of proprietary information during panel and committee proceedings.
Code of Federal Regulations, 2014 CFR
2014-04-01
... address by facsimile transmission, expedited courier service, expedited mail service; or by personal... or an extraordinary challenge committee, any assistant to a member, court reporters and translators... competitive decision-making, as defined in US Steel Corp. v. United States, 730 F.2d 1465 (Fed. Cir. 1984...
19 CFR 207.93 - Protection of proprietary information during panel and committee proceedings.
Code of Federal Regulations, 2013 CFR
2013-04-01
... address by facsimile transmission, expedited courier service, expedited mail service; or by personal... or an extraordinary challenge committee, any assistant to a member, court reporters and translators... competitive decision-making, as defined in US Steel Corp. v. United States, 730 F.2d 1465 (Fed. Cir. 1984...
19 CFR 207.93 - Protection of proprietary information during panel and committee proceedings.
Code of Federal Regulations, 2011 CFR
2011-04-01
... address by facsimile transmission, expedited courier service, expedited mail service; or by personal... or an extraordinary challenge committee, any assistant to a member, court reporters and translators... competitive decision-making, as defined in US Steel Corp. v. United States, 730 F.2d 1465 (Fed. Cir. 1984...
19 CFR 207.93 - Protection of proprietary information during panel and committee proceedings.
Code of Federal Regulations, 2012 CFR
2012-04-01
... address by facsimile transmission, expedited courier service, expedited mail service; or by personal... or an extraordinary challenge committee, any assistant to a member, court reporters and translators... competitive decision-making, as defined in US Steel Corp. v. United States, 730 F.2d 1465 (Fed. Cir. 1984...
78 FR 24300 - Qualification of Drivers; Exemption Applications; Vision
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-24
... New Jersey Avenue SE., West Building Ground Floor, Room W12-140, Washington, DC 20590-0001. Hand Delivery or Courier: West Building Ground Floor, Room W12-140, 1200 New Jersey Avenue SE., Washington, DC...-140 on the ground level of the West Building, 1200 New Jersey Avenue SE., Washington, DC, between 9 a...
Women and Development. Courier No. 29.
ERIC Educational Resources Information Center
ASPBAE Courier Service, 1983
1983-01-01
This issue contains materials, about and for women, which have been produced as part of the United Nations Decade for Women. Included are presentations made at the Asian-South Bureau of Adult Education Conferences and other congresses, conferences, and meetings held to discuss women in developing nations. The first three papers deal with the…
78 FR 17136 - Federal Credit Union Ownership of Fixed Assets
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-20
...-3428. Hand DeliveryCourier: Same as mail address. Public Inspection: You may view all public comments... with its usage plan. In the Board's view, ``meaningful'' means a portion large enough that an FCU is... rule may have on a substantial number of small entities (primarily those under fifty million dollars in...
12 CFR 747.10 - Filing of papers.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Filing of papers. 747.10 Section 747.10 Banks... Practice and Procedure § 747.10 Filing of papers. (a) Filing. Any papers required to be filed, excluding...) Delivering the papers to a reliable commercial courier service, overnight delivery service, or to the U.S...
12 CFR 747.10 - Filing of papers.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Filing of papers. 747.10 Section 747.10 Banks... Practice and Procedure § 747.10 Filing of papers. (a) Filing. Any papers required to be filed, excluding...) Delivering the papers to a reliable commercial courier service, overnight delivery service, or to the U.S...
Adult Education in Asia. Courier No. 38.
ERIC Educational Resources Information Center
ASPBAE Courier, 1986
1986-01-01
This journal issue contains a series of papers concerned with exploring the role that adult education can play in developing communities. The first paper, "Major Challenges and Prospect of Adult Education for the Year 2000" (T. M. Sakya), provides an overview of adult education in Asia and the Pacific, emphasizing the vastness of the…
77 FR 65662 - Request for Extension and Revision of a Currently Approved Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-30
... Stockyards Administration's intention to request that the Office of Management and Budget approve a 3-year... online instructions for submitting comments. Mail, hand deliver, or courier to Dexter Thomas, GIPSA, USDA... subsequent filings of new contracts or changes, as packers initially need to review all their contracts to...
Improving the trust in results of numerical simulations and scientific data analytics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cappello, Franck; Constantinescu, Emil; Hovland, Paul
This white paper investigates several key aspects of the trust that a user can give to the results of numerical simulations and scientific data analytics. In this document, the notion of trust is related to the integrity of numerical simulations and data analytics applications. This white paper complements the DOE ASCR report on Cybersecurity for Scientific Computing Integrity by (1) exploring the sources of trust loss; (2) reviewing the definitions of trust in several areas; (3) providing numerous cases of result alteration, some of them leading to catastrophic failures; (4) examining the current notion of trust in numerical simulation andmore » scientific data analytics; (5) providing a gap analysis; and (6) suggesting two important research directions and their respective research topics. To simplify the presentation without loss of generality, we consider that trust in results can be lost (or the results’ integrity impaired) because of any form of corruption happening during the execution of the numerical simulation or the data analytics application. In general, the sources of such corruption are threefold: errors, bugs, and attacks. Current applications are already using techniques to deal with different types of corruption. However, not all potential corruptions are covered by these techniques. We firmly believe that the current level of trust that a user has in the results is at least partially founded on ignorance of this issue or the hope that no undetected corruptions will occur during the execution. This white paper explores the notion of trust and suggests recommendations for developing a more scientifically grounded notion of trust in numerical simulation and scientific data analytics. We first formulate the problem and show that it goes beyond previous questions regarding the quality of results such as V&V, uncertainly quantification, and data assimilation. We then explore the complexity of this difficult problem, and we sketch complementary general approaches to address it. This paper does not focus on the trust that the execution will actually complete. The product of simulation or of data analytic executions is the final element of a potentially long chain of transformations, where each stage has the potential to introduce harmful corruptions. These corruptions may produce results that deviate from the user-expected accuracy without notifying the user of this deviation. There are many potential sources of corruption before and during the execution; consequently, in this white paper we do not focus on the protection of the end result after the execution.« less
Regulating trust in pediatric clinical trials.
Pinxten, Wim; Nys, Herman; Dierickx, Kris
2008-12-01
The participation of minors in clinical trials is essential to provide safe and effective medical care to children. Because few drugs have been tested in children, pediatricians are forced to prescribe medications off-label with uncertain efficacy and safety. In this article, we analyze how the enrollment of minors in clinical trials is negotiated within relationships of mutual trust between clinicians, minors, and their parents. After a brief description of the problems associated with involving minors in clinical research, we consider how existing "relationships of trust" can be used as a place where the concerns of research subjects can be more fully discussed and addressed. Building on the tacit recognition of trust found in The European Clinical Trials Directive we make policy recommendations that allow for clearer, more ethically informed guidelines for enrolling minors in clinical research.
On Deep Learning for Trust-Aware Recommendations in Social Networks.
Deng, Shuiguang; Huang, Longtao; Xu, Guandong; Wu, Xindong; Wu, Zhaohui
2017-05-01
With the emergence of online social networks, the social network-based recommendation approach is popularly used. The major benefit of this approach is the ability of dealing with the problems with cold-start users. In addition to social networks, user trust information also plays an important role to obtain reliable recommendations. Although matrix factorization (MF) becomes dominant in recommender systems, the recommendation largely relies on the initialization of the user and item latent feature vectors. Aiming at addressing these challenges, we develop a novel trust-based approach for recommendation in social networks. In particular, we attempt to leverage deep learning to determinate the initialization in MF for trust-aware social recommendations and to differentiate the community effect in user's trusted friendships. A two-phase recommendation process is proposed to utilize deep learning in initialization and to synthesize the users' interests and their trusted friends' interests together with the impact of community effect for recommendations. We perform extensive experiments on real-world social network data to demonstrate the accuracy and effectiveness of our proposed approach in comparison with other state-of-the-art methods.
The "trust" heuristic: arguments from authority in public health.
Cummings, Louise
2014-01-01
The work of public health depends on a relationship of trust between health workers and members of the public. This relationship is one in which the public must trust the advice of health experts, even if that advice is not always readily understood or judged to be agreeable. However, it will be argued in this article that the pact of trust between public health workers and members of the public has been steadily eroded over many years. The reasons for this erosion are examined as are attempts to characterize the concept of trust in empirical studies. The discussion then considers how a so-called informal fallacy, known as the "argument from authority," might contribute to attempts to understand the trust relationship between the public and health experts. Specifically, this argument enables the lay person to bridge gaps in knowledge and arrive at judgements about public health problems by attending to certain logical and epistemic features of expertise. The extent to which lay people are able to discern these features is considered by examining the results of a study of public health reasoning in 879 members of the public.
Perceived Competency and Resolution of Homelessness Among Women with Substance Abuse Problems
Finfgeld-Connett, Deborah; Bloom, Tina L.; Johnson, E. Diane
2011-01-01
Using a metasynthesis approach, our aim was to articulate new insights relating to the most efficient and effective means of helping homeless women with substance abuse problems to enhance their well-being and become more stably housed. Distorted perceptions of competency, which are shaped by dysfunctional relationships and mental health problems, make it challenging for women with substance abuse problems to resolve homelessness. Women with particularly low or high levels of perceived competency tend to grapple with challenges related to structure and control, trust, and hopelessness. Therapeutic strategies for approaching these women include careful assessment, caring, personalized structure and control, development of interpersonal trust, instillation of hope, and the targeted use of psychotherapeutic agents and counseling. Framing care for homeless women within the context of perceived competency offers a new way of understanding their plight and shaping interventions to more expeditiously move them toward healthy and stable lives. PMID:21890717
Perceived competency and resolution of homelessness among women with substance abuse problems.
Finfgeld-Connett, Deborah; Bloom, Tina L; Johnson, E Diane
2012-03-01
Using a metasynthesis approach, our aim was to articulate new insights relating to the most efficient and effective means of helping homeless women with substance abuse problems to enhance their well-being and become more stably housed. Distorted perceptions of competency, which are shaped by dysfunctional relationships and mental health problems, make it challenging for women with substance abuse problems to resolve homelessness. Women with particularly low or high levels of perceived competency tend to grapple with challenges related to structure and control, trust, and hopelessness. Therapeutic strategies for approaching these women include careful assessment, caring, personalized structure and control, development of interpersonal trust, instillation of hope, and the targeted use of psychotherapeutic agents and counseling. Framing care for homeless women within the context of perceived competency offers a new way of understanding their plight and shaping interventions to more expeditiously move them toward healthy and stable lives.
Developing New Understandings of PDS Work: Better Problems, Better Questions.
ERIC Educational Resources Information Center
Dana, Nancy Fitchman; Silva, Diane Yendol; Gimbert, Belinda; Nolan, Jim, Jr.; Zembal-Saul, Carla; Tzur, Ron; Mule, Lucy; Sanders, Lynne
2001-01-01
Demonstrates how analyzing the evolution of long-term Professional Development School (PDS) problems can serve as indicators of PDS growth, identifying three persistent problems (building trust and relationships between university and school personnel, reconceptualizing existing coursework to fit in the PDS context, and making inquiry a central…
Rolling out Productive Ward foundation modules across a hospital trust.
Foster, Sam; Gordon, Pete; McSherry, Wilfred
The Shrewsbury and Telford Hospitals NHS Trust has spent the last 12 months rolling out the Productive Ward foundation modules across the whole organisation. This has resulted in measurable increases in time spent on direct care, and reduced infection rates and ward non-pay (non-staffing) expenditure. This article discusses the initiative and looks at how problems with the hospital supply chain are being addressed.
Social capital and health in Kenya: A multilevel analysis.
Musalia, John
2016-10-01
Despite the acknowledgment that social capital is an important predictor of good health and overall well being in wealthy countries, little empirical research has been conducted in developing countries, particularly in Africa, to examine this relationship. This study examines the association between cognitive (trust) and structural (membership in organization) social capital on health at both the individual and contextual levels. Health was measured using answers to a subjective question on physical health and anxiety/worry suffered by individuals within the last 30 days. This study utilized Afrobarometer data collected in Kenya in 2005 to examine this relationship using multilevel logistic statistical modeling. Upon controlling for socioeconomic and demographic factors, social capital was found to be significantly associated with anxiety/worry and physical health in Kenya. Membership in organizations was associated with increased odds (OR = 1.34, 95%CI: 1.02-1.76) of physical health problems, while individual trust was associated with a 6% (OR = 0.94, 95%CI: 0.90-0.99) reduction in the likelihood of physical health problems. Conversely, generalized trust was associated with a 37% reduction in the odds (OR = 0.63, 95%CI: 0.40-0.99) of anxiety/worry, while individual trust was associated with a 5% reduction (OR = 0.95, 95%CI: 0.90-1.00) of anxiety/worry. With the exception of membership in an organization that exacerbates physical health, both individual level trust and generalized trust were associated with better health outcomes in Kenya. The availability of social organizations at the contextual level was associated with worsening anxiety/worry although the effect size was small. These results show that social capital, particularly trust, is a concept that can apply to different social and cultural contexts and can potentially be harnessed to improve health in settings that suffer from resource poverty. Copyright © 2016 Elsevier Ltd. All rights reserved.
Habibov, Nazim; Cheung, Alex; Auchynnikava, Alena
2017-09-01
The purpose of this paper is to investigate the effect of social trust on the willingness to pay more taxes to improve public healthcare in post-communist countries. The well-documented association between higher levels of social trust and better health has traditionally been assumed to reflect the notion that social trust is positively associated with support for public healthcare system through its encouragement of cooperative behaviour, social cohesion, social solidarity, and collective action. Hence, in this paper, we have explicitly tested the notion that social trust contributes to an increase in willingness to financially support public healthcare. We use micro data from the 2010 Life-in-Transition survey (N = 29,526). Classic binomial probit and instrumental variables ivprobit regressions are estimated to model the relationship between social trust and paying more taxes to improve public healthcare. We found that an increase in social trust is associated with a greater willingness to pay more taxes to improve public healthcare. From the perspective of policy-making, healthcare administrators, policy-makers, and international donors should be aware that social trust is an important factor in determining the willingness of the population to provide much-needed financial resources to supporting public healthcare. From a theoretical perspective, we found that estimating the effect of trust on support for healthcare without taking confounding and measurement error problems into consideration will likely lead to an underestimation of the true effect of trust. Copyright © 2017 Elsevier Ltd. All rights reserved.
Trust-Enhanced Cloud Service Selection Model Based on QoS Analysis.
Pan, Yuchen; Ding, Shuai; Fan, Wenjuan; Li, Jing; Yang, Shanlin
2015-01-01
Cloud computing technology plays a very important role in many areas, such as in the construction and development of the smart city. Meanwhile, numerous cloud services appear on the cloud-based platform. Therefore how to how to select trustworthy cloud services remains a significant problem in such platforms, and extensively investigated owing to the ever-growing needs of users. However, trust relationship in social network has not been taken into account in existing methods of cloud service selection and recommendation. In this paper, we propose a cloud service selection model based on the trust-enhanced similarity. Firstly, the direct, indirect, and hybrid trust degrees are measured based on the interaction frequencies among users. Secondly, we estimate the overall similarity by combining the experience usability measured based on Jaccard's Coefficient and the numerical distance computed by Pearson Correlation Coefficient. Then through using the trust degree to modify the basic similarity, we obtain a trust-enhanced similarity. Finally, we utilize the trust-enhanced similarity to find similar trusted neighbors and predict the missing QoS values as the basis of cloud service selection and recommendation. The experimental results show that our approach is able to obtain optimal results via adjusting parameters and exhibits high effectiveness. The cloud services ranking by our model also have better QoS properties than other methods in the comparison experiments.
Achieving Optimal Privacy in Trust-Aware Social Recommender Systems
NASA Astrophysics Data System (ADS)
Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail
Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.
Trust-Enhanced Cloud Service Selection Model Based on QoS Analysis
Pan, Yuchen; Ding, Shuai; Fan, Wenjuan; Li, Jing; Yang, Shanlin
2015-01-01
Cloud computing technology plays a very important role in many areas, such as in the construction and development of the smart city. Meanwhile, numerous cloud services appear on the cloud-based platform. Therefore how to how to select trustworthy cloud services remains a significant problem in such platforms, and extensively investigated owing to the ever-growing needs of users. However, trust relationship in social network has not been taken into account in existing methods of cloud service selection and recommendation. In this paper, we propose a cloud service selection model based on the trust-enhanced similarity. Firstly, the direct, indirect, and hybrid trust degrees are measured based on the interaction frequencies among users. Secondly, we estimate the overall similarity by combining the experience usability measured based on Jaccard’s Coefficient and the numerical distance computed by Pearson Correlation Coefficient. Then through using the trust degree to modify the basic similarity, we obtain a trust-enhanced similarity. Finally, we utilize the trust-enhanced similarity to find similar trusted neighbors and predict the missing QoS values as the basis of cloud service selection and recommendation. The experimental results show that our approach is able to obtain optimal results via adjusting parameters and exhibits high effectiveness. The cloud services ranking by our model also have better QoS properties than other methods in the comparison experiments. PMID:26606388
Leavey, Gerard; Rothi, Despina; Paul, Rini
2011-08-01
Help-seeking among young people is complicated, often determined vicariously by the ability of adults, family or professionals, to recognize, and respond to, their difficulties. We know very little about the complex concerns of teenage young people and how they impact on help-seeking preferences. We aimed to ascertain the help-seeking preferences for a range of mental health problems among adolescents attending schools in an inner-city area of London. In particular we sought to examine the relationship between such adolescents and their family doctor. Using a mixed methods approach we explored help-seeking attitudes of young people. Emotional and mental health problems are not seen by young people as the domain of General practitioners. Moreover, there is a worrying lack of confidence and trust placed in family doctor and other professionals by young people. Young people do not tend easily to trust adults to help them with emotional difficulties. Copyright © 2010 The Foundation for Professionals in Services for Adolescents. All rights reserved.
Verhees, Martine W F T; Ceulemans, Eva; Bakermans-Kranenburg, Marian J; van IJzendoorn, Marinus H; de Winter, Simon; Bosmans, Guy
2017-07-14
Lack of trust in parental support is a transdiagnostic risk factor for the development of psychological problems throughout the lifespan. Research suggests that children's cognitive attachment representations and related information processing biases could be an important target for interventions aiming to build trust in the parent-child relationship. A paradigm that can alter these biases and increase trust is that of Cognitive Bias Modification (CBM), during which a target processing bias is systematically trained. Trust-related CBM training effects could possibly be enhanced by oxytocin, a neuropeptide that has been proposed to play an important role in social information processing and social relationships. The present article describes the study protocol for a double-blind randomized controlled trial (RCT) aimed at testing the individual and combined effects of CBM training and oxytocin administration on trust in maternal support. One hundred children (aged 8-12 years) are randomly assigned to one of four intervention conditions. Participants inhale a nasal spray that either contains oxytocin (OT) or a placebo. Additionally, they receive either a CBM training aimed at positively modifying trust-related information processing bias or a neutral placebo training aimed to have no trust-related effects. Main and interaction effects of the interventions are assessed on three levels of trust-related outcome measures: trust-related interpretation bias; self-reported trust; and mother-child interactional behavior. Importantly, side-effects of a single administration of OT in middle childhood are monitored closely to provide further information on the safety of OT administration in this age group. The present RCT is the first study to combine CBM training with oxytocin to test for individual and combined effects on trust in mother. If effective, CBM training and oxytocin could be easily applicable and nonintrusive additions to interventions that target trust in the context of the parent-child relationship. ClinicalTrials.gov, ID: NCT02737254 . Registered on 23 March 2016.
Looi, Git-Marie Ejneborn; Sävenstedt, Stefan; Engström, Åsa
2016-01-01
The nurse-patient interaction is the cornerstone of psychiatric care, yet the concept "mental health nursing" is difficult to describe. This article aims to address this problem through the experiences of nursing students. Online journals from 14 nursing students were analyzed using qualitative content analysis, resulting in three categories: Trusting the Trusting Relationship, Voicing the Unspoken Needs, and Balancing the Dynamics of Doing and Being. This study demonstrates that providing nursing care based on trusting relationships is not a demanding task, but it takes place in a complex environment that has a tendency to make easy things complicated.
Bowman, Deborah
2017-03-01
Trust is frequently discussed with reference to the professional-patient relationship. However, trust is less explored in relation to the ways in which understanding of, and responses to, questions of ethics are discussed by both the "public" and "experts." Public engagement activity in healthcare ethics may invoke "trust" in analysing a moral question or problem but less frequently conceives of trust as integral to "public engagement" itself. This paper explores the relationship between trust and the ways in which questions of healthcare ethics are identified and negotiated by both "experts" and the public. Drawing on two examples from the author's "public engagement" work-a radio programme for the British Broadcasting Corporation and work with a playwright and theatre-the paper interrogates the ways in which "public engagement" is often characterized. The author argues that the common approach to public engagement in questions of ethics is unhelpfully constrained by a systemic disposition which continues to privilege the professional or expert voice at the expense of meaningful exchange and dialogue. By creating space for novel interactions between the "expert" and the "public," authentic engagement is achieved that enables not only the participants to flourish but also contributes to trust itself.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
....regulations.gov ). Instructions for submitting and reading comments are detailed on the site. Submit Comments Using the Internet: Go to Regulations.gov ( http://www.regulations.gov ). Instructions for submitting and reading comments are detailed on the site. Mail, Courier or Hand Delivery: Eric J. Jabs, Chief...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-25
... Permitting Division, EPA Region 6, 1445 Ross Avenue, Dallas, Texas 75202-2733. 4. Hand Delivery or Courier..., EPA Region 6, 1445 Ross Avenue, Dallas, Texas 75202-2733. Instructions: Do not submit information that... Ross Avenue, Dallas, Texas, 75202-2733, phone number (214) 665-8533 or (214) 665-8178. Interested...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-23
... Permitting Division, EPA Region 6, 1445 Ross Avenue, Dallas, Texas 75202-2733. 4. Hand Delivery or Courier... Oversight Section (6PD-O), Multimedia Planning and Permitting Division, EPA Region 6, 1445 Ross Avenue... following location: EPA Region 6, 1445 Ross Avenue, Dallas, Texas 75202-2733, phone number (214) 665- 8533...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-07
... Permitting Division, EPA Region 6, 1445 Ross Avenue, Dallas, Texas 75202-2733. 4. Hand Delivery or Courier... Oversight Section (6PD-O), Multimedia Planning and Permitting Division, EPA Region 6, 1445 Ross Avenue... 6, 1445 Ross Avenue, Dallas, Texas, 75202-2733, phone number (214) 665-8533 or (214) 665-8178...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
...-Filing system also distributes an email notice that provides access to the document to the NRC's Office... mail, or expedited delivery service to the Office of the Secretary, Sixteenth Floor, One White Flint... courier, express mail, or expedited delivery service upon depositing the document with the provider of the...
31 CFR 538.703 - Response to prepenalty notice; informal settlement.
Code of Federal Regulations, 2010 CFR
2010-07-01
... which to submit a response to the prepenalty notice. The failure to submit a response within the... transmitted to OFAC by courier) on or before the 30th day after the postmark date on the envelope in which the... than proposed. (d) Failure to respond. Where OFAC receives no response to a prepenalty notice within...
31 CFR 537.703 - Response to prepenalty notice; informal settlement.
Code of Federal Regulations, 2010 CFR
2010-07-01
... which to submit a response to the prepenalty notice. The failure to submit a response within the... transmitted to OFAC by courier) on or before the 30th day after the postmark date on the envelope in which the...) Failure to Respond. Where OFAC receives no response to a prepenalty notice within the applicable time...
31 CFR 541.703 - Response to prepenalty notice; informal settlement.
Code of Federal Regulations, 2010 CFR
2010-07-01
... submit a response to the prepenalty notice. The failure to submit a response within the applicable time... transmitted to OFAC by courier) on or before the 30th day after the postmark date on the envelope in which the...) Failure to respond. Where OFAC receives no response to a prepenalty notice within the applicable time...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
...). These revisions would implement certain provisions under the Medicare Improvements for Patients and... with the Social Security Act. The comment period for the proposed rule, which would have ended on June... Stop C4-26-05, 7500 Security Boulevard, Baltimore, MD 21244-1850. 4. By hand or courier. If you prefer...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-05
... to believe that an article of food is adulterated or misbranded. This will further help FDA prevent.... Mail/Hand delivery/Courier (for paper, disk, or CD-ROM submissions): Division of Dockets Management... ``Search'' box and follow the prompts and/or go to the Division of Dockets Management, 5630 Fishers Lane...
30 CFR 1243.200 - How do I demonstrate financial solvency?
Code of Federal Regulations, 2011 CFR
2011-07-01
... Section using: (1) The U.S. Postal Service or private delivery at P.O. Box 5760, MS 3031, Denver, CO 80217-5760; or (2) Courier or overnight delivery at MS 3031, Denver Federal Center, Bldg. 85, Room A-212, Denver, CO 80225-0165. (b) You must submit an audited consolidated balance sheet annually, and, if...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-02
... Ada County Air Quality Maintenance Area will maintain air quality standards for carbon monoxide (CO... Avenue, Suite 900, Seattle, WA 98101. Hand Delivery/Courier: U.S. EPA Region 10, 1200 Sixth Avenue, Suite... deliveries are only accepted during normal hours of operation, and special arrangements should be made for...
30 CFR 1218.51 - How to make payments.
Code of Federal Regulations, 2011 CFR
2011-07-01
...: Office of Natural Resources Revenue, P.O. Box 5640, Denver, CO 80217-5640. (3) For all other Federal and... Resources Revenue, P.O. Box 5810, Denver, CO 80217-5810. (e) Where to send a non-EFT payment when you use a courier or overnight delivery service. You should send this type of payment to: Office of Natural...
77 FR 48505 - Submission for OMB Review; Comment Request-Flammability Standards for Carpets and Rugs
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-14
... passing test results, then only one test per year is required. For purposes of estimating burden, we have... mail/hand delivery/courier (for paper, disk, or CD-ROM submissions), preferably in five copies, to... to perform each year varies, depending upon the number of carpet styles and the annual volume of...
77 FR 18973 - Reinforced Concrete in Construction, and Preventing Backover Injuries and Fatalities
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-29
... mail, express delivery, hand (courier) delivery, or messenger service. Submit a copy of comments and... delivery, or messenger service. The hours of operation for the OSHA Docket Office are 8:15 a.m.-4:45 p.m.... General Reinforcing Safety F. Impalement G. Training H. Injuries I. Economic Issues J. References I...
75 FR 186 - Energy Conservation Program: Test Procedures for Walk-In Coolers and Walk-In Freezers
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-04
... freezers: (i) The R value shall be the 1/K factor multiplied by the thickness of the panel. (ii) The K... signed original paper copy. 4. Hand Delivery/Courier: Ms. Brenda Edwards, U.S. Department of Energy... signed original paper copy. For detailed instructions on submitting comments and additional information...
Expeditionary Diplomacy: A Security Challenge
2014-07-14
include special agents, engineers, diplomatic couriers , Civil Service specialists, and contractors-- work together as a team to ensure that the...Directorate ofThreat Investigations and Analysis , 2013) 59 Bibliography Congressional Research Service . Diplomacy for the 21st Centwy: Transformational...enough resources and personnel to mitigate casualties among Foreign Service Officers (FSO) and creating an environment wherein an FSO is no longer able
Code of Federal Regulations, 2011 CFR
2011-10-01
... behalf of it and other indirect air carriers that co-sign the proposal. (1) Within 30 calendar days after... accomplished by personal delivery, certified mail, or express courier. Documents served on an indirect air... personal delivery; (ii) If served by certified mail, the mailing date shown on the certificate of service...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-28
...) 586-2945. Please submit one signed original paper copy. Hand Delivery/Courier: Ms. Brenda Edwards, U.S.... Please submit one signed original paper copy. Docket: For access to the docket to read background... the comment period should extend past the public meeting date. DOE has determined that an extension of...
Personality and Type (but "Not" a Psychological Theory!)
ERIC Educational Resources Information Center
Holst-Larkin, Jane
2006-01-01
Word processing is part of every writer's set of competencies today, and as readers, their expectations of type have risen well beyond the old Courier font of typewriters. Yet only recently have writers had access to the thousands of different typefaces available today and had such power in making design choices. Type has been much studied and…
50 CFR 679.61 - Formation and operation of fishery cooperatives.
Code of Federal Regulations, 2012 CFR
2012-10-01
... materials to the North Pacific Fishery Management Council, 605 West 4th Ave, Suite 306, Anchorage, AK 99501..., Juneau, AK 99802. The street address for delivery by private courier is 709 West 9th St., Suite 401, Juneau, AK 99801. (3) What is the deadline for filing? The contract or renewal letter and supporting...
50 CFR 679.61 - Formation and operation of fishery cooperatives.
Code of Federal Regulations, 2011 CFR
2011-10-01
... materials to the North Pacific Fishery Management Council, 605 West 4th Ave, Suite 306, Anchorage, AK 99501..., Juneau, AK 99802. The street address for delivery by private courier is 709 West 9th St., Suite 401, Juneau, AK 99801. (3) What is the deadline for filing? The contract or renewal letter and supporting...
50 CFR 679.61 - Formation and operation of fishery cooperatives.
Code of Federal Regulations, 2014 CFR
2014-10-01
... materials to the North Pacific Fishery Management Council, 605 West 4th Ave, Suite 306, Anchorage, AK 99501..., Juneau, AK 99802. The street address for delivery by private courier is 709 West 9th St., Suite 401, Juneau, AK 99801. (3) What is the deadline for filing? The contract or renewal letter and supporting...
50 CFR 679.61 - Formation and operation of fishery cooperatives.
Code of Federal Regulations, 2013 CFR
2013-10-01
... materials to the North Pacific Fishery Management Council, 605 West 4th Ave, Suite 306, Anchorage, AK 99501..., Juneau, AK 99802. The street address for delivery by private courier is 709 West 9th St., Suite 401, Juneau, AK 99801. (3) What is the deadline for filing? The contract or renewal letter and supporting...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 5 Administrative Personnel 2 2012-01-01 2012-01-01 false Firefighters, customs and border protection officers, law enforcement officers, members of the Capitol or Supreme Court Police, and nuclear materials couriers. 842.208 Section 842.208 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED)...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Firefighters, customs and border protection officers, law enforcement officers, members of the Capitol or Supreme Court Police, and nuclear materials couriers. 842.208 Section 842.208 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED)...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Firefighters, customs and border protection officers, law enforcement officers, members of the Capitol or Supreme Court Police, and nuclear materials couriers. 842.208 Section 842.208 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED)...
Community Development, Popular Education, Financing of Adult Education. ASPBAE Courier No. 48.
ERIC Educational Resources Information Center
ASPBAE Courier, 1990
1990-01-01
Several of the articles in this document arose out of the International Council for Adult Education's World Assembly held in Bangkok, Thailand, in January 1990. The first article is on the 1989 evaluation of the Hilltribe Development Project, a long-term project undertaken in the north of Thailand. The article briefly describes various aspects of…
Strategies and Innovations for Nonformal Education for Women. ASPBAE Courier No. 46.
ERIC Educational Resources Information Center
Heslop, Yvonne, Ed.
1989-01-01
This document contains papers that were presented at a 1988 conference on nonformal education for women held in Guangzhow, China, and organized by the Asian South Pacific Bureau of Adult Education in association with the Chinese Federation for Women, the Guangzhou Adult Education Association, and Caritas Hong Kong. The following 12 papers are…
12 CFR 19.10 - Filing of papers.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Filing of papers. 19.10 Section 19.10 Banks and... Rules of Practice and Procedure § 19.10 Filing of papers. (a) Filing. Any papers required to be filed...) Delivering the papers to a reliable commercial courier service, overnight delivery service, or to the U.S...
12 CFR 19.10 - Filing of papers.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Filing of papers. 19.10 Section 19.10 Banks and... Rules of Practice and Procedure § 19.10 Filing of papers. (a) Filing. Any papers required to be filed...) Delivering the papers to a reliable commercial courier service, overnight delivery service, or to the U.S...
75 FR 47594 - Board of Scientific Counselors, Executive Committee Meeting-August 2010
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-06
[email protected] , Attention Docket ID No. EPA-HQ-ORD-2010-0661. Fax: Fax comments to: (202) 566-0224, Attention Docket ID No. EPA-HQ-ORD-2010-0661. Mail: Send comments by mail to: Board of Scientific Counselors...., Washington, DC 20004, Attention Docket ID No. EPA-HQ-ORD-2010-0661. Hand Delivery or Courier: Deliver...
Reaching and Helping Unorganized and Disadvantaged People. Courier No. 33.
ERIC Educational Resources Information Center
ASPBAE Courier, 1985
1985-01-01
The articles in this issue are mainly concerned with how to reach the poorest and most disadvantaged sections of the population and how best to help once contact has been made. "Nijera Kori in Retrospect: In Search of an Organization of the Rural Poor" (Mohiuddin Ahmad) provides extracts from an evaluation of this grassroots,…
Can I Trust This Software Package? An Exercise in Validation of Computational Results
ERIC Educational Resources Information Center
Shacham, Mordechai; Brauner, Neima; Ashurst, W. Robert; Cutlip, Michael B.
2008-01-01
Mathematical software packages such as Polymath, MATLAB, and Mathcad are currently widely used for engineering problem solving. Applications of several of these packages to typical chemical engineering problems have been demonstrated by Cutlip, et al. The main characteristic of these packages is that they provide a "problem-solving environment…
Jeffrey J. Brooks; Alexander N. Bujak; Joseph G. Champ; Daniel R. Williams
2006-01-01
We reviewed, annotated, and organized recent social science research and developed a framework for addressing the wildland fire social problem. We annotated articles related to three topic areas or factors, which are critical for understanding collective action, particularly in the wildland-urban interface. These factors are collaborative capacity, problem framing, and...
Parkinson Patients' Initial Trust in Avatars: Theory and Evidence.
Javor, Andrija; Ransmayr, Gerhard; Struhal, Walter; Riedl, René
2016-01-01
Parkinson's disease (PD) is a neurodegenerative disease that affects the motor system and cognitive and behavioral functions. Due to these impairments, PD patients also have problems in using the computer. However, using computers and the Internet could help these patients to overcome social isolation and enhance information search. Specifically, avatars (defined as virtual representations of humans) are increasingly used in online environments to enhance human-computer interaction by simulating face-to-face interaction. Our laboratory experiment investigated how PD patients behave in a trust game played with human and avatar counterparts, and we compared this behavior to the behavior of age, income, education and gender matched healthy controls. The results of our study show that PD patients trust avatar faces significantly more than human faces. Moreover, there was no significant difference between initial trust of PD patients and healthy controls in avatar faces, while PD patients trusted human faces significantly less than healthy controls. Our data suggests that PD patients' interaction with avatars may constitute an effective way of communication in situations in which trust is required (e.g., a physician recommends intake of medication). We discuss the implications of these results for several areas of human-computer interaction and neurological research.
Parkinson Patients’ Initial Trust in Avatars: Theory and Evidence
Javor, Andrija; Ransmayr, Gerhard; Struhal, Walter; Riedl, René
2016-01-01
Parkinson’s disease (PD) is a neurodegenerative disease that affects the motor system and cognitive and behavioral functions. Due to these impairments, PD patients also have problems in using the computer. However, using computers and the Internet could help these patients to overcome social isolation and enhance information search. Specifically, avatars (defined as virtual representations of humans) are increasingly used in online environments to enhance human-computer interaction by simulating face-to-face interaction. Our laboratory experiment investigated how PD patients behave in a trust game played with human and avatar counterparts, and we compared this behavior to the behavior of age, income, education and gender matched healthy controls. The results of our study show that PD patients trust avatar faces significantly more than human faces. Moreover, there was no significant difference between initial trust of PD patients and healthy controls in avatar faces, while PD patients trusted human faces significantly less than healthy controls. Our data suggests that PD patients’ interaction with avatars may constitute an effective way of communication in situations in which trust is required (e.g., a physician recommends intake of medication). We discuss the implications of these results for several areas of human-computer interaction and neurological research. PMID:27820864
Counselling Ethnic Minorities: Does It Require Special Skills?
ERIC Educational Resources Information Center
Shack, Sybil
1978-01-01
Ethnicity is an important part of Canadian life. There is no magic formula for counseling "ethnic" students. Ethnic differences create some problems, but add spice and color to Canadian classrooms. Knowledge, understanding, sensitivity, acceptance, and mutual trust help to dissipate the problems. (Author)
Managing Stress in the Principalship.
ERIC Educational Resources Information Center
Lyons, James E.
1990-01-01
The principal's office is frequently a collection point for problems and demands. Secondary school principals often average 1,000 interactions daily. Principals can manage stress by declining to solve every problem, delegating responsibility, reexamining their supervisory role, developing networks of trusted friends, and engaging in…
Investigation of the trust status of the nurse-patient relationship.
Ozaras, Gözde; Abaan, Süheyla
2016-09-07
Professional nurses provide holistic healthcare to people and deal with patients closely. Furthermore, patients need nurses to do self-care and patients trust them for their treatments. Therefore, trust is extremely important in a professional care relationship and in satisfactory patient outcomes. The aim of this study was to examine the patients' views on the trust status toward nurses and the factors important for the development of trust in a nurse-patient relationship. This research was planned as a descriptive cross-sectional study. The study was carried out between April and July 2014 at the oncology hospital of a university in Ankara, Turkey. The sample size was calculated by power analysis and was composed of 356 inpatients diagnosed with cancer. For data collection, a questionnaire and the "Trust in Nurses Scale" were used. FROM THE HOSPITAL AND WRITTEN INFORMED CONSENT OBTAINED FROM PARTICIPATING PATIENTS: Approval from the University Clinical Research Ethics Committee was obtained. Written approval was obtained from the hospital and consent letter from the patients. The average score on the scale was 24.5 ± 3.9, meaning that patients had a high level of trust toward nurses in this hospital. The patients who were in the 50-59 age group and men had statistically higher scores compared with other groups. Patients' answers revealed that themes of "Personal and Professional Characteristics" were important when developing trust, however "Mistreatment, Professional Incapability, and Communication Problem" were important causing mistrust toward the nurses. In this study, the nurses' professional competencies and interpersonal caring attributes emerged as most important in developing trust. This study paid attention to the values and attitudes that develop patients' trust toward nurses. Moreover, the findings raise ethical questions about how the patients' basic rights are to be protected and how their trust level can be heightened. Nurse managers need to assess continuously how trust toward nurses is developed, protected, and maintained in their institutions. © The Author(s) 2016.
Alimena, Stephanie; Air, Mary E
2016-09-01
Patients who trust their physicians are more likely to communicate about medical problems, adhere to medical advice, and be satisfied with care. Dancers have demonstrated low utilization of physician services for both preventive care and dance injuries. The purpose of this cross-sectional study was to examine trust in physicians as a variable influencing dancers' health care-seeking behavior. The validated Trust in Physician Scale was administered to 45 professional and 34 student ballet/contemporary dancers in France (36.7% male, 63.3% female) to evaluate their trust in medical doctors (MDs) vs physical therapists (PTs). Dancers were also asked about satisfaction and confidence in medical treatment for dance injuries. Dancers indicated greater trust in PTs than MDs (70.61±10.57 vs 65.38±10.79, t=-3.499, p=0.001). Students exhibited significantly less trust in MDs than professional dancers (62.04±9.96 vs 67.65±10.42, t=-2.381, p=0.020). Trust scale scores for PTs did not differ between students and professionals (69.53±8.30 vs 71.68±12.09, t=-0.866, p=0.389). Students were less confident than professional dancers in their physician's ability to treat their most severe injury (6.7% of students vs 35.7% of professionals "very confident, " X2=9.402, p=0.052). Dancer patients exhibit lower trust in physicians compared to previously studied non-dancer populations. Our results suggest that reduced trust in physicians and factors related to professional status may influence dancers' health care-seeking behavior. Student dancers may comprise a unique subpopulation of dancers with distinctive health care needs.
Social Trust Prediction Using Heterogeneous Networks
HUANG, JIN; NIE, FEIPING; HUANG, HENG; TU, YI-CHENG; LEI, YU
2014-01-01
Along with increasing popularity of social websites, online users rely more on the trustworthiness information to make decisions, extract and filter information, and tag and build connections with other users. However, such social network data often suffer from severe data sparsity and are not able to provide users with enough information. Therefore, trust prediction has emerged as an important topic in social network research. Traditional approaches are primarily based on exploring trust graph topology itself. However, research in sociology and our life experience suggest that people who are in the same social circle often exhibit similar behaviors and tastes. To take advantage of the ancillary information for trust prediction, the challenge then becomes what to transfer and how to transfer. In this article, we address this problem by aggregating heterogeneous social networks and propose a novel joint social networks mining (JSNM) method. Our new joint learning model explores the user-group-level similarity between correlated graphs and simultaneously learns the individual graph structure; therefore, the shared structures and patterns from multiple social networks can be utilized to enhance the prediction tasks. As a result, we not only improve the trust prediction in the target graph but also facilitate other information retrieval tasks in the auxiliary graphs. To optimize the proposed objective function, we use the alternative technique to break down the objective function into several manageable subproblems. We further introduce the auxiliary function to solve the optimization problems with rigorously proved convergence. The extensive experiments have been conducted on both synthetic and real- world data. All empirical results demonstrate the effectiveness of our method. PMID:24729776
Social Trust Prediction Using Heterogeneous Networks.
Huang, Jin; Nie, Feiping; Huang, Heng; Tu, Yi-Cheng; Lei, Yu
2013-11-01
Along with increasing popularity of social websites, online users rely more on the trustworthiness information to make decisions, extract and filter information, and tag and build connections with other users. However, such social network data often suffer from severe data sparsity and are not able to provide users with enough information. Therefore, trust prediction has emerged as an important topic in social network research. Traditional approaches are primarily based on exploring trust graph topology itself. However, research in sociology and our life experience suggest that people who are in the same social circle often exhibit similar behaviors and tastes. To take advantage of the ancillary information for trust prediction, the challenge then becomes what to transfer and how to transfer. In this article, we address this problem by aggregating heterogeneous social networks and propose a novel joint social networks mining (JSNM) method. Our new joint learning model explores the user-group-level similarity between correlated graphs and simultaneously learns the individual graph structure; therefore, the shared structures and patterns from multiple social networks can be utilized to enhance the prediction tasks. As a result, we not only improve the trust prediction in the target graph but also facilitate other information retrieval tasks in the auxiliary graphs. To optimize the proposed objective function, we use the alternative technique to break down the objective function into several manageable subproblems. We further introduce the auxiliary function to solve the optimization problems with rigorously proved convergence. The extensive experiments have been conducted on both synthetic and real- world data. All empirical results demonstrate the effectiveness of our method.
Stocks, Susan Jill; Donnelly, Ailsa; Esmail, Aneez; Beresford, Joanne; Luty, Sarah; Deacon, Richard; Danczak, Avril; Mann, Nicola; Townsend, David; Ashley, James; Gamble, Carolyn; Bowie, Paul; Campbell, Stephen M
2018-06-13
To estimate the frequency of patient-perceived potentially harmful problems occurring in primary care. To describe the type of problem, patient predictors of perceiving a problem, the primary care service involved, how the problem was discussed and patient suggestions as to how the problem might have been prevented. To describe clinician/public opinions regarding the likelihood that the patient-described scenario is potentially harmful. Population-level survey. Great Britain. A nationally representative sample of 3975 members of the public aged ≥15 years interviewed during April 2016. Counts of patient-perceived potentially harmful problems in the last 12 months, descriptions of patient-described scenarios and review by clinicians/members of the public. 3975 of 3996 participants in a nationally representative survey completed the relevant questions (99.5%). 300 (7.6%; 95% CI 6.7% to 8.4%) of respondents reported experiencing a potentially harmful preventable problem in primary care during the past 12 months and 145 (48%) discussed their concerns within primary care. This did not vary with age, gender or type of service used. A substantial minority (30%) of the patient-perceived problems occurred outside general practice, particularly the dental surgery, walk in clinic, out of hours care and pharmacy. Patients perceiving a potentially harmful preventable problem were eight times more likely to have 'no confidence and trust in primary care' compared with 'yes, definitely' (OR 7.9; 95% CI 5.9 to 10.7) but those who discussed their perceived-problem appeared to maintain higher trust and confidence. Generally, clinicians ranked the patient-described scenarios as unlikely to be potentially harmful. This study highlights the importance of actively soliciting patient's views about preventable harm in primary care as patients frequently perceive potentially harmful preventable problems and make useful suggestions for their prevention. Such engagement may also help to improve confidence and trust in primary care. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Bowland Maths: Problem Solving in Key Stage 3
ERIC Educational Resources Information Center
Lane, Peter; Lister, Adelaide; Onion, Alice; Wintle, Karen
2008-01-01
A project has been developed for KS3 maths, funded by the Bowland Trust (www.bowlandmaths.org.uk) with additional support from the DCSF. It consists of a teaching resource of about 20 case-study problems aimed at developing thinking, reasoning and problem-solving skills and has been distributed to all UK secondary schools. Each case study includes…
An effective trust-based recommendation method using a novel graph clustering algorithm
NASA Astrophysics Data System (ADS)
Moradi, Parham; Ahmadian, Sajad; Akhlaghian, Fardin
2015-10-01
Recommender systems are programs that aim to provide personalized recommendations to users for specific items (e.g. music, books) in online sharing communities or on e-commerce sites. Collaborative filtering methods are important and widely accepted types of recommender systems that generate recommendations based on the ratings of like-minded users. On the other hand, these systems confront several inherent issues such as data sparsity and cold start problems, caused by fewer ratings against the unknowns that need to be predicted. Incorporating trust information into the collaborative filtering systems is an attractive approach to resolve these problems. In this paper, we present a model-based collaborative filtering method by applying a novel graph clustering algorithm and also considering trust statements. In the proposed method first of all, the problem space is represented as a graph and then a sparsest subgraph finding algorithm is applied on the graph to find the initial cluster centers. Then, the proposed graph clustering algorithm is performed to obtain the appropriate users/items clusters. Finally, the identified clusters are used as a set of neighbors to recommend unseen items to the current active user. Experimental results based on three real-world datasets demonstrate that the proposed method outperforms several state-of-the-art recommender system methods.
From the Back of the Foxhole: Black Correspondents in World War II. Journalism Monographs, No. 27.
ERIC Educational Resources Information Center
Stevens, John D.
Black newspapers, like the "Chicago Defender,""The Pittsburgh Courier," and the "Baltimore Afro-American," opened the eyes of Americans to the injustices suffered at home as well as in the armed services. The black press attacked the Navy for its Jim Crowism because when World War II began, the only black sailors were…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
..., 1445 Ross Avenue, Dallas, Texas 75202-2733. 4. Hand Delivery or Courier. Deliver your comments to Alima... Planning and Permitting Division, EPA Region 6, 1445 Ross Avenue, Dallas, Texas 75202-2733. Instructions... materials from 8:30 a.m. to 4 p.m. Monday through Friday at the following location: EPA, Region 6, 1445 Ross...
11. Photographic copy of aerial photograph dated ca. 1954; Photographer ...
11. Photographic copy of aerial photograph dated ca. 1954; Photographer unknown; Original owned by Waterloo Courier, Waterloo, Iowa; AERIAL VIEW OF RATH COMPLEX, LOOKING WEST; BEEF KILLING BUILDING (149 AND LIVESTOCK HOLDING AREAS ARE AT LEFT CENTER; FERTILIZER PLANT/STORAGE BUILDINGS ARE AT BOTTOM OF PHOTO - Rath Packing Company, Sycamore Street between Elm & Eighteenth Streets, Waterloo, Black Hawk County, IA
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-13
... copies to Hanh Shaw, Office of Water and Watersheds, Mail Stop OWW-130, 1200 Sixth Avenue, Suite 900, Seattle, WA 98101-3140. E-mail: Send electronic copies to shaw[email protected] . Fax: Fax copies to the attention of Hanh Shaw at (206) 553-0165. Hand Delivery/Courier: Deliver copies to Hanh Shaw, Office of...
30 CFR 210.152 - What reports must I submit to claim allowances on an Indian lease?
Code of Federal Regulations, 2010 CFR
2010-07-01
... reasonable, actual costs of removing hydrocarbon and nonhydrocarbon elements or compounds from a gas stream....mrm.mms.gov/ReportingServices/Forms/AFSOil_Gas.htm, or you may request the forms from MMS at P.O. Box... Management Service, P.O. Box 25165, MS 396B2, Denver, Colorado 80217-0165; or (2) Special courier or...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-02
... (CO) through the year 2022. DATES: Comments must be received on or before September 4, 2012. ADDRESSES... Avenue, Suite 900, Seattle WA, 98101. Hand Delivery/Courier: U.S. EPA Region 10, 1200 Sixth Avenue, Suite 900, Seattle WA, 98101. Attention: John Chi, Office of Air, Waste and Toxics, AWT-107. Such deliveries...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-29
...-0115. Courier or hand delivery: Bureau of Land Management, New Mexico State Office, 301 Dinosaur Trail... Land Management, New Mexico State Office, 301 Dinosaur Trail, Santa Fe, NM 87508-1560, or by telephone... Management, New Mexico State Office, 301 Dinosaur Trail, Santa Fe, NM 87508-1560 Bureau of Land Management...
77 FR 56649 - Fee for Using a Priority Review Voucher in Fiscal Year 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-13
... months, OPP estimates that a multiplier of 1.67 (10 months divided by 6 months) should be applied to non... which FDA's average salary and benefit costs increased in the 3 years prior to FY 2012, to adjust the FY... that requests a street address, the courier can deliver the checks to: U.S. Bank, Attention: Government...
75 FR 12232 - Board of Scientific Counselors, Executive Committee Meeting-April 2010
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-15
... business is finished. Requests for the draft agenda or for making oral presentations at the meeting will be... , Attention Docket ID No. EPA-HQ-ORD-2010-0202. Fax: Fax comments to: (202) 566-0224, Attention Docket ID No... 20004, Attention Docket ID No. EPA-HQ-ORD-2010-0202. Hand Delivery or Courier. Deliver comments to: EPA...
Fast Facts: Recent Statistics from the Library Research Service, Nos. 248-255. March-December 2007
ERIC Educational Resources Information Center
Online Submission, 2007
2007-01-01
Issues 248 through 255 of "Fast Facts" from the Library Research Service present data gleaned from libraries in Colorado and across the nation. Topics addressed in these "Fast Facts" from 2007 include the library labor market, the benefits to libraries of using a statewide courier service, and the results of a patron survey at…
Code of Federal Regulations, 2010 CFR
2010-10-01
... transmissions; e-mail; overnight courier; or certified mail, return receipt requested. (b) The individual... transported on a collect-on-delivery basis specifically requests notification of the actual weight or volume... weighed (i.e., weighed at destination). (2) Pickup and delivery encompass two consecutive weekdays, if the...
75 FR 76940 - User Fees Relating to Enrolled Agents and Enrolled Retirement Plan Agents
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-10
... Friday between the hours of 8 a.m. and 4 p.m. to CC:PA:LPD:PR (REG- 124018-10), Courier's Desk, Internal..., DC. FOR FURTHER INFORMATION CONTACT: Concerning the proposed regulations, Emily M. Lesniak at (202... comments, the public hearing, or to be placed on the building access list to attend the public hearing...
Code of Federal Regulations, 2013 CFR
2013-07-01
... provider by overnight courier, for delivery the next business day. (f) Except as provided in paragraph (h...) Except as provided in paragraph (h) of this section, the decision to deny a provider's application or to remove a provider from the approved list shall take effect upon: (1) The expiration of the provider's...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-23
...: Application for Consular Report of Birth Abroad of a Citizen of the United States of America ACTION: Notice of...: [email protected]state.gov . Mail: (paper, disk, or CD-ROM submissions): U.S. Department of... Courier: U.S. Department of State, CA/ OCSL 2100 Pennsylvania Avenue, 4th Floor, Washington, DC 20037-3202...
Local-Community Interests and South Carolinian Newspapers' Coverage of Smoke-Free Policies.
Kim, Sei-Hill; Thrasher, James F; Rose, India D; Craft, Mary-Kathryn
2017-07-01
In this quantitative content analysis, we assess how smoke-free policies are presented in South Carolinian newspapers. In particular, this study examines the extent to which newspapers' coverage of smoke free-policies has represented the interests of their local communities. We compare newspapers in the communities whose economy relies heavily on the tourism and hospitality industry (The Post & Courier in Charleston and The Sun News in Myrtle Beach) and newspapers elsewhere (The State in Columbia and The Greenville News in Greenville), and see whether there are meaningful differences between the newspapers in the way they portray smoke-free policies, particularly in terms of their selective uses of news sources and key arguments. Our findings indicate that South Carolinian newspapers portrayed smoke-free policies largely as a political issue. Many political reasons to either support or oppose the policies were found in almost two out of three articles. We also found that The Post & Courier and The Sun News were more likely than The State and The Greenville News to make arguments against smoke-free policies, and this was particularly so when they were talking about economic impacts of the policies. Public health and media advocacy implications are discussed in detail.
Parochial trust and cooperation across 17 societies
Romano, Angelo; Balliet, Daniel; Liu, James H.
2017-01-01
International challenges such as climate change, poverty, and intergroup conflict require countries to cooperate to solve these complex problems. However, the political tide in many countries has shifted inward, with skepticism and reluctance to cooperate with other countries. Thus, cross-societal investigations are needed to test theory about trust and cooperation within and between groups. We conducted an experimental study in 17 countries designed to test several theories that explain why, who, and where people trust and cooperate more with ingroup members, compared with outgroup members. The experiment involved several interactions in the trust game, either as a trustor or trustee. We manipulated partner group membership in the trust game (ingroup, outgroup, or unknown) and if their reputation was at stake during the interaction. In addition to the standard finding that participants trust and cooperate more with ingroup than outgroup members, we obtained findings that reputational concerns play a decisive role for promoting trust and cooperation universally across societies. Furthermore, men discriminated more in favor of their ingroup than women. Individual differences in cooperative preferences, as measured by social value orientation, predicted cooperation with both ingroup and outgroup members. Finally, we did not find support for three theories about the cross-societal conditions that influence the degree of ingroup favoritism observed across societies (e.g., material security, religiosity, and pathogen stress). We discuss the implications for promoting cooperation within and between countries. PMID:29133403
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maiden, Wendy M.
Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficientmore » authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.« less
Implementation of the hepatitis C guidelines in UK health care workers.
Gibson, Kirstie; Kennedy, Ioana
2007-12-01
The UK Health Department circular HSC 2002/010 requires health care employers to test certain groups of health care workers (HCWs) for hepatitis C, without additional funding. Little is known about the consistency of implementation of such guidelines. This study audited the process, completeness and problems of implementation of circular HSC 2002/010 in acute and ambulance trusts in London and the Southeast of England. Telephone questionnaire survey of 51 National Health Service trusts between July and October 2005. The response rate was 92% (47/51). Eighty-five per cent (40/47) of the trusts reported partial or full implementation of the guidance. All compliant trusts reported testing HCWs entering exposure prone procedure specialities, although 40% (16/40) were testing more staff than specified in the guidance. Most trusts (85%) in this audit reported having implemented the guidance 3 years after publication and 90% claimed not to have needed additional funding. Implementation may be improved by greater clarity about which staff should be tested, frequency of testing and by raising HCWs awareness about hepatitis C infection and treatment. Newly published health clearance guidance addresses some of these points.
Aliaga, C; Zhang, H; Dobon, A; Hortal, M; Beneventi, D
2015-04-01
The aim of this paper is to analyse the effects of the presence of printed electronics on the paper waste streams and specifically on paper recyclability. The analysis is based on a case study focussed on envelopes for postal and courier services provided with these intelligent systems. The smart printed envelope of the study includes a combination of both conventional (thin flexible batteries and resistors) and printed electronic components (conductive track layout based on nanosilver ink). For this purpose, a comparison between envelopes with and without these components (batteries, resistors and conductive track layouts) was carried out through pilot scale paper recycling tests. The generation of rejects during the recycling process as well as the final quality of the recycled paper (mechanical and optical properties) were tested and quantitatively evaluated. The results show that resistors are retained during the screening process in the sieves and consequently they cannot end up in the final screened pulp. Therefore, mechanical and optical properties of the recycled paper are not affected. Nevertheless, inks from the conductive track layouts and batteries were partially dissolved in the process water. These substances were not totally retained in the sieving systems resulting in slight changes in the optical properties of the final recycled paper (variations are 7.2-7.5% in brightness, 8.5-10.7% in whiteness, 1.2-2.2% in L(∗) values, 3.3-3.5% in opacity and 16.1-27% in yellowness). These variations are not in ranges able to cause problems in current paper recycling processes and restrict the use of recycled paper in current applications. Moreover, real impacts on industrial recycling are expected to be even significantly lower since the proportion of paper product with printed circuits in the current paper waste streams are much lower than the ones tested in this work. However, it should be underlined the fact that this situation may change over the next years due to the future developments in printed electronics and the gradual penetration of these types of devices in the market. Copyright © 2015 Elsevier Ltd. All rights reserved.
AF-TRUST, Air Force Team for Research in Ubiquitous Secure Technology
2010-07-26
Charles Sutton, J. D. Tygar, and Kai Xia. Book chapter in Jeffrey J. P. Tsai and Philip S. Yu (eds.) Machine Learning in Cyber Trust: Security, Privacy...enterprise, tactical, embedded systems and command and control levels. From these studies, commissioned by Dr . Sekar Chandersekaran of the Secretary of the...Data centers avoid IP Multicast because of a series of problems with the technology. • Dr . Multicast (the MCMD), a system that maps traditional I PMC
The work of the Child Accident Prevention Trust.
Jackson, R H; Cooper, S; Hayes, H R
1988-01-01
In 1983 an article was published in this Journal describing the work of the Child Accident Prevention Trust. Since that time many developments have taken place in the field of child accident prevention. There has been an increased recognition of the role of accidents and injuries in child health and the importance of accident prevention at an international, national, and local level. This has, in part, been a result of work undertaken by the Child Accident Prevention Trust. Much remains to be done, however, and doctors and other health workers involved with children must recognise the part that they can play in reducing this epidemic. Mortality and morbidity from accidents is the largest single problem in the health of children after the first year of life. The aim of this article is to stimulate interest in the problem of accidents in childhood especially among community paediatricians and clinical medical officers. Hospital doctors and general practitioners also have a particular part to play in drawing the attention of appropriate authorities to factors which have led to accidents that may have been preventable (see Annotation in this issue). PMID:3355217
2011-01-01
Background Scientists engaged in global health research are increasingly faced with barriers to access and use of human tissues from the developing world communities where much of their research is targeted. In part, the problem can be traced to distrust of researchers from affluent countries, given the history of 'scientific-imperialism' and 'biocolonialism' reflected in past well publicized cases of exploitation of research participants from low to middle income countries. Discussion To a considerable extent, the failure to adequately engage host communities, the opacity of informed consent, and the lack of fair benefit-sharing have played a significant role in eroding trust. These ethical considerations are central to biomedical research in low to middle income countries and failure to attend to them can inadvertently contribute to exploitation and erode trust. A 'tissue trust' may be a plausible means for enabling access to human tissues for research in a manner that is responsive to the ethical challenges considered. Summary Preventing exploitation and restoring trust while simultaneously promoting global health research calls for innovative approaches to human tissues research. A tissue trust can reduce the risk of exploitation and promote host capacity as a key benefit. PMID:21266076
Disrupting Threat Finances: Using Financial Information to Disrupt Terrorist Organizations
2008-04-01
remittance systems, stored value cards, digital currency , and Islamic banking; b) not-for-profit organizations, including front organizations and...including cash couriers; alternative remittance systems “informal value transfer,” such as hawalas and hundis; stored value cards; digital currency ...work with other federal agencies to implement key statutory provisions of the Currency and Foreign Transactions Report- ing Act (commonly referred to
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-11
... readily available for pumpout while the ferries are docked in Bridgeport. SUNY Maritime College's large...: Notice is hereby given that, pursuant to Clean Water Act, Section 312(f)(3) (33 U.S.C. 1322(f)(3)), the... and Hand Delivery/Courier: Moses Chang, U.S. EPA Region 2, 290 Broadway, 24th Floor, New York, NY...
ERIC Educational Resources Information Center
Association for Education in Journalism and Mass Communication.
The mass communication and society section of the Proceedings contains the following 20 papers: "Media, Bureaucracy and the Success of Social Protest: Media Coverage of Environmental Movement Groups" (Julia B. Corbett); "How People Use Newspaper-Sponsored Community Bulletin Boards: A Field Test of 'The Evansville Courier's' Courier…
ERIC Educational Resources Information Center
Association for Education in Journalism and Mass Communication.
The More Miscellaneous Studies section of the proceedings contains the following 34 papers: "The Louisville Courier-Journal's News Content after Purchase by Gannett" (Hansen and Coulson); "Reflection of Cultural Values in Advertising: A Comparative Analysis of Taiwan and U.S. Advertising" (Zandpour and Qian); "Sex,…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
.... Originating Office: Bureau of Administration Office of Allowances (A/OPR/ALS). Form Number: DS-2020, DS-2020I...: [email protected] . Mail (paper, disk, or CD-ROM submissions): Office of Allowances (A/OPR/ALS), Room... Delivery or Courier: Office of Allowances (A/OPR/ ALS), Room L314, Department of State, 2401 E Street, NW...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-21
... Office: Bureau of Administration Office of Allowances (A/OPR/ALS). Form Number: DS-2020. Respondents... submissions): Office of Allowances (A/OPR/ALS), Room L314 SA-1, Department of State, Washington, DC 20522-0103 Fax: (202) 261-8707 or (202) 261-8708 Hand Delivery or Courier: Office of Allowances (A/OPR/ALS) Room...
37 CFR 1.58 - Chemical and mathematical formulae and tables.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) type font or lettering style having capital letters which should be at least 0.422 cm. (0.166 inch) high (e.g., preferably Arial, Times Roman, or Courier with a font size of 12), but may be no smaller than 0.21 cm. (0.08 inch) high (e.g., a font size of 6). A space at least 0.64 cm. (1/4 inch) high...
ERIC Educational Resources Information Center
ASPBAE Courier, 1984
1984-01-01
This special issue was developed by the Asian-South Pacific Bureau for Adult Education (ASPBAE) in preparation for Unesco's fourth international conference on adult education. A section on "Literacy--A Great Challenge and Important Debate" includes "Why Literacy? (Paul Fordham); "Cooperating or Campaigning for Literacy"…
2005-05-01
Earned Value, Enterprise Architecture, Entropy, Markov Models, Perron - Frobenius Theorem 1. INTRODUCTION: THE PROBLEM CONTEXT For knowledge-intensive...trust. Academy of Management Review, 20, 709-734. McEvily, B., Perrone , V. & Zaheer, A. (2003). Trust as an organizing principle. Organization...dE(t)/dt < 0 Constant or increasing estimate variability for less capable organizations. That is, [2] dE(t)/dt > 0 4.1. The Perron
Parochial trust and cooperation across 17 societies.
Romano, Angelo; Balliet, Daniel; Yamagishi, Toshio; Liu, James H
2017-11-28
International challenges such as climate change, poverty, and intergroup conflict require countries to cooperate to solve these complex problems. However, the political tide in many countries has shifted inward, with skepticism and reluctance to cooperate with other countries. Thus, cross-societal investigations are needed to test theory about trust and cooperation within and between groups. We conducted an experimental study in 17 countries designed to test several theories that explain why, who, and where people trust and cooperate more with ingroup members, compared with outgroup members. The experiment involved several interactions in the trust game, either as a trustor or trustee. We manipulated partner group membership in the trust game (ingroup, outgroup, or unknown) and if their reputation was at stake during the interaction. In addition to the standard finding that participants trust and cooperate more with ingroup than outgroup members, we obtained findings that reputational concerns play a decisive role for promoting trust and cooperation universally across societies. Furthermore, men discriminated more in favor of their ingroup than women. Individual differences in cooperative preferences, as measured by social value orientation, predicted cooperation with both ingroup and outgroup members. Finally, we did not find support for three theories about the cross-societal conditions that influence the degree of ingroup favoritism observed across societies (e.g., material security, religiosity, and pathogen stress). We discuss the implications for promoting cooperation within and between countries. Copyright © 2017 the Author(s). Published by PNAS.
Against the Rules: Procedural Problems in Institutional Self-Evaluation.
ERIC Educational Resources Information Center
Simons, Helen
This paper addresses the problem of how to introduce new forms of evaluation into school organization without a damaging loss of trust. The evaluators here are teachers engaged in curriculum policy evaluation within the schools in which they work. One way of conceptualizing and rooting contemporary activity under the label of school…
ERIC Educational Resources Information Center
Wheeler, John W.
1975-01-01
Explains basic principles of the financial management and administration of private university funds and related problems of governing investments. Covers, for example, the general nature of the charitable transfer (Which law, trust, or corporation?), the cash flow problem (borrowing restricted funds to meet budgted deficits), and delegation of…
Security in Distributed Collaborative Environments: Limitations and Solutions
NASA Astrophysics Data System (ADS)
Saadi, Rachid; Pierson, Jean-Marc; Brunie, Lionel
The main goal of establishing collaboration between heterogeneous environment is to create such as Pervasive context which provide nomadic users with ubiquitous access to digital information and surrounding resources. However, the constraints of mobility and heterogeneity arise a number of crucial issues related to security, especially authentication access control and privacy. First of all, in this chapter we explore the trust paradigm, specially the transitive capability to enable a trust peer to peer collaboration. In this manner, when each organization sets its own security policy to recognize (authenticate) users members of a trusted community and provide them a local access (access control), the trust transitivity between peers will allows users to gain a broad, larger and controlled access inside the pervasive environment. Next, we study the problem of user's privacy. In fact in pervasive and ubiquitous environments, nomadic users gather and exchange certificates or credential which providing them rights to access by transitivity unknown and trusted environments. These signed documents embeds increasing number of attribute that require to be filtered according to such contextual situation. In this chapter, we propose a new morph signature enabling each certificate owner to preserve his privacy by discloses or blinds some sensitive attributes according to faced situation.
NASA Astrophysics Data System (ADS)
Ramalingam, Srikumar
2001-11-01
A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.
A survey of the health needs of hospital staff: implications for health care managers.
Jinks, Annette M; Lawson, Valerie; Daniels, Ruth
2003-09-01
Developing strategies to address the health needs of the National Health Services (NHS) workforce are of concern to many health care managers. Focal to the development of such strategies are of being in receipt of baseline information about employees expressed health needs and concerns. This article addresses obtaining such baseline information and presents the findings of a health needs survey of acute hospital staff in a trust in North Wales. The total population of trust employees were surveyed (n = 2300) and a 44% (n = 1021) response rate was achieved. A number of positive findings are given. Included are that the majority of those surveyed stated that their current health status is good, are motivated to improve their health further, do not smoke and their alcohol consumption is within recommended levels. There appears, however, to be a number of areas where trust managers can help its staff improve their health. Included are trust initiatives that focus on weight control and taking more exercise. In addition, there appears to be a reported lack of knowledge and positive health behaviour amongst the male respondents surveyed that would imply the trust needs to be more effective in promoting well man type issues. Finally there appears to be a general lack of pride in working for the trust and a pervasive feeling that the trust does not care about its employees that needs to be addressed. It is concluded that the findings of this survey have implications for management practices in the trust where the survey was conducted and also wider applicability to the management of health care professionals. For example, addressing work-related psychological and physical problems of employees are of importance to all health care managers. This is especially so when considering recruitment and retention issues.
1990-09-04
commanders of major Army commands (MACOMs) will— (1) Disseminate a CIC’s specific meaning to all concerned agen- cies, offices, installations, data...be by electrical or non- electrical means and assigning the proper precedence. Where mail or courier is indicated, the writer must ensure that the...selected means are used for delivery. (7) Obtaining needed staff coordination. (8) Handcarrying priority and higher precedence messages during the staff
Yu, Jiahui; Zhang, Wen; Zhang, Yiqian; Wang, Yadong; Zhang, Boli; Fan, Guanwei; Zhu, Yan
2017-08-04
Component-based Chinese medicine (CCM) is derived from traditional Chinese medicine but produced with modern pharmaceutical standard and clearer clinical indications. However, it still faces challenges of defining individual component contribution in the complex formula. Using QiShenYiQi (QSYQ) as a model CCM, we investigated the role of Dalbergia odorifera (DO), an herbal component, in preventing myocardial damage. We showed that in vitro, QSYQ exerted considerable protective activities on cardiomyocytes from H 2 O 2 -induced mitochondrial dysfunction with or without DO. However, in isolated rat hearts, myocardial protection by QSYQ was significantly weakened without DO. In everted gut sac model, DO significantly enhanced absorption of the major QSYQ ingredients in different regions of rat intestine. Finally, in in vivo mouse model of doxorubicin (DOX)-induced myocardial damage, only QSYQ, but not QiShenYiQi without DO (QSYQ-DO), exerted a full protection. Taken together, our results showed that instead of directly contributing to the myocardial protection, Dalbergia odorifera facilitates the major active ingredients absorption and increases their efficacy, eventually enhancing the in vivo potency of QSYQ. These findings may shed new lights on our understanding of the prescription compatibility theory, as well as the impacts of "courier herbs" in component-based Chinese medicine.
Mobile Food Ordering Application using Android OS Platform
NASA Astrophysics Data System (ADS)
Yosep Ricky, Michael
2014-03-01
The purpose of this research is making an ordering food application based on Android with New Order, Order History, Restaurant Profile, Order Status, Tracking Order, and Setting Profile features. The research method used in this research is water model of System Development Life Cycle (SDLC) method with following phases: requirement definition, analyzing and determining the features needed in developing application and making the detail definition of each features, system and software design, designing the flow of developing application by using storyboard design, user experience design, Unified Modeling Language (UML) design, and database structure design, implementation an unit testing, making database and translating the result of designs to programming language code then doing unit testing, integration and System testing, integrating unit program to one unit system then doing system testing, operation and maintenance, operating the result of system testing and if any changes and reparations needed then the previous phases could be back. The result of this research is an ordering food application based on Android for customer and courier user, and a website for restaurant and admin user. The conclusion of this research is to help customer in making order easily, to give detail information needed by customer, to help restaurant in receiving order, and to help courier while doing delivery.
Bernard, Jean-Baptiste; Aguilar, Carlos; Castet, Eric
2016-01-01
Reading speed is dramatically reduced when readers cannot use their central vision. This is because low visual acuity and crowding negatively impact letter recognition in the periphery. In this study, we designed a new font (referred to as the Eido font) in order to reduce inter-letter similarity and consequently to increase peripheral letter recognition performance. We tested this font by running five experiments that compared the Eido font with the standard Courier font. Letter spacing and x-height were identical for the two monospaced fonts. Six normally-sighted subjects used exclusively their peripheral vision to run two aloud reading tasks (with eye movements), a letter recognition task (without eye movements), a word recognition task (without eye movements) and a lexical decision task. Results show that reading speed was not significantly different between the Eido and the Courier font when subjects had to read single sentences with a round simulated gaze-contingent central scotoma (10° diameter). In contrast, Eido significantly decreased perceptual errors in peripheral crowded letter recognition (-30% errors on average for letters briefly presented at 6° eccentricity) and in peripheral word recognition (-32% errors on average for words briefly presented at 6° eccentricity). PMID:27074013
Bernard, Jean-Baptiste; Aguilar, Carlos; Castet, Eric
2016-01-01
Reading speed is dramatically reduced when readers cannot use their central vision. This is because low visual acuity and crowding negatively impact letter recognition in the periphery. In this study, we designed a new font (referred to as the Eido font) in order to reduce inter-letter similarity and consequently to increase peripheral letter recognition performance. We tested this font by running five experiments that compared the Eido font with the standard Courier font. Letter spacing and x-height were identical for the two monospaced fonts. Six normally-sighted subjects used exclusively their peripheral vision to run two aloud reading tasks (with eye movements), a letter recognition task (without eye movements), a word recognition task (without eye movements) and a lexical decision task. Results show that reading speed was not significantly different between the Eido and the Courier font when subjects had to read single sentences with a round simulated gaze-contingent central scotoma (10° diameter). In contrast, Eido significantly decreased perceptual errors in peripheral crowded letter recognition (-30% errors on average for letters briefly presented at 6° eccentricity) and in peripheral word recognition (-32% errors on average for words briefly presented at 6° eccentricity).
Social capital, economic conditions, marital status and daily smoking: a population-based study.
Lindström, Martin
2010-02-01
To investigate the association between marital status and daily smoking, adjusting for economic conditions and trust. Cross-sectional study. In total, 27,757 individuals aged 18-80 years answered a postal questionnaire, which represents 59% of the random sample. A logistic regression model was used to investigate the association between marital status and daily smoking, adjusting for economic (material) conditions and trust. A multivariate analysis was performed to investigate the importance of possible confounders concerning the differences in daily smoking according to marital status. Smoking prevalence was 14.9% among men and 18.1% among women. The odds ratios of daily smoking for middle-aged respondents, born abroad, medium/low education, problems paying bills, low trust, and unmarried and (particularly) divorced respondents were significantly higher than those for their reference groups. Low trust was significantly higher among divorced and unmarried respondents compared with married/cohabitating respondents. Adjustment for economic conditions reduced the odds ratios of daily smoking among divorced subjects; this was not seen following adjustment for trust. Never-married subjects and (particularly) divorced subjects showed a significantly higher prevalence of daily smoking than married/cohabitating respondents. Economic conditions have a significant effect on the association between marital status and daily smoking, but this was not seen for trust. Copyright 2010 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
Public trust in vaccination: an analytical framework.
Gopichandran, Vijayaprasad
2017-01-01
While vaccination is one of the most successful public health interventions, there has always been a parallel movement against vaccines. Apart from scientific factors, the uptake of vaccinations is influenced by historical, political, sociocultural and economic factors. In India, the health system is struggling with logistical weaknesses in taking vaccination to the remotest corners; while on the other hand, some people in places where vaccination is available resist it. Unwillingness to be vaccinated is a growing problem in the developed world. This trend is gradually emerging in several parts of India as well. Other factors, such as heightened awareness of the profit motives of the vaccine industry, conflicts of interest among policy-makers, and social, cultural and religious considerations have eroded the people's trust in vaccination. This paper develops an analytical framework to assess trust in vaccination. The framework considers trust in vaccination from four perspectives - trust in the health system, the vaccine policy, vaccination providers and specific vaccines. The framework considers specific issues involved in vaccination trust, including the increasing scepticism towards medical technology, perceptions of conflicts of interest in the vaccine policy, and of lack of transparency and openness, the presence of strong alternative schools of thought, influence of the social media. The paper will conclude by arguing that engaging with communities and having a dialogue about the vaccination policy is an ethical imperative.
A quadratic-tensor model algorithm for nonlinear least-squares problems with linear constraints
NASA Technical Reports Server (NTRS)
Hanson, R. J.; Krogh, Fred T.
1992-01-01
A new algorithm for solving nonlinear least-squares and nonlinear equation problems is proposed which is based on approximating the nonlinear functions using the quadratic-tensor model by Schnabel and Frank. The algorithm uses a trust region defined by a box containing the current values of the unknowns. The algorithm is found to be effective for problems with linear constraints and dense Jacobian matrices.
Water pollution and the public trust doctrine
DOE Office of Scientific and Technical Information (OSTI.GOV)
Johnson, R.W.
The prior appropriation system has served well in the Western US for 125 years, providing a legal regime that permits and encourages enormous economic growth of agriculture, industry and municipalities. This system, however, both in its inception and current application, fails to address or protect public interests in fisheries, recreation, environmental quality, and clean water. As a result, serious nonpoint water pollution problems are occurring throughout the West. Such pollution can be regulated either by the courts or the legislatures under the public trust doctrine, which antedates the prior appropriation system, and which protects fisheries and water quality. No onemore » - including irrigators, industries or cities with appropriative rights - has a vested, constitutionally protected property right to degrade the quality of public waters. Some states are adopting police power regulations to control nonpoint pollution. Others are approaching the problem through the prior appropriation system itself, taking the position that beneficial use means use that does not harm the public through pollution. The public trust doctrine is not a panacea that will instantly solve all the conflicts that now surround the prior appropriation system. It should be considered, however, as a basis for setting standards as best practicable technology or best management practice.« less
On the use of evidence in humanitarian logistics research.
Pedraza-Martinez, Alfonso J; Stapleton, Orla; Van Wassenhove, Luk N
2013-07-01
This paper presents the reflections of the authors on the differences between the language and the approach of practitioners and academics to humanitarian logistics problems. Based on a long-term project on fleet management in the humanitarian sector, involving both large international humanitarian organisations and academics, it discusses how differences in language and approach to such problems may create a lacuna that impedes trust. In addition, the paper provides insights into how academic research evidence adapted to practitioner language can be used to bridge the gap. When it is communicated appropriately, evidence strengthens trust between practitioners and academics, which is critical for long-term projects. Once practitioners understand the main trade-offs included in academic research, they can supply valuable feedback to motivate new academic research. Novel research problems promote innovation in the use of traditional academic methods, which should result in a win-win situation: relevant solutions for practice and advances in academic knowledge. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.
A Theoretical Analysis: Physical Unclonable Functions and The Software Protection Problem
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nithyanand, Rishab; Solis, John H.
2011-09-01
Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure (within reasonable error bounds) but hard to clone. This property of unclonability is due to the accepted hardness of replicating the multitude of uncontrollable manufacturing characteristics and makes PUFs useful in solving problems such as device authentication, software protection, licensing, and certified execution. In this paper, we focus on the effectiveness of PUFs for software protection and show that traditional non-computational (black-box) PUFs cannot solve the problem against real world adversaries in offline settings. Our contributionsmore » are the following: We provide two real world adversary models (weak and strong variants) and present definitions for security against the adversaries. We continue by proposing schemes secure against the weak adversary and show that no scheme is secure against a strong adversary without the use of trusted hardware. Finally, we present a protection scheme secure against strong adversaries based on trusted hardware.« less
Nielsen, Line; Koushede, Vibeke; Vinther-Larsen, Mathilde; Bendtsen, Pernille; Ersbøll, Annette Kjær; Due, Pernille; Holstein, Bjørn E
2015-09-01
It seems that social capital in the neighbourhood has the potential to reduce socioeconomic differences in mental health among adolescents. Whether school social capital is a buffer in the association between socioeconomic position and mental health among adolescents remains uncertain. The aim of this study is therefore to examine if the association between socioeconomic position and emotional symptoms among adolescents is modified by school social capital. The Health Behaviour in School-aged Children Methodology Development Study 2012 provided data on 3549 adolescents aged 11-15 in two municipalities in Denmark. Trust in the school class was used as an indicator of school social capital. Prevalence of daily emotional symptoms in each socioeconomic group measured by parents' occupational class was calculated for each of the three categories of school classes: school classes with high trust, moderate trust and low trust. Multilevel logistic regression analyses with parents' occupational class as the independent variable and daily emotional symptoms as the dependent variable were conducted stratified by level of trust in the school class. The prevalence of emotional symptoms was higher among students in school classes with low trust (12.9%) compared to school classes with high trust (7.2%) (p < 0.01). In school classes with low level of trust, the odds ratio for daily emotional symptoms was 1.89 (95% CI 1.25-2.86) in the low socioeconomic group compared to the high socioeconomic group. In school classes characterised by high and moderate trust, there were no statistically significant differences in emotional symptoms between high and low socioeconomic groups. Although further studies are needed, this cross-sectional study suggests that school social capital may reduce mental health problems and diminish socioeconomic inequality in mental health among adolescents. Copyright © 2015 Elsevier Ltd. All rights reserved.
Wynne, Brian
2006-01-01
This paper analyses the recent widespread moves to 'restore' public trust in science by developing an avowedly two-way, public dialogue with science initiatives. Noting how previously discredited and supposedly abandoned public deficit explanations of 'mistrust' have actually been continually reinvented, it argues that this is a symptom of a continuing failure of scientific and policy institutions to place their own science-policy institutional culture into the frame of dialogue, as possible contributory cause of the public mistrust problem. Copyright 2006 S. Karger AG, Basel.
ERIC Educational Resources Information Center
Santos, Jose Luis; Haycock, Kati
2016-01-01
In response to mounting concerns about the cost of college, lawmakers have proposed major new partnerships between the federal government and states to tackle college affordability. The Education Trust maintains that any new federal-state proposal aimed at making college more affordable must also simultaneously address completion problems by…
2015-05-11
it means that Mary distrusts John. We showed that it is possible to analyze such trust- distrust relationships within signed social networks in... relationship problems) − Professional Problems (negative changes at workplace, interpersonal conflicts) Furthermore, we encode in 2nd degree variables...a social media forum data. • Processed initial set of Vegas metrics data (clustering coefficient, # similar users, # skip levels) through time
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dennis, J.E. Jr.; Tapia, R.A.
Goal of the research was to develop and test effective, robust algorithms for general nonlinear programming (NLP) problems, particularly large or otherwise expensive NLP problems. We discuss the research conducted over the 3-year period Jan. 1990-Dec. 1992. We also describe current and future directions of our research.
Co-Operative Problem-Solving at the Royal Docks Community School
ERIC Educational Resources Information Center
Martin, Ruth
2013-01-01
This article responds to Henry Tam's article in this issue of FORUM by exploring opportunities for co-operative problem-solving for staff and students of the Royal Docks Community School in the London Borough of Newham. Becoming a co-operative trust helped the school move out of special measures and develop a strategy of participation and…
Effective Trust-Aware E-learning Recommender System Based on Learning Styles and Knowledge Levels
ERIC Educational Resources Information Center
Dwivedi, Pragya; Bharadwaj, Kamal K.
2013-01-01
In the age of information explosion, e-learning recommender systems (ELRSs) have emerged as the most essential tool to deliver personalized learning resources to learners. Due to enormous amount of information on the web, learner faces problem in searching right information. ELRSs deal with the problem of information overload effectively and…
The NASA/Baltimore Applications Project: An experiment in technology transfer
NASA Technical Reports Server (NTRS)
Golden, T. S.
1981-01-01
Conclusions drawn from the experiment thus far are presented. The problems of a large city most often do not require highly sophisticated solutions; the simpler the solution, the better. A problem focused approach is a greater help to the city than a product focused approach. Most problem situations involve several individuals or organized groups within the city. Mutual trust and good interpersonal relationships between the technologist and the administrator is as important for solving problems as technological know-how.
Yagi, Junko; Fujiwara, Takeo; Yambe, Takehito; Okuyama, Makiko; Kawachi, Ichiro; Sakai, Akio
2016-08-01
We sought to investigate the association between social capital and child behavior problems in Iwate prefecture, Japan, in the aftermath of the 2011 Great East Japan Earthquake. Children and their caregivers were recruited from four nursery schools in coastal areas affected by the tsunami, as well as one in an unaffected inland area (N = 94). We assessed the following via caregiver questionnaire: perceptions of social capital in the community, child behavior problems (Child Behavior Checklist, Strength and Difficulty Questionnaire), post-traumatic stress disorder (PTSD) symptoms, child's exposure to trauma (e.g. loss of family members), and caregiver's mental health (Impact of Event Scale-R for PTSD symptoms; K6 for general mental health). We collected details on trauma exposure by interviewing child participants. Structural equation modeling was used to assess whether the association between social capital and child behavior problems was mediated by caregiver's mental health status. Children of caregivers who perceived higher community social capital (trust and mutual aid) showed fewer PTSD symptoms. Furthermore, caregiver's mental health mediated the association between social trust and child PTSD symptoms. Social capital had no direct impact on child behavior problems. Community social capital was indirectly associated (via caregiver mental health status) with child behavior problems following exposure to disaster. Community development to boost social capital among caregivers may help to prevent child behavior problems.
When trust defies common security sense.
Williams, Patricia A H
2008-09-01
Primary care medical practices fail to recognize the seriousness of security threats to their patient and practice information. This can be attributed to a lack of understanding of security concepts, underestimation of potential threats and the difficulty in configuration of security technology countermeasures. To appreciate the factors contributing to such problems, research into general practitioner security practice and perceptions of security was undertaken. The investigation focused on demographics, actual practice, issues and barriers, and practitioner perception. Poor implementation, lack of relevant knowledge and inconsistencies between principles and practice were identified as key themes. Also the results revealed an overwhelming reliance on trust in staff and in computer information systems. This clearly identified that both cultural and technical attributes contribute to the deficiencies in information security practice. The aim of this research is to understand user needs and problems when dealing with information security practice.
DeBell, Matthew; Crystal, David S
2005-12-01
This study examined the relationship between scores on field dependence and field independence and sensory learning preference, cognitive learning style, personality, interpersonal trust, attributions of responsibility for solving social problems, and attitudes regarding citizenship among youth. Participants were 72 private school students in Grades 6 through 12 (26 girls, 46 boys; M age: 15.2 yr., SD=1.9). When controlling for grade and sex, field independence (measured by Group Embedded Figures Test scores) was associated with Intuitive Thinking personality, Concrete lobal learning style, and rejection of individual responsibility for social problems, relative to governmental and community responsibility. Associations with other aspects of learning style fell short of significance. No association was found with generalized trust or citizenship attitudes. Reassessment of these variables with a larger sample should be undertaken.
Solving the infeasible trust-region problem using approximations.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Renaud, John E.; Perez, Victor M.; Eldred, Michael Scott
2004-07-01
The use of optimization in engineering design has fueled the development of algorithms for specific engineering needs. When the simulations are expensive to evaluate or the outputs present some noise, the direct use of nonlinear optimizers is not advisable, since the optimization process will be expensive and may result in premature convergence. The use of approximations for both cases is an alternative investigated by many researchers including the authors. When approximations are present, a model management is required for proper convergence of the algorithm. In nonlinear programming, the use of trust-regions for globalization of a local algorithm has been provenmore » effective. The same approach has been used to manage the local move limits in sequential approximate optimization frameworks as in Alexandrov et al., Giunta and Eldred, Perez et al. , Rodriguez et al., etc. The experience in the mathematical community has shown that more effective algorithms can be obtained by the specific inclusion of the constraints (SQP type of algorithms) rather than by using a penalty function as in the augmented Lagrangian formulation. The presence of explicit constraints in the local problem bounded by the trust region, however, may have no feasible solution. In order to remedy this problem the mathematical community has developed different versions of a composite steps approach. This approach consists of a normal step to reduce the amount of constraint violation and a tangential step to minimize the objective function maintaining the level of constraint violation attained at the normal step. Two of the authors have developed a different approach for a sequential approximate optimization framework using homotopy ideas to relax the constraints. This algorithm called interior-point trust-region sequential approximate optimization (IPTRSAO) presents some similarities to the two normal-tangential steps algorithms. In this paper, a description of the similarities is presented and an expansion of the two steps algorithm is presented for the case of approximations.« less
ERIC Educational Resources Information Center
Cain, Jim; Jolliff, Barry
Challenge and adventure programs create situations that challenge the abilities of individuals and groups and that are metaphors for the problems and challenges of daily life. This book describes dozens of group activities that foster individual and group skills such as cooperation, problem solving, and communication. Each activity has a…
Behavioral Indicators of Drug Couriers in Airports
2015-04-30
quantum of knowledge sufficient to induce an ordinarily prudent and cautious person under these circumstances to believe criminal activity is at hand...Definition 1 Acknowledgement Glance Often when exiting the airplane, one member of the group may consciously look for the other individual to confirm he...leading person does not consciously make contact with his co-traveler again. He often walks away from the other person so that he can follow at a
Modeling cascading failures with the crisis of trust in social networks
NASA Astrophysics Data System (ADS)
Yi, Chengqi; Bao, Yuanyuan; Jiang, Jingchi; Xue, Yibo
2015-10-01
In social networks, some friends often post or disseminate malicious information, such as advertising messages, informal overseas purchasing messages, illegal messages, or rumors. Too much malicious information may cause a feeling of intense annoyance. When the feeling exceeds a certain threshold, it will lead social network users to distrust these friends, which we call the crisis of trust. The crisis of trust in social networks has already become a universal concern and an urgent unsolved problem. As a result of the crisis of trust, users will cut off their relationships with some of their untrustworthy friends. Once a few of these relationships are made unavailable, it is likely that other friends will decline trust, and a large portion of the social network will be influenced. The phenomenon in which the unavailability of a few relationships will trigger the failure of successive relationships is known as cascading failure dynamics. To our best knowledge, no one has formally proposed cascading failures dynamics with the crisis of trust in social networks. In this paper, we address this potential issue, quantify the trust between two users based on user similarity, and model the minimum tolerance with a nonlinear equation. Furthermore, we construct the processes of cascading failures dynamics by considering the unique features of social networks. Based on real social network datasets (Sina Weibo, Facebook and Twitter), we adopt two attack strategies (the highest trust attack (HT) and the lowest trust attack (LT)) to evaluate the proposed dynamics and to further analyze the changes of the topology, connectivity, cascading time and cascade effect under the above attacks. We numerically find that the sparse and inhomogeneous network structure in our cascading model can better improve the robustness of social networks than the dense and homogeneous structure. However, the network structure that seems like ripples is more vulnerable than the other two network structures. Our findings will be useful in further guiding the construction of social networks to effectively avoid the cascading propagation with the crisis of trust. Some research results can help social network service providers to avoid severe cascading failures.
Roberts, Michael T
2011-01-01
Trust underpins the Chinese social system, and yet it is lacking from a Chinese food system that is riddled with safety disasters and disgruntled consumers. Government and industry play a major role in rehabilitating consumer trust in China. To this end, food safety and quality laws have been constructed to foster this process; however, safety scandals continue even in the face of stricter regulations and increased enforcement. A potential toll to abate food-safety problems and to build trust is the implementation of Corporate Social Responsibility ("CSR"). Mandates by the government promote CSR in enterprise activity, including Article 3 of the 2009 China Food Safety Law. Officials have also recently touted the need for "moral education" of operators in the food industry. Regardless of government activity or whether CSR is employed by food enterprises, it is imperative that the food industry recognizes how critical it is to establish trust with Chinese consumers, who increasingly expect safe, quality food. The case study with pistachios highlights this evolving consumer expectation and the principles of social responsibility in the framework of the relationship between government and industry and consumers, while demonstrating the benefits of doing the right thing for food companies doing business in China.
The unannounced patient in the corridor: trust, friction and person-centered care.
Carlström, Eric D; Hansson Olofsson, Elisabeth; Olsson, Lars-Eric; Nyman, Jan; Koinberg, Inga-Lill
2017-01-01
In this study, a Swedish cancer clinic was studied where three to four unscheduled patients sought support from the hospital on a daily basis for pain and nutrition problems. The clinic was neither staffed nor had a budget to handle such return visits. In order to offer the patients a better service and decrease the workload of the staff in addition to their everyday activities, a multidisciplinary team was established to address the unscheduled return visits. The team was supposed to involve the patient, build trust, decrease the friction, and contribute to a successful rehabilitation process. Data were collected from the patients and the staff. Patients who encountered the team (intervention) and patients who encountered the regular ad hoc type of organization (control) answered a questionnaire measuring trust and friction. Nurses in the control group spent 35% of their full-time employment, and the intervention group staffed with nurses spent 30% of their full-time employment in addressing the needs of these return patients. The patients perceived that trust between them and the staff was high. In summary, it was measured as being 4.48 [standard deviation (SD) = 0.82] in the intervention group and 4.41 (SD = 0.79) in the control group using the 5-point Likert scale. The data indicate that using a multidisciplinary team is a promising way to handle the problems of unannounced visits from patients. Having a team made it cost effective for the clinic and provided a better service than the traditional ad hoc organization. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.
A Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs
Liu, Anfeng; Liu, Xiao; Long, Jun
2016-01-01
Security is a pivotal issue for wireless sensor networks (WSNs), which are emerging as a promising platform that enables a wide range of military, scientific, industrial and commercial applications. Traceback, a key cyber-forensics technology, can play an important role in tracing and locating a malicious source to guarantee cybersecurity. In this work a trust-based adaptive probability marking and storage (TAPMS) traceback scheme is proposed to enhance security for WSNs. In a TAPMS scheme, the marking probability is adaptively adjusted according to the security requirements of the network and can substantially reduce the number of marking tuples and improve network lifetime. More importantly, a high trust node is selected to store marking tuples, which can avoid the problem of marking information being lost. Experimental results show that the total number of marking tuples can be reduced in a TAPMS scheme, thus improving network lifetime. At the same time, since the marking tuples are stored in high trust nodes, storage reliability can be guaranteed, and the traceback time can be reduced by more than 80%. PMID:27043566
Kim, Harris Hyun-soo
2014-10-01
Much evidence suggests that social capital (e.g. networks, trust, organizational memberships) has a significant effect on self-reported health. Previous research, however, has focused primarily on Western countries. The current research seeks to remedy this problem by investigating the association between multiple social capital indicators and subjective health in a novel empirical setting. The data come from the Comparative Values Survey of Islamic Countries (1999-2006) which consists of probabilistic samples from Muslim majority nations. Three-way multilevel analysis is used to examine the social determinants of health. Statistical results from hierarchical linear modeling shows that frequent contact with strong and intermediate ties (i.e. family members and friends, respectively) is significant, while interaction with weak ties (coworkers) has no association. General trust and trust in the central government are also significantly related to subjective health, as is trust in religious authority, albeit in an inverse way. This study calls for a more contingent view of the relationship between social capital and self-reported health. Future research needs to take this into consideration in hypothesizing and testing the potential health benefits of social capital.
Medical bribery and the ethics of trust: the Romanian case.
Manea, Teodora
2015-02-01
Medical bribery seems to be a global problem from Eastern Europe and the Balkans to China, a diffuse phenomenon, starting with morally acceptable gratitude and ending with institutional bribery. I focus my attention on Romania and analyze similar cases in Eastern European and postcommunist countries. Medical bribery can be regarded as a particular form of human transaction, a kind of primitive contract that occurs when people do not trust institutions or other forms of social contract that are meant to guarantee their rights and protect their interests. Concluding with strategies to fight medical bribery, I will underline better public policies for financing health and social care, and an ethic of trust that may help to restore trustworthiness of institutions and to rebuild interpersonal trust. This should be complemented by an educational program dedicated to understanding the negative consequences and mechanisms of corruption and the importance of ethical behavior. © The Author 2014. Published by Oxford University Press, on behalf of the Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Obesity and the Social Withdrawal Syndrome.
Rotenberg, Ken J; Bharathi, Carla; Davies, Helen; Finch, Tom
2017-08-01
The relation between obesity and Social Withdrawal Syndrome (SWS) was examined using the data gathered by Rotenberg, Bharathi, Davies, and Finch (2013). One hundred and 35 undergraduates (80 females; Mage=21years-10months) completed standardized scales that assessed the SWS (low emotional trust beliefs in close others, low disclosure to close others, and high loneliness). BMI was calculated from self-reported weight and height. As hypothesized, quadratic relations were found in which participants with BMI>30 (i.e., obese) demonstrated the SWS pattern of low emotional trust beliefs in close others, low disclosure to close others, and high loneliness. As further evidence, lower emotional trust in close others, lower disclosure to close others, and greater loneliness were found for obese participants (>30 BMI, n=27) than both normal weight (<25 BMI, n=67) and overweight participants (25 to 30 BMI, n=41). The findings confirmed the hypothesis that obesity was associated with the SWS. The findings suggested that the lack of trust in others by obese individuals contributes to their unwillingness to seek out help for health and psychosocial problems. Copyright © 2017 Elsevier Ltd. All rights reserved.
An investigation into denture loss in hospitals in Kent, Surrey and Sussex.
Mann, J; Doshi, M
2017-08-25
Background The loss of dentures for inpatients can have a detrimental effect on their well-being. Self-respect and dignity become compromised along with their ability to eat meals and communicate clearly, and long-term recovery.Aim This investigation aimed to identify the reported number of dentures lost in hospitals and the financial reimbursements given by trusts to replace them.Method Information on reported denture loss and reimbursement was collected in 12 trusts throughout Kent, Surrey and Sussex.Results Eleven out of 12 trusts returned data about how many dentures were lost in their hospitals, between them 695 dentures were reported lost over five years (2011-16). Seven trusts reported financial reimbursements for dentures losses; results showed £357,672 was reimbursed over six years (2010-16), the highest amount reimbursed for a single denture was £2,200.Conclusion The results indicate that denture loss is a problem in hospitals that contributes to the financial burden for the NHS. Consideration needs to be given by hospitals to find ways to reduce the number of dentures lost every year.
Preservation of Digital Objects.
ERIC Educational Resources Information Center
Galloway, Patricia
2004-01-01
Presents a literature review that covers the following topics related to preservation of digital objects: practical examples; stakeholders; recordkeeping standards; genre-specific problems; trusted repository standards; preservation methods; preservation metadata standards; and future directions. (Contains 82 references.) (MES)
Targets, Threats and (dis)Trust: The Managerial Troika for Public School Principals in Chile
ERIC Educational Resources Information Center
Montecinos, Carmen; Ahumada, Luis; Galdames, Sergio; Campos, Fabián; Leiva, Maria Verónica
2015-01-01
Public education in Chile has been steadily losing students as a result of the implementation, for the last 35 years, of a market model. In this paper we exemplify how a structural problem (public schools' declining enrollment) created by neoliberal educational policies is transformed into an individual problem to be managed by the public school…
Exploratory study of the impacts of Mutual Health Organizations on social dynamics in Benin.
Ridde, Valery; Haddad, Slim; Yacoubou, Moussa; Yacoubou, Ismaelou
2010-08-01
The primary aim of Mutual Health Organizations (MHOs) is the financial protection of their members. However, given their community-based, participative and voluntary nature, it is conceivable that MHOs, as social organizations, would affect social dynamics. In an exploratory study in Benin, we studied social dynamics related to mutual aid, relationships of trust, and empowerment. Four MHOs, as contrasted cases, were selected from among the 11 in the region. Focus groups (n = 20) and individual interviews (n = 29) were conducted with members, non-members, and elected leaders of the four MHOs, and with professionals from the health facilities concerned. We carried out a qualitative thematic analysis of the content. Mutual aid practices, which pre-date MHOs, can be mobilized to promote MHO membership. Mutual aid practices are based on relationships of trust. The primary reason for joining an MHO is to improve financial accessibility to health services. Non-members see that members have a strong sense of empowerment in this regard, based on a high level of trust in MHOs and their elected leaders, even if their trust in health professionals is not as strong. Non-members share these feelings of confidence in MHOs and their leadership, although they trust health professionals somewhat less than do the members. The MHOs' low penetration rate therefore cannot be explained by lack of trust, as this study shows that, even with some distrust of the professionals, the overall level of trust in MHOs is high and MHOs and their leaders function as intermediaries with health professionals. Other explanatory factors are the lack of information available to villagers and, most especially, the problems they face in being able to pay the MHO premiums. Copyright 2010 Elsevier Ltd. All rights reserved.
Distribution and Correlates of Self-Reported Crimes of Trust.
Menard, Scott; Morris, Robert G; Gerber, Jurg; Covey, Herbert C
2011-11-01
This study examines the distribution and correlates of a special class of property crimes, crimes of trust, using longitudinal and cross sectional self-report data from a national sample. We begin by defining crimes of trust and consider their conceptual relationship to "conventional" property crimes, which we here characterize as crimes of stealth, and to white collar crimes, which are defined in terms of the social status of the perpetrators. Crimes of trust are here defined as property crimes that typically involve deliberate contact with the victim or, where there is more than one victim, with at least one or more victims, in which there is typically more of a focus on concealing the fact that a crime has been committed than on concealing the identity of the perpetrator (as is the case in crimes of stealth), without regard to the socioeconomic status of the perpetrator (thus including but not limited to white collar crimes). The focus here is on crimes of trust committed by individuals (as opposed to corporate crime). We first examine their distribution by sociodemographic characteristics, then examine the correlation of crimes of trust with other types of illegal behavior, using data from the National Youth Survey Family Study, including (1) longitudinal self-report data from a nationally representative panel of individuals who were 11-18 years old in 1976-77 and who were followed through early middle age (ages 36-44) in 2002-2003, plus (2) cross-sectional data on these individuals plus their parents, spouses, and children age 11 and older in 2002-2003 (total age range 11-88). The results suggest that crimes of trust have a different age-crime curve from conventional crimes, and that they are not as strongly correlated with problem substance use, gender, and other socioeconomic indicators as conventional crimes.
Actuarial status of the old-age and survivors insurance and disability insurance trust funds.
Ballantyne, H C
1982-06-01
The 1982 Annual Report of the Board of Trustees of the Old-Age and Survivors Insurance (OASI) and Disability Insurance (DI) Trust Funds indicates sever financial problems in both the short and the long range. The short-range financial status is significantly worse than was estimated last year, after enactment of the 1981 legislation, because of continuing unfavorable economic conditions. The estimated long-range deficit is the same as the deficit that was estimated last year before the 1981 legislation and is therefore somewhat worse than was estimated immediately after enactment of the legislation. Under present law, which authorizes temporary interfund borrowing amount the OASI, DI, and Hospital Insurance (HI) Trust Funds, the OASI Trust Fund would become unable to pay benefits on time by July 1983. The assets of the DI Trust Fund, on the other hand, are expected to grow rapidly in both the short and long range. If the assets of both the OASI and DI Trust Funds were combined, however, the two funds would still become unable to pay benefits on time by the latter half of 1983, based on all four sets of economic and demographic assumptions in the 1982 report. Even if the temporary interfund borrowing authority in present law were extended, the combined assets of the OASI, DI, and HI Trust Funds would become insufficient to pay benefits on time by 1984, based on the two less favorable sets of assumptions in the 1982 report. Based on the other two, more favorable, sets of assumptions, the three combined funds could pay benefits on time through the 1980's but there would be little or no margin of safety to permit timely payment of benefits if economic conditions are even slightly less favorable.
Characterization of proanthocyanidin metabolism in pea (Pisum sativum) seeds.
Ferraro, Kiva; Jin, Alena L; Nguyen, Trinh-Don; Reinecke, Dennis M; Ozga, Jocelyn A; Ro, Dae-Kyun
2014-09-16
Proanthocyanidins (PAs) accumulate in the seeds, fruits and leaves of various plant species including the seed coats of pea (Pisum sativum), an important food crop. PAs have been implicated in human health, but molecular and biochemical characterization of pea PA biosynthesis has not been established to date, and detailed pea PA chemical composition has not been extensively studied. PAs were localized to the ground parenchyma and epidermal cells of pea seed coats. Chemical analyses of PAs from seeds of three pea cultivars demonstrated cultivar variation in PA composition. 'Courier' and 'Solido' PAs were primarily prodelphinidin-types, whereas the PAs from 'LAN3017' were mainly the procyanidin-type. The mean degree of polymerization of 'LAN3017' PAs was also higher than those from 'Courier' and 'Solido'. Next-generation sequencing of 'Courier' seed coat cDNA produced a seed coat-specific transcriptome. Three cDNAs encoding anthocyanidin reductase (PsANR), leucoanthocyanidin reductase (PsLAR), and dihydroflavonol reductase (PsDFR) were isolated. PsANR and PsLAR transcripts were most abundant earlier in seed coat development. This was followed by maximum PA accumulation in the seed coat. Recombinant PsANR enzyme efficiently synthesized all three cis-flavan-3-ols (gallocatechin, catechin, and afzalechin) with satisfactory kinetic properties. The synthesis rate of trans-flavan-3-ol by co-incubation of PsLAR and PsDFR was comparable to cis-flavan-3-ol synthesis rate by PsANR. Despite the competent PsLAR activity in vitro, expression of PsLAR driven by the Arabidopsis ANR promoter in wild-type and anr knock-out Arabidopsis backgrounds did not result in PA synthesis. Significant variation in seed coat PA composition was found within the pea cultivars, making pea an ideal system to explore PA biosynthesis. PsANR and PsLAR transcript profiles, PA localization, and PA accumulation patterns suggest that a pool of PA subunits are produced in specific seed coat cells early in development to be used as substrates for polymerization into PAs. Biochemically competent recombinant PsANR and PsLAR activities were consistent with the pea seed coat PA profile composed of both cis- and trans-flavan-3-ols. Since the expression of PsLAR in Arabidopsis did not alter the PA subunit profile (which is only comprised of cis-flavan-3-ols), it necessitates further investigation of in planta metabolic flux through PsLAR.
Current development in Social Security financing.
Bartlett, D K
1980-09-01
The current financial outlook for the old-age, survivors, disability, and health insurance (OASDHI) program indicates several problems. During 1980-84, income and outgo for the OASDI and hospital insurance (HI) trust funds combined are roughly in balance, according to the annual report of the Board of Trustees. The OSI program, however, is running out of funds as automatic benefit increases exceed the growth in payroll tax revenues. Clearly, additional financing will be needed throughout the 1980's. Funds now earmarked for the DI and HI trust funds could serve this purpose, although more short-range financing will be needed if real wages continue to show losses instead of the usual gains. The 1977 amendments that strengthened social security financing provided only a thin margin of safety against unfavorable experience during the early 1980's. The short-range economic picture has darkened considerably since 1977, with adverse consequences for social security financing. Only the DI experience has improved. Based on tax rates in the present law, a large buildup of OASDI trust funds is expected over the next 25 years. HI financing, however, is projected to become inadequate after 1990. Projections over the next 75 years indicate severe financing problems for the OASDI program early in the 21st centruy, as the aged population grows relative to the work force.
Owens, Lynn; Gilmore, Ian T; Pirmohamed, Munir
2005-01-01
Alcohol-related disease represents a major burden on hospitals. However, it is unclear whether hospitals have developed the necessary expertise and guidelines to deal with this burden. The aim of this survey was to determine what measures general hospital NHS Trusts in England had in place to deal with alcohol-related problems, including the employment of dedicated alcohol specialist nurses. Two postal surveys of all NHS general hospital Trusts in England, the first in 2000 (n = 138; 54% response rate) and the second in 2003 after the publication of the Royal College of Physicians (RCP) report on alcohol in secondary care (n = 164; 75% response rate). Between the two surveys, there was a significant increase (P = 0.005) in the number of dedicated alcohol nurses employed by general hospital trusts; however, the numbers remain low (n = 21). Additionally, the availability of prescribing guidelines for the management of alcohol withdrawal increased significantly (P = 0.0001). The survey indicates that most general hospitals do not have appropriate services in place to deal with such patients. Although there is a need and willingness to develop alcohol services in general hospitals, which is one of the key recommendations of the RCP report, the lack of funding is going to act as a major barrier.
Clarifying anti-reflexivity: conservative opposition to impact science and scientific evidence
NASA Astrophysics Data System (ADS)
Dunlap, Riley E.
2014-01-01
The recent study reported by McCright et al (2013 Environ. Res. Lett. 8 044029) extends current research on conservatives’ distrust of science by distinguishing between public trust in production versus impact scientists (i.e. those whose work yields new technologies and marketable products versus those assessing the health and environmental impacts of such technologies and products). As expected, they find that conservatives are significantly less trustful of impact scientists but somewhat more trustful of production scientists. In the process they provide support for the Anti-Reflexivity Thesis, a perspective that attributes conservatives’ (and Republicans’) denial of anthropogenic climate change (ACC) and other environmental problems and attacks on climate/environmental science to their staunch commitment to protecting the current system of economic production. McCright et al’s innovative study deserves replication, and their approach should prove useful in accounting for divergent views of ACC. It is also important to keep in mind that anti-reflexivity is an institutional and structural issue, becoming more consequential when it is employed by political elites such as the George W Bush Administration in the US. Institutional anti-reflexivity is further illustrated by the widespread denial of ACC and a range of other problems among current Republican members of the US Congress.
DOT National Transportation Integrated Search
1972-01-01
This manual is intended for use as a tool in predicting the noise which will be generated by freely-flowing vehicle traffic along a highway of known characteristics. The manual presents two separate approaches to the prediction problem. The first app...
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-12-08
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.
Improving data transparency in clinical trials using blockchain smart contracts.
Nugent, Timothy; Upton, David; Cimpoesu, Mihai
2016-01-01
The scientific credibility of findings from clinical trials can be undermined by a range of problems including missing data, endpoint switching, data dredging, and selective publication. Together, these issues have contributed to systematically distorted perceptions regarding the benefits and risks of treatments. While these issues have been well documented and widely discussed within the profession, legislative intervention has seen limited success. Recently, a method was described for using a blockchain to prove the existence of documents describing pre-specified endpoints in clinical trials. Here, we extend the idea by using smart contracts - code, and data, that resides at a specific address in a blockchain, and whose execution is cryptographically validated by the network - to demonstrate how trust in clinical trials can be enforced and data manipulation eliminated. We show that blockchain smart contracts provide a novel technological solution to the data manipulation problem, by acting as trusted administrators and providing an immutable record of trial history.
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-01-01
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792
Public trust in Dutch health care.
Straten, G F M; Friele, R D; Groenewegen, P P
2002-07-01
This article describes the development of a valid and reliable instrument to measure different dimensions of public trust in health care in the Netherlands. This instrument is needed because the concept was not well developed, or operationalized in earlier research. The new instrument will be used in a research project to monitor trust and to predict behaviour of people such as consulting "alternative practitioners". The idea for the research was suggested by economic research into public trust. In the study, a phased design was used to overcome the operationalization problem. In the first phase, a qualitative study was conducted; and, in the second, a quantitative study. In the first phase, more than 100 people were interviewed to gain insight into the issues they associated with trust. Eight categories of issues that were derived from the interviews were assumed to be possible dimensions of trust. On the basis of these eight categories and the interviews, a questionnaire was developed that was used in the second phase. In this phase, the questionnaire was sent to 1500 members of a consumer panel; the response was 70 percent. The analysis reveals that six of the eight possible dimensions appear in factor analysis. These dimensions are trust in: the patient-focus of health care providers; macro policies level will have no consequences for patients; expertise of health care providers; quality of care; information supply and communication by care providers and the quality of cooperation. The reliability of most scales is higher than 0.8. The validity of the dimensions is assessed by determining the correlation between the scales on the one hand, and people's experience and a general mark they would assign on the other. We conclude that public trust is a multi-dimensional concept, including not only issues that relate to the patient-doctor relationship, but also issues that relate to health care institutions. The instrument appears to be reliable and valid.
Political Science: Building relationships and trust with lawmakers (Invited)
NASA Astrophysics Data System (ADS)
Unruh Cohen, A. L.
2013-12-01
Energy and climate policies are important drivers of domestic and international politics. They are also sources of controversy and polarization. Input from scientists is critical to identifying problems and their solutions for our domestic and international energy and climate challenges. I will discuss how issues come to the attention of lawmakers, how they determine the solutions they wish to pursue and how scientists can meaningfully engage in that process. Based on my experience working on energy and climate legislation in Congress for the last decade, I will provide practical advice on establishing trust and developing relationships with lawmakers.
Translations on Narcotics and Dangerous Drugs No. 300.
1977-05-19
TV, he said PEMADAM would work closely with the authorities concerned and try to find ways to make the campaign more effective. He said Malaysian ... Malaysian passports, together with a Hong Kong identity card. Also found in his house, they claim, were boxes of rubber bands of the same brand as...No 3 heroin by Thai and Malaysian couriers [to] a string of European cities last December. 25 Nine members of his alleged gang, seven Thais and two
The United States Air Force in Southeast Asia: The War in Northern Laos, 1954-1973
1993-01-01
Simultaneously, all 315th Air Division courier flights were canceled; all training was scrubbed ; 0=0 (l) and certain division troop carriers stood alert...Force and scrub it of its national markings. With Defense and State approval, he manned the plane with experienced USAF reconnaissance pilots from...the aegis of Cambodian Prince Norodom Sihanouk. On June 22 they agreed in principle to a tripartite government that would rule Laos until new general
Maharjan, B; Kelly-Cirino, C D; Weirich, A; Curry, P S; Hoffman, H; Avsar, K; Shrestha, B
2016-12-01
German Nepal TB Project, National Tuberculosis Reference Laboratory, Kathmandu, Nepal. To evaluate whether transporting samples in OMNIgene®•SPUTUM (OM-S) reagent from a peripheral collection site to a central laboratory in Nepal can improve tuberculosis (TB) detection and increase the sensitivity of Xpert® MTB/RIF testing. One hundred sputum samples were split manually. Each portion was assigned to the OM-S group (OM-S added at collection, airline-couriered without cold chain, no other processing required) or the standard-of-care (SOC) group (samples airline-couriered on ice, sodium hydroxide + N-acetyl-L-cysteine processing required at the laboratory). Smear microscopy and Xpert testing were performed. Transport time was 2-13 days. Overall smear results were comparable (respectively 58% and 56% smear-negative results in the OM-S and SOC groups). The rate of smear-positive, Mycobacterium tuberculosis-positive (MTB+) sample detection was identical for both treatment groups, at 95%. More smear-negative MTB+ samples were detected in the OM-S group (17% vs. 13%, P = 0.0655). Sputum samples treated with OM-S can undergo multiday ambient-temperature transport and yield comparable smear and Xpert results to those of SOC samples. Further investigation with larger sample sizes is required to assess whether treating sputum samples with OM-S could increase the sensitivity of Xpert testing in smear-negative samples.
The traveller and emerging infections: sentinel, courier, transmitter.
Wilson, M E
2003-01-01
The movement of populations shapes the patterns and distribution of infectious diseases globally. The consequences of travel are seen in the traveller and in places and populations visited and may persist long after travel. The traveller can be seen as an interactive biological unit who picks up, processes, carries and drops off microbial genetic material. A traveller can introduce potential pathogens in the absence of signs or symptoms of illness. Travellers can serve as a sentinel population; study of them can provide insights into the presence and level of risk of transmission of infections in other geographical regions. Travellers can also be seen as couriers who inadvertently ferry pathogens and microbial genetic material to regions where researchers can carry out detailed analyses that can help to map the location and movement of strains, genotypes and resistance patterns. The laboratory plays a key role in the identification and characterization of pathogens, which can inform management of individual patients and the public health response. The connectedness and mobility in the world today facilitate the emergence of infectious diseases in humans and also in animals and plants. Many traditional barriers have been breached by travel, roads and technology. Population size and density favour spread of many infections. The rapid generation time of microbes and their capacity to adapt to changes in the physico-chemical and immunological environment will pose continuing challenges.
Shope, William G.; ,
1991-01-01
The U.S. Geological Survey is acquiring a new generation of field computers and communications software to support hydrologic data-collection at field locations. The new computer hardware and software mark the beginning of the Survey's transition from the use of electromechanical devices and paper tapes to electronic microprocessor-based instrumentation. Software is being developed for these microprocessors to facilitate the collection, conversion, and entry of data into the Survey's National Water Information System. The new automated data-collection process features several microprocessor-controlled sensors connected to a serial digital multidrop line operated by an electronic data recorder. Data are acquired from the sensors in response to instructions programmed into the data recorder by the user through small portable lap-top or hand-held computers. The portable computers, called personal field computers, also are used to extract data from the electronic recorders for transport by courier to the office computers. The Survey's alternative to manual or courier retrieval is the use of microprocessor-based remote telemetry stations. Plans have been developed to enhance the Survey's use of the Geostationary Operational Environmental Satellite telemetry by replacing the present network of direct-readout ground stations with less expensive units. Plans also provide for computer software that will support other forms of telemetry such as telephone or land-based radio.
Zeroing in on red blood cell unit expiry.
Ayyalil, Fathima; Irwin, Greg; Ross, Bryony; Manolis, Michael; Enjeti, Anoop K
2017-12-01
Expiry of red blood cell (RBC) units is a significant contributor to wastage of precious voluntary donations. Effective strategies aimed at optimal resource utilization are required to minimize wastage. This retrospective study analyzed the strategic measures implemented to reduce expiry of RBC units in an Australian tertiary regional hospital. The measures, which included inventory rearrangement, effective stock rotation, and the number of emergency courier services required during a 24-month period, were evaluated. There was no wastage of RBC units due to expiry over the 12 months after policy changes. Before these changes, approximately half of RBC wastage (261/511) was due to expiry. The total number of transfusions remained constant in this period and there was no increase in the use of emergency couriers. Policy changes implemented were decreasing the RBC inventory level by one-third and effective stock rotation and using a computerized system to link the transfusion services across the area. Effective stock rotation resulted in a reduction in older blood (>28 days) received in the main laboratory rotated from peripheral hospitals, down from 6%-41% to 0%-2.5%. Age-related expiry of blood products is preventable and can be significantly reduced by improving practices in the pathology service. This study provides proof of principle for "zero tolerance for RBC unit expiry" across a large networked blood banking service. © 2017 The Authors Transfusion published by Wiley Periodicals, Inc. on behalf of AABB.
Toward designing for trust in database automation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duez, P. P.; Jamieson, G. A.
Appropriate reliance on system automation is imperative for safe and productive work, especially in safety-critical systems. It is unsafe to rely on automation beyond its designed use; conversely, it can be both unproductive and unsafe to manually perform tasks that are better relegated to automated tools. Operator trust in automated tools mediates reliance, and trust appears to affect how operators use technology. As automated agents become more complex, the question of trust in automation is increasingly important. In order to achieve proper use of automation, we must engender an appropriate degree of trust that is sensitive to changes in operatingmore » functions and context. In this paper, we present research concerning trust in automation in the domain of automated tools for relational databases. Lee and See have provided models of trust in automation. One model developed by Lee and See identifies three key categories of information about the automation that lie along a continuum of attributional abstraction. Purpose-, process-and performance-related information serve, both individually and through inferences between them, to describe automation in such a way as to engender r properly-calibrated trust. Thus, one can look at information from different levels of attributional abstraction as a general requirements analysis for information key to appropriate trust in automation. The model of information necessary to engender appropriate trust in automation [1] is a general one. Although it describes categories of information, it does not provide insight on how to determine the specific information elements required for a given automated tool. We have applied the Abstraction Hierarchy (AH) to this problem in the domain of relational databases. The AH serves as a formal description of the automation at several levels of abstraction, ranging from a very abstract purpose-oriented description to a more concrete description of the resources involved in the automated process. The connection between an AH for an automated tool and a list of information elements at the three levels of attributional abstraction is then direct, providing a method for satisfying information requirements for appropriate trust in automation. In this paper, we will present our method for developing specific information requirements for an automated tool, based on a formal analysis of that tool and the models presented by Lee and See. We will show an example of the application of the AH to automation, in the domain of relational database automation, and the resulting set of specific information elements for appropriate trust in the automated tool. Finally, we will comment on the applicability of this approach to the domain of nuclear plant instrumentation. (authors)« less
Interdisciplinary Matchmaking: Choosing Collaborators by Skill, Acquaintance and Trust
NASA Astrophysics Data System (ADS)
Hupa, Albert; Rzadca, Krzysztof; Wierzbicki, Adam; Datta, Anwitaman
Social networks are commonly used to enhance recommender systems. Most of such systems recommend a single resource or a person. However, complex problems or projects usually require a team of experts that must work together on a solution. Team recommendation is much more challenging, mostly because of the complex interpersonal relations between members. This chapter presents fundamental concepts on how to score a team based on members' social context and their suitability for a particular project. We represent the social context of an individual as a three-dimensional social network (3DSN) composed of a knowledge dimension expressing skills, a trust dimension and an acquaintance dimension. Dimensions of a 3DSN are used to mathematically formalize the criteria for prediction of the team's performance. We use these criteria to formulate the team recommendation problem as a multi-criteria optimization problem. We demonstrate our approach on empirical data crawled from two web2.0 sites:
Mobile Location-Based Services for Trusted Information in Disaster Management
NASA Astrophysics Data System (ADS)
Ragia, Lemonia; Deriaz, Michel; Seigneur, Jean-Marc
The goal of the present chapter is to provide location-based services for disaster management. The application involves services related to the safety of the people due to an unexpected event. The current prototype is implemented for a specific issue of disaster management which is road traffic control. The users can ask requests on cell phones or via Internet to the system and get an answer in a display or in textual form. The data are in a central database and every user can input data via virtual tags. The system is based on spatial messages which can be sent from any user to any other in a certain distance. In this way all the users and not a separate source provide the necessary information for a dangerous situation. To avoid any contamination problems we use trust security to check the input to the system and a trust engine model to provide information with a considerable reliability.
Leveraging Social Links for Trust and Privacy in Networks
NASA Astrophysics Data System (ADS)
Cutillo, Leucio Antonio; Molva, Refik; Strufe, Thorsten
Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in distributed systems and networks. We suggest a solution that both aims at avoiding any centralized control and leverages on the real life trust between users, that is part of the social network application itself. An anonymization technique based on multi-hop routing among trusted nodes guarantees privacy in data access and, generally speaking, in all the OSN operations.
Teunissen, Erik; Van Bavel, Eric; Van Den Driessen Mareeuw, Francine; Macfarlane, Anne; Van Weel-Baumgarten, Evelyn; Van Den Muijsenbergh, Maria; Van Weel, Chris
2015-06-01
To explore the views and experiences of general practitioners (GPs) in relation to recognition, recording, and treatment of mental health problems of undocumented migrants (UMs), and to gain insight in the reasons for under-registration of mental health problems in the electronic medical records. Qualitative study design with semi-structured interviews using a topic guide. Sixteen GPs in the Netherlands with clinical expertise in the care of UMs. GPs recognized many mental health problems in UMs. Barriers that prevented them from recording these problems and from delivering appropriate care were their low consultation rates, physical presentation of mental health problems, high number of other problems, the UM's lack of trust towards health care professionals, and cultural differences in health beliefs and language barriers. Referrals to mental health care organizations were often seen as problematic by GPs. To overcome these barriers, GPs provided personalized care as far as possible, referred to other primary care professionals such as social workers or mental health care nurses in their practice, and were a little less restrictive in prescribing psychotropics than guidelines recommended. GPs experienced a variety of barriers in engaging with UMs when identifying or suspecting mental health problems. This explains why there is a gap between the high recognition of mental health problems and the low recording of these problems in general practice files. It is recommended that GPs address mental health problems more actively, strive for continuity of care in order to gain trust of the UMs, and look for opportunities to provide mental care that is accessible and acceptable for UMs.
Multi-Objective Constraint Satisfaction for Mobile Robot Area Defense
2010-03-01
17 NSGA-II non-dominated sorting genetic algorithm II . . . . . . . . . . . . . . . . . . . 17 jMetal Metaheuristic Algorithms in...to alert the other agents and ensure trust in the system. This research presents an algorithm that tasks robots to meet the two specific goals of...problem is defined as a constraint satisfaction problem solved using the Non-dominated Sorting Genetic Algorithm II (NSGA-II). Both goals of
ERIC Educational Resources Information Center
Evans, Robert
2006-01-01
Plagiarism by students is seen as an increasing problem. The fear is that students will use the internet to obtain analysis, interpretation or even complete assignments and then submit these as their own work. Electronic plagiarism detection services may help to prevent such unfair practice but, in doing so, they create a new problem: certifying…
Multi-Objective Optimization for Trustworthy Tactical Networks: A Survey and Insights
2013-06-01
existing data sources, gathering and maintaining the data needed , and completing and reviewing the collection of information. Send comments regarding...problems: using repeated cooperative games [12], hedonic games [25], and nontransferable utility cooperative games [27]. It should be noted that trust...examined an optimal task allocation problem in a distributed computing system where program modules need to be allocated to different processors to
A sensitivity equation approach to shape optimization in fluid flows
NASA Technical Reports Server (NTRS)
Borggaard, Jeff; Burns, John
1994-01-01
A sensitivity equation method to shape optimization problems is applied. An algorithm is developed and tested on a problem of designing optimal forebody simulators for a 2D, inviscid supersonic flow. The algorithm uses a BFGS/Trust Region optimization scheme with sensitivities computed by numerically approximating the linear partial differential equations that determine the flow sensitivities. Numerical examples are presented to illustrate the method.
Algorithms for bilevel optimization
NASA Technical Reports Server (NTRS)
Alexandrov, Natalia; Dennis, J. E., Jr.
1994-01-01
General multilevel nonlinear optimization problems arise in design of complex systems and can be used as a means of regularization for multi-criteria optimization problems. Here, for clarity in displaying our ideas, we restrict ourselves to general bi-level optimization problems, and we present two solution approaches. Both approaches use a trust-region globalization strategy, and they can be easily extended to handle the general multilevel problem. We make no convexity assumptions, but we do assume that the problem has a nondegenerate feasible set. We consider necessary optimality conditions for the bi-level problem formulations and discuss results that can be extended to obtain multilevel optimization formulations with constraints at each level.
Can Conflict Resolution Be Win-Win?
ERIC Educational Resources Information Center
Lippitt, Gordon L.
1983-01-01
Conflict, a common managerial problem, offers opportunities for creative and positive actions. "Win-win" conflict resolution, which occurs chiefly through compromise, contribution, and synthesis tactics, requires trust, commitment, communication, and dialog. It can be encouraged by generating positive feelings, redirecting negative…
Mackie, Craig; Dunn, Nicole; MacLean, Sarah; Testa, Valerie; Heisel, Marnin; Hatcher, Simon
2017-11-01
Blended therapy describes the use of computerised therapy combined with face-to-face therapy to extend the depth, range and nature of the face-to-face therapy. We wanted to develop a treatment manual for a randomised trial of blended therapy combining face-to-face problem solving and a smartphone app in men who present to hospital with self-harm. To develop a treatment manual and to describe the experience of receiving and delivering a blended therapy. After completion of the blended therapy, semistructured qualitative interviews were conducted with participants to describe their experience of the treatment. Two independent coders analysed the material using a thematic, grounded theory approach. Seven men were enrolled in the study, and six completed the qualitative interviews. The two main themes identified were of trust and connection. Participants attended 85% of their appointments. In the treatment manual, we emphasised the themes of trust and connection by allowing time to discuss the app in the face-to-face to sessions, ensuring that therapists are familiar with the app and know how to respond to technical queries. Identification of trust and connection generates novel questions about the importance of the therapeutic alliance with technology rather than with people. Clinicians and app developers need to pay attention to the therapeutic relationship with technology as trust and good communication can be easily damaged, resulting in disengagement with the app. Blended therapy may result in increased adherence to face-to-face sessions. NCT02718248. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
2011-04-01
detection. We also thank Len Pasion and Todd Meglich for helpful discussions on the Camp Sibert data set. Finally, we thank Kris Davis from Colorado...depth of potential UXO using a continuous wavelet transform: Conference proceedings, 1012– 1022, SPIE. Billings, S. D., L. R. Pasion , and D. W...1638 2009 Annual Report. Lanczos, C., 1988, Applied analysis: Courier Dover Publications. Li, Y., Krahenbuhl, R., Meglich, T., Pasion , L
United States Air Force Statistical Digest. Fiscal Year 1970. 25th Edition
1971-02-22
GUIDED MISSILE. AIR TO AIR MISSILE. AND TARGET DRONEACCEPTANCES BY MANUFACTURER. BY MONTI -!- FY 1970 o ACCEPl’ED ACCEPTANCES FOR FY 1970 TOTAL...AUTOMATICALLY DECLASSIFIEDDOD VIR. 5200.10 CONFIDENTIAL Ceylon •••••.•.•..• 19 19 - 1 - 6 - 12 - - - - - Federation of Malaysia . • • • 215 215 67 17 1...Medical Service Squadrons & Flights • • • • • • • • Air Postal & Courier ,Groups& Fligl:ts ••••••• Censorship Squadrons
A protect solution for data security in mobile cloud storage
NASA Astrophysics Data System (ADS)
Yu, Xiaojun; Wen, Qiaoyan
2013-03-01
It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.
Caring for Infants--Trusting Your Feelings.
ERIC Educational Resources Information Center
Mast, Jacqueline
1991-01-01
Discusses the importance of child caregivers' attention to normal development of infants during the first year of life. Gut level feelings about abnormality are significant in early diagnoses of handicapped children. A list of warning signs that indicate problems in motor development is included. (SH)
The Development of Behavior Control Competency in Preadolescence: A Case Vignette
ERIC Educational Resources Information Center
Cooper, Atha J.; And Others
1972-01-01
The utility of a crisis intervention approach for helping preadolescents build competency in behavior control is demonstrated. The following dimensions are highlighted: immediacy of intervention, trust relationship, structural interventions, facilitating versus controlling, problem solving orientation, and mobilization of group membership…
What's trust got to do with it? Revisiting opioid contracts.
Buchman, Daniel Z; Ho, Anita
2014-10-01
Prescription opioid abuse (POA) is an escalating clinical and public health problem. Physician worries about iatrogenic addiction and whether patients are 'drug seeking', 'abusing' and 'diverting' prescription opioids exist against a backdrop of professional and legal consequences of prescribing that have created a climate of distrust in chronic pain management. One attempt to circumvent these worries is the use of opioid contracts that outline conditions patients must agree to in order to receive opioids. Opioid contracts have received some scholarly attention, with trust and trustworthiness identified as key values and virtues. However, few articles have provided a critical account of trust and trustworthiness in this context, particularly when there exists disagreement about their role in terms of enhancing or detracting from the patient-physician relationship. This paper argues that opioid contracts represent a misleading appeal to patient-physician trust. Assuming the patient is untrustworthy may wrongfully undermine the credibility of the patient's testimony, which may exacerbate certain vulnerabilities of the person in pain. However, misplaced trust in certain patients may render the physician vulnerable to the potential harms of POA. If patients distrust their physician, or feel distrusted by them, this may destabilise the therapeutic relationship and compromise care. A process of epistemic humility may help cultivate mutual patient-physician trust. Epistemic humility is a collaborative effort between physicians and patients that recognises the role of patients' subjective knowledge in enhancing physicians' self-understanding of their theoretical and practice frameworks, values and assumptions about the motivations of certain patients who report chronic pain. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Fusar-Poli, Paolo; Werbeloff, Nomi; Rutigliano, Grazia; Oliver, Dominic; Davies, Cathy; Stahl, Daniel; McGuire, Philip; Osborn, David
2018-06-12
The benefits of indicated primary prevention among individuals at Clinical High Risk for Psychosis (CHR-P) are limited by the difficulty in detecting these individuals. To overcome this problem, a transdiagnostic, clinically based, individualized risk calculator has recently been developed and subjected to a first external validation in 2 different catchment areas of the South London and Maudsley (SLaM) NHS Trust. Second external validation of real world, real-time electronic clinical register-based cohort study. All individuals who received a first ICD-10 index diagnosis of nonorganic and nonpsychotic mental disorder within the Camden and Islington (C&I) NHS Trust between 2009 and 2016 were included. The model previously validated included age, gender, ethnicity, age by gender, and ICD-10 index diagnosis to predict the development of any ICD-10 nonorganic psychosis. The model's performance was measured using Harrell's C-index. This study included a total of 13702 patients with an average age of 40 (range 16-99), 52% were female, and most were of white ethnicity (64%). There were no CHR-P or child/adolescent services in the C&I Trust. The C&I and SLaM Trust samples also differed significantly in terms of age, gender, ethnicity, and distribution of index diagnosis. Despite these significant differences, the original model retained an acceptable predictive performance (Harrell's C of 0.73), which is comparable to that of CHR-P tools currently recommended for clinical use. This risk calculator may pragmatically support an improved transdiagnostic detection of at-risk individuals and psychosis prediction even in NHS Trusts in the United Kingdom where CHR-P services are not provided.
Distribution and Correlates of Self-Reported Crimes of Trust
Menard, Scott; Morris, Robert G.; Gerber, Jurg; Covey, Herbert C.
2012-01-01
This study examines the distribution and correlates of a special class of property crimes, crimes of trust, using longitudinal and cross sectional self-report data from a national sample. We begin by defining crimes of trust and consider their conceptual relationship to “conventional” property crimes, which we here characterize as crimes of stealth, and to white collar crimes, which are defined in terms of the social status of the perpetrators. Crimes of trust are here defined as property crimes that typically involve deliberate contact with the victim or, where there is more than one victim, with at least one or more victims, in which there is typically more of a focus on concealing the fact that a crime has been committed than on concealing the identity of the perpetrator (as is the case in crimes of stealth), without regard to the socioeconomic status of the perpetrator (thus including but not limited to white collar crimes). The focus here is on crimes of trust committed by individuals (as opposed to corporate crime). We first examine their distribution by sociodemographic characteristics, then examine the correlation of crimes of trust with other types of illegal behavior, using data from the National Youth Survey Family Study, including (1) longitudinal self-report data from a nationally representative panel of individuals who were 11–18 years old in 1976–77 and who were followed through early middle age (ages 36–44) in 2002–2003, plus (2) cross-sectional data on these individuals plus their parents, spouses, and children age 11 and older in 2002–2003 (total age range 11–88). The results suggest that crimes of trust have a different age-crime curve from conventional crimes, and that they are not as strongly correlated with problem substance use, gender, and other socioeconomic indicators as conventional crimes. PMID:22347761
Chen, Su-Yueh; Wu, Wen-Chuan; Chang, Ching-Sheng; Lin, Chia-Tzu; Kung, Jung-Yuan; Weng, Hui-Ching; Lin, Yu-Tz; Lee, Shu-I
2015-09-07
It is of importance and urgency for hospitals to retain excellent nursing staff in order to improve patient satisfaction and hospital performance. However, it was found that simply increasing the salary is not the best method to resolve the problem of lacking nursing staff; it is necessary to focus on the impact of non-monetary factors. The delicate relationship between organizational justice, organizational trust, organizational identification, and organizational commitment requires investigation and clarification from more studies if application in nursing practice is to be expected. Therefore, this study was to investigate how the organizational justice perception could affect nurses' organizational trust and organizational identification, and whether the organizational trust and organizational identification could encourage nurses to willingly remain in their jobs and commit themselves to the hospitals. A cross-sectional design was used. Questionnaires were distributed in 2013 to a convenience sample of 400 registered nurses in one teaching hospital in Taiwan: 392 were retrieved. Of these, 386 questionnaires were valid, which was a 96.5% response rate. The SPSS 17.0 and Amos 17.0 (structural equation modeling) statistical software packages were used for data analysis. The organizational justice perceived by nurses significantly and positively affects their organizational trust (γ₁₁ = 0.49) and organizational identification (γ₂₁ = 0.58). Organizational trust (β₃₁ = 0.62) and organizational identification (β₃₂ = 0.53) significantly and positively affect organizational commitment. Hospital managers can enhance the service concepts and attitudes of frontline nursing personnel by maximizing organizational justice, organizational trust and organizational identification. Nursing personnel would then be motivated to provide feedback to the attention and care provided by hospital management by demonstrating substantial improvements in their extra-role performance. Improved service concepts and attitudes would also facilitate teamwork among colleagues, boost the morale of the nursing faculty and reduce resignations and career changes.
Petit, Morgane; Mine, Louis; Pascreau, Tiffany; Brouzes, Chantal; Majoux, Sandrine; Borgel, Delphine; Beaudeux, Jean-Louis; Lasne, Dominique; Hennequin, Carole
2017-12-01
Pneumatic tube delivery system (PTS) enables to reduce considerably turnaround times. The aim of the study was to assess the influence of the PTS on the quality of routine biochemical and hematological tests in our laboratory. Blood samples from 6 hospitalized patients and 8 healthy volunteers were analyzed. Blood samples were delivered to the laboratory by a PTS and by a human courier. We performed the following analysis: ionized calcium, sodium, potassium, lactate deshydrogenase (LDH), aspartate aminotransferase (ASAT), arterial blood gas, complete blood count and coagulation test as prothrombin time, activated partial thromboplastin time, factors V and VIII. Results were compared between the both method of transport according to the recommendation of the Société française de biologie clinique and the French committee for accreditation (SH-GTA01, norme NF ISO 5275-6). The hemolysis index of plasma was similar between the groups and no morphological differences were found on blood cells. For three samples, when delivered by PTS, LDH levels (two samples) and neutrophil polynuclear count (one sample) were above the recommended guidelines compared to those delivered by courier. Conversely, LDH levels and FVIII were below in two samples delivered by PTS. LDH levels, PNN count or factor VIII can be affected by PTS without the clinical interpretation being modified. We concluded that the PTS can be used to transport blood samples for routine biochemical and hematological analysis in our hospital.
The influence of political ideology on trust in science
NASA Astrophysics Data System (ADS)
McCright, Aaron M.; Dentzman, Katherine; Charters, Meghan; Dietz, Thomas
2013-12-01
In recent years, some scholars, journalists, and science advocates have promoted broad claims that ‘conservatives distrust science’ or ‘conservatives oppose science’. We argue that such claims may oversimplify in ways that lead to empirical inaccuracies. The Anti-Reflexivity Thesis suggests a more nuanced examination of how political ideology influences views about science. The Anti-Reflexivity Thesis hypothesizes that some sectors of society mobilize to defend the industrial capitalist order from the claims of environmentalists and some environmental scientists that the current economic system causes serious ecological and public health problems. The Anti-Reflexivity Thesis expects that conservatives will report significantly less trust in, and support for, science that identifies environmental and public health impacts of economic production (i.e., impact science) than liberals. It also expects that conservatives will report a similar or greater level of trust in, and support for, science that provides new inventions or innovations for economic production (i.e., production science) than liberals. Analyzing data from a recent survey experiment with 798 adults recruited from the US general public, our results confirm the expectations of the Anti-Reflexivity Thesis. Conservatives report less trust in impact scientists but greater trust in production scientists than their liberal counterparts. We argue that further work that increases the accuracy and depth of our understanding of the relationship between political ideology and views about science is likely crucial for addressing the politicized science-based issues of our age.
On Responsibility of Scientists
NASA Astrophysics Data System (ADS)
Burdyuzha, Vladimir
The situation of modern world is analised. It is impossible for our Civilization when at least half of the World Scientists are engaged in research intended to solve military problems. Civilization cannot be called reasonable so long as it spends a huge portion of national incomes on armaments. For resolution of our global problems International Scientific Center - Brain Trust of planet must be created, the status of which should be defined and sealed by the UN organization.
Demonstration of Human-Autonomy Teaming Principles
NASA Technical Reports Server (NTRS)
Shively, Robert Jay
2016-01-01
Known problems with automation include lack of mode awareness, automation brittleness, and risk of miscalibrated trust. Human-Autonomy Teaming (HAT) is essential for improving these problems. We have identified some critical components of HAT and ran a part-task study to introduce these components to a ground station that supports flight following of multiple aircraft. Our goal was to demonstrate, evaluate, and refine HAT principles. This presentation provides a brief summary of the study and initial findings.
ERIC Educational Resources Information Center
Moffett, Fran
1982-01-01
Eighteen staff members from Roselle Park (NJ) High School were the first faculty group in New Jersey to experience a workshop to acquaint them with the Wild Cat Mountain Wilderness Center and improve communication, trust, and enhance problem-solving skills. Challenging activities, suitable to the area, are described. (CM)
A Program Based on Maslow's Hierarchy Helps Students in Trouble.
ERIC Educational Resources Information Center
Yates, Mary Ruth; And Others
1980-01-01
Describes the program at Alabama's Huntsville Alternative School, where severe behavioral problems are dealt with by promoting positive self-concepts in students through acceptance, trust, warmth, concern, firmness, consistency, humor, and the meeting of human needs as identified by Abraham Maslow. (Author/PGD)
In Defense of Teacher Professionalism as a Policy Choice.
ERIC Educational Resources Information Center
Sykes, Gary
1991-01-01
Whereas democracy institutionalizes distrust, professionalism relies on trust. Responding to Berbules and Densmore, this article identifies strong normative reasons, grounded in the interests of children, for promoting teacher professionalism. Exorcising the evils of classic professionalism will eliminate neither equity nor quality problems.…
Multilevel algorithms for nonlinear optimization
NASA Technical Reports Server (NTRS)
Alexandrov, Natalia; Dennis, J. E., Jr.
1994-01-01
Multidisciplinary design optimization (MDO) gives rise to nonlinear optimization problems characterized by a large number of constraints that naturally occur in blocks. We propose a class of multilevel optimization methods motivated by the structure and number of constraints and by the expense of the derivative computations for MDO. The algorithms are an extension to the nonlinear programming problem of the successful class of local Brown-Brent algorithms for nonlinear equations. Our extensions allow the user to partition constraints into arbitrary blocks to fit the application, and they separately process each block and the objective function, restricted to certain subspaces. The methods use trust regions as a globalization strategy, and they have been shown to be globally convergent under reasonable assumptions. The multilevel algorithms can be applied to all classes of MDO formulations. Multilevel algorithms for solving nonlinear systems of equations are a special case of the multilevel optimization methods. In this case, they can be viewed as a trust-region globalization of the Brown-Brent class.
Improving data transparency in clinical trials using blockchain smart contracts
Nugent, Timothy; Upton, David; Cimpoesu, Mihai
2016-01-01
The scientific credibility of findings from clinical trials can be undermined by a range of problems including missing data, endpoint switching, data dredging, and selective publication. Together, these issues have contributed to systematically distorted perceptions regarding the benefits and risks of treatments. While these issues have been well documented and widely discussed within the profession, legislative intervention has seen limited success. Recently, a method was described for using a blockchain to prove the existence of documents describing pre-specified endpoints in clinical trials. Here, we extend the idea by using smart contracts - code, and data, that resides at a specific address in a blockchain, and whose execution is cryptographically validated by the network - to demonstrate how trust in clinical trials can be enforced and data manipulation eliminated. We show that blockchain smart contracts provide a novel technological solution to the data manipulation problem, by acting as trusted administrators and providing an immutable record of trial history. PMID:28357041
Replacing missing values using trustworthy data values from web data sources
NASA Astrophysics Data System (ADS)
Izham Jaya, M.; Sidi, Fatimah; Mat Yusof, Sharmila; Suriani Affendey, Lilly; Ishak, Iskandar; Jabar, Marzanah A.
2017-09-01
In practice, collected data usually are incomplete and contains missing value. Existing approaches in managing missing values overlook the importance of trustworthy data values in replacing missing values. In view that trusted completed data is very important in data analysis, we proposed a framework of missing value replacement using trustworthy data values from web data sources. The proposed framework adopted ontology to map data values from web data sources to the incomplete dataset. As data from web is conflicting with each other, we proposed a trust score measurement based on data accuracy and data reliability. Trust score is then used to select trustworthy data values from web data sources for missing values replacement. We successfully implemented the proposed framework using financial dataset and presented the findings in this paper. From our experiment, we manage to show that replacing missing values with trustworthy data values is important especially in a case of conflicting data to solve missing values problem.
Guiding principles of safety as a basis for developing a pharmaceutical safety culture.
Edwards, Brian; Olsen, Axel K; Whalen, Matthew D; Gold, Marla J
2007-05-01
Despite the best efforts of industry and regulatory authorities, the trust of society in the process of medicine development and communication of pharmaceutical risk has ebbed away. In response the US government has called for a culture of compliance while the EU regulators talk of a 'culture of scientific excellence'. However, one of the fundamental problems hindering progress to rebuilding trust based on a pharmaceutical safety culture is the lack of agreement and transparency between all stakeholders as to what is meant by a 'Safety of Medicines'. For that reason, we propose 'Guiding Principles of Safety for Pharmaceuticals' are developed analogous to the way that Chemical Safety has been tackled. A logical starting point would be to examine the Principles outlined by the US Institute of Medicine although we acknowledge that these Principles require further extensive debate and definition. Nevertheless, the Principles should take centre stage in the reform of pharmaceutical development required to restore society's trust.
CRank: A Credit Assessment Model in C2C e-Commerce
NASA Astrophysics Data System (ADS)
Zhang, Zhiqiang; Xie, Xiaoqin; Pan, Haiwei; Han, Qilong
An increasing number of consumers not only purchase but also resell merchandise through C2C web sites. One of the greatest concerns for the netizens is the lacking of a fair credit assessment system. Trust and trustworthiness are crucial to the survival of online markets. Reputation systems that rely on feedback from traders help to sustain the trust. And reputation systems provide one of the ways of building trusts online. In this chapter, we investigate a credit assessment model, CRank, for the members in the context of e-market systems, such as Alibaba, eBay, to solve such problem as how to choose a credible business partner when the customer wants to purchase some products from the Internet. CRank makes use of feedback profile made up of ranks from other users as well as an overall feedback rating for the user based on the idea of PageRank. This model can be used to build a trustable relation network among business participants.